Planet XGS3-24042 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Routery Planet XGS3-24042. PLANET XGS3-24042 User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 0
1
User's Manual
XGS3-24042
XGS3-24242
24-Port Gigabit
with 4 Optional 10G slots
Layer 3 Managed Stackable Switch
Przeglądanie stron 0
1 2 3 4 5 6 ... 720 721

Podsumowanie treści

Strona 1 - 24-Port Gigabit

1 User's Manual XGS3-24042 XGS3-24242 24-Port Gigabit with 4 Optional 10G slots Layer 3 Managed Stackable Switch

Strona 2

8 32.4 DHCPV6 OPTION37, 38 TROUBLESHOOTING ... 32-15 CHAPTER 33 DHCP SN

Strona 3 - Content

10-3 Global configuration mode uldp aggressive-mode no uldp aggressive-mode Set the global working mode. 4. Configure aggressive mode on a port

Strona 4

10-4 Command Explanation Admin mode show uldp [interface ethernet IFNAME] Display ULDP information. No parameter means to display global ULDP inform

Strona 5

10-5 connected and works normally, but the data link layer is abnormal. ULDP can discover and disable this kind of error state of link. The final res

Strona 6

10-6 the port is considered as “Down”.  In order to make sure that neighbors can be correctly created and unidirectional links can be correctly dis

Strona 7

11-1 Chapter 11 LLDP Function Operation Configuration 11.1 Introduction to LLDP Function Link Layer Discovery Protocol (LLDP) is a new protocol defin

Strona 8

11-2 11.2 LLDP Function Configuration Task Sequence 1. Globally enable LLDP function 2. Configure the port-based LLDP function switch 3. Configure

Strona 9

11-3 Command Explanation Global Mode lldp msgTxHold <value> no lldp msgTxHold Configure the aging time multiplier of LLDP messages as the

Strona 10

11-4 lldp neighbors max-num < value > no lldp neighbors max-num Configure the size of space to store Remote Table of the port as the sp

Strona 11

11-5 11.3 LLDP Function Typical Example Figure 11-1 LLDP Function Typical Configuration Example In the network topology graph above, the port 1,3 o

Strona 12

12-1 Chapter 12 Port Channel Configuration 12.1 Introduction to Port Channel To understand Port Channel, Port Group should be introduced first. Port

Strona 13

9 37.3.1 Typical RIPng Examples ... 37-7 37.3.2 RIPn

Strona 14

12-2 should also be the same. If Port Channel is configured manually or dynamically on switch, the system will automatically set the port with the

Strona 15

12-3 1. The summary of the dynamic LACP aggregation Dynamic LACP aggregation is an aggregation created/deleted by the system automatically, it does n

Strona 16

12-4 2. Add physical ports to the port group Command Explanation Port Mode port-group <port-group-number> mode {active | passive | on} no por

Strona 17

12-5 12.4 Port Channel Examples Scenario 1: Configuring Port Channel in LACP. Figure 12-2 Configuring Port Channel in LACP The switches

Strona 18

12-6 Scenario 2: Configuring Port Channel in ON mode. Figure 12-3 Configuring Port Channel in ON mode As shown in the figure, ports 1, 2

Strona 19

12-7 Configuration result: Add ports 1, 2, 3, 4 of S1 to port-group1 in order, and we can see a group in “on” mode is completely joined forcedly, swi

Strona 20

13-1 Chapter 13 Jumbo Configuration 13.1 Introduction to Jumbo So far the Jumbo (Jumbo Frame) has not reach a determined standard in the industry (in

Strona 21

14-2 Chapter 14 EFM OAM Configuration 14.1 Introduction to EFM OAM Ethernet is designed for Local Area Network at the beginning, but link length and

Strona 22 - Chapter 1 INTRODUTION

14-3 need to wait until it receives the connection request. After an Ethernet OAM connection is established, the Ethernet OAM entities on both sides

Strona 23

14-4 4. Remote loopback testing Remote loopback testing is available only after an Ethernet OAM connection is established. With remote loopback ena

Strona 24 - 1.3 Product Features

10 42.3 IPV6 BLACK HOLE ROUTING CONFIGURATION TASK ... 42-1 42.4 BLACK HOLE ROUT

Strona 25

14-5 ethernet-oam mode {active | passive} Configure work mode of EFM OAM, default is active mode. ethernet-oam no ethernet-oam Enable EFM OAM of po

Strona 26 - 1.4 Product Specification

14-6 no ethernet-oam remote-failure (failure means critical-event or link-fault event of the local), no command disables the function. (optional)

Strona 27 - Port configuration

14-7 CEPE802.1ah OAMPDUEthernet 1/0/1Ethernet 1/0/1 Figure 14-3 Typical OAM application topology Configuration procedure: (Omitting SNMP and Log con

Strona 28

14-8 exclusive.  When enabling OAM, the negotiation of the port will be disabled automatically. So the negotiation in the peer of the link must be

Strona 29

15-1 Chapter 15 VLAN Configuration 15.1 VLAN Configuration 15.1.1 Introduction to VLAN VLAN (Virtual Local Area Network) is a technology that divides

Strona 30 - Chapter 2 INSTALLATION

15-2 XGS3 Switch Ethernet Ports can works in three kinds of modes: Access, Hybrid and Trunk, each mode has a different processing method in forwardin

Strona 31 - 2.1.2 LED Indications

15-3 3. Assigning Switch ports for VLAN Command Explanation VLAN Mode switchport interface <interface-list> no switchport interface <int

Strona 32

15-4 8. Disable/Enable VLAN Ingress Rules Command Explanation Port Mode vlan ingress enable no vlan ingress enable Enable/Disable VLAN ingress rul

Strona 33

15-5 Figure 15-2 Typical VLAN Application Topology The existing LAN is required to be partitioned to 3 VLANs due to security and application requir

Strona 34 - 2.1.3 Switch Rear Panel

15-6 Switch(Config-Vlan200)#switchport interface ethernet 1/0/8-10 Switch(Config-Vlan200)#exit Switch(config)#interface ethernet 1/0/11 Switch(Config

Strona 35 - 2.2.1 Desktop Installation

11 48.1 IPV4 MULTICAST PROTOCOL OVERVIEW ... 48-1 48.1.1 Intro

Strona 36 - 2.2.2 Rack Mounting

15-7 PC1 connects to the interface Ethernet 1/0/7 of SwitchB, PC2 connects to the interface Ethernet 1/0/9 of SwitchB, Ethernet 1/0/10 of SwitchA con

Strona 37

15-8 15.2 GVRP Configuration 15.2.1 Introduction to GVRP GVRP, i.e. GARP VLAN Registration Protocol, is an application of GARP (Generic Attribute

Strona 38

15-9 Command Explanation Global Mode garp timer join <200-500> garp timer leave <500-1200> garp timer leaveall <5000-60000> no gar

Strona 39

15-10 Figure 15-5 Typical GVRP Application Topology To enable dynamic VLAN information register and update among switches, GVRP protocol is to be co

Strona 40 - Chapter 3 Switch Management

15-11 Switch(config)#interface ethernet 1/0/11 Switch(Config-If-Ethernet1/0/11)#switchport mode trunk Switch(Config-If-Ethernet1/0/11)# gvrp Switch(C

Strona 41

15-12 transmitted in VLAN3 when traveling in the ISP internet network while carrying two VLAN tags (the inner tag is added when entering PE1, and the

Strona 42

15-13 network. Configuration Item Configuration Explanation VLAN3 Port1 of PE1 and PE2. dot1q-tunnel Port1 of PE1 and PE2. tpid 9100 Configuration

Strona 43 - 3.1.2 In-band Management

15-14 15.4 VLAN-translation Configuration 15.4.1 Introduction to VLAN-translation VLAN translation, as one can tell from the name, which translates t

Strona 44

15-15 Command Explanation Admin mode show vlan-translation Show the related configuration of vlan-translation. 15.4.3 Typical application of VLAN-t

Strona 45

15-16 15.4.4 VLAN-translation Troubleshooting Normally the VLAN-translation is applied on trunk ports. Priority of vlan translation and vlan ingress

Strona 47

15-17 1. Configure the MAC-based VLAN function on the port Command Explanation Port Mode switchport mac-vlan enable no switchport mac-vlan enable E

Strona 48

15-18 protocol-vlan mode {ethernetii etype <etype-id>|llc {dsap <dsap-id> ssap <ssap-id>}|snap etype <etype-id>} vlan <vla

Strona 49 - 3.2.1 Configuration Modes

15-19 For example, M at E1/0/1 of SwitchA, then the configuration procedures are as follows: Switch A, Switch B, Switch C: SwitchA (Config)#mac-vlan

Strona 50 - 3.2.1.2 Admin Mode

15-20 15.6 Voice VLAN Configuration 15.6.1 Introduction to Voice VLAN Voice VLAN is specially configured for the user voice data traffic. By setting

Strona 51 - 3.2.1.3 Global Mode

15-21 <voice-name>] no voice-vlan {mac <mac-address> mask <mac-mask>|name <voice-name> |all} 3. Enable the Voice VLAN of the

Strona 52 - 3.2.3 Shortcut Key Support

15-22 Switch(Config-If-Ethernet1/0/10)#exit Switch(Config)#interface ethernet 1/0/1 Switch(Config-If-Ethernet1/0/1)#switchport mode hybrid Switch(Con

Strona 53 - 3.2.5 Input Verification

16-1 Chapter 16 MAC Table Configuration 16.1 Introduction to MAC Table MAC table is a table identifies the mapping relationship between destination M

Strona 54 - 3.2.6 Fuzzy Match Support

16-2 The topology of the figure above: 4 PCs connected to switch, where PC1 and PC2 belongs to a same physical segment (same collision domain), the p

Strona 55 - 4.1 Basic Configuration

16-3 Three types of frames can be forwarded by the switch:  Broadcast frame  Multicast frame  Unicast frame The following describes how the s

Strona 56 - 4.2.1 Telnet

16-4 <interface-name>] | [source|destination|both] no mac-address-table {static | blackhole | dynamic} [address <mac-addr>] [vlan <vla

Strona 57 - 4.2.2 SSH

13 49.6.2 MLD Configuration Task List ... 49-25 49.6.3 MLD T

Strona 58

16-5 1. Set the MAC address 00-01-11-11-11-11 of PC1 as a filter address. Switch(config)#mac-address-table static 00-01-11-11-11-11 discard vlan 1

Strona 59

16-6 4. mac-notification trap configuration 1. Enable MAC address binding function for the ports Command Explanation Port Mode switchport port-se

Strona 60 - 4.4.1 Introduction to SNMP

16-7 switchport port-security violation {protect | shutdown} no switchport port-security violation Set the violation mode for the port; the “no switc

Strona 61 - 4.4.2 Introduction to MIB

17-1 Chapter 17 MSTP Configuration 17.1 Introduction to MSTP The MSTP (Multiple STP) is a new spanning-tree protocol which is based on the STP and th

Strona 62 - 4.4.4 SNMP Configuration

17-2 Figure 17-1 Example of CIST and MST Region In the above network, if the bridges are running the STP or the RSTP, one port between Bridge M and

Strona 63

17-3 17.1.2 Port Roles The MSTP bridge assigns a port role to each port which runs MSTP.  CIST port roles: Root Port, Designated Port, Alternate Po

Strona 64

17-4 2. Configure instance parameters Command Explanation Global Mode spanning-tree mst <instance-id> priority <bridge-priority> no spa

Strona 65

17-5 name <name> no name Set MSTP region name. revision-level <level> no revision-level Set MSTP region revision level. abort Quit MSTP r

Strona 66 - 4.4.6 SNMP Troubleshooting

17-6 Port Mode spanning-tree format standard spanning-tree format privacy spanning-tree format auto no spanning-tree format Configure the format of

Strona 67 - 4.5.2 BootROM Upgrade

17-7 topology changes. Port Mode spanning-tree tcflush {enable| disable| protect} no spanning-tree tcflush Configure the port flush mode. The no com

Strona 68

14 53.2 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP CONFIGURATION TASK SEQUENCE ...

Strona 69

17-8 Port 4 200000 200000 Port 5 200000 200000 Port 6 200000 200000 Port 7 200000 200000 By default, the MSTP establishes a tree topology (i

Strona 70 - 4.5.3 FTP/TFTP Upgrade

17-9 Switch3(Config-Vlan30)#exit Switch3(config)#vlan 40 Switch3(Config-Vlan40)#exit Switch3(config)#vlan 50 Switch3(Config-Vlan50)#exit Switch3(conf

Strona 71

17-10 forwarding. Because the instance 3 and the instance 4 are only valid in the MSTP region, the following figure only shows the topology of the MS

Strona 72

17-11 Figure 17-5 The Topology Of the Instance 4 after the MSTP Calculation 17.4 MSTP Troubleshooting  In order to run the MSTP on the switch po

Strona 73

18-1 Chapter 18 QoS Configuration 18.1 Introduction to QoS QoS (Quality of Service) is a set of capabilities that allow you to create differentiated

Strona 74

18-2 Drop Precedence: When processing the packets, firstly drop the packets with the bigger drop precedence, the ranging is 0-1. It’s shortening is D

Strona 75

18-3 Figure 18-3 Basic QoS Model Classification: Classify traffic according to packet classification information and generate internal DSCP value

Strona 76

18-4 StartDSCP-to-Int-Prio conversion according to DSCP value of the packetCOS -to-Int-Prio conversion according to L2 COS value of the packetYTrust

Strona 77

18-5 Policing and remark: Each packet in classified ingress traffic is assigned an internal priority value, and can be policed and remarked. Polici

Strona 78

18-6 Note 1: Int-Prio will be covered with the after setting, Set Int-Prio of the specific color action will cover Set Int-Prio of the unrelated acti

Strona 79

15 CHAPTER 59 VLAN-ACL CONFIGURATION ...59-1 59.1 INTRODUCTION TO VLAN-ACL ...

Strona 80

18-7 18.2 QoS Configuration Task List 1. Configure class map Set up a classification rule according to ACL, CoS, VLAN ID, IPv4 Precedent, DSCP, IPV6

Strona 81 - 5.4 Troubleshooting

18-8 Global Mode policy-map <policy-map-name> no policy-map <policy-map-name> Create a policy map and enter policy map mode; the no comm

Strona 82

18-9 drop no drop transmit no transmit Drop or transmit the traffic that match the class, the no command cancels the assigned action. 3. Apply QoS

Strona 83

18-10 mls qos map (cos-dp <dp1…dp8> | dscp-dscp <in-dscp list> to <out-dscp> | dscp-intp <in-dscp list> to <intp> | dsc

Strona 84

18-11 Switch(Config-If-Ethernet 1/0/1)#mls qos trust cos Switch(Config-If-Ethernet1/0/1)#mls qos cos 5 Configuration result: When QoS enabled in Glo

Strona 85

18-12 Figure 18-7 Typical QoS topology As shown in the figure, inside the block is a QoS domain, Switch1 classifies different traffics and assigns

Strona 86

18-13 18.4 QoS Troubleshooting  trust cos and EXP can be used with other trust or Policy Map.  trust dscp can be used with other trust or Policy

Strona 87 - Chapter 7 Port Configuration

19-14 Chapter 19 Flow-based Redirection 19.1 Introduction to Flow-based Redirection Flow-based redirection function enables the switch to transmit th

Strona 88

19-15 19.3 Flow-based Redirection Examples Example: User’s request of configuration is listed as follows: redirecting the frames whose source IP is 1

Strona 89

20-16 Chapter 20 Egress QoS Configuration 20.1 Introduction to Egress QoS In traditional IP networks, all packets are treated in the same way. All ne

Strona 90 - 7.4 Port Troubleshooting

16 65.1 INTRODUCTION TO VRRPV3 ... 65-1 65.1

Strona 91

20-17 20.1.2 Basic Egress QoS Model Classification schedulingRemarkPolicingGenerate internal priorityIngressEgresscolorSort packet traffic according

Strona 92

20-18 Description of action that modify QoS attribute according to egress remark table: cos-cos:for cos value of packets, modify cos value of packets

Strona 93

20-19 access-group} 2. Configure a policy-map Command Explanation Global Mode policy-map <policy-map-name> no policy-map <policy-map-name

Strona 94

20-20 class map mode, add statistic function to the flow of the policy class map. In single bucket mode, packets can only red or green when passing p

Strona 95

20-21 Admin Mode clear mls qos statistics [interface <interface-name> | vlan <vlan-id>] Clear accounting data of the specified ports or

Strona 96

20-22 switch(config)#class-map 1 switch(config-classmap-1)#match ipv6 dscp 7 switch(config-classmap-1)#exit Create a policy map: switch(config)#poli

Strona 97

20-23 switch(config-if-port-range)#mls qos trust dscp Bind policy to egress of port1 switch(config-if-ethernet1/0/1)#service-policy output p1 20.4

Strona 98

21-24 Chapter 21 Flexible QinQ Configuration 21.1 Introduction to Flexible QinQ 21.1.1 QinQ Technique Dot1q-tunnel is also called QinQ (802.1Q-in-802

Strona 99

21-25 Command Explanation Global mode class-map <class-map-name> no class-map <class-map-name> Create a class-map and enter class-map mo

Strona 100

21-26 vlan<vid> no service-policy input<policy-map-name> vlan <vid> command deletes the specified policy-map applied to the VLAN.

Strona 101

17 70.3 TYPICAL EXAMPLES OF RSPAN ... 70-4 70.4 RS

Strona 102 - 10.4 ULDP Troubleshooting

21-27 Switch(config-classmap-c1)#match vlan 1001 Switch(config-classmap-c1)#exit Switch(config)#class-map c2 Switch(config-classmap-c2)#match vlan 20

Strona 103

21-28 21.4 Flexible QinQ Troubleshooting If flexible QinQ policy can not be bound to the port, please check whether the problem is caused by the foll

Strona 104 - Configuration

22-29 Chapter 22 Layer 3 Forward Configuration Switch supports Layer 3 forwarding which forwards Layer 3 protocol packets (IP packets) across VLANs.

Strona 105

22-30 1. Create Layer 3 Interface Command Explanation Global Mode interface vlan <vlan-id> no interface vlan <vlan-id> Creates a VLAN

Strona 106

22-31 Global Mode ip vrf <vrf-name> no ip vrf <vrf-name> Create VRF instance; VRF instance is not created by default. VRF Mode rd &

Strona 107

22-32 every connection status which increases network delay greatly and decreases network performance. Moreover, the translation of network data pack

Strona 108

22-33 22.2.2 IP Configuration Layer 3 interface can be configured as IPv4 interface, IPv6 interface. 22.2.2.1 IPv4 Address Configuration IPv4 addre

Strona 109

22-34 via DHCPv6 (15) Set the flag representing whether the address information will be obtained via DHCPv6 3. IPv6 Tunnel configuration (1) Create/

Strona 110

22-35 makes duplicate address detection. The no command resumes default value (1). (2) Configure Send Neighbor solicitation Message Interval Com

Strona 111

22-36 Interface Configuration Mode ipv6 nd prefix <ipv6-address/prefix-length> <valid-lifetime> <preferred-lifetime> [off-link] [n

Strona 112

2 Trademarks Copyright © PLANET Technology Corp. 2012. Contents subject to which revision without prior notice. PLANET is a registered trademark of PL

Strona 114

22-37 Interface Configuration Mode ipv6 nd retrans-timer <seconds> Set the retrans-timer of sending router advertisement. (14) Set the flag r

Strona 115

22-38 Tunnel Configuration Mode tunnel destination {<ipv4-address> | <ipv6-address>} no tunnel destination Configure tunnel destinatio

Strona 116 - 13.1 Introduction to Jumbo

22-39 address 192.168.2.1 255.255.255.0 in VLAN2. 3. Configure two VLANs on Switch2, respectively VLAN2 and VLAN3. 4. Configure IPv4 address 192.168

Strona 117 - 14.1 Introduction to EFM OAM

22-40 Configuration Description: 1. Configure two VLANs on Switch1, namely, VLAN1 and VLAN2. 2. Configure IPv6 address 2001::1/64 in VLAN1 of Switch1

Strona 118

22-41 no login ! end Switch2#show run interface Vlan2 ipv6 address 2002::2/64 ! interface Vlan3 ipv6 address 2003::1/64 ! interface Loopback m

Strona 119 - 14.2 EFM OAM Configuration

22-42 3. Configure two VLANs on SwitchB, namely, VLAN3 and VLAN4, VLAN4 is IPv6 domain, and VLAN3 connects to IPv4 domain. 4. Configure IPv6 addres

Strona 120

22-43 22.3 IP Forwarding 22.3.1 Introduction to IP Forwarding Gateway devices can forward IP packets from one subnet to another; such forwarding uses

Strona 121 - 14.3 EFM OAM Example

22-44 Figure 22-4 URPF application situation In the above figure, Router A sends requests to the server Router B by faking messages whose source a

Strona 122 - 14.4 EFM OAM Troubleshooting

22-45 In the network, topology shown in the graph above, IP URPF function is enabled on SW3. When there is someone in the network pretend

Strona 123

22-46 3. Clear dynamic ARP 4. Clear the statistic information of ARP messages 1. Configure static ARP Command Explanation VLAN Interface Mode ar

Strona 124 - 15.1.1 Introduction to VLAN

19 81.3.1 Create BGP MPLS VPN between PE-CE via EBGP ... 81-41 81.3.2 Create BGP MPLS VPN between

Strona 125

22-47 22.5.3 ARP Troubleshooting If ping from the switch to directly connected network devices fails, the following can be used to check the possible

Strona 126

23-48 Chapter 23 ARP Scanning Prevention Function Configuration 23.1 Introduction to ARP Scanning Prevention Function ARP scanning is a common method

Strona 127

23-49 anti-arpscan enable no anti-arpscan enable Enable or disable the ARP Scanning Prevention function globally. 2. Configure the threshold of the

Strona 128

23-50 anti-arpscan log enable no anti-arpscan log enable Enable or disable the log function of ARP scanning prevention. anti-arpscan trap enable

Strona 129

23-51 SWITCHB configuration task sequence: Switch B(config)# anti-arpscan enable SwitchB(config)#interface ethernet1/0/1 SwitchB (Config-If-Ethernet

Strona 130

24-52 Chapter 24 Prevent ARP, ND Spoofing Configuration 24.1 Overview 24.1.1 ARP (Address Resolution Protocol) Generally speaking, ARP (RFC-826) prot

Strona 131 - 15.2.1 Introduction to GVRP

24-53 What the essential method on preventing attack and spoofing switches based on ARP in networks is to disable switch automatic update function; t

Strona 132 - 15.2.3 Example of GVRP

24-54 24.3 Prevent ARP, ND Spoofing Example Equipment Explanation Equipment Configuration Quality switch IP:192.168.2.4; IP:192.168.1.4; mac:

Strona 133

24-55 If the environment changing, it enable to forbid ARP refresh, once it learns ARP property, it wont be refreshed by new ARP reply packet, and pr

Strona 134 - 15.2.4 GVRP Troubleshooting

25-56 Chapter 25 ARP GUARD Configuration 25.1 Introduction to ARP GUARD There is serious security vulnerability in the design of ARP protocol, which

Strona 135

1-1 Chapter 1 INTRODUTION The PLANET XGS3-24042 / XGS3-24242 is 24-Port Gigabit with 4 Optional 10G slots Layer 3 Managed Stackable Switch. It boast

Strona 136

25-57 Command Explanation Port configuration mode arp-guard ip <addr> no arp-guard ip <addr> Configure/delete ARP GUARD address

Strona 137

26-58 Chapter 26 ARP Local Proxy Configuration 26.1 Introduction to ARP Local Proxy function In a real application environment, the switches in the a

Strona 138

26-59 26.2 ARP Local Proxy Function Configuration Task List 1.Enable/disable ARP local proxy function Command Explanation Interface vlan mode ip lo

Strona 139

26-60 26.4 ARP Local Proxy Function Troubleshooting ARP local proxy function is disabled by default. Users can view the current configuration with d

Strona 140

27-61 Chapter 27 Gratuitous ARP Configuration 27.1 Introduction to Gratuitous ARP Gratuitous ARP is a kind of ARP request that is sent by the host wi

Strona 141

27-62 27.3 Gratuitous ARP Configuration Example Figure 27-1 Gratuitous ARP Configuration Example For the network topology shown in the figure above

Strona 142

28-63 Chapter 28 Keepalive Gateway Configuration 28.1 Introduction to Keepalive Gateway Ethernet port is used to process backup or load balance, for

Strona 143

28-64 show keepalive gateway [interface-name] Show keepalive running status of the specified interface, if there is no interface is specified, show k

Strona 144

28-65 Send ARP detection once 3 seconds to detect whether gateway A is reachable, after 3 times detection is failing, gateway A is considered to be u

Strona 145

29-66 Chapter 29 DHCP Configuration 29.1 Introduction to DHCP DHCP [RFC2131] is the acronym for Dynamic Host Configuration Protocol. It is a protocol

Strona 146 - 16.1.1 Obtaining MAC Table

1-2 Support 10Gb Ethernet 10Gb Ethernet which adopts full-duplex technology instead of low-speed, half-duplex CSMA/CD protocol, is a big leap in the

Strona 147 - 16.1.2 Forward or Filter

29-67 allocation and manual IP address binding are: 1) IP address obtained dynamically can be different every time; manually bound IP address will be

Strona 148

29-68 dns-server [<address1>[<address2>[…<address8>]]] no dns-server Configure DNS server for DHCP clients. The no command deletes

Strona 149

29-69 host <address> [<mask> | <prefix-length> ] no host Specify/delete the IP address to be assigned to the specified client when

Strona 150 - 16.5.1 MAC Address Binding

29-70 4. On receiving DHCPREQUEST, the DHCP server responds with a DHCPACK packet via DHCP relay to the DHCP client. DHCP Relay Configuration Task

Strona 151

29-71 Switch(config)#service dhcp Switch(config)#interface vlan 1 Switch(Config-Vlan-1)#ip address 10.16.1.2 255.255.0.0 Switch(Config-Vlan-1)#exit

Strona 152

29-72 Figure 29-3 DHCP Relay Configuration As shown in the above figure, route switch is configured as a DHCP relay. The DHCP server address is 10.

Strona 153 - 17.1.1 MSTP Region

29-73 servers are not in the same physical network, verify the router responsible for DHCP packet forwarding has DHCP relay function. If DHCP relay i

Strona 154

30-1 Chapter 30 DHCPv6 Configuration 30.1 Introduction to DHCPv6 DHCPv6 [RFC3315] is the IPv6 version for Dynamic Host Configuration Protocol (DHCP).

Strona 155 - 17.1.3 MSTP Load Balance

30-2 4. The selected DHCPv6 server then confirms the client about the IPv6 address and any other configuration with the REPLY message. The above f

Strona 156

30-3 (2)To configure parameter of DHCPv6 address pool Command Explanation DHCPv6 address pool Configuration Mode network-address <ipv6-pool-star

Strona 157

1-3 1.3 Product Features  Physical Port XGS3-24042  24-Port 10/100/1000Base-T RJ-45 copper  4 100/1000Base-X mini-GBIC/SFP slots, shared wi

Strona 158

30-4 Command Explanation Interface Configuration Mode ipv6 dhcp relay destination {[<ipv6-address>] [interface { <interface-name> | vlan

Strona 159 - 17.3 MSTP Example

30-5 ipv6 dhcp pool <poolname> no ipv6 dhcp pool <poolname> To configure DHCPv6 address pool. (2)To configure prefix delegation pool use

Strona 160

30-6 30.5 DHCPv6 Prefix Delegation Client Configuration DHCPv6 prefix delegation client configuration task list as below: 1. To enable/disable DHCPv

Strona 161

30-7 Usage guide: Switch3 configuration: Switch3>enable Switch3#config Switch3(config)#service dhcpv6 Switch3(config)#ipv6 dhcp pool EastDormPo

Strona 162

30-8 Switch2(config)#interface vlan 1 Switch2(Config-if-Vlan1)#ipv6 address 2001:da8:1:1::2/64 Switch2(Config-if-Vlan1)#exit Switch2(config)#interfac

Strona 163 - 17.4 MSTP Troubleshooting

30-9 Usage guide: Switch2 configuration Switch2>enable Switch2#config Switch2(config)#interface vlan 2 Switch2(Config-if-Vlan2)#ipv6 address 2001

Strona 164 - Chapter 18 QoS Configuration

30-10 Switch1(Config-if-Vlan3)#ipv6 dhcp server foo Switch1(Config-if-Vlan3)#ipv6 nd other-config-flag Switch1(Config-if-Vlan3)#no ipv6 nd suppre

Strona 165 - 18.1.3 Basic QoS Model

31-1 Chapter 31 DHCP option 82 Configuration 31.1 Introduction to DHCP option 82 DHCP option 82 is the Relay Agent Information Option, its option cod

Strona 166

31-2 31.1.2 option 82 Working Mechanism DHCP option 82 flow chart If the DHCP Relay Agent supports option 82, the DHCP client should go through the

Strona 167 - Enter the policing flow

31-3 1. Enabling the DHCP option 82 of the Relay Agent. Command Explanation Global mode ip dhcp relay information option no ip dhcp relay informat

Strona 168 - Drop the

1-4 − IEEE 802.1Q Tagged VLAN − Up to 4K VLANs groups, out of 4096 VLAN IDs − Provider Bridging (VLAN Q-in-Q) support (IEEE 802.1ad) − GVRP pro

Strona 169

31-4 ip dhcp relay information option remote-id {standard | <remote-id>} no ip dhcp relay information option remote-id Set the suboption2 (remo

Strona 170

31-5 ip dhcp relay information option self-defined remote-id format [ascii | hex] Set self-defined format of remote-id for relay option82. ip dhcp re

Strona 171

31-6 In the above example, layer 2 switches Switch1 and Switch2 are both connected to layer 3 switch Switch3, Switch 3 will transmit the request mess

Strona 172

31-7 max-lease-time 86400; #24 Hours allow members of "Switch3Vlan2Class2"; } } Now, the DHCP server will allocate addresses for the netwo

Strona 173 - 18.3 QoS Example

32-8 Chapter 32 DHCPv6 option37, 38 32.1 Introduction to DHCPv6 option37, 38 DHCPv6 (Dynamic Host Configuration Protocol for IPv6) is designed for IP

Strona 174

32-9 ipv6 dhcp snooping remote-id option no ipv6 dhcp snooping remote-id option This command enables DHCPv6 SNOOPING to support option 37 option, no

Strona 175

32-10 ipv6 dhcp snooping subscriber-id select (sp | sv | pv | spv) delimiter WORD (delimiter WORD |) no ipv6 dhcp snooping subscriber-id select delim

Strona 176 - 18.4 QoS Troubleshooting

32-11 ipv6 dhcp relay remote-id delimiter WORD no ipv6 dhcp relay remote-id delimiter Configures user configuration options to generate remote-id. Th

Strona 177

32-12 ipv6 dhcp use class no ipv6 dhcp use class This command enables DHCPv6 server to support the using of DHCPv6 class during address assignment,

Strona 178

32-13 32.3 DHCPv6 option37, 38 Examples 32.3.1 DHCPv6 Snooping option37, 38 Example Figure 32-1 DHCPv6 Snooping option schematic As is shown in the

Strona 179 - 20.1.1 Egress QOS Terms

1-5  WEB-based, Telnet, Console Command Line management  SSH( Secure Shell), SSL  Accesses through SNMPv1, v2c and v3 security set and get requ

Strona 180 - Policing and

32-14 SwitchB(config)#service dhcpv6 SwitchB(config)#ipv6 dhcp server remote-id option SwitchB(config)#ipv6 dhcp server subscriber-id option Switch

Strona 181

32-15 Network topology: In access layer, layer2 access device Switch1 connects users in dormitory; in first-level aggregation layer, aggregation devi

Strona 182

32-16 execute adding, discarding or forwarding operation. Therefore, please check policy configuration of snooping option37,38 on second device when

Strona 183 - Set Egress cos mapping, no

33-1 Chapter 33 DHCP Snooping Configuration 33.1 Introduction to DHCP Snooping DHCP Snooping means that the switch monitors the IP-getting process of

Strona 184 - 20.3 Egress QoS Examples

33-2 33.2 DHCP Snooping Configuration Task Sequence 1. Enable DHCP Snooping 2. Enable DHCP Snooping binding function 3. Enable DHCP Snooping bindi

Strona 185

33-3 Globe mode ip dhcp snooping information enable no ip dhcp snooping information enable Enable/disable DHCP Snooping option 82 function. 5. Set

Strona 186 - 20.4 Egress QoS Examples

33-4 Command Explanation Port mode ip dhcp snooping binding user-control no ip dhcp snooping binding user-control Enable or disable the DHCP snoopi

Strona 187 - 21.1.3 Flexible QinQ

33-5 Command Explanation Globe mode ip dhcp snooping information option subscriber-id format {hex | acsii | vs-hp} This command is used to set subsc

Strona 188

33-6 option subscriber-id {standard | <circuit-id>} no ip dhcp snooping information option subscriber-id option 82 added by DHCP request packet

Strona 189 - 21.3 Flexible QinQ Example

33-7 33.4 DHCP Snooping Troubleshooting Help 33.4.1 Monitor and Debug Information The “debug ip dhcp snooping” command can be used to monitor the deb

Strona 190

1-6 Back pressure for Half-Duplex Jumbo Frame 9Kbytes LED System: Power, SYS diagnostic, Redundant Power, Alert Malfunction Ports: 10/100/1000 Link/A

Strona 191

33-1 33.5 DHCPv6 Snooping Typical Application Figure 4-1 Sketch Map of preventing lawless DHCPv6 Server As showed in the above chart, MAC-AA and M

Strona 192 - 22.1 Layer 3 Interface

33-2 The “debug ipv6 dhcp snooping” command can be used to monitor the debug information. 33.6.2 DHCPv6 Snooping Troubleshooting Help If there is any

Strona 193

34-1 Chapter 34 Routing Protocol Overview To communicate with a remote host over the Internet, a host must choose a proper route via a set of routers

Strona 194 - 22.2 IP Configuration

34-2  Destination address: used to identify the destination address or destination network of an IP packet.  Network mask: used together with d

Strona 195

34-3 To achieve routing policy, first we have to define the characteristics of the routing messages to be applied with routing policies, namely defin

Strona 196 - 22.2.2 IP Configuration

34-4 autonomic system path field. As for relevant as-path configurations, please refer to the ip as-path command in BGP configuration. 5. community-l

Strona 197

34-5 match community <community-list-name | community-list-num > [exact-match] no match community [<community-list-name | community-list-num

Strona 198

34-6 set aggregator as <as-number> <ip_addr> no set aggregator as [ <as-number> <ip_addr> ] Distribute an AS No. for BGP aggr

Strona 199

34-7 set tag <tag_val> no set tag [ <tag_val> ] Set OSPF routing tag value; The no command deletes the configuration set vpnv4 next-hop &

Strona 200

34-8 Figure 34-1 Policy routing Configuration Configuration procedure: (only SwitchA is listed, configurations for other switches are omitted.) Th

Strona 201

1-7 MSTP, IEEE 802.1s (Multiple Spanning Tree Protocol, spanning tree by VLAN) Root Guard BPDU Guard Link Aggregation Static Trunk IEEE 802.3ad LAC

Strona 202

35-1 Chapter 35 Static Route 35.1 Introduction to Static Route As mentioned earlier, the static route is the manually specified path to a network or

Strona 203

35-2 2. VRF configuration Command Explanation Global mode ip route vrf <name> {<ip-prefix> <mask>|<ip-prefix/<prefix-length

Strona 204 - -3 IPv6 tunnel

35-3 Switch(config)#ip route 10.1.1.0 255.255.255.0 10.1.2.1 Next hop use the partner IP address Switch(config)#ip route 10.1.4.0 255.255.255.0 10.1.

Strona 205

36-1 Chapter 36 RIP 36.1 Introduction to RIP RIP is first introduced in ARPANET, this is a protocol dedicated to small, simple networks. RIP is a dis

Strona 206 - 22.4.1 Introduction to URPF

36-2 (simple plaintext password and MD5 password authentication are supported), and support variable length subnet mask. RIP-II used some of the zero

Strona 207 - 22.4.3 URPF Typical Example

36-3 4) Configure and apply route filter 5) Configure Split Horizon (3) Configure other RIP protocol parameters 1) Configure the managing distance of

Strona 208 - 22.5.1 Introduction to ARP

36-4 Command Explanation Router Configuration Mode neighbor <A.B.C.D> no neighbor <A.B.C.D> Specify the IP address of the neighbor route

Strona 209

36-5 ip rip authentication key-chain <name-of-chain> no ip rip authentication key-chain [<name-of-chain>] Sets the key chain used in auth

Strona 210 - 22.5.3 ARP Troubleshooting

36-6 distribute-list {< access-list-number |access-list-name >|prefix<prefix-list-name>}{in|out} [<ifname>] no distribute-list {<

Strona 211 - Function Configuration

36-7 version { 1 | 2 } no version Configure the versions of all the RIP data packets transmitted/received by the Layer 3 switch port sending/receivin

Strona 212

1-8 LLDP MAU-MIB Management Function System Configuration Console, Telnet, SSH, Web Browser, SSL, SNMPv1, v2c and v3 Management Support the unite f

Strona 213

36-8 Command Explanation Interface Configuration Mode ip rip aggregate-address A.B.C.D/M no ip rip aggregate-address A.B.C.D/M To configure or d

Strona 214

36-9 exit-address-family This command exits the address family mode. 36.3 RIP Examples 36.3.1 Typical RIP Examples Figure 36-1 RIP example In the

Strona 215

36-10 Configure that the interface vlan 2 do not transmit RIP messages to SwitchC SwitchA(config)#router rip SwitchA(config-router)#passive-interface

Strona 216

36-11 Figure 36-2 Typical application of RIP aggregation As the above network topology, S2 is connected to S1 through interface vlan1, there are o

Strona 217

36-12 sending route updating messages to all neighboring Layer 3 switches every 30 seconds. A Layer 3 switch is considered inaccessible if no route u

Strona 218

37-1 Chapter 37 RIPng 37.1 Introduction to RIPng RIPng is first introduced in ARPANET, this is a protocol dedicated to small, simple networks. RIPng

Strona 219

37-2 destination, and route table is built based on this database. When a RIPng layer3 switch sent route update packets to its neighbor devices, the

Strona 220

37-3 3. Configure other RIPng parameters (1) Configure timer for RIPng update, timeout and hold-down 4. Delete the specified route in RIPng route

Strona 221 - 192.168.1.200

37-4 1)Configure route introduction (default route metric, configure routes of the other protocols to be introduced in RIP) Command Explanation Rout

Strona 222

37-5 4)Configure split horizon Command Explanation Interface configuration mode IPv6 rip split-horizon [poisoned] Configure that take the split-hor

Strona 223

1 Content CHAPTER 1 INTRODUTION ... 1-1 1.1 PACKET CONTENTS .

Strona 224

2-1 Chapter 2 INSTALLATION This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount. For eas

Strona 225

37-6 ipv6 rip aggregate-address X:X::X:X/M no ipv6 rip aggregate-address X:X::X:X/M To configure or delete IPv6 aggregation route on interface. (3

Strona 226

37-7 37.3 RIPng Configuration Examples 37.3.1 Typical RIPng Examples Figure 37-1 RIPng Example As shown in the above figure, a network consists of

Strona 227

37-8 SwitchA(config-router)#passive-interface Vlan1 SwitchA(config-router)#exit Layer 3 SwitchB Enable RIPng protocol SwitchB (config)#router IPv6 r

Strona 228

37-9 Figure 37-2 Typical application of RIPng aggregation As the above network topology, S2 is connected to S1 through interface vlan1, there are o

Strona 229 - 29.1 Introduction to DHCP

37-10 route updating messages every 30 seconds. A Layer 3 switch is considered inaccessible if no route updating messages from the switch are receive

Strona 230

38-1 Chapter 38 OSPF 38.1 Introduction to OSPF OSPF is abbreviation for Open Shortest Path First. It is an interior dynamic routing protocol for auto

Strona 231

38-2 One major advantage of link-state routing protocols is the fact that infinite counting is impossible, this is because of the way link-state rout

Strona 232

38-3 In conclusion, LSA can only be transferred between neighboring Layer3 switches, OSPF protocol includes 5 types of LSA: router LSA, network LSA,

Strona 233

38-4 38.2 OSPF Configuration Task List The OSPF configuration for XGS3 series switches may be different from the configuration procedure to switches

Strona 234

38-5 [no] router ospf [process <id>] Enables OSPF protocol; the “no router ospf” command disables OSPF protocol. (required) OSPF Protocol Confi

Strona 235 - 29.5 DHCP Troubleshooting

2-2 2.1.2 LED Indications The front panel LEDs indicates instant status of port links, data activity, system operation, Stack status and system pow

Strona 236

38-6 Command Explanation Interface Configuration Mode ip ospf hello-interval <time> no ip ospf hello-interval Sets interval for sending HELLO

Strona 237 - 30.1 Introduction to DHCPv6

38-7 Admin Mode or Configure Mode show ip ospf [<process-id>] redistribute Display the configuration information of the OSPF process import

Strona 238

38-8 4)Configure the priority of the interface when electing designated layer3 switch (DR). Command Explanation Interface Configuration Mode ip os

Strona 239

38-9 Figure 38-1 Network topology of OSPF autonomous system The configuration for layer3 Switch1 and Switch5 is shown below: Layer 3 Switch1 Co

Strona 240

38-10 Switch2(config-if-vlan1)# ip address 10.1.1.2 255.255.255.0 Switch2(config-if-vlan1)#no shutdown Switch2(config-if-vlan1)#exit Switch2(config)#

Strona 241

38-11 Switch4(config)#exit Switch4# Layer 3 Switch5: Configuration of the IP address for interface vlan2 Switch5#config Switch5(config)# interface

Strona 242

38-12 Figure 38-2 Typical complex OSPF autonomous system This scenario is a typical complex OSPF autonomous system network topology. Area1 include

Strona 243

38-13 SwitchB interface VLAN2 is 10.1.1.2, IP address of layer3 SwitchC interface VLAN2 is 10.1.1.3, IP address of layer3 SwitchD interface VLAN2 is

Strona 244

38-14 SwitchB(config)# interface vlan 2 SwitchB(config-If-Vlan2)# ip address 10.1.1.2 255.255.255.0 SwitchB(config-If-Vlan2)#exit Enable OSPF protoc

Strona 245

38-15 SwitchC(config-If-Vlan2)#exit Configure IP address and area number for interface vlan3 SwitchC(config)# interface vlan 3 SwitchC(config-If-Vla

Strona 246 - 30.7 DHCPv6 Troubleshooting

2-3 10/100/1000Base-T and SFP interfaces LED Color Function LNK/ACT Red Lights to indicate the link through that port is successfully establ

Strona 247

38-16 SwitchD(config-If-Vlan2)#ip ospf authentication-key DCS SwitchD(config-If-Vlan2)#exit Configure the IP address and the area number for the int

Strona 248

38-17 Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 1.1.1.1 255.255.255.0 Switch(Config-if-Vlan1)#exit Switch(config)#interface

Strona 249

38-18 Associate the vlan 1 and vlan 2 respectively with vpnb and vpnc while configuring IP address SwitchA(config)#in vlan1 SwitchA(config-if-Vlan1)#

Strona 250

38-19 SwitchC(config-router)#exit 38.4 OSPF Troubleshooting The OSPF protocol may not be working properly due to errors such as physic connection, c

Strona 251

39-1 Chapter 39 OSPFv3 39.1 Introduction to OSPFv3 OSPFv3(Open Shortest Path First) is the third version for Open Shortest Path First, and it is the

Strona 252

39-2 be flooded throughout the network very soon. Those advantages release some layer3 switch resources, as the process ability and bandwidth used by

Strona 253

39-3 In one word, LSA can only be transferred between neighboring Layer3 switches, and OSPFv3 protocol includes seven kinds of LSA: link LSA, inter

Strona 254

39-4 39.2 OSPFv3 Configuration Task List OSPFv3 Configuration Task List: 1. Enable OSPFv3 (required) (1) Enable/disable OSPFv3(required) (2) Confi

Strona 255

39-5 router-id <router_id> no router-id Configure router for OSPFv3 process. The no router-id command returns ID to 0.0.0.0 .(required) [no] p

Strona 256

39-6 IPv6 ospf transit-delay <time> [instance-id <id>] no IPv6 ospf transit-delay [instance-id <id>] Sets the delay time before sen

Strona 257

2-4 10/100/1000Base-T and SFP interfaces LED Color Function LNK/ACT Green Lights: To indicate the link through that port is successfully estab

Strona 258

39-7 Command Explanation Admin Mode debug ipv6 ospf redistribute message send no debug ipv6 ospf redistribute message send debug ipv6 ospf redistrib

Strona 259

39-8 no router IPv6 ospf ospf [<tag>] Disable OSPFv3 Routing Protocol. 39.3 OSPFv3 Examples Examples 1: OSPF autonomous system. This scenario t

Strona 260

39-9 SwitchA(config-if-vlan2)# IPv6 router ospf area 0 SwitchA (config-if-vlan2)#exit SwitchA(config)#exit SwitchA# Layer 3 SwitchB: Enable OSPFv3 p

Strona 261

39-10 Configure interface vlan3 IPv6 address and affiliated OSPFv3 area SwitchD#config SwitchD(config)# interface vlan 3 SwitchD(config-if-vlan3)# I

Strona 262

39-11 switch is a part of this Layer 3 switch interface belongs to area 0, and another part of interface belongs to not area 0; for multi-access net

Strona 263

40-1 Chapter 40 BGP 40.1 Introduction to BGP BGP stands for a Border Gateway Protocol.It’s a dynamic routing protocol inter-autonomous system. Its ba

Strona 264

40-2 connection to exchange routing information. The operation of BGP protocol is driven by messages and the messages can be divided into four kinds:

Strona 265

40-3 switches are in the same AS, they can be neighbors each other. Because BGP can’t detect route, the route tables of other inner route protocols (

Strona 266

40-4 40.2 BGP Configuration Task List The BGP configuration tasks include basic and advanced tasks. Basic BGP configuration tasks include the followi

Strona 267

40-5 no router bgp <as-id> <as-id>”command disenable BGP process. Router configuration mode bgp asnotation asdot no bgp asnotation asdot

Strona 268

2-5 2.1.3 Switch Rear Panel The rear panel of the Managed Switch indicates an AC inlet power socket, which accept input power from 100 to 240V AC, 50

Strona 269

40-6 BGP configuration mode neighbor { <ip-address> | <TAG> } soft-reconfiguration inbound no neighbor { <ip-address> | <TAG>

Strona 270

40-7 Command Explanation Route mapped configuration command set ip next-hop <ip-address> no set ip next-hop Set the Next-Hop attribute of out

Strona 271

40-8 BGP configuration mode neighbor { <ip-address> | <TAG> } route-map <map-name > {in | out} no neighbor { <ip-address> |

Strona 272 - 34.1 Routing Table

40-9 [<as-id>..]command deletes the AS from the AS confederation. 5.Configure a Route Reflector (1) The following commands can be used to con

Strona 273 - 34.2 IP Routing Policy

40-10 (2) Add neighbors to peers groups Command Explanation BGP configuration mode neighbor <ip-address> peer-group <TAG> no neighbor

Strona 274

40-11 advertisement-interval <TAG>} advertisement-interval command recovers the default value. neighbor {<ip-address> | <TAG>} e

Strona 275

40-12 route reflector. neighbor { <ip-address> | <TAG> } soft-reconfiguration inbound no neighbor { <ip-address> | <TAG> } so

Strona 276

40-13 10. Configure the Local Preference Value Command Explanation BGP configuration mode bgp default local-preference <value> no bgp defaul

Strona 277

40-14 14. Configure Route Dampening Command Explanation BGP configuration mode bgp dampening [<1-45>] [<1-20000> <1-20000> <1

Strona 278

40-15 route-server-client no neighbor {<ip-address>|<TAG>} route-server-client under EBGP environment to reduce the number of peers that

Strona 279 - 34.2.4 Troubleshooting

2-6 2.2 Install the Switch This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the foll

Strona 280 - Chapter 35 Static Route

40-16 no debug bgp redistribute message send debug bgp redistribute route receive no debug bgp redistribute route receive sent by BGP for redistribut

Strona 281

40-17 The configurations of SwitchC are as following: SwitchC(config)#router bgp 200 SwitchC(config-router-bgp)#network 12.0.0.0 SwitchC(config-route

Strona 282

40-18 40.3.3 Examples 3: configure BGP community attributes In the following sample, “route map set-community” is used for the outgoing update to nei

Strona 283 - Chapter 36 RIP

40-19 Switch(config)#ip community-list com2 permit 90 Switch(config)#exit Switch#clear ip bgp 16.1.1.6 soft out 40.3.4 Examples 4: configure BGP con

Strona 284

40-20 SwitchB(config)#router bgp 10 SwitchB(config-router-bgp)#bgp confederation identifier 200 SwitchB(config-router-bgp)#bgp confederation peers 20

Strona 285

40-21 Figure 40-3 the Topological Map of Route Reflector The configurations are as following: The configurations of SwitchC: SwitchC(config)#router

Strona 286

40-22 SwitchD(config-router-bgp)#neighbor 6.6.6.6 remote-as 100 SwitchD(config-router-bgp)#neighbor 6.6.6.6 route-reflector-client SwitchD(config-rou

Strona 287 - -list <access-list-number

40-23 SwitchA(config)#router bgp 100 SwitchA(config-router-bgp)#neighbor 2.2.2.1 remote-as 300 SwitchA(config-router-bgp)#neighbor 3.3.3.2 remote-as

Strona 288

40-24 40.3.7 Examples 7: example of BGP VPN For the configuration of MPLS VPN, BGP is part of the core routing system and it is also an important uti

Strona 289

40-25 CE-A1(config)#interface vlan 2 CE-A1(config-if-Vlan2)#ip address 192.168.101.2 255.255.255.0 CE-A1(config-if-Vlan2)#exit CE-A1(config)#in

Strona 290

2-7 Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. For more information, please see the Cabling Specifi

Strona 291 - 36.3.1 Typical RIP Examples

40-26 CE-B2(config-router)#neighbor 192.168.202.1 remote-as 100 CE-B2(config-router)#exit Configurations on PE1: PE1#config PE1(config)#ip vrf

Strona 292

40-27 PE2(config)#ip vrf VRF-A PE2(config-vrf)#rd 100:10 PE2(config-vrf)#route-target both 100:10 PE2(config-vrf)#exit PE2(config)#ip vrf VRF

Strona 293 - 36.4 RIP Troubleshooting

40-28 40.4 BGP Troubleshooting In the process of configuring and implementing BGP protocol, physical connection, configuration false probably leads t

Strona 294

41-1 Chapter 41 MBGP4+ 41.1 Introduction to MBGP4+ MBGP4+ is multi-protocol BGP (Multi-protocol Border Gateway Protocol) extension to IPv6, referring

Strona 295 - Chapter 37 RIPng

41-2 3. Configure redistribution of OSPFv3 routing to MBGP4+ (1) Enable redistribution of OSPFv3 routing to MBGP4+ Command Explanation Router IPv6

Strona 296

41-3 Accordingly SwitchA configuration as follows: SwitchA(config)#router bgp 100 SwitchA(config-router)#bgp router-id 1.1.1.1 SwitchA(config-router)

Strona 297

41-4 SwitchD(config-router-af)#exit-address-family SwitchD(config-router)#exit Here the connection between SwitchB and SwitchA is EBGP, and the conn

Strona 298

42-1 Chapter 42 Black Hole Routing Manual 42.1 Introduction to Black Hole Routing Black Hole Routing is a special kind of static routing which drops

Strona 299

42-2 42.4 Black Hole Routing Configuration Exmaples Example 1: IPv4 Black Hole Routing function. Figure 42-1 IPv4 Black Hole Routing Configuratio

Strona 300

42-3 Example 2: IPv6 Black Hole Routing function. Figure 41-2 IPv6 Black Hole Routing Configuration Example As it is shown in the figure, in Switch

Strona 301

2-8 Figure 2-2-3 Mounting XGS3-24042 in a Rack Step6: Proceeds with the steps 4 and steps 5 of session 2.2.1 Desktop Installation to connect the ne

Strona 302

42-4 For problems that cannot be fixed through above methods, please issue the command show ip route distance and show ip route fib, and show l3. And

Strona 303 - 37.4 RIPng Troubleshooting

43-5 Chapter 43 GRE Tunnel Configuration 43.1 Introduction to GRE Tunnel GRE (General Routing-protocol Encapsulation) was referred to IETF by Cisco a

Strona 304

43-6 Command Explanation Tunnel interface configuration mode tunnel mode gre ip no tunnel mode Configure the tunnel mode as GREv4 tunnel. After the

Strona 305 - Chapter 38 OSPF

43-7 ip route <ipv4-address/mask> tunnel <ID> no ip route <ipv4-address/mask> tunnel <ID> Configure the egress interface of t

Strona 306

43-8 Configuration steps Instruction: the topology environment of this chapter may be different to the actual environment. To ensure the effect of th

Strona 307

43-9 SwitchA(config)#interface vlan 10 SwitchA(config-if-vlan10)# ip address 10.1.1.2 255.255.255.0 SwitchA(config-if-vlan10)#exit  Configure OS

Strona 308

43-10 Tunnel1 gre ipv6 2005:1000:3000::1 2000:1000:3000::1 The configuration of GRE tunnel is successful.  Configure the IPv4 a

Strona 309

43-11  Create the interface VLAN 12 and its address SwitchA(config)#vlan 12 SwitchA(config-vlan12)#switchport interface ethernet 1/0/12 SwitchA(c

Strona 310

43-12 Figure 43-2 GRE tunnel quotes loopback group topology Introduction to loopback group topology IPv6 network between SwitchA and SwitchB, PC1 a

Strona 311

43-13 (1) The configuration of device A 1. The configuration step  Enable IPv6 function. SwitchA(config)#ipv6 enable  Create the interface VLAN

Strona 312 - 38.3 OSPF Examples

2-9  Approved PLANET SFP Transceivers PLANET Managed Switch supports both Single mode and Multi-mode SFP transceiver. The following list of approve

Strona 313

43-14 SwitchA (config-if-tunnel1)# loopback-group 1  Configure OSPF routing protocol. SwitchA(config)#router ospf SwitchA(config-router)#router-id

Strona 314

43-15  Configure the IPv4 address of the tunnel interface. To run OSPF routing protocol, the interface address must be configured. SwitchA (config-

Strona 315

43-16 SwitchA(config-vlan12)#exit SwitchA(config)#interface vlan 12 SwitchA(config-if-vlan12)#ipv6 address 2005:3000:1000::2/64 SwitchA(config-if-vla

Strona 316

44-1 Chapter 44 ECMP Configuration 44.1 Introduction to ECMP ECMP (Equal-cost Multi-path Routing) works in the network environment where there are ma

Strona 317

44-2 Command Explanation Global mode load-balance {dst-src-mac | dst-src-ip | dst-src-mac-ip } Set load-balance for switch, it takes effect for

Strona 318

44-3 S 5.5.5.5/32 [1/0] via 100.1.1.2, Vlan100 tag:0 [1/0] via 100.1.2.2, Vlan200 tag:0 C 100.1.1.0/24 is directly

Strona 319

44-4 R3(config-router)# network 100.1.2.0/24 area 0 R3(config-router)# network 100.2.2.0/24 area 0 R4 configuration: R4(config)#interface Vlan100 R4

Strona 320

45-5 Chapter 45 BFD 45.1 Introduction to BFD BFD (Bidirectional Forwarding Detection) provides a detection mechanism to quickly detect and monitor th

Strona 321

45-6 bfd interval <value1> min_rx <value2> multiplier <value3> no bfd interval Configure the minimum transmission interval and the

Strona 322

45-7 ipv6 route {vrf <name> <ipv6-address> | <ipv6-address>} prefix <nexthop> bfd no ipv6 route {vrf <name> <ipv6-ad

Strona 323 - 38.4 OSPF Troubleshooting

2-10 management interface of the switch/converter (if available) to disable the port in advance. 2. Remove the Fiber Optic Cable gently. 3. Turn th

Strona 324 - Chapter 39 OSPFv3

45-8 Switch(config)#interface vlan 14 Switch(config-if-vlan15)#ip address 14.1.1.1 255.255.255.0 Switch(config)#ip route 15.1.1.0 255.255.255.0 12.1.

Strona 325

45-9 Switch (config-router)#network vlan 300 Switch(config)#interface vlan 100 Switch(config-if-vlan100) #rip bfd enable When the link between Switch

Strona 326

45-10 Switch(config-router)#enable Switch(config-router)#bfd enable # Configure Switch B Switch#config Switch(config)#bfd mode passive Switch(config

Strona 327

46-11 Chapter 46 BGP GR 46.1 Introduction to GR Along with network development, it requires the higher availability, so HA (High Availability) is set

Strona 328

46-12 information and enable selection deferral timer. 5. R1 delays the count process of the local BGP route until it receives all End-of-RIB from

Strona 329

46-13 BGP protocol unicast address family mode and VRF address family mode neighbor (A.B.C.D | X:X::X:X | WORD) capability graceful-restart no neigh

Strona 330

46-14 bgp graceful-restart stale-path-time <1-3600> no bgp graceful-restart stale-path-time <1-3600> Stalepath-time uses the default va

Strona 331 - 39.3 OSPFv3 Examples

46-15 R2 configuresint vlan 12,ip address 12.1.1.2 R1 configuration: R1#config R1(config)#vlan 12 R1(config-vlan12)#int vlan 12 R1(config-if-vlan12)#

Strona 332

47-16 Chapter 47 OSPF GR 47.1 Introduction to OSPF GR OSPF Graceful-Restart(short for OSPF GR), is used to maintain data forwarding correctly and flo

Strona 333 - 39.4 OSPFv3 Troubleshooting

47-17 protocol while GR helper is layer 3 switch to help GR restarter. In the above example, S1 is GR restarter and S2 is GR helper The advantages of

Strona 334

2 4.4.4 SNMP Configuration ... 4-8 4.4.5 T

Strona 335 - Chapter 40 BGP

3-11 Chapter 3 Switch Management 3.1 Management Options After purchasing the switch, the user needs to configure the switch for network management. S

Strona 336

47-18 47.3 OSPF GR Example Example: There are for switches from S1 to S4 (They are two master control board and supports OSPF GR), they enable OSPF

Strona 337

47-19 specific GR is not disabled.  Whether network topology is changed during OSPF GR process. When it is changed, switch may quit GR and restart

Strona 338

48-1 Chapter 48 IPv4 Multicast Protocol 48.1 IPv4 Multicast Protocol Overview This chapter will give an introduction to the configuration of IPv4 Mul

Strona 339

48-2 Multicast group are dynamic, the hosts can join and leave the Multicast group at any time. Multicast group can be permanent or tem

Strona 340

48-3 48.1.3 IP Multicast Packet Transmission In Multicast mode, the source host sends packets to the host group indicated by the Multicast group addr

Strona 341

48-4 The working process of PIM-DM can be summarized as: Neighbor Discovery, Flooding & Prune, and Graft. 1. Neigh hour Discovery After PIM-DM ro

Strona 342

48-5 48.2.2 PIM-DM Configuration Task List 1. Enable PIM-DM (Required) 2. Configure static multicast routing entries(Optional) 3. Configure additi

Strona 343

48-6 ip pim hello-interval < interval> no ip pim hello-interval To configure the interval for PIM-DM hello messages. The no form of this comman

Strona 344

48-7 48.2.3 PIM-DM Configuration Examples As shown in the following figure, add the Ethernet interfaces of Switch A and Switch B to corresponding vla

Strona 345

48-8 48.2.4 PIM-DM Troubleshooting In configuring and using PIM-DM Protocol, PIM-DM Protocol might not operate normally caused by physical connection

Strona 346

3-12 Figure 3-2 Opening Hyper Terminal 2) Type a name for opening HyperTerminal, such as “Switch”. Figure 3-3 Opening HyperTerminal 3) In the “

Strona 347

48-9 and reach the host. In this way the RPT with RP as root is generated. (2) Multicast Source Registration When a Multicast Source S sends a M

Strona 348

48-10 1. Enable PIM-SM Protocol The PIM-SM protocol can be enabled on XGS3 series Layer 3 switches by enabling PIM in global configuration mode and

Strona 349

48-11 ip pim hello-holdtime <value> no ip pim hello-holdtime To configure the value of the holdtime field in the PIM-SM hello messages. The no

Strona 350

48-12 Command Explanation Global Configuration Mode ip pim bsr-candidate {vlan <vlan-id>| <ifname>}[ <mask-length>][ <priority&

Strona 351

48-13 Command Explanation Interface Configuration Mode no ip pim sparse-mode | no ip pim multicast-routing(Global configuration mode) To disable the

Strona 352

48-14 Switch(config)#interface vlan 2 Switch(Config-if-Vlan2)# ip address 24.1.1.2 255.255.255.0 Switch(Config-if-Vlan2)# ip pim sparse-mode Switch(C

Strona 353

48-15 In configuring and using PIM-SM Protocol, PIM-SM Protocol might not operate normally caused by physical connection or incorrect configuration.

Strona 354

48-16 48.4.2 Brief Introduction to MSDP Configuration Tasks 1. Configuration of MSDP Basic Function 1) Enabling MSDP (Required) 2) Configuring MSD

Strona 355

48-17 48.4.3.2 Enabling MSDP MSDP should be enabled before various MSDP functions can be configured. 1. Enable the MSDP function 2. Configure MSDP

Strona 356

48-18 48.4.4.2 Configuration of MSDP parameters Commands Explanation MSDP Peer Configuration Mode connect-source <interface-type> <interfac

Strona 357

3-13 Figure 3-4 Opening HyperTerminal 4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for “Parity checksum”,

Strona 358

48-19 no sa-request-filter [list <access-list-number | access-list-name>] command will remove the configured filter rules for SA request packet

Strona 359

48-20 Figure 48-3 Network Topology for MSDP Entry Configuration tasks are listed as below: Prerequisites: Enable the single cast routing protocol a

Strona 360

48-21 Switch(router-msdp)#peer 20.1.1.1 Router B in Domain B: Switch#config Switch(config)#interface vlan 2 Switch(Config-if-Vlan2)#ip address 20.1.

Strona 361

48-22 Figure 48-4 Flooding of SA messages Figure 48-5 Flooding of SA messages with mesh group configuration Configuration steps are listed as bel

Strona 362 - 40.4 BGP Troubleshooting

48-23 Switch(Config-if-Vlan3)#ip address 30.1.1.1 255.255.255.0 Switch(Config-if-Vlan3)#exit Switch(config)#router msdp Switch(router-msdp)#peer 10.

Strona 363 - Chapter 41 MBGP4+

48-24 Switch(Config-if-Vlan6)#ip address 60.1.1.4 255.255.255.0 Switch(Config-if-Vlan6)#exit Switch(config)#router msdp Switch(router-msdp)#peer 20.

Strona 364 - 41.3 MBGP4+ Examples

48-25 If the MSDP problems cannot be solved through all the methods provided above, please issue the command debug msdp to get the debugging messages

Strona 365

48-26 2. Configure ANYCAST RP v4 (1) Configure the RP candidate Command Explanation Global Configuration Mode ip pim rp-candidate {vlan<vlan-i

Strona 366 - 41.4 MBGP4+ Troubleshooting

48-27 done with the absence of the interface. The self-rp-address should be unique. No operation will cancel the self-rp-address which is used to com

Strona 367

48-28 from a DR is received, it should be forwarded to all of these other RP one by one. No operation will cancel an other-rp-address communicating

Strona 368

3-14 Testing RAM... 0x077C0000 RAM OK Loading MiniBootROM... Attaching to file system ... Loading nos.img ... done. Booting... Starting at 0

Strona 369

48-29 Switch(config)#ip pim rp-candidate loopback1 Switch(config)#ip pim bsr-candidate vlan 1 Switch(config)#ip pim multicast-routing Switch(config)#

Strona 370

48-30 Source Specific Multicast (PIM-SSM) is a new kind of multicast service protocol. With PIM-SSM, a multicast session is distinguished by the mult

Strona 371

48-31 Switch(config)#ip pim multicast-routing Switch(config)#interface vlan 1 Switch(Config-If-Vlan1)# ip pim sparse-mode Switch(Config-If-Vlan

Strona 372

48-32 Switch(Config-If-Vlan2)# ip pim sparse-mode Switch(Config-If-Vlan2)#exit Switch(config)#interface vlan 3 Switch(Config-If-Vlan3)# ip pim

Strona 373 - 43.3 Example of GRE Tunnel

48-33 The check which determines if the packet gets to the correct interface is called RPF check. When some Multicast data packets get to some inter

Strona 374

48-34 48.7.2 DVMRP Configuration Task List 1. Globally enable and disable DVMRP (Required) 2. Configure Enable and Disable DVMRP Protocol at the inte

Strona 375

48-35 ip dvmrp output-report-delay <delay_val> [<burst_size>] no ip dvmrp output-report-delay Configure the delay of transmitting DVMRP

Strona 376

48-36 Switch (config)#interface vlan 1 Switch(Config-if-Vlan1)# ip address 10.1.1.1 255.255.255.0 Switch(Config-if-Vlan1)# ip dvmrp enable (2) Confi

Strona 377

48-37 The Multicast Packet Source Controllable technology of Security Controllable Multicast technology is mainly processed in the following manners:

Strona 378

48-38 The next is to configure the rule of source control. It is configured in the same manner as for ACL, and uses ACL number of 5000-5099, every ru

Strona 379

3-15 The following describes the steps for a Telnet client to connect to the switch’s VLAN1 interface by Telnet(IPV4 address example): Figure 3-6 Ma

Strona 380

48-39 [no] multicast destination-control (required) Globally enable IPv4 and IPv6 destination control. The no operation of this command w

Strona 381

48-40 to set priority for the specified multicast. The commands are as follows: Command Explanation Global Configuration Mode [no] ip multicast p

Strona 382

48-41 Server 210.1.1.1 is distributing important multicast data on group 239.1.2.3, we can configure on its join-in switch as follows: Switch(config

Strona 383 - 44.1 Introduction to ECMP

48-42 Under this kind of situation, since all switches which runs IGMP under this network segment can get membership report message from the host, th

Strona 384 - 44.3 ECMP Typical Example

48-43 membership trace. 11. In querying messages, the new router side restraint process (S sign) modified the existing strength of IGMPv2. 48.9.2

Strona 385 - 44.3.2 OSPF Implements ECMP

48-44 Command Explanation Interface Configuration Mode ip igmp access-group {<acl_num | acl_name>} no ip igmp access-group Configure the filte

Strona 386 - 44.4 ECMP Troubleshooting

48-45 no ip dvmrp | no ip pim dense-mode | no ip pim sparse-mode | no ip dvmrp multicast-routing | no ip pim multicast-routing Disable IGMP Protoco

Strona 387 - Chapter 45 BFD

48-46  Firstly to assure that physical connection is correct;  Next, to assure the Protocol of Interface and Link protocol is UP (use show interf

Strona 388

48-47 ip igmp snooping vlan <vlan-id> no ip igmp snooping vlan <vlan-id> Enables IGMP Snooping for specified VLAN. The no operation disab

Strona 389 - 45.3 Examples of BFD

48-48 query-mrsp <value> no ip igmp snooping vlan <vlan-id> query-mrsp period. The “no ip igmp snooping vlan <vlan-id> query-mr

Strona 390

3-16 Figure 3-7 Run telnet client program included in Windows Step 3: Login to the switch. Login to the Telnet configuration interface. Valid login

Strona 391

48-49 Figure 48-10 Enabling IGMP Snooping function Example: As shown in the above figure, a VLAN 100 is configured in the switch and includes ports

Strona 392 - 45.4 BFD Troubleshooting

48-50 Figure 48-11 The switches as IGMP Queries The configuration of Switch2 is the same as the switch in scenario 1, SwitchA takes the place of Mul

Strona 393 - Chapter 46 BGP GR

48-51 router) Configurations are listed as below: switch#config switch(config)#ip pim multicast-routing switch(config)#interface vlan 100 swit

Strona 394

48-52 the join and leave messages received from downstream ports and forward them to the multicast router through upstream ports. The IGMP proxy conf

Strona 395

48-53 no ip igmp proxy unsolicited-report robustness this command will restore the default value. ip igmp proxy aggregate no ip igmp proxy aggregat

Strona 396 - 46.3 Typical Example of GR

48-54 The configuration steps are listed below: Switch#config Switch(config)#ip igmp proxy Switch(Config)#interface vlan 1 Switch(Config-if-Vlan1)#ip

Strona 397

48-55 Switch#config Switch(config)#ip igmp proxy Switch(Config)#interface vlan 1 Switch(Config-if-Vlan1)#ip igmp proxy upstream Switch(Config)#interf

Strona 398 - Chapter 47 OSPF GR

49-1 Chapter 49 IPv6 Multicast Protocol 49.1 PIM-DM6 49.1.1 Introduction to PIM-DM6 PIM-DM6(Protocol Independent Multicast, Dense Mode)is the IPv6 ve

Strona 399 - 47.2 OSPF GR Configuration

49-2 the multicast packet will be discarded as redundant message. The unicast routing message used as path judgment can root in any Unicast Routing P

Strona 400 - 47.4 OSPF GR Troubleshooting

49-3 ipv6 pim dense-mode To enable PIM-DM for the specified interface (required). 2.Configure static multicast routing entries Command Explanation

Strona 401

3-17 3.1.2.2 Management via HTTP To manage the switch via HTTP, the following conditions should be met: 1) Switch has an IPv4/IPv6 address configu

Strona 402 - 48.1.2 Multicast Address

49-4 Command Explanation Interface Configuration Mode ipv6 pim scope-border <500-599>|<acl_name> no ipv6 pim scope-border To configure

Strona 403

49-5 Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ipv6 address 2000:10:1:1::1/64 Switch(Config-if-Vlan1)#ipv6 pim dense-mode Switch(Config

Strona 404 - 48.2 PIM-DM

49-6 PIM-SM routers and establish, using Join/Prune message of routers, RPT (RP-rooted shared tree) based on RP. Consequently the network bandwidth o

Strona 405

49-7 Notice: Multicast Routing Protocol is not supported by 5950-28T-L and 5950-52T-L in this chapter. 49.2.2 PIM-SM6 Configuration Task List 1. Ena

Strona 406

49-8 ipv6 mroute <X:X::X:X> <X:X::X:X> <ifname> <.ifname> no ipv6 mroute <X:X::X:X> <X:X::X:X> [<ifnam

Strona 407

49-9 5) Configure the interface as the management boundary of the PIM-SM6 protocol Command Explanation Interface Configuration Mode ipv6 pim scope

Strona 408

49-10 Global Configuration Mode ipv6 pim rp-address <rp-address> [<group-range>] no ipv6 pim rp-address <rp-address> {all|<g

Strona 409 - 48.3 PIM-SM

49-11 The configuration procedure for SwitchA, SwitchB, SwitchC and SwitchD is as below: (1) Configure SwitchA: Switch(config)#ipv6 pim multicast-r

Strona 410

49-12 Switch(Config-if-Vlan1)#ipv6 address 2000:34:1:1::4/64 Switch(Config-if-Vlan1)#ipv6 pim sparse-mode Switch(Config-if-Vlan1)#exit Switch(config)

Strona 411

49-13 Anycast RP defines that the nearest RP to the multicast source should forward the source register messages to all the other RP to guarantee tha

Strona 412

3-18 Telnet is enabled for configuring and managing the switch, username and password for authorized Telnet users must be configured with the followi

Strona 413

49-14 no ipv6 pim anycast-rp self-rp-address identify this router when communicating with other RP.(necessary) the effect of self-rp-address refers t

Strona 414

49-15 absence of the interface in accordance with the anycast-rp-addr. Configure on this router (as a RP) the other-rp-addresses of other RP comm

Strona 415

49-16 RP1 Configuration: Switch#config Switch(config)#interface loopback 1 Switch(Config-if-Loopback1)#ipv6 address 2006::1/128 Switch(Config-if-Loop

Strona 416 - 48.4.1 Introduction to MSDP

49-17 49.4 PIM-SSM6 49.4.1 Introduction to PIM-SSM6 Source Specific Multicast (PIM-SSM6) is a new kind of multicast service protocol. With PIM-SSM6,

Strona 417

49-18 Figure 49-4 PIM-SSM typical environment Configurations of switchA , switchB, switchC and switchD are listed as below: (1) Configuration of s

Strona 418 - 48.4.3.2 Enabling MSDP

49-19 Switch(config)# ipv6 pim rp-candidate vlan2 Switch(config)#ipv6 access-list 500 permit ff1e::1/64 Switch(config)#ip pim ssm range 500 (3

Strona 419

49-20  Make sure the physical links are connected correctly.  Make sure the state of the data link layer has become UP. (Use show interface comma

Strona 420

49-21 the command of globally enabling the source control: Command Explanation Global Configuration Mode ipv6 multicast source-control(necessary) n

Strona 421

49-22 First, globally enable the destination control, since destination control needs to avoid the unauthorized users from receiving multicast data,

Strona 422

49-23 3. The configuration of multicast policy The multicast policy adopts the method of specifying a priority for the specified multicast data to

Strona 423

3-19 Figure 3-11 Main Web Configuration Interface When configure the switch, the name of the switch is composed with English letters. 3.1.2.3 Man

Strona 424

49-24 Switch(config)#ipv6 multicast destination-control fe80::203:fff:fe01:228a/64 access-group 9000 Thus, the users of this segment can only join g

Strona 425 - 48.4.8 MSDP Troubleshooting

49-25 MLD protocol version2 use FF02::16 as destination address of membership report, and 143 as data type. The other logic of MLD Protocol version2

Strona 426

49-26 1)Configure interval time for MLD to send query messages 2)Configure the maximum response time of MLD query 3)Configure the overtime of MLD que

Strona 427

49-27 (1) Configure SwitchA: Switch (config) #ipv6 pim multicast-routing Switch (config) #ipv6 pim rp-address 3FFE::1 Switch (config) #interface vlan

Strona 428

49-28 (namely ff02::1). Once there is a listener who wishes to join the multicast address, it will send a MLD Multicast listener Report back through

Strona 429

49-29 mrouter-port interface <interface –name> ipv6 mld snooping vlan <vlan-id> mrouter-port learnpim6 no ipv6 mld snooping vlan <

Strona 430 - 48.6 PIM-SSM

49-30 Scenario 1: MLD Snooping Function Figure 49-6 Open the switch MLD Snooping Function figure As shown above, the vlan 100 configured on the swi

Strona 431

49-31 Figure 49-7 Switch as MLD Querier Function figure Configuration of switch B is the same as the switches in case 1, and

Strona 432

49-32 Scenario 3: To run in cooperation with layer 3 multicast protocols SWITCH which is used in Scenario 1 is replaced with ROUTER with specific con

Strona 433 - 48.7.1 Introduction to DVMRP

50-1 Chapter 50 Multicast VLAN 50.1 Introductions to Multicast VLAN Based on current multicast order method, when orders from users in different VLA

Strona 434

3-20 3.2 CLI Interface The switch provides thress management interface for users: CLI (Command Line Interface) interface, Web interface, Snmp netword

Strona 435

50-2 3. Configure the MLD Snooping Command Explanation Global Mode ipv6 mld snooping vlan <vlan-id> no ipv6 mld snooping vlan <vlan

Strona 436

50-3 SwitchA(config)#interface vlan 10 Switch(Config-if-Vlan10)#ip pim dense-mode Switch(Config-if-Vlan10)#exit SwitchA(config)#vlan 20 SwitchA(c

Strona 437 - 48.8.1 Introduction to DCSCM

51-1 Chapter 51 ACL Configuration 51.1 Introduction to ACL ACL (Access Control List) is an IP packet filtering mechanism employed in switches, provi

Strona 438

51-2 51.2 ACL Configuration Task List ACL Configuration Task Sequence: 1. Configuring access-list (1) Configuring a numbered standard IP access-list

Strona 439

51-3 5. Clear the filtering information of the specified port 1. Configuring access-list (1) Configuring a numbered standard IP access-list (2)

Strona 440

51-4 5. Clear the filtering information of the specified port 1. Configuring access-list (1) Configuring a numbered standard IP access-list Comm

Strona 441

51-5 access-list <num> {deny | permit} udp {{<sIpAddr> <sMask>} | any-source | {host-source <sIpAddr>}} [s-port {<sPort&g

Strona 442 - 48.9.1 Introduction to IGMP

51-6 Command Explanation Standard IP ACL Mode exit Exits name-based standard IP ACL configuration mode. (4) Configuring an name-based extended IP

Strona 443

51-7 <tos>][time-range<time-range-name>] [no] {deny | permit} udp {{<sIpAddr> <sMask>} | any-source | {host-source <sIpAd

Strona 444

51-8 {host-source-mac<host_smac>}|{<smac><smac-mask>}}{any-destination-mac|{host-destination-mac<host_dmac>}|{<dmac>&l

Strona 445

3 10.3 ULDP FUNCTION TYPICAL EXAMPLES ... 10-4 10.4 ULDP TR

Strona 446 - 48.9.4 IGMP Troubleshooting

3-21 3.2.1.1 User Mode On entering the CLI interface, entering user entry system first. If as common user, it is defaulted to User Mode. The prompt s

Strona 447 - 48.10 IGMP Snooping

51-9 [no]{deny|permit} {any-source-mac|{host-source-mac<host_smac>}|{<smac><smac-mask>}} {any-destination-mac |{host-destination-m

Strona 448

51-10 (8) Configuring a numbered extended MAC-IP access-list Command Explanation Global mode access-list<num>{deny|permit} {any-source-mac|

Strona 449

51-11 access-list<num>{deny|permit}{any-source-mac| {host-source-mac<host_smac>}|{<smac><smac-mask>}}{any-destination-mac|{h

Strona 450

51-12 Command Explanation Extended name-based MAC-IP access Mode [no]{deny|permit} {any-source-mac|{host-source-mac <host_smac>}|{<smac&g

Strona 451

51-13 c<host_smac>}|{<smac><smac-mask>}} {any-destination-mac|{host-destination-mac <host_dmac>}|{<dmac><dmac-mask&

Strona 452

51-14 deletes a numbered standard IPv6 access-list. (11) Configuring a numbered extensive IPV6 access-list Command Explanation Global Mode ipv

Strona 453

51-15 a. Create a standard IPV6 access-list based on nomenclature Command Explanation Global Mode ipv6 access-list standard <name> no ipv6 a

Strona 454 - 48.11.3 IGMP Proxy Examples

51-16 Command Explanation Extended IPV6 ACL Mode [no] {deny | permit} icmp {{<sIPv6Prefix/sPrefixlen>} | any-source | {host-source <sIPv6

Strona 455

51-17 Command Explanation Extended IPV6 ACL Mode exit Exits extended name-based IPV6 ACL configuration mode. 2. Configuring packet filtering fun

Strona 456

51-18 [no] periodic {{Monday+Tuesday+Wednesday+Thursday+ Friday+Saturday+Sunday} | daily | weekdays | weekend} <start_time> to <end_time>

Strona 457 - 49.1 PIM-DM6

3-22 3.2.1.3 Global Mode Type the config command under Admin Mode will enter the Global Mode prompt “Switch(config)#”. Use the exit command under oth

Strona 458

51-19 3. Bind the ACL to the port The configuration steps are listed below: Switch(config)#access-list 110 deny tcp 10.0.0.0 0.0.0.255 any-dest

Strona 459

51-20 Configuration result: Switch#show firewall Firewall Status: Enable. Switch #show access-lists access-list 1100(used 1 time(s)) acce

Strona 460

51-21 access-list 3110(used 1 time(s)) access-list 3110 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any-destination-mac tcp 10.0.0.0 0.0.0.255 an

Strona 461 - 49.2 PIM-SM6

51-22 IPv6 Ingress access-list used is 600, traffic-statistics Disable. Scenario 5: The configuration requirement is stated as below: The interfa

Strona 462

51-23  If an access-list contains same filtering information but conflicting action rules, binding to the port will fail with an error message. Fo

Strona 463

52-1 Chapter 52 802.1x Configuration 52.1 Introduction to 802.1x The 802.1x protocol originates from 802.11 protocol, the wireless LAN protocol of I

Strona 464

52-2 system should support EAPOL (Extensible Authentication Protocol over LAN).  The authenticator system is another entity on one end of the LAN

Strona 465

52-3 52.1.2 The Work Mechanism of 802.1x IEEE 802.1x authentication system uses EAP (Extensible Authentication Protocol) to implement exchange of au

Strona 466

52-4 PAE Ethernet Type: Represents the type of the protocol whose value is 0x888E. Protocol Version: Represents the version of the protocol supporte

Strona 467

52-5 Identifier: to assist matching the Request and Response messages. Length: the length of the EAP packet, covering the domains of Code, Identifie

Strona 468

3-23  ACL Mode ACL type Entry Operates Exit Standard IP ACL Mode Type ip access-list standard command under Global Mode. Configure parameters fo

Strona 469

52-6 the remote RADIUS server. The following is the description of the process of these two authentication methods, both started by the supplicant

Strona 470

52-7 the same. 1. EAP-MD5 Authentication Method EAP-MD5 is an IETF open standard which providing the least security, since MD5 Hash function is vul

Strona 471

52-8 The following figure illustrates the basic operation flow of the EAP-TLS authentication method. Figure 52-10 the Authentication Flow of 802.1x

Strona 472

52-9 authentication. The following figure illustrates the basic operation flow of PEAP authentication method. Figure 52-11 the Authentication Flow

Strona 473 - 49.4 PIM-SSM6

52-10 Figure 52-12 the Authentication Flow of 802.1x EAP Termination Mode 52.1.6 The Extension and Optimization of 802.1x Besides supporting the p

Strona 474

52-11 resources, which means all users of this port can access limited resources before being authenticated. The user-based advanced control will r

Strona 475

52-12 the port into Guest VLAN if there is no supplicant getting authenticated successfully in a certain stretch of time because of lacking exclusiv

Strona 476 - 49.5 IPv6 DCSCM

52-13 Command Explanation Port Mode dot1x port-control {auto|force-authorized|force-unauthorized } no dot1x port-control Sets the 802.1x authentic

Strona 477

52-14 dot1x eapor enable no dot1x eapor enable Enables the EAP relay authentication function in the switch; the no command sets EAP local end authen

Strona 478

52-15 Figure 52-13 The Network Topology of Guest VLAN Notes: in the figures in this session, E2 means Ethernet 1/0/2, E3 means Ethernet 1/0/3 and

Strona 479

3-24 Ctrl +n The same as Down key “↓”. Ctrl +b The same as Left key “←”. Ctrl +f The same as Right key “→”. Ctrl +z Return to the Admin Mode di

Strona 480 - 49.6.1 Introduction to MLD

52-16 is set as the port’s Guest VLAN. Before the user gets authenticated or when the user fails to do so, port Ethernet1/0/2 is added into VLAN10,

Strona 481

52-17 # Set the access control mode on the port as portbased. Switch(Config-If-Ethernet1/0/2)#dot1x port-method portbased # Set the access control

Strona 482

52-18 Switch(config)#interface vlan 1 Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-vlan1)#exit Switch(config)#radius-s

Strona 483 - 49.7 MLD Snooping

52-19 Switch(config)#radius-server authentication host 2004:1:2:3::3 Switch(config)#radius-server accounting host 2004:1:2:3::3 Switch(config)#r

Strona 484

53-1 Chapter 53 The Number Limitation Function of Port, MAC in VLAN and IP Configuration 53.1 Introduction to the Number Limitation Function o

Strona 485 - 49.7.3 MLD Snooping Examples

53-2 through configuration commands. Limiting the number of dynamic MAC and IP of ports: 1. Limiting the number of dynamic MAC. If the number

Strona 486

53-3 2. Enable the number limitation function of MAC、IP in VLAN Command Explanation VLAN configuration mode vlan mac-address dynamic maximu

Strona 487

53-4 show nd-dynamic count {vlan <vlan-id> | interface ethernet <portName> } Display the number of dynamic NEIGHBOUR in corre

Strona 488

53-5 SWTICH B can get the MAC, ARP, ND list entries of all the PC, so limiting the MAC, ARP list entry can avoid DOS attack to a certain exten

Strona 489 - Chapter 50 Multicast VLAN

54-1 Chapter 54 Operational Configuration of AM Function 54.1 Introduction to AM Function AM (Access Management) means that when a switch receiv

Strona 490 - 50.3 Multicast VLAN Examples

3-25 Please configure precursor command "*" at first! The command is recognized, but the prerequisite command has not been configured. sy

Strona 491

54-2 am port no am port Enable/disable AM function on the port. When the AM function is enabled on the port, no IP or ARP message will be forwar

Strona 492 - Chapter 51 ACL Configuration

54-3 54.3 AM Function Example Figure 54-1 a typical configuration example of AM function In the topology above, 30 PCs, after converged by HUB

Strona 493

55-1 Chapter 55 TACACS+ Configuration 55.1 Introduction to TACACS+ TACACS+ terminal access controller access control protocol is a pro

Strona 494

55-2 3. Configure the TACACS+ authentication timeout time Command Explanation Global Mode tacacs-server timeout <seconds> no t

Strona 495

55-3 Switch(config)#authentication line vty login tacacs 55.4 TACACS+ Troubleshooting In configuring and using TACACS+, the TACACS+ ma

Strona 496

56-1 Chapter 56 RADIUS Configuration 56.1 Introduction to RADIUS 56.1.1 AAA and RADIUS Introduction AAA is short for Authentication, Authorization a

Strona 497

56-2 Identifier field (1 octet): Identifier for the request and answer packets. Length field (2 octets): The length of the overall RADIUS packet, inc

Strona 498

56-3 56.2 RADIUS Configuration Task List 1. Enable the authentication and accounting function. 2. Configure the RADIUS authentication key. 3. Configu

Strona 499

56-4 radius-server accounting host {<ipv4-address> | <ipv6-address>} [port <port-number>] [key <string>] [primary] no radiu

Strona 500

56-5 Figure 56-2 The Topology of IEEE802.1x configuration A computer connects to a switch, of which the IP address is 10.1.1.2 and connected with a

Strona 501

4-1 Chapter 4 Basic Switch Configuration 4.1 Basic Configuration Basic switch configuration includes commands for entering and exiting the admin m

Strona 502

56-6 Figure 56-3 The Topology of IPv6 Radius configuration A computer connects to a switch, of which the IP address is 2004:1:2:3::2 and connected w

Strona 503

57-7 Chapter 57 SSL Configuration 57.1 Introduction to SSL As the computer networking technology spreads, the security of the network has been taking

Strona 504

57-8 Firstly, SSL should be enabled on the switch. When the client tries to access the switch through https method, a SSL session will be set up betw

Strona 505

57-9 2. Configure/delete port number by SSL used Command Explanation Global Mode ip http secure-port <port-number> no ip http secure-port Con

Strona 506

57-10 Configuration on the switch: Switch(config)# ip http secure-server Switch(config)# ip http secure-port 1025 Switch(config)# ip http secure-ci

Strona 507

58-1 Chapter 58 IPv6 Security RA Configuration 58.1 Introduction to IPv6 Security RA In IPv6 networks, the network topology is generally compromised

Strona 508

58-2 debug ipv6 security-ra no debug ipv6 security-ra Enable the debug information of IPv6 security RA module, the no operation of this command will

Strona 509 - 51.3 ACL Example

59-1 Chapter 59 VLAN-ACL Configuration 59.1 Introduction to VLAN-ACL The user can configure ACL policy to VLAN to implement the accessing control of

Strona 510

59-2 2. Configure VLAN-ACL of MAC type Command Explanation Global mode vacl mac access-group {<700-1199> | WORD} {in | out} [traffic-statisti

Strona 511

59-3 59.3 VLAN-ACL Configuration Example A company’s network configuration is as follows, all departments are divided by different VLANs, technique d

Strona 512

4-2 4.2 Telnet Management 4.2.1 Telnet 4.2.1.1 Introduction to Telnet Telnet is a simple remote terminal protocol for remote login. Using Telnet,

Strona 513 - 51.4 ACL Troubleshooting

59-4 Switch(config-ip-ext-nacl-vacl_a)# deny ip any-source any-destination time-range t1 3) Configure the extended acl_b of IP, at any time it only

Strona 514

60-5 Chapter 60 MAB Configuration 60.1 Introduction to MAB In actual network existing the device which can not install the authentication client, suc

Strona 515 - 52.1 Introduction to 802.1x

60-6 mac-authentication-bypass enable no mac-authentication-bypass enable Enable the port MAB authentication function. 2. Configure MAB authenticati

Strona 516

60-7 mac-authentication-bypass timeout linkup-period <0-30> no mac-authentication-bypass timeout linkup-period To obtain IP again, set the inte

Strona 517

60-8 Figure 60-1 MAB application Switch1 is a layer 2 accessing switch, Switch2 is a layer 3 aggregation switch. Ethernet 1/0/1 is an access port of

Strona 518

60-9 Switch(config)#interface ethernet 1/0/2 Switch(config-if-ethernet1/0/2)# switchport mode hybrid Switch(config-if-ethernet1/0/2)# switchport hybr

Strona 519

61-10 Chapter 61 PPPoE Intermediate Agent Configuration 61.1 Introduction to PPPoE Intermediate Agent 61.1.1 Brief Introduction to PPPoE PPPoE (Point

Strona 520 - 52.1.5.1 EAP Relay Mode

61-11 PADO packet match with the servce information needed by client). MAC address of the other end used for session will be known after server is se

Strona 521

61-12 PPPoE data Version Type Code Session ID Length Field TLV1 …… TLV N TLV frame Type Length Data Each field meanings in the following: Type fie

Strona 522

61-13 61.1.2.3 PPPoE Intermediate Agent vendor tag Frame The following is the format of tag added by PPPoE IA, adding tag is the Uppermost function o

Strona 523

4-3 {<num-std>|<name>} no authentication ip access-class Telnet/SSH/Web; the no form command will cancel the binding ACL. authentica

Strona 524

61-14 client as untrust port, trust port can receive all packets, untrust port can receive only PADI, PADR and PADT packets which are sent to server.

Strona 525

61-15 61.3 PPPoE Intermediate Agent Typical Application PPPoE Intermediate Agent typical application is as follows: Figure 61-4 PPPoE IA typical ap

Strona 526

61-16 Typical configuration (2) in the following: Step1: Switch enables global PPPoE IA function, MAC as 0a0b0c0d0e0f. Switch(config)#pppoe intermed

Strona 527

62-17 Chapter 62 SAVI Configuration 62.1 Introduction to SAVI SAVI (Source Address Validation Improvement) is a security authentication method that p

Strona 528

62-18 Command Explanation Global Mode savi enable no savi enable Enable the global SAVI function, no command disables the function. 2. Enable or di

Strona 529

62-19 6. Configure the global max-slaac-life for SAVI Command Explanation Global Mode savi max-slaac-life <max-slaac-life> no savi max-slaac-

Strona 530

62-20 11. Configure the check mode for SAVI conflict binding Command Explanation Global Mode savi check binding <simple | probe> mode no savi

Strona 531

62-21 savi ipv6 binding num <limit-num> no savi ipv6 binding num Configure the binding number of a port, no command restores the default valu

Strona 532 - 52-17 IPv6 Radius

62-22 Ethernet1/0/12 of Switch1 and port Ethernet1/0/13 of Switch2, and enable the source address check function of SAVI. Ethernet1/0/1 and Ethernet1

Strona 533 - 52.4 802.1x Troubleshooting

63-23 Chapter 63 Web Portal Configuration 63.1 Introduction to Web Portal Authentication 802.1x authentication uses the special client to authenticat

Strona 534 - MAC in VLAN and IP

4-4 Global Mode ssh-server enable no ssh-server enable Enable SSH function on the switch; the “no ssh-server enable” command disables SSH functio

Strona 535

63-24 2. Enable/disable web portal authentication of the port Command Explanation Port Mode webportal enable no webportal enable Enable/disable web

Strona 536

63-25 clear webportal binding {mac WORD | interface <ethernet IFNAME | IFNAME> |} Delete the binding information of web portal authentication.

Strona 537 - IP Typical Examples

63-26 The configuration of the common web portal authentication is as follows: Switch(config)#interface vlan 1 Switch(config-if-vlan1)#ip address 192

Strona 538 - IP Troubleshooting Help

64-27 Chapter 64 VRRP Configuration 64.1 Introduction to VRRP VRRP (Virtual Router Redundancy Protocol) is a fault tolerant protocol designed to enha

Strona 539 - Function

64-28 (1) Configure the preemptive mode for VRRP (2) Configure VRRP priority (3) Configure VRRP Timer intervals (4) Configure VRRP interface moni

Strona 540

64-29 Command Explanation VRRP protocol configuration mode advertisement-interval <time> Configures VRRP timer value (in seconds). (4) Config

Strona 541 - 54.3 AM Function Example

64-30 SwitchB (Config-Router-Vrrp)# virtual-ip 10.1.1.5 SwitchB(Config-Router-Vrrp)# interface vlan 1 SwitchB(Config-Router-Vrrp)# enable 64.4 VRRP

Strona 542 - 55.1 Introduction to TACACS+

65-1 Chapter 65 IPv6 VRRPv3 Configuration 65.1 Introduction to VRRPv3 VRRPv3 is a virtual router redundancy protocol for IPv6. It is designed based o

Strona 543 - 55-1 TACACS Configuration

65-2 protocols. Compared with NDP, VRRP provides a fast default gateway switch. In VRRP, backup routers can take up the unavailable master router in

Strona 544 - 55.4 TACACS+ Troubleshooting

65-3 65.1.2 VRRPv3 Working Mechanism The working mechanism of VRRPv3 is the same with that of VRRPv2, which is mainly implemented via the interaction

Strona 545 - 56.1 Introduction to RADIUS

4-5 4.3 Configurate Switch IP Addresses All Ethernet ports of switch are default to Data Link layer ports and perform layer 2 forwarding. VLAN int

Strona 546

65-4 65.2 VRRPv3 Configuration 65.2.1 Configuration Task Sequence 1. Create/delete the virtual router (necessary) 2. Configure the virtual IPv6 add

Strona 547

65-5 ( 2 ) Configure VRRPv3 priority Command Explanation VRRPv3 Protocol Mode priority < priority > Configure VRRPv3 priority. ( 3 ) Con

Strona 548 - 56.3.1 IPv4 Radius Example

65-6 IPv6_A and IPv6_B are in the same segment), the virtual IPv6 address of backup group 1 and backup group are “V_IPv6_C” and “V_IPV6_D” respec

Strona 549 - 56.3.2 IPv6 RadiusExample

66-1 Chapter 66 MRPP Configuration 66.1 Introduction to MRPP MRPP (Multi-layer Ring Protection Protocol), is a link layer protocol applied on Etherne

Strona 550 - 56.4 RADIUS Troubleshooting

66-2 Each switch is named after a node on Ethernet. The node has some types: Primary node: each ring has a primary node, it is main node to detect an

Strona 551 - Chapter 57 SSL Configuration

66-3 66.1.3 MRPP Protocol Operation System 1. Link Down Alarm System When transfer node finds themselves belonging to MRPP ring port Down, it sends l

Strona 552

66-4 2) Configure MRPP ring Command Explanation Global Mode mrpp ring <ring-id> no mrpp ring <ring-id> Create MRPP ring. The “no” co

Strona 553 - 57.3 SSL Typical Example

66-5 clear mrpp statistics {<ring-id>} Clear receiving data packet statistic information of MRPP ring. 66.3 MRPP Typical Scenario Figure 66-2

Strona 554 - 57.4 SSL Troubleshooting

66-6 Switch(Config)# SWITCH B configuration Task Sequence: Switch(Config)#mrpp enable Switch(Config)#mrpp ring 4000 Switch(mrpp-ring-4000)#control

Strona 555

66-7 66.4 MRPP Troubleshooting The normal operation of MRPP protocol depends on normal configuration of each switch on MRPP ring, otherwise it is ve

Strona 556

4 15.3.1 Introduction to Dot1q-tunnel ... 15-11 15.3.2 Dot1

Strona 557

4-6 3. BOOTP configuration Command Explanation VLAN Port Mode ip bootp-client enable no ip bootp-client enable Enable the switch to be a Boo

Strona 558

67-1 Chapter 67 ULPP Configuration 67.1 Introduction to ULPP Each ULPP group has two uplink ports, they are master port and slave port. The port may

Strona 559

67-2 method of MSTP instances, and ULPP does not provide the protection to other VLANs. When the uplink switch is happennig, the primary forwarding

Strona 560

67-3 1. Create ULPP group globally Command Expalnation Global mode ulpp group <integer> no ulpp group <integer> Configure and delete UL

Strona 561 - Chapter 60 MAB Configuration

67-4 ulpp group <integer> master no ulpp group <integer> master Configure or delete the master port of ULPP group. ulpp group <integer

Strona 562

67-5 Figure 67-3 ULPP typical example1 The above topology is the typical application environment of ULPP protocol. SwitchA has two uplinks, they are

Strona 563 - 60.3 MAB Example

67-6 Switch(config-If-Ethernet1/0/2)#exit SwitchB configuration task list: Switch(Config)#vlan 10 Switch(Config-vlan10)#switchport interface etherne

Strona 564

67-7 mutually backup, respectively forward the packets of different VLAN ranges. When port E1/0/1 has the problem, the traffic of VLAN 1-200 are fo

Strona 565 - 60.4 MAB Troubleshooting

67-8 67.4 ULPP Troubleshooting  At present, configuration of more than 2 multi-uplinks is allowed, but it may cause loopback, so is not recommended

Strona 566

68-1 Chapter 68 ULSM Configuration 68.1 Introduction to ULSM ULSM (Uplink State Monitor) is used to process the port state synchronization. Each ULSM

Strona 567 - 61.1.2.2 PPPoE Packet Format

68-2 68.2 ULSM Configuration Task List 1. Create ULSM group globally 2. Configure ULSM group 3. Show and debug the relating information of ULSM 1

Strona 568

4-7  Get-Bulk-Request  Set-Request  Trap  Inform-Request NMS sends queries to the Agent with Get-Request, Get-Next-Request, Get-Bulk-Requ

Strona 569

68-3 68.3 ULSM Typical Example Figure 68-2 ULSM typical example The above topology is the typical application environment which is used by ULSM and

Strona 570

68-4 Switch(config-If-Ethernet1/0/1)#ulsm group 1 downlink Switch(config-If-Ethernet1/0/1)#exit Switch(Config)#interface ethernet 1/0/3 Switch(config

Strona 571

69-5 Chapter 69 Mirror Configuration 69.1 Introduction to Mirror Mirror functions include port mirror function, CPU mirror function, flow mirror func

Strona 572

69-6 3. Specify flow mirror source Command Explanation Global mode monitor session <session> source {interface <interface-list>} acces

Strona 573 - 62.2 SAVI Configuration

69-7 Switch(config)#monitor session 4 source interface ethernet 1/0/15 access-list 120 rx 69.4 Device Mirror Troubleshooting If problems occur on con

Strona 574

70-1 Chapter 70 RSPAN Configuration 70.1 Introduction to RSPAN Port mirroring refers to the duplication of data frames sent/received on a port to ano

Strona 575

70-2 For chassis switches, at most 4 mirror destination ports are supported, and source or destination port of one mirror session can be configured o

Strona 576

70-3 1. Configure RSPAN VLAN Command Explanation VLAN Configuration Mode remote-span no remote-span To configure the specified VLAN as RSPAN VL

Strona 577

70-4 70.3 Typical Examples of RSPAN Before RSPAN is invented, network administrators had to connect their PCs directly to the switches, in order to c

Strona 578 - 62.4 SAVI Troubleshooting

70-5 Intermediate switch: Interface ethernet1/0/6 is the source port which is connected to the source switch. Interface ethernet1/0/7 is the destinat

Strona 579

4-8 In this figure, the OID of the object A is 1.2.1.1. NMS can locate this object through this unique OID and gets the standard variables of the

Strona 580

70-6 Switch(config)#interface ethernet 1/0/2 Switch(Config-If-Ethernet1/0/2)#switchport mode trunk Switch(Config-If-Ethernet1/0/2)#exit Switch(config

Strona 581

70-7 70.4 RSPAN Troubleshooting Due to the following reasons, RSPAN may not function:  Whether the destination mirror port is a member of the Por

Strona 582

Chapter 62 ULSM Configuration 71-1 Chapter 71 sFlow Configuration 71.1 Introduction to sFlow The sFlow (RFC 3176) is a protocol based on standard netw

Strona 583 - 64.1 Introduction to VRRP

Chapter 62 ULSM Configuration 71-2 2. Configure the sFlow proxy address Command Explanation Global Mode sflow agent-address <collector-address&

Strona 584

Chapter 62 ULSM Configuration 71-3 Port Mode sflow counter-interval <interval-vlaue> no sflow counter-interval Configure the max interval whe

Strona 585 - 64.3 VRRP Typical Examples

Chapter 62 ULSM Configuration 71-4 71.4 sFlow Troubleshooting In configuring and using sFlow, the sFlow server may fail to run properly due to physica

Strona 586 - 64.4 VRRP Troubleshooting

72-1 Chapter 72 SNTP Configuration 72.1 Introduction to SNTP The Network Time Protocol (NTP) is widely used for clock synchronization for global comp

Strona 587 - 65.1 Introduction to VRRPv3

72-2 72.2 Typical Examples of SNTP Configuration Figure 72-2 Typical SNTP Configuration All switches in the autonomous zone are required to perform

Strona 588 - 65-1 VRRPv3 message

73-1 Chapter 73 NTP Function Configuration 73.1 Introduction to NTP Function The NTP (Network Time Protocol) synchronizes timekeeping spans WAN and L

Strona 589

73-2 ntp server {<ip-address> | <ipv6-address>} [version <version_no>] [key <key-id>] no ntp server {<ip-address> | <

Strona 590 - 65.2 VRRPv3 Configuration

4-9 3. Configure IP address of SNMP management base 4. Configure engine ID 5. Configure user 6. Configure group 7. Configure view 8. Configu

Strona 591 - 65.3 VRRPv3 Typical Examples

73-3 7. To specified some interface as NTP broadcast/multicast client interface Command Explication Interface Configuration Mode ntp broadcast cli

Strona 592 - 65.4 VRRPv3 Troubleshooting

73-4 debug ntp sync no debug ntp sync To enable debug switch of time synchronize information. debug ntp events no debug ntp events To enable debug sw

Strona 593 - 66.1 Introduction to MRPP

74-1 Chapter 74 DNSv4/v6 Configuration 74.1 Introduction to DNS DNS (Domain Name System) is a distributed database used by TCP/IP applications to tr

Strona 594

74-2 74.2 DNSv4/v6 Configuration Task List 1. To enable/disable DNS function 2. To configure/delete DNS server 3. To configure/delete domain nam

Strona 595

74-3 5. To enable DNS dynamic domain name resolution Command Explanation Global Mode dns lookup {ipv4 | ipv6} <hostname> To enable DNS dynami

Strona 596

74-4 debug dns {all | packet [send | recv] | events | relay} no debug dns {all | packet [send | recv] | events | relay} To enable/disable DEBUG of DN

Strona 597 - 66.3 MRPP Typical Scenario

74-5 request; otherwise, the switch will relay the request to the real DNS server, pass the reply from the DNS Server to the client and record the d

Strona 598

75-6 Chapter 75 Summer Time Configuration 75.1 Introduction to Summer Time Summer time is also called daylight saving time, it is a time system for s

Strona 599 - 66.4 MRPP Troubleshooting

75-7 Configuration procedure is as follows: Switch(config)# clock summer-time 2012 absolute 23:00 2012.4.1 00:00 2012.10.1 Example2: The configurati

Strona 600 - 67.1 Introduction to ULPP

76-1 Chapter 76 Monitor and Debug When the users configures the switch, they will need to verify whether the configurations are correct and the switc

Strona 601

4-10 Command Explanation Global Mode snmp-server engineid <engine-string> no snmp-server engineid Configure the local engine ID on the sw

Strona 602

76-2 and packet sent time) whose HOPLIMIT is set to 1. When first route on the path receives this datagram, it minus the HOPLIMIT by 1 and the HOPLIM

Strona 603 - 67.3.1 ULPP Typical Example1

76-3 show tech-support Display the operation information and the state of each task running on the switch. It is used by the technicians to diagnose

Strona 604

76-4 SDRAM (Synchronous Dynamic Random Access Memory) and NVRAM (Non Vulnerable Random Access Memory) is provided inside the switch as two part of th

Strona 605 - 67.3.2 ULPP Typical Example2

76-5  Outputted information from the CLI command is classified informational  Information from the debugging of CLI command is classified debuggi

Strona 606

76-6 Command Description Global Mode logging executed-commands {enable | disable} Enable or disable the logging executed-commands 4. Display the

Strona 607 - 67.4 ULPP Troubleshooting

77-1 Chapter 77 Reload Switch after Specified Time 77.1 Introduce to Reload Switch after Specifid Time Reload switch after specified time is to reboo

Strona 608 - 68.1 Introduction to ULSM

78-1 Chapter 78 Debugging and Diagnosis for Packets Received and Sent by CPU 78.1 Introduction to Debugging and Diagnosis for Packets Received and Se

Strona 609

79-1 Chapter 79 MPLS Overview 79.1 MPLS Overview MPLS (Multiprotocol Label Switching), originating from IPv4, was first designed for improving the

Strona 610 - 68.3 ULSM Typical Example

79-2 Figure 79-1 The Encapsulation Structure of a Label There are 4 fields in a label:  Label:The label value, whose length is 20 bits, a pointer

Strona 611 - 68.4 ULSM Troubleshooting

79-3 LSP are separately called the upstream and downstream LSR, along the direction of data transmission. In the next figure, R2 is the downstream LS

Strona 612 - 69.1 Introduction to Mirror

4-11 Command Explanation Global Mode snmp-server enable traps no snmp-server enable traps Enable the switch to send Trap message. This command is

Strona 613 - 69.3 Mirror Examples

79-4 With the LSR mapping multiple incoming labels to the same FEC, all these incoming labels will correspond with the same outgoing label and egress

Strona 614

79-5 Figure 79-3 The MPLS Network Structure The basic working process of MPLS based on the above figure : First, LDP, together with traditional rou

Strona 615 - 70.1 Introduction to RSPAN

79-6 However, combining the powerful L3 switching function of IP networks and efficient forwarding mechanism of traditional L2 networks, MPLS uses co

Strona 616

79-7 pre-configured service policy to different services, ensuring the service quality. The service quality class mechanism and the label mechanism o

Strona 617

80-8 Chapter 80 LDP 80.1 LDP Introduction LDP protocol is used for label distribution in the MPLS label switching environment, and only applies to

Strona 618

80-9 80.1.1 Basic Concept of LDP LDP Peer When distributing labels to FEC, LDP needs to advertise this label and its meaning in the MPLS network to c

Strona 619

80-10 TLV Encoding LDP encapsulates parameters in LDP messages via TLV (Type-Length-Value). The LDP TLV format is as follows: Figure 80-2 The TVL F

Strona 620

80-11 Common Session Parameters 0x0500 ATM Session Parameters 0x0501 Frame Relay Session Parameters 0x0502 Label Request Message ID 0x0600 Vendor-Pri

Strona 621 - 70.4 RSPAN Troubleshooting

80-12 Figure 80-3 The Process of Label Advertisement For example, as for LSP1 in the above figure, LSR B is the upstream LSR of LSR C, while LSR C

Strona 622 - 71.1 Introduction to sFlow

80-13  Ordered Mode: For a FEC label mapping of a LSR, the LSR only advertise the mapping to its upstream when it already has the label mapping o

Strona 623

4-12 Scenario 3: NMS uses SNMP v3 to obtain information from the switch. The configuration on the switch is listed below: Switch(config)#snmp-s

Strona 624 - 71.3 sFlow Examples

80-14 incoming labels.  LSR will map the labels of received packets to NHLFE;  LSR will find the corresponding NHLFE in the LIB based on the labe

Strona 625 - 71.4 sFlow Troubleshooting

80-15 downstream LSR, and specifies for which FEC this label request is. (2) The downstream receiving the label request message will save this messa

Strona 626 - 72.1 Introduction to SNTP

80-16  The hop count of the path exceeds the configured maximum value. If no record of its LSR ID is found, a new one will be added. The maximum va

Strona 627

80-17 2. Enable LDP It is easy to implement basic configurations of LDP in DCNOS. Usually users only have to enable the LDP switch, and enable it on

Strona 628

80-18 advertisement-mode {downstream-on-demand|downstream-unsolicited} Optional Configure the global label advertisement mode: downstream-on-demand

Strona 629

80-19 [no] loop-detection-count <count> optional Configure the maximum hop count of LDP loop detection, whose default value is 255, the no oper

Strona 630

80-20 [no] hold-time <hold-time > Optional Configure the LDP multicast peer hold time, whose default value is 15 seconds; the no operation

Strona 631

80-21 [no] ldp targeted-peer-hold-time <hold-time> optional Configure the LDP targeted peer hold time on a specified interface; the no operati

Strona 632 - 74.1 Introduction to DNS

80-22 [no] request-retry optional Configure the LDP to retry 5 times when the label request is rejected, the no operation will disable the retry. [no

Strona 633

80-23 Figure 80-4 MPLS VPN Typical Instance The above figure demonstrates a typical MPLS VPN instance, in which, PE1, P and PE2 form the public ne

Strona 634

4-13  The switch enabled SNMP Agent server function (use “snmp-server” command)  Secure IP for NMS (use “snmp-server securityip” command) and

Strona 635 - 74.3 Typical Examples of DNS

80-24 The LDP configuration of P is as follows: P#config P(config)#mpls enable P(config)# router ldp P(config-router)#exit P(config)#interface vlan 1

Strona 636 - 74.4 DNS Troubleshooting

80-25  Second, use the “show ldp interface” command to check whether the LDP has been enabled correctly on the interface after the connection suc

Strona 637 - 75.3 Examples of Summer Time

81-26 Chapter 81 MPLS VPN 81.1 BGP/MPLS VPN Introduction 81.1.1 BGP/MPLS VPN Network Structure BGP/MPLS VPN is a PE-based L3VPN technology in the V

Strona 638

81-27 the local VPN route to PE, and learn the remote VPN route from PE. CE and PE use BGP/IGP to exchange route information or static routes. PE w

Strona 639 - Chapter 76 Monitor and Debug

81-28 route table and IFIL (Label Forwarding Information Base). To be specific, the information in VPN instances include: LFIB, IP route table, inte

Strona 640 - 76.5 Show

81-29  Import Target Attribute: when receiving the VPN-IPv4 route advertised by other PE routers, PE will check their Export Target Attribute, and

Strona 641 - 76.7 System log

81-30 Figure 81-3 Forwarding VPN Packets 1. Site1 sends an IP packet with a destination address of 1.1.1.2, which is sent by CE1 to PE1. 2. PE1

Strona 642

81-31 Figure 81-4 Basic VPN Networking Resolution In the above figure, the VPN Target distributed by PE for VPN1 is 100:1; and that for VPN2 is 200

Strona 643

81-32 Figure 81-5 Hub&Spoke Networking Resolution In the above figure, Spoke sites communicate with each other via Hub sites (the arrow in the

Strona 644

81-33 If a VPN user wants to provide some site resource of this VPN to outside users, the Extranet Networking resolution can solve the problem. In t

Strona 645

4-14 Figure 4-2 Typical topology for switch upgrade in BootROM mode The upgrade procedures are listed below: Step 1: As shown in the figure,

Strona 646 - Received and Sent by CPU

81-34 In real networking applications, multiple sites of a user VPN may connect to SP with different ASN, or to different AS of the same SP. Such app

Strona 647 - Chapter 79 MPLS Overview

81-35 1. Enable globally MPLS (necessary) 2. Configure VPN instances (necessary) (1) Create VPN instances, and enter the VPN instance view. (2) R

Strona 648

81-36 mpls enable no mpls enable Necessary Enable MPLS; the no operation will disable MPLS. 2. Configure VPN instances (necessary) (1) Create VPN in

Strona 649

81-37 Command Explanation BGP Protocol Configuration Mode neighbor <ip-address> remote-as <as-num> necessary Configure the remote PE

Strona 650

81-38 3) Enable OSPF in the segment between PE-CE 4) Configure to re-advertise BGP routes 5) Enter the BGP-VPN instance view 6) Configure to re-adver

Strona 651

81-39 BGP-VPN instance view [no] redistribute {connected | ospf | rip | static} optional Configure to re-advertise the directly connected routes a

Strona 652

81-40 [no] redistribute { kernel | connected | static | ospf | isis | bgp} [metric <value>] [route-map<word>] optional Configure to re-ad

Strona 653 - 79.1.5 MPLS PHP

81-41 Global Configuration Mode [no] ip route vrf <vrf-name> {<ip- prefix> <mask>|<ip-prefix/<prefix- length>} {<gatew

Strona 654 - Chapter 80 LDP

81-42 Figure 81-8 Create BGP MPLS VPN between PE-CE via EBGP The configuration of CE1 is as follows : (the configurations of CE2~CE4 are similar) CE

Strona 655 - 80.1.1 Basic Concept of LDP

81-43 PE1(config-if-Vlan1)# ip vrf forwarding vpna PE1(config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 PE1(config-if-Vlan1)#exit PE1(config)# inte

Strona 656

4-15 file. [Boot]: load nos.img Loading... Loading file ok! Step 5: Execute write nos.img in BootROM mode. The following saves the syst

Strona 657 - 80.1.3 LDP Label Management

81-44 PE1(config-router-af)#neighbor 10.2.1.1 remote-as 65002 PE1(config-router-af)#redistribute connected PE1(config-router-af)#exit PE1(config-rout

Strona 658

81-45 (2) Configure to bind the interface with the VPN instances PE2(config)# interface vlan 3 PE2(config-if-Vlan3)# ip vrf forwarding vpna PE2(conf

Strona 659

81-46 PE2(config-router-af)#exit PE2(config-router)# address-family ipv4 vrf vpnb PE2(config-router-af)#neighbor 10.4.1.1 remote-as 65004 PE2(config-

Strona 660 - 80.1.4 LDP Session

81-47 PE1#config PE1(config)#ip vrf vpna PE1(config-vrf)#rd 100:1 PE1(config-vrf)#route-target both 100:1 PE1(config)#ip vrf vpnb PE1(config-vrf)#rd

Strona 661 - 80.1.5 LDP Loop Detection

81-48 PE1(config)#router ospf 1 vpna PE1(config-router)# network 0.0.0.0/0 area 0 PE1(config-router)#redistribute connected PE1(config-router)#redist

Strona 662 - 80.2 LDP Configuration

81-49 P(config-if-Vlan100)#exit P(config)#interface vlan200 P(config-if-Vlan200)#ip address 200.1.1.2 255.255.255.0 P(config-if-Vlan200)#label-switch

Strona 663

81-50 CE1(config-router)#redistribute connect CE1(config-router)#exit The confiugraiton of MPLS BGP on switch PE1 is as follows : (the configuration

Strona 664

81-51 PE1(config-router)# ospf router-id 172.1.1.1 PE1(config-router)# network 0.0.0.0/0 area 0 PE1(config-router)# redistribute connected PE1(config

Strona 665

81-52 P(config)# interface loopback 1 P(config-if-Loopback1)# ip address 172.3.3.3 255.255.255.255 P(config-if-Loopback1)# exit P(config)#interface v

Strona 666

81-53 The configuration of CE1 is as follows: (the configurations of CE2~CE4 are similar) CE1#config CE1(config)# interface vlan 1 CE1(config-if-Vla

Strona 667

5 18.1.2 QoS Implementation ... 18-2 18.1.3 Ba

Strona 668 - 80.3 LDP Typical Instances

4-16 Step 9: Execute write flash:/config.rom in BootROM mode. The following saves the update file. [Boot]: write flash:/config.rom [Boot]: write

Strona 669

81-54 PE1(config-if-Vlan100)#ip address 100.1.1.1 255.255.255.0 PE1(config-if-Vlan100) #ldp enable PE1(config-if-Vlan100)#exit (5) Enable OSPF to a

Strona 670 - 80.4 LDP Troubleshooting

81-55 P(config-router)#exit P(config)# interface loopback 1 P(config-if-Loopback1)# ip address 172.3.3.3 255.255.255.255 P(config-if-Loopback1)# exit

Strona 671

81-56  Besides, if no remote CE device can be checked on CE after saving the correction configuration and rebooting the device, please be patience,

Strona 672 - Chapter 81 MPLS VPN

82-57 Chapter 82 Public Network Access of MPLS VPN 82.1 Public Network Access Introduction Public network access of VPN means the ability of VPN si

Strona 673

82-58 82.1.2 VRF Internet Access Mode 3 In VRF Internet Access Mode 3, as demonstrated in the next figure, VPN site access the Internet via private n

Strona 674

82-59 (4) Configure proper filter policy on the public network interface, to filter the packets whose source and destination addresses are private n

Strona 675

82-60 Figure 82-3 Non-VRF Internet Access Mode The configuration of CE1 is as follows: CE1#config CE1(config)#access-list 1 deny 100.100.1.0 0.0.0.

Strona 676

82-61 CE1(config-router)#network 10.1.2.0/24 CE1(config-router)#redistribute connected CE1(config-router)#neighbor 100.100.1.1 remote-as 100 CE1(co

Strona 677

82-62 PE1(config)#router bgp 100 PE1(config-router)#neighbor 100.200.1.2 remote-as 60102 PE1(config-router)#neighbor 200.200.1.1 remote-as 100 PE1(co

Strona 678

82-63 PE2(config-vrf)#exit PE2(config)#interface Vlan1 PE2(config-if-Vlan1)#ip vrf forwarding VRF-A PE2(config-if-Vlan1)#ip address 192.168.101.1 2

Strona 679

4-17 There are two types of data connections: active connection and passive connection. In active connection, the client transmits its address a

Strona 680

82-64 IGW(config-if-Vlan1)#ip address 202.200.3.2 255.255.255.0 IGW(config-if-Vlan1)#exit IGW(config)#interface Vlan2 IGW(config-if-Vlan2#ip address

Strona 681

83-65 Chapter 83 SWITCH OPERATION 83.1 Address Table The Switch is implemented with an address table. This address table composed of many entries.

Strona 682

83-66 The Switch performs "Store and forward" therefore, no error packets occur. More reliably, it reduces the re-transmission rate. No

Strona 683

84-1 Chapter 84 TROUBLE SHOOTING This chapter contains information to help you solve problems. If the Ethernet Switch is not functioning properly,

Strona 684

85-1 Chapter 85 APPENDEX A 85.1 A.1 Switch's RJ-45 Pin Assignments 1000Mbps, 1000Base T Contact MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_D

Strona 685

85-2 The standard RJ-45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pi

Strona 686

86-1 Chapter 86 GLOSSARY Bandwidth Utilization The percentage of packets received over time as compared to overall bandwidth. BOOTP Boot protocol us

Strona 687

86-2 Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet fr

Strona 688 - (1) Configure VPN instances

86-3 Multicast Switching A process whereby the switch filters incoming multicast frames for services no attached host has registered for, or forwards

Strona 689

86-4 Telnet Defines a remote communication facility for interfacing to a terminal device over TCP/IP. Trivial File Transfer Protocol (TFTP) A TCP/IP

Strona 690

4-18 To prevent illicit file upload and easier configuration, switch mandates the name of start up configuration file to be startup-config.  R

Strona 691

EC Declaration of Conformity For the following equipment: *Type of Product: 24-Port 100/1000X SFP with 4 Optional 10G slots Layer 3 Managed Stac

Strona 692

EC Declaration of Conformity For the following equipment: *Type of Product: 24-Port Gigabit with 4 Optional 10G slots Layer 3 Managed Stackable

Strona 693

4-19 copy <source-url> <destination-url> [ascii | binary] FTP/TFTP client upload/download file. (2)For FTP client, server file list c

Strona 694 - (7) Configure BGP

4-20 tftp-server enable no tftp-server enable Start TFTP server, the no command shuts down TFTP server and prevents TFTP user from logging in.

Strona 695 - (2) Configure OSPF

4-21 Place the “12_30_nos.img” file to the appropriate FTP server directory on the computer. The configuration procedures of the switch are list

Strona 696

4-22 The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 2

Strona 697

4-23 4.5.3.4 FTP/TFTP Troubleshooting 4.5.3.4.1 FTP Troubleshooting When upload/download system file with FTP protocol, the connectivity of the li

Strona 698

4-24 When upload/download system file with TFTP protocol, the connectivity of the link must be ensured, i.e., use the “Ping” command to verify the

Strona 699

5-1 Chapter 5 File System Operations 5.1 Introduction to File Storage Devices File storage devices used in switches mainly include FLASH card

Strona 700

6 22.4 URPF ...

Strona 701

5-2 directory on a certain device. 4. Changing the current working directory of the storage device Command Explanation Admin Configuration

Strona 702

5-3 5.3 Typical Applications Copy an IMG file flash:/nos.img stored in the FLASH on the boardcard, to cf:/nos-6.1.11.0.img. The configuration

Strona 703

6-1 Chapter 6 Cluster Configuration 6.1 Introduction to cluster network management Cluster network manag

Strona 704 - Internet

6-2 5) Clear the list of candidate switches maintained by the switch 4. Configure attributes of the c

Strona 705

6-3 cluster keepalive loss-count <int> no cluster keepalive loss-count Set the max number of lost

Strona 706

6-4 ip http server Enable http function in commander switch and member switch. Notice: must insure the h

Strona 707

6-5 Configuration of SW1: Switch(config)#cluster run Switch(config)#cluster ip-pool 10.2.3.4 Switch(conf

Strona 708

7-1 Chapter 7 Port Configuration 7.1 Introduction to Port XGS3-24042 switches contain Cable ports and Combo ports. The Comb

Strona 709

7-2 Command Explanation Port Mode combo-forced-mode {copper-forced | copper-preferred-auto | sfp-forced | sfp-preferred-a

Strona 710

7-3 rate-violation <200-2000000> [recovery <0-86400>|] no rate-violation Set the max packet reception rate of a

Strona 711 - Chapter 83 SWITCH OPERATION

7 27.3 GRATUITOUS ARP CONFIGURATION EXAMPLE ... 27-62 27.4 GRATUITOUS ARP

Strona 712 - 83.5 Auto-Negotiation

7-4 The configurations are listed below: Switch1: Switch1(config)#interface ethernet 1/0/7 Switch1(Config-If-Ethernet1/0/

Strona 713

8-1 Chapter 8 Port Isolation Function Configuration 8.1 Introduction to Port Isolation Function Port isolation is an independent port-based function

Strona 714 - Chapter 85 APPENDEX A

8-2 3. Specify the flow to be isolated Command Explanation Global Mode isolate-port apply [<l2|l3|all>] Apply the port isolation configura

Strona 715 - 1 2 3 4 5 6 7 8

8-3 between any downlink port and a specified uplink port is normal. The uplink port can communicate with any port normally. The configuration of S1:

Strona 716 - Chapter 86 GLOSSARY

9-4 Chapter 9 Port Loopback Detection Function Configuration 9.1 Introduction to Port Loopback Detection Function With the development of switches, m

Strona 717

9-5 1.Configure the time interval of loopback detection Command Explanation Global Mode loopback-detection interval-time <loopback> <no-

Strona 718

9-6 5. Configure the loopback-detection control mode (automatic recovery enabled or not) Command Explanation Global Mode loopback-detection contr

Strona 719

9-7 If adopting the control method of block, MSTP should be globally enabled. And the corresponding relation between the spanning tree instance and

Strona 720 - EC Declaration of Conformity

10-1 Chapter 10 ULDP Function Configuration 10.1 Introduction to ULDP Function Unidirectional link is a common error state of link in networks, espec

Strona 721

10-2 mentioned above. In a switch connected via fibers or copper Ethernet line (like ultra five-kind twisted pair), ULDP can monitor the link state o

Komentarze do niniejszej Instrukcji

Brak uwag