SNR S2980G 8T Configuration Guide
SNR S2980G 8T Configuration Guide
SNR S2980G 8T Configuration Guide
CONTENTS
Contents
I Basic Management Configuration
11
1 Switch management
1.1 Management options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 CLI Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
12
17
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
23
23
24
27
28
35
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
46
46
46
48
48
4 Cluster Configuration
4.1 Introduction to cluster network management . . . . . . .
4.2 Cluster Network Management Configuration Sequence
4.3 Examples of Cluster Administration . . . . . . . . . . . .
4.4 Cluster Administration Troubleshooting . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
49
49
50
52
53
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
II Port Configuration
54
5 Port Configuration
5.1 Introduction to Port . . . . . . . . . .
5.2 Network Port Configuration Task List
5.3 Port Configuration Example . . . . .
5.4 Port Troubleshooting . . . . . . . . .
.
.
.
.
55
55
55
58
59
60
60
60
61
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
62
62
63
64
65
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
66
66
67
69
71
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
72
72
73
76
76
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
77
77
78
79
81
82
11 MTU Configuration
11.1 Introduction to MTU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.2 MTU Configuration Task Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . .
83
83
83
.
.
.
.
84
84
87
89
90
.
.
.
.
91
91
91
92
93
.
.
.
.
94
94
96
97
100
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
13 Port Security
13.1 Introduction to Port Security . . . . .
13.2 Port Security Configuration Task List
13.3 Example of Port Security . . . . . .
13.4 Port Security Troubleshooting . . . .
14 DDM Configuration
14.1 Introduction to DDM . . . . .
14.2 DDM Configuration Task List
14.3 Examples of DDM . . . . . .
14.4 DDM Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
15 LLDP-MED
15.1 Introduction to LLDP-MED . . . . . . . . .
15.2 LLDP-MED Configuration Task Sequence
15.3 LLDP-MED Example . . . . . . . . . . . .
15.4 LLDP-MED Troubleshooting . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
102
102
102
104
106
16 BPDU-Tunnel Configuration
16.1 Introduction to bpdu-tunnel . . . . .
16.2 bpdu-tunnel Configuration Task List
16.3 Examples of bpdu-tunnel . . . . . .
16.4 bpdu-tunnel Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
107
107
108
108
109
.
.
.
.
.
.
.
.
.
.
.
.
111
18 VLAN Configuration
18.1 Introduction to VLAN . . . . . . .
18.2 VLAN Configuration Task List . .
18.3 Typical VLAN Application . . . .
18.4 Typical Application of Hybrid Port
.
.
.
.
112
112
113
116
117
.
.
.
.
119
119
120
120
121
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
19 Dot1q-tunnel Configuration
19.1 Introduction to Dot1q-tunnel . . . . . . .
19.2 Dot1q-tunnel Configuration . . . . . . .
19.3 Typical Applications of the Dot1q-tunnel
19.4 Dot1q-tunnel Troubleshooting . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
122
122
122
123
124
21 VLAN-translation Configuration
21.1 Introduction to VLAN-translation . . .
21.2 VLAN-translation Configuration . . . .
21.3 Typical application of VLAN-translation
21.4 VLAN-translation Troubleshooting . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
125
125
125
126
127
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
128
128
128
129
129
3
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
131
131
131
133
134
24 GVRP Configuration
24.1 Introduction to GVRP . . . .
24.2 GVRP Configuration Task List
24.3 Example of GVRP . . . . . .
24.4 GVRP Troubleshooting . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
135
135
136
137
138
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
139
139
139
140
141
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
142
142
144
145
146
146
149
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
IV MSTP Configuration
152
27 MSTP Configuration
27.1 Introduction to MSTP . . . . .
27.2 MSTP Configuration Task List
27.3 MSTP Example . . . . . . . .
27.4 MSTP Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
153
153
155
159
163
164
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
165
165
171
174
176
29 Flow-based Redirection
181
29.1 Introduction to Flow-based Redirection . . . . . . . . . . . . . . . . . . . . . . . . . 181
29.2 Flow-based Redirection Configuration Task Sequence . . . . . . . . . . . . . . . . 181
29.3 Flow-based Redirection Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
186
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
187
187
188
191
194
.
.
.
.
195
195
195
197
198
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
204
204
204
205
205
206
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
207
207
208
210
212
214
37 DHCPv6 Configuration
37.1 Introduction to DHCPv6 . . . . . . . . . . . . . .
37.2 DHCPv6 Server Configuration . . . . . . . . . .
37.3 DHCPv6 Relay Delegation Configuration . . . .
37.4 DHCPv6 Prefix Delegation Server Configuration
37.5 DHCPv6 Prefix Delegation Client Configuration .
37.6 DHCPv6 Configuration Examples . . . . . . . . .
37.7 DHCPv6 Troubleshooting . . . . . . . . . . . . .
38 DHCP option 82 Configuration
38.1 Introduction to DHCP option 82 . . . . .
38.2 DHCP option 82 Configuration Task List
38.3 DHCP option 82 Application Examples .
38.4 DHCP option 82 Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
215
215
216
218
218
220
221
222
.
.
.
.
223
223
225
227
229
.
.
.
.
230
230
230
231
231
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
232
232
233
236
238
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
239
239
240
244
244
245
263
263
263
264
6
.
.
.
.
.
.
.
.
46 802.1x Configuration
46.1 Introduction to 802.1x . . . . .
46.2 802.1x Configuration Task List
46.3 802.1x Application Example . .
46.4 802.1x Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
266
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
267
267
268
282
285
.
.
.
.
287
287
298
301
305
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
311
311
311
313
313
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
317
317
317
318
319
.
.
.
.
320
320
322
323
325
.
.
.
.
326
326
327
328
328
7
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
330
330
330
331
331
54 MAB Configuration
54.1 Introduction to MAB . . . . .
54.2 MAB Configuration Task List
54.3 MAB Example . . . . . . . .
54.4 MAB Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
332
332
332
334
336
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
337
337
341
342
343
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
344
344
344
346
347
57 VLAN-ACL Configuration
57.1 Introduction to VLAN-ACL . . . . .
57.2 VLAN-ACL Configuration Task List
57.3 VLAN-ACL Configuration Example
57.4 VLAN-ACL Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
348
348
348
350
351
58 SAVI Configuration
58.1 Introduction to SAVI . .
58.2 SAVI Configuration . . .
58.3 SAVI Typical Application
58.4 SAVI Troubleshooting .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
352
352
352
355
356
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
X Reliability Configuration
59 MRPP Configuration
59.1 Introduction to MRPP . . . . .
59.2 MRPP Configuration Task List .
59.3 MRPP Typical Scenario . . . .
59.4 MRPP Troubleshooting . . . .
358
.
.
.
.
359
359
361
363
365
60 ULPP Configuration
60.1 Introduction to ULPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
60.2 ULPP Configuration Task List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
60.3 ULPP Typical Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
366
366
368
369
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
373
373
374
374
376
377
62 Mirror Configuration
62.1 Introduction to Mirror . . . . . .
62.2 Mirror Configuration Task List .
62.3 Mirror Examples . . . . . . . .
62.4 Device Mirror Troubleshooting
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
378
378
378
379
380
63 sFlow Configuration
63.1 Introduction to sFlow . . . . .
63.2 sFlow Configuration Task List
63.3 sFlow Examples . . . . . . .
63.4 sFlow Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
381
381
381
383
384
64 RSPAN Configuration
64.1 Introduction to RSPAN . . . . .
64.2 RSPAN Configuration Task List
64.3 Typical Examples of RSPAN .
64.4 SPAN Troubleshooting . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
385
385
387
388
391
65 ERSPAN
65.1 Introduction to ERSPAN . . . . .
65.2 ERSPAN Configuration Task List
65.3 Typical Examples of ERSPAN . .
65.4 ERSPAN Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
392
392
392
393
395
396
66 SNTP Configuration
397
66.1 Introduction to SNTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
66.2 Typical Examples of SNTP Configuration . . . . . . . . . . . . . . . . . . . . . . . 397
67 NTP Function Configuration
67.1 Introduction to NTP Function . . . . .
67.2 NTP Function Configuration Task List
67.3 Typical Examples of NTP Function . .
67.4 NTP Function Troubleshooting . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
398
398
398
401
401
68 DNSv4/v6 Configuration
68.1 Introduction to DNS . . . . . . . .
68.2 DNSv4/v6 Configuration Task List
68.3 Typical Examples of DNS . . . . .
68.4 DNS Troubleshooting . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
402
402
403
405
406
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
407
407
407
408
408
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
409
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
410
410
410
410
411
411
412
412
10
Part I
Basic Management Configuration
11
Chapter 1
Switch management
1.1 Management options
After purchasing the switch, the user needs to configure the switch for network management.
Switch provides two management options: in-band management and out-of-band management.
Description
Has functional keyboard and RS-232, with terminal emulator installed.
One end attach to the RS-232 serial port, the other end to the Console
port.
Functional Console port required.
PC application such as Hyperterminal or PuTTY - makes communication between the switch and
your PC or terminal possible.
1. Start the terminal-emulation program and open a session if you are using a PC or terminal.
2. Start a terminal-emulation session.
3. Configure the baud rate and character format of the PC or terminal to match the console port
default characteristics:
9600 baud
8 data bits
1 stop bit
No parity
None (flow control)
Step 3: Entering switch CLI interface
Power on the switch, the following appears in the terminal-emulation window, that is the CLI
configuration mode for Switch.
System is booting, please wait...
Testing RAM...
0x04000000 RAM OK.
Attaching to file system ... done.
Loading flash:/nos.img ...
Starting at 0x10000...
Attaching to file system ... done.
Current time is Sun Jan 01 00:00:00 2006
SNR-S2980G-24T Series Switch Operating System
Software Version 6.2.138.30
Compiled Sep 14 17:45:37 2011
Loading factory config ...
Switch>
The user can now enter commands to manage the switch. For a detailed description for the
commands, please refer to the following chapters.
13
16
17
User Mode
Admin Mode
VLAN Mode
Interface mode
Global Mode
Entry
Operates
Exit
Ethernet
Port
Type
interface
<interface-list>
under Global Mode.
Configure supported
duplex mode, speed,
etc. of Ethernet Port.
ethernet
command
18
portchannel
Configure
portchannel
related
settings such as
duplex mode, speed,
etc.
VLAN Mode
Using the vlan <vlan-id> command under Global Mode can enter the corresponding VLAN Mode.
Under VLAN Mode the user can configure all member ports of the corresponding VLAN. Run the
exit command to exit the VLAN Mode to Global Mode.
DHCP Address Pool Mode
Type the ip dhcp pool <name> command under Global Mode will enter the DHCP Address Pool
Mode prompt Switch(Config-<name>-dhcp)#. DHCP address pool properties can be configured
under DHCP Address Pool Mode. Run the exit command to exit the DHCP Address Pool Mode
to Global Mode.
ACL Mode
ACL type
Standard
IP
ACL
Mode
Extended
IP
ACL
Mode
Entry
Type ip access-list standard
command under Global Mode.
Type ip access-list extended
command under Global Mode.
Operates
Configure parameters for Standard IP
ACL Mode.
Configure parameters for Extended IP
ACL Mode.
Exit
Use the exit command to return to
Global Mode.
Use the exit command to return to
Global Mode.
show version, no parameters required. This is a command with only a keyword and no
parameter, just type in the command to run.
vlan <vlan-id>, parameter values are required after the keyword.
firewall { enable | disable }, user can enter firewall enable or firewall disable for this command.
snmp-server community { ro | rw } <string>, the followings are possible:
snmp-server community ro <string>
snmp-server community rw <string>
20
21
Explanation
The entered command does not exist, or there is
error in parameter scope, type or format.
At least two interpretations is possible basing on
the current input.
The command is recognized, but no valid parameter record is found.
The command is recognized, but this command
can not be used under current mode.
The command is recognized, but the prerequisite
command has not been configured.
Quotation marks are not used in pairs.
22
Chapter 2
Basic Switch Configuration
2.1 Basic Configuration
Basic switch configuration includes commands for entering and exiting the admin mode, commands for entering and exiting interface mode, for configuring and displaying the switch clock, for
displaying the version information of the switch system, etc.
Command
Explanation
Normal User Mode / Admin Mode
enable [<1-15>]
The User uses enable command to step into admin mode from
disable
normal user mode or modify the privilege level of the users. The
disable command is for exiting admin mode.
Admin Mode
config [terminal]
Enter global mode from admin mode.
Various Modes
exit
Exit current mode and enter previous mode, such as using this
command in global mode to go back to admin mode, and back to
normal user mode from admin mode.
show privilege
Show privilege of the current users.
Except User Mode / Admin Mode
end
Quit current mode and return to Admin mode when not at User
Mode/ Admin Mode.
Admin Mode
clock set <HH:MM:SS> Set system date and time.
[YYYY.MM.DD]
show version
Display version information of the switch.
set default
Restore to the factory default.
write
Save current configuration parameters to Flash Memory.
reload
Hot reset the switch.
show cpu usage
Show CPU usage rate.
show cpu utilization
Show current CPU utilization rate.
show memory usage
Show memory usage rate.
Global Mode
banner motd <LINE>
Configure the information displayed when the login authentication
no banner motd
of a telnet or console user is successful.
23
Explanation
Enable the Telnet server function in the switch: the no command disables the Telnet function.
Configure user name and password of the telnet. The no
form command deletes the telnet user authorization.
authentication ip access-class {
<num-std> | <name> }
no authentication ip accessclass
authentication ipv6 access-class
{ <num-std> | <name> }
no authentication ipv6 accessclass
authentication line { console | vty
| web } login method1 [method2
]
no authentication line { console |
vty | web } login
authentication enable method1
[method2 ]
no authentication enable
authorization line { console | vty
| web } exec method1 [method2
]
no authorization line { console |
vty | web } exec
authorization line vty command
<1-15> { local | radius | tacacs }
( none | )
no authorization line vty command <1-15>
accounting line { console | vty
} command <1-15> { start-stop
| stop-only | none } method1
[method2]
no accounting line { console | vty
} command <1-15>
Admin Mode
terminal monitor
terminal no monitor
Binding standard IP ACL protocol to login with Telnet/SSH/Web; the no form command will cancel the binding
ACL.
Binding standard IPv6 ACL protocol to login with Telnet/SSH/Web; the no form command will cancel the binding
ACL.
Configure authentication method list with telnet.
Configure command authorization manner and authorization selection priority of login user with VTY (login with Telnet
and SSH). The no command recovers to be default manner.
25
Explanation
Login to a remote host with the Telnet client included in the switch.
2.2.2 SSH
Introduction to SSH
SSH (Secure Shell) is a protocol which ensures a secure remote access connection to network
devices. It is based on the reliable TCP/IP protocol. By conducting the mechanism such as
key distribution, authentication and encryption between SSH server and SSH client, a secure
connection is established. The information transferred on this connection is protected from being
intercepted and decrypted. The switch meets the requirements of SSH2.0. It supports SSH2.0
client software such as SSH Secure Client and putty. Users can run the above software to manage
the switch remotely.
The switch presently supports RSA authentication, 3DES cryptography protocol and SSH user
password authentication etc.
SSH Server Configuration Task List
Command
Global Mode
ssh-server enable
no ssh-server enable
username <username> [privilege <privilege>] [password [0 |
7] <password>]
no username <username>
ssh-server timeout <timeout>
no ssh-server timeout
ssh-server authentication-retires
<authentication-retires>
no ssh-server authenticationretries
ssh-server host-key create rsa
modulus <moduls>
Admin Mode
terminal monitor
terminal no monitor
show crypto key
crypto key clear rsa
Explanation
Enable SSH function on the switch; the no command disables SSH function.
Configure the username and password of SSH client software for logging on the switch; the no command deletes the
username.
Configure timeout value for SSH authentication; the no command restores the default timeout value for SSH authentication.
Configure the number of times for retrying SSH authentication; the no command restores the default number of times
for retrying SSH authentication.
Generate the new RSA host key on the SSH server.
27
Explanation
Create VLAN interface (layer 3 interface); the no command
deletes the VLAN interface.
2. Manual configuration
Command
VLAN Interface Mode
ip
address
<ip-address>
<mask> [secondary]
no ip address <ip-address>
<mask> [secondary]
ipv6 address <ipv6-address /
prefix-length> [eui-64]
no ipv6 address <ipv6-address /
prefix-length>
Explanation
Configure IP address of VLAN interface; the no command
deletes IP address of VLAN interface.
Configure IPv6 address, including aggregation global unicast address, local site address and local link address. The
no command deletes IPv6 address.
3. BOOTP configuration
Command
VLAN Interface Mode
ip bootp-client enable
no ip bootp-client enable
Explanation
Enable the switch to be a BootP client and obtain IP address and gateway address through BootP negotiation; the
no command disables the BootP client function.
4. DHCP configuration
Command
VLAN Interface Mode
ip bootp-client enable
no ip bootp-client enable
Explanation
Enable the switch to be a DHCP client and obtain IP address and gateway address through DHCP negotiation; the
no command disables the DHCP client function.
two points in the network. SNMP employs a polling mechanism of message query, and transmits
messages through UDP (a connectionless transport layer protocol). Therefore it is well supported
by the existing computer networks.
SNMP protocol employs a station-agent mode. There are two parts in this structure: NMS
(Network Management Station) and Agent. NMS is the workstation on which SNMP client program
is running. It is the core on the SNMP network management. Agent is the server software runs on
the devices which need to be managed. NMS manages all the managed objects through Agents.
The switch supports Agent function.
The communication between NMS and Agent functions in Client/Server mode by exchanging
standard messages. NMS sends request and the Agent responds. There are seven types of
SNMP message:
Get-Request
Get-Response
Get-Next-Request
Get-Bulk-Request
Set-Request
Trap
Inform-Request
NMS sends queries to the Agent with Get-Request, Get-Next-Request, Get-Bulk-Request and
Set-Request messages; and the Agent, upon receiving the requests, replies with Get-Response
message. On some special situations, like network device ports are on Up/Down status or the network topology changes, Agents can send Trap messages to NMS to inform the abnormal events.
Besides, NMS can also be set to alert to some abnormal events by enabling RMON function.
When alert events are triggered, Agents will send Trap messages or log the event according to
the settings. Inform-Request is mainly used for inter-NMS communication in the layered network
management.
USM ensures the transfer security by well-designed encryption and authentication. USM encrypts the messages according to the user typed password. This mechanism ensures that the
messages can't be viewed on transmission. And USM authentication ensures that the messages
can't be changed on transmission. USM employs DES-CBC cryptography. And HMAC-MD5 and
HMAC-SHA are used for authentication.
VACM is used to classify the user's access permission. It puts the users with the same access
permission in the same group. Users can't conduct the operation which is not authorized.
on this tree contains an OID (Object Identifier) and a brief description about the node. OID is a set
of integers divided by periods. It identifies the node and can be used to locate the node in a MID
tree structure.
If the variable information of Agent MIB needs to be browsed, the MIB browse software needs
to be run on the NMS. MIB in the Agent usually consists of public MIB and private MIB. The
public MIB contains public network management information that can be accessed by all NMS;
private MIB contains specific information which can be viewed and controlled by the support of the
manufacturers.
MIB-I [RFC1156] is the first implemented public MIB of SNMP, and is replaced by MIB-II
[RFC1213]. MIB-II expands MIB-I and keeps the OID of MIB tree in MIB-I. MIB-II contains subtrees which are called groups. Objects in those groups cover all the functional domains in network
management. NMS obtains the network management information by visiting the MIB of SNMP
Agent.
The switch can operate as a SNMP Agent, and supports both SNMP v1/v2c and SNMP v3.
The switch supports basic MIB-II, RMON public MIB and other public MID such as BRIDGE MIB.
Besides, the switch supports self-defined private MIB.
7. Configure view
8. Configuring TRAP
9. Enable/Disable RMON
1. Enable or disable SNMP Agent server function
Command
Global Mode
snmp-server enabled
no snmp-server enabled
Explanation
Enable the SNMP Agent function on the switch;
the no command disables the SNMP Agent function on the switch.
Explanation
Configure the community string for the switch; the
no command deletes the configured community
string.
Explanation
Configure IPv4/IPv6 security address which is
allowed to access the switch on the NMS; the
no command deletes the configured security address.
Enable or disable secure IP address check function on the NMS.
4. Configure engine ID
Command
Global Mode
snmp-server engineid <engine-string>
no snmp-server engineid
Explanation
Configure the local engine ID on the switch. This
command is used for SNMP v3.
31
5. Configure user
Command
Global Mode
snmp-server user <use-string> <groupstring> [ { authPriv | authNoPriv } auth {
md5 | sha } <word>] [access { <num-std> |
<name> } ] [ ipv6-access { <ipv6-num-std>
| <ipv6-name> } ]
no snmp-server user <user-string> [ access
{ <num-std> | <name> } ] [ ipv6-access {
<ipv6-num-std> | <ipv6-name> } ]
Explanation
Add a user to a SNMP group. This command is
used to configure USM for SNMP v3.
6. Configure group
Command
Global Mode
snmp-server group <group-string> { noauthnopriv | authnopriv | authpriv } [ [ read
<read-string> ] [ write <write-string> ] [ notify <notify-string> ] ] [ access { <num-std> |
<name> } ] [ ipv6-access { <ipv6-num-std>
| <ipv6-name> } ]
no snmp-server group <group-string> {
noauthnopriv | authnopriv | authpriv } [ access { <num-std> | <name> } ] [ ipv6-access
{ <ipv6-num-std> | <ipv6-name> } ]
Explanation
Set the group information on the switch. This
command is used to configure VACM for SNMP
v3.
7. Configure view
Command
Global Mode
snmp-server view <view-string> <oidstring> { include | exclude }
no snmp-server view <view-string> [ <oidstring> ]
Explanation
Configure view on the switch. This command is
used for SNMP v3.
8. Configuring TRAP
Command
Global Mode
snmp-server enable traps
no snmp-server enable traps
Explanation
Enable the switch to send Trap message. This
command is used for SNMP v1/v2/v3.
32
Command
Global Mode
snmp-server host { <host-ipv4-address> |
<host-ipv6-address> } { v1 | v2c | { v3 {
noauthnopriv | authnopriv | authpriv } } }
<user-string>
no snmp-server host { <host-ipv4-address>
| <host-ipv6-address> } {v1 | v2c | { v3 {
noauthnopriv | authnopriv | authpriv } } }
<user-string>
snmp-server trap-source { <ipv4-address> |
<ipv6-address> }
no snmp-server trap-source { <ipv4address> | <ipv6-address> }
Explanation
Set the host IPv4/IPv6 address which is used
to receive SNMP Trap information. For SNMP
v1/v2, this command also configures Trap community string; for SNMP v3, this command also
configures Trap user name and security level.
The no form of this command cancels this IPv4
or IPv6 address.
Set the source IPv4 or IPv6 address which is
used to send trap packet, the no command
deletes the configuration.
9. Enable/Disable RMON
Command
Global Mode
rmon enable
no rmon enable
Explanation
Enable/disable RMON.
enable
community rw private
community ro public
securityip 1.1.1.5
The NMS can use private as the community string to access the switch with read-write permission, or use public as the community string to access the switch with read-only permission.
Scenario 2: NMS will receive Trap messages from the switch (Note: NMS may have community string verification for the Trap messages. In this scenario, the NMS uses a Trap verification
community string of usertrap).
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 1.1.1.5 v1 usertrap
Switch(config)#snmp-server enable traps
Scenario 3: NMS uses SNMP v3 to obtain information from the switch.
The configuration on the switch is listed below:
33
Switch(config)#snmp-server
Switch(config)#snmp-server user tester UserGroup authPriv auth md5 hellotst
Switch(config)#snmp-server group UserGroup AuthPriv read max write max notify max
Switch(config)#snmp-server view max 1 include
Scenario 4: NMS wants to receive the v3Trap messages sent by the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 10.1.1.2 v3 authpriv tester
Switch(config)#snmp-server enable traps
Scenario 5: The IPv6 address of the NMS is 2004:1:2:3::2; the IPv6 address of the switch
(Agent) is 2004:1:2:3::1. The NMS network administrative software uses SNMP protocol to obtain
data from the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server
Switch(config)#snmp-server
Switch(config)#snmp-server
Switch(config)#snmp-server
enable
community rw private
community ro public
securityip 2004:1:2:3::2
The NMS can use private as the community string to access the switch with read-write permission, or use public as the community string to access the switch with read-only permission.
Scenario 6: NMS will receive Trap messages from the switch (Note: NMS may have community string verification for the Trap messages. In this scenario, the NMS uses a Trap verification
community string of usertrap).
The configuration on the switch is listed below:
Switch(config)#snmp-server host 2004:1:2:3::2 v1 usertrap
Switch(config)#snmp-server enable traps
34
If Trap function is required, remember to enable Trap (use 'snmp-server enable traps'
command). And remember to properly configure the target host IP address and community
string for Trap (use 'snmp-server host' command) to ensure Trap message can be sent to
the specified host.
If RMON function is required, RMON must be enabled first (use 'rmon enable' command).
Use 'show snmp' command to verify sent and received SNMP messages; Use 'show snmp
status' command to verify SNMP configuration information; Use 'debug snmp packet' to
enable SNMP debugging function and verify debug information.
If users still can't solve the SNMP problems, Please contact our technical and service center.
Step 6:
The following is the configuration for the system update image file.
[Boot]: load nos.img
Using switch device
TFTP from server 192.168.1.66; our IP address is 192.168.1.2
Filename 'nos.img'.
Load address: 0x82000000
Loading: ###########
done
Bytes transferred = 51635 (c9b3 hex)
[Boot]:
Step 7:
Execute write nos.img in BootROM mode. The following saves the system update image file.
[Boot]: write nos.img
File exists, overwrite? (Y/N)[N] y
Writing flash:/nos.img..............................................
...............................................................
Write flash:/nos.img OK.
[Boot]:
Step 8:
After successful upgrade, execute run or reboot command in BootROM mode to return to CLI
configuration interface.
[Boot]: run (or reboot)
Other commands in BootROM mode
1. DIR command
Used to list existing files in the FLASH.
[Boot]: dir
5399893
nos.img
1 file(s), 0 dir(s)
Total size:6995456 bytes , used size:5422080 bytes, free size:1573376 bytes
[Boot]:
2. boot command
Used to set the IMAGE file to run upon system start-up, and the configuration file to run upon
configuration recovery.
37
39
Explanation
FTP/TFTP client upload/download file.
Explanation
For FTP client, server file list can be
checked.
FtpServerUrl format looks like:
ftp://user:password@IPv4|IPv6 Address.
Explanation
Start FTP server, the no command shuts down
FTP server and prevents FTP user from logging
in.
Explanation
Configure FTP login username and password;
this no command will delete the username and
password.
40
Explanation
Set connection idle time.
Explanation
Start TFTP server, the no command shuts down
TFTP server and prevents TFTP user from logging in.
Explanation
Set maximum retransmission time within timeout
interval.
Explanation
Set the retransmission time for TFTP server.
Switch(Config-if-Vlan1)#exit
Switch(config)#exit
Switch#copy ftp://Switch:[email protected]/12_30_nos.img nos.img
With the above commands, the switch will have the 'nos.img' file in the computer downloaded
to the FLASH.
TFTP Configuration
Computer side configuration:
Start TFTP server software on the computer and place the '12_30_nos.img' file to the appropriate TFTP server directory on the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#exit
Switch#copy tftp://10.1.1.1/12_30_nos.img nos.img
Scenario 2: The switch is used as FTP server. The switch operates as the FTP server and
connects from one of its ports to a computer, which is a FTP client. Transfer the 'nos.img' file in
the switch to the computer and save as '12_25_nos.img'.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#ftp-server enable
Switch(config)#username Admin password 0 superuser
Computer side configuration:
Login to the switch with any FTP client software, with the username 'Switch' and password
'superuser', use the command get nos.img 12_25_nos.img to download 'nos.img' file from the
switch to the computer.
Scenario 3: The switch is used as TFTP server. The switch operates as the TFTP server and
connects from one of its ports to a computer, which is a TFTP client. Transfer the 'nos.img' file in
the switch to the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#tftp-server enable
42
If the switch is upgrading system file or system start up file through TFTP, the switch must not
be restarted until 'close tftp client' is displayed, indicating upgrade is successful, otherwise the
switch may be rendered unable to start. If the system file and system start up file upgrade through
TFTP fails, please try upgrade again or use the BootROM mode to upgrade.
45
Chapter 3
File System Operations
3.1 Introduction to File Storage Devices
File storage devices used in switches mainly include FLASH cards. As the most common storage
device, FLASH is usually used to store system image files (IMG files), system boot files (ROM
files) and system configuration files (CFG files).
Flash can copy, delete, or rename files under Shell or Bootrom mode.
Explanation
Format the storage device.
46
Explanation
Create a sub-directory in a designated directory on a certain
device.
Explanation
Delete a sub-directory in a designated directory on a certain
device.
Explanation
Change the current working directory of the storage device.
Explanation
Display the current working directory.
Explanation
Display information about a designated file or directory on
the storage device.
Explanation
Delete the designated file in the file system.
Explanation
Change the name of a designated file on the switch to a new
one.
47
Explanation
Copy a designated file one the switch and store it as a new
one.
3.4 Troubleshooting
If errors occur when users try to implement file system operations, please check whether they are
caused by the following reasons:
Whether file names or paths are entered correctly.
When renaming a file, whether it is in use or the new file name is already used by an existing
file or directory.
48
Chapter 4
Cluster Configuration
4.1 Introduction to cluster network management
Cluster network management is an in-band configuration management. Unlike CLI, SNMP and
Web Config which implement a direct management of the target switches through a management workstation, cluster network management implements a direct management of the target
switches (member switches) through an intermediate switch (commander switch). A commander
switch can manage multiple member switches. As soon as a Public IP address is configured in the
commander switch, all the member switches which are configured with private IP addresses can
be managed remotely. This feature economizes public IP addresses which are short of supply.
Cluster network management can dynamically discover cluster feature enabled switches (candidate switches). Network administrators can statically or dynamically add the candidate switches to
the cluster which is already established. Accordingly, they can configure and manage the member
switches through the commander switch. When the member switches are distributed in various
physical locations (such as on the different floors of the same building), cluster network management has obvious advantages. Moreover, cluster network management is an in-band management. The commander switch can communicate with member switches in existing network. There
is no need to build a specific network for network management.
Cluster network management has the following features:
Save IP addresses
Simplify configuration tasks
Indifference to network topology and distance limitation
Auto detecting and auto establishing
With factory default settings, multiple switches can be managed through cluster network
management
The commander switch can upgrade and configure any member switches in the cluster
49
Explanation
Enable or disable cluster function in the switch.
50
2. Create a cluster
Command
Global Mode
cluster ip-pool <commander-ip>
no cluster ip-pool
cluster commander [<cluster_name>]
no cluster commander
cluster member { candidate-sn <candidatesn> | mac-address <mac-addr> [id
<member-id> ] }
no cluster member { id <member-id> | macaddress <mac-addr> }
Explanation
Configure the private IP address pool for cluster
member devices.
Create or delete a cluster.
Add or remove a member switch.
Explanation
Enable or disable adding newly discovered candidate switch to the cluster.
Change automatically added members into manually added ones.
Set the keep-alive interval of the cluster.
Set the max number of lost keep-alive messages
that can be tolerated in the cluster.
Clear nodes in the list of candidate switches
maintained by the switch.
Explanation
Set the keep-alive interval of the cluster.
Set the max number of lost keep-alive messages
that can be tolerated in the clusters.
Explanation
In the commander switch, this command is used
to configure and manage member switches.
In the member switch, this command is used to
configure the commander switch.
51
Explanation
Enable http function in commander switch and
member switch.
Notice: must insure the http function be enabled in member switch when commander switch
visiting member switch by web. The commander switch visit member switch via beat member
node in member cluster topology.
Explanation
Enable snmp server function in commander
switch and member switch.
Notice: must insure the snmp server function be enabled in member switch when commander switch visiting member switch by snmp.
The commander switch visit member switch
via configure character string <commandercommunity>@sw<member id>.
E1
E2
SW1
E1
E2
SW2
E1
SW3
E1
SW4
52
Configuration Procedure:
1. Configure the command switch
Configuration of SW1:
Switch(config)#cluster
Switch(config)#cluster
Switch(config)#cluster
Switch(config)#cluster
run
ip-pool 10.2.3.4
commander 5526
auto-add
53
Part II
Port Configuration
54
Chapter 5
Port Configuration
5.1 Introduction to Port
Switch contains Cable ports and Combo ports. The Combo ports can be configured to as either
1000GX-TX ports or SFP Gigabit fiber ports.
If the user needs to configure some network ports, he/she can use the interface ethernet
<interface-list> command to enter the appropriate Ethernet port configuration mode, where <interfacelist> stands for one or more ports. If <interface-list> contains multiple ports, special characters
such as ';' or '-' can be used to separate ports, ';' is used for discrete port numbers and '-' is used
for consecutive port numbers. Suppose an operation should be performed on ports 2,3,4,5 the
command would look like: interface ethernet 1/2-5. Port speed, duplex mode and traffic control can be configured under Ethernet Port Mode causing the performance of the corresponding
network ports to change accordingly.
Explanation
Enters the network port configuration mode.
Explanation
Sets the combo port mode (combo ports only).
56
switchport
flood-control
{
bcast|mcast|ucast }
no switchport flood-control {
bcast|mcast|ucast }
port-scan-mode { interrupt | poll
}
no port-scan-mode
rate-violation <200-2000000>
[recovery <0-86400>]
no rate-violation
Enables the storm control function for broadcasts, multicasts and unicasts with unknown destinations (short for
broadcast), and sets the allowed broadcast packet number;
the no format of this command disables the broadcast storm
control function.
Configure that switch does not transmit broadcast, unknown
multicast or unknown unicast packets any more to the specified port; no command restores the default configuration.
Configure port-scan-mode as interrupt or poll mode, the no
command restores the default port-scan-mode.
Set the max packet reception rate of a port. If the rate of
the received packet violates the packet reception rate, shut
down this port and configure the recovery time, the default is
300s. The no command will disable the rate-violation function of a port.
Configure the port not to receive any packet or untag; the
no command cancel the restriction of discard, it means the
port is allowed to receive any packet or untag.
Configure the interval of port-rate-statistics.
Explanation
Test virtual cables of the port.
57
1/0/9
SW1
1/0/10
SW2
1/0/8
1/0/12
SW3
Port
1/7
1/8
1/9
1/10
1/12
Property
Ingress bandwidth limit: 50 M
Mirror source port
100Mbps full, mirror source port
1000Mbps full, mirror destination port
100Mbps full
58
59
Chapter 6
Port Isolation Function Configuration
6.1 Introduction to Port Isolation Function
Port isolation is an independent port-based function working in an inter-port way, which isolates
flows of different ports from each other. With the help of port isolation, users can isolate ports within
a VLAN to save VLAN resources and enhance network security. After this function is configured,
the ports in a port isolation group will be isolated from each other, while ports belonging to different
isolation groups or no such group can forward data to one another normally. No more than 16 port
isolation groups can a switch have.
Explanation
Set a port isolation group; the no operation of this command
will delete the port isolation group.
Explanation
<WORD>
[ethernet]
<WORD>
[ethernet]
60
1/0/15
1/0/1
1/0/10
SW1
SW2
SW3
61
Chapter 7
Port Loopback Detection Function
Configuration
7.1 Introduction to Port Loopback Detection Function
With the development of switches, more and more users begin to access the network through
Ethernet switches. In enterprise network, users access the network through layer-2 switches,
which means urgent demands for both internet and the internal layer 2 Interworking. When layer 2
Interworking is required, the messages will be forwarded through MAC addressing the accuracy of
which is the key to a correct Interworking between users. In layer 2 switching, the messages are
forwarded through MAC addressing. Layer 2 devices learn MAC addresses via learning source
MAC address, that is, when the port receives a message from an unknown source MAC address, it
will add this MAC to the receive port, so that the following messages with a destination of this MAC
can be forwarded directly, which also means learn the MAC address once and for all to forward
messages.
When a new source MAC is already learnt by the layer 2 device, only with a different source
port, the original source port will be modified to the new one, which means to correspond the
original MAC address with the new port. As a result, if there is any loopback existing in the link,
all MAC addresses within the whole layer 2 network will be corresponded with the port where the
loopback appears (usually the MAC address will be frequently shifted from one port to another
), causing the layer 2 network collapsed. That is why it is a necessity to check port loopbacks
in the network. When a loopback is detected, the detecting device should send alarms to the
network management system, ensuring the network manager is able to discover, locate and solve
the problem in the network and protect users from a long-lasting disconnected network.
Since detecting loopbacks can make dynamic judgment of the existence of loopbacks in the
link and tell whether it has gone, the devices supporting port control (such as port isolation and
port MAC address learning control) can maintain that automatically, which will not only reduce the
burden of network managers but also response time, minimizing the effect caused loopbacks to
the network.
62
Explanation
Configure the time interval of loopback detection.
Explanation
Enable and disable the function of port loopback detection.
Explanation
Enable and disable the function of port loopback detection
control.
Explanation
Enable the debug information of the function module of port
loopback detection. The no operation of this command will
disable the debug information.
Display the state and result of the loopback detection of all
ports, if no parameter is provided; otherwise, display the
state and result of the corresponding ports.
63
Explanation
Configure the loopback-detection control mode (automatic
recovery enabled or not) or recovery time.
Network
Topology
65
Chapter 8
ULDP Function Configuration
8.1 Introduction to ULDP Function
Unidirectional link is a common error state of link in networks, especially in fiber links. Unidirectional link means that only one port of the link can receive messages from the other port, while
the latter one can not receive messages from the former one. Since the physical layer of the link
is connected and works normal, via the checking mechanism of the physical layer, communication problems between the devices can not be found. As shown in Graph, the problem in fiber
connection can not be found through mechanisms in physical layer like automatic negotiation.
SWITCH A
1/0/2
1/0/1
1/0/4
1/0/3
SWITCH B
66
SWITCH A
SWITCH B
1/0/1
1/0/2
1/0/3
SWITCH C
67
Explanation
Globally enable or disable ULDP function.
Explanation
Enable or disable ULDP function on a port.
Explanation
Set the global working mode.
Explanation
Set the working mode of the port.
Explanation
Configure the method to shut down unidirectional link.
Explanation
Configure the interval of Hello messages, ranging from 5 to
100 seconds. The value is 10 seconds by default.
Explanation
Configure the interval of Recovery reset, ranging from 30 to
86400 seconds. The value is 0 second by default.
68
Explanation
Display ULDP information. No parameter means to display
global ULDP information. The parameter specifying a port
will display global information and the neighbor information
of the port.
Enable or disable the debug switch of the state machine
transition information on the specified port.
SWITCH A
PC1
1/0/2
1/0/1
1/0/4
1/0/3
PC2
SWITCH B
Port g1/3, and port g1/4 of SWITCH B are all shut down by ULDP, and there is notification
information on the CRT terminal of PC2.
%Oct 29 11:09:50
to be shutted down!
%Oct 29 11:09:50
%Oct 29 11:09:50
to be shutted down!
%Oct 29 11:09:50
71
Chapter 9
LLDP Function Operation Configuration
9.1 Introduction to LLDP Function
Link Layer Discovery Protocol (LLDP) is a new protocol defined in 802.1ab. It enables neighbor
devices to send notices of their own state to other devices, and enables all ports of every device
to store information about them. If necessary, the ports can also send update information to the
neighbor devices directly connected to them, and those neighbor devices will store the information
in standard SNMP MIBs. The network management system can check the layer-two connection
state from MIB. LLDP won't configure or control network elements or flows, but only report the
configuration of layer-two. Another content of 802.1ab is to utilizing the information provided by
LLDP to find the conflicts in layer-two. IEEE now uses the existing physical topology, interfaces
and Entity MIBs of IETF.
To simplify, LLDP is a neighbor discovery protocol. It defines a standard method for Ethernet
devices, such as switches, routers and WLAN access points, to enable them to notify their existence to other nodes in the network and store the discovery information of all neighbor devices.
For example, the detail information of the device configuration and discovery can both use this
protocol to advertise.
In specific, LLDP defines a general advertisement information set, a transportation advertisement protocol and a method to store the received advertisement information. The device to advertise its own information can put multiple pieces of advertisement information in one LAN data
packet to transport. The type of transportation is the type length value (TLV) field. All devices supporting LLDP have to support device ID and port ID advertisement, but it is assumed that, most
devices should also support system name, system description and system performance advertisement. System name and system description advertisement can also provide useful information
for collecting network flow data. System description advertisement can include data such as the
full name of the advertising device, hardware type of system, the version information of software
operation system and so on.
802.1AB Link Layer Discovery Protocol will make searching the problems in an enterprise
network an easier process and can strengthen the ability of network management tools to discover
and maintain accurate network topology structure.
Many kinds of network management software use Automated Discovery function to trace the
change and condition of topology, but most of them can reach layer-three and classify the devices
into all IP subnets at best. This kind of data are very primitive, only referring to basic events like
the adding and removing of relative devices instead of details about where and how these devices
operate with the network.
72
Layer 2 discovery covers information like which devices have which ports, which switches
connect to other devices and so on, it can also display the routs between clients, switches, routers,
application servers and network servers. Such details will be very meaningful for schedule and
investigate the source of network failure.
LLDP will be a very useful management tool, providing accurate information about network
mirroring, flow data and searching network problems.
Explanation
Globally enable or disable LLDP function.
Explanation
Configure the port-base LLDP function switch.
73
Explanation
Configure the operating state of port LLDP.
Explanation
Configure the intervals of LLDP updating messages as the
specified value or default value.
Explanation
Configure the aging time multiplier of LLDP messages as
the specified value or default value.
Explanation
Configure the sending delay of updating messages as the
specified value or default value.
Explanation
Configure the intervals of sending Trap messages as the
specified value or default value.
Explanation
Enable or disable the Trap function of the port.
74
Explanation
Configure the optional information-sending attribute of the
port as the option value of default values.
10. Configure the size of space to store Remote Table of the port
Command
Port configuration mode
lldp neighbors max-num < value
>
no lldp neighbors max-num
Explanation
Configure the size of space to store Remote Table of the
port as the specified value or default value.
11. Configure the type of operation when the Remote Table of the port is full
Command
Port configuration mode
lldp tooManyNeighbors { discard
| delete }
Explanation
Configure the type of operation when the Remote Table of
the port is full.
Explanation
Display the current LLDP configuration information.
Display the LLDP configuration information of the current
port.
Display the information of all kinds of counters.
Display the information of LLDP neighbors of the current
port.
Display all ports with LLDP debug enabled.
Enable or disable the DEBUG switch.
Enable or disable the DEBUG packet-receiving and sending
function in port or global mode.
75
SWITCH B
76
Chapter 10
Port Channel Configuration
10.1 Introduction to Port Channel
To understand Port Channel, Port Group should be introduced first. Port Group is a group of
physical ports in the configuration level; only physical ports in the Port Group can take part in
link aggregation and become a member port of a Port Channel. Logically, Port Group is not a
port but a port sequence. Under certain conditions, physical ports in a Port Group perform port
aggregation to form a Port Channel that has all the properties of a logical port, therefore it becomes
an independent logical port. Port aggregation is a process of logical abstraction to abstract a set
of ports (port sequence) with the same properties to a logical port. Port Channel is a collection
of physical ports and used logically as one physical port. Port Channel can be used as a normal
port by the user, and can not only add network's bandwidth, but also provide link backup. Port
aggregation is usually used when the switch is connected to routers, PCs or other switches.
SWITCH A
SWITCH B
the lowest bit of target MAC address. The calculation result will decide which port to convey the
traffic. If a port in Port Channel fails, the other ports will undertake traffic of that port through a
traffic allocation algorithm. This algorithm is carried out by the hardware.
Switch offers two methods for configuring port aggregation: manual Port Channel creation and
LACP (Link Aggregation Control Protocol) dynamic Port Channel creation. Port aggregation can
only be performed on ports in full-duplex mode.
For Port Channel to work properly, member ports of the Port Channel must have the same
properties as follows:
All ports are in full-duplex mode.
All Ports are of the same speed.
All ports are Access ports and belong to the same VLAN or are all TRUNK ports, or are all
Hybrid ports.
If the ports are all TRUNK ports or Hybrid ports, then their Allowed VLAN and Native VLAN
property should also be the same.
If Port Channel is configured manually or dynamically on switch, the system will automatically
set the port with the smallest number to be Master Port of the Port Channel. If the spanning tree
function is enabled in the switch, the spanning tree protocol will regard Port Channel as a logical
port and send BPDU frames via the master port.
Port aggregation is closely related with switch hardware. Switch allow physical port aggregation
of any two switches, maximum 14 groups and 8 ports in each port group are supported.
Once ports are aggregated, they can be used as a normal port. Switch have a built-in aggregation interface configuration mode, the user can perform related configuration in this mode just
like in the VLAN and physical interface configuration mode.
79
Explanation
<port-group-
<port-group-
Explanation
<port-group{ active |
Add the ports to the port group and set their mode.
Explanation
<port-
Explanation
Set the system priority of LACP protocol, the no command
restores the default value.
Explanation
Set the port priority in LACP protocol. The no command
restores the default value.
no lacp port-priority
80
Explanation
Set the timeout mode in LACP protocol. The no command
restores the default value.
no lacp timeout
Switch1(Config-If-Ethernet1/1)#exit
Switch1(config)#interface ethernet 1/2
Switch1(Config-If-Ethernet1/2)#port-group 1 mode on
Switch1(Config-If-Ethernet1/2)#exit
Switch1(config)#interface ethernet 1/3
Switch1(Config-If-Ethernet1/3)#port-group 1 mode on
Switch1(Config-If-Ethernet1/3)#exit
Switch1(config)#interface ethernet 1/4
Switch1(Config-If-Ethernet1/4)#port-group 1 mode on
Switch1(Config-If-Ethernet1/4)#exit
Switch2#config
Switch2(config)#port-group 2
Switch2(config)#interface ethernet 1/6
Switch2(Config-If-Ethernet1/6)#port-group 2 mode on
Switch2(Config-If-Ethernet1/6)#exit
Switch2(config)#interface ethernet 1/8-10
Switch2(Config-If-Port-Range)#port-group 2 mode on
Switch2(Config-If-Port-Range)#exit
Configuration result:
Add ports 1, 2, 3, 4 of S1 to port-group1 in order, and we can see a group in on mode is completely joined forcedly, switch in other ends won't exchange LACP PDU to complete aggregation.
Aggregation finishes immediately when the command to add port 1/2 to port-group 1 is entered,
port 1 and port 2 aggregate to be port-channel 1, when port 1/3 joins port-group 1, port-channel 1
of port 1 and 2 are ungrouped and re-aggregate with port 3 to form port-channel 1, when port 1/4
joins port-group 1, port-channel 1 of port 1, 2 and 3 are ungrouped and re-aggregate with port 4
to form port-channel 1. (It should be noted that whenever a new port joins in an aggregated port
group, the group will be ungrouped first and re-aggregated to form a new group.) Now all four
ports in both S1 and S2 are aggregated in on mode and become an aggregated port respectively.
82
Chapter 11
MTU Configuration
11.1 Introduction to MTU
So far the Jumbo (Jumbo Frame) has not reach a determined standard in the industry (including
the format and length of the frame). Normally frames sized within 1519-9000 should be considered
jumbo frame. Networks with jumbo frames will increase the speed of the whole network by 2% to
5%. Technically the Jumbo is just a lengthened frame sent and received by the switch. However
considering the length of Jumbo frames, they will not be sent to CPU. We discard the Jumbo
frames sent to CPU in the packet receiving process.
Explanation
Configure the MTU size of JUMBO frame, enable the receiving/sending function of JUMBO frame. The no command disables
sending and receiving function of MTU frames.
83
Chapter 12
EFM OAM Configuration
12.1 Introduction to EFM OAM
Ethernet is designed for Local Area Network at the beginning, but link length and network scope
is extended rapidly while Ethernet is also applied to Metropolitan Area Network and Wide Area
Network along with development. Due to lack the effectively management mechanism, it affects
Ethernet application to Metropolitan Area Network and Wide Area Network, implementing OAM
on Ethernet becomes a necessary development trend.
There are four protocol standards about Ethernet OAM, they are 802.3ah (EFM OAM), 802.3ag
(CFM), E-LMI and Y.1731. EFM OAM and CFM are set for IEEE organization. EFM OAM works in
data link layer to validly discover and manage the data link status of rock-bottom. Using EFM OAM
can effectively advance management and maintenance for Ethernet to ensure the stable network
operation. CFM is used for monitoring the whole network connectivity and locating the fault in
access aggregation network layer. Compare with CFM, Y.1731 standard set by ITU (International
Telecommunications Union) is more powerful. E-LMI standard set by MEF is only applied to UNI.
So above protocols can be used to different network topology and management, between them
exist the complementary relation.
EFM OAM (Ethernet in the First Mile Operation, Administration and Maintenance) works in
data link layer of OSI model to implement the relative functions through OAM sublayer, figure is
as bleow:
OAM protocol data units (OAMPDU) use destination MAC address 01-80-c2-00-00-02 of protocol, the max transmission rate is 10Pkt/s.
EFM OAM is established on the basis of OAM connection, it provides a link operation management mechanism such as link monitoring, remote fault detection and remote loopback testing, the
simple introduction for EFM OAM in the following:
84
OS
IM
ode
Ap
plic
atio
Pre
sen
tati
on
Ses
sio
Tra
n
spo
rt
Ne
two
Da
rk
ta L
ink
LLC
OA
M(O
ptio
n
MA
C
al)
Ph
ysi
cal
85
Service Provider
Customer
802.3ah
Ethernet in
the First Mile
PE
CE
802.1ah OAMPDU
nection to monitor the link fault in the First Mile with Ethernet access. For user, the connection
between user to telecommunication is the First Mile, for service provider, it is the Last Mile.
Explanation
Configure work mode of EFM OAM, default is active mode.
Enable EFM OAM of port, no command disables EFM OAM
of port.
Configure transmission period of OAMPDU (optional), no
command restores the default value.
Configure timeout of EFM OAM connection, no command
restores the default value.
Explanation
Enable link monitor of EFM OAM, no command disables link
monitor.
Configure the low threshold and window period of errored
symbol period event, no command resotores the default
value. (optional)
87
Command
Port mode
ethernet-oam errored-frame {
threshold low <low-frames> |
window <seconds> }
no ethernet-oam errored-frame {
threshold low | window }
ethernet-oam
errored-frameseconds { threshold low <lowframe-seconds>
|
window
<seconds> }
no ethernet-oam errored-frameseconds {threshold low | window
}
Explanation
Configure the low threshold and window period of errored
frame event, no command resotores the default value. (optional)
Explanation
Enable remote failure detection of EFM OAM (failure means
critical-event or link-fault event of the local), no command
disables the function. (optional)
Configure the high threshold of errored symbol period event,
no command restores the default value. (optional)
88
1/0/1
1/0/1
PE
CE
802.1ah OAMPDU
89
90
Chapter 13
Port Security
13.1 Introduction to Port Security
Port security is a MAC address-based security mechanism for network access controlling. It is
an extension to the existing 802.1x authentication and MAC authentication. It controls the access of unauthorized devices to the network by checking the source MAC address of the received
frame and the access to unauthorized devices by checking the destination MAC address of the
sent frame. With port security, you can define various port security modes to make that a device learns only legal source MAC addresses, so as to implement corresponding network security
management. After port security is enabled, the device detects an illegal frame, it triggers the
corresponding port security feature and takes a pre-defined action automatically. This reduces
user's maintenance workload and greatly enhances system security.
Explanation
Configure port-security of the interface.
Configure the static security MAC of the interface.
Configure the maximum number of the security MAC address allowed by the interface.
91
Command
Port mode
switchport port-security violation
{ protect | restrict | shutdown }
no switchport port-security violation
switchport port-security aging {
static | time <value> | type { absolute | inactivity } }
no switchport port-security violation aging { static | time | type }
Admin mode
clear port-security { all | configured | dynamic | sticky } [[address <mac-addr> | interface
<interface-id>] [vlan <vlan-id> ]]
show port-security [interface
<interface-id>] [address | vlan]
Explanation
When exceeding the maximum number of the configured
MAC addresses, MAC address accessing the interface does
not belongs to this interface in MAC address table or a MAC
address is configured to several interfaces in same VLAN,
both of them will violate the security of the MAC address.
Enable port-security aging entry of the interface, specify aging time or aging type.
HOST A
1/0/1
Network
Switch
HOST B
93
Chapter 14
DDM Configuration
14.1 Introduction to DDM
14.1.1 Brief Introduction to DDM
DDM (Digital Diagnostic Monitor) makes the detailed digital diagnostic function standard in SFF8472 MSA. It set that the parameter signal is monitored and make it to digitize on the circuit board
of the inner module. After that, providing the demarcated result or the digitize measure result and
the demarcate parameter which are saved in the standard memory framework, so as to expediently
read by serial interface with double cables.
Normally, intelligent fiber modules support Digital Diagnostic function. Network management
units is able to monitor the parameters (temperature, voltage, bias current, tx power and rx power)
of the fiber module to obtain theirs thresholds and the real-time state of the current fiber module
by the inner MCU of the fiber module. That is able to help the network management units to locate
the fault in the fiber link, reduce the maintenance workload and enhance the system reliability.
DDM applications are shown in the following:
1. Module lifetime forecast
Monitoring the bias current is able to forecast the laser lifetime. Administrator is able to find
some potential problems by monitoring voltage and temperature of the module.
1. High Vcc voltage will result in the breakdown CMOS, low Vcc voltage will result in the abnormity work.
2. High rx power will damage the receiving module, low rx power will result that the receiving
module cannot work normally.
3. High temperature will result in the fast aging of the hardware.
4. Monitoring the received fiber power to monitor the capability of the link and the remote switch.
2. Fault location
In fiber link, locating the fault is important to the fast overload of the service, fault isolation is
able to help administrator to fast locate the location of the link fault within the module (local module
or remote module) or on the link, it also reduce the time for restoring the fault of the system.
Analyzing warning and alarm status of real-time parameters (temperature, voltage, bias current, tx power and rx power) can fast locate the fault through Digital Diagnostic function. Besides,
the state of Tx Fault and Rx LOS is important for analyzing the fault.
94
3. Compatibility verification
Compatibility verification is used to analyze whether the environment of the module accords the
data manual or it is compatible with the corresponding standard, because the module capability
is able to be ensured only in the compatible environment. Sometimes, environment parameters
exceed the data manual or the corresponding standard, it will make the falling of the module
capability that result in the transmission error.
Environment is not compatible with the module are as below:
1. Voltage exceeds the set range
2. Rx power is overload or is under the sensitivity of the transceiver
3. Temperature exceeds the range of the running temperature
95
Explanation
Set the threshold defined by the user.
Explanation
Set the interval of the transceiver monitor. The no command
sets the interval to be the default interval of 15 minutes.
96
Explanation
Set whether the transceiver monitoring is enabled. Only the
port enables the transceiver monitoring, the system records
the abnormity state. After the port disables the function, the
abnormity information will be clear.
Explanation
Show the information of the transceiver monitoring, including the last threshold-violation informatijon, the interval of
the current transceiver monitoring and whether the port enables the transceiver monitoring.
Explanation
Clear the threshold violation of the transceiver monitor.
Bias(mA)
6.11
6.11
RX Power(dBM)
-30.54(A-)
-20.54(W-)
TX Power(dBM)
-6.01
-6.02
b) Show the information of the specified interface. (N/A means no fiber module is inserted or
does not support the fiber module), for example:
Switch#show transceiver interface ethernet 1/21-22;23
Interface Temp Voltage(V) Bias(mA) RX Power(dBM) TX Power(dBM)
1/21
33
3.31
6.11
-30.54(A-)
-6.01
97
1/22
1/23
N/A
33
N/A
5.00(W+)
N/A
6.11
N/A
-20.54(W-)
N/A
-6.02
c) Show the detailed information, including base information, parameter value of the real-time
monitoring, warning, alarm, abnormity state and threshold information, for example:
Switch#show transceiver interface ethernet 1/21-22;24 detail
Ethernet 1/21 transceiver detail information:
Base information:
SFP found in this port, manufactured by company, on Sep 29 2010.
Type is 1000BASE-SX, Link length is 550 m for 50um Multi-Mode Fiber.
Link length is 270 m for 62.5um Multi-Mode Fiber.
Nominal bit rate is 1300 Mb/s, Laser wavelength is 850 nm.
Brief alarm information:
RX loss of signal
Voltage high
RX power low
Detail diagnostic and threshold information:
Diagnostic
Threshold
Realtime
High Alarm Low Alarm High Warn Low Warn
--------- ---------- --------- --------- -------Temperature
33
70
0
70
0
Voltage(V)
7.31(A+)
5.00
0.00
5.00
0.00
Bias current(mA) 6.11(W+)
10.30
0.00
5.00
0.00
RX Power(dBM)
-30.54(A-) 9.00
-25.00
9.00
-25.00
TX Power(dBM)
-6.01
9.00
-25.00
9.00
-25.00
Ethernet 1/22 transceiver detail information: N/A
Ethernet 1/24 transceiver detail information:
Base information:
SFP found in this port, manufactured by company, on Sep 29 2010.
Type is 1000BASE-SX, Link length is 550 m for 50um Multi-Mode Fiber.
Link length is 270 m for 62.5um Multi-Mode Fiber.
Nominal bit rate is 1300 Mb/s, Laser wavelength is 850 nm.
Brief alarm information: N/A
Detail diagnostic and threshold information: N/A
Example 2:
Ethernet 1/21 is inserted the fiber module with DDM. Configure the threshold of the fiber module
after showing the DDM information.
Step 1: Show the detailed DDM information.
Switch#show transceiver interface ethernet 1/21 detail
Ethernet 1/21 transceiver detail information:
Base information:
Brief alarm information:
98
RX loss of signal
Voltage high
RX power low
Detail diagnostic and threshold information:
Diagnostic
Threshold
Realtime
High Alarm Low Alarm High Warn
---------- ---------- --------- --------Temperature
33
70
0
70
Voltage(V)
7.31(A+)
5.00
0.00
5.00
Bias current(mA) 6.11(W+)
10.30
0.00
5.00
RX Power(dBM)
-30.54(A-) 9.00
-25.00
9.00
TX Power(dBM)
-13.01
9.00
-25.00
9.00
Low Warn
--------0
0.00
0.00
-25.00
-25.00
Step 2: Configure the tx-power threshold of the fiber module, the low-warning threshold is -12,
the low-alarm threshold is -10.00.
Switch#config
Switch(config)#interface ethernet 1/21
Switch(config-if-ethernet1/21)#transceiver threshold tx-power low-warning -12
Switch(config-if-ethernet1/21)#transceiver threshold tx-power low-alarm -10.00
Step 3: Show the detailed DDM information of the fiber module. The alarm uses the threshold
configured by the user, the threshold configured by the manufacturer is labeled with the bracket.
There is the alarm with A- due to -13.01 is less than -12.00.
Switch#show transceiver interface ethernet 1/21 detail
Ethernet 1/21 transceiver detail information:
Base information:
Brief alarm information:
RX loss of signal
Voltage high
RX power low
TX power low
Detail diagnostic and threshold information:
Diagnostic
Threshold
Realtime
High Alarm Low Alarm
High Warn
---------- ---------- ------------- --------Temperature
33
70
0
70
Voltage(V)
7.31(A+)
5.00
0.00
5.00
Bias current(mA) 6.11(W+)
10.30
0.00
5.00
RX Power(dBM)
-30.54(A-) 9.00
-25.00
9.00
TX Power(dBM)
-13.01(A-) 9.00
-12.00(-25.00) 9.00
Low Warn
--------0
0.00
0.00
-25.00
-10.00(-25.00)
Example 3:
Ethernet 1/21 is inserted the fiber module with DDM. Enable the transceiver monitoring of the
port after showing the transceiver monitoring of the fiber module.
Step 1: Show the transceiver monitoring of the fiber module. Both ethernet 1/21 and ethernet
1/22 do not enable the transceiver monitoring, its interval is set to 30 minutes.
99
Ensure that SNMP configuration is valid, or else the warning event cannot inform the network
management system.
Because only some boards and box switches support SFP with DDM or XFP with DDM,
ensure the used board and switch support the corresponding function.
When using show transceiver command or show transceiver detail command, it cost much
time due to the switch will check all ports, so it is recommended to query the monitoring
information of the transceiver on the specified port.
Ensure the threshold defined by the user is valid. When any threshold is error, the transceiver
will give an alarm according to the default setting automatically.
101
Chapter 15
LLDP-MED
15.1 Introduction to LLDP-MED
LLDP-MED (Link Layer Discovery Protocol-Media Endpoint Discovery) based on 802.1AB LLDP
(Link Layer Discovery Protocol) of IEEE. LLDP provides a standard link layer discovery mode, it
sends local device information (including its major capability, management IP address, device ID
and port ID) as TLV (type/length/value) triplets in LLDPDU (Link Layer Discovery Protocol Data
Unit) to the direct connection neighbors. The device information received by the neighbors will be
stored with a standard management information base (MIB). This allows a network management
system to quickly detect and identify the communication status of the link.
In 802.1AB LLDP, there is no transmission and management about the voice device information. To deploy and manage voice device expediently, LLDP-MED TLVs provide multiple information, such as PoE (Power over Ethernet), network policy, and the location information of the
emergent telephone service.
Explanation
Configure the specified port to send all LLDP-MED TLVs.
The no command disables the function.
Configure the specified port to send LLDP-MED Capability
TLV. The no command disables the capability.
Configure the specified port to send LLDP-MED Network
Policy TLV. The no command disables the capability.
102
Command
Explanation
Port mode
lldp transmit med tlv inventory
Configure the port to send LLDP-MED Inventory Manageno lldp transmit med tlv inventory ment TLVs. The no command disables the capability.
network policy { voice | voice- Configure network policy of the port, including VLAN ID, the
signaling | guest-voice | guest- supported application (such as voice and video), the applivoice-signaling | softphone- cation priority and the used policy, and so on.
voice
|
video-conferencing
| streaming-video | videosignaling } [status { enable |
disable }] [tag { tagged | untagged }] [vid { <vlan-id> |
dot1p }] [cos <cos-value>] [dscp
<dscp-value> ]
no network policy { voice
| voice-signaling | guestvoice | guest-voice-signaling
| softphone-voice | videoconferencing | streaming-video |
video-signaling }
civic location { dhcp server | Configure device type and country code of the location with
switch | endpointDev } <country- Civic Address LCI format and enter Civic Address LCI adcode>
dress mode. The no command cancels all configurations of
no civic location
the location with Civic Address LCI format.
ecs location <tel-number>
Configure the location with ECS ELIN format on the port, the
no ecs location
no command cancels the configured location.
lldp med trap { enable | disable } Enable or disable LLDP-MED trap for the specified port.
Civic Address LCI address mode
{
description-language
| Configure the detailed address after enter Civic Address LCI
province-state | city | county address mode of the port.
| street | locationNum | location |
floor | room | postal | otherInfo }
<address>
no { description-language |
province-state | city | county |
street | locationNum | location |
floor | room | postal | otherInfo }
Global mode
lldp med fast count <value>
When the fast LLDP-MED startup mechanism is enabled, it
no lldp med fast count
needs to fast send the LLDP packets with LLDP-MED TLV,
this command is used to set the value of the fast sending
packets, the no command restores the default value.
103
Command
Admin mode
show lldp
show lldp [ interface ethernet
<IFNAME> ]
show lldp neighbors [ interface
ethernet <IFNAME> ]
Explanation
Show the configuration of the global LLDP and LLDP-MED.
Show the configuration of LLDP and LLDP-MED on the current port.
Show LLDP and LLDP-MED configuration of the neighbors.
1/0/2
MED device
1/0/1
Switch B
106
Chapter 16
BPDU-Tunnel Configuration
16.1 Introduction to bpdu-tunnel
BPDU Tunnel is a Layer 2 tunnel technology. It allows Layer 2 protocol packets of geographically
dispersed private network users to be transparently transmitted over specific tunnels across a
service provider network.
107
PE1
PE2
ISP Network
CE1
CE2
User A network 1
VLAN 100
User A network 2
VLAN 100
Explanation
Configure or cancel the tunnel MAC address globally.
Explanation
Enable the port to support the tunnel, the no command disables the function.
With BPDU Tunnel, Layer 2 protocol packets from user's networks can be passed through over
the service provider network in the following work flow:
1. After receiving a Layer 2 protocol packet from network 1 of user A, PE 1 in the service
provider network encapsulates the packet, replaces its destination MAC address with a specific multicast MAC address, and then forwards the packet in the service provider network.
2. The encapsulated Layer 2 protocol packet (called BPDU Tunnel packet) is forwarded to PE 2
at the other end of the service provider network, which de-encapsulates the packet, restores
the original destination MAC address of the packet, and then sends the packet to network 2
of user A.
bpdu-tunnel configuration of edge switches PE1 and PE2 in the following:
PE1 configuration:
PE1(config)# bpdu-tunnel dmac 01-02-03-04-05-06
PE1(config-if-ethernet1/1)# bpdu-tunnel stp
PE1(config-if-ethernet1/1)# bpdu-tunnel lacp
PE1(config-if-ethernet1/1)# bpdu-tunnel uldp
PE1(config-if-ethernet1/1)# bpdu-tunnel gvrp
PE1(config-if-ethernet1/1)# bpdu-tunnel dot1x
PE2 configuration:
PE2(config)# bpdu-tunnel dmac 01-02-03-04-05-06
PE2(config-if-ethernet1/1)# bpdu-tunnel stp
PE2(config-if-ethernet1/1)# bpdu-tunnel lacp
PE2(config-if-ethernet1/1)# bpdu-tunnel uldp
PE2(config-if-ethernet1/1)# bpdu-tunnel gvrp
PE2(config-if-ethernet1/1)# bpdu-tunnel dot1x
109
Chapter 17
EEE Energy-saving Configuration
17.1 Introduction to EEE Energy-saving
eee is Energy Efficient Ethernet. After the port is enabled this function, switch will detect the port
state automatically. If the port is free and there is no data transmission, this port will change to the
power saving mode and it will cut down the power of the port to save the energy.
Explanation
Enable the energy-saving function of the port; the no command disables the energy-saving function of the port.
110
Part III
VLAN and MAC Table Configuration
111
Chapter 18
VLAN Configuration
18.1 Introduction to VLAN
VLAN (Virtual Local Area Network) is a technology that divides the logical addresses of devices
within the network to separate network segments basing on functions, applications or management requirements. By this way, virtual workgroups can be formed regardless of the physical
location of the devices. IEEE announced IEEE 802.1Q protocol to direct the standardized VLAN
implementation, and the VLAN function of switch is implemented following IEEE 802.1Q.
The key idea of VLAN technology is that a large LAN can be partitioned into many separate
broadcast domains dynamically to meet the demands.
Switch
Server
Switch
Server
Switch
Server
VLAN1
PC
PC
PC
VLAN2
Printer
PC
PC
VLAN3
113
Explanation
Create/delete VLAN or enter VLAN Mode
Explanation
Set or delete VLAN name.
Explanation
Assign Switch ports to VLAN.
Explanation
Set the current port as Trunk, Access or Hybrid port.
Explanation
Set/delete VLAN allowed to be crossed by
Trunk. The no command restores the default setting.
Set/delete PVID for Trunk port.
Explanation
Add the current port to the specified VLAN. The no command restores the default setting.
114
Explanation
Set/delete the VLAN which is allowed by Hybrid port with tag or
untag mode.
Set/delete PVID of the port.
Explanation
Enable/Disable VLAN ingress rules.
Explanation
Configure current VLAN to Private VLAN.
The no command deletes private VLAN.
Explanation
Set/delete Private VLAN association.
Explanation
Specify internal VLAN ID.
115
VLAN100
PC
PC
VLAN200
PC
PC
PC
Switch A
Trunk Link
Switch B
PC
PC
VLAN2
PC
VLAN100
PC
PC
PC
VLAN200
Configuration description
Site A and site B switch port 2-4.
Site A and site B switch port 5-7.
Site A and site B switch port 8-10.
Site A and site B switch port 11.
Connect the Trunk ports of both switches for a Trunk link to convey the cross-switch VLAN
traffic; connect all network devices to the other ports of corresponding VLANs.
In this example, port 1 and port 12 are spared and can be used for management port or for
other purposes.
The configuration steps are listed below:
Switch A:
Switch(config)#vlan 2
Switch(Config-Vlan2)#switchport interface ethernet 1/2-4
Switch(Config-Vlan2)#exit
Switch(config)#vlan 100
Switch(Config-Vlan100)#switchport interface ethernet 1/5-7
Switch(Config-Vlan100)#exit
Switch(config)#vlan 200
116
Network
Switch A
PC
Switch B
PC
Type
Access
PVID
10
Hybrid
10
Hybrid
Hybrid
118
Chapter 19
Dot1q-tunnel Configuration
19.1 Introduction to Dot1q-tunnel
Dot1q-tunnel is also called QinQ (802.1Q-in-802.1Q), which is an expansion of 802.1Q. Its dominating idea is encapsulating the customer VLAN tag (CVLAN tag) to the service provider VLAN
tag (SPVLAN tag). Carrying the two VLAN tags the packet is transmitted through the backbone
network of the ISP internet, so to provide a simple layer-2 tunnel for the users. It is simple and
easy to manage, applicable only by static configuration, and especially adaptive to small office
network or small scale metropolitan area network using layer-3 switch as backbone equipment.
On the customer port
Trunk VLAN 200-300
CE1
PE1
ISP Network
Customer
networks 1
Trunk
Trunk
PE2
CE2
Customer
networks 2
On the customer port
Trunk VLAN 200-300
119
identical to the one sent by CE1. For the user, the role the operator network plays between PE1
and PE2, is to provide a reliable layer-2 link.
The technology of Dot1q-tuunel provides the ISP internet the ability of supporting many client
VLANs by only one VLAN of theirselves. Both the ISP internet and the clients can configure their
own VLAN independently.
It is obvious that, the dot1q-tunnel function has got following characteristics:
Applicable through simple static configuration, no complex configuration or maintenance to
be needed.
Operators will only have to assign one SPVID for each user, which increases the number of
concurrent supportable users; while the users has got the ultimate freedom in selecting and
managing the VLAN IDs (select within 1~4096 at user's will).
The user network is considerably independent. When the ISP internet is upgrading their
network, the user networks do not have to change their original configuration.
Detailed description on the application and configuration of dot1q-tunnel will be provided in this
section.
Explanation
Enter/exit the dot1q-tunnel mode on the port.
Explanation
Configure the protocol type on TRUNK port.
to public network, the TPID of the connected equipment is 9100; port1 of PE2 is connected to
CE2, port10 is connected to public network.
Configuration Item
VLAN3
dot1q-tunnel
tpid
Configuration Explanation
Port1 of PE1 and PE2.
Port1 of PE1 and PE2.
9100
121
Chapter 20
Selective QinQ Configuration
20.1 Introduction to Selective QinQ
Selective QinQ is an enhanced application for dot1q tunnel function. It is able to tag packets
(they are received by the same port) with different outer VLAN tags based on different inner VLAN
tags according to users requirement, so it is able to implement that packets of different types are
assigned to different VLAN by selecting different transmission path.
Explanation
Configure/delete the port mapping relation of the inner
tag and the outer tag for selective QinQ.
Explanation
Enable/disable selective QinQ of the port.
122
SP
VLAN1000/2000
Switch B
E1/9
E1/2
E1/1
E1/9
Switch A
E1/1
VLAN 100-200
E1/2
VLAN 201-300
VLAN 100-200
VLAN 201-300
124
Chapter 21
VLAN-translation Configuration
21.1 Introduction to VLAN-translation
VLAN translation, as one can tell from the name, which translates the original VLAN ID to new
VLAN ID according to the user requirements so to exchange data across different VLANs. VLAN
translation is classified to ingress translation and egress translation, respectively switch over the
VLAN ID at the ingress or the egress.
Application and configuration of VLAN translation will be explained in detail in this section.
The access ports of the switch can not support this function.
Explanation
Enter/exit the port VLAN-translation mode.
Explanation
Add/delete a VLAN-translation
relation.
125
Explanation
Configure the VLAN-translation packet
dropped on port if there is any failure.
Explanation
Show the related configuration of vlan-translation.
PE1
ISP Network
Trunk
Customer
networks 1
Trunk
CE2
PE2
Customer
networks 2
On the customer port
Trunk VLAN 20
Configuration Explanation
Port1/0/1 of PE1 and PE2.
Port1/0/1 and Port1/0/10 of PE1 and PE2.
switch(Config-Ethernet1/0/1)#vlan-translation 3 to 20 out
switch(Config-Ethernet1/0/1)#exit
switch(Config)#interface ethernet 1/0/10
switch(Config-Ethernet1/0/10)#switchport mode trunk
switch(Config-Ethernet1/0/10)#exit
127
Chapter 22
Multi-to-One VLAN Translation
Configuration
22.1 Introduction to Multi-to-One VLAN Translation
Multi-to-One VLAN translation, it translates the original VLAN ID into the new VLAN ID according
to user's requirement on uplink traffic, and restores the original VLAN ID on downlink traffic.
Application and configuration of Multi-to-One VLAN translation will be explained in detail in this
section.
The access ports of the switch can not support this function.
Explanation
Configure/delete Multi-to-One
VLAN translation.
Explanation
Show the related configuration of Multi-to-One VLAN translation.
128
UserA
VID=1
UserB
VID=2
UserB
VID=3
UserD
VID=1
UserE
VID=2
UserF
VID=3
Configuration Explanation
Switch1, Switch2
Downlink port 1/0/1 and uplink port 1/0/5 of Switch1 and
Switch 2
Downlink port 1/0/1 of Switch1 and Switch2
The same MAC address should not exist in the original and the translated VLAN.
Check whether the hardware resource of the chip is able to ensure all clients to work normally.
Limit learning of MAC address may affect Multi-to-One VLAN Translation.
Multi-to-One VLAN Translation should be enabled after MAC learning.
130
Chapter 23
Dynamic VLAN Configuration
23.1 Introduction to Dynamic VLAN
The dynamic VLAN is named corresponding to the static VLAN (namely the port based VLAN).
Dynamic VLAN supported by the switch includes MAC-based VLAN, IP-subnet-based VLAN and
Protocol-based VLAN. Detailed description is as follows:
The MAC-based VLAN division is based on the MAC address of each host, namely every host
with a MAC address will be assigned to certain VLAN. By the means, the network user will maintain
his membership in his belonging VLAN when moves from a physical location to another. As we
can see the greatest advantage of this VLAN division is that the VLAN does not have to be reconfigured when the user physic location change, namely shift from one switch to another, which
is because it is user based, not switch port based.
The IP subnet based VLAN is divided according to the source IP address and its subnet mask of
every host. It assigns corresponding VLAN ID to the data packet according to the subnet segment,
leading the data packet to specified VLAN. Its advantage is the same as that of the MAC-based
VLAN: the user does not have to change configuration when relocated.
The VLAN is divided by the network layer protocol, assigning different protocol to different
VLANs. This is very attractive to the network administrators who wish to organize the user by
applications and services. Moreover the user can move freely within the network while maintaining
his membership. Advantage of this method enables user to change physical position without
changing their VLAN residing configuration, while the VLAN can be divided by types of protocols
which is important to the network administrators. Further, this method has no need of added frame
label to identify the VLAN which reduce the network traffic.
Notice: Dynamic VLAN needs to associate with Hybrid attribute of the ports to work, so the
ports that may be added to a dynamic VLAN must be configured as Hybrid port.
Explanation
Enable/disable the MAC-based VLAN function
on the port.
Explanation
Configure the specified VLAN to MAC VLAN; the no mac-vlan
command cancels the MAC VLAN configuration of this VLAN.
3. Configure the correspondence between the MAC address and the VLAN
Command
Global mode
mac-vlan mac <mac-address> vlan <vlanid> priority <priority-id>
no mac-vlan { mac <mac-address> | all }
Explanation
Add/delete the correspondence between the
MAC address and the VLAN, namely specified
MAC address join/leave specified VLAN.
Explanation
Enable/disable the port IP-subnet-base VLAN
function on the port.
Explanation
Add/delete the correspondence between
the IP subnet and the VLAN, namely specified IP subnet joins/leaves specified VLAN.
132
Explanation
Add/delete the correspondence
between the Protocols and the
VLAN, namely specified protocol
joins/leaves specified VLAN.
Explanation
Configure the priority of the dynamic VLAN.
Switch
PC
PC
Switch
PC
VLAN100
PC
PC
PC
VLAN200
Printer
PC
PC
VLAN300
M
Configuration Explanation
Global configuration on Switch A, Switch B, Switch C.
133
For example, M at E1/0/1 of SwitchA, then the configuration procedures are as follows:
Switch A:
SwitchA(Config)#mac-vlan mac f8-f0-82-11-22-33 vlan 100 priority 0
SwitchA(Config)#interface ethernet 1/0/1
SwitchA(Config-Ethernet1/0/1)#swportport mode hybrid
SwitchA(Config-Ethernet1/0/1)#swportport hybrid allowed vlan 100 untagged
Switch B:
SwitchB(Config)#mac-vlan mac f8-f0-82-11-22-33 vlan 100 priority 0
SwitchB(Config)#exit
Switch C:
SwitchC(Config)#mac-vlan mac f8-f0-82-11-22-33 vlan 100 priority 0
SwitchC(Config)#exit
Ping 192.168.1.200
Ping 192.168.1.100
Dynamic
VLAN
192.168.1.100/24
192.168.1.200/24
134
Chapter 24
GVRP Configuration
24.1 Introduction to GVRP
GVRP, i.e. GARP VLAN Registration Protocol, is an application of GARP (Generic Attribute Registration Protocol). GARP is mainly used to establish an attribute transmission mechanism to
transmit attributes, so as to ensure protocol entities registering and deregistering the attribute.
According to different transmission attributes, GARP can be divided to many application protocols, such as GMRP and GVRP. Therefore, GVRP is a protocol which transmits VLAN attributes
to the whole layer 2 network through GARP protocol.
Device C
VLAN 100-1000
Device A
VLAN 100-1000
Device B
Device D
Device F
Device G
Device E
135
Explanation
Configure leaveall, join and leave timer for
GVRP.
Explanation
Enable/disable GVRP function of port.
Explanation
Enable/disable the global GVRP function of
port.
136
PC
Switch B
Switch C
PC
Configuration description
Port 2-6 of Switch A and C.
Port 11 of Switch A and C, Port 10, 11 of Switch B.
Switch A, B, C.
Port 11 of Switch A and C, Port 10, 11 of Switch B.
Connect two workstations to the VLAN100 ports in switch A and B, connect port 11 of Switch
A to port 10 of Switch B, and port 11 of Switch B to port 11 of Switch C.
The configuration steps are listed below:
Switch A:
Switch(config)#gvrp
Switch(config)#vlan 100
Switch(Config-Vlan100)#switchport interface ethernet 1/2-6
Switch(Config-Vlan100)#exit
Switch(config)#interface ethernet 1/11
Switch(Config-If-Ethernet1/11)#switchport mode trunk
Switch(Config-If-Ethernet1/11)#gvrp
Switch(Config-If-Ethernet1/11)#exit
Switch B:
Switch(config)#gvrp
Switch(config)#interface ethernet 1/10
Switch(Config-If-Ethernet1/10)#switchport mode trunk
Switch(Config-If-Ethernet1/10)#gvrp
Switch(Config-If-Ethernet1/10)#exit
137
138
Chapter 25
Voice VLAN Configuration
25.1 Introduction to Voice VLAN
Voice VLAN is specially configured for the user voice data traffic. By setting a Voice VLAN and
adding the ports of the connected voice equipments to the Voice VLAN, the user will be able
to configure QoS (Quality of service) service for voice data, and improve the voice data traffic
transmission priority to ensure the calling quality.
The switch can judge if the data traffic is the voice data traffic from specified equipment according to the source MAC address field of the data packet entering the port. The packet with the
source MAC address complying with the system defined voice equipment OUI (Organizationally
Unique Identifier) will be considered the voice data traffic and transmitted to the Voice VLAN.
The configuration is based on MAC address, acquiring a mechanism in which every voice
equipment transmitting information through the network has got its unique MAC address. VLAN
will trace the address belongs to specified MAC. By This means, VLAN allows the voice equipment
always belong to Voice VLAN when relocated physically. The greatest advantage of the VLAN is
the equipment can be automatically placed into Voice VLAN according to its voice traffic which will
be transmitted at specified priority. Meanwhile, when voice equipment is physically relocated, it
still belongs to the Voice VLAN without any further configuration modification, which is because it
is based on voice equipment other than switch port.
Notice: Voice VLAN needs to associate with Hybrid attribute of the ports to work, so the ports
that may be added to Voice VLAN must be configured as Hybrid port.
139
Explanation
Set/cancel the VLAN as a Voice VLAN
Explanation
Specify certain voice equipment
join/leave the Voice VLAN.
Explanation
Enable/disable the Voice VLAN function on the port
IP
IP
IPphone1
IPphone2
Configuration Explanation
Global configuration on the Switch.
140
Configuration procedure:
Switch 1:
Switch(config)#vlan 100
Switch(Config-Vlan100)#exit
Switch(config)#voice-vlan vlan 100
Switch(config)#voice-vlan mac f8-f0-82-11-22-33 mask 255 priority 5 name company
Switch(config)#voice-vlan mac f8-f0-82-11-22-55 mask 255 priority 5 name company
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport mode trunk
Switch(Config-If-Ethernet1/0/10)#exit
switch(Config)#interface ethernet 1/0/1
switch(Config-If-Ethernet1/0/1)#switchport mode hybrid
switch(Config-If-Ethernet1/0/1)#switchport hybrid allowed vlan 100 untag
switch(Config-If-Ethernet1/0/1)#exit
switch(Config)#interface ethernet 1/0/2
switch(Config-If-Ethernet1/0/2)#switchport mode hybrid
switch(Config-If-Ethernet1/0/2)#switchport hybrid allowed vlan 100 untag
switch(Config-If-Ethernet1/0/2)#exit
141
Chapter 26
MAC Table Configuration
26.1 Introduction to MAC Table
MAC table is a table identifies the mapping relationship between destination MAC addresses and
switch ports. MAC addresses can be categorized as static MAC addresses and dynamic MAC
addresses. Static MAC addresses are manually configured by the user, have the highest priority
and are permanently effective (will not be overwritten by dynamic MAC addresses); dynamic MAC
addresses are entries learnt by the switch in data frame forwarding, and is effective for a limited
period. When the switch receives a data frame to be forwarded, it stores the source MAC address
of the data frame and creates a mapping to the destination port. Then the MAC table is queried for
the destination MAC address, if hit, the data frame is forwarded in the associated port, otherwise,
the switch forwards the data frame to its broadcast domain. If a dynamic MAC address is not learnt
from the data frames to be forwarded for a long time, the entry will be deleted from the switch MAC
table.
There are two MAC table operations:
1. Obtain a MAC address.
2. Forward or filter data frame according to the MAC table.
142
2. At the same time, the switch learns the message is destined to 00-01-33-33-33-33, as the
MAC table contains only a mapping entry of MAC address 00-01-11-11-11-11 and port1/5,
and no port mapping for 00-01-33-33-33-33 present, the switch broadcast this message to
all the ports in the switch (assuming all ports belong to the default VLAN1).
Switch A
Port 5
PC1
MAC: 00-01-11-11-11-11
PC2
MAC: 00-01-22-22-22-22
Port 12
PC4
MAC: 00-01-44-44-44-44
PC3
MAC: 00-01-33-33-33-33
Port number
1/5
1/5
1/12
1/12
Entry added by
Dynamic learning
Static configuration
Dynamic learning
Static configuration
143
Explanation
Configure the MAC address aging-time.
144
Explanation
Configure static MAC entries, static
multicast MAC entries, filter address
entires.
Explanation
Clear the dynamic address table.
Port 5
PC1
MAC: 00-01-11-11-11-11
PC2
MAC: 00-01-22-22-22-22
Port 12
PC4
MAC: 00-01-44-44-44-44
PC3
MAC: 00-01-33-33-33-33
145
146
Explanation
Enable MAC address binding function for the port and lock
the port. When a port is locked, the MAC address learning function for the port will be disabled: the 'no switchport
port-security' command disables the MAC address binding
function for the port, and restores the MAC address learning
function for the port.
Explanation
Lock the port, then MAC addresses learned will be disabled.
The 'no switchport port-security lock' command restores the
function.
Convert dynamic secure MAC addresses learned by the port
to static secure MAC addresses.
Enable port locking timer function; the 'no switchport portsecurity timeout' restores the default setting.
Add static secure MAC address; the 'no switchport portsecurity mac-address' command deletes static secure MAC
address.
147
Explanation
Set the maximum number of secure MAC addresses for a
port; the 'no switchport port-security maximum' command
restores the default value.
Set the violation mode for the port; the 'no switchport portsecurity violation' command restores the default setting.
Explanation
Enable the monitor function for MAC, if a MAC is added or
deleted, the system will report this monitored event; the no
command will cancel this function.
Set the MAC monitor interval to count the added and deleted
MAC in time, and send out them with trap message.
Enable or disable mac notification trap passthrough.
148
Explanation
Configure or cancel the global snmp MAC notification.
Explanation
Configure or cancel the global MAC notification.
149
Explanation
Configure the interval for sending the MAC address notification, the no command restores the default interval.
Explanation
Configure the history table size, the no command restores
the default value.
Explanation
Configure or cancel the trap type of MAC notification supported by the port.
Explanation
Show the configuration and the data of MAC notification.
Explanation
Clear the statistics of MAC notification trap.
151
Part IV
MSTP Configuration
152
Chapter 27
MSTP Configuration
27.1 Introduction to MSTP
The MSTP (Multiple STP) is a new spanning-tree protocol which is based on the STP and the
RSTP. It runs on all the bridges of a bridged-LAN. It calculates a common and internal spanning
tree (CIST) for the bridge-LAN which consists of the bridges running the MSTP, the RSTP and
the STP. It also calculates the independent multiple spanning-tree instances (MSTI) for each MST
domain (MSTP domain). The MSTP, which adopts the RSTP for its rapid convergence of the
spanning tree, enables multiple VLANs to be mapped to the same spanning-tree instance which
is independent to other spanning-tree instances. The MSTP provides multiple forwarding paths
for data traffic and enables load balancing. Moreover, because multiple VLANs share a same
MSTI, the MSTP can reduce the number of spanning-tree instances, which consumes less CPU
resources and reduces the bandwidth consumption.
Root
Root
MST
REGION
E
Explanation
Enable/Disable MSTP.
155
Port Mode
spanning-tree mcheck
Explanation
Set bridge priority for specified instance.
Configure currently port whether running rootguard in specified instance, configure the rootguard port can't turn to root port.
Configure currently port whether running rootguard in instance 0, configure the rootguard port
can't turn to root port.
Enable loopguard function on specified instance,
the no command disables this function.
Explanation
Enter MSTP region mode. The no command restores the default setting.
Display the information of the current running
system.
Create Instance and set mapping between VLAN
and Instance.
Set MSTP region name.
Set MSTP region revision level.
156
abort
exit
no
4. Configure MSTP time parameters
Command
Global Mode
spanning-tree forward-time <time>
no spanning-tree forward-time
spanning-tree hello-time <time>
no spanning-tree hello-time
spanning-tree maxage <time>
no spanning-tree maxage
spanning-tree max-hop <hop-count>
no spanning-tree max-hop
Explanation
Set the value for switch forward delay time.
Set the Hello time for sending BPDU messages.
Set Aging time for BPDU messages.
Set Maximum number of hops of BPDU messages in the MSTP region.
Explanation
Set the port link type.
Explanation
Configure the format of port spanning-tree packet, standard format is provided by IEEE, privacy is compatible with
CISCO and auto means the format is determined by checking the received packet.
Explanation
Set the port path cost.
157
spanning-tree port-priority
no spanning-tree port-priority
spanning-tree rootguard
no spanning-tree rootguard
Global Mode
spanning-tree
transmit-holdcount <tx-hold-count-value>
no spanning-tree transmit-holdcount
spanning-tree cost-format {
dot1d | dot1t }
Explanation
Set the port to use the authentication string of partner port.
The no command restores to use the generated string.
Port Mode
spanning-tree tcflush { enable |
disable | protect }
no spanning-tree tcflush
Explanation
Enable: the spanning-tree flush once the topology changes.
Disable: the spanning tree don't flush when the topology
changes.
Protect: the spanning-tree flush not more than one time every ten seconds.
The no command restores to default setting, enable flush
once the topology changes.
Configure the port flush mode.
The no command restores to use the global configured flush
mode.
158
2X
3X
3
4
SW2
SW3
7
6X
7X
5X
SW4
Route Cost
Port Priority
Bridge Name
Bridge MAC
Bridge Priority
port 1
port 2
port 3
port 4
port 5
port 6
port 7
port 1
port 2
port 3
port 4
port 5
port 6
port 7
SW1
...00-00-01
32768
128
128
200000
200000
SW2
...00-00-02
32768
128
128
128
128
128
200000
200000
200000
200000
200000
SW3
...00-00-03
32768
128
128
128
128
128
200000
200000
200000
200000
200000
SW4
...00-00-04
32768
128
128
128
128
200000
200000
200000
200000
By default, the MSTP establishes a tree topology (in blue lines) rooted with SwitchA. The ports
marked with 'X' are in the discarding status, and the other ports are in the forwarding status.
159
Configurations Steps:
Step 1: Configure port to VLAN mapping:
Create VLAN 20, 30, 40, 50 in Switch2, Switch3 and Switch4.
Set ports 1-7 as trunk ports in Switch2 Switch3 and Switch4.
Step 2: Set Switch2, Switch3 and Switch4 in the same MSTP:
Set Switch2, Switch3 and Switch4 to have the same region name as mstp.
Map VLAN 20 and VLAN 30 in Switch2, Switch3 and Switch4 to Instance 3; Map VLAN 40
and VLAN 50 in Switch2, Switch3 and Switch4 to Instance 4.
Step 3: Set Switch3 as the root bridge of Instance 3; Set Switch4 as the root bridge of Instance
4
Set the bridge priority of Instance 3 in Switch3 as 0.
Set the bridge priority of Instance 4 in Switch4 as 0.
The detailed configuration is listed below:
Switch2:
Switch2(config)#vlan 20
Switch2(Config-Vlan20)#exit
Switch2(config)#vlan 30
Switch2(Config-Vlan30)#exit
Switch2(config)#vlan 40
Switch2(Config-Vlan40)#exit
Switch2(config)#vlan 50
Switch2(Config-Vlan50)#exit
Switch2(config)#spanning-tree mst configuration
Switch2(Config-Mstp-Region)#name mstp
Switch2(Config-Mstp-Region)#instance 3 vlan 20;30
Switch2(Config-Mstp-Region)#instance 4 vlan 40;50
Switch2(Config-Mstp-Region)#exit
Switch2(config)#interface e1/0/1-7
Switch2(Config-Port-Range)#switchport mode trunk
Switch2(Config-Port-Range)#exit
Switch2(config)#spanning-tree
Switch3:
Switch3(config)#vlan 20
Switch3(Config-Vlan20)#exit
Switch3(config)#vlan 30
Switch3(Config-Vlan30)#exit
Switch3(config)#vlan 40
Switch3(Config-Vlan40)#exit
160
Switch3(config)#vlan 50
Switch3(Config-Vlan50)#exit
Switch3(config)#spanning-tree mst configuration
Switch3(Config-Mstp-Region)#name mstp
Switch3(Config-Mstp-Region)#instance 3 vlan 20;30
Switch3(Config-Mstp-Region)#instance 4 vlan 40;50
Switch3(Config-Mstp-Region)#exit
Switch3(config)#interface e1/0/1-7
Switch3(Config-Port-Range)#switchport mode trunk
Switch3(Config-Port-Range)#exit
Switch3(config)#spanning-tree
Switch3(config)#spanning-tree mst 3 priority 0
Switch4:
Switch4(config)#vlan 20
Switch4(Config-Vlan20)#exit
Switch4(config)#vlan 30
Switch4(Config-Vlan30)#exit
Switch4(config)#vlan 40
Switch4(Config-Vlan40)#exit
Switch4(config)#vlan 50
Switch4(Config-Vlan50)#exit
Switch4(config)#spanning-tree mst configuration
Switch4(Config-Mstp-Region)#name mstp
Switch4(Config-Mstp-Region)#instance 3 vlan 20;30
Switch4(Config-Mstp-Region)#instance 4 vlan 40;50
Switch4(Config-Mstp-Region)#exit
Switch4(config)#interface e1/0/1-7
Switch4(Config-Port-Range)#switchport mode trunk
Switch4(Config-Port-Range)#exit
Switch4(config)#spanning-tree
Switch4(config)#spanning-tree mst 4 priority 0
After the above configuration, Switch1 is the root bridge of the instance 0 of the entire network.
In the MSTP region which Switch2, Switch3 and Switch4 belong to, Switch2 is the region root of
the instance 0, Switch3 is the region root of the instance 3 and Switch4 is the region root of the
instance 4. The traffic of VLAN 20 and VLAN 30 is sent through the topology of the instance 3.
The traffic of VLAN 40 and VLAN 50 is sent through the topology of the instance 4. And the traffic
of other VLANs is sent through the topology of the instance 0. The port 1 in Switch2 is the master
port of the instance 3 and the instance 4.
The MSTP calculation generates 3 topologies: the instance 0, the instance 3 and the instance
4 (marked with blue lines). The ports with the mark 'X' are in the status of discarding. The other
ports are the status of forwarding. Because the instance 3 and the instance 4 are only valid in the
MSTP region, the following figure only shows the topology of the MSTP region.
161
SW1
1
2
3X
3
SW2
1X
SW3
7
6X
7X
5X
SW4
Figure 27.3: The Topology Of the Instance 0 after the MSTP Calculation
3
SW2
3X
SW3
7
4X
6
7X
5X
SW4
Figure 27.4: The Topology Of the Instance 3 after the MSTP Calculation
162
2X
3
SW2
3X
5X
SW3
7X
6
7
5
SW4
Figure 27.5: The Topology Of the Instance 4 after the MSTP Calculation
163
Part V
QoS and Flow-based Redirection
Configuration
164
Chapter 28
QoS Configuration
28.1 Introduction to QoS
QoS (Quality of Service) is a set of capabilities that allow you to create differentiated services for
network traffic, thereby providing better service for selected network traffic. QoS is a guarantee for
service quality of consistent and predictable data transfer service to fulfill program requirements.
QoS cannot generate extra bandwidth but provides more effective bandwidth management according to the application requirement and network management policy.
DA
SA
Tag
PT
Data
FCS
Len
ID
Offset
TTL
Proto
FCS
IP-SA
IP-DA
Data
IP precedence or DSCP
DA
SA
VID
0x8847
Label (20-bits)
EXP
TTL
Based on differentiated service, QoS specifies a priority for each packet at the ingress. The
classification information is carried in Layer 3 IP packet header or Layer 2 802.1Q frame header.
QoS provides same service to packets of the same priority, while offers different operations for
packets of different priority. QoS-enabled switch or router can provide different bandwidth according to the packet classification information, and can remark on the classification information
according to the policing policies configured, and may discard some low priority packets in case
of bandwidth shortage.
If devices of each hop in a network support differentiated service, an end-to-end QoS solution
can be created. QoS configuration is flexible, the complexity or simplicity depends on the network
topology and devices and analysis to incoming/outgoing traffic.
Classication
Sort the packet trafc
according to the
classication info and
convert classication
info to internal priority
value and drop
precedence value
Generate
Internal
Priority
Policing
Decide whether the
trafc color is single
bucket dual color or
dual bucket three
color according to
policing policy
Egress
color
Remark
Scheduling
167
Classification: Classify traffic according to packet classification information and generate internal priority and drop precedence based the classification information. For different packet types
and switch configurations, classification is performed differently; the flowchart below explains this
in detail.
168
Policing and remark: Each packet in classified ingress traffic is assigned an internal priority
value and a drop precedence value, and can be policed and remarked.
Policing can be performed based on the flow to configure different policies that allocate bandwidth to classified traffic, the assigned bandwidth policy may be dual bucket dual color or dual
bucket three color. The traffic, will be assigned with different color, can be discarded or passed,
for the passed packets, add the remarking action. Remarking uses a new DSCP value of lower
priority to replace the original higher level DSCP value in the packet. The following flowchart
describes the operations.
169
Queuing and scheduling: There are the internal priority and the drop precedence for the
egress packets, the queuing operation assigns the packets to different priority queues according to
the internal priority, while the scheduling operation perform the packet forwarding according to the
priority queue weight and the drop precedence. The following flowchart describes the operations
during queuing and scheduling.
170
Explanation
Create a class map and enter class map
mode; the 'no class-map <class-mapname>' command deletes the specified
class map.
Set matching criterion (classify data stream
by ACL, CoS, VLAN ID, IPv4 Precedent,
IPv6 FL or DSCP, etc) for the class map;
the no command deletes specified matching criterion.
171
Explanation
Create a policy map and enter policy map
mode; the no command deletes the specified policy map.
After a policy map is created, it can be associated to a class. Different policy or new
DSCP value can be applied to different data
streams in class mode; the no command
deletes the specified class.
Assign a new DSCP, CoS, IP Precedence
value for the classified traffic; the no command cancels the newly assigned value.
172
Explanation
Configure port trust; the no command disables the current
trust status of the port.
Configure the default CoS value of the port; the no command
restores the default setting.
Apply a policy map to the specified port; the no command deletes the specified policy map applied to the port
or deletes all the policy maps applied on the ingress direction of the port. Egress policy map is not supported yet.
Apply a policy map to the specified VLAN interface; the no
command deletes the specified policy map applied to the
VLAN interface or deletes all the policy maps applied in the
ingress direction of the vlan interface.
Explanation
Set queue management algorithm, the default queue management algorithm is wrr.
Set queue weight based a port, the default
queue weight is 1 2 3 4 5 6 7 8.
Set queue weight based a port, the default
queue weight is 10 20 40 80 160 320 640
1280.
Set bandwidth guarantee based a port.
173
Explanation
Set the priority mapping for QoS,
the no command restores the default
mapping value.
Explanation
Clear accounting data of the specified ports or VLAN Policy
Map. If there are no parameters, clear accounting data of
all policy map.
Explanation
Display the configuration of QoS mapping.
When QoS enabled in Global Mode, the egress queue bandwidth proportion of port ethernet1/0/1 is 1:1:2:2:4:4:8:8. When packets have CoS value coming in through port ethernet1/0/1,
it will be map to the queue out according to the CoS value, CoS value 0 to 7 correspond to queue
out 1, 2, 3, 4, 5, 6, 7, 8 respectively. If the incoming packet has no CoS value, it is default to 5 and
will be put in queue6. All passing packets would not have their DSCP values changed.
Example 2:
In port ethernet1/0/2, set the bandwidth for packets from segment 192.168.1.0 to 10 Mb/s, with
a burst value of 4 MB, all packets exceed this bandwidth setting will be dropped.
The configuration steps are listed below:
Switch#config
Switch(config)#access-list 1 permit 192.168.1.0 0.0.0.255
Switch(config)#class-map c1
Switch(Config-ClassMap-c1)#match access-group 1
Switch(Config-ClassMap-c1)#exit
Switch(config)#policy-map p1
Switch(Config-PolicyMap-p1)#class c1
Switch(Config-PolicyMap-p1-Class-c1)#policy 10000 4000 exceed-action drop
Switch(Config-PolicyMap-p1-Class-c1)#exit
Switch(Config-PolicyMap-p1)#exit
Switch(config)#interface ethernet 1/0/2
Switch(Config-If-Ethernet1/0/2)#service-policy input p1
Configuration result:
An ACL name 1 is set to matching segment 192.168.1.0. Enable QoS globally, create a class
map named c1, matching ACL1 in class map; create another policy map named p1 and refer to
c1 in p1, set appropriate policies to limit bandwidth and burst value. Apply this policy map on port
ethernet1/0/2. After the above settings done, bandwidth for packets from segment 192.168.1.0
through port ethernet 1/0/2 is set to 10 Mb/s, with a burst value of 4 MB, all packets exceed this
bandwidth setting in that segment will be dropped.
Example 3:
As shown in the figure, inside the block is a QoS domain, Switch1 classifies different traffics and
assigns different IP precedences. For example, set CoS precedence for packets from segment
192.168.1.0 to 5 on port ethernet1/0/1. The port connecting to switch2 is a trunk port. In Switch2,
set port ethernet 1/0/1 that connecting to swtich1 to trust cos. Thus inside the QoS domain, packets
of different priorities will go to different queues and get different bandwidth.
The configuration steps are listed below:
QoS configuration in Switch1:
Switch#config
Switch(config)#access-list 1 permit 192.168.1.0 0.0.0.255
Switch(config)#class-map c1
Switch(Config-ClassMap-c1)#match access-group 1
Switch(Config-ClassMap-c1)#exit
Switch(config)#policy-map p1
Switch(Config-PolicyMap-p1)#class c1
Switch(Config-PolicyMap-p1-Class-c1)#set ip precedence 5
Switch(Config-PolicyMap-p1-Class-c1)#exit
175
Switch(Config-PolicyMap-p1)#exit
Switch(config)#interface ethernet 1/0/1
Switch(Config-If-Ethernet1/0/1)#service-policy input p1
QoS configuration in Switch2:
Switch#config
Switch(config)#interface ethernet 1/0/1
Switch(Config-If-Ethernet1/0/1)#mls qos trust cos
176
Start
MPLS
packet
(*0)
Trust
EXP
(*1)
IP packet
Trust
DSCP
N
N
Trust
COS
(*2)
Y
Y
tag packet
DSCP-to-DSCP
DSCP-to-Int-Prio
DSCP-to-Drop-Prec
conversion according to the
packet DSCP
COS-to-Int-Prio
COS-to-Drop-Prec
conversion according to the
packet COS value (*5)
EXP-to-Int-Prio
EXP-to-Drop-Prec
conversion according to the
packet MPLS EXP value
177
Start
Whether congure
the policing policy
Drop the
packet
Drop
The specic
color action
Pass
Select one or several options of the following:
Set COS: Set L2 COS eld of the packet
Set Int-Prio: Set internal priority of the packet
Set Drop-Prec: Set drop precedence of the packet
Set DSCP/TOS: Set DSCP or TOS eld of the packet
Enter Scheduling
178
Start
MPLS
packet
(*0)
Buffer
available
N
Y
Place packet into specied
queue, and forward according to
the weight priority of the queues
Drop packet
179
Server
QoS Area
Switch3
Switch2
Trunk
Switch1
180
Chapter 29
Flow-based Redirection
29.1 Introduction to Flow-based Redirection
Flow-based redirection function enables the switch to transmit the data frames meeting some
special condition (specified by ACL) to another specified port. The fames meeting a same special
condition are called a class of flow, the ingress port of the data frame is called the source port
of redirection, and the specified egress port is called the destination port of redirection. Usually
there are two kinds of application of flow-based redirection: 1. connecting a protocol analyzer
(for example, Sniffer) or a RMON monitor to the destination port of redirection, to monitor and
manage the network, and diagnose the problems in the network; 2. Special transmission policy
for a special type of data frames.
The switch can only designate a single destination port of redirection for a same class of flow
within a source port of redirection, while it can designate different destination ports of redirection
for different classes of flows within a source port of redirection. The same class of flow can be
applied to different source ports.
181
Explanation
Display the information of current flow-based redirection in
the system/port.
182
Chapter 30
Flexible QinQ Configuration
30.1 Introduction to Flexible QinQ
30.1.1 QinQ Technique
Dot1q-tunnel is also called QinQ (802.1Q-in-802.1Q), which is an expansion of 802.1Q. Its dominating idea is encapsulating the customer VLAN tag (CVLAN tag) to the service provider VLAN tag
(SPVLAN tag). The packet with two VLAN tags is transmitted through the backbone network of
the ISP internet to provide a simple layer-2 tunnel for the users. It is simple and easy to manage,
applicable only by static configuration, and especially adaptive to small office network or small
metropolitan area network using layer-3 switch as backbone equipment.
There are two kinds of QinQ: basic QinQ and flexible QinQ, the priority of flexible QinQ is higher
than basic QinQ.
2. Create flexible QinQ policy-map to relate with the class-map and set the corresponding operation
3. Bind flexible QinQ policy-map to port
4. Show flexible QinQ policy-map bound to port
1. Configure class map
Command
Global mode
class-map <class-map-name>
no class-map <class-map-name>
Explanation
Explanation
Create a policy-map and enter policy-map mode, the no
command deletes the specified policy-map.
After a policy-map is created, it can be associated to a class.
Different policy or new DSCP value can be applied to different data flows in class mode; the no command deletes the
specified class-map.
Add the external tag to the classified flow, the no command
cancels the operation.
Explanation
Apply a policy-map to a port, the no command deletes the
specified policy-map applied to the port.
184
Explanation
{
interface
185
Part VI
L3 Forward and ARP Configuration
186
Chapter 31
Layer 3 Management Configuration
Switch only support Layer 2 forwarding, but can configure a Layer 3 management port for
the communication of all kinds of management protocols based on IP protocol.
Explanation
Creates a management VLAN interface; the no command
deletes the VLAN interface created in the switch.
187
Explanation
Configure the description information of VLAN interface.
The no command will cancel the description information of
VLAN interface.
31.2 IP Configuration
31.2.1 Introduction to IPv4, IPv6
IPv4 is the current version of global universal Internet protocol. The practice has proved that
IPv4 is simple, flexible, open, stable, strong and easy to implement while collaborating well with
various protocols of upper and lower layers. Although IPv4 almost has not been changed since
it was established in 1980's, it has kept growing to the current global scale with the promotion of
Internet. However, as Internet infrastructure and Internet application services continue boosting,
IPv4 has shown its deficiency when facing the present scale and complexity of Internet.
IPv6 refers to the sixth version of Internet protocol which is the next generation Internet protocol
designed by IETF to replace the current Internet protocol version 4 (IPv4). IPv6 was specially
developed to make up the shortages of IPv4 addresses so that Internet can develop further.
The most important problem IPv6 has solved is to add the amount of IP addresses. IPv4
addresses have nearly run out, whereas the amount of Internet users has been increasing in geometric series. With the greatly and continuously boosting of Internet services and application
devices (Home and Small Office Network, IP phone and Wireless Service Information Terminal
which make use of Internet,) which require IP addresses, the supply of IP addresses turns out
to be more and more tense. People have been working on the problem of shortage of IPv4 addresses for a long time by introducing various technologies to prolong the lifespan of existing IPv4
infrastructure, including Network Address Translation(NAT for short), and Classless Inter-Domain
Routing(CIDR for short), etc.
Although the combination of CIDR, NAT and private addressing has temporarily mitigated the
problem of IPv4 address space shortage, NAT technology has disrupted the end-to-end model
which is the original intention of IP design by making it necessary for router devices that serve as
network intermediate nodes to maintain every connection status which increases network delay
greatly and decreases network performance. Moreover, the translation of network data packet
addresses baffles the end-to-end network security check, IPSec authentication header is such an
example.
Therefore, in order to solve all kinds of problems existing in IPv4 comprehensively, the next
generation Internet Protocol IPv6 designed by IETF has become the only feasible solution at
present.
First of all, the 128 bits addressing scheme of IPv6 Protocol can guarantee to provide enough
globally unique IP addresses for global IP network nodes in the range of time and space. Moreover,
besides increasing address space, IPv6 also enhanced many other essential designs of IPv4.
Hierarchical addressing scheme facilitates Route Aggregation, effectively reduces route table
entries and enhances the efficiency and expansibility of routing and data packet processing.
The header design of IPv6 is more efficient compared with IPv4. It has less data fields and
188
takes out header checksum, thus expedites the processing speed of basic IPv6 header. In IPv6
header, fragment field can be shown as an optional extended field, so that data packets fragmentation process won't be done in router forwarding process, and Path MTU Discovery Mechanism
collaborates with data packet source which enhances the processing efficiency of router.
Address automatic configuration and plug-and-play is supported. Large amounts of hosts can
find network routers easily by address automatic configuration function of IPv6 while obtaining a
globally unique IPv6 address automatically as well which makes the devices using IPv6 Internet
plug-and-play. Automatic address configuration function also makes the readdressing of existing
network easier and more convenient, and it is more convenient for network operators to manage
the transformation from one provider to another.
Support IPSec. IPSec is optional in IPv4, but required in IPv6 Protocol. IPv6 provides security
extended header, which provides end-to-end security services such as access control, confidentiality and data integrity, consequently making the implement of encryption, validation and Virtual
Private Network easier.
Enhance the support for Mobile IP and mobile calculating devices. The Mobile IP Protocol
defined in IETF standard makes mobile devices movable without cutting the existing connection,
which is a network function getting more and more important. Unlike IPv4, the mobility of IPv6 is
from embedded automatic configuration to get transmission address (Care-Of-Address); therefore
it doesn't need Foreign Agent. Furthermore, this kind of binding process enables Correspondent
Node communicate with Mobile Node directly, thereby avoids the extra system cost caused by
triangle routing choice required in IPv4.
Avoid the use of Network Address Translation. The purpose of the introduction of NAT mechanism is to share and reuse same address space among different network segments. This mechanism mitigates the problem of the shortage of IPv4 address temporally; meanwhile it adds the
burden of address translation process for network device and application. Since the address space
of IPv6 has increased greatly, address translation becomes unnecessary, thus the problems and
system cost caused by NAT deployment are solved naturally.
Support extensively deployed Routing Protocol. IPv6 has kept and extended the supports
for existing Internal Gateway Protocols (IGP for short), and Exterior Gateway Protocols (EGP for
short). For example, IPv6 Routing Protocol such as RIPng, OSPFv3, IS-ISv6 and MBGP4+, etc.
Multicast addresses increased and the support for multicast has enhanced. By dealing with
IPv4 broadcast functions such as Router Discovery and Router Query, IPv6 multicast has completely replaced IPv4 broadcast in the sense of function. Multicast not only saves network bandwidth, but enhances network efficiency as well.
31.2.2 IP Configuration
Layer 3 interface can be configured as IPv4 interface, IPv6 interface.
IPv4 Address Configuration
IPv4 address configuration task list:
1. Configure the IPv4 address of three-layer interface
2. Configure the default gateway
189
Explanation
Configure IP address of VLAN interface; the no ip address [<ip-address> <mask>] command cancels IP address of VLAN interface.
Explanation
Configure the default gateway of the route. The no
command cancels the configuration.
Explanation
Configure IPv6 address, including aggregatable global unicast addresses, site-local addresses and link-local addresses. The no ipv6 address <ipv6-address/prefixlength> command cancels IPv6 address.
Explanation
Configure IPv6 default gateway of the router. The no
command cancels the configuration.
190
Explanation
Set the neighbor query message number sent in sequence
when the interface makes duplicate address detection. The
no command resumes default value (1).
Explanation
Set the interval of the interface to send neighbor query message. The NO command resumes default value (1 second).
Explanation
Set static neighbor table entries, including neighbor IPv6 address, MAC address and two-layer
port.
Delete neighbor table entries.
Explanation
Clear all static neighbor table entries.
191
Static route is mainly used in the following two conditions: 1) in stable networks to reduce load
of route selection and routing data streams. For example, static route can be used in route to
STUB network. 2) For route backup, configure static route in the backup line, with a lower priority
than the main line.
Static route and dynamic route can coexist; layer3 switch will choose the route with the highest priority according to the priority of routing protocols. At the same time, static route can be
introduced (redistribute) in dynamic route, and change the priority of the static route introduced as
required.
Explanation
Set static routing; the no ip route {<ipprefix> <mask> | <ip-prefix>/<prefixlength>}
[<gateway-address>
|
<gateway-interface>]
[<distance>]
command deletes a static route entry
192
SwitchA
VLAN2:
10.1.2.1
VLAN2:
10.1.2.2
VLAN1:
10.1.1.1
SwitchC
VLAN1:
10.1.3.2
VLAN3:
10.1.5.1
PC-A: 10.1.1.2
PC-C: 10.1.5.2
VLAN1:
10.1.3.1
SwitchB
VLAN2:
10.1.4.1
PC-B: 10.1.4.2
partner IP address
route 10.1.1.0 255.255.255.0 10.1.2.1
partner IP address
route 10.1.4.0 255.255.255.0 10.1.3.1
193
31.4 ARP
31.4.1 Introduction to ARP
ARP (Address Resolution Protocol) is mainly used to resolve IP address to Ethernet MAC address.
Switch supports both dynamic ARP and static ARP configuration.
Explanation
Configures a static ARP entry; the no command deletes a ARP entry of the specified
IP address.
194
Chapter 32
ARP Scanning Prevention Function
Configuration
32.1 Introduction to ARP Scanning Prevention Function
ARP scanning is a common method of network attack. In order to detect all the active hosts in a
network segment, the attack source will broadcast lots of ARP messages in the segment, which
will take up a large part of the bandwidth of the network. It might even do large-traffic-attack in the
network via fake ARP messages to collapse of the network by exhausting the bandwidth. Usually ARP scanning is just a preface of other more dangerous attack methods, such as automatic
virus infection or the ensuing port scanning, vulnerability scanning aiming at stealing information,
distorted message attack, and DOS attack, etc.
Since ARP scanning threatens the security and stability of the network with great danger, so it
is very significant to prevent it. Switch provides a complete resolution to prevent ARP scanning:
if there is any host or port with ARP scanning features is found in the segment, the switch will cut
off the attack source to ensure the security of the network.
There are two methods to prevent ARP scanning: port-based and IP-based. The port-based
ARP scanning will count the number to ARP messages received from a port in a certain time range,
if the number is larger than a preset threshold, this port will be 'down'. The IP-based ARP scanning
will count the number to ARP messages received from an IP in the segment in a certain time range,
if the number is larger than a preset threshold, any traffic from this IP will be blocked, while the
port related with this IP will not be 'down'. These two methods can be enabled simultaneously.
After a port or an IP is disabled, users can recover its state via automatic recovery function.
To improve the effect of the switch, users can configure trusted ports and IP, the ARP messages
from which will not be checked by the switch. Thus the load of the switch can be effectively
decreased.
195
4. Configure trusted IP
5. Configure automatic recovery time
6. Display relative information of debug information and ARP scanning
1. Enable the ARP Scanning Prevention function.
Command
Global configuration mode
anti-arpscan enable
no anti-arpscan enable
Explanation
Enable or disable the ARP Scanning Prevention function
globally.
2. Configure the threshold of the port-based and IP-based ARP Scanning Prevention
Command
Global configuration mode
anti-arpscan port-based threshold <threshold-value>
no anti-arpscan port-based threshold
anti-arpscan ip-based threshold <threshold-value>
no anti-arpscan ip-based threshold
Explanation
Set the threshold of the port-based
ARP Scanning Prevention.
Set the threshold of the IP-based ARP
Scanning Prevention.
Explanation
Set the trust attributes of the ports.
4. Configure trusted IP
Command
Global configuration mode
anti-arpscan trust ip <ip-address> [<netmask>]
no anti-arpscan trust ip <ip-address> [<netmask>]
Explanation
Set the trust attributes of IP.
Explanation
Enable or disable the automatic recovery
function.
Set automatic recovery time.
196
Explanation
Enable or disable the log function of ARP scanning prevention.
Enable or disable the SNMP Trap function of
ARP scanning prevention.
Display the state of operation and configuration
of ARP scanning prevention.
Enable or disable the debug switch of ARP scanning prevention.
Switch2
E1/0/1
E1/0/19
Switch1
E1/0/2
Server
PC
PC
SwitchA(Config-If-Ethernet1/0/2)#exit
SwitchA(config)#interface ethernet1/0/19
SwitchA(Config-If-Ethernet1/0/19)#anti-arpscan trust supertrust-port
SwitchA(Config-If-Ethernet1/0/19)#exit
SWITCH B configuration task sequence:
SwitchB(config)#anti-arpscan enable
SwitchB(config)#interface ethernet1/0/1
SwitchB(Config-If-Ethernet1/0/1)#anti-arpscan trust port
SwitchB(Config-If-Ethernet1/0/1)#exit
198
Chapter 33
Prevent ARP Spoofing Configuration
33.1 Overview
33.1.1 ARP (Address Resolution Protocol)
Generally speaking, ARP (RFC-826) protocol is mainly responsible of mapping IP address to relevant 48-bit physical address, that is MAC address, for instance, IP address is 192.168.0.1, network
card Mac address is f8-f0-82-FD-1D-2B. What the whole mapping process is that a host computer
send broadcast data packet involving IP address information of destination host computer, ARP
request, and then the destination host computer send a data packet involving its IP address and
Mac address to the host, so two host computers can exchange data by MAC address.
packets so that the switch makes mistake on transfer packets, and takes an effect on the whole
network. Or the switches are made used of by vicious attackers, and they intercept and capture
packets transferred by switches or attack other switches, host computers or network equipment.
What the essential method on preventing attack and spoofing switches based on ARP in networks is to disable switch automatic update function; the cheater can't modify corrected MAC
address in order to avoid wrong packets transfer and can't obtain other information. At one time, it
doesn't interrupt the automatic learning function of ARP. Thus it prevents ARP spoofing and attack
to a great extent.
Explanation
Disable and enable ARP automatic update function.
Explanation
Change dynamic ARP to static ARP.
200
Configuration
IP:192.168.2.4; mac: 00-00-00-00-00-04
IP:192.168.2.1; mac: 00-00-00-00-00-01
IP:192.168.1.2; mac: 00-00-00-00-00-02
IP:192.168.2.3; mac: 00-00-00-00-00-03
Quality
1
1
1
some
Chapter 34
ARP Guard Configuration
34.1 Introduction to ARP Guard
There is serious security vulnerability in the design of ARP protocol, which is any network device,
can send ARP messages to advertise the mapping relationship between IP address and MAC address. This provides a chance for ARP cheating. Attackers can send ARP REQUEST messages
or ARP REPLY messages to advertise a wrong mapping relationship between IP address and
MAC address, causing problems in network communication. The danger of ARP cheating has
two forms: 1. PC4 sends an ARP message to advertise that the IP address of PC2 is mapped to
the MAC address of PC4, which will cause all the IP messages to PC2 will be sent to PC4, thus
PC4 will be able to monitor and capture the messages to PC2; 2. PC4 sends ARP messages to
advertise that the IP address of PC2 is mapped to an illegal MAC address, which will prevent PC2
from receiving the messages to it. Particularly, if the attacker pretends to be the gateway and do
ARP cheating, the whole network will be collapsed.
PC1
Switch
HUB
PC2
PC3
PC4
PC5
PC6
that adopting FREE RESOURCE related accessing scheme. Please refer to relative documents
for details.
Explanation
Configure/delete ARP GUARD address
203
Chapter 35
Gratuitous ARP Configuration
35.1 Introduction to Gratuitous ARP
Gratuitous ARP is a kind of ARP request that is sent by the host with its IP address as the destination of the ARP request.
The basic working mode for the switch is as below: The Layer 3 interfaces of the switch can be
configured to advertise gratuitous ARP packets period or the switch can be configured to enable
to send gratuitous ARP packets in all the interfaces globally.
The purpose of gratuitous ARP is as below:
1. To reduce the frequency that the host sends ARP request to the switch. The hosts in the
network will periodically send ARP requests to the gateway to update the MAC address of
the gateway. If the switch advertises gratuitous ARP requests, the host will not have to
send these requests. This will reduce the frequency the host's sending ARP requests for the
gateway's MAC address.
2. Gratuitous ARP is a method to prevent ARP cheating. The switch's advertising gratuitous
ARP request will force the hosts to update its ARP table cache. Thus, forged ARP of gateway
cannot function.
204
Interface vlan 1
192.168.14.254/24
PC1
PC2
Interface vlan 10
192.168.15.254/24
PC3
PC4
PC5
Part VII
DHCP Configuration
206
Chapter 36
DHCP Configuration
36.1 Introduction to DHCP
DHCP [RFC2131] is the acronym for Dynamic Host Configuration Protocol. It is a protocol that
assigns IP address dynamically from the address pool as well as other network configuration parameters such as default gateway, DNS server, and default route and host image file position
within the network. DHCP is the enhanced version of BOOTP. It is a mainstream technology that
can not only provide boot information for diskless workstations, but can also release the administrators from manual recording of IP allocation and reduce user effort and cost on configuration.
Another benefit of DHCP is it can partially ease the pressure on IP demands, when the user of an
IP leaves the network that IP can be assigned to another user.
DHCP is a client-server protocol, the DHCP client requests the network address and configuration parameters from the DHCP server; the server provides the network address and configuration
parameters for the clients; if DHCP server and clients are located in different subnets, DHCP relay
is required for DHCP packets to be transferred between the DHCP client and DHCP server. The
implementation of DHCP is shown below:
Discover
Offer
Request
ACK
DHCP Client
DHCP Server
207
4. The DHCP server selected by the client sends a DHCPACK packet and the client gets an IP
address and other network configuration parameters.
The above four steps finish a Dynamic host configuration assignment process. However, if the
DHCP server and the DHCP client are not in the same network, the server will not receive the
DHCP broadcast packets sent by the client, therefore no DHCP packets will be sent to the client
by the server. In this case, a DHCP relay is required to forward such DHCP packets so that the
DHCP packets exchange can be completed between the DHCP client and server.
Switch can act as both a DHCP server and a DHCP relay. DHCP server supports not only
dynamic IP address assignment, but also manual IP address binding (i.e. specify a specific IP
address to a specified MAC address or specified device ID over a long period. The differences
and relations between dynamic IP address allocation and manual IP address binding are:
1. IP address obtained dynamically can be different every time; manually bound IP address will
be the same all the time.
2. The lease period of IP address obtained dynamically is the same as the lease period of the
address pool, and is limited; the lease of manually bound IP address is theoretically endless.
3. Dynamically allocated address cannot be bound manually.
4. Dynamic DHCP address pool can inherit the network configuration parameters of the dynamic DHCP address pool of the related segment.
Explanation
Enable DHCP server. The no command disables DHCP
server.
The port disables DHCP services, the no command enables
DHCP services.
208
Explanation
Configure DHCP Address pool. The no operation
cancels the DHCP Address pool.
Explanation
Configure the address scope that can be allocated to
the address pool. The no operation of this command
cancels the allocation address pool.
Configure default gateway for DHCP clients. The no
operation cancels the default gateway.
Configure DNS server for DHCP clients. The no command deletes DNS server configuration.
Configure Domain name for DHCP clients; the 'no
domain-name' command deletes the domain name.
Configure the address for WINS server. The no operation cancels the address for server.
Configure node type for DHCP clients. The no operation cancels the node type for DHCP clients.
Configure the file to be imported for DHCP clients on
boot up. The no command cancels this operation.
Configure the address of the server hosting file for importing. The no command deletes the address of the
server hosting file for importing.
Configure the network parameter specified by the option code. The no command deletes the network parameter specified by the option code.
Configure the lease period allocated to addresses in
the address pool. The no command deletes the lease
period allocated to addresses in the address pool.
Set the maximum lease time for the addresses in the
address pool; the no command restores the default
setting.
209
Global Mode
ip dhcp excluded-address <low-address>
[<high-address>]
no ip dhcp excluded-address <lowaddress> [<high-address>]
Explanation
Specify/delete the hardware address when assigning address manually.
Specify/delete the IP address to be assigned to
the specified client when binding address manually.
Specify/delete the unique ID of the user when
binding address manually.
Explanation
Enable/disable logging for DHCP address to detect address
conflicts.
Delete a single address conflict record or all conflict records.
DHCPDiscover
DHCPOFFER (Unicast)
DHCPOFFER
DHCPREQUEST (Broadcast)
DHCPREQUEST
DHCPACK (Unicast)
DHCP Client
DHCPACK
DHCP Relay
DHCP Server
210
As shown in the above figure, the DHCP client and the DHCP server are in different networks,
the DHCP client performs the four DHCP steps as usual yet DHCP relay is added to the process.
1. The client broadcasts a DHCPDISCOVER packet, and DHCP relay inserts its own IP address
to the relay agent field in the DHCPDISCOVER packet on receiving the packet, and forwards
the packet to the specified DHCP server (for DHCP frame format, please refer to RFC2131).
2. On the receiving the DHCPDISCOVER packets forwarded by DHCP relay, the DHCP server
sends the DHCPOFFER packet via DHCP relay to the DHCP client.
3. DHCP client chooses a DHCP server and broadcasts a DHCPREQUEST packet, DHCP
relay forwards the packet to the DHCP server after processing.
4. On receiving DHCPREQUEST, the DHCP server responds with a DHCPACK packet via
DHCP relay to the DHCP client.
DHCP Relay Configuration Task List:
1. Enable DHCP relay.
2. Configure DHCP relay to forward DHCP broadcast packet.
3. Configure share-vlan
1. Enable DHCP relay.
Command
Global Mode
service dhcp
no service dhcp
Explanation
DHCP server and DHCP relay is enabled as the DHCP service is enabled.
Explanation
The UDP port 67 is used for DHCP broadcast packet forwarding.
3. Configure share-vlan
When the user want to use layer 2 device as DHCP relay, there is the number limitation that
create layer 3 interface on layer 2 device, but using the layer 3 interface of share-vlan (it may
include many sub-vlan, however a sub-vlan only correspond to a share-vlan) can implement DHCP
relay forwarding, and the relay device needs to enable option82 function at the same time.
211
Command
Global Mode
ip dhcp relay share-vlan
<vlanid> sub-vlan <vlanlist>
no dhcp relay share-vlan
Explanation
Create or delete share-vlan and it's sub-vlan.
1day
DHCP Client
DHCP Client
E1/0/1
192.168.1.1
E1/0/2
10.1.1.1
DHCP Relay
DHCP Server
10.1.1.10
DHCP Client
DHCP Client
E1/0/3
Switch
DHCP Server
Chapter 37
DHCPv6 Configuration
37.1 Introduction to DHCPv6
DHCPv6 [RFC3315] is the IPv6 version for Dynamic Host Configuration Protocol (DHCP). It is
a protocol that assigns IPv6 address as well as other network configuration parameters such as
DNS address, and domain name to DHCPv6 client, DHCPv6 is a conditional auto address configuration protocol relative to IPv6. In the conditional address configuration process, DHCPv6 server
assigns a complete IPv6 address to client, and provides DNS address, domain name and other
configuration information, maybe the DHCPv6 packet can transmit through relay delegation, at last
the binding of IPv6 address and client can be recorded by DHCPv6 server, all that can enhance
the management of network; DHCPv6 server can also provide non state DHCPv6 service, that is
only assigns DNS address and domain name and other configuration information but not assigns
IPv6 address, it can solve the bug of IPv6 auto address configuration in non state; DHCPv6 can
provide extend function of DHCPv6 prefix delegation, upstream route can assign address prefix
to downstream route automatically, that achieve the IPv6 address auto assignment in levels of
network environment, and resolved the problem of ISP and IPv6 network dispose.
There are three entities in the DHCPv6 protocol - the client, the relay and the server. The
DHCPv6 protocol is based on the UDP protocol. The DHCPv6 client sends request messages to
the DHCP server or DHCP relay with the destination port as 547, and the DHCPv6 server and
relay send replying messages with the destination port as 546. The DHCPv6 client sends solicit
or request messages with the multicast address - ff02::1:2 for DHCP relay and server.
Solicit (Multicast)
Advertise (Unicast)
Request (Multicast)
Reply (Unicast)
DHCPv6 Client
DHCPv6 Server
a SOLICIT packet to all the DHCP delay delegation and server with broadcast address as
FF02::1:2.
2. Any DHCP server which receives the request, will reply the client with an ADVERTISE message, which includes the identity of the server - DUID, and its priority.
3. It is possible that the client receives multiple ADVERTISE messages. The client should select
one and reply it with a REQUEST message to request the address which is advertised in the
ADVERTISE message.
4. The selected DHCPv6 server then confirms the client about the IPv6 address and any other
configuration with the REPLY message.
The above four steps finish a Dynamic host configuration assignment process. However, if the
DHCPv6 server and the DHCPv6 client are not in the same network, the server will not receive the
DHCPv6 broadcast packets sent by the client, therefore no DHCPv6 packets will be sent to the
client by the server. In this case, a DHCPv6 relay is required to forward such DHCPv6 packets so
that the DHCPv6 packets exchange can be completed between the DHCPv6 client and server.
At the time this manual is written, DHCPv6 server, relay and prefix delegation client have been
implemented on the switch. When the DHCPv6 relay receives any messages from the DHCPv6
client, it will encapsulate the request in a Relay-forward packet and deliver it to the next DHCPv6
relay or the DHCPv6 server. The DHCPv6 messages coming from the server will be encapsulated
as relay reply packets to the DHCPv6 relay. The relay then removes the encapsulation and delivers
it the DHCPv6 client or the next DHCPv6 relay in the network.
For DHCPv6 prefix delegation where DHCPv6 server is configured on the PE router and
DHCPv6 client it configured on the CPE router, the CPE router is able to send address prefix
allocation request to the PE router and get a pre-configured address prefix, but not set the address prefix manually. The protocol negotiation between the client and the prefix delegation client
is quite similar to that when getting a DHCPv6 address. Then the CPE router divides the allocated
prefix - whose length should be less than 64 characters, into 64 subnets. The divided address prefix will be advertised through routing advertisement messages (RA) to the host directly connected
to the client.
216
Explanation
To enable DHCPv6 service.
Explanation
To configure DHCPv6 address pool.
Explanation
To enable DHCPv6 server function on specified port, and
binding the used DHCPv6 address pool.
217
Explanation
To enable DHCPv6 service.
Explanation
To specify the destination address of DHCPv6 relay transmit; The no form of this command delete the configuration.
218
Explanation
To enable DHCPv6 service.
Explanation
To configure prefix delegation pool.
Explanation
To configure DHCPv6 address pool.
219
Explanation
To enable DHCPv6 server function on specified port, and
binding used DHCPv6 address pool.
Explanation
To enable DHCPv6 service.
Explanation
To enable client prefix delegation request function on specified port, and the prefix obtained associate with universal
prefix configured.
220
DHCPv6 Client
Switch1
DHCPv6 Relay
DHCPv6 Server
Switch2
Vlan 1: 2001:da8:1:1::2
Vlan 10: 2001:da8:10:1::2
Vlan 100: 2001:da8:100:1::2
Switch 3
Vlan 1: 2001:da8:1:1::1
Vlan 10: 2001:da8:10:1::1
Switch2(Config-if-Vlan10)#exit
Switch2(config)#interface vlan 100
Switch2(Config-if-Vlan100)#ipv6 address 2001:da8:100:1::1/64
Switch2(Config-if-Vlan100)#no ipv6 nd suppress-ra
Switch2(Config-if-Vlan100)#ipv6 nd managed-config-flag
Switch2(Config-if-Vlan100)#ipv6 nd other-config-flag
Switch2(Config-if-Vlan100)#exit
Switch1 configuration:
Switch1(config)#service dhcpv6
Switch1(config)#interface vlan 1
Switch1(Config-if-Vlan1)#ipv6 address 2001:da8:100:1::2/64
Switch1(Config-if-Vlan1)#ipv6 dhcp relay destination 2001:da8:10:1::1
222
Chapter 38
DHCP option 82 Configuration
38.1 Introduction to DHCP option 82
DHCP option 82 is the Relay Agent Information Option, its option code is 82. DHCP option 82 is
aimed at strengthening the security of DHCP servers and improving the IP address configuration
policy. The Relay Agent adds option 82 (including the client's physical access port, the access
device ID and other information), to the DHCP request message from the client then forwards
the message to DHCP server. When the DHCP server which supports the option 82 function
receives the message, it will allocate an IP address and other configuration information for the
client according to preconfigured policies and the option 82 information in the message. At the
same time, DHCP server can identify all the possible DHCP attack messages according to the
information in option 82 and defend against them. DHCP Relay Agent will peel the option 82 from
the reply messages it receives, and forward the reply message to the specified port of the network
access device, according to the physical port information in the option. The application of DHCP
option 82 is transparent for the client.
i2
i3
i4
...
iN
Code: represents the sequence number of the relay agent information option, the option 82 is
called so because RFC3046 is defined as 82.
Len: the number of bytes in Agent Information Field, not including the two bytes in Code
segment and Len segment.
Option 82 can have several sub-options, and need at least one sub-option. RFC3046 defines
the following two sub-options, whose formats are showed as follows:
SubOpt: the sequence number of sub-option, the sequence number of Circuit ID sub-option
is 1, the sequence number of Remote ID sub-option is 2.
223
SubOpt Len
1
Sub-option Value
s1
SubOpt Len
2
s2
s3
s4
...
sN
...
iN
Sub-option Value
i1
i2
i3
i4
Len: the number of bytes in Sub-option Value, not including the two bytes in SubOpt segment
and Len segment.
DHCP Request
DHCP Reply
DHCP Client
DHCP Server
224
Explanation
Set this command to enable the option 82 function of the
switch Relay Agent. The 'no ip dhcp relay information option'
is used to disable the option 82 function of the switch Relay
Agent.
Explanation
This command is used to set the retransmitting policy of the
system for the received DHCP request message which contains option 82. The drop mode means that if the message
has option82, then the system will drop it without processing; keep mode means that the system will keep the original
option 82 segment in the message, and forward it to the
server to process; replace mode means that the system will
replace the option 82 segment in the existing message with
its own option 82, and forward the message to the server
to process. The 'no ip dhcp relay information policy' will set
the retransmitting policy of the option 82 DCHP message as
'replace'.
This command is used to set the format of option 82
sub-option1(Circuit ID option) added to the DHCP request messages from interface, standard means the standard VLAN name and physical port name format, like
'Vlan2+Ethernet1/0/12', <circuit-id> is the circuit-id contents
of option 82 specified by users, which is a string no longer
than 64characters. The 'no ip dhcp relay information option
subscriber-id' command will set the format of added option
82 sub-option1 (Circuit ID option) as standard format.
225
Global Mode
ip dhcp relay information option
remote-id { standard | <remoteid> }
no ip dhcp relay information option remote-id
Explanation
This command is used to enable the switch DHCP server to
identify option82. The 'no ip dhcp server relay information
enable' command will make the server ignore the option 82.
Explanation
Set subscriber-id format of Relay Agent option82.
5. Configure delimiter
Command
Global Mode
ip dhcp relay information option
delimiter [colon | dot | slash |
space]
no ip dhcp relay information option delimiter
Explanation
Set the delimiter of each parameter for suboption of option82
in global mode, no command restores the delimiter as slash.
Explanation
Set creation method for option82, users can define the parameters of remote-id suboption by themselves.
226
Set creation method for option82, users can define the parameters of circute-id suboption by themselves.
Explanation
This command will display the state information of the DHCP
option 82 in the system, including option82 enabling switch,
the interface retransmitting policy, the circuit ID mode and
the DHCP server option82 enabling switch.
This command is used to display the information of data
packets processing in DHCP Relay Agent, including the
'add' and 'peel' action of option 82.
Switch 1
Switch 3
Vlan 2: E1/0/3
Vlan 3
Vlan 2: E1/0/2
DHCP Relay Agent
DHCP Server
Switch 2
that whether the DHCP client is from the network connected to Switch1 or Switch2. So, all the PC
terminals connected to Switch1 and Switch2 will get addresses from the public address pool of
the DHCP server. After the DHCP option 82 function is enabled, since the Switch3 appends the
port information of accessing Switch3 to the request message from the client, the server can tell
that whether the client is from the network of Swich1 or Swich2, and thus can allocate separate
address spaces for the two networks, to simplify the management of networks.
The following is the configuration of Switch3(MAC address is f8:f0:82:02:33:01):
Switch3(Config)#service dhcp
Switch3(Config)#ip dhcp relay information option
Switch3(Config)#ip forward-protocol udp bootps
Switch3(Config)#interface vlan 3
Switch3(Config-if-vlan3)#ip address 192.168.10.222 255.255.255.0
Switch3(Config)#interface vlan 2
Switch3(Config-if-vlan2)#ip address 192.168.102.2 255.255.255.0
Switch3(Config-if-vlan2)#ip helper 192.168.10.88
Linux ISC DHCP Server supports option 82, its configuration file /etc/dhcpd.conf is
ddns-update-style interim;
ignore client-updates;
class "Switch3Vlan2Class1" {
match if option agent.circuit-id = "Vlan2+Ethernet1/0/2"
and option agent.remote-id=f8:f0:82:02:33:01;
}
class "Switch3Vlan2Class2" {
match if option agent.circuit-id = "Vlan2+Ethernet1/0/3"
and option agent.remote-id=f8:f0:82:02:33:01;
}
subnet 192.168.102.0 netmask 255.255.255.0 {
option routers 192.168.102.2;
option subnet-mask 255.255.255.0;
option domain-name "example.com.cn";
option domain-name-servers 192.168.10.3;
authoritative;
pool {
range 192.168.102.21 192.168.102.50;
default-lease-time 86400; #24 Hours
max-lease-time 172800; #48 Hours
allow members of "Switch3Vlan2Class1";
}
pool {
range 192.168.102.51 192.168.102.80;
default-lease-time 43200; #12 Hours
228
229
Chapter 39
DHCP option 60 and option 43
39.1 Introduction to DHCP option 60 and option 43
DHCP server analyzes DHCP packets from DHCP client. If packets with option 60, it will decide
whether option 43 is returned to DHCP client according to option 60 of packets and configuration
of option 60 and option 43 in DHCP server address pool.
Configure the corresponding option 60 and option 43 in DHCP server address pool:
1. Address pool configured option 60 and option 43 at the same time. The received DHCP
packet with option 60 from DHCP client, if it matches with option 60 of DHCP server address
pool, DHCP client will receive the option 43 configured in the address pool, or else do not
return option 43 to DHCP client.
2. Address pool only configured option 43, it will match with any option 60. If the received DHCP
packet with option 60 from DHCP client, DHCP client will receive the option 43 configured in
the address pool.
3. Address pool only configured option 60, it will not return option 43 to DHCP client.
option 43 ip A.B.C.D
no option 60
no option 43
Fit AP
Wireless Controller
DHCP Server
231
Chapter 40
DHCPv6 option37, 38
40.1 Introduction to DHCPv6 option37, 38
DHCPv6 (Dynamic Host Configuration Protocol for IPv6) is designed for IPv6 address scheme
and is used for assigning IPv6 prefixes, IPv6 addresses and other configuration parameters to
hosts.
When DHCPv6 client wants to request address and configure parameter of DHCPv6 server
from different link, it needs to communicate with server through DHCPv6 relay agent. DHCPv6
message received by relay agent node is reencapsulated to be relay-forward packets and they
are forwarded to the server which sends the relay-reply packets to DHCPv6 relay agent node in
different link, after that, relay agent node restores DHCPv6 message to DHCPv6 client to finish
communication between client and server.
There are some problems when using DHCPv6 relay agent, for example: How to assign IP
address in the fixed range to the specifiec users? How to avoid illegal DHCPv6 client to forge IP
address exhaust attack triggered by MAC address fields of DHCPv6 packets? How to avoid illegal
DHCPv6 client to trigger deny service attack through using MAC address of other legal clients?
Therefore, IETF set rfc4649 and rfc4580, i.e. DHCPv6 option 37 and option 38 to solve these
problems.
DHCPv6 option 37 and option 38 is similar to DHCP option 82. When DHCPv6 client sends
request packets to DHCPv6 server though DHCPv6 relay agent, if DHCPv6 relay agent supports
option 37 and option 38, they will be added to request packets. For the respond packets of server,
option 37 and option 38 are meaningless and are peeled from the respond packets. Therefore,
the application of option 37 and option 38 is transparent for client.
DHCPv6 server can authenticate identity of DHCPv6 client and DHCPv6 relay device by option
37 and option 38, assign and manage client address neatly through configuring the assign policy,
prevent DHCPv6 attack availably according to the inclusive client information, such as forging
MAC address fields of DHCPv6 packets to trigger IP address exhaust attack. Since server can
identify multiple request packets from the same access port, it can assign the address number
through policy limit to avoid address exhaust. However, rfc4649 and rfc4580 do not set how to
use opton 37 and option 38 for DHCPv6 server, users can use it neatly according to their own
demand.
232
ipv6 dhcp snooping subscriberid select (sp | sv | pv | spv) delimiter WORD (delimiter WORD
|)
no
ipv6
dhcp
snooping
subscriber-id select delimiter
Explanation
This command enables DHCPv6 SNOOPING to support option 37 option, no command disables it.
This command enables DHCPv6 SNOOPING to support option 38 option, no command disables it.
233
ipv6 dhcp snooping subscriberid select (sp | sv | pv | spv) delimiter WORD (delimiter WORD
|)
no
ipv6
dhcp
snooping
subscriber-id select delimiter
Port mode
ipv6 dhcp snooping remote-id
<remote-id>
no ipv6 dhcp snooping remote-id
Explanation
This command enables DHCPv6 server to support the identification of option 37, the no form of this command disables
it.
This command enables DHCPv6 server to support the identification of option 38, the no form of this command disables
it.
This command enables DHCPv6 server to support the using
of DHCPv6 class during address assignment, the no form
of this command disables it without removing the relative
DHCPv6 class information that has been configured.
This command defines a DHCPv6 class and enters DHCPv6
class mode, the no form of this command removes this
DHCPv6 class.
This command enables the DHCPv6 server to support selections when multiple option 37 or option 38 options exist
and the option 37 and option 38 of relay-forw in the innermost layer are selected. The no operation of it restores the
default configuration, i.e. selecting option 37 and option 38
of the original packets.
IPv6 DHCP Class configuration mode
{ remote-id [*] <remote-id> [*] | This command configures option 37 and option 38 that
subscriber-id [*] <subscriber-id> match the class in ipv6 dhcp class configuration mode.
[*] }
no { remote-id [*] <remote-id>
[*] | subscriber-id [*] <subscriberid> [*] }
DHCPv6 address pool configuration mode
class <class-name>
This command associates class to address pool in DHCPv6
no class <class-name>
address pool configuration mode and enters class configuration mode in address pool. Use no command to remove
the link.
235
Switch B
E1/0/1
Switch A
E1/0/2
MAC-AA
E1/0/3
MAC-BB
E1/0/4
MAC-CC
Switch B configuration:
SwitchB(config)#service dhcpv6
SwitchB(config)#ipv6 dhcp server remote-id option
SwitchB(config)#ipv6 dhcp server subscriber-id option
SwitchB(config)#ipv6 dhcp pool EDP
SwitchB(dhcpv6-edp-config)#network-address 2001:da8:100:1::2 2001:da8:100:1::1000
SwitchB(dhcpv6-edp-config)#dns-server 2001::1
SwitchB(dhcpv6-edp-config)#domain-name dhcpv6.com
SwitchB(dhcpv6-edp-config)#excluded-address 2001:da8:100:1::2
SwitchB(dhcpv6-edp-config)#exit
SwitchB(config)#
SwitchB(config)#ipv6 dhcp class CLASS1
SwitchB(dhcpv6-class-class1-config)#remote-id f8-f0-82-00-00-01 subscriber-id
vlan1+Ethernet1/0/1
SwitchB(dhcpv6-class-class1-config)#exit
SwitchB(config)#ipv6 dhcp class CLASS2
SwitchB(dhcpv6-class-class2-config)#remote-id f8-f0-82-00-00-01 subscriber-id
vlan1+Ethernet1/0/2
SwitchB(dhcpv6-class-class2-config)#exit
SwitchB(config)#ipv6 dhcp class CLASS3
SwitchB(dhcpv6-class-class3-config)#remote-id f8-f0-82-00-00-01 subscriber-id
vlan1+Ethernet1/0/3
SwitchB(dhcpv6-class-class3-config)#exit
SwitchB(config)#ipv6 dhcp pool EDP
SwitchB(dhcpv6-edp-config)#class CLASS1
SwitchB(dhcpv6-pool-edp-class-class1-config)#address range 2001:da8:100:1::3
2001:da8:100:1::30
SwitchB(dhcpv6-pool-edp-class-class1-config)#exit
SwitchB(dhcpv6-edp-config)#class CLASS2
SwitchB(dhcpv6-pool-edp-class-class2-config)#address range 2001:da8:100:1::31
2001:da8:100:1::60
SwitchB(dhcpv6-edp-config)#class CLASS3
SwitchB(dhcpv6-pool-edp-class-class3-config)#address range 2001:da8:100:1::61
2001:da8:100:1::100
SwitchB(dhcpv6-pool-edp-class-class3-config)#exit
SwitchB(dhcpv6-edp-config)#exit
SwitchB(config)#interface vlan 1
SwitchB(config-if-vlan1)#ipv6 address 2001:da8:100:1::2/64
SwitchB(config-if-vlan1)#ipv6 dhcp server EDP
SwitchB(config-if-vlan1)#exit
SwitchB(config)#
for IPv6 address allocation if special server is used for uniform allocation and management for
IPv6 address. DHCPv6 server supports both stateful and stateless DHCPv6.
Network topology:
In access layer, layer2 access device Switch1 connects users in dormitory; in first-level aggregation layer, aggregation device Switch2 is used as DHCPv6 relay agent; in second-level aggregation layer, aggregation device Switch3 is used as DHCPv6 server and connects with backbone
network or devices in higher aggregation layer; in user side, PCs are generally loaded with Windows Vista system, thus having DHCPv6 client.
DHCPv6 Client
Switch1
DHCPv6 Relay
DHCPv6 Server
Switch2
Vlan 1: 2001:da8:1:1::2
Vlan 10: 2001:da8:10:1::2
Vlan 100: 2001:da8:100:1::2
Switch 3
Vlan 1: 2001:da8:1:1::1
Vlan 10: 2001:da8:10:1::1
238
Chapter 41
DHCP Snooping Configuration
41.1 Introduction to DHCP Snooping
DHCP Snooping means that the switch monitors the IP-getting process of DHCP CLIENT via
DHCP protocol. It prevents DHCP attacks and illegal DHCP SERVER by setting trust ports and
untrust ports. And the DHCP messages from trust ports can be forwarded without being verified.
In typical settings, trust ports are used to connect DHCP SERVER or DHCP RELAY Proxy, and
untrust ports are used to connect DHCP CLINET. The switch will forward the DCHP request messages from untrust ports, but not DHCP reply ones. If any DHCP reply messages is received from
a untrust port, besides giving an alarm, the switch will also implement designated actions on the
port according to settings, such as 'shutdown', or distributing a 'blackhole'. If DHCP Snooping
binding is enabled, the switch will save binding information (including its MAC address, IP address, IP lease, VLAN number and port number) of each DHCP CLINET on untrust ports in DHCP
snooping binding table With such information, DHCP Snooping can combine modules like dot1x
and ARP, or implement user-access-control independently.
Defense against Fake DHCP Server: once the switch intercepts the DHCP Server reply packets (including DHCPOFFER, DHCPACK, and DHCPNAK), it will alarm and respond according to
the situation (shutdown the port or send Black hole).
Defense against DHCP over load attacks: To avoid too many DHCP messages attacking
CPU, users should limit the DHCP speed of receiving packets on trusted and non-trusted ports.
Record the binding data of DHCP: DHCP SNOOPING will record the binding data allocated
by DHCP SERVER while forwarding DHCP messages, it can also upload the binding data to the
specified server to backup it. The binding data is mainly used to configure the dynamic users of
dot1x user based ports. Please refer to the chapter called 'dot1x configuration' to find more about
the usage of dot1x use-based mode.
Add binding ARP: DHCP SNOOPING can add static binding ARP according to the binding
data after capturing binding data, thus to avoid ARP cheating.
Add trusted users: DHCP SNOOPING can add trusted user list entries according to the
parameters in binding data after capturing binding data; thus these users can access all resources
without DOT1X authentication.
Automatic Recovery: A while after the switch shut down the port or send blockhole, it should
automatically recover the communication of the port or source MAC and send information to Log
Server via syslog.
LOG Function: When the switch discovers abnormal received packets or automatically recovers, it should send syslog information to Log Server. The Encryption of Private Messages: The
239
communication between the switch and the inner network security management system TrustView
uses private messages. And the users can encrypt those messages of version 2.
Add authentication option82 Function: It is used with dot1x dhcpoption82 authentication
mode. Different option 82 will be added in DHCP messages according to user's authentication
status.
Explanation
Enable or disable the DHCP snooping function.
240
Explanation
Enable or disable the DHCP snooping binding function.
Explanation
Enable or disable the dhcp snooping binding ARP
function.
Explanation
Enable/disable DHCP Snooping option 82 function.
Explanation
To configure/delete the private packet version.
Explanation
To configure/delete DES encrypted key for private packets.
Explanation
Set or delete helper server address.
Explanation
Set or delete the DHCP snooping trust attributes of ports.
241
Explanation
Enable or disable the DHCP snooping binding
dot1x function.
Explanation
Enable or disable the DHCP snooping binding user function.
Explanation
Add/delete DHCP snooping static binding
list entries.
Explanation
Set or delete the DHCP snooping automatic
defense actions of ports.
Explanation
Set rate limitation of the transmission of DHCP
snooping messages.
Explanation
Please refer to the chapter on system troubleshooting.
242
Explanation
This command is used to set subscriber-id format
of DHCP snooping option82.
Set the suboption2 (remote ID option) content of
option 82 added by DHCP request packets (they
are received by the port). The no command sets
the additive suboption2 (remote ID option) format
of option 82 as standard.
Set the delimiter of each parameter for suboption
of option82 in global mode, no command restores
the delimiter as slash.
Set creation method for option82, users can define the parameters of remote-id suboption by
themselves.
243
E1/0/10
STOP
DHCP Client
IP: 1.1.1.5
MAC: AA
E1/0/12
DHCPACK
DHCP Server
IP: 1.1.1.6
MAC: BB
DHCP Server
244
Part VIII
Multicast Protocol
245
Chapter 42
IPv4 Multicast Protocol
42.1 IPv4 Multicast Protocol Overview
This chapter will give an introduction to the configuration of IPv4 Multicast Protocol.
246
IANA (Internet Assigned Number Authority) that the higher 25 bits in Multicast MAC address is
0x01005e, and the lower 23bits in MAC address is the lower 23bits in Multicast IP address.
Since only 23bits out of the lower 28bits in IP Multicast address are mapped into MAC address,
therefore there are 32 IP Multicast addresses which are mapped into the same MAC address.
42.2 DCSCM
42.2.1 Introduction to DCSCM
DCSCM (Destination control and source control multicast) technology mainly includes three aspects, i.e. Multicast Packet Source Controllable, Multicast User Controllable and Service-Oriented
248
Explanation
Enable source control globally, the 'no ip multicast sourcecontrol' command disables source control globally. It is noticeable that, after enabling source control globally, all multicast packets are discarded by default. All source control
configuration can not be processed until that it is enabled
globally, while source control can not be disabled until all
configured rules are disabled.
The next is to configure the rule of source control. It is configured in the same manner as for
ACL, and uses ACL number of 5000-5099, every rule number can be used to configure 10 rules. It
is noticeable that these rules are ordered, the front one is the one which is configured the earliest.
249
Once the configured rules are matched, the following rules won't take effect, so rules of globally
allow must be put at the end. The commands are as follows:
Command
Global Configuration Mode
[no] access-list <5000-5099> { deny | permit } ip
{ { <source> <source-wildcard> } | { host-source
<source-host-ip> } | any-source } { { <destination> <destination-wildcard> } | { host-destination
<destination-host-ip> } | any-destination }
Explanation
The rule used to configure source control.
This rule does not take effect until it is applied to specified port. Using the NO form
of it can delete specified rule.
Explanation
Used to configure the rules source control uses to port, the
NO form cancels the configuration.
Explanation
Globally enable IPv4 and IPv6destination control. The no
operation of this command will globally disable destination
control. All of the other configuration can only take effect
after globally enabled. The next is configuring destination
control rules, which are similar.
Next is to configure destination control rule. It is similar to source control, except to use ACL
No. of 6000-7999.
Command
Global Configuration Mode
[no] access-list <6000-7999> { deny | permit }
ip { { <source> <source-wildcard> } | { hostsource <source-host-ip> { range<2-65535> | }
} | any-source } { { <destination> <destinationwildcard> } | { host-destination <destination-hostip> { range<2-255> | } } | any-destination }
Explanation
The rule used to configure destination control. This rule does not take effect until it
is applied to source IP or VLAN-MAC and
port. Using the NO form of it can delete
specified rule.
250
The last is to configure the rule to specified source IP, source VLAN MAC or specified port. It
is noticeable that, due to the above situations, these rules can only be used globally in enabling
IGMP-SNOOPING. And if IGMP-SNOOPING is not enabled, then only source IP rule can be used
under IGMP Protocol. The configuration commands are as follows:
Command
Port Configuration Mode
[no] ip multicast destinationcontrol access-group <60007999>
Global Configuration Mode
[no] ip multicast destinationcontrol <1-4094> <macaddr>
access-group <6000-7999>
[no] ip multicast destinationcontrol
<IPADDRESS/M>
access-group <6000-7999>
Explanation
Used to configure the rules destination control uses to port,
the NO form cancels the configuration.
Used to configure the rules destination control uses to specify VLAN-MAC, the NO form cancels the configuration.
Used to configure the rules destination control uses to specified IP address/net mask, the NO form cancels the configuration.
Explanation
Configure multicast strategy, specify priority for sources and
groups in specific range, and the range is <0-7>.
251
2. Destination Control
We want to limit users with address in 10.0.0.0/8 network segment from entering the group of
238.0.0.0/8, so we can make the following configuration:
Firstly enable IGMP snooping in the VLAN it is located (Here it is assumed to be in VLAN2)
Switch(config)#ip igmp snooping
Switch(config)#ip igmp snooping vlan 2
After that, configure relative destination control access-list, and configure specified IP address
to use that access-list.
Switch(config)#access-list 6000 deny ip any 238.0.0.0 0.255.255.255
Switch(config)#access-list 6000 permit ip any any
Switch(config)#multicast destination-control
Switch(config)#ip multicast destination-control 10.0.0.0/8 access-group 6000
In this way, users of this network segment can only join groups other than 238.0.0.0/8.
3. Multicast strategy
Server 210.1.1.1 is distributing important multicast data on group 239.1.2.3, we can configure
on its join-in switch as follows:
Switch(config)#ip multicast policy 210.1.1.1/32 239.1.2.3/32 cos 4
In this way, the multicast stream will have a priority of value 4 (Usually this is pretty higher, the
higher possible one is protocol data; if higher priority is set, when there is too many multicast data,
it might cause abnormal behavior of the switch protocol) when it gets to other switches through
this switch.
252
IGMP Snooping is also referred to as IGMP listening. The switch prevents multicast traffic from
flooding through IGMP Snooping, multicast traffic is forwarded to ports associated to multicast
devices only. The switch listens to the IGMP messages between the multicast router and hosts,
and maintains multicast group forwarding table based on the listening result, and can then decide
to forward multicast packets according to the forwarding table.
Switch provides IGMP Snooping and is able to send a query from the switch so that the user
can use switch in IP multicast.
Explanation
Enables IGMP Snooping. The no operation disables IGMP
Snooping function.
Explanation
Enables IGMP Snooping for specified VLAN. The
no operation disables IGMP Snooping for specified VLAN.
Enable IGMP Snooping proxy function, the no
command disables the function.
Configure the max group count of vlan and the
max source count of every group. The 'no ip igmp
snooping vlan <vlan-id> limit' command cancels
this configuration.
Configure the number of groups which are allowed joining and the maximum of the source in
each group under the IGMP Snooping port. Configure the strategy when it is up to the upper limit,
including 'replace' and 'drop'. No command configures as 'no limitation'.
Set this vlan to layer 2 general querier. It is recommended to configure a layer 2 general querier
on a segment. The 'no ip igmp snooping vlan
<vlan-id> l2-general-querier' command cancels
this configuration.
Configure the version number of a general query
from a layer 2 general querier.
253
Configure forwarding IGMP packet source address, The no operation cancels the packet
source address.
254
Multicast Server 1
Multicast Server 2
Multicast port
IGMP Snooping
Group 1
Group 1
Group 1
Group 2
255
Scenario 2: L2-general-querier
Multicast Server
Group 1
Group 2
Switch A
IGMP Snooping
L2 general querier
Switch B
IGMP Snooping
Group 1
Group 1
Group 1
Group 2
IGMP snooping does not distribute entries when layer 3 multicast protocol is enabled. It only
does the following tasks.
Remove the layer 2 multicast entries.
Provide query functions to the layer 3 with vlan, S, and G as the parameters.
When layer 3 IGMP is disabled, re-enable distributing layer 2 multicast entries.
By looking up the layer 3 IPMC entries, it can be found that ports can be indicated by the layer
3 multicast entries. This ensures the IGMP snooping can work in cooperation with the layer 3
multicast protocols.
257
Chapter 43
IPv6 Multicast Protocol
43.1 IPv6 DCSCM
43.2 MLD Snooping
43.2.1 Introduction to MLD Snooping
MLD, the Multicast Listener Discovery Protocol, is used to realize multicasting in the IPv6. MLD
is used by the network equipments such as routers which supports multicast for multicast listener
discovery, also used by listeners looking forward to join certain multicast group informing the router
to receive data packets from certain multicast address, all of which are done through MLD message
exchange. First the router send an MLD Multicast listener Query message through a multicast
address which can address all the listeners (namely ff02::1). Once there is a listener who wishes
to join the multicast address, it will send a MLD Multicast listener Report back through the multicast
address.
MLD Snooping is namely the MLD listening. The switch restricts the multicast traffic from
flooding through MLD Snooping, and forward the multicast traffic to ports associated to multicast
devices only. The switch listens to the MLD messages between multicast routers and listeners, and
maintains the multicast group forwarding list based on the listening result. The switches forwards
multicast packets according to the multicast forwarding list
The switch realizes the MLD Snooping function while supporting MLD v2. This way, the user
can acquire IPv6 multicast with the switch.
Explanation
Enable global MLD Snooping, the 'no ipv6 mld snooping'
command disables the global MLD snooping.
258
Explanation
Enable MLD Snooping on specific VLAN. The 'no'
form of this command disables MLD Snooping on
specific VLAN.
Configure the number of the groups in which the
MLD Snooping can join, and the maximum number of sources in each group. The 'no' form of
this command restores to the default.
Set the VLAN level 2 general querier, which is
recommended on each segment. The 'no' form of
this command cancels the level 2 general querier
configuration.
Configure the static mrouter port in specific vlan.
The 'no' form of this command cancels the
mrouter port configuration.
Enable the function that the specified VLAN
learns mrouter-port (according to pimv6 packets), the no command will disable the function.
Configure the keep-alive time of the mrouter port.
The 'no' form of this command restores to the default.
Configure the query interval. The 'no' form of this
command restores to the default.
Configure immediate leave multicast group function for the MLD Snooping of specific VLAN. The
'no' form of this command cancels the immediate
leave configuration.
Configure the query maximum response period.
The 'no' form of this command restores to the default.
Configure the query robustness, the 'no' form of
this command restores to the default.
259
ipv6 mld snooping vlan <vlan-id> staticgroup <X:X::X:X> [source <X:X::X:X>] interface [ethernet | port-channel] <IFNAME>
no ipv6 mld snooping vlan <vlan-id> staticgroup <X:X::X:X> [source <X:X::X:X>] interface [ethernet | port-channel] <IFNAME>
Mrouter port
MLD Snooping
Group 1
Group 1
Group 1
Group 2
program 1 while the host connected to port 10 playing program 2, and the one to port 12 playing
program 3.
MLD Snooping interception results:
The multicast table on vlan 100 shows: port 1, 2, 6 are in (Multicasting Server 1, Group1),
port1, 10 are in (Multicasting Server 1, Group2), and port1, 121, 12 are in (Multicasting Server 2,
Group3)
All the four hosts successfully receive programs they are interested in. port2, 6 receives no
traffic from program2 and 3; port10 receives no traffic from program 1 and 3, and port12 receives
no traffic from program1 and 2.
Scenario 2: MLD L2-general-querier
Group 1
Group 2
Multicast Router
Switch 1
MLD Snooping Query
Mrouter port
Switch 2
MLD Snooping
Group 1
Group 1
Group 1
Group 2
261
Multicast configuration:
Same as scenario 1
MLD Snooping interception results:
Same as scenario 1
262
Chapter 44
Multicast VLAN
44.1 Introductions to Multicast VLAN
Based on current multicast order method, when orders from users in different VLAN, each VLAN
will copy a multicast traffic in this VLAN, which is a great waste of the bandwidth. By configuration
of the multicast VLAN, we add the switch port to the multicast VLAN, with the IGMP Snooping/MLD
Snooping functions enabled, users from different VLAN will share the same multicast VLAN. The
multicast traffic only exists within a multicast VLAN, so the bandwidth is saved. As the multicast
VLAN is absolutely separated from the user VLAN, security and bandwidth concerns can be met
at the same time, after the multicast VLAN is configured, the multicast traffic will be continuously
sent to the users.
Explanation
Configure a VLAN and enable the multicast
VLAN on it. The 'no multicast-vlan' command disables the multicast function on the VLAN.
Associate a multicast VLAN with several VLANs.
The no form of this command deletes the related
VLANs associated with the multicast VLAN.
Associate the specified port with the multicast
VLAN, so the associated ports are able to receive
the multicast flow. The no command cancels the
association between the ports and the multicast
VLAN.
263
Explanation
Enable the IGMP Snooping function on the multicast VLAN.
The no form of this command disables the IGMP Snooping
on the multicast VLAN.
Enable the IGMP Snooping function. The no form of this
command disables the IGMP snooping function.
Switch A
E1/0/10
E1/0/10
E1/0/1
E1/0/15
Workstation
PC1
E1/0/20
PC2
SwitchA(config)#interface vlan 20
SwitchA(Config-if-Vlan20)#ip pim dense-mode
SwitchA(Config-if-Vlan20)#exit
SwitchA(config)#ip pim multicast
SwitchA(config)# interface ethernet1/0/10
SwitchA(Config-If-Ethernet1/0/10)switchport mode trunk
SwitchB#config
SwitchB(config)#vlan 20
SwitchB(config)#vlan 100
SwitchB(config)#vlan 101
SwitchB(config)#interface ethernet 1/0/20
SwitchB(config-If-Ethernet)#switchport access vlan 101
SwitchB(config-If-Ethernet)exit
SwitchB(config)#interface ethernet 1/0/15
SwitchB(config-If-Ethernet)#switchport access vlan 100
SwitchB(config-If-Ethernet)exit
SwitchB(config)#interface ethernet 1/0/10
SwitchB(Config-If-Ethernet1/0/10)#switchport mode trunk
SwitchB(Config-If-Ethernet1/0/10)#exit
SwitchB(config)#vlan 20
SwitchB(config-vlan20)#multicast-vlan
SwitchB(config-vlan20)#multicast-vlan association 100,101
SwitchB(config-vlan20)#exit
SwitchB(config)#ip igmp snooping
SwitchB(config)#ip igmp snooping vlan 20
265
Part IX
Security Function Configuration
266
Chapter 45
ACL Configuration
45.1 Introduction to ACL
ACL (Access Control List) is an IP packet filtering mechanism employed in switches, providing
network traffic control by granting or denying access the switches, effectively safeguarding the
security of networks. The user can lay down a set of rules according to some information specific
to packets, each rule describes the action for a packet with certain information matched: 'permit'
or 'deny'. The user can apply such rules to the incoming direction of switch ports, so that data
streams in the incoming direction of specified ports must comply with the ACL rules assigned.
45.1.1 Access-list
Access-list is a sequential collection of conditions that corresponds to a specific rule. Each rule
consist of filter information and the action when the rule is matched. Information included in a rule
is the effective combination of conditions such as source IP, destination IP, IP protocol number and
TCP port, UDP port. Access-lists can be categorized by the following criteria:
Filter information based criterion: IP access-list (layer 3 or higher information), MAC
access-list (layer 2 information), and MAC-IP access-list (layer 2 or layer 3 or higher).
Configuration complexity based criterion: standard and extended, the extended mode
allows more specific filtering of information.
Nomenclature based criterion: numbered and named.
Description of an ACL should cover the above three aspects.
45.1.2 Access-group
When a set of access-lists are created, they can be applied to traffic of incoming direction on all
ports. Access-group is the description to the binding of an access-list to the incoming direction on a
specific port. When an access-group is created, all packets from in the incoming direction through
the port will be compared to the access-list rule to decide whether to permit or deny access.
The current firmware only supports ingress ACL configuration.
267
Explanation
Creates a numbered standard IP accesslist, if the access-list already exists, then a
rule will add to the current access-list; the
'no access-list <num>' command deletes a
numbered standard IP access-list.
Explanation
Creates a numbered ICMP extended IP
access rule; if the numbered extended
access-list of specified number does not exist, then an access-list will be created using
this number.
269
Explanation
Creates a standard IP access-list based on
nomenclature; the 'no ip access-list standard <name>' command deletes the namebased standard IP access-list.
270
Explanation
Creates a standard name-based IP access
rule; the 'no' form command deletes the
name-based standard IP access rule.
Explanation
Exits name-based standard IP ACL configuration mode.
Explanation
Creates an extended IP access-list basing on nomenclature; the 'no ip access-list
extended <name> ' command deletes the
name-based extended IP access-list.
Explanation
Creates an extended name-based ICMP IP
access rule; the no form command deletes
this name-based extended IP access rule.
271
Explanation
Exits extended name-based IP ACL configuration mode.
Explanation
Creates a numbered standard MAC
access-list, if the access-list already exists, then a rule will add to the current
access-list; the 'no access-list <num>'
command deletes a numbered standard
MAC access-list.
272
Explanation
Creates a numbered MAC extended
access-list, if the access-list already
exists, then a rule will add to the current
access-list; the 'no access-list <num>' command deletes a numbered MAC extended
access-list.
Explanation
Creates an extended name-based MAC access rule for other IP protocols; the no
form command deletes this name-based
extended MAC access rule.
Explanation
Creates an extended namebased MAC access rule matching MAC frame; the no form
command deletes this namebased extended MAC access
rule.
273
Creates an extended namebased MAC access rule matching untagged ethernet 2 frame;
the no form command deletes
this name-based extended MAC
access rule.
Creates an name-based extended MAC access rule
matching 802.3 frame; the no
form command deletes this
name-based extended MAC
access rule.
Creates an name-based extended MAC access rule matching tagged ethernet 2 frame;
the no form command deletes
this name-based extended MAC
access rule.
Creates an name-based extended MAC access rule
matching tagged 802.3 frame;
the no form command deletes
this name-based extended MAC
access rule.
Explanation
Creates a numbered mac-icmp
extended mac-ip access rule; if
the numbered extended accesslist of specified number does not
exist, then an access-list will be
created using this number.
274
275
Explanation
Creates an extended name-based MAC-IP
access rule; the no form command deletes
this name-based extended MAC-IP access
rule.
Explanation
Creates an extended namebased MAC-ICMP access rule;
the no form command deletes
this name-based extended
MAC-ICMP access rule.
276
Explanation
Quit extended name-based MAC-IP access
mode.
Explanation
Creates a numbered standard IPv6 accesslist, if the access-list already exists, then a
rule will add to the current access-list; the
'no access-list <num>' command deletes a
numbered standard IPv6 access-list.
277
Explanation
Creates a numbered extended
IPv6 access-list, if the accesslist already exists, then a rule will
add to the current access-list;
the no command deletes a numbered standard IPv6 access-list.
Explanation
Creates a standard IP access-list based on
nomenclature; the no command delete the
name-based standard IPv6 access-list.
Explanation
Creates a standard name-based IPv6 access rule; the no form command deletes the
name-based standard IPv6 access rule.
278
Explanation
Exits name-based standard IPv6 ACL configuration mode.
Explanation
Creates an extended IPv6 access-list basing on nomenclature; the no command
deletes the name-based extended IPv6
access-list.
Explanation
Creates an extended name-based ICMP
IPv6 access rule; the no form command
deletes this name-based extended IPv6 access rule.
279
Creates an extended name-based IPv6 access rule for other IPv6 protocols; the no
form command deletes this name-based
extended IPv6 access rule.
Creates an extended name-based IPv6 access rule; the no form command deletes
this name-based extended IPv6 access
rule.
Explanation
Exits extended name-based IPv6 ACL configuration mode.
Explanation
Enables global packet filtering function.
Disables global packet filtering function.
Explanation
Sets default action to firewall.
Explanation
Create
a
time
range
named
time_range_name.
Stop the time range function named
time_range_name.
280
Explanation
Configure the time range for the
request of the week, and every
week will run by the time range.
Explanation
Configure absolute time range.
Stop the function of the time range.
Explanation
Clear the filtering information of the specified port.
281
282
Switch#show firewall
Firewall Status: Enable.
Firewall Default Rule: Permit.
Switch#show ipv6 access-lists
Ipv6 access-list 600(used 1 time(s))
ipv6 access-list 600 deny 2003:1:1:1::0/64 any-source
ipv6 access-list 600 permit 2003:1:1:1:66::0/80 any-source
Switch #show access-group interface ethernet 1/0/10
interface name:Ethernet1/0/10
IPv6 Ingress access-list used is 600, traffic-statistics Disable.
Scenario 5:
The configuration requirement is stated as below: The interface 1, 2, 5, 7 belongs to vlan100,
Hosts with 192.168.0.1 as its IP address should be disabled from accessing the listed interfaces.
Configuration description:
1. Create the corresponding access list.
2. Configure datagram filtering.
3. Bind the ACL to the related interface.
The configuration steps are listed as below.
Switch
Switch
Switch
Switch
Switch
Switch
Switch
Switch
(config)#firewall enable
(config)#vlan 100
(Config-Vlan100)#switchport interface ethernet 1/0/1;2;5;7
(Config-Vlan100)#exit
(config)#access-list 1 deny host-source 192.168.0.1
(config)#interface ethernet1/0/1;2;5;7
(config-if-port-range)#ip access-group 1 in
(Config-if-Vlan100)#exit
Configuration result:
Switch (config)#show access-group interface vlan 100
Interface VLAN 100:
Ethernet1/0/1:
IP Ingress access-list used is 1, traffic-statistics
Ethernet1/0/2:
IP Ingress access-list used is 1, traffic-statistics
Ethernet1/0/5:
IP Ingress access-list used is 1, traffic-statistics
Ethernet1/0/7:
IP Ingress access-list used is 1, traffic-statistics
Disable.
Disable.
Disable.
Disable.
Default rule will be used only if no ACL is bound to the incoming direction of the port, or no
ACL entry is matched.Each ingress port can bind one MAC-IP ACL, one IP ACL, one MAC
ACL, one IPv6 standard ACL (via the physical interface mode or Vlan interface mode).
When binding four ACL and packet matching several ACL at the same time, the priority
relations are as follows in a top-down order. If the priority is same, then the priority of configuration at first is higher.
Ingress IPv6 ACL
Ingress MAC-IP ACL
Ingress IP ACL
Ingress MAC ACL
The number of ACLs that can be successfully bound depends on the content of the ACL
bound and the hardware resource limit. Users will be prompted if an ACL cannot be bound
due to hardware resource limitation.
If an access-list contains same filtering information but conflicting action rules, binding to the
port will fail with an error message. For instance, configuring 'permit tcp any any-destination'
and 'deny tcp any any-destination' at the same time is not permitted.
Viruses such as 'worm.blaster' can be blocked by configuring ACL to block specific ICMP
packets or specific TCP or UDP port packet.
If the physical mode of an interface is TRUNK, ACL can only be configured through physical
interface mode.
ACL configured in the physical mode can only be disabled in the physical mode. Those configured in the VLAN interface configuration mode can only be disabled in the VLAN interface
mode.
When a physical interface is added into or removed from a VLAN (with the trunk interfaces as
exceptions), ACL configured in the corresponding VLAN will be bound or unbound respectively. If ACL configured in the target VLAN, which is configured in VLAN interface mode,
conflicts with existing ACL configuration on the interface, which is configured in physical
interface mode, the configuration will fail to effect.
When no physical interfaces are configured in the VLAN, the ACL configuration of the VLAN
will be removed. And it can not recover if new interfaces are added to the VLAN.
When the interface mode is changed from access mode to trunk mode, the ACL configured
in VLAN interface mode which is bound to physical interface will be removed. And when
the interface mode is changed from trunk mode to access mode, ACL configured in VLAN1
interface mode will be bound to the physical interface. If binding fails, the changing will fail
either.
When removing a VLAN configuration, if there are any ACLs bound to the VLAN, the ACL
will be removed from all the physical interfaces belonging to the VLAN, and it will be bound to
VLAN 1 ACL(if ACL is configured in VLAN1). If VLAN 1 ACL binding fails, the VLAN removal
operation will fail.
286
Chapter 46
802.1x Configuration
46.1 Introduction to 802.1x
The 802.1x protocol originates from 802.11 protocol, the wireless LAN protocol of IEEE, which is
designed to provide a solution to doing authentication when users access a wireless LAN. The
LAN defined in IEEE 802 LAN protocol does not provide access authentication, which means as
long as the users can access a LAN controlling device (such as a LAN Switch), they will be able
to get all the devices or resources in the LAN. There was no looming danger in the environment
of LAN in those primary enterprise networks.
However, along with the boom of applications like mobile office and service operating networks,
the service providers should control and configure the access from user. The prevailing application
of WLAN and LAN access in telecommunication networks, in particular, make it necessary to
control ports in order to implement the user-level access control. And as a result, IEEE LAN/WAN
committee defined a standard, which is 802.1x, to do Port-Based Network Access Control. This
standard has been widely used in wireless LAN and ethernet.
'Port-Based Network Access Control' means to authenticate and control the user devices on
the level of ports of LAN access devices. Only when the user devices connected to the ports pass
the authentication, can they access the resources in the LAN, otherwise, the resources in the LAN
won't be available.
Supplicant system
Supplicant PAE
Authentication
server system
Authenticator system
Services offered
by Authenticator s
system
Authenticator
PAE
Port
unauthorized
EAP protocol
exchanges
carried in higher
layer protocol
Authentication
server
LAN / WLAN
3. Controlled direction
In unauthenticated status, controlled ports can be set as unidirectional controlled or bi-directionally
controlled.
When the port is bi-directionally controlled, the sending and receiving of all frames is forbidden.
When the port is unidirectional controlled, no frames can be received from the supplicant
systems while sending frames to the supplicant systems is allowed.
Notes: At present, this kind of switch only supports unidirectional control.
Supplicant
PAE
EAPOL
Authenticator
System PAE
RADIUS
Authentication
server system
7
PAE Ethernet Type
Protocol Version
Type
Length
15
Packet Body
2
4
6
N
15
Code
Identifier
2
4
Length
Data
7
Code
N
Identifier
Figure 46.5: the Format of Data Domain in Request and Response Packets
Identifier: to assist matching the Request and Response messages.
Length: the length of the EAP packet, covering the domains of Code, Identifier, Length and
Data, in byte.
Data: the content of the EAP packet, depending on the Code type.
7
Type
15
Length
N
String
EAP packets
1
Type
2
Length
18 bytes
String
292
PEAP
CHAP
TTLS
TLS
MD5
OTP
EAP
802.1x/EAPOL
802.3
Ethernet
802.5
Token ring
802.11
Wireless
293
Supplicant
PAE
EAPOL
Authenticator
System PAE
EAPOR
RADIUS
server
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity
EAP-Request/MD5 Challenge
EAP-Response/MD5 Challenge
EAP-Success
RADIUS Access-Request
(EAP-Response/Identity)
RADIUS Access-Challenge
(EAP-Request/MD5 Challenge)
RADIUS Access-Request
(EAP-Response/MD5 Challenge)
RADIUS Access-Accept
(EAP-Success)
Port authorized
Handshake request packet
[EAP-Request/Identity]
Handshake response packet
{EAP-Response/Identity]
...
EAPOL-Logoff
Port unauthorized
294
Supplicant
PAE
EAPOL
Authenticator
System PAE
EAPOR
RADIUS
server
EAPOL-Start
EAP-Request/Identity
RADIUS Access-Request
(EAP-Response/Identity)
RADIUS Access-Challenge
(EAP-Request/EAP-TLS Start)
RADIUS Access-Request
(EAP-Response/EAP-TLS client_hello)
EAP-Response/Identity
EAP-Request/EAP-TLS Start
EAP-Response/EAP-TLS client_hello
EAP-Response/EAP-TLS:
TLS serv er_hello, TLS certificat e,
TLS serv er_exchange, TLS certificat e_request,
TLS serv er_hello_done
EAP-Response/EAP-TLS:
TLS certificat e, TLS client_key_exchange, [TLS
certificate_verify] TLS change_cipher_spec,
TLS finished
EAP-Response/EAP-TLS:
TLS change_cipher_spec, TLS finished
RADIUS Access-Request
(EAP-Response/EAP-TLS)
RADIUS Access-Accept
(EAP-Success)
EAP-Response/EAP-TLS
EAP-Success
...
Supplicant
PAE
Authenticator
System PAE
EAPOL
EAPOR
RADIUS
server
EAPOL-Start
EAP-Request/Identity
RADIUS Access-Request
(EAP-Response/Identity)
RADIUS Access-Challenge
(EAP-Request/PEAP Start)
EAP-Response/Identity
EAP-Request/PEAP Start
RADIUS Access-Request
EAP-Response(Empty)
RADIUS Access-Challenge
(EAP-Request/MD5 Challenge)
RADIUS Access-Request
(EAP-Response/MD5 Password)
RADIUS Access-Accept
(EAP-Success)
EAP-Response(Empty)
EAP-Request/MD5 Challenge
EAP-Response/MD5 Password
EAP-Success
...
Supplicant
PAE
EAPOL
Authenticator
System PAE
RADIUS
RADIUS
server
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity
EAP-Request/MD5 Challenge
EAP-Response/MD5 Challenge
RADIUS Access-Request
(CHAP-Response/MD5 Challenge)
RADIUS Access-Accept
(CHAP-Success)
EAP-Success
Port authorized
Handshake request packet
[EAP-Request/Identity]
Handshake response packet
{EAP-Response/Identity]
...
EAPOL-Logoff
Port unauthorized
The access device will add the port into Guest VLAN if there is no supplicant getting authenticated
successfully in a certain stretch of time because of lacking exclusive authentication supplicant
system or the version of the supplicant system being too low.
Once the 802.1x feature is enabled and the Guest VLAN is configured properly, a port will be
added into Guest VLAN, just like Auto VLAN, if there is no response message from the supplicant
system after the device sends more authentication-triggering messages than the upper limit (EAPRequest/Identity) from the port.
The authentication server assigns an Auto VLAN, and then the port leaves Guest VLAN and
joins the assigned Auto VLAN. When the user becomes offline, the port will be allocated to
the specified Guest VLAN again.
The authentication server assigns an Auto VLAN, and then the port leaves Guest VLAN and
joins the specified VLAN. When the user becomes offline, the port will be allocated to the
specified Guest VLAN again.
Explanation
Enables the 802.1x function in the switch
and ports; the no command disables the
802.1x function.
Enables the switch force client software using private 802.1x authentication packet format. The no command will disable this function.
Sets free access network resource for
unauthorized dot1x user. The no command
close the resource.
Enable the 802.1x unicast passthrough
function of switch; the no operation of this
command will disable this function.
298
Explanation
Sets the 802.1x authentication mode; the
no command restores the default setting.
Explanation
Sets the port access management method;
the no command restores MAC-based access management.
Sets the maximum number of access users
for the specified port; the no command restores the default setting of allowing 1 user.
Set the upper limit of the number of users
allowed accessing the specified port, only
used when the access control mode of the
port is userbased; the no command is used
to reset the limit to 10 by default.
Set the guest vlan of the specified port; the
no command is used to delete the guest
vlan.
Set the single-mode based on portbase authentication mode; the no command disables this function.
Explanation
Enables the 802.1x address filter function
in the switch; the no command disables the
802.1x address filter function.
Enables this command, when the dot1x certification according to mac is down, delete
the user who passed the certification of the
port; The no command does not make the
down operation.
Adds 802.1x address filter table entry, the
no command deletes 802.1x filter address
table entries.
299
Enables the EAP relay authentication function in the switch; the no command sets
EAP local end authentication.
Explanation
Configure the max controlled/trusted user
number supported by the switch; Without
implementing this command, the default
number would be 128.
dot1x re-authentication
no dot1x re-authentication
dot1x timeout quiet-period <seconds>
no dot1x timeout quiet-period
dot1x timeout re-authperiod <seconds>
no dot1x timeout re-authperiod
dot1x timeout tx-period <seconds>
no dot1x timeout tx-period
dot1x re-authenticate [ interface <interfacename> ]
Explanation
Sets the number of EAP request/MD5
frame to be sent before the switch re-initials
authentication on no supplicant response,
the no command restores the default setting.
Enables periodical supplicant authentication; the no command disables this function.
Sets time to keep silent on port authentication failure; the no command restores the
default value.
Sets the supplicant re-authentication interval; the no command restores the default
setting.
Sets the interval for the supplicant to retransmit EAP request/identity frame; the no
command restores the default setting.
Enables IEEE 802.1x re-authentication (no
wait timeout requires) for all ports or a specified port.
300
Update
Server
Authenticator
Server
E1/3
VLAN10
E1/2
VLAN2
Switch
E1/6
VLAN5
Internet
User
Update
Server
Authenticator
Server
E1/3
VLAN10
E1/2
VLAN2
Switch
E1/6
VLAN5
Internet
User
# Create VLAN100.
Switch(config)#vlan 100
# Enable the global 802.1x function
Switch(config)#dot1x enable
# Enable the 802.1x function on port Ethernet1/0/2
Switch(config)#interface ethernet1/0/2
Switch(Config-If-Ethernet1/0/2)#dot1x enable
# Set the link type of the port as access mode.
Switch(Config-If-Ethernet1/0/2)#switch-port mode access
# Set the access control mode on the port as portbased.
Switch(Config-If-Ethernet1/0/2)#dot1x port-method portbased
# Set the access control mode on the port as auto.
Switch(Config-If-Ethernet1/0/2)#dot1x port-control auto
# Set the port's Guest VLAN as 100.
Switch(Config-If-Ethernet1/0/2)#dot1x guest-vlan 100
Switch(Config-If-Ethernet1/0/2)#exit
Using the command of show running-config or show interface ethernet1/0/2, users can check
the configuration of Guest VLAN. When there is no online user, no failed user authentication or no
user gets offline successfully, and more authentication-triggering messages (EAP-Request/Identity)
302
Update
Server
Authenticator
Server
E1/3
VLAN10
E1/2
VLAN2
Switch
E1/6
VLAN5
Internet
User
Switch
10.1.1.2
10.1.1.1
Radius
Server
10.1.1.3
Switch(config)#interface vlan 1
Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-vlan1)#exit
Switch(config)#radius-server authentication host 10.1.1.3
Switch(config)#radius-server accounting host 10.1.1.3
Switch(config)#radius-server key test
Switch(config)#aaa enable
Switch(config)#aaa-accounting enable
Switch(config)#dot1x enable
Switch(config)#interface ethernet 1/0/2
Switch(Config-Ethernet1/0/2)#dot1x enable
Switch(Config-Ethernet1/0/2)#dot1x port-control auto
Switch(Config-Ethernet1/0/2)#exit
Switch
2004:1:2:3::2
2004:1:2:3::1
Radius Server
2004:1:2:3::3
305
Chapter 47
The Number Limitation Function of MAC
and IP in Port, VLAN Configuration
47.1 Introduction to the Number Limitation Function of MAC
and IP in Port, VLAN
MAC address list is used to identify the mapping relationship between the destination MAC addresses and the ports of switch. There are two kinds of MAC addresses in the list: static MAC
address and dynamic MAC address. The static MAC address is set by users, having the highest
priority (will not be overwritten by dynamic MAC address), and will always be effective; dynamic
MAC address is learnt by the switch through transmitting data frames, and will only be effective
in a specific time range. When the switch receives a data framed waiting to be transmitted, it will
study the source MAC address of the data frame, build a mapping relationship with the receiving
port, and then look up the MAC address list for the destination MAC address. If any matching list
entry is found, the switch will transmit the data frame via the corresponding port, or, the switch
will broadcast the data frame over the VLAN it belongs to. If the dynamically learnt MAC address
matches no transmitted data in a long time, the switch will delete it from the MAC address list.
Usually the switch supports both the static configuration and dynamic study of MAC address,
which means each port can have more than one static set MAC addresses and dynamically learnt
MAC addresses, and thus can implement the transmission of data traffic between port and known
MAC addresses. When a MAC address becomes out of date, it will be dealt with broadcast.
No number limitation is put on MAC address of the ports of our current switches; every port can
have several MAC addressed either by configuration or study, until the hardware list entries are
exhausted. To avoid too many MAC addresses of a port, we should limit the number of MAC
addresses a port can have.
For each INTERFACE VLAN, there is no number limitation of IP; the upper limit of the number
of IP is the upper limit of the number of user on an interface, which is, at the same time, the
upper limit of ARP and ND list entry. There is no relative configuration command can be used
to control the sent number of these list entries. To enhance the security and the controllability of
our products, we need to control the number of MAC address on each port and the number of
ARP, ND on each INTERFACE VLAN. The number of static or dynamic MAC address on a port
should not exceed the configuration. The number of user on each VLAN should not exceed the
configuration, either.
Limiting the number of MAC and ARP list entry can avoid DOS attack to a certain extent. When
306
malicious users frequently do MAC or ARP cheating, it will be easy for them to fill the MAC and
ARP list entries of the switch, causing successful DOS attacks.
To summer up, it is very meaningful to develop the number limitation function of MAC and IP
in port, VLAN. Switch can control the number of MAC address of ports and the number ARP, ND
list entry of ports and VLAN through configuration commands.
Limiting the number of dynamic MAC and IP of ports:
1. Limiting the number of dynamic MAC. If the number of dynamically learnt MAC address by
the switch is already larger than or equal with the max number of dynamic MAC address,
then shutdown the MAC study function on this port, otherwise, the port can continue its study.
2. Limiting the number of dynamic IP. If the number of dynamically learnt ARP and ND by the
switch is already larger than or equal with the max number of dynamic ARP and ND, then
shutdown the ARP and ND study function of this port, otherwise, the port can continue its
study.
Limiting the number of MAC, ARP and ND of interfaces:
1. Limiting the number of dynamic MAC. If the number of dynamically learnt MAC address by
the VLAN of the switch is already larger than or equal with the max number of dynamic MAC
address, then shutdown the MAC study function of all the ports in this VLAN, otherwise, all
the ports in this VLAN can continue their study (except special ports).
2. Limiting the number of dynamic IP. If the number of dynamically learnt ARP and ND by the
switch is already larger than or equal with the max number of dynamic ARP and ND, then
the VLAN will not study any new ARP or ND, otherwise, the study can be continued.
Explanation
Enable and disable the number limitation function of
MAC on the ports.
307
Explanation
Enable and disable the number limitation function of
MAC in the VLAN.
Explanation
Configure the timeout value of querying dynamic MAC.
Explanation
Set the violation mode of the port, the no command
restores the violation mode to protect.
5. Display and debug the relative information of number limitation of MAC and IP on
ports
Command
Admin mode
show mac-address dynamic count {
vlan <vlan-id> | interface ethernet
<portName> }
show arp-dynamic count { vlan <vlanid> | interface ethernet <portName> }
Explanation
Display the number of dynamic MAC in corresponding
ports and VLAN.
Display the number of dynamic ARP in corresponding
ports and VLAN.
308
Switch A
Switch B
PC
PC
PC
PC
Figure 47.1: The Number Limitation of MAC and IP in Port, VLAN Typical Configuration Example
In the network topology above, SWITCH B connects to many PC users, before enabling the
number limitation function of MAC and IP in Port, VLAN, if the system hardware has no other
limitation, SWTICH A and SWTICH B can get the MAC, ARP, ND list entries of all the PC, so
limiting the MAC, ARP list entry can avoid DOS attack to a certain extent. When malicious users
frequently do MAC, ARP cheating, it will be easy for them to fill the MAC, ARP list entries of the
switch, causing successful DOS attacks. Limiting the MAC, ARP, ND list entry can prevent DOS
attack.
309
On port 1/0/1 of SWITCH A, set the max number can be learnt of dynamic MAC address as
20, dynamic ARP address as 20, NEIGHBOR list entry as 10. In VLAN 1, set the max number of
dynamic MAC address as 30, of dynamic ARP address as 30, NEIGHBOR list entry as 20.
SWITCH A configuration task sequence:
Switch(config)#interface ethernet 1/0/1
Switch(Config-If-Ethernet1/0/1)#switchport mac-address dynamic maximum 20
Switch(Config-If-Ethernet1/0/1)#switchport arp dynamic maximum 20
Switch(Config-If-Ethernet1/0/1)#switchport nd dynamic maximum 10
Switch(Config-if-Vlan1)#vlan mac-address dynamic maximum 30
310
Chapter 48
Operational Configuration of AM Function
48.1 Introduction to AM Function
AM (Access Management) means that when a switch receives an IP or ARP message, it will
compare the information extracted from the message (such as source IP address or source MACIP address) with the configured hardware address pool. If there is an entry in the address pool
matching the information (source IP address or source MAC-IP address), the message will be
forwarded, otherwise, dumped. The reason why source-IP-based AM should be supplemented
by source-MAC-IP-based AM is that IP address of a host might change. Only with a bound IP,
can users change the IP of the host into forwarding IP, and hence enable the messages from the
host to be forwarded by the switch. Given the fact that MAC-IP can be exclusively bound with a
host, it is necessary to make MAC-IP bound with a host for the purpose of preventing users from
maliciously modifying host IP to forward the messages from their hosts via the switch.
With the interface-bound attribute of AM, network mangers can bind the IP (MAC-IP) address of
a legal user to a specified interface. After that, only the messages sending by users with specified
IP (MAC-IP) addresses can be forwarded via the interface, and thus strengthen the monitoring of
the network security.
311
1. Enable AM function
Command
Global Mode
am enable
no am enable
Explanation
Globally enable or disable AM function.
Explanation
Enable/disable AM function on the port. When the AM
function is enabled on the port, no IP or ARP message
will be forwarded by default.
Explanation
Configure the forwarding IP of the port.
Explanation
Configure the forwarding MAC-IP of the port.
Explanation
Delete MAC-IP address pool or IP address pool or both
pools configured by all users.
Explanation
Display the AM configuration information of one port or
all ports.
312
Port 1
Port 2
HUB 1
PC
PC
HUB 2
PC
PC
313
Chapter 49
Security Feature Configuration
49.1 Introduction to Security Feature
Before introducing the security features, we here first introduce the DoS. The DoS is short for
Denial of Service, which is a simple but effective destructive attack on the internet. The server
under DoS attack will drop normal user data packet due to non-stop processing the attackers
data packet, leading to the denial of the service and worse can lead to leak of sensitive data of the
server.
Security feature refers to applications such as protocol check which is for protecting the server
from attacks such as DoS. The protocol check allows the user to drop matched packets based
on specified conditions. The security features provide several simple and effective protections
against Dos attacks while acting no influence on the linear forwarding performance of the switch.
Explanation
srcip-
Enable/disable the function of checking if the IP source address is the same as the destination address.
Explanation
Enable/disable checking TCP label function.
314
Explanation
Enable/disable the prevent-port-cheat function.
Explanation
Enable/disable the prevent TCP fragment attack function.
Configure the minimum permitted TCP head length of the
packet. This command has no effect when used separately,
the user should enable the dosattack-check tcp-fragment
enable.
Explanation
Enable/disable the prevent ICMP fragment attack function.
Configure the max permitted ICMPv4 net load length. This
command has not effect when used separately, the user
have to enable the dosattack-check icmp-attacking enable.
315
dosattack-check
dosattack-check
dosattack-check
dosattack-check
srcip-equal-dstip enable
srcport-equal-dstport enable
icmp-attacking enable
icmpV4-size 100
316
Chapter 50
TACACS+ Configuration
50.1 Introduction to TACACS+
TACACS+ terminal access controller access control protocol is a protocol similar to the radius
protocol for control the terminal access to the network. Three independent functions of Authentication, Authorization, Accounting are also available in this protocol. Compared with RADIUS,
the transmission layer of TACACS+ protocol is adopted with TCP protocol, further with the packet
head ( except for standard packet head) encryption, this protocol is of a more reliable transmission
and encryption characteristics, and is more adapted to security control.
According to the characteristics of the TACACS+ (Version 1.78), we provide TACACS+ authentication function on the switch, when the user logs, such as telnet, the authentication of user name
and password can be carried out with TACACS+.
Explanation
Configure the TACACS+ server key; the 'no tacacsserver key' command deletes the key.
317
Explanation
Configure the IP address, listening port number, the
value of timeout timer and the key string of the
TACACS+ server; the no form of this command deletes
the TACACS+ authentication server.
Explanation
Configure the authentication timeout for the TACACS+
server, the 'no tacacs-server timeout' command restores the default configuration.
Explanation
To configure the source IP address for the TACACS+
packets for the switch.
10.1.1.1
TACACS Server
10.1.1.3
Switch(config)#interface vlan 1
Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-vlan1)#exit
Switch(config)#tacacs-server authentication host 10.1.1.3
Switch(config)#tacacs-server key test
Switch(config)#authentication line vty login tacacs
319
Chapter 51
RADIUS Configuration
51.1 Introduction to RADIUS
51.1.1 AAA and RADIUS Introduction
AAA is short for Authentication, Authorization and Accounting, it provide a consistency framework
for the network management safely. According to the three functions of Authentication, Authorization, Accounting, the framework can meet the access control for the security network: which
one can visit the network device, which access-level the user can have and the accounting for the
network resource.
RADIUS (Remote Authentication Dial in User Service), is a kind of distributed and client/server
protocol for information exchange. The RADIUS client is usually used on network appliance to
implement AAA in cooperation with 802.1x protocol. The RADIUS server maintains the database
for AAA, and communicates with the RADIUS client through RADIUS protocol. The RADIUS
protocol is the most common used protocol in the AAA framework.
7
Code
15
Identifier
31
Length
Authenticator
Attributes
320
Code field(1octets): is the type of the RADIUS packet. Available value for the Code field is
show as below:
1
2
3
4
5
11
Access-Request
Access-Accept
Access-Reject
Accounting-Request
Accounting-Response
Access-Challenge
Identifier field (1 octet): Identifier for the request and answer packets.
Length field (2 octets): The length of the overall RADIUS packet, including Code, Identifier,
Length, Authenticator and Attributes
Authenticator field (16 octets): used for validation of the packets received from the RADIUS
server. Or it can be used to carry encrypted passwords. This field falls into two kinds: the Request
Authenticator and the Response Authenticator.
Attribute field: used to carry detailed information about AAA. An Attribute value is formed by
Type, Length, and Value fields.
Type field (1 octet), the type of the attribute value, which is shown as below:
Property
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Type of property
User-Name
User-Password
CHAP-Password
NAS-IP-Address
NAS-Port
Service-Type
Framed-Protocol
Framed-IP-Address
Framed-IP-Netmask
Framed-Routing
Filter-Id
Framed-MTU
Framed-Compression
Login-IP-Host
Login-Service
Login-TCP-Port
Property
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
17
18
19
20
21
22
(unassigned)
Reply-Message
Callback-Number
Callback-Id
(unassigned)
Framed-Route
39
40-59
60
61
62
63
Type of property
Framed-IPX-Network
State
Class
Vendor-Specific
Session-Timeout
Idle-Timeout
Termination-Action
Called-Station-Id
Calling-Station-Id
NAS-Identifier
Proxy-State
Login-LAT-Service
Login-LAT-Node
Login-LAT-Group
Framed-AppleTalk-Link
Framed-AppleTalkNetwork
Framed-AppleTalk-Zone
(reserved for accounting)
CHAP-Challenge
NAS-Port-Type
Port-Limit
Login-LAT-Port
Length field (1 octet), the length in octets of the attribute including Type, Length and Value
321
fields.
Value field, value of the attribute whose content and format is determined by the type and
length of the attribute.
Explanation
To enable the AAA authentication function. The no
form of this command will disable the AAA authentication function.
To enable AAA accounting. The no form of this command will disable AAA accounting.
Enable or disable the update accounting function.
Explanation
To configure the encryption key for the RADIUS server.
The no form of this command will remove the configured key.
Explanation
Specifies the IPv4/IPv6 address and the
port number, whether be primary server
for RADIUS accounting server; the no
command deletes the RADIUS accounting
server.
322
Explanation
To configure the interval that the RADIUS becomes
available after it is down. The no form of this command
will restore the default configuration.
To configure retry times for the RADIUS packets. The
no form of this command restores the default configuration.
To configure the timeout value for the RADIUS server.
The no form of this command will restore the default
configuration.
To configure the update interval for accounting. The
no form of this command will restore the default configuration.
Explanation
To configure the source IP address for the RADIUS
packets for the switch.
To configure the source IPv6 address for the RADIUS
packets for the switch.
10.1.1.2
10.1.1.1
RADIUS Server
10.1.1.3
2004:1:2:3::1
RADIUS Server
2004:1:2:3::3
325
Chapter 52
SSL Configuration
52.1 Introduction to SSL
As the computer networking technology spreads, the security of the network has been taking more
and more important impact on the availability and the usability of the networking application. The
network security has become one of the greatest barriers of modern networking applications.
To protect sensitive data transferred through Web, Netscape introduced the Secure Socket
Layer - SSL protocol, for its Web browser. Up till now, SSL 2.0 and 3.0 has been released. SSL 2.0
is obsolete because of security problems, and it is not supported on the switches of Network. The
SSL protocol uses the public-key encryption, and has become the industry standard for secure
communication on internet for Web browsing. The Web browser integrates HTTP and SSL to
realize secure communication.
SSL is a safety protocol to protect private data transmission on the Internet. SSL protocols are
designed for secure transmission between the client and the server, and authentication both at
the server sides and optional client. SSL protocols must build on reliable transport layer (such as
TCP). SSL protocols are independent for application layer. Some protocols such as HTTP, FTP,
TELNET and so on, can build on SSL protocols transparently. The SSL protocol negotiates for the
encryption algorithm, the encryption key and the server authentication before data is transmitted.
Ever since the negotiation is done, all the data being transferred will be encrypted.
Via above introduction, the security channel is provided by SSL protocols have below three
characteristics:
Privacy. First they encrypt the suite through negotiation, then all the messages be encrypted.
Affirmation. Though the client authentication of the conversational is optional, but the server
is always authenticated.
Reliability. The message integrality inspect is included in the sending message (use MAC).
326
the other program in sequence, lose packet and re-forwarding will not appear. A lot of transmission protocols can provide such kind of service in theory, but in actual application, SSL is almost
running on TCP, and not running on UDP and IP directly.
When web function is running on the switch and client visit our web site through the internet
browser, we can use SSL function. The communication between client and switch through SSL
connect can improve the security.
Firstly, SSL should be enabled on the switch. When the client tries to access the switch through
https method, a SSL session will be set up between the switch and the client. When the SSL
session has been set up, all the data transmission in the application layer will be encrypted.
SSL handshake is done when the SSL session is being set up. The switch should be able to
provide certification keys. Currently the keys provided by the switch are not the formal certification
keys issued by official authentic, but the private certification keys generated by SSL software under
Linux which may not be recognized by the web browser. With regard to the switch application, it
is not necessary to apply for a formal SSL certification key. A private certification key is enough
to make the communication safe between the users and the switch. Currently it is not required
that the client is able to check the validation of the certification key. The encryption key and the
encryption method should be negotiated during the handshake period of the session which will be
then used for data encryption.
SSL session handshake process:
1 Client ->
2 Client <3
4
5
6
Client ->
Client <Client ->
Client <-
-> Server
<- Server
-> Server
<- Server
-> Server
<- Server
Explanation
Enable/disable SSL function.
327
Explanation
Configure port number by SSL used, the 'no ip http
secure-port' command deletes the port number.
Explanation
Configure/delete secure cipher suite by SSL used.
Don't use the default port number if configured port number, pay attention to the port number
when input the web wide;
If SSL is enabled, SSL should be restarted after changes on the port configuration and encryption configuration;
IE 7.0 or above should be used for use of des-cbc-sha;
If the SSL problems remain unsolved after above try, please use debug SSL and other debugging command and copy the DEBUG message within 3 minutes, send the recorded message
to technical server center of our company.
329
Chapter 53
IPv6 Security RA Configuration
53.1 Introduction to IPv6 Security RA
In IPv6 networks, the network topology is generally compromised of routers, layer-two switches
and IPv6 hosts. Routers usually advertise RA, including link prefix, link MTU and other information,
when the IPv6 hosts receive RA, they will create link address, and set the default router as the
one sending RA in order to implement IPv6 network communication. If a vicious IPv6 host sends
RA to cause that normal IPv6 users set the default router as the vicious IPv6 host user, the vicious
user will be able to capture the information of other users, which will threat the network security.
Simultaneously, the normal users get incorrect address and will not be able to connect to the
network. So, in order to implement the security RA function, configuring on the switch ports to
reject vicious RA messages is necessary, thus to prevent forwarding vicious RA to a certain extent
and to avoid affecting the normal operation of the network.
Explanation
Globally enable and disable IPv6 security RA.
Explanation
Enable and disable IPv6 security RA in port configuration mode.
330
Explanation
Enable the debug information of IPv6 security RA module, the no operation of this command will disable the
output of debug information of IPv6 security RA.
Display the distrust port and whether globally security
RA is enabled.
RA
E1/0/1
E1/0/2
RA
E1/0/3
PC user
331
Chapter 54
MAB Configuration
54.1 Introduction to MAB
In actual network existing the device which can not install the authentication client, such as printer,
PDA devices, they can not process 802.1x authentication. However, to access the network resources, they need to use MAB authentication to replace 802.1x authentication.
MAB authentication is a network accessing authentication method based on the accessing port
and the MAC address of MAB user. The user needn't install any authentication client, after the authentication device receives ARP packets sent by MAB user, it will authenticate the MAC address
of the MAB user and there is the corresponding authentication information in the authentication
server, the matched packets of the port and the source MAC are allowed to pass when the authentication is successful. MAB user didn't need to input the username and password manually in
the process of authentication.
At present, MAB authentication device only supports RADIUS authentication method. There
is the selection method for the authentication username and password: use the MAC address of
the MAB user as the username and password, or the fixed username and password (all users use
the configured username and password to authenticate).
Explanation
Enable the global MAB authentication function.
Explanation
Set the authentication mode of MAB authentication function.
Explanation
Set guest vlan of MAB authentication, only
Hybrid port uses this command, it is not take
effect on access port.
Set the max MAB binding-limit of the port.
333
Update
Server
Radius
Server
Internet
E1/2
E1/3
E1/1
Switch 1
E1/4
E1/4
Switch 2
E1/1
E1/3
E1/2
PC1
PC2
Printer
function.
Ethernet 1/3 is an access port, connects to the printer and enables MAB function.
Ethernet 1/4 is a trunk port, connects to Switch2.
Ethernet 1/4 is a trunk port of Switch2, connects to Switch1.
Ethernet 1/1 is an access port, belongs to vlan8, connects to update server to download and
upgrade the client software.
Ethernet 1/2 is an access port, belongs to vlan9, connects to radius server which configure
auto vlan as vlan10.
Ethernet 1/3 is an access port, belongs to vlan10, connects to external internet resources.
To implement this application, the configuration is as follows:
Switch1 configuration:
(1) Enable 802.1x and MAB authentication function globally, configure username and
password of MAB authentication and radius-server address
Switch(config)#dot1x enable
Switch(config)#mac-authentication-bypass enable
Switch(config)#mac-authentication-bypass username-format fixed
username mabuser password mabpwd
Switch(config)#vlan 8-10
Switch(config)#interface vlan 9
Switch(config-if-vlan9)ip address 192.168.61.9 255.255.255.0
Switch(config-if-vlan9)exit
Switch(config)#radius-server authentication host 192.168.61.10
Switch(config)#radius-server accounting host 192.168.61.10
Switch(config)#radius-server key test
Switch(config)#aaa enable
Switch(config)#aaa-accounting enable
(2) Enable the authentication function of each port
Switch(config)#interface ethernet 1/1
Switch(config-if-ethernet1/1)#dot1x enable
Switch(config-if-ethernet1/1)#dot1x port-method portbased
Switch(config-if-ethernet1/1)#dot1x guest-vlan 8
Switch(config-if-ethernet1/1)#exit
Switch(config)#interface ethernet 1/2
Switch(config-if-ethernet1/2)#switchport mode hybrid
Switch(config-if-ethernet1/2)#switchport hybrid native vlan 1
Switch(config-if-ethernet1/2)#switchport hybrid allowed vlan 1;8;10 untag
Switch(config-if-ethernet1/2)#mac-authentication-bypass enable
Switch(config-if-ethernet1/2)#mac-authentication-bypass enable guest-vlan 8
Switch(config-if-ethernet1/2)#exit
Switch(config)#interface ethernet 1/3
Switch(config-if-ethernet1/3)#switchport mode access
Switch(config-if-ethernet1/3)#mac-authentication-bypass enable
Switch(config-if-ethernet1/3)#exit
Switch(config)#interface ethernet 1/4
Switch(config-if-ethernet1/4)#switchport mode trunk
335
336
Chapter 55
PPPoE Intermediate Agent Configuration
55.1 Introduction to PPPoE Intermediate Agent
55.1.1 Brief Introduction to PPPoE
PPPoE (Point to Point Protocol over Ethernet) is a protocol that apply PPP protocol to Ethernet.
PPP protocol is a link layer protocol and supply a communication method of point-to-point, it is
usually selected by host dial-up link, for example the link is line dial-up. PPP protocol is applied to
Ethernet that means PPPoE protocol makes many hosts of Ethernet to connect a remote access
collector through one or multiple bridge devices. If the remote access collector is broadband
access server (BAS), it can supply broadband access and accounting functions for these hosts,
so PPPoE protocol is used to broadband access authentication of Ethernet usually.
PADO (PPPoE Active Discovery Offer) packet to client according to the received source MAC
address of PADI packet, the packet will take sever name and service name.
3. Client sends PADR packet: The third step, client selects a server to process the session
according to the received PADO packet. It may receives many PADO packets for PADI
message of the first step may be sent to many servers (select the server according to whether
the service information of PADO packet match with the servce information needed by client).
MAC address of the other end used for session will be known after server is selected, and
send PADR (PPPoE Active Discovery Request) packet to it to announce server the session
requirement.
4. Server responds PADS packet: The fourth step, server establishes a session ID according
to the received PADR packet, this session ID will be sent to client through PADS (PPPoE
Active Discovery Session-confirmation) packet, hereto PPPoE discovery stage is completed,
enter session stage.
PADT (PPPoE Active Discovery Terminate) packet is an especial packet of PPPoE, it's Ethernet
protocol number (0x8863) is the same as four packets above, so it can be considered a packet
of discovery stage. To stop a PPPoE session, PADT may be sent at the discretional time of the
session. (It can be sent by client or server)
PPPoE Intermediate Agent supplies a function that identify and locate the user. When passing
network access device, PADI and PADR messages sent by client with the access link tag of this
device at PPPoE discovery stage, so as to exactly identify and locate the user on server.
If the direct-link access device is LAN switch, the added information include: MAC, Slot ID, Port
Index, Vlan ID, and so on. This function is implemented according to Migration to Ethernet-based
DSL aggregation.
PPPoE Intermediate Agent Exchange Process
PPPoE Intermediate Agent exchange process is similar to PPPoE exchange process, for the first
exchange process, the access link tag is added to PADI and PADR packets. The exchange process is as follows:
PPPoE Intermediate
Agent / Relay
Access Concentrator
PADI
PADI + LineID
PADO
PADO
PADR
PADR + LineID
PPPoE
Discovery Stage
Host
PADS
PPPoE
Session Stage
PADS
338
Ethernet II frame
Destination MAC
PPPoE Data
Version Type
TLV frame
Type
Source MAC
Code
Session ID
Length Field
Length
TLV 1
...
TLV N
Data
0x0104
0x0105
0x0110
0x0201
0x0202
0x0203
Tag Explanation
The end of a series tag in PPPoE data field, it is saved for ensuring the version
compatibility and is applied by some packets.
Service name. Indicate the supplied services by network.
Server name. When user receives the PADO response packet of AC, it can obtain
the server name from the tag and select the corresponding server.
Exclusive tag of the host. It is similar to tag field of PPPoE data packets and is
used to match the sending and reveiving end (Because broadcast network may
exist many PPPoE data packets synchronously).
AC-Cookies. It is used to avoid the vicious DOS attack.
The identifier of vendor.
Relay session ID. PPPoE data packet can be interrupted to other AC, this field is
used to keep other connection.
The error of service name. When the requested service name is not accepted by
other end, the response packet will take this tag.
The error of server name.
Common error.
339
0x0105 (Vendor-Specific)
TAG_LENGTH
length
0x02
length
ANI
(n byte)
Space
(1 byte)
Eth
(3 byte)
Space
(1 byte)
Slot ID
(2 byte)
/
(1 byte)
Port Index
(3 byte)
:
(1 byte)
VLAN ID
(4 byte)
PPPoE IA vendor tag can not exist in PPPoE packets sent by server to client, so we can strip
and forward these vendor tags if they exist in PPPoE packets. Strip function must be configured
on trust port, enabling strip function is not take effect on untrust port.
Explanation
Enabel global PPPoE Intermediate Agent
function.
Configure access node ID field value of circuit ID in added vendor tag.
341
Ethernet
Host
Switch
BAS
Switch(config)#pppoe intermediate-agent
Step 2: Configure port ethernet1/0/1 which connect server as trust port, and configure vendor
tag strip function.
Switch(config-if-ethernet1/0/1)#pppoe intermediate-agent trust
Switch(config-if-ethernet1/0/1)#pppoe intermediate-agent vendor-tag strip
Step 3: Port ethernet1/0/2 of vlan1 and port ethernet1/0/3 of vlan 1234 enable PPPoE IA
function of port.
Switch(config-if-ethernet1/0/2)#pppoe intermediate-agent
Switch(config-if-ethernet1/0/3)#pppoe intermediate-agent
Step 4: Configure pppoe intermediate-agent access-node-id as abcd.
Switch(config)#pppoe intermediate-agent type tr-101 circuit-id access-node-id abcd
Step 5: Configure pppoe intermediate-agent identifier-string as 'efgh', combo mode as spv,
delimiter of Slot ID and Port ID as '#', delimiter of Port ID and Vlan ID as '/'.
Switch(config)#pppoe intermediate-agent type tr-101 circuit-id identifier-string efgh
option spv delimiter # delimiter /
Step 6: Configure circuit-id value as bbbb on port ethernet1/0/2.
Switch(config-if-ethernet1/0/2)#pppoe intermediate-agent circuit-id bbbb
Step 7: Configure remote-id as xyz on ethernet1/0/3.
Switch(config-if-ethernet1/0/3)#pppoe intermediate-agent remote-id xyz
circuit-id value is 'bbbb', remote-id value is '0a0b0c0d0e0f' for the added vendor tag of port
ethernet1/0/2. circuit-id value is 'efgh eth 01#003/1234', remote-id value is 'xyz' for the added
vendor tag of port ethernet1/0/3.
343
Chapter 56
Web Portal Configuration
56.1 Introduction to Web Portal Authentication
802.1x authentication uses the special client to authenticate, the device uses the special layer 2
switch, the authentication server uses RADIUS server, the format of authentication message uses
EAP protocol. Use EAPOL encapsulation technique (encapsulate EAP packets within Ethernet
frame) to process the communication between client and authentication proxy switch, but authentication proxy switch and authentication server use EAPOR encapsulation format (runn EAP
packets on Radius protocol) to process the communication. The device and RADIUS server use
RADIUS protocol to transmit PAP packets or CHAP packets when the device processes to relay.
For implementing identity authentication and network accessing, user should install the special
authentication client software, and spring the authentication flow to communicate with Radius
server through logging in authentication client. The after 802.1x authentication adds web based
authentication mode, the user can download a special Java Applet program by browser or other
plug-in to replace 802.1x client.
For the environment which uses 802.1x authentication, installing client or downloading the
special Java Applet program become a mortal problem. To satisfy user's actual requirement, the
manual describes an application scene based on web portal authentication. Web portal authentication not only implements the basic device authentication without the client but also implement
the security detection to the terminal.
344
Explanation
Enable/disable web portal authentication
globally.
Explanation
Enable/disable web portal authentication of
the port.
3. Configure the max web portal binding number allowed by the port
Command
Port mode
webportal binding-limit <1-256>
no webportal binding-limit
Explanation
Configure the max web portal binding number allowed by the port.
Explanation
Configure HTTP redirection address of web
portal authentication.
5. Configure IP source address for communicating between accessing device and portal
server
Command
Global Mode
webportal nas-ip <ip-address>
no webportal nas-ip
Explanation
Configure IP source address for communicating between accessing device and portal
server.
Explanation
Enable dhcp snooping binding web portal
function.
345
Explanation
Delete the binding information of web portal
authentication.
DHCP
Server
DNS
Server
Internet
E1/4
E1/1
E1/4
Switch 1
192.168.40.50
E1/5
E1/6
Switch 2
E1/2
E1/3
PC1
PC2
E1/3
E1/2
Switch(config-if-ethernet1/0/3)#webportal enable
Web portal authentication associates with DHCP snooping binding to use, the configuration is
as follows:
Switch(config)#ip dhcp snooping enable
Switch(config)#ip dhcp snooping binding enable
Switch(config)#interface ethernet 1/0/2
Switch(config-if-ethernet1/0/2)#webportal enable
Switch(config-if-ethernet1/0/2)#ip dhcp snooping binding webportal
347
Chapter 57
VLAN-ACL Configuration
57.1 Introduction to VLAN-ACL
The user can configure ACL policy to VLAN to implement the accessing control of all ports in
VLAN, and VLAN-ACL enables the user to expediently manage the network. The user only needs
to configure ACL policy in VLAN, the corresponding ACL action can takes effect on all member
ports of VLAN, but it does not need to solely configure on each member port.
When VLAN ACL and Port ACL are configured at the same time, the principle of denying firstly
is used. When the packets match VLAN ACL and Port ACL at the same time, as long as one rule
is drop, then the final action is drop.
Egress ACL can implement the filtering of the packets on egress and ingress direction, the
packets match the specific rules can be allowed or denied. ACL can support IP ACL, MAC ACL,
MAC-IP ACL, IPv6 ACL. Ingress direction of VLAN can bind four kinds of ACL at the same time,
there are four resources on egress direction of VLAN, IP ACL and MAC ACL engage one resource
severally, MAC-IP ACL and IPv6 ACL engage two resources severally, so egress direction of VLAN
can not bind four kinds of ACL at the same time. When binding three kinds of ACL at the same
time, it should be the types of IP, MAC, MAC-IP or IP, MAC, IPv6. When binding two kinds of ACL
at the same time, any combination of ACL type is valid. Each type can only apply one on a VLAN.
348
Explanation
Configure or delete IP VLAN-ACL.
Explanation
Configure or delete MAC VLAN-ACL.
Explanation
Configure or delete MAC-IP VLAN-ACL.
Explanation
Configure or delete IPv6 VLAN-ACL.
Explanation
Show the configuration and the statistic information of VACL.
Explanation
Clear the statistic information of VACL.
349
VLAN1
PC
VLAN2
PC
PC
PC
351
Chapter 58
SAVI Configuration
58.1 Introduction to SAVI
SAVI (Source Address Validation Improvement) is a security authentication method that provides
the granularity level of the node source address. It gets the trust node information (such as port,
MAC address information), namely, anchor information by monitoring the interaction process of
the relative protocol packets (such as ND protocol, DHCPv6 protocol) and using CPS (Control
Packet Snooping) mechanism. After that, it binds the anchor information with the node source
address and sends the corresponding filter rules, allow the packets which match the filter rules to
pass only, so as to reach the aim that check the validity of node source address.
SAVI function includes ND Snooping function, DHCPv6 Snooping function and RA Snooping
according to the protocol packet type. ND Snooping function is used to detect ND protocol packet,
it sets IPv6 address binding obtained by nodes with the stateless address configuration. DHCPv6
Snooping function is used to detect DHCPv6 protocol packet, it sets IPv6 address binding obtained
by nodes with the stateful address configuration. RA Snooping function is used to avoid the lawless
node sending the spurious RA packet.
Explanation
Enable the global SAVI function, no command disables the function.
Explanation
Enable the application scene function for
SAVI, no command disables the function.
Explanation
Configure a static or dynamic binding manually, no command deletes the configured
binding. This command may be configured
in a global function of savi enable, slaaconly enable, dhcp-only enable or dhcpslaac enable.
Explanation
Configure the max lifetime period of SAVI
binding at DETECTION state, no command
restores the default value.
353
Command
Global Mode
savi max-dad-prepare-delay <max-dad-preparedelay>
no savi max-dad-prepare-delay
Explanation
Configure the max redetection lifetime period for SAVI binding, no command restores
the default value.
Explanation
Configure the lifetime period of the dynamic
slaac binding at BOUND state, no command restores the default value.
Explanation
Configure the bind-protect lifetime period to
a port after its state from up to down, no
command restores the default value.
Explanation
Enable the address prefix check for SAVI,
no command disables the function.
Explanation
Configure IPv6 address prefix for a link
manually, no command deletes the configured address prefix.
Explanation
Configure the corresponding dynamic binding number for the same MAC address, no
command restores the default value. Note:
The binding number only limits the dynamic
binding, but does not limit the static binding
number.
354
Explanation
Configure the check mode for the conflict
binding, no command deletes the check
mode.
Explanation
Enable the control authentication function
for user, no command disables the function.
Explanation
Enable DHCPv6 trust port, no command
disables the trust function. (port is translated from trust port into untrust port)
Explanation
Configure a port as slaac trust and RA trust,
no command deletes the port's trust function.
Explanation
Configure the binding number of a port, no
command restores the default value. Note:
The binding number only limits the dynamic
binding, but does not limit the static binding
number.
select the corresponding scene according to the actual requirement; in double stacks network,
while SAVI function associates with IPv4 DHCP snooping to use, IPv4 and IPv6 source address
authentication is implemented.
Client 2
Switch 1
E1/0/2
E1/0/13
Switch 3
Client 1
Switch 2
E1/0/12
E1/0/1
356
If node binding can not be set for the new user after enable SAVI function, please check
whether the direct-link port configures the max binding number, and whether the binding
number reaches to the max number. If the binding number exceeds the max binding limit, it
is recommended to configure the bigger binding limit.
If node binding can not be set for new user after configure the bigger binding limit, please
check whether the direct-link port configures the corresponding binding number, and whether
the corresponding binding number reaches to the max number in the same MAC address. If
the binding number exceeds the max binding limit, it is recommended to configure the bigger
binding limit.
357
Part X
Reliability Configuration
358
Chapter 59
MRPP Configuration
59.1 Introduction to MRPP
MRPP (Multi-layer Ring Protection Protocol), is a link layer protocol applied on Ethernet loop protection. It can avoid broadcast storm caused by data loop on Ethernet ring, and restore communication among every node on ring network when the Ethernet ring has a break link. MRPP is the
expansion of EAPS (Ethernet link automatic protection protocol).
MRPP protocol is similar to STP protocol on function, MRPP has below characters, compare
to STP protocol:
MRPP specifically uses to Ethernet ring topology
fast convergence, less than 1 s. ideally it can reach 100-50 ms.
E1
Master
Node
Switch A
Switch B
Switch F
E2
Ring 1
Ring 2
Switch E
Switch C
Switch D
E1
E2
Switch H
Switch G
Master
Node
LINK-DOWN-FLUSH_FDB packet
Explanation
The primary port of primary node evokes to
detect ring, if the secondary port of primary
node can receive Hello packet in configured
overtime, so the ring is normal.
After transfer node detects Down event
on port, immediately sends LINK-DOWN
packet to primary node, and inform primary
node ring to fail.
After primary node detects ring failure or receives LINK-DOWN packet, open blocked
secondary port, and then uses two ports
to send the packet, to inform each transfer
node to refresh own MAC address.
360
LINK-UP-FLUSH_FDB packet
Explanation
Globally enable and disable MRPP.
361
Explanation
Create MRPP ring. The 'no' command deletes
MRPP ring and its configuration.
Configure control VLAN ID, format 'no' deletes
configured control VLAN ID.
Configure node type of MRPP ring (primary node
or secondary node).
Configure Hello packet timer sending from primary node of MRPP ring, format 'no' restores default timer value.
Configure Hello packet overtime timer sending
from primary node of MRPP ring, format 'no' restores default timer value.
Enable MRPP ring, format 'no' disables enabled
MRPP ring.
Specify primary port of MRPP ring.
Specify secondary port of MRPP ring.
Explanation
Configure the query interval of MRPP.
Explanation
Enable the compatible mode for ERRP, the no
command disables the compatible mode.
Enable the compatible mode for EAPS, the no
command disables the compatible mode.
Create ERRP domain, the no command deletes
the configured ERRP domain.
362
Explanation
Disable MRPP module debug information, format
'no' disable MRPP debug information output.
Display MRPP ring configuration information.
Display receiving data packet statistic information of MRPP ring.
Clear receiving data packet statistic information
of MRPP ring.
E2
E1
Master
Node
Switch A
Switch B
E1
E2
E1
E2
E2
Switch C
E1
Switch D
Switch(mrpp-ring-4000)#node-mode master
Switch(mrpp-ring-4000)#enable
Switch(mrpp-ring-4000)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port
Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port
Switch(config-If-Ethernet1/0/2)#exit
Switch(Config)#
SWITCH B configuration Task Sequence:
Switch(Config)#mrpp enable
Switch(Config)#mrpp ring 4000
Switch(mrpp-ring-4000)#control-vlan 4000
Switch(mrpp-ring-4000)#enable
Switch(mrpp-ring-4000)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port
Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port
Switch(config-If-Ethernet1/0/2)#exit
Switch(Config)#
SWITCH C configuration Task Sequence:
Switch(Config)#mrpp enable
Switch(Config)#mrpp ring 4000
Switch(mrpp-ring-4000)#control-vlan 4000
Switch(mrpp-ring-4000)#enable
Switch(mrpp-ring-4000)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port
Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port
Switch(config-If-Ethernet1/0/2)#exit
Switch(Config)#
SWITCH D configuration Task Sequence:
Switch(Config)#mrpp enable
Switch(Config)#mrpp ring 4000
Switch(mrpp-ring-4000)#control-vlan 4000
Switch(mrpp-ring-4000)#enable
Switch(mrpp-ring-4000)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port
Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port
Switch(config-If-Ethernet1/0/2)#exit
Switch(Config)#
364
365
Chapter 60
ULPP Configuration
60.1 Introduction to ULPP
Each ULPP group has two uplink ports, they are master port and slave port. The port may be a
physical port or a port channel. The member ports of ULPP group have three states: Forwarding,
Standby, Down. Normally, only one port at the forwarding state, the other port is blocked at the
Standby state. When the master port has the link problem, the master port becomes down state,
and the slave port is siwthed to forwarding state.
B6
A1
PC
Switch A
Switch B
B5
A2
C8
D3
C7
D4
Switch C
Switch D
the master port preempt the slave port. For keeping the continuance of the flows, the master port
does not process to preempt by default, but turns into the Standby state.
When configuring ULPP, it needs to specify the VLAN which is protected by this ULPP group
through the method of MSTP instances, and ULPP does not provide the protection to other VLANs.
When the uplink switch is happennig, the primary forwarding entries of the device will not be
applied to new topology in the network. In the figure, SwitchA configures ULPP, the portA1 as
the master port at forwarding state, here the MAC address of PC is learned by Switch D from
portD3. After this, portA1 has the problem, the traffic is switched to portA2 to be forwarded. If
there is the data sent to PC by SwitchD, still the data will be forwarded from portD3, and will be
losed. Therefore, when switching the uplink, the device of configuring ULPP needs to send the
flush packets through the port which is switched to Forwarding state, and update MAC address
tables and ARP tables of other devices in the network. ULPP respectively uses two kinds of flush
packets to update the entries: the updated packets of MAC address and the deleted packets of
ARP.
For making use of the bandwidth resource enough, ULPP can implement VLAN load balance
through the configuration. As the picture illustrated, SwitchA configures two ULPP groups: portA1
is the master port and portA2 is the slave port in group1, portA2 is the master port and portA1
is the slave port in group2, the VLANs are protected by group1 and group2, they are 1-100 and
101-200. Here both portA1 and portA2 at the forwarding state, the master port and the slave port
mutually backup, and respectively forward the packets of the different VLAN ranges. When portA1
has the problem, the traffic of VLAN 1-200 are forwarded by portA2. After this, when portA1 is
recovering the normal state, portA2 forwards the data of VLAN 101-200 sequentially, but the data
of VLAN 1-100 is switched to portA1 to forward.
A1
VLAN 1-100
B6
Switch A
Switch B
VLAN 101-200
A2
B5
C8
D3
C7
Switch C
D4
Switch D
367
Explanation
Configure and delete ULPP group globally.
Explanation
Configure the preemption mode of ULPP
group. The no operation deletes the preemption mode.
Configure the preemption delay, the no operation restores the default value 30s.
Configure the sending control VLAN, no operation restores the default value 1.
Configure the protection VLANs, the no operation deletes the protection VLANs.
Enable or disable sending the flush packets
which update MAC address.
Enable or disable sending the flush packets
which delete ARP.
Enable or disable sending the flush packets
of deleting the dynamic unicast mac according to vlan.
Configure or delete ULPP group description.
Configure the receiving control VLANs, no
operation restores the default value 1.
Enable or disable receiving the flush packets which update the MAC address.
Enable or disable receiving the flush packets which delete ARP.
Enable or disable receiving the flush packets of mac-vlan type.
368
Explanation
Show the configuration information of the
configured ULPP group.
Show the statistic information of the flush
packets.
Show flush type and control VLAN received
by the port.
Clear the statistic information of the flush
packets.
Show the information of the receiving and
sending flush packets, the no operation disables the shown information.
Show the contents of the received flush
packets, the no operation disables the
showing.
Show the error information of ULPP, the no
operation disables the showing.
Show the event information of ULPP, the no
operation disables the showing.
E1/0/1
Switch A
E1/0/1
Switch B
E1/0/2
E1/0/2
Switch C
Switch D
E1/0/1
VLAN 1-100
E1/0/1
Switch A
Switch B
VLAN 101-200
E1/0/2
E1/0/2
Switch C
Switch D
Switch(ulpp-group-1)#preemption mode
Switch(ulpp-group-2)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)#switchport
Switch(config-If-Ethernet1/0/1)#ulpp group
Switch(config-If-Ethernet1/0/1)#ulpp group
Switch(config-If-Ethernet1/0/1)#exit
Switch(Config)#interface Ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)#switchport
Switch(config-If-Ethernet1/0/2)#ulpp group
Switch(config-If-Ethernet1/0/2)#ulpp group
Switch(config-If-Ethernet1/0/2)#exit
mode trunk
1 master
2 slave
mode trunk
1 slave
2 master
372
Chapter 61
ULSM Configuration
61.1 Introduction to ULSM
ULSM (Uplink State Monitor) is used to process the port state synchronization. Each ULSM group
is made up of the uplink port and the downlink port, both the uplink port and the downlink port may
be multiple. The port may be a physical port or a port channel, but it can not be a member port of
a port channel, and each port only belongs to one ULSM group.
The uplink port is the monitored port of ULSM group. When all uplink ports are down or there
is no uplink port in ULSM group, ULSM group state is down. ULSM group state is up as long as
one uplink port is up.
The downlink port is the controlled port, its state changes along with Up/Down of ULSM group
and is always the same with ULSM group state.
ULSM associates with ULPP to enable the downstream device to apperceive the link problem
of the upstream device and process correctly. As the picture illustrated, SwitchA configures ULPP,
here the traffic is forwarded by port A1. If the link between SwitchB and Switch D has the problem,
SwitchA can not apperceive the problem of the upstream link and sequentially forward the traffic
from port A1, cause traffic losing.
A1
PC
B6
Switch A
Switch B
B5
A2
C8
D3
C7
D4
Switch C
Switch D
causes Switch A on which ULPP is configured to process uplink switchover and avoid the data
dropped.
Explanation
Configure and delete ULSM group globally.
Explanation
Configure the uplink/downlink port of ULSM
group, the no command deletes the uplink/downlink port.
Explanation
Show the configuration information of
ULSM group.
Show the event information of ULSM, the
no operation disables the shown information.
374
E1/0/1
Switch A
E1/0/1
Switch B
E1/0/2
E1/0/3
E1/0/2
E1/0/4
Switch C
Switch D
375
376
Part XI
Flow Monitor Configuration
377
Chapter 62
Mirror Configuration
62.1 Introduction to Mirror
Mirror functions include port mirror function, CPU mirror function, flow mirror function.
Port mirror refers to the duplication of data frames sent/received on a port to another port.
The duplicated port is referred to as mirror source port and the duplicating port is referred to as
mirror destination port. A protocol analyzer (such as Sniffer) or a RMON monitor will be connected
at mirror destination port to monitor and manage the network, and diagnose the problems in the
network.
CPU mirror function means that the switch exactly copies the data frames received or sent by
the CPU to a port.
Flow mirror function means that the switch exactly copies the data frames received or by the
specified rule of a port to another port. The flow mirror will take effect only the specified rule is
permit.
A chassis switch supports at most 4 mirror destination ports, each boardcard allows a source
or destination port of a mirror session. At present, each box switch can set many mirror sessions.
There is no limitation on mirror source ports, one port or several ports is allowed. When there are
more than one source ports, they can be in the same VLAN or in different VLAN. The source port
and destination port can be in different VLAN.
Explanation
Specifies mirror destination port; the no
command deletes mirror destination source
port.
378
Explanation
Specifies mirror source port; the no command deletes mirror source port.
Explanation
Specifies flow mirror source port and apply
rule; the no command deletes flow mirror
source port.
379
380
Chapter 63
sFlow Configuration
63.1 Introduction to sFlow
The sFlow (RFC 3176) is a protocol based on standard network export and used on monitoring
the network traffic information developed by the InMon Company. The monitored switch or router
sends date to the client analyzer through its main operations such as sampling and statistic, then
the analyzer will analyze according to the user requirements so to monitor the network.
A sFlow monitor system includes: sFlow proxy, central data collector and sFlow analyzer. The
sFlow proxy collects data from the switch using sampling technology. The sFlow collector is for
formatting the sample data statistic which is to be forwarded to the sFlow analyzer which will
analyze the sample data and perform corresponding measure according to the result. Our switch
here acts as the proxy and central data collector in the sFlow system.
We have achieved data sampling and statistic targeting physical port.
Our data sample includes the IPv4 and IPv6 packets. Extensions of other types are not supported so far. As for non IPv4 and IPv6 packet, the unify HEADER mode will be adopted following
the requirements in RFC3176, copying the head information of the packet based on analyzing the
type of its protocol.
The latest sFlow protocol presented by InMon Company is the version 5. Since it is the version
4 which is realized in the RFC3176, version conflict might exist in some case such as the structure
and the packet format. This is because the version 5 has not become the official protocol, so, in
order to be compatible with current applications, we will continue to follow the RFC3176.
Explanation
Configure the IP address and port number of the host in
which the sFlow analysis software is installed. As for the
ports, if IP address is configured on the port, the port configuration will be applied, or else will be applied the global configuration. The no sflow destination command restores to
the default port value and deletes the IP address.
381
Explanation
Configure the source IP address applied by the sFlow proxy;
the no form of the command deletes this address.
Explanation
Configure the priority when sFlow receives packet from the
hardware; the no sflow priority command restores to the
default
Explanation
Configure the length of the packet data head copied in the
sFlow data sampling; the no form of this command restores
to the default value.
Explanation
Configure the max length of the data packet in sFlow; the
no form of this command restores to the default.
Explanation
Configure the sampling rate when sFlow performing hardware sampling. The no command deletes the rate value.
Explanation
Configure the max interval when sFlow performing statistic
sampling. The no form of this command deletes
382
Explanation
Configure the analyzer used by sFlow, the no command
deletes the analyzer.
Switch
PC
383
384
Chapter 64
RSPAN Configuration
64.1 Introduction to RSPAN
Port mirroring refers to the duplication of data frames sent/received on a port to another port. The
duplicated port is referred to as mirror source port and the duplicating port is referred to as mirror
destination port. It is more convenience for network administrator to monitor and manage the
network and diagnostic after the mirroring function achieved. But it only used for such instance
that the mirror source port and the mirror destination ports are located in the same switch.
RSPAN (remote switched port analyzer) refers to remote port mirroring. It eliminates the limitation that the source port and the destination port must be located on the same switch. This feature
makes it possible for the source port and the destination port to be located on different devices in
the network, and facilitates the network administrator to manage remote switches. It can't forward
traffic flows on remote mirror VLAN.
There are three types of switches with the RSPAN enabled:
1. Source switch: The switch to which the monitored port belongs. The source switch copies
the mirrored traffic flows to the Remote VLAN, and then through Layer 2 forwarding, the
mirrored flows are sent to an intermediate switch or destination switch.
2. Intermediate switch: Switches between the source switch and destination switch on the
network. Intermediate switch forwards mirrored flows to the next intermediate switch or the
destination switch. Circumstances can occur where no intermediate switch is present, if a
direct connection exists between the source and destination switches.
3. Destination switch: The switch to which the destination port for remote mirroring belongs.
It forwards mirrored flows it received from the Remote VLAN to the monitoring device through
the destination port.
When configuring the RSPAN mirroring of the source switch, reflector port mode or destination
mirror port mode can be selected. The destination switch will redirect all the data frames in the
RSPAN VLAN to the RSPAN destination port. For RSPAN mirroring, normal mode and advanced
mode can be chosen, normal is introduced by default and fit the normal user. The advanced mode
fit the advanced user.
1. Advanced mode: To redirect data frames in RSPAN VLAN to the RSPAN destination port,
the intermediary and destination devices should support the redirection of flow.
385
2. Normal mode: To configure the RSPAN destination port in the RSPAN VLAN. Thus, datagrams in the RSPAN VLAN will be broadcasted to the destination port. In this mode, the
destination port should be in RSPAN VLAN, and the source port should not be configured
for broadcasting storm control. TRUNK ports should be configured carefully in order not to
forward RSPAN datagrams to external networks. The normal mode has the benefit of easy
configuration, and reduced system resources.
To be noticed: Normal mode is introduced by default. When using the normal mode, datagrams with reserved MAC addresses cannot be broadcasted.
For chassis switches, at most 4 mirror destination ports are supported, and source or destination port of one mirror session can be configured on each line card. For box switches, only one
mirror session can be configured. The number of the source mirror ports is not limited, and can
be one or more. Multiple source ports are not restricted to be in the same VLAN. The destination
port and the source ports can be in different VLAN.
For configuration of RSPAN, a dedicated RSPAN VLAN should be configured first for carrying
the RSPAN datagrams. The default VLAN, dynamic VLAN, private VLAN, multicast VLAN, and
the layer 3 interface enabled VLAN cannot be configured as the RSPAN VLAN. The reflector
port must belong to the RSPAN VLAN. The destination port should be connected to the Monitor
and the configured as access port or the TRUNK port. The RSPAN reflector port will be working
dedicatedly for mirroring, when a port is configured as a reflector port, it will discards all the existing
connections to the remote peer, disable configurations related to loopback interfaces, and stop
forwarding datagram. Connectivity between the source and destination switch for Remote VLAN,
should be made sure by configuration.
To be noticed:
1. Layer 3 interfaces related to RSPAN VLAN should not be configured on the source, intermediate, and the destination switches, or the mirrored datagrams may be discarded.
2. For the source and intermediate switches in the RSPAN connections, the native VLAN of
TRUNK port cannot be configured as the RSPAN VLAN, Otherwise the RSPAN tag will be
disposed before reaching the destination switches.
3. The source port, in access or trunk mode, should not be added to RSPAN VLAN if advanced
RSPAN mode is chosen. When the reflector port is used for a inter-card mirroring of CPU
TX data, it must be configured as TRUNK port and allows the RSPAN VLAN data passing,
the Native VLAN should not be configured as RSPAN VLAN.
4. When configuring the remote mirroring function, the network bandwidth should be considered
in order to carry the network flow and the mirrored flow.
Keywards:
RSPAN: Remote Switched Port Analyzer.
RSPAN VLAN: Dedicated VLAN for RSPAN.
RSPAN Tag: The VLAN tag which is attached to MTP of the RSPAN datagrams.
Reflector Port: The local mirroring port between the RSPAN source and destination ports,
which is not directly connected to the intermediate switches.
386
Explanation
To configure the specified VLAN as RSPAN
VLAN. The no command will remove the
configuration of RSPAN VLAN.
Explanation
To configure mirror source port; The no
command deletes the mirror source port.
Explanation
To configure mirror destination interface;
The no command deletes the mirror destination port.
Explanation
To configure the interface to reflector port;
The no command deletes the reflector port.
387
Explanation
To configure remote VLAN of mirror group,
the no command deletes the remote VLAN
of mirror group.
Intermediate Switch
Source Switch
E2
E6
E7
Destination Switch
E9
E10
E1
PC
Monitor
388
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/2
Switch(Config-If-Ethernet1/0/2)#switchport mode trunk
Switch(Config-If-Ethernet1/0/2)#exit
Switch(config)#monitor session 1 source interface ethernet1/0/1 rx
Switch(config)#monitor session 1 destination interface ethernet1/0/2
Switch(config)#monitor session 1 remote vlan 5
Intermediate switch:
Interface ethernet1/0/6 is the source port which is connected to the source switch.
Interface ethernet1/0/7 is the destination port which is connected to the intermediate switch.
The native VLAN of this port cannot be configured as RSPAN VLAN, or the mirrored data may not
be carried by the destination switch.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/6-7
Switch(Config-If-Port-Range)#switchport mode trunk
Switch(Config-If-Port-Range)#exit
Destination switch:
Interface ethernet1/0/9 is the source port, which is connected to the source switch.
Interface ethernet1/0/10 is the destination port which is connected to the monitor. This port is
required to be configured as an access port, and belong to the RSPAN VLAN.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/9
Switch(Config-If-Ethernet1/0/9)#switchport mode trunk
Switch(Config-If-Ethernet1/0/9)#exit
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport access vlan 5
Switch(Config-If-Ethernet1/0/10)#exit
Solution 2:
Source switch:
Interface ethernet 1/0/1 is the source port.
Interface ethernet 1/0/2 is the TRUNK port, which is connected to the intermediate switch. The
native VLAN should not be a RSPAN VLAN.
Interface Ethernet 1/0/3 is a reflector port. The reflector port belongs the RSPAN VLAN, it is
access port or TRUNK port of the RSPAN VLAN.
RSPAN VLAN is 5.
389
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet1/0/2
Switch(Config-If-Ethernet1/0/2)#switchport mode trunk
Switch(Config-If-Ethernet1/0/2)#exit
Switch(config)#interface ethernet 1/0/3
Switch(Config-If-Ethernet1/0/3)#switchport mode trunk
Switch(Config-If-Ethernet1/0/3)#exit
Switch(config)#monitor session 1 source interface ethernet1/0/1 rx
Switch(config)#monitor session 1 reflector-port ethernet1/0/3
Switch(config)#monitor session 1 remote vlan 5
Intermediate switch:
Interface ethernet1/0/6 is the source port which is connected to the source switch.
Interface ethernet1/0/7 is the destination port which is connected to the destination switch. The
native VLAN of the port should not be configured as RSPAN VLAN, or the mirrored data may not
be carried by the destination switch.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/6-7
Switch(Config-If-Port-Range)#switchport mode trunk
Switch(Config-If-Port-Range)#exit
Destination switch:
Interface ethernet1/0/9 is the source port which is connected to the source switch.
Interface ethernet1/0/10 is the destination port which is connected to the monitor. This port is
required to be configured as an access port, and belong to the RSPAN VLAN.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/9
Switch(Config-If-Ethernet1/0/9)#switchport mode trunk
Switch(Config-If-Ethernet1/0/9)#exit
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport access vlan 5
Switch(Config-If-Ethernet1/0/10)#exit
390
391
Chapter 65
ERSPAN
65.1 Introduction to ERSPAN
ERSPANEncapsulated Remote Switched Port Analyzer eliminates the limitation that the source
port and the destination port must be located on the same switch. This feature makes it possible
for the source port and the destination port to be located on different devices in the network, and
facilitates the network administrator to manage remote switches. Compared with the traditional
RSPAN, ERSPAN configuration is simpler and it makes the monitored traffic to be transmitted in
the specified tunnel.
To be noticed
1. Monitor source of ERSPAN monitor only supports port monitor, it does not support CPU
monitor and flow monitor presently.
2. For the source and destination switches in the ERSPAN connections, a tunnel must be existed.
3. When configuring the remote mirror function, the network bandwidth should be considered
in order to carry the network flow and the mirrored flow.
Keywards:
ERSPAN: Encapsulated Remote Switched Port Analyzer.
Explanation
Specify the mirror source port; the no command
deletes the mirror source port.
392
Explanation
Specify the mirror destination tunnel; the no command deletes the mirror destination tunnel.
3. Appoint the mirror destination, and the destination can be the physical port or the
tunnel
Command
Global Mode
monitor session <session> destination tunnel interface <interface-number> desmac
<MAC address> desIP <Dest IP address>
scrIP <Source IP address>
no monitor session <session> destination
tunnel interface <interface-number>
Explanation
Appoint the mirror destination to be the physical
port or the tunnel; the no command deletes the
mirror destination.
Device A
E1/1
VLAN-Int 10
10.1.1.1/24
E1/2
VLAN-Int 11
20.1.1.1/24
E1/2
VLAN-Int 11
20.1.1.2/24
Device B
E1/1
VLAN-Int 12
30.1.1.1/24
E1/1
VLAN-Int 12
30.1.1.2/24
GRE Tunnel
Tunnel0
50.1.1.1/24
Tunnel0
50.1.1.2/24
Device C
E1/1
VLAN-Int 10
40.1.1.1/24
Marketing
Department
Server
Before configuring layer-3 remote port mirroring, make sure that you have created a GRE
tunnel that connects the source and destination device, and ensure the normal transmitting for
GRE tunnel.
The configuration of layer-3 remote port mirror needs to be processed on the source and destination devices respectively. Both the source and destination ports are configured on the source
and destination devices, the difference in the following:
1. On Device A, configure the port which you want to monitor as the source port and configure
the tunnel interface as the destination port.
2. On Device C, configure the physical port corresponding to the tunnel interface as the source
port and configure the port that connects the data monitor device as the destination port.
(1) Configure IP addresses
Configure IP address and subnet mask for the interfaces, configuration procedures is omitted.
(2) Configure Device A (the source device)
# Create interface Tunnel1, and configure an IP address and mask for it.
SwitchA(config)#interface tunnel 1
SwitchA(config-if-tunnel1)#tunnel mode gre ip
SwitchA(config-if-tunnel1)#ip address 50.1.1.1 255.255.255.0
# Configure Tunnel1 to operate in GRE tunnel mode, and configure source
# and destination IP addresses for it.
SwitchA(config-if-tunnel1)#tunnel source 10.1.1.1
SwitchA(config-if-tunnel1)#tunnel destination 40.1.1.1
SwitchA(config-if-tunnel1)#exit
# Configure OSPF protocol.
SwitchA(config)#router ospf
SwitchA(config-router)#network 0.0.0.0/0 area 0
SwitchA(config-router)#exit
# Configure Ethernet 1/1 as a source port and Tunnel1 as the destination
# port of local mirroring group 1.
SwitchA(config)#monitor session 4 destination tunnel 1
SwitchA(config)#monitor session 4 source interface ethernet 1/1 both
(3) Configure Device B (the intermediate device)
# Configure OSPF protocol.
SwitchB(config)#router ospf
SwitchB(config-router)#network 0.0.0.0/0 area 0
SwitchB(config-router)#exit
(4) Configure Device C (the destination device)
# Create interface Tunne1, and configure an IP address and mask for it.
SwitchC(config)#interface tunnel 1
SwitchC(config-if-tunnel1)#tunnel mode gre ip
SwitchC(config-if-tunnel1)#ip address 50.1.1.2 255.255.255.0
# Configure Tunnel1 to operate in GRE tunnel mode, and configure source
394
395
Part XII
Network Time Management Configuration
396
Chapter 66
SNTP Configuration
66.1 Introduction to SNTP
The Network Time Protocol (NTP) is widely used for clock synchronization for global computers
connected to the Internet. NTP can assess packet sending/receiving delay in the network, and
estimate the computer's clock deviation independently, so as to achieve high accuracy in network
computer clocking. In most positions, NTP can provide accuracy from 1 to 50ms according to the
characteristics of the synchronization source and network route.
Simple Network Time Protocol (SNTP) is the simplified version of NTP, removing the complex
algorithm of NTP. SNTP is used for hosts who do not require full NTP functions; it is a subset of
NTP. It is common practice to synchronize the clocks of several hosts in local area network with
other NTP hosts through the Internet, and use those hosts to provide time synchronization service
for other clients in LAN. The figure below depicts a NTP/SNTP application network topology, where
SNTP mainly works between second level servers and various terminals since such scenarios do
not require very high time accuracy, and the accuracy of SNTP (1 to 50 ms) is usually sufficient
for those services.
Switch implements SNTPv4 and supports SNTP client unicast as described in RFC2030; SNTP
client multicast and unicast are not supported, nor is the SNTP server function.
397
Chapter 67
NTP Function Configuration
67.1 Introduction to NTP Function
The NTP (Network Time Protocol) synchronizes timekeeping spans WAN and LAN among distributed time servers and clients, it can get millisecond precision. The introduction of event, state,
transmit function and action are defined in RFC-1305.
The purpose of using NTP is to keep consistent timekeeping among all clock-dependent devices within the network so that the devices can provide diverse applications based on the consistent time.
For a local system running NTP, its time can be synchronized by other reference sources and
can be used as a reference source to synchronize other clocks, also can synchronize each other
by transmit NTP packets.
398
Explanation
To enable or disable NTP function.
Explanation
To enable the specified time server of time
source.
3. To configure the max number of broadcast or multicast servers supported by the NTP
client
Command
Global mode
ntp broadcast server count <number>
no ntp broadcast server count
Explanation
Set the max number of broadcast or multicast servers
supported by the NTP client. The no operation will cancel the configuration and restore the default value.
Explanation
This command configures timezone in
global mode, the no command deletes the
configured timezone.
Explanation
To (un)configure NTP server access control list.
Explanation
To enable/disable NTP authentication function.
To configure authentication key for NTP authentication.
To (un)configure trusted key.
Command
VLAN Configuration Mode
[no] ntp broadcast client
Explanation
To (un)configure specified interface to receive NTP broadcast packets.
To (un)configure specified interface to receive NTP multicast
packets.
To (un)configure specified interface to receive IPv6 NTP
multicast packets.
Explanation
To enable/disable the NTP function.
Explanation
(un)Configure the request packet sending interval of ntp
client as 1s-3600s. The no command recovers to be the
default value of 64s.
Explanation
To display the state of time synchronize.
To display the information of NTP session.
11. Debug
Command
Admin Mode
[no] debug ntp authentication
[no] debug ntp packets
[send | receive]
[no] debug ntp adjust
[no] debug ntp sync
[no] debug ntp events
Explanation
To enable/disable debug switch of NTP authentication.
To enable/disable debug switch of NTP packet information.
To enable/disable debug switch of time update information.
To enable/disable debug switch of time synchronize information.
To enable/disable debug switch of NTP event information.
400
Network
Switch B IP: 192.168.2.11
401
Chapter 68
DNSv4/v6 Configuration
68.1 Introduction to DNS
DNS (Domain Name System) is a distributed database used by TCP/IP applications to translate domain names into corresponding IPv4/IPv6 addresses. With DNS, you can use easy-to-remember
and signification domain names in some applications and let the DNS server translate them into
correct IPv4/IPv6 addresses.
There are two types of DNS services, static and dynamic, which supplement each other in
application. Each time the DNS server receives a name query it checks its static DNS database
first before looking up the dynamic DNS database. Some frequently used addresses can be put
in the static DNS database, the reduction the searching time in the dynamic DNS database would
increase efficiency. The static domain name resolution means setting up mappings between domain names and IPv4/IPv6 addresses. IPv4/IPv6 addresses of the corresponding domain names
can be found in the static DNS database when you use some applications. Dynamic domain name
resolution is implemented by querying the DNS server. A user program sends a name query to
the resolver in the DNS client when users want to use some applications with domain name, the
DNS resolver looks up the local domain name cache for a match. If a match is found, it sends the
corresponding IPv4/IPv6 address back to the switch. If no match is found, it sends a query to a
higher DNS server. This process continues until a result, whether success or failure, is returned.
The Domain Name System (DNS) is a hierarchical naming system for computers, services,
or any resource participating in the Internet. It associates various information with domain names
assigned to such participants. Most importantly, it translates humanly meaningful domain names to
the numerical (binary) identifiers associated with networking equipment for the purpose of locating
and addressing these devices world-wide. An often used analogy to explain the Domain Name
System is that it serves as the 'phone book' for the Internet by translating human-friendly computer
hostnames into IP addresses.
The Domain Name System makes it possible to assign domain names to groups of Internet
users in a meaningful way, independent of each user's physical location. Because of this, WorldWide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant
even if the current Internet routing arrangements change or the participant uses a mobile device.
Internet domain names are easier to remember than IP addresses such as 208.77.188.166(IPv4)
or 2001:db8:1f70::999:de8:7648:6e8 (IPv6). People take advantage of this when they recite meaningful URLs and e-mail addresses without having to know how the machine will actually locate
them.
The Domain Name System distributes the responsibility for assigning domain names and map402
ping them to Internet Protocol (IP) networks by designating authoritative name servers for each
domain to keep track of their own changes, avoiding the need for a central register to be continually
consulted and updated.
In general, the Domain Name System also stores other types of information, such as the list of
mail servers that accept email for a given Internet domain. By providing a world-wide, distributed
keyword-based redirection service, the Domain Name System is an essential component of the
functionality of the Internet.
Explanation
To enable/disable DNS dynamic lookup
function.
Explanation
To configure DNS server, the no form of this
command deletes DNS server.
Explanation
To configure/delete domain name suffix.
403
Explanation
To delete the domain entry of specified address in dynamic cache.
Explanation
To enable DNS dynamic domain name resolution.
Explanation
Enable/disable DNS SERVER function.
Explanation
Configure the max number of client information in the switch queue.
8. Configure the timeout value of caching the client information on the switch
Command
Global mode
ip dns server queue timeout <1-100>
no ip dns server queue timeout
Explanation
Configure the timeout value of caching the
client information on the switch.
Explanation
To show the configured DNS server information.
To show the configured DNS domain name
suffix information.
To show the dynamic domain name information of resolved by switch.
Display the configured global DNS information on the switch.
Display the DNS Client information maintained by the switch.
404
ip domain-lookup
dns-server 8.8.8.8
dns-server 2001::1
IP: 8.8.8.8
IPv6: 2001::1
Internet
Switch
DNS
Server
IP: 8.8.8.8
IPv6: 2001::1
Internet
Client
Switch
DNS
Server
to the real DNS server, pass the reply from the DNS Server to the client and record the domain
and its IP address for a faster lookup in the future.
Switch configuration for DNS CLIENT:
Switch(config)#ip domain-lookup
Switch(config)#dns-server 8.8.8.8
Switch(config)#dns-server 2001::1
Switch#ping host shop.nag.ru
Switch#traceroute host shop.nag.ru
Switch#telnet host shop.nag.ru
Switch configuration for DNS SERVER:
Switch(config)#ip domain-lookup
Switch(config)#dns-server 8.8.8.8
Switch(config)#dns-server 2001::1
Switch(config)#ip dns server
406
Chapter 69
Summer Time Configuration
69.1 Introduction to Summer Time
Summer time is also called daylight saving time, it is a time system for saving energy sources.
In summer the time is advanced 1 hour to keep early hours, reduce the lighting, so as to save
electrolighting. The rule that adopt summer time is different in each country. At present, almost
110 countries implement summer time.
Compare with the standard time, usually set summer time 1 hour late, for example, when
summer time is implementing, 10:00 am of the standard time is considered 11:00 am of summer
time.
Explanation
Set absolute time range of summer time,
start and end summer time is configured
with specified year.
Set recurrent time range of summer time,
every year the summer time begins from the
start time and end at the end time.
Set recurrent time range of summer time,
every year the summer time begins from the
start time and end at the end time.
407
408
Part XIII
Debugging and Diagnosis
409
Chapter 70
Monitor and Debug
When the users configures the switch, they will need to verify whether the configurations are
correct and the switch is operating as expected, and in network failure, the users will also need
to diagnostic the problem. Switch provides various debug commands including ping, telnet, show
and debug, etc. to help the users to check system configuration, operating status and locate
problem causes.
70.1 Ping
Ping command is mainly used for sending ICMP query packet from the switches to remote devices,
also for check the accessibility between the switch and the remote device. Refer to the Ping
command chapter in the Command Manual for explanations of various parameters and options of
the Ping command.
70.2 Ping6
Ping6 command is mainly used by the switch to send ICMPv6 query packet to the remote equipment, verifying the accessibility between the switch and the remote equipment. Options and explanations of the parameters of the Ping6 command please refer to Ping6 command chapter in
the command manual.
70.3 Traceroute
Traceroute command is for testing the gateways through which the data packets travel from the
source device to the destination device, so to check the network accessibility and locate the network failure.
Execution procedure of the Traceroute command consists of: first a data packet with TTL at
1 is sent to the destination address, if the first hop returns an ICMP error message to inform this
packet can not be sent (due to TTL timeout), a data packet with TTL at 2 will be sent. Also the
send hop may be a TTL timeout return, but the procedure will carries on till the data packet is sent
to its destination. These procedures is for recording every source address which returned ICMP
TTL timeout message, so to describe a path the IP data packets traveled to reach the destination.
410
Traceroute Options and explanations of the parameters of the Traceroute command please
refer to traceroute command chapter in the command manual.
70.4 Traceroute6
The Traceroute6 function is used on testing the gateways passed through by the data packets
from the source equipment to the destination equipment, to verify the accessibility and locate
the network failure. The principle of the Traceroute6 under IPv6 is the same as that under IPv4,
which adopts the hop limit field of the ICMPv6 and IPv6 header. First, Traceroute6 sends an IPv6
datagram (including source address, destination address and packet sent time) whose HOPLIMIT
is set to 1. When first route on the path receives this datagram, it minus the HOPLIMIT by 1 and
the HOPLIMIT is now 0. So the router will discard this datagram and returns with a ?ICMPv6 time
exceeded? message (including the source address of the IPv6 packet, all content in the IPv6
packet and the IPv6 address of the router). Upon receiving this message, the Traceroute6 sends
another datagram of which the HOPLIMIT is increased to 2 so to discover the second router. Plus
1 to the HOPLIMIT every time to discover another router, the Traceroute6 repeat this action till
certain datagram reaches the destination.
Traceroute6 Options and explanations of the parameters of the Traceroute6 command please
refer to traceroute6 command chapter in the command manual.
70.5 Show
show command is used to display information about the system, port and protocol operation. This
part introduces the show command that displays system information, other show commands will
be discussed in other chapters.
Command
Admin Mode
show debugging
show flash
show history
show history all-users [detail]
show memory
show running-config
show running-config
mode
show startup-config
current-
Explanation
Display the debugging state.
Display the files and the sizes saved in the flash.
Display the recent user input history command.
Show the recent command history of all users. Use clear
history all-users command to clear the command history of
all users saved by the system, the max history number can
be set by history all-users max-length command.
Display content in specified memory area.
Display the switch parameter configuration validating at current operation state.
Show the configuration under the current mode.
Display the switch parameter configuration written in the
Flash Memory at current operation state, which is normally
the configuration file applied in next time the switch starts
up.
411
show version
Display the VLAN port mode and the belonging VLAN number of the switch as well as the Trunk port information.
Display the TCP connection status established currently on
the switch.
Display the UDP connection status established currently on
the switch.
Display the information of the Telnet client which currently
establishes a Telnet connection with the switch.
Display the operation information and the state of each task
running on the switch. It is used by the technicians to diagnose whether the switch operates properly.
Display the version of the switch.
70.6 Debug
All the protocols switch supports have their corresponding debug commands. The users can use
the information from debug commands for troubleshooting. Debug commands for their corresponding protocols will be introduced in the later chapters.
Assign a proper log buffer zone inside the switch, for record the log information permanently
or temporarily
Configure the log host, the log system will directly send the log information to the log host,
and save it in files to be viewed at any time
Among above log channels, users rarely use the console monitor, but will commonly choose
the Telnet terminal to monitor the system operation status. However information outputted from
these channels are of low traffic capacity and can not be recorded for later view. The other two
channels - the log buffer zone and log host channel are two important channels
SDRAM (Synchronous Dynamic Random Access Memory) and NVRAM (Non Vulnerable Random Access Memory) is provided inside the switch as two part of the log buffer zone, The two buffer
zone record the log information in a circuit working pattern, namely when log information need to
be recorded exceeds the buffer size, the oldest log information will be erased and replaced by the
new log information, information saved in NVRAM will stay permanently while those in SDRAM
will lost when the system restarts or encounter an power failure. Information in the log buffer zone
is critical for monitoring the system operation and detecting abnormal states.
Note: the NVRAM log buffer may not exist on some switches, which only have the SDRAM
log buffer zone.
It is recommended to use the system log server. By configuring the log host on the switch, the
log can be sent to the log server for future examination.
Format and Severity of the Log Information
The log information format is compatible with the BSD syslog protocol, so we can record and
analyze the log by the systlog (system log protect session) on the UNIX/LINUX, as well as syslog
similar applications on PC.
The log information is classified into eight classes by severity or emergency procedure. One
level per value and the higher the emergency level the log information has, the smaller its value will
be. For example, the level of critical is 2, and warning is 4, debugging is leveled at 7, so the critical
is higher than warnings which no doubt is high than debugging. The rule applied in filtering the log
information by severity level is that: only the log information with level equal to or higher than the
threshold will be outputted. So when the severity threshold is set to debugging, all information will
be outputted and if set to critical, only critical, alerts and emergencies will be outputted.
Follow table summarized the log information severity level and brief description.
Note: these severity levels are in accordance with the standard UNIX/LINUX syslog.
Severity
emergencies
alerts
critical
errors
warnings
notifications
informational
debugging
Value
0
1
2
3
4
5
6
7
Description
System is unusable
Action must be taken immediately
Critical conditions
Error conditions
Warning conditions
Normal but significant condition
Informational messages
Debug-level messages
Right now the switch can generate information of following four levels:
413
Restart the switch, mission abnormal, hot plug on the CHASSIS switch chips are classified
critical
Up/down interface, topology change, aggregate port state change of the interface are notifications warnings
Outputted information from the CLI command is classified informational
Information from the debugging of CLI command is classified debugging
Log information can be automatically sent to corresponding channels with regard to respective
severity levels. Amongst the debugging information can only be sent to the monitor. Those with the
Informational level can only be sent to current monitor terminal, such as the information from the
Telnet terminal configuration command can only be transmitted to the Telnet terminal. Warnings
information can be sent to all terminal with also saved in the SDRAM log buffer zone. And the
critical information can be save both in SDRAM and the NVRAM (if exists) besides sent to all
terminals. To check the log save in SDRAM and the NVRAM, we can use the show logging buffered
command. To clear the log save in NVRAM and SDRAM log buffer zone, we can use the clear
logging command.
Explanation
Show detailed log information in the log buffer
channel.
Clear log buffer zone information.
Explanation
Enable the output channel of the log host. The
'no' form of this command will disable the output
at the output channel of the log host.
414
Explanation
Enable or disable
commands.
the
logging
executed-
Explanation
Show the log information source of MSTP module.
Explanation
Show the state of logging executed-commands.
415
Chapter 71
Reload Switch after Specified Time
71.1 Introduce to Reload Switch after Specifid Time
Reload switch after specified time is to reboot the switch without shutdown its power after a specified period of time, usually when updating the switch version. The switch can be rebooted after a
period of time instead of immediately after its version being updated successfully.
Explanation
Reload the switch after a specified time period.
Cancel the specified time period to reload the
switch.
416
Chapter 72
Debugging and Diagnosis for Packets
Received and Sent by CPU
72.1 Introduction to Debugging and Diagnosis for Packets Received and Sent by CPU
The following commands are used to debug and diagnose the packets received and sent by CPU,
and are supposed to be used with the help of the technical support.
Explanation
Set the total rate of the CPU receiving packets,
the no command sets the total rate of the CPU
receiving packets to default.
Set the length of the specified queue, the no command set the length to default.
417
418