ISCOM2924GF-4GE - 4C Configuration Guide (A - 01) PDF
ISCOM2924GF-4GE - 4C Configuration Guide (A - 01) PDF
ISCOM2924GF-4GE - 4C Configuration Guide (A - 01) PDF
com
Warranty.
A copy of the s pecific warranty terms applicable to your Raisecom product and replacement pa rts
can be obtained from Service Office.
All rights are reserved. No part of this document may b e photocopied, reproduced, or translated to
another language w ithout t he pr ior w ritten c onsent of Raisecom Technology Co., Ltd. The
information contained in this document is subject to change without notice.
Copyright Notices.
No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any
means, e lectronic or m echanical, i ncluding phot ocopying a nd m icrofilm, w ithout pe rmission i n
Writing from Raisecom Technology Co., Ltd.
Trademark Notices
Microsoft Corporation.
Contact Information
Technical Assistance Center
The Raisecom TAC i s av ailable t o all cus tomers w ho need technical as sistance w ith a R aisecom
product, technology, or, solution. You can communicate with us through the following methods:
Address: Building 2, No. 28 of the Shangdi 6th Street, Haidian District, Beijing 100085
Tel: +86-10-82883305
Fax: +86-10-82883056
http://www.raisecom.com
Feedback
Comments a nd que stions a bout how t he ISCOM2924GF-4GE/4C system sof tware w orks a re
welcomed. Please review the FAQ in the related manual, and if your question is not covered, send
email by using the following web page:
http://www.raisecom.com/en/contact-us.html.
If you have comments on the ISCOM2924GF-4GE/4C specification, instead of the web page above,
please send comments to:
Organization
This manual is an introduction of the main functions of ISCOM2924GF-4GE/4C. To ha ve a qui ck
grasp of the using of the ISCOM2924GF-4GE/4C, please read this manual carefully. The manual is
composed of the following chapters:
Chapter 1 Overview
Chapter 2 Basic Configuration
Chapter 3 Ethernet
Chapter 4 Routing
Chapter 5 DHCP
Chapter 6 QoS
Chapter 7 Multicast
Chapter 8 Security
Chapter 9 Reliability
Chapter 10 OAM
Appendix B Acronym
Compliance
The RC series products developed by Raisecom are strictly complied with the following standards as
well a s ITU-T, IEEE, IETF and related standards from other international telecommunication
standard organizations:
YD/T973-1998 SDH 155Mb/s and 622Mb/s Technical conditions of optical transmitter module and
receiver module
YD/T1017-1999 Network node interface for the Synchronous Digital Hierarchy (SDH)
G.704 Synchronous frame structures used at 1544, 6312, 2048, 84 48 and 44 73 6 kbit/s hierarchical
levels
G.707 Network node interface for the synchronous digital hierarchy (SDH)
G.803 Architecture of transport networks based on the synchronous digital hierarchy (SDH)
G.825 The control of jitter and wander within digital networks which are based on the synchronous
digital hierarchy (SDH)
G.828 Error performance parameters and objectives for international, constant bit-rate synchronous
digital paths
G.829 Error performance events for SDH multiplex and regenerator sections
G.831 M anagement c apabilities of t ransport ne tworks ba sed on t he s ynchronous di gital hi erarchy
(SDH)
G.841 Types and characteristics of SDH network protection architectures
G.957 Optical interfaces for equipments and systems relating to the synchronous digital hierarchy
G.691 Optical interfaces for single channel STM-64 and other SDH systems with optical amplifiers
G.664 Optical safety procedures and requirements for optical transport systems
Features Descriptions
1
www.raisecom.com User Manual
Features Descriptions
This chapter i ntroduces t he ba sic c onfiguration and configuration process about I SCOM2924GF
device and provides the related configuration cases.
Login device
Command line
Manage files
Upload and upgrade
Configure clock management
Configure interface management
Configure basic information for device
Configure task calling function
Configure watchdog
Configuration cases
Note: R J45 C onsole por t a nd U SB Console port are mutually exclusive and cannot be us ed
simultaneously.
If user wants to login device through PC via RJ45 Console port, firstly need to connect Console port
and P C R S-232 s erial por t, a s below Figure 2-1 s hows; t hen ope rate t erminal e mulation pr ogram
such a s W indows X P hy per-terminal pr ogram in PC to configure communication parameters as
shown in Figure 2-2, and then login device.
Figure 2-1 Login the device through PC connected with RJ45 Console port
Note: Microsoft Company is not i n s upport of hyper-terminal s ince Windows Vista s ystem, users
operate Windows Vista or Windows 7 system please download HyperTerminal program from internet.
It is free to download HyperTerminal program.
4
www.raisecom.com User Manual
When users want to login the device by connecting PC to USB Console port, they need to install a
driver program on PC to switch USB port to serial port, and then connect the device USB port to PC
USB port by USB line, as shown in Figure 2-3.
Note: t he de vice doe snt pr ovide dr iver pr ogram t o s witch U SB p ort t o s erial por t, us ers ne ed t o
prepare it on their own.
Run terminal emulation pr ogram on PC, such a s "HyperTerminal" pr ogram, a nd t hen configure
communication parameters on HyperTerminal to login the device. The communication parameters
configuration is shown as below:
Note: When configuring communication parameters for "HyperTerminal", users need to choose the
COM port. They can determine the COM port information used in the connection from USB port to
serial port through the "Ports (COM & LPT)" information in PC Device Manager.
Telnet Server: users run Telnet client program on a PC to login the device, and take device
5
www.raisecom.com User Manual
Before logging on the device by Telnet, users need to login the device through Console port and start
Telnet service. Please take the following configurations on the devices needed to start Telnet service.
Telnet Client: When user connects PC terminal emulation program or Telnet client program
with the de vice, then telnet ot her device and configure/manage it. As Figure 2-6 shows,
Switch A is not only performed as Telnet Server but also provides Telnet Client.
6
www.raisecom.com User Manual
SSHv2 allows data to be exchanged via TCP and it builds up a secure channel over T CP. Besides,
SSHv2 is in support of other service ports besides standard port 22, thus to avoid illegal attack from
network.
Before login device via SSHv2, user must login device through Console port and starts up SSH
service.
The default configuration to login the device through SSHv2 is as follows.
2 Raisecom(config)#generate ssh-key Generate local SSHv2 key pair and designate its length
length
3 Raisecom(config)#ssh2 server Start SSHv2 server
SSHv2 server can be shut down by command of no
ssh2 server.
7
www.raisecom.com User Manual
Note: Initially, the user name and password are both raisecom
If there isnt any privilege restriction, any remote user can login device via Telnet or access network
by bui lding P PP ( Point t o Point Protocol) c onnection w hen t he S NMP ( Simple N etwork
Management Protocol) interface or other service interface of device are configured with IP address.
This is unsafe to the device and network. By creating user for device and setting password and
privilege helps to manage the login users and ensures network and device security.
1 Raisecom#user name user-name Create or modify the user name and password.
password password
The created user can be deleted by the command of no
username.
2 Raisecom#user name user-name Configure login user privilege. The initial user privilege
privilege privilege-level is 15, which is the highest privilege.
8
www.raisecom.com User Manual
3 Raisecom#user user-name Configure the priority rule for login user to perform the
{ allow-exec | disallow-exec } command line.
first-keyword [ second-keyword ]
Specified allow-exec parameters will allow the user to
perform commands higher than the current priority.
Specified disallow-exec parameters only allow the user to
perform commands lower than the current priority.
3 Raisecom#show ssh2 public-key Check the public key used for SSHv2
[ authentication ] authentication in the device and client port
4 Raisecom#show ssh2 { server | session } Check SSHv2 server or session information.
User can login this device through PC that run terminal emulation program or CPE device, enter into
command line interface once the command prompt appears.
0~4: visitor, users can execute the commands of ping, clear, and history, etc. in this level;
5~10: monitor, users can execute the command of show and so on;
11~14: operator, users can execute commands for different services like VLAN, IP, etc.;
15: administrator, used for system basic running commands.
Input enable command and correct password, then enter to privileged EXEC mode. The default
password is Raisecom.
Raisecom>enable
Password:
Raisecom#
In privileged E XEC m ode, i nput t he c ommand of config terminal to e nter gl obal c onfiguration
mode.
Raisecom#config terminal
Raisecom(config)#
Note:
Command line prompt "Raisecom" is the default host name. Users can use the command of
hostname string to modify the host name in privileged EXEC mode.
Some commands can be achieved both in global configuration mode and other modes, but the
accomplished functions are closely related to command line modes.
Generally, i n a c ommand line m ode, y ou c an go ba ck to t he pr evious l evel command line
mode by the com mand of quit or exit, but i n t he privileged EXEC mode, you need to use
disable command to go back to user EXEC mode.
Users can go back to privileged EXEC mode through end command from any command line
mode except the user EXEC mode or privileged EXEC mode.
User EXEC mode Log in the device, input correct username Raisecom>
and password
Privileged EXEC In user EXEC mode, input enable Raisecom#
mode command and correct password.
Global configuration In privileged EXEC mode, input config Raisecom(config)#
mode terminal command.
Physical layer In global configuration mode, input Raisecom(config-port)#
interface interface port port-id command.
configuration mode
10
www.raisecom.com User Manual
Shortcut Description
11
www.raisecom.com User Manual
Shortcut Description
Left cursor key () Move t he cur sor one character t o left; t he di splay ha s no
change if the cursor is at the beginning of command.
Right cursor key () Move t he cur sor o ne cha racter t o right; the d isplay h as no
change if the cursor is at the end of command.
Backspace Delete t he cha racter be fore t he cur sor; t he di splay h as no
change if the cursor is at the beginning of command.
Tab Click <Tab> after input ting a complete ke yword, c ursor w ill
automatically appe ar a s pace t o the end; cl ick <Tab> again,
the system will show the follow-up inputting keywords.
Click <Tab > after i nputting a n i ncomplete ke yword, s ystem
automatically executes partial helps:
System take the complete keyword to replace input if the
matched keyword is the one and only, and leave one word
space between the cursor and end of keyword;
In case of mismatch or matched keyword is not the one and
only, display prefix at first, then click <Tab> key to check
words circularly, no space from cursor to the end of
keyword, click <Space> key to input the next word;
If input incorrect keyword, click <Tab> key will change to
the next line and prompt error, the input keyword will not
change.
Ctrl+A Move the cursor to the head of line
Ctrl+C Break off some running operation, such as ping, traceroute
and so on.
Ctrl+D or Delete Delete the cursor location characters
Ctrl+E Move the cursor to the end of line
Ctrl+K Delete all characters behind the cursor (including cursor
location)
Ctrl+X Delete all characters before the cursor (except cursor location)
Ctrl+Z Return to privileged EXEC mode from other modes (except
user EXEC mode)
Space or y When the terminal printing command line information exceeds
the screen, continue to show the information in next screen.
Enter When the terminal printing command line information exceeds
the screen, continue to show the information in next line.
Display as below:
clear Clear screen
enable Turn on privileged mode command
exit Exit current mode and down to previous mode
help Message about help
history Most recent history command
language Language of help message
list List command
quit Exit current mode and down to previous mode
terminal Configure terminal
test Test command
Input a c ommand and followed by a ? after one cha racter space, if the position of ? is
keyword, list all keyword and brief description.
Raisecom(config)#ntp ?
Display as below:
peer Configure NTP peer
refclock-master Set local clock as reference clock
server Configure NTP server
Input a c ommand a nd followed by a ? after one cha racter space, if the position of ? is
parameter, list the range and brief description.
Raisecom(config)#interface ip ?
Display as below:
<0-14> IP interface number
Display as below:
link-aggregation Link aggregation
link-state-tracking Link state tracking
Input t he f irst f ew l etters of a c ommand ke yword a nd c lick <Tab> key to s how c omplete
13
www.raisecom.com User Manual
keyword. The precondition i s the input letters can identify the ke yword clearly, otherwise,
different ke ywords w ill be s hown c ircularly af ter cl ick <Tab> key c ontinued, user c an
choose the right keyword from them.
The de vice pr ints out t he f ollowing error pr ompt a ccording t o e rror t ype w hen i nput i ncorrect
commands:
Shortcut Description
The help message and prompt message i n command line interface are di splayed in bot h
Chinese and English languages.
Provide pa use function when one time display message exceeds one screen, users have the
following options at this time, as shown in Table 2-1.
Table 2-1 Function keys description for command line message display characteristics
Input any letter key(except y) Stop the display and command execution
ISCOM2924GF device is in support of a series commands starting with show, for checking device
configuration, operation and diagnostic information. Generally speaking, these commands can output
more information, and then user needs to add filter rules to filter out unnecessary information.
14
www.raisecom.com User Manual
| begin string: show all lines starting from the assigned string;
| exclude string: show all lines mismatch with the assigned string;
| include string: show all lines only match with the assigned string.
Display message page-break function refers t o provide pa use function when one t ime display
message exceeds one screen, users can use the display c haracteristics function ke ys in table 2 -1 to
control message display. If suppr essing message page-break function, it w ill not pr ovide pa use
function when display message exceeds one screen; all the messages will be displayed circularly at
one time.
By default, the system display information page-break function is enabled.
By default, the system saves the recent 20 history commands in the cache. Users can set the number
of system stored history command.
no option: providing in the front of command line to restore the default value, disable some
function, delete some setting, etc.; perform some operations opposite to command itself.
Command with no option is also known as reverse command.
enable | disable option: providing in the back or center of command line; enable is to enable
some feature or function, while disable is to prohibit some feature or function.
For example:
15
www.raisecom.com User Manual
Perform description text c ommand in physical layer interface mode to modify the i nterface
description; perform no de scription command to delete the interface description and restore
the default values.
Perform shutdown command in physical layer interface mode to disable an i nterface;
perform no shutdown command to enable an interface.
Perform vlan vlan-id command in global configuration mode to create a VLAN; perform no
vlan vlan-id command to delete a specified VLAN.
Perform terminal page-break enable command i n global c onfiguration m ode t o e nable
terminal page-break display message function; perform terminal page-break disable
command to prohibit terminal page-break display message function.
Note: Most configuration commands have default values, which often are stored by no option.
After power on d evice, running BootROM file at first, click <Space> key to enter BootROM menu
when the prompt Press space into Bootrom menu appears:
begin...
Operation Description
16
www.raisecom.com User Manual
Operation Description
Configuration f ile ha s a n a ffix .cfg, t hese f iles c an b e ope n by text book pr ogram in W indows
system, the contents in the following format:
17
www.raisecom.com User Manual
if there is no configuration files in memory, the device take the default parameters for initialization.
In traditional, c onfiguration files a re loaded by serial port, it takes a long time to load for the low
speed and remote loading is unavailable. FTP and TFTP loading modes can solve those problems and
make operation more convenient.
18
www.raisecom.com User Manual
ISCOM2924GF provides several methods to confirm configuration file name in TFTP server, such as
input by manual, obtain by DHCP Client, use default configuration file name, etc. Besides, users can
assign certain denomination r ule f or configuration files and then, t he device confirms t he na me
according t o t he r ules a nd combines w ith i tself a ttribution ( device t ype, M AC a ddress, s oftware
version, etc.).
2.4.1.2 Upgrading
The device needs to u pgrade if user needs to i ncrease new features, opt imize functions or solve
current software version BUGs.
Upgraded by BootROM
Upgraded by FTP/TFTP
Note:
When performing configuration auto-loading function, the IP address priority configured by
commands is higher than the one obtained by DHCP Client.
When performing configuration auto-loading function, configuration file name obtained from
server in priority turn from higher to lower as file name confirmed b y denomination rule >
file name configured by command > file name obtained by DHCP Client.
19
www.raisecom.com User Manual
Step Operation
1 Log in device through serial port as administrator and enter Privileged EXEC
mode, reboot device by the command of reboot.
Raisecom#reboot
Please input 'yes' to confirm:yes
Rebooting ...
Raisecom#
begin...
ram size:128M testing...done
Init flash ...Done
Bootstrap_5.0.1.ISCOM2924GF.1.20110825, Raisecom Compiled Aug 25 2011,11:51:11
Base Ethernet MAC address: 00:0e:5e:00:00:00
Press space into Bootstrap menu...
0
2 Click <Space> key t o enter i nterface of [ raisecom] w hen the di splay s hows
Press space into Bootstrap menu..., then input ? to display command list:
[Raisecom]:?
? - List all available commands
h - List all available commands
b - Boot an executable image
T - Download both DOS file system
N - set ethernet address
R - Reboot
Note: The input letters are case sensitive.
20
www.raisecom.com User Manual
Step Operation
3 Input T to download through TFTP and replace system boot file, the display
information shows as below:
[Raisecom]:T
Index Name Size
----------------------------------------------------------
1 ROS_5.0.0_ISCOM2924GF.1.20110825 5512f5
2 ----------- 0
Current selected version is 0
Please select a version to overwrite: 1 Select system for upgrading.
dev name:ISCOM2924GF
unit num:1
21
www.raisecom.com User Manual
Please configure time and time zone for the device as below:
22
www.raisecom.com User Manual
ISCOM2924GF device adopts multiple NTP working mode for time synchronization:
Server/Client mode
In this mode, c lient sends c lock synchronization message to different servers. The server works in
server m ode b y a utomation a fter r eceiving s ynchronization m essage a nd s end answering m essage.
The client received answering message and perform clock filer and selection, then synchronize it to
privileged server.
In this mode, client can synchronize to server but the server cannot synchronize to client.
Equity mode
23
www.raisecom.com User Manual
In this mode, active equity send clock synchronization message to passive equity. The passive equity
works in passive mode by automation after receiving message and send answering message back. By
exchange message, the two sides build up equity mode. The active and passive equities in this mode
can synchronize each other.
24
www.raisecom.com User Manual
25
www.raisecom.com User Manual
26
www.raisecom.com User Manual
ISCOM2924GF device is in support of realizing task scheduling by c ombining the pr ogram lis t to
command line. Users just need to designate the task start time, period and end time in the program
list, and t hen bind the program list to command l ine so as t o r ealize t he pe riodic ope ration of
command line.
Please configure task scheduling function for the device as below:
28
www.raisecom.com User Manual
The system will reboot when the switch c an't c ontinue t o w ork for task suspension or dead
circulation, and without feeding the dog within in a feeding dog cycle.
The watchdog function configuration can prevent the system program from dead circulation caused
by uncertainty fault so as to improve the stability of system.
As Figure 2-7 s hows be low, c onnect T FTP s erver with switch, configure auto-loading f unction i n
switch to let switch auto-loading configuration file f rom T FTP se rver. Hereinto, TFTP se rver IP is
192.168.1.1 and the denomination rule for configuration file name satisfies following conditions:
29
www.raisecom.com User Manual
30
www.raisecom.com User Manual
Chapter 3 Ethernet
This c hapter i ntroduces pr inciple a nd configuration procedure of E thernet f eatures, a lso pr oviding
related configuration applications:
Overview
Configure MAC address forwarding table
Configure VLAN
Configure QinQ
Configure VLNA conversion
Configure STP
Configure MSTP
Configure loopback detection
Configure interface protection
Configure interface mirror
Configure layer-2 protocol transparent transmission
Maintenance
Configuration Applications
3.1 Overview
3.1.1 Ethernet interface
With the highly f lexible, relatively s imple, easy t o i mplement f eatures, Ethernet has be come an
important LAN networking technology. Ethernet int erface is di vided into: E thernet e lectrical
interface and Ethernet optical interface.
ISCOM2924GF device i s n s upport of Ethernet electrical interface and Ethernet o ptical i nterface.
The s pecific interface mode depends on t he de vice, support s ituation of chip and achievement
situation of drive.
The m ain f unction of a uto-negotiation i s t o m ake t he devices i n both e nds of physical link to
automatically s elect the s ame working parameters through i nteraction information. The c ontent of
auto-negotiation mainly i ncludes dupl ex m ode, operating speed and flow cont rol p arameters, etc.
Once the negotiation is passed, the devices in both ends of link will be locked in the same duplex
mode and operating speed.
ISCOM2924GF-4C 10GE interface is only in support of full-duplex mode; ISCOM2924GF Combo
electrical interface and 10/100/1000BASE-T photoelectric conversion module auto-negotiation is in
support of 10M/100M/1000M operating s peeds, f ull-duplex a nd ha lf-duplex working mode
configuration.
31
www.raisecom.com User Manual
General standard Ethernet cabl e is di vided into direct-through cable MDI ( Medium D ependent
Interface) and cross-over cable MDI-X (Medium Dependent Interface cross-over). MDI provides
physic a nd c ircuit connections from terminal end to network trunk device. MDI-X offers the sa me
device (terminal to terminal) connection. The interface type of host and router is MDI, the port type
of hub a nd s witch is MDI-X. Generally, heterogeneous de vices i nterconnect with direct-through
cable, while similar devices interconnect with cr oss-over cable. Adaptive connection need not to
consider direct-through cable or cross-over cable.
ISCOM2924GF Ethernet connection is in support of adaptive MDI / MDI-X.
Ethernet device implements Ethernet message fast forwarding through MAC address forwarding rule;
each device ha s a MAC address f orwarding table t hat associate t he M AC ad dress and forwarding
interface. A ll of the ingress interface message will be forwarded according to the MAC address
forwarding table, it is the base for Ethernet device realizing layer-2 message fast forwarding. MAC
address forwarding table is saved in device cache, the capacity of cache decides saved MAC address
amount.
Ethernet device adopts following forwarding modes according to MAC address table items:
Unicast m ode: If the M AC a ddress f orwarding t able c ontains i tem r elated t o message
destination M AC a ddress, t he de vice di rect transmits fr om t he f orwarding egress i nterface.
As shown in Figure 3-1:
32
www.raisecom.com User Manual
1
Message purpose
MAC D
Local MACMAC A 2
Local portPort 1 Search MAC address table
MAC Interface VLAN
D Port 4 1
PC A PC C
Switch
PC B PC D
3
Forward message according to
the interface in MAC address
forwarding table
PC A
PC C
Switch
PC D
MAC address forwarding table is divided into static address table entry and d ynamic address table
33
www.raisecom.com User Manual
entry.
Static MAC address table entry: also called permanent address, added and removed by the
user manually, does not age with time. For a network with small device change, adding static
address table entry manually can reduce the network broadcast traffic, improve the security of
the i nterface a nd prevent ta ble e ntry f rom losing after the system re set, interface b oard hot
swapping or interface board reset.
Dynamic M AC addres s t able entry: the switch can add dynamic M AC address t able ent ry
through MAC address learning mechanism or manual establishment by users. The table entry
will be aged according to the aging time configuration, and be empty after he system reset,
interface board hot swapping or interface board reset.
ISCOM2924GF i s i n s upport of t he m aximum 32k dy namic M AC addresses a nd 1 00 s tatic M AC
addresses.
There i s capa city r estriction to the MAC a ddress forwarding table of Ethernet s witch. I n or der t o
maximize the use of address forwarding table resources, Ethernet switch uses the aging mechanism
to update M AC a ddress f orwarding table, i.e. in the meantime of cr eating a cer tain dynamic table
entry, ope n the aging timer, if the re is n o MAC a ddress m essage from t he t able e ntry dur ing t he
aging time, the switch will delete the MAC address table entry.
ISCOM2924GF device is in support of MAC address auto-aging. The range of aging time is 10s~1
000000s.
Note:
When opening the "destination MAC address update" function, if the switch has transmitted
some destination MAC address message during aging time, the MAC table entry will also be
triggered update and restarted aging.
MAC address aging mechanism is only valid to dynamic MAC address table entry.
When message e nters de vice i nterface, the device w ill s earch interface associated with
destination M AC a ddress i n t he M AC a ddress ta ble, if the re is de stination MAC in M AC
address table, and forwarding the message from it; the source MAC address of message will
be r ecorded and save i n MAC addr ess t able related to i ngress m essage i nterface I D an d
VLAN ID. When ot her i nterface ha s message t o t he M AC ad dress, the i nformation can be
forwarded to associated interface directly.
If there i s no de stination M AC f or t he message i n MAC a ddress t able, a ddress a ssociation
relationship will f orward data pa ckets to all int erfaces w ith same br oadcast do main and
record source MAC address to device MAC address table.
MAC address learning amount limit function is mainly to restrict the number of MAC address entries,
avoid extending the checking time of forwarding table entry caused by too large MAC address table
and degrading the forwarding performance of Ethernet switch, and it is an effective way to manage
MAC address table.
34
www.raisecom.com User Manual
MAC address learning amount limit is mainly used to restrict the size of MAC address forwarding
table and improve the forwarding speed of switch chip.
You can control the MAC address forwarding table entry number maintained by Ethernet switch by
setting the maximum nu mber of MAC address learnt in the Ethernet interface or sp ecified VLAN.
When the number of MAC address learnt in interface or specified VLAN reaches the threshold set by
the user, the interface will no longer take the restriction to the MAC address learning or other VLAN
messages.
3.1.3 VLAN
3.1.3.1 VLAN overview
VLAN (Virtual Local Area Network) is a protocol to solve Ethernet broadcast and security problem.
It is a layer-2 isolation technique that divides a LAN into different broadcast domains by logic but
not by ph ysics, t hen t he different br oadcast dom ains can w ork a s v irtual gr oups w ithout a ny
influence from one another. Looking from the function, VLAN has the same features as LAN, but
members in one VLAN can access one another without restriction by physical location. As shown in
Figure 3-3:
VLAN technique can divides a physical LAN i nto different br oadcast dom ain b y logic. Hosts
without intercommunication requirements can be isolated by VLAN and then, i mprove ne twork
security, reduce broadcast flow and broadcast storm.
ISCOM2924GF de vice i s c ompliance w ith IEEE 802 .1Q standard VLAN a nd i s s upport of 4094
concurrent VLAN.
35
www.raisecom.com User Manual
ISCOM2924GF has two interface modes: Access mode and Trunk mode. The method of dealing with
message for the two modes shows as below.
Access Add default VLAN Tag for VLAN IDdefault VLAN IDdefault VLAN ID,
message VLAN ID, receive the remove Tag and transmit the
message message.
VLAN IDdefault
VLAN ID, discard the
message
Trunk Default VLAN ID is Receive the message if VLAN IDdefault VLAN ID,
included in interface permit the message VLAN ID is permit passing from interface,
passing VLAN ID list, included in the permit remove Tag and transmit the
receiving the message and passing VLAN ID list. message
adding default VLAN Tag. Discard the message if
VLAN IDdefault VLAN ID,
the message VLAN ID is permit passing from interface,
not included in the permit transmit the message with Tag
passing VLAN ID list.
3.1.4 QinQ
QinQ ( also know n a s Stacked VLAN or Double V LAN) technique is a n e xtension f or 802. 1Q
defined in IEEE 802.1ad standard.
Basic QinQ is a simple layer-2 VPN tunnel technique, which encapsulate outer VLAN Tag for user
private network message at carrier access end, then the message takes double VLAN Tag to transmit
through ba ckbone ne twork ( public ne twork) of c arrier. In publ ic ne twork, m essage j ust be
transmitted in accordance with outer VLAN Tag (namely the public network VLAN Tag), the user
private network VALN Tag is transmitted as data in message.
36
www.raisecom.com User Manual
Typical networking of basic QinQ is shown as Figure 3-4, ISCOM2924GF is PE (Provider Edge).
The message is transmitted to PE device from user device, and the VLAN ID of message tag is 100.
The message will be printed outer tag with V LAN 200 when pa ssing through PE device user side
interface and then enter PE network.
The VLAN 200message is transmitted to PE device on the other end by PE, and then the other PE
will strip the outer tag VLAN 200 and send it to user device. So the message returns to VLAN 100
tag.
This technique can s ave pu blic ne twork V LAN I D r esource. Users can m ark out pr ivate ne twork
VLAN ID to avoid conflict with public network VLAN ID.
Flexible Q inQ i s an enhancement of ba sic Q inQ, which classifies f low accor ding to user da ta
features, then encapsulate d ifferent t ypes f low into different outer V LAN t ag. This technique is
realized by combination of interface and VLAN. Besides the functions of basic QinQ, flexible QinQ
can perform different action on different VLAN Tag received by one interface and add different outer
VLAN ID for different inner VLAN ID. According to configure mapping rule for inner and outer Tag,
users can encapsulate different outer Tag for different inner Tag message.
Flexible QinQ function makes c arrier ne twork structure m ore f lexible. Customers can classify
different t erminal us ers at a ccess de vice i nterface accor ding to VLAN Tag and then, encapsulate
different outer Tag for different class users. In public network, customer can configure QoS pol icy
according t o out er T ag a nd configure data t ransmission priority f lexibly so as to m ake us ers i n
different class receive the corresponding services.
After receiving VLAN Tag with user private ne twork message, the s witch will match VLAN Tag
according to the VLAN m apping configuration rule and replace i t i f matching successfully.
37
www.raisecom.com User Manual
3.1.6 STP/RSTP/MSTP
3.1.6.1 STP
With the increasing complexity of network structure and growing number of switches in the network,
the E thernet ne twork l oops become t he most prominent pr oblem. Because of the packet broadcast
mechanism, network loop will make the network generate network storm, exhaust network resources,
and have serious impact to the normal data forwarding. The network storm caused by network loops
is shown in Figure 3-6.
Figure 3-6 Sketch map of network storm caused by network loops circuit
STP (Spanning Tree P rotocol) is c ompliant to IEEE 802.1d s tandard and us ed t o r emove da ta
physical loop in data link layer in LAN.
STP running device can interact BPDU (Bridge Protocol Data Unit) packet with each other for the
election of root switch and selection of root port and designated port. It also can block loop interface
in the de vice logically according to the selection results, eventually trimming the loop ne twork
structure to t ree ne twork s tructure without l oop w hich t akes a de vice a s r oot, s o a s t o pr event the
continuous proliferation and limitless circulation of packet in loop network from causing broadcast
storm a nd a void declining packet pr ocessing capacity caused by ceceiving the s ame packets
repeatedly.
The loop network diagram running STP is shown in Figure 3-7.
38
www.raisecom.com User Manual
Although S TP can eliminate loop ne twork a nd pr event br oadcast s torm w ell, i ts shortcomings a re
still gradually exposed with thorough application and development of network technology.
The major disadvantage of STP is the slow convergence speed.
3.1.6.2 RSTP
For i mproving the low c onvergent speed of STP, IEEE 802.1w e stablishes RSTP (Rapid Spanning
Tree Protocol), which increase the mechanism to change interface blocking state to forwarding state,
speed up the topology convergence rate.
The purpose of S TP/RSTP is t o s implify a br idge c onnection L AN t o a uni tary s panning t ree i n
logical topology and so as to avoid broadcast storm.
The di sadvantages of S TP/RSTP e xposed w ith t he r apid de velopment of V LAN t echnology. The
unitary spanning tree simplified from STP/RSTP leads the below problems:
The w hole s witched network ha s onl y one s panning t ree, w hich w ill le ad to longer
convergence time in a larger network.
Waste of bandwidth since a link doesnt carry any flow after it is blocked;
Message of partial VLAN cannot be forwarded when network structure is unsymmetrical. As
shown in Figure 3-8, Switch B is root switch, RSTP protocol blocks the link between Switch
A and Switch C logically and make that the VLAN 100 message cannot be transmitted and
Switch A and Switch C cannot communicate.
39
www.raisecom.com User Manual
3.1.6.3 MSTP
MSTP (Multiple Spanning Tree Protocol) is defined by IEEE 802.1s. Recovering the disadvantages
of S TP a nd RSTP, t he M STP realizes fa st convergence and distributes different VLAN flow
following its own path to provide an excellent load sharing mechanism.
MSTP di vides a s witch ne twork i nto m ultiple dom ains, c alled MST dom ain. Each M ST dom ain
contains s everal s panning t rees but t he t rees ar e i ndependent o ne an other. Each s panning t ree i s
called a MSTI (Multiple Spanning Tree Instance).
MSTP protocol introduces CST (Conmon Spanning Tree) and IST (Internal Spanning Tree) concepts.
CST refers to take MST domain as a w hole to calculate and generate a spanning tree. IST means to
generate spanning tree in internal MST domain.
Compared with STP and RSTP, MSTP also introduces total root (CIST Root) and domain root (MST
Region Root) concepts. The total root is a global concept; all switches running STP/RSTP/MSTP can
only ha ve one total r oot, which is the CIST R oot. T he domain root i s a l ocal c oncept, which is
relative to an instance in a domain. As Figure 3-9, all connected devices only have one total root, and
the number of domain root contained in each domain is associated with the number of instances.
40
www.raisecom.com User Manual
There can be different M ST instance in each MST de main, which associates VLAN and MSTI b y
setting V LAN mapping table (relationship table of VLAN a nd MSTI). The concept sketch map of
MSTI is shown in the Figure 3-10.
Note: Each VLAN can only corresponding to one MSTI; that is to say, data of one VLAN can only
be transmitted in one MSTI; while one MSTI may correspond to several VLAN.
41
www.raisecom.com User Manual
Compared with the previous STP and RSTP, MSTP has obvious advantages, including cognitive
ability of VLAN, load balance sharing ability, similar RSTP port status switching ability as well as
binding multiple VLAN to one MST instance to reduce resource occupancy rate. In addition, MSTP
running devices in network are also compatible with the STP and RSTP running devices.
Applying MSTP in the network as Figure 3-11 above, after calculation, there are two spanning trees
generated at last (two MST instances):
the interface with bigger ID, and leave the smaller interface ID in UP status.
Through interface protection festure, user can enable the protection feature to interfaces needed to be
controlled to achieve the layer-2 data isolation and reach physical isolation effect among interfaces,
which improve network security and provide flexible networking solution to cutomer.
The packets among interfaces in a protection group cannot communicate after configuring interface
protection, but the communication between i nterfaces enabling interface protection and disabling
interface protection wont be influenced.
The basic principle of interface mirror is shown in Figure 3-12. PC 1 connects outside network via
the Port 1; PC 3 is monitoring PC, connecting outside network through the Port 12.
When m onitoring packets from t he PC 1, user ne eds to assign Port 1 co nnected to PC1 as mirror
source i nterface, enable m irror f unction of ingress i nterface and a ssign Port 12 as m oniroring
interface, i.e. mirror destination interface.
When the service pa ckets f rom PC 1 enter switch, the s witch will forward the pa cket an d c opy to
monitoring interface (Port 12). The monitoring device connected to mirror monitoring interface can
43
www.raisecom.com User Manual
ISCOM2924GF is in support of the da ta stream mirror over ingress interface and egress interface.
The packets in ingress/egress mirror interface will be copied to the monitor interface after enabling
the mirror function. Monitoring interface and mirror interface cannot be the same one.
Static MAC address can be set for fixed server, special persons (manager, financial staff, etc.)
fixed and important hosts to make sure all data flow forwarding to these MAC addresses are
forwarded from static MAC address related interface in priority.
For the interface with fixed static MAC address, user can disable MAC address learning to
avoid other hosts visiting LAN data from the interface.
Configure aging t ime f or d ynamic M AC a ddress f orwarding t able t o avoid the explosive
growth of MAC address forwarding table.
44
www.raisecom.com User Manual
3.2.1.2 Preconditions
N/A
46
www.raisecom.com User Manual
Main f unction of V LAN i s t o c arve up l ogic network s egments. There are 2 typical application
modes:
One ki nd is in s mall s ize L AN, one de vice is c arved up to several VLAN, the hosts tha t
connect to the device are carved up by VLAN. So hosts in the same VLAN can communicate,
but hosts be tween di fferent VLAN cannot communicate. For example, the f inancial
department ne eds t o di vide f rom ot her de partments a nd t hey c annot a ccess e ach ot her.
Generally, the interface to connect host is in Access mode.
The other kind is in bigger LAN or enterprise network, multiple devices connect to multiple
hosts and t he de vices ar e concatenated, da ta m essage t akes VLAN Tag for f orwarding.
Identical VLAN interface of multiple devices can communicate, but hosts between different
VLAN cannot communicate. This mode is used in enterprise that has many people and need a
lot of hosts, in the s ame department but different p osition, the hosts in one department can
access one another, so customer has to carve up V LAN in multiple devices. Layer-3 devices
like r outer i s r equired if us ers want t o c ommunicate a mong di fferent V LAN. The
concatenated interfaces among devices are set in Trunk mode.
When configuring IP address for V LAN, user can associate a l ayer-3 interface for it. Each layer-3
interface is corresponding to one IP address and one VLAN.
3.3.1.2 Preconditions
Before configuring VLAN, users need to configure physical parameter for the interface to make the
status Up.
47
www.raisecom.com User Manual
48
www.raisecom.com User Manual
49
www.raisecom.com User Manual
The basic QinQ configuration and flexible QinQ configuration for the device are based on di fferent
service requirements.
Basic QinQ:
With application of basic QinQ, user can add outer VLAN Tag to layout Private VLAN ID freely so
as to make the user device data at both ends of carrier network take transparent transmission without
conflicting with VLAN ID in service provider network.
Flexible QinQ:
Different f rom ba sic Q inQ, out er V LAN T ag of f lexible Q inQ c an be selectable according t o
different services. There are multiple services and different private VLAN ID in user network which
are divided by adding different outer VLAN Tag for voice, video, and data services etc., then realize
different distributaries and inner and outer VLAN mapping for different services forwarding.
3.4.1.2 Preconditions
Connect interface and configure interface physical parameters to make the physical layer Up.
Create VLAN
51
www.raisecom.com User Manual
Differentiated f rom Q inQ, V LAN m apping onl y changes V LAN tag but not i ncrease additional
multilayer VLAN T ag e ncapsulation. U sers j ust ne ed t o c hange VLAN Tag t o m ake i t t ransmit
according to carrier VLAN mapping rule and which wont increase frame length of original packet.
VLAN mapping is also used in below conditions:
3.5.1.2 Preconditions
Connect interface and configure interface physical parameters to make the physical layer Up.
Create VLAN
52
www.raisecom.com User Manual
In big LAN, multiple devices are concatenated for inter-access among hosts. It needs to enable STP
to a void l oop a mong t he d evices, MAC a ddress l earning f ault, and br oadcast s torm a nd ne twork
down caused by quick copy and transmission of data frame. STP calculation can block one interface
in a broken loop and make sure that there is only one path from data flow to destination host, which
is also the best path.
3.6.1.2 Preconditions
hello-time timer 2s
53
www.raisecom.com User Manual
54
www.raisecom.com User Manual
In big LAN or residential region aggregation, the aggregation devices will make up a ring for link
backup, at the same time avoid loop and realize service load sharing. MSTP can select different and
unique forwarding path for each one or a group of VLAN.
3.7.1.2 Preconditions
hello-time timer 2s
Please configure MSTP domain and its maximum hop count for the device as below:
Note: The maximum hop count is M ST domain maximum hop count if and onl y if the configured
device is root of the domain; other roots cannot configure this item effectively.
Note: Users ha d better not modify the priority of any device i n the ne twork i f adopting direct
56
www.raisecom.com User Manual
assigning root bridge method, otherwise, the assigned root bridge or backup bridge may be invalid.
Please configure root bridge or backup bridge for the device as below:
Similar to configuring root and backup root, priority is independent mutually in different instances.
User can confirm priority instance through parameter instance instance-id. Configure bridge priority
for CIST if instance-id is 0 or parameter instance instance-id is omitted.
Please configure interface priority and system priority for the device as below:
57
www.raisecom.com User Manual
The maximum hop count of MST domain is used to restrict domain scale, while network diameter is
a parameter to denote the whole network scale. The b igger the network diameter is, the bigger the
network scale is.
Similar to the maximum hop c ount of MST domain, if and only if configuring the device as CIST
root device, this configuration is effective. MSTP will automatically set Hello Time, Forward Delay
and Max Age parameters to a privileged value by calculation when configuring network diameter.
Please configure network diameter for switch network for the device as below:
10Mbps is 2000000
100Mbps is 200000
1000Mbps is 20000
10Gbps is 2000
Please configure inner path cost for the device as below:
58
www.raisecom.com User Manual
Please configure interface maximum transmitting speed for the device as below:
59
www.raisecom.com User Manual
The edge port attribute depends on actual condition when it is in auto-detection mode; the real port
will change to false edge port after receiving BPDU when it is in force-true mode; when the interface
is i n force-false mode, w hether it is t rue or false e dge por t i n r eal ope ration, i t will m aintain the
force-false mode until the configuration is changed.
User can configure current Ethernet interface to connect point-to-point link b y force, but it will go
wrong if the link is not point-to-point. Generally, user had better set this item in auto status and the
system will automatically detect whether the interface is connected to point-to-point link.
60
www.raisecom.com User Manual
Spanning t ree m odule e xchanges packets pe riodically, and the l ink ha s failed if it hasnt received
message in a pe riod. Then s elect a ne w link and enable backup interface. In actual ne twork
application, the message cannot be received not only for link fault, then at this time, enable backup
interface may lead to loop link.
Purpose of loopguard i s t o keep the or iginal interface s tatus w hen it cannot r eceive message in a
period. NOTE: Loopguard and link backup functions are exclusive, loopguard requires disabling link
backup to avoid loop.
Please configure interface loop protection for the device as below:
61
www.raisecom.com User Manual
In ne twork, t he hos ts or l ayer-2 devices unde r acces s devices m ay f orm l oop b y ne twork c able
62
www.raisecom.com User Manual
intentionally or i nvoluntary. Enable loopback de tection function at dow nlink i nterface of access
device to av oid the network jam formed by unlimited copies of data traffic caused by downlink
interface loop. Block the loop interface once there is a loop.
3.8.1.2 Preconditions
Note:
Loopback detection function and STP are exclusive, only one can be enabled at one time.
The straight connection device cannot enable loopback detection in both ends simultaneously;
otherwise the interfaces at both ends will be blocked.
63
www.raisecom.com User Manual
Users need to configure the interface protection to realize layer-2 data isolation in the same VLAN
and get the physical isolation effect among interfaces.
The i nterface pr otection function can realize m utual i solation of interfaces i n the s ame V LAN,
enhance network security and provide flexible networking solutions for user.
3.9.1.2 Preconditions
N/A
64
www.raisecom.com User Manual
Interface m irror f unction i s m ainly us ed t o m onitor n etwork data t ype and t raffic r egularly f or
network administrator.
Interface mirroring function is to copy the interface traffic monitored to a monitor interface or CPU
so as to obtain the ingress/egress interface failure or abnormal flow of data to analyze, discover the
root cause and solve them timely.
3.10.1.2 Preconditions
N/A
65
www.raisecom.com User Manual
This function enables layer-2 protocol packets of one user network cross through carrier network to
make one user network unified operating one layer-2 protocol at different region.
66
www.raisecom.com User Manual
3.11.1.2 Preconditions
3.12 Maintenance
Users can maintain Ethernet features by the following commands:
Commands Description
As the Figure 3-13 s hows be low, ope rating on S witch A , configure a s tatic uni cast M AC a ddress
0001.0203.0405 at Port 2, t he belonged VLAN is VLAN 10; configure MAC address aging time as
500 seconds.
Step 1 Create VLAN 10 and active it, add Port 2 into VLAN 10:
Raisecom#config
Raisecom(config)#create vlan 10 active
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport mode access
Raisecom(config-port)#switchport access vlan 10
Raisecom(config-port)#exit
Step 2 Configure a static unicast MAC address 0001.0203.0405 at Port 2, belonged to VLAN10:
Raisecom(config)#mac-address-table static unicast 0001.0203.0405 vlan 10 port 2
Step 3 Configure MAC address aging time as 500 seconds:
Raisecom(config)#mac-address-table aging-time 500
As the Figure 3-14 shows below, PC1, PC2, and PC5 belong to VLAN 10, PC3 and PC4 belong to
VLAN 20; t he t wo de vices a re c onnected by T runk i nterface, PC3 a nd PC4 cannot c ommunicate
because VLAN20 is not permitted passing in the link; PC1 and PC2 under the same Switch B enable
interface protection function so that they cannot communicate with each other, but can respectively
communicate with PC5.
Step 1 Create VLAN10 and VLAN20 on the two devices respectively and activate them.
Configure Switch A:
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 10,20 active
Configure Switch B:
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 10,20 active
Step 2 Add Access mode interface Port 2 and Port 3 of Switch B into VLAN 10, add Access mode
70
www.raisecom.com User Manual
interface Port 4 into VLAN20, interface Port 1 is in Trunk mode and permits VLAN 10 passing.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 10
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 10
SwitchB(config-port)#exit
SwitchB(config)#interface port 4
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 20
SwitchB(config-port)#exit
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 10 confirm
SwitchB(config-port)#exit
Step 3 Add Access mode interface Port 2 of Switch A into VLAN 10, add Trunk mode interface
Port 3 into VLAN20, interfacePort1 is in Trunk mode and permits VLAN 10 passing.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 10
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 20
SwitchA(config-port)#exit
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 10 confirm
Step 4 Enable interface protection function for interface Port 2 and Port 3 of Switch B:
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport protect
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport protect
Check whether the VLAN configuration information is correct by the command of show vlan.
71
www.raisecom.com User Manual
Check whether the interface VLAN configuration is correct by the command of show interface port
port-id switchport.
Check whether the interface protection configuration is correct by the command of show switchport
protect
SwitchB#show switchport protect
Port Protected State
--------------------------
P1 enable
P2 enable
P3 enable
P4 enable
P5 disable
P6 disable
P7 disable
Check whether Trunk interface permitting VLAN passing is correct by operating PC1 ping PC5, PC2
ping PC5, PC3 ping PC4:
Check whether the interface protection function is correct by operating PC1 ping PC2:
PC1 ping PC2, ping unsuccessfully, interface protection function takes effect.
As the Figure 3-15 shows below, Switch A and Switch B are connected to VLAN 100 and VLAN
200 r espectively. If de partment E a nd de partment C , de partment F a nd de partment D w ant t o
communicate through carrier network, they must set outer Tag as VLAN 1000. Configure interface
Port 2 a nd Port 3 i n d ot1q-tunnel m ode on S witch A a nd S witch B, r espectively c onnect t o t wo
different VLAN. Interface Port 1 is uplink carrier network interface, set it in Trunk mode and permit
double Tag message passing, carrier TPID is 9100.
Step 1 Create VLAN 100, VLAN 200, and VLAN 1000 and activate them, TPID is 9100.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#mls double-tagging tpid 9100
SwitchA(config)#create vlan 100,200,1000 active
73
www.raisecom.com User Manual
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#mls double-tagging tpid 9100
SwitchB(config)#create vlan 100,200,1000 active
Configure Switch A.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 1000
SwitchA(config-port)#switchport qinq dot1q-tunnel
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 1000
SwitchA(config-port)#switchport qinq dot1q-tunnel
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk native vlan 1000
SwitchB(config-port)#switchport qinq dot1q-tunnel
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk native vlan 1000
SwitchB(config-port)#switchport qinq dot1q-tunnel
SwitchB(config-port)#exit
Configure Switch A.
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 1000 confirm
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 1000 confirm
74
www.raisecom.com User Manual
As the Figure 3-16 shows below, carrier network contains common PC Internet service and IP phone
service, PC Internet service is assigned to VLAN 1000, IP phone service is assigned to VLAN 2000.
Configure Switch A a nd Switch B l ike t his: a dd outer T ag V LAN 10 00 f or PC Internet s ervice
VLAN 100-VLAN 150, a dd out er Tag 2000 f or V LAN 300 -Vlan 400 f or IP phone s ervice, make
client and server communicate in order through carrier network. The carrier TPID is 9100.
IP Phone sever
VLAN 300-400
Port 3
Port 1
VLAN 1000
VLAN 2000
Switch B Port 2
Port 1
Switch A PC Internet
server
Port 2 Port 3 VLAN 100-150
Switch C Switch D
IP IP
75
www.raisecom.com User Manual
Step 1 Create VLAN 100, VLAN 200, and VLAN 1000 and activate them, TPID is 9100.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#mls double-tagging tpid 9100
SwitchA(config)#create vlan 100-150, 300-400, 1000, 2000 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#mls double-tagging tpid 9100
SwitchB(config)#create vlan 100-150, 300-400, 1000, 2000 active
Configure Switch A.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport vlan-mapping cvlan 100-150 add-outer 1000
SwitchA(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport vlan-mapping cvlan 300-400 add-outer 2000
SwitchA(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport vlan-mapping cvlan 100-150 add-outer 1000
SwitchB(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport vlan-mapping cvlan 300-400 add-outer 2000
SwitchB(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchB(config-port)#exit
Configure Switch A.
76
www.raisecom.com User Manual
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 1000,2000 confirm
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 1000,2000 confirm
As the Figure 3-17 shows below, Port 2 and Port 3 of Switch A respectively connect to department E
by VLAN 100 and to department F by VLAN 200, Port 2 and Port 3 of Switch B respectively
connect to department C by VLAN 100 and to department D by VLAN 200. Assigning VLAN 1000
for department E and C transmission in carrier network, assign VLAN 2008 for department F and D
transmission.
Configure 1:1 VLAN mapping for Switch A and Switch B to realize normal communication between
PC user and terminal user with servers.
77
www.raisecom.com User Manual
78
www.raisecom.com User Manual
Step 4 Configure interface Port 3 in t runk mode, pe rmit VLAN 200 pa ssing a nd e nable VLAN
mapping.
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 200 confirm
SwitchA(config-port)#switchport vlan-mapping ingress 200 translate 2008
SwitchA(config-port)#switchport vlan-mapping egress 2008 translate 200
Check 1:1 V LAN m apping c onfiguration by t he c ommand of show interface port port-id
vlan-mapping {ingress | egress} translate.
SwitchA(config)#show interface port 2 vlan-mapping ingress translate
Direction: Ingress
Original Original Outer-tag New Inner-tag New
Interface Inner VLANs Outer VLANs Mode Outer-VID Mode Inner-VID Hw-ID
----------------------------------------------------------------------------------
P2 100 Translate 1000 -- --
1
As the Figure 3-18 shows below, the three devices Switch A, Switch B and Switch C make up a ring,
user has to solve loop in ring network link. Enable STP on the three devices, set Switch A priority as
0, change overhead from Switch B to Switch A to 10.
Configure Switch A.
79
www.raisecom.com User Manual
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#spanning-tree enable
SwitchA(config)#spanning-tree mode stp
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#spanning-tree enable
SwitchB(config)#spanning-tree mode stp
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#spanning-tree enable
SwitchC(config)#spanning-tree mode stp
Step 2 Configure interface mode for the three devices.
Configure Switch A.
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
Configure Switch C.
SwitchC(config)#interface port 1
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
SwitchC(config)#interface port 2
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
Step 3 Configure priority and interface path overhead for spanning tree.
Configure Switch A.
SwitchA(config)#spanning-tree priority 0
SwitchA(config)#interface port 2
SwitchA(config-port)#spanning-tree inter-path-cost 10
Configure Switch B.
80
www.raisecom.com User Manual
SwitchB(config)#interface port 1
SwitchB(config-port)#spanning-tree inter-path-cost 10
81
www.raisecom.com User Manual
Port ID:2
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
Partner MSTP Mode: stp
Bpdus send: 279 (TCN<0> Config<279> RST<0> MST<0>)
Bpdus received:6 (TCN<6> Config<0> RST<0> MST<0>)
State:forwarding Role:designated Priority:128 Cost: 200000
Root: Mac 000E.5E7B.C557 Priority 0 RootCost 0
DesignatedBridge: Mac 000E.5E7B.C557 Priority 0 DesignatedPort 32778
Switch B:
Raisecom#show spanning-tree port 1, 2
Port ID:1
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:10
Partner MSTP Mode: stp
Bpdus send: 279 (TCN<0> Config<279> RST<0> MST<0>)
Bpdus received:13 (TCN<13> Config<0> RST<0> MST<0>)
State:forwarding Role:designated Priority:128 Cost: 200000
Root: Mac 000E.5E7B.C557 Priority 0 RootCost 0
DesignatedBridge: Mac 000E.5E7B.C557 Priority 0 DesignatedPort 32777
Port ID:2
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
Partner MSTP Mode: stp
Bpdus send: 279 (TCN<0> Config<279> RST<0> MST<0>)
Bpdus received:6 (TCN<6> Config<0> RST<0> MST<0>)
State:forwarding Role:designated Priority:128 Cost: 200000
Root: Mac 000E.5E7B.C557 Priority 0 RootCost 0
DesignatedBridge: Mac 000E.5E7B.C557 Priority 0 DesignatedPort 32778
Switch C:
Raisecom#show spanning-tree port 1, 2
82
www.raisecom.com User Manual
Port ID:1
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
Partner MSTP Mode: stp
Bpdus send: 22 (TCN<12> Config<10> RST<0> MST<0>)
Bpdus received:390 (TCN<0> Config<390> RST<0> MST<0>)
State:blocking Role:non-designated Priority:128 Cost: 200000
Root: Mac 000E.5E7B.C557 Priority 0 RootCost 200000
DesignatedBridge: Mac 000E.5E83.ABD1 Priority 32768 DesignatedPort 32777
Port ID:2
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
Partner MSTP Mode: stp
Bpdus send: 38 (TCN<6> Config<32> RST<0> MST<0>)
Bpdus received:368 (TCN<0> Config<368> RST<0> MST<0>)
State:forwarding Role:root Priority:128 Cost: 200000
Root: Mac 000E.5E7B.C557 Priority 0 RootCost 200000
DesignatedBridge: Mac 000E.5E7B.C557 Priority 0 DesignatedPort 32778
As the Figure 3-19 shows below, three ISCOM2924GF devices make up a ring network, run MSTP
protocol, domain name is aaa. Switch B and Switch C respectively connect to two PC, which belong
to VLAN 3 a nd VLAN 4 r espectively. Instance 3 associates with VLAN3 and instance 4 associates
with VLAN4. Configure Switch B instance 3 path cost, make message of the two VLAN forward at
the two paths, and then remove the loop and realize load sharing.
83
www.raisecom.com User Manual
Step 1 Create VLAN 3 and VLAN 4 on the three switches respectively and activate them.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 3-4 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 3-4 active
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#create vlan 3-4 active
Step 2 Set Switch A interface Port 1, Port 2 in trunk mode and permit all VLAN passing, Switch
B interface Port 1, Port 2 in trunk mode and permit all VLAN passing, Switch C interface Port 1,
Port 2 in trunk mode and permit all VLAN passing. Interface Port 3 and Port4 of Switch B and
Switch C are in Access mode and permit VLAN3 and VLAN4 passing respectively.
Configure Switch A.
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
84
www.raisecom.com User Manual
Step 3 Set MSTP mode for Switch A , Switch B, Switch C, enable spanning tree protocol. Enter
MSTP configuration m ode a nd s et dom ain na me as aaa, revision version is 0, instance 3
mapping to VLAN 3, instance 4 mapping to VLAN 4, exit mst configuration mode.
Configure Switch A.
SwitchA(config)#spanning-tree mode mstp
SwitchA(config)#spanning-tree enable
SwitchA(config)#spanning-tree region-configuration
SwitchA(config-region)#name aaa
SwitchA(config-region)#revision-level 0
SwitchA(config-region)#instance 3 vlan 3
SwitchA(config-region)#instance 4 vlan 4
Configure Switch B.
SwitchB(config)#spanning-tree mode mstp
85
www.raisecom.com User Manual
SwitchB(config)#spanning-tree enable
SwitchB(config)#spanning-tree region-configuration
SwitchB(config-region)#name aaa
SwitchB(config-region)#revision-level 0
SwitchB(config-region)#instance 3 vlan 3
SwitchB(config-region)#instance 4 vlan 4
SwitchB(config-region)#exit
Configure Switch C.
SwitchC(config)#spanning-tree mode mstp
SwitchC(config)#spanning-tree enable
SwitchC(config)#spanning-tree region-configuration
SwitchC(config-region)#name aaa
SwitchC(config-region)#revision-level 0
SwitchC(config-region)#instance 3 vlan 3
SwitchC(config-region)#instance 4 vlan 4
Step 4 The inner path cost of spanning tree instance 3 interface Port 1 modified from Switch B is
500000.
SwitchB(config)#interface port 1
SwitchB(config-port)#spanning-tree instance 3 inter-path-cost 500000
Check whether the basic information of spanning tree instance 3 is correct by the command of show
spanning-tree instance 3.
Switch A:
SwitchA#show spanning-tree region-operation
MSTP Admin State: Enable
86
www.raisecom.com User Manual
Switch B:
SwitchB#show spanning-tree instance 3
MSTP Admin State: Enable
Protocol Mode: MSTP
MST ID: 3
-----------------------------------------------------------
BridgeId: Mac 0000.0000.0002 Priority 32768
RegionalRoot: Mac 0000.0000.0001 Priority 32768 InternalRootCost 400000
PortId PortState PortRole PathCost PortPriority LinkType TrunkPort
-------------------------------------------------------------------------
1 discarding alternate 500000 128 point-to-point no
3 forwarding root 200000 128 point-to-point no
7 forwarding designated 200000 128 point-to-point no
Switch C:
Switch C#show spanning-tree instance 3
MSTP Admin State: Enable
Protocol Mode: MSTP
MST ID: 3
-----------------------------------------------------------
BridgeId: Mac 0000.0000.0003 Priority 32768
RegionalRoot: Mac 0000.0000.0001 Priority 32768 InternalRootCost 200000
PortId PortState PortRole PathCost PortPriority LinkType TrunkPort
-------------------------------------------------------------------------
2 forwarding root 200000 128 point-to-point no
3 forwarding designated 200000 128 point-to-point no
7 forwarding designated 200000 128 point-to-point no
Check whether the basic information of spanning tree instance 4 is correct by the command of show
spanning-tree instance 4.
Switch A:
SwitchA#show spanning-tree instance 4
Spanning-tree admin state: enable
87
www.raisecom.com User Manual
Switch B:
SwitchB#show spanning-tree instance 4
MSTP Admin State: Enable
Protocol Mode: MSTP
MST ID: 4
-----------------------------------------------------------
BridgeId: Mac 0000.0000.0002 Priority 32768
RegionalRoot: Mac 0000.0000.0001 Priority 32768 InternalRootCost 200000
PortId PortState PortRole PathCost PortPriority LinkType TrunkPort
-------------------------------------------------------------------------
1 forwarding root 200000 128 point-to-point no
3 forwarding designated 200000 128 point-to-point no
8 discarding disabled 200000 128 point-to-point no
Switch C:
SwitchC#show spanning-tree instance 4
MSTP Admin State: Enable
Protocol Mode: MSTP
MST ID: 4
-----------------------------------------------------------
BridgeId: Mac 0000.0000.0003 Priority 32768
RegionalRoot: Mac 0000.0000.0001 Priority 32768 InternalRootCost 200000
PortId PortState PortRole PathCost PortPriority LinkType TrunkPort
-------------------------------------------------------------------------
2 forwarding root 200000 128 point-to-point no
3 discarding alternate 200000 128 point-to-point no
8 discarding disabled 200000 128 point-to-point no
As the Figure 3-20 s hows be low, S witch A Port 1 c onnects t o c ore ne twork, Port 2 a nd Port 3 of
Switch A connect to user network. There is loop in user network. Enable loopback detection function
88
www.raisecom.com User Manual
Create VLAN 3 and add interface Port 1 and Port 2 into VLAN 3.
Raisecom#config
Raisecom(config)#create vlan 3 active
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport access vlan 3
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#switchport access vlan 3
Raisecom(config-port)#exit
Enable loopback detection for assigned interface.
Raisecom(config)#loopback-detection enable port-list 2-3
Raisecom(config)#loopback-detection hello-time 3
As the Figure 3-21 shows below, network administrator hope to monitor the message of user network
1 onl y through da ta m onitoring de vice s o a s t o obt ain t he da ta t raffic f or f ailure a nd a bnormal t o
analyze, find root cause and solve it timely.
Switch prohibits all the spontaneous packet function and storm suppression function. User network 1
connects switch via Port 1; user network 2 connects switch via Port 2; the data monitoring device is
connected to Port 3 on switch.
Show whether the interface mirror configuration is correct by the command of show mirror.
Raisecom#show mirror
Mirror: Enable
Monitor port: port3
-----------the ingress mirror rule-----------
Mirrored ports: port-list 1
-----------the egress mirror rule-----------
90
www.raisecom.com User Manual
Mirrored ports: --
As the Figure 3-22 shows below, Switch A a nd Switch B connect to two user networks VLAN 100
and VLAN 2 00 respectively. User needs to configure layer-2 pr otocol t ransparent t ransmission
function on Switch A and Switch B in order to make the same user network in different regions run
STP entirely.
Configure Switch A.
Raisecom#hostname SwitchASwitchA#config
SwitchA(config)#create vlan 100,200 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 100,200 active
Step 2 Configure interface port 2 in Access mode, Access VLAN is 100, enable STP transparent
transmission, and set STP message transparent transmission threshold as 1500.
Configure Switch A.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 100
SwitchA(config-port)#relay stp
SwitchA(config-port)#relay port 1
SwitchA(config-port)#relay drop-threshold stp 1500
SwitchA(config-port)#exit
91
www.raisecom.com User Manual
Configure Switch B.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 100
SwitchB(config-port)#relay stp
SwitchB(config-port)#relay port 1
SwitchB(config-port)#relay drop-threshold stp 1500
SwitchB(config-port)#exit
Step 3 Set i nterface por t 2 in Access m ode, Access VLAN is 200, enable STP transparent
transmission, and set STP message transparent transmission threshold as 1000.
Configure Switch A.
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 200
SwitchA(config-port)#relay stp
SwitchA(config-port)#relay port 1
SwitchA(config-port)#relay drop-threshold stp 1000
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 200
SwitchB(config-port)#relay stp
SwitchB(config-port)#relay port 1
SwitchB(config-port)#relay drop-threshold stp 1000
SwitchB(config-port)#exit
Configure Switch A.
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
Check whether the l ayer-2 pr otocol t ransparent t ransmission c onfiguration i s c orrect by the
command of show relay:
92
www.raisecom.com User Manual
93
www.raisecom.com User Manual
Chapter 4 Routing
This chapter introduces basic principle and configuration of routing features, and provides the related
configuration examples.
Overview
Configuring ARP
Configuring layer-3 interface
Configuring static routing
Maintenance
Configuration examples
4.1 Overview
4.1.1 ARP
In TCP/IP network e nvironment, e ach h ost w as assigned with a 32 -bit I P a ddress that is a lo gical
address us ed t o i dentify ho st be tween ne tworks. To t ransmit message i n ph ysical l ink, us er m ust
know the physical address of destination host, which requires mapping IP address to physical address.
In Ethernet environment, physical address is 48-bit MAC address. Users have to transfer the 32-bit
destination hos t I P a ddress to 48 -bit E thernet a ddress for t ransmitting message t o destination hos t
correctly. Then ARP (Address Resolution Protocol) is applied to analyze IP address to MAC address
and set mapping relationship between IP address and MAC address.
ARP address mapping table includes the following two types:
Static table entry: bi nd I P a ddress and MAC address to avoid A RP dy namic learning
cheating.
Static ARP address table entry needs to be added / deleted manually.
No aging to static ARP address.
Dynamic table entry: MAC address automatically learned through ARP.
This dynamic ta ble e ntry is a utomatically generated by switch. User can adjust pa rtial
parameters of it manually.
The dynamic ARP address table entry will age at the aging time if no use.
The d evice i s i n s upport of two ki nds of dynamic l earning modes f or ARP a ddress mapping t able
entry: learn-all and learn-reply-only.
ARP request packets and answer packets both learning when in learn-all mode. When device
A s ends ARP r equest f or g rouping, it writes the mapping relationship of IP address and
physical address into ARP request packets. After receiving ARP request packets from device
A, Device B w ill le arn the address mapping relationship to its own a ddress mapping table.
Then the device B can send packets to device A later without ARP request.
Only learn A RP a nswering packets w hen d evice is in learn-reply-only mode. Just answer
ARP pa ckets f or t he A RP r equest f rom ot her de vices without ARP a ddress m apping t able
learning. This m ode i ncreases network l oad but a voids some ne twork a ttack ove r ARP
request packet.
94
www.raisecom.com User Manual
4.1.3 Routing
Routing function is required for communication among different devices in one VLAN, or different
VLAN. Routing is to transmit packets through network to destination, which adopts routing table for
packets forwarding.
Default Routing is a special routing that only be used when there is no matched item searched from
routing t able. Default r outing a ppears a s a r oute t o n etwork 0.0.0. 0 ( with mask 0.0.0.0) i n r outing
table. User can show default routing configuration by the command of show ip route. If destination
address of pa cket c annot m atch w ith a ny i tem i n t he r outing t able, t he pa cket w ill c hoose d efault
routing. If t he de vice ha snt configured de fault r outing a nd the destination I P of pa cket i s not i n
routing t able, t he de vice w ill di scard t he p acket a nd r eturn an IC MP p acket t o transmitting end to
inform that the destination address or network is unavailable.
Static routing is routing configured manually. It is available to simple, small and stable network. The
disadvantage is it cannot a dapt t o n etwork t opology c hanges a utomatically and ne eds m anual
intervention.
95
www.raisecom.com User Manual
The mapping relation of IP address and MAC address is stored in ARP address mapping table.
Generally, A RP a ddress m apping table i s d ynamic maintained by de vice. The de vice searches the
mapping r elation between IP ad dress and M AC addres s automatically a ccording t o A RP pr otocol.
Users jus t ne ed to configure the de vice manually for pr eventing A RP dynamic l earning f rom
cheating and adding static ARP address mapping table entry.
4.2.1.2 Preconditions
N/A
96
www.raisecom.com User Manual
User can connect a l ayer-3 interface f or V LAN w hen configuring IP a ddress for i t. Each layer-3
interface will correspond to an IP address and connect a VLAN.
4.3.1.2 Preconditions
Configure VLAN associated with interface and activate it before configuring layer-3 interface.
97
www.raisecom.com User Manual
4.4.1.2 Preconditions
98
www.raisecom.com User Manual
4.5 Maintenance
Use the following command to maintain IP feature:
Command Description
Raisecom(config)#clear arp Clear all table entries in ARP address mapping table.
As t he Figure 4-1 shows below, ISCOM2924GF connects to host, connects to upstream R outer by
interface Port 1. IP address of Router is 192.168.1.10/24, MAC address is 0050-8d4b-fd1e.
User ne eds t o configure dynamic A RP ta ble entry aging t ime a s 600 s econds. To i mprove
communication security between ISCOM2924GF and Router, user needs to configure related static
ARP table entry on ISCOM2924GF device.
99
www.raisecom.com User Manual
Configure device dynamic ARP table entry aging time as 600 seconds:
Raisecom#config
Raisecom(config)#arp aging-time 600
Increase a piece of ARP static table entry:
Raisecom(config)#arp 192.168.1.10 0050.8d4b.fd1e
Check whether al l the table e ntry information i n A RP a ddress m apping t able i s correct by t he
command of show arp:
Raisecom#show arp
ARP table aging-time: 600 seconds(default: 1200s)
Ip Address Mac Address Type Interface ip
-------------------------------------------------------
192.168.1.10 0050.8d4b.fd1e static --
192.168.100.1 000F.E212.5CA0 dynamic 1
Total: 2
Static: 1
Dynamic: 1
100
www.raisecom.com User Manual
As the Figure 4-2 shows below, configure layer-3 interface to the switch device so that the host and
device can Ping each other.
Check whether the binding relation of VLAN and physical interface is correct b y the command of
show vlan:
Raisecom(config-port)#show vlan 10
Switch Mode: --
VLAN Name State Status Priority Member-Ports
-------------------------------------------------------------------------
1 Default active static -- 1-6
10 VLAN0010 active static -- 2
Check whether the layer-3 interface configuration is correct by the command of show interface ip.
Raisecom(config-ip)#show interface ip
IF Address NetMask Source Catagory
----------------------------------------------------------
10 192.168.1.2 255.255.255.0 assigned primary
101
www.raisecom.com User Manual
Check whether the device and PC can ping each other by the command of ping:
Raisecom#ping 192.168.1.3
Type CTRL+C to abort
Sending 5, 8-byte ICMP Echos to 192.168.18.119, timeout is 3 seconds:
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Configure static r outing to make any two hosts or ISCOM2924GF devices in Figure 4-3 can Ping
each other successfully.
102
www.raisecom.com User Manual
103
www.raisecom.com User Manual
Check whether all the devices can ping successfully with one another by the command of ping:
SwitchA#ping 10.1.1.3
Type CTRL+C to abort
Sending 5, 8-byte ICMP Echos to 192.168.18.119, timeout is 3 seconds:
Reply from 192.168.18.119: time<1ms
Reply from 192.168.18.119: time<1ms
Reply from 192.168.18.119: time<1ms
Reply from 192.168.18.119: time<1ms
Reply from 192.168.18.119: time<1ms
104
www.raisecom.com User Manual
Chapter 5 DHCP
This c hapter i ntroduces b asic pr inciple a nd c onfiguration of D HCP and pr ovides r elated
configuration applications.
Overview
Configure DHCP Client
Configure DHCP Snooping
Configure DHCP Option
Configuring Applications
5.1 Overview
5.1.1 DHCP overview
DHCP (Dynamic Host Configuration Protocol) refers to assign IP address configuration information
dynamically for user in TCP/IP network. It is based on BOOTP (Bootstrap Protocol) protocol, and
adds automatically specified available network address, network address re-use, and other extended
configuration options over BOOTP protocol.
DHCP adopts client/server communication mode. Client applies configuration to server (including IP
address, Subnet mask, default gateway etc.) and server replies IP address for client and other related
configuration information to realize dynamic configuration of IP address, etc.
It us ually includes a s et of DHCP s erver and s everal c lients in typical a pplication of DHCP (for
example PC or Notebook), as the Figure 5-1 shows below.
Under n ormal ci rcumstances, use DHCP se rver to f inish IP a ddress distribution in following
105
www.raisecom.com User Manual
situations:
Network is large. It requires a lot of work for manual configuration, and is difficult to manage
the entire network intensively.
The number of hosts in ne twork is greater than the number of IP a ddresses, which make it
unable t o a ssign a fixed IP a ddress, and restrict t he nu mber of us ers c onnected t o network
simultaneously (Such as Internet access s ervice pr oviders). A large num ber of users must
obtain their own IP address dynamically through DHCP service.
Only the minority of hosts in ne twork need fixed I P addresses, most of hosts have no
requirement for fixed IP address.
DHCP technology ensures the rational allocation, avoid the waste and improve the utilization rate of
IP addresses in the entire network.
OP 1 Packet type.
Value at 1: it is request packet;
Value at 2: it is reply packet.
106
www.raisecom.com User Manual
Relay agent IP 4 The first DHCP hop IP address after DHCP client sends
address request packet.
File 128 DHCP client start up configuration file name and path
assigned by DHCP server.
Options Description
6 DNS server option, to assign DNS server address distributed by DHCP client.
18 DHCP client flag option over IPv6, to assign interface information for DHCP client.
107
www.raisecom.com User Manual
Options Description
55 Request parameter lis t option. Client uses this optical to indicate ne twork
configuration pa rameters ne ed t o obt ain f rom s erver. The c ontent of t his opt ion i s
values corresponding to client requested parameters.
61 DHCP client flag option over IPv6, to assign device information for DHCP client.
66 TFTP server na me, t o a ssign dom ain na me f or T FTP s erver di stributed b y D HCP
client.
67 Start up file name, to assign start up file name distributed by DHCP client.
82 DHCP client flag option over IPv4, user-defined, mainly used to mark position o f
DHCP client.
150 TFTP server address, to assign TFTP server address distributed by DHCP client.
184 DHCP reserved opt ion, a t present Option184 is m ainly used t o carry i nformation
required by voice calling. Through Option184 it can distribute IP address for DHCP
client with voice function and meanwhile provide voice calling related information.
255 Complete option
Fields 18, 37, 61 a nd 82 i n DHCP Option are r elay age nt information options i n DHCP packets.
When r equest pa ckets f rom DHCP client a rrive D HCP s erver, if ne ed DHCP relay or DHCP
Snooping, DHCP relay or DHCP Snooping increase Option field into request packets.
Fields Option18, 37, 61 and 82 implement r ecord DHCP client i nformation on DHCP server. By
cooperating with other software, it can realize IP address distribution restriction and accounting, etc.
functions. Such as cooperate with IP Source Guard to defend deceive of IP address+MAC address.
Field Option82 can i nclude a t m ost 255 s ub-options. If de fined f ield Option82, at l east one
sub-option m ust be de fined. The d evice supports two s ub-option t ypes c urrently: Sub-Option 1
(Circuit ID) and Sub-Option 2 (Remote ID).
Sub-Option 1 contains interface ID of DHCP client request packet, interface VLAN and the
additional information.
Sub-Option 2 is interface MAC address (DHCP relay) or device bridge MAC address (DHCP
Snooping device) for receiving DHCP client request packets.
108
www.raisecom.com User Manual
Record corresponding relationship between DHCP client IP address and MAC address.
DHCP S nooping records e ntries t hrough m onitor r equest a nd r eply pa ckets r eceived b y t rust
interface, including client MAC address, obtained IP address, DHCP client connected interface and
VLAN of the interface, etc. Then implement following by the record information:
109
www.raisecom.com User Manual
ARP Detection: judge legality of user that sends ARP packet and avoid ARP attack from
illegal user.
IP Source G uard: filter i nterface f orwarded packets b y d ynamically ge tting DHCP
Snooping entry to avoid illegal packets pass the interface.
VLAN mapping: packets s ent to user modify mapped V LAN to original VLAN b y
searching m apped V LAN r elated D HCP c lient I P a ddress, M AC a ddress a nd or iginal
VLAN information in DHCP Snooping entry.
Option f ield in DHCP packet r ecords pos ition information of D HCP client. Administrator c an us e
this option to locate DHCP client and control client security and accounting.
As DHCP client, ISCOM2924GF device will get IP address from assigned DHCP server to manage
the device in future.
The IP a ddress a ssigned by D HCP c lient is li mited with a cer tain lease pe riod w hen a dopting
dynamic address distribution mode. DHCP server will t ake back the IP address when it is expired.
DHCP client has to relet IP address foe continuous using. DHCP client can release IP address if it
doesnt want to use it any more before its expiration.
We suggest that the number of DHCP relays is less than 4 if DHCP client needs to obtain IP address
from DHCP server from multiple DHCP relays.
5.2.1.2 Preconditions
110
www.raisecom.com User Manual
hostname raisecom
class-id raisecom-ROS
When applying for IP address, DHCP client needs to create VLAN firstly, and add the interface with
the IP address to VLAN, and at the same time, configure DHCP server, or the interface will fail to
obtain IP address via D HCP.
For interface IP 0, the IP addresses obtained through DHCP and configured manually can overwrite
each other.
Note:
If the switch starts DHCP Server or DHCP Relay, the DHCP client will not be enabled. If the
switch starts DHCP client, DHCP Server or DHCP Relay will not be enabled.
By default, the device enables DHCP client function. The command of no ip address dhcp
can disable it.
If t he device obtained IP address fr om a DHCP s erver t hrough D HCP previously, it w ill
restart the application pr ocess for I P a ddress i f user modified DHCP se rver address by t he
command of ip address dhcp.
Please configure DHCP client on the device as below.
111
www.raisecom.com User Manual
DHCP Snooping is a security feature of DHCP, being used to guarantee DHCP client gets IP address
from legal DHCP server and record corresponding relationship between DHCP client IP and MAC
address.
Option field of DHCP packet records location of DHCP client. Administrator can locate DHCP client
through Option field and control client security and accounting. ISCOM2924GF device configured
with D HCP S nooping a nd Option c an pe rform related process a ccording to Option field e xistence
status in packet.
5.3.1.2 Preconditions
N/A
If e nabling DHCP S nooping without c onfiguring DHCP S nooping supporting Option f unction, t he
device will do nothing to Option fields in the packets. For packets without Option fields, the device
still doesnt do insertion operation.
By default, the DHCP Snooping function of all interfaces is enabled, but only to enable the global
DHCP Snooping function, the interface DHCP Snooping function can take effect.
112
www.raisecom.com User Manual
113
www.raisecom.com User Manual
Fields 18, 61, 82 of DHCP Option are r elay pr oxy i nformation opt ions i n D HCP pa cket. When
DHCP Client sends request packet to DHCP Server, DHCP Snooping or DHCP relay will add Option
field into request packet if it requires for DHCP Snooping or DHCP relay.
DHCP Option18 field is used t o r ecord DHCP c lient i nformation ov er IPv6, DHCP Option61, 82
fields a re us ed t o r ecord DHCP c lient ov er I Pv4. DHCP server c ooperates w ith other sof tware t o
implement IP address distribution restriction and accounting, etc. functions over these information.
5.4.1.2 Preconditions
N/A
114
www.raisecom.com User Manual
115
www.raisecom.com User Manual
As the Figure 5-5 s hows be low, Switch is us ed as D HCP cl ient, host na me i s r aisecom, access t o
DHCP server and NMS platform through SNMP interface. DHCP server should assign IP address to
SNMP interface of Switch and make NMS platform to manage Switch.
116
www.raisecom.com User Manual
Check whether DHCP client configuration is correct by the command of show ip dhcp client.
Raisecom#show ip dhcp client
Hostname: raisecom
Class-ID: Raisecom-ROS
Client-ID: Raisecom-000e5e000000-IF0
DHCP Client is requesting for a lease.
Assigned IP Addr: 0.0.0.0
Subnet mask: 0.0.0.0
Default Gateway: --
Client lease Starts: Jan-01-1970 08:00:00
Client lease Ends: Jan-01-1970 08:00:00
Client lease duration: 0(sec)
DHCP Server: 0.0.0.0
Tftp server name: --
Tftp server IP Addr: --
Startup_config filename: --
NTP server IP Addr: --
Root path: --
117
www.raisecom.com User Manual
As the Figure 5-6 s hows be low, S witch i s us ed a s DHCP Snooping device. The n etwork r equires
DHCP c lient ge ts I P a ddress f rom l egal D HCP s erver a nd s upports O ption82 to facilitate c lient
management; user can configure circuit ID sub-option information on interface Port 3 as raisecom,
remote ID sub-option as user01.
Check whether DHCP client configuration is correct by the command of show ip dhcp information
option.
Raisecom#show ip dhcp information option
DHCP Option Config Information
118
www.raisecom.com User Manual
Circuit-ID : default
Remote-ID Mode: string
Remote-ID String: user01
P3 Circuit ID: raisecom
ipv4Global
ipv4Port
P1:
P2:
P3:
P27:
P28:ipv6Global
ipv6Port
P1:
P2:
P3:
P27:
P28
119
www.raisecom.com User Manual
Chapter 6 QoS
This chapter introduces basic principle and configuration of QoS and provides related configuration
applications.
Overview
Priority trust
Traffic classification and traffic policy
Priority mapping and queue schedule
Traffic rate limit over interface and VLAN
Maintenance
Configuring applications
6.1 Overview
User br ings f orce di fferent service qua lity de mands f or ne twork a pplication, t hen network s hould
distribute a nd schedule resource for different ne twork application a ccording to user de mands. QoS
(Quality of Service) can ensure s ervice i n real-time and i ntegrity w hen network overload or
congested and guarantee the whole network runs high-efficiently.
Best-effort Service
Integrated Services (IntServ)
Differentiated Services (DiffServ)
6.1.1.1 Best-effort
Best-effort service is the most basic and simplest service model over store and forward mechanism
Internet (IPv4 standard). In Best-effort service model, the application program can send any number
of pa ckets at any time without permitting in advance and notifying the ne twork. F or B est-effort
service, the network will send packets as possible as it can, but cannot guarantee the delay time and
reliability.
Best-effort is the default Internet service model now, applying to most network applications, such as
120
www.raisecom.com User Manual
FTP, E -mail, etc. which is achieved by first in first out (FIFO) queue.
6.1.1.2 IntServ
IntServ model is a comprehensive service model, which can meet a variety of QoS requirements and
needs t o s end specific s ervice r equest to ne twork b efore s ending m essages. This r equest is
accomplished through signaling. Firstly, the application program need to apply for service quality it
required f rom ne twork by s ignaling, s uch a s bandwidth, de lay time, pr iority, e tc. The a pplication
program w ill s end messages onc e r eceiving t he c onfirmation f rom ne twork, w hich m eans t he
network has already pr eset i ts corresponding s ervice qua lity r esource. At t he same t ime, the
messages se nt b y program s hould be c ontrolled w ithin t he range described i n t he application
parameters.
After r eceiving service qua lity application messages f rom a pplication pr ogram, t he ne twork w ill
check r esource di stribution, i .e. w hether t he current network resource can m eet appl ication from
application pr ogram, once m eeting the a pplication, network will return a ne twork r esource
confirmation and allocate corresponding network resource for application program. In the process of
sending messages, as l ong a s t he a pplication pa cket traffics a re controlled within the range of
application parameters, the network will undertake to meet QoS requirements. In order to fulfill the
commitment f or t ransmitting traffics, the ne twork will maintain a s tate for t hem, classifying
messages, monitoring traffics and taking queue scheduling over the state.
In the IntServ service model, the signaling transmitting QoS request is RSVP (Resource Reservation
Protocol), w hich i s r esponsible f or not ifying t he Q oS r equirements of application program to
network. RSVP applies for network resource before the application program sending messages, so it
is out of band signaling.
The b iggest adv antage of IntServ model is to pr ovide end-to-end QoS service, while the bi ggest
disadvantage is its poor scalability. Network node must maintain all reserved resource information.
These m aintenance ope rations w ill consum e more pr ocessing time and memory requirements of
121
www.raisecom.com User Manual
network nodes. A fter expanding network scale, there will be a substantial increasing in the
maintenance cost, which will have a serious impact to the packet wire-speed processing performance
of the network nodes, especially the core nodes.
6.1.1.3 DiffServ
DiffServ model is a multi-service model, which can satisfy different QoS requirements. The largest
difference from Intserv model is tha t it does not require R SVP signaling. In other words, DiffServ
model doesnt need to notify the network to reserve resources before sending messages.
DiffServ model does not need t o maintain state for each f low. I t provides differentiated s ervices
according t o the QoS cl assification of each packet. Many different methods can be used for Q oS
packet cl assification, such as I P pa cket pr iority ( IP precedence), t he pa cket s ource addres s or
destination address and so on.
CAR (Committed Access Rate): CAR refers to classify the messages according to the pre-set
messages m atching rules, s uch a s IP m essages pr iority ( IP pr ecedence), t he pa cket s ource
address or destination address, etc. Continue to send the messages if the flow is in line with
the rules of token bucket. If it is beyond the specified flow, discard the messages or remark IP
precedence, DSCP, EXP, etc. CAR not only can control the traffics, but also mark and remark
the messages.
Queue t echnology: the queuing t echnologies of SP, WRR, DRR, SP + WRR, SP + DRR
cache and schedule the congestion messages to achieve congestion management.
122
www.raisecom.com User Manual
Structure of IP packet head shows as Figure 6-3 below, the head contains 8bit ToS field. RFC1349
defines the f irst 3 bits of ToS f ield, indicating ToS pr iority with value r ange of 0~7; R FC2474
defines ToS again, the first 6 bits (0~5) indicates priority of IP packet, named DSCP priority, value
range i s 0 ~63, t he l ast 2 bi ts ( bit-6 a nd bi t-7) a re re served. The st ructure of t wo priority t ypes is
shown as the following Figure 6-4:
VLAN pa cket ov er IEEE 802.1 Q standard m akes m odification on E thernet pa cket, i ncrease 4
bytes802.1Q t ag between s ource a ddress f ield a nd pr otocol t ype f ield, a s Figure 6-5 shows be low.
The tag includes field of 2 bytes TPID (Tag Protocol Identifier, value at 0x8100) and field of 2 bytes
TCI (Tag Control Information).
123
www.raisecom.com User Manual
CoS priority locates at the first 3 bits of TCI field, value range is 0~7, as Figure 6-6 shows below. It
is available to guarantee service quality in layer-2 network.
Rate limit is to control network traffic, by monitoring traffic rate enters network to discard overflow
part a nd c ontrol t he e ntering t raffic in a r easonable r ange, t hus t o pr otect ne twork r esource a nd
carrier interest.
ISCOM2924GF device is in support of rate limit at packet ingress direction over traffic policy.
6.1.4.2 Re-direction
Re-direction means to forward packets in the original corresponding relation between destination and
interface, it forwards packet to assigned interface to implement policy routing.
ISCOM2924GF device supports forwarding ingress packets to assigned interface.
6.1.4.3 Re-mark
Re-mark means to set some priority fields in packet again and then classify packets according to self
standard. Besides, downstream node i n ne twork c an pr ovide di verse Q oS s ervice a ccording t o
re-marked information.
Traffic statistics is used for data messages statistics of specified service traffic, which is the number
of messages and bytes passed through matching traffic classification or discarded.
Traffic statistics itself is not QoS control measure, but can be used in combination with other QoS
124
www.raisecom.com User Manual
ISCOM2924GF device supports DSCP priority over IP packets or CoS priority over VLAN packets
to perform priority mapping.
By default, the mapping relationship among ISCOM2924GF device internal priority, DSCP priority
and CoS priority is shown in the table 6-1 below:
Table 6-1 Mapping relationship of internal priority, DSCP priority, CoS priority
Internal 0 1 2 3 4 5 6 7
CoS 0 1 2 3 4 5 6 7
WRR: on basis of round schedule each queue according to queue priority, schedule packets in
various queues according to weight of each queue, as Figure 6-8 shows below.
126
www.raisecom.com User Manual
User c an c hoose pr iority for t rusted pa ckets f rom ups tream de vice, unt rusted pr iority pa ckets a re
processed by traffic classification and traffic policy. After configuring priority trust, device operates
packets according to their priorities and provides related service.
6.2.1.2 Preconditions
N/A
127
www.raisecom.com User Manual
Traffic cl assification is t he ba se of QoS, user can classify pa ckets f rom upst ream de vice i n
accordance with priorities or ACL rule.
Traffic classification c onfiguration w ont ta ke e ffect unt il us er bi nds i t to traffic policy. Applying
traffic policy is related to network current loading condition and period. Usually, packets traffic rate
is limited according to configured speed when it enters network, and re-mark priority according to
packet service feature.
6.3.1.2 Preconditions
N/A
Actions for the traffic over the rate limit and sudden value drop
128
www.raisecom.com User Manual
129
www.raisecom.com User Manual
130
www.raisecom.com User Manual
When network has congestion, user want to balance delay and delay jitter of various packets, packets
of key services (like video and voice) can be processed preferentially; packets of secondary services
(like E-Mail) w ith identical pr iority can be fairly pr ocessed, different priority can be pr ocessed
according t o i ts weight value. User c an configure queue schedule i n t his situation. Selection of
schedule algorithm is depended on service condition and customer requirements.
Priority mapping is precondition for queue schedule. User can map priority of packets from upstream
device t o di fferent local pr iority, a nd de vice pe rform q ueue s chedule f or t he pa ckets a ccording t o
local priority. Generally speaking, IP packets need to configure mapping relationship between DSCP
priority a nd l ocal pr iority; VLAN packets ne ed t o configure mapping r elationship be tween CoS
priority and local priority.
6.4.1.2 Preconditions
N/A
6.4.2 Configure mapping relationship between DSCP priority and local priority
Please configure mapping r elationship be tween DSCP priority a nd l ocal pr iority o n t he d evice a s
below.
6.4.3 Configure mapping relationship between CoS priority and local priority
Please configure mapping relationship be tween CoS pr iority a nd local pr iority on t he device a s
below.
131
www.raisecom.com User Manual
132
www.raisecom.com User Manual
When ne twork h as c ongestion, us er c an configure rate li mit o ver int erface or V LAN if w ant to
restrict burst traffic flow at an interface or a VLAN to make it transports in a well-proportioned rate,
so as to remove network congestion.
6.5.1.2 Preconditions
Related VLAN must be created before configuring rate limit over VLAN or QinQ.
133
www.raisecom.com User Manual
6.6 Maintenance
User can maintain QoS feature by the following commands.
Command Description
134
www.raisecom.com User Manual
As the Figure 6-10 s hows below, U ser A , User B , User C a re r espectively be longed t o V LAN1,
VLAN2, VLAN3, and connected to ISCOM2924GF through Switch A, Switch B, Switch C.
User A provides voice and video services, User B provides voice, video and data services, User C
provides video and data services.
According to service requirements from users, make rules as below:
For U ser A, m ust pr ovide 2 5M ba ndwidth, burst t raffic f low p ermit 100K B, di scarding r edundant
traffic;
For U ser B , m ust pr ovide 35M ba ndwidth, bur st t raffic f low pe rmit 100 KB, di scarding r edundant
traffic;
For U ser C , m ust pr ovide 30M ba ndwidth, bur st t raffic f low pe rmit 100 KB, di scarding r edundant
traffic.
Create and configure traffic classification, classify different users according to VLAN ID.
Raisecom#config
Raisecom(config)#mls qos enable
Raisecom(config)#class-map usera match-any
Raisecom(config-cmap)#match vlan 1
Raisecom(config-cmap)#quit
Raisecom(config)#class-map userb match-any
Raisecom(config-cmap)#match vlan 2
135
www.raisecom.com User Manual
Raisecom(config-cmap)#quit
Raisecom(config)#class-map userc match-any
Raisecom(config-cmap)#match vlan 3
Raisecom(config-cmap)#quit
Create traffic rate limit rule.
Raisecom(config)#mls qos single-policer usera 25000 100 exceed-action drop
Raisecom(config)#mls qos single-policer userb 35000 100 exceed-action drop
Raisecom(config)#mls qos single-policer userc 30000 100 exceed-action drop
Create and configure traffic policy.
Raisecom(config)#policy-map usera
Raisecom(config-pmap)#class-map usera
Raisecom(config-pmap-c)#police usera
Raisecom(config-pmap-c)#quit
Raisecom(config-pmap)#quit
Raisecom(config)#service-policy usera ingress 2
Raisecom(config)#policy-map userb
Raisecom(config-pmap)#class-map userb
Raisecom(config-pmap-c)#police userb
Raisecom(config-pmap-c)#quit
Raisecom(config-pmap)#quit
Raisecom(config)#service-policy userb ingress 3
Raisecom(config)#policy-map userc
Raisecom(config-pmap)#class-map userc
Raisecom(config-pmap-c)#police userc
Raisecom(config-pmap-c)#quit
Raisecom(config-pmap)#quit
Raisecom(config)#service-policy userc ingress 4
100
exceed-action drop
Used by policy map usera
single-policer userb 35000
100
exceed-action drop
Used by policy map userb
single-policer userc 30000
100
exceed-action drop
Used by policy map userc
Show traffic policy configuration by the command of show policy-map.
Raisecom(config)#show policy-map
Policy Map usera
Class usera
police usera
As Figure 6-11 shows below, User A provides voice and video services, User B provides voice, video
and data services, User C provides video and data services.
CoS priority of voice service is 5, CoS priority of video service is 4, CoS priority of data service is 2.
The internal priorities for these three kinds service are respectively 6, 5, and 2.
137
www.raisecom.com User Manual
Raisecom(config-port)#quit
Raisecom(config)#interface port 4
Raisecom(config-port)#mls qos trust cos
Raisecom(config-port)#quit
Configure mapping relationship between CoS priority and local priority.
Raisecom(config)#mls qos mapping cos 5 to localpriority 6
Raisecom(config)#mls qos mapping cos 4 to localpriority 5
Raisecom(config)#mls qos mapping cos 2 to localpriority 2
Configure queue schedule of SP+WRR.
Raisecom(config)#mls qos queue wrr 1 1 20 1 1 50 0 0
Show m apping r elationship c onfiguration of a ssigned priority b y t he c ommand of show mls qos
138
www.raisecom.com User Manual
mapping
Raisecom(config)#show mls qos mapping cos
CoS-LocalPriority Mapping:
CoS: 0 1 2 3 4 5 6 7
--------------------------------------------------
LocalPriority: 0 1 2 3 5 6 6 7
Show queue schedule configuration by the command of show mls qos queue.
Raisecom(config)#show mls qos queue
Queue Weight(WRR)
-------------------------
1 1
2 1
3 20
4 1
5 1
6 50
7 0
8 0
Queue Weight(DRR)
-------------------------
1 1
2 1
3 1
4 1
5 1
6 1
7 1
8 1
As the Figure 6-12 shows below, User A, User B, User C are respectively connected to Switch A,
Switch B, Switch C and ISCOM2924GF.
User A provides voice and video services, User B provides voice, video and data services, User C
provides video and data services.
For U ser A, m ust p rovide 2 5M ba ndwidth, burst t raffic f low pe rmit 100K B, di scarding r edundant
traffic;
139
www.raisecom.com User Manual
For U ser B , m ust pr ovide 35M ba ndwidth, bur st t raffic f low pe rmit 100 KB, di scarding r edundant
traffic;
For U ser C , m ust pr ovide 30M ba ndwidth, bur st t raffic f low pe rmit 100KB, di scarding r edundant
traffic.
Figure 6-12 Networking sketch map of traffic rate limit over interface
Show rate limit configuration over interface by the command of show rate-limit port-list.
Raisecom(config)#show rate-limit port-list 2-4
I-Rate: Ingress Rate
I-Burst: Ingress Burst
E-Rate: Egress Rate
E-Burst: Egress Burst
Port I-Rate(kbps) I-Burst(kB) E-Rate(kbps) E-Burst(kB)
----------------------------------------------------------------------
P2 25000 100 3448 34
P3 35000 100 3448 34
P4 30000 100 1048576 512
140
www.raisecom.com User Manual
Chapter 7 Multicast
Overview
Configure IGMP foundation
Configure IGMP Snooping
Configure IGMP MVR
Configure IGMP Proxy
Maintenance
Configuring applications
7.1 Overview
7.1.1 Multicast overview
With t he c ontinuous d evelopment of I nternet ne twork, the various interacting network data, v oice
and video will become more and more; the other hand, the emerging e-commerce, online meetings,
online a uctions, v ideo on d emand, di stance l earning a nd ot her s ervices also rise gradually. These
services come up w ith higher r equirements for ne twork ba ndwidth, i nformation security and pa id.
Traditional unicast and broadcast cannot meet these requirements well, while multicast has met them
timely.
Multicast is a poi nt to m ultipoint data transmission m ethod. The m ethod can effectively s olve t he
single point sending and multipoint receiving problems. During the network packet transmission, it
can save network resources and improve information security.
Multicast is a kind of packets transmission which is parallel with unicast and broadcast.
141
www.raisecom.com User Manual
transmission to combine User B and User C to a receiver set, then the information source just needs
to s end one piece of information. E ach switch in t he network will establish their m ulticast
forwarding t able a ccording t o IGMP pa ckets, a nd f inally transmit the information to the a ctual
recipient B and C.
In summary, the unicast is for sparse network users and broadcast is for dense network users. When
the number of users in the network is uncertain, unicast and broadcast will present a low efficiency.
When t he num ber of us ers are doubl ed a nd r edoubled, the m ulticast mode ne eds not t o increase
backbone bandwidth, but sends information to the user in need. These advantages of multicast make
itself become a hotspot in the current network technology study.
Comparing with unicast and broadcast, the advantages of multicast are as below:
Improve efficiency: reduce network traffic, relieve server and CPU load.
Optimize performance: reduce redundant traffic and guarantee the information security.
Distributed applications: solve the problem of point-point data transmission.
The multicast technology is mainly used in the following aspects:
142
www.raisecom.com User Manual
Multicast source
Multicast source refers to a server which regards multicast group address as the destination address
to send IP packet. A multicast source can send data to multiple multicast groups; multiple multicast
sources can send to a multicast group.
Multicast router
Router in the network that supports layer-3 multicast function is called the multicast router. Multicast
router can achieve multicast routing, guide multicast packet forwarding and provide multicast group
management function to distal network segment connecting with users.
Router interface
Router interface refers to the interface toward multicast router between multicast router and the host.
The device receives multicast packets from this interface.
Member interface
Known as the receiving interface, member interface is the interface toward host be tween multicast
router and the host. The device sends multicast packets from this interface.
The locations of multicast router interface and the receiving interface are shown in Figure 7-2.
In or der to make multicast s ource and multicast group members communicate across the I nternet,
you ne ed t o pr ovide network-layer m ulticast address a nd l ink-layer multicast a ddress, i.e. IP
multicast a ddress a nd m ulticast M AC a ddress. Note: m ulticast a ddress onl y can be de stination
address, but not source address.
IP multicast address
143
www.raisecom.com User Manual
IANA (Internet Assigned Numbers Authority) assigns Class D address space to IPv4 multicast; the
range of IPv4 multicast address is from 224.0.0.0 to 239.255.255.255.
Multicast MAC address
When Ethernet transmits unicast IP packet, the destination MAC address will use the recipient MAC
address. However, when multicast packets are in transmission, the destination is no longer a specific
receiver, but a group with uncertain member, so it needs to use multicast MAC address.
Multicast MAC address for link layer identifies the receiver of the same multicast group.
According to IANA, the high 24-bit of multicast MAC address are 0x01005E, the 25-bit is fixed 0,
the 23-bit corresponds to the low 23-bit of IPv4 multicast address.
The mapping relation between IP multicast address and MAC address is shown in Figure7-3
Figure 7-3 Mapping relation between IPv4 multicast address and multicast MAC address
Since the first 4 bits of IP multicast address are 1110, indicating multicast identification. In the last
28bits, only 23 bits are mapped to the multicast MAC address. And the missing 5 bits information
will make 32 IP multicast addresses map to the same multicast MAC address. Therefore, in Layer 2,
the device may receive some other data out of IP v4 multicast group, and these extra multicast data
need to be filtered by the upper device.
It needs to deploy a variety of multicast protocols for interworking and operating in various positions
of network to achieve a complete set of multicast services.
Typically, IP m ulticast w orking at n etwork layer is c alled "Layer-3 multicast", t he c orresponding
multicast pr otocol is called " Layer-3 multicast pr otocol," i ncluding I GMP ( Internet G roup
Management Protocol), etc.; IP multicast working at data link layer is called "layer 2 multicast", the
corresponding m ulticast f eature is called "layer-2 multicast protocol", i ncluding IGMP S nooping
(Internet Group Management Protocol Snooping) and so on.
The operating positions of IGMP and Layer-2 multicast features are shown in Figure 7-4.
144
www.raisecom.com User Manual
Figure 7-4 The operating positions of IGMP and Layer-2 multicast features
Up to now, IGMP has three versions: IGMPv1 version, IGMPv2 version and IGMPv3 version, the
new version is fully compatible with old version. Currently the most widely used version is IGMPv2,
while Leave messages only apply to IGMPv2 and IGMPv3.
Layer-2 multicast manages a nd c ontrols multicast gr oups by monitoring a nd a nalyzing IGMP
messages be tween hosts a nd multicast r outers as s o to achieve multicast data f orwarding a nd
suppress multicast data diffusion in layer-2 network.
145
www.raisecom.com User Manual
Note: The basic function configuration is valid to IGMP Snooping or IGMP MVR simultaneously.
The concepts description related to IGMP basic functions is as below:
Router interface learnt dynamically has aging time, while the router interface c onfigured manually
will not be aged.
Aging time
Set the aging time applying to both of multicast forwarding entry and router interface.
On layer-2 switch running multicast function, every router interface learnt dynamically will enable a
timer; the timer timeout is "IGMP Snooping aging time." The router interface will be deleted without
receiving IGMP Query messages at aging time; Update timeout for router interface when receiving
IGMP Query messages.
Each multicast forwarding entry will enable a timer, that is, the aging time of multicast member; the
timer tim eout is "IGMP S nooping a ging t ime". The m ulticast member w ill be deleted without
receiving IGMP Report messages at aging time; Update timeout for multicast forwarding entry when
receiving IGMP Report messages.
Instant-leaving function
On layer-2 s witch r unning m ulticast function, us er w ill not de lete t he c orresponding multicast
forwarding entry immediately, but wait until the entry is aged when sending Leave messages. Enable
this function to delete the corresponding multicast forwarding entry quickly when there are a large
number of downstream users and adding leaving is more frequent.
Enabling IGMP ring ne twork forwarding can achieve multicast ba ckup protection in ring ne twork,
make the m ulticast service m ore stable, and prevent l ink failure from causing multicast s ervice
failure.
IGMP ring network forwarding function applies to Ethernet ring, STP / RSTP / MSTP ring and
G.8032 ring, etc.
146
www.raisecom.com User Manual
IGMP S nooping a llows t he switch t o m onitor I GMP session between hos ts and m ulticast r outers.
When monitoring a group of IGMP Report from host, the switch will add host-located interface to
the f orwarding e ntry of t his gr oup; similarly, w hen f orwarding entry arriving at aging t ime, the
switch will delete host-located interface from forwarding entry.
IGMP Snooping forwards multicast da ta by layer-2 multicast forwarding entry. When receiving
multicast da ta, the switch will forward them directly according to the corresponding receiver
interface of multicast f orwarding e ntry, but not f lood t o a ll i nterfaces, so as to save the switch
bandwidth effectively.
IGMP Snooping establishes layer-2 multicast forwarding entry, which can be learnt dynamically or
configured manually.
Currently, the switch is in support of up to 1024 layer-2 multicast forwarding entries.
IGMP MVR adds member interfaces belonging to different user VLAN in switch to multicast VLAN
by configuring multicast VLAN and makes different VLAN user uses one common multicast VLAN,
then the multicast data will be transmitted only in one multicast VLAN without copying one for each
user VLAN, t hus s aving b andwidth. At the s ame t ime, multicast V LAN and us er V LAN ar e
completely isolated which also increases the security.
Both IGMP MVR and IGMP Snooping can achieve layer-2 multicast, but the difference is: Multicast
VLAN in IGMP Snooping is the same with user VLAN, while multicast VLAN in IGMP MVR can
be different with user VLAN.
Note: One switch can configure up t o 10 m ulticast VLAN, at least one multicast VLAN and group
addresses. The supported maximum number of multicast groups is 1024.
the ne twork s ide pr otocol packet a nd n etwork l oad. IGMP Proxy e stablishes multicast pa cket
forwarding list by intercepting IGMP packet between the user and the multicast routers.
Configure IGMP Profile filtering template to control the interface. One IGMP Profile can be set one
or more multicast group access control restrictions and access the multicast group according to the
restriction rules ( permit and deny). If a r ejected IGMP P rofile filtering template is applied to the
interface, the interface will discard the IGMP report message from this group directly once receiving
it and doesnt allow receiving this group of multicast data.
148
www.raisecom.com User Manual
As the Figure 7-5 shows below, multiple hosts receive multicast source data, and multiple hosts
belong to the same VLAN. It can run IGMP Snooping on switch connecting multicast router and host
and establish and maintain multicast forwarding table by monitoring the message between multicast
routers and hosts to achieve Layer 2 multicast.
149
www.raisecom.com User Manual
7.3.1.2 Precondition
Before c onfiguring I GMP Snooping, you s hould create t he V LAN a nd j oin t he c orresponding
interface to VLAN.
150
www.raisecom.com User Manual
As the Figure 7-6 shows below, when multiple users need to receive data from the multicast source,
the da ta among multiple us ers and multicast r outers all belongs to different VLAN. User can run
IGMP M VR function o n Switch A, configure multicast V LAN s o as t o make u sers in different
VLAN receive the same multicast data with one multicast VLAN and also reduce bandwidth waste.
7.4.1.2 Precondition
Before configuring IGMP MVR, you should create a VLAN and join the corresponding interface to
the VLAN.
151
www.raisecom.com User Manual
There are multiple hosts or multiple user subnets in a large-scale multicast protocols application
network. Configure IGMP pr oxy on switch which connects w ith multicast r outer and h ost t o
intercept the IGMP packets and reduce network burden.
IGMP P roxy can reduce t he configuration a nd management w ork of multicast r outers to users
subnets, at the same time, achieve the multicast connection of customer subnet.
152
www.raisecom.com User Manual
IGMP Proxy function is generally used with IGMP Snooping or IGMP MVR.
7.5.1.2 Precondition
Before c onfiguring IGMP Proxy, you should c reate V LAN a nd join the c orresponding interface to
the VLAN.
IGMP querier and source IP address Use the IP address of IP interface 0, or use
of IGMP Proxy transmission message 0.0.0.0 if the IP interface 0 hasnt be configured.
IGMP query interval 60s
Configure IGMP P roxy if it isnt ena bled: set source I P address, t he que ry interval, the
maximum response time of Query packet transmission, Query transmission interval of final
member, once MVR Proxy is started, the configuration takes effect immediately.
IGMP Proxy function can be started when enabling IGMP Snooping or IGMP MVR.
The di fferent us ers in the s ame multicast group receive different multicast requirements a nd
permissions, allow configuring filter rule on switch which connects multicast router and user host so
as to restrict multicast users. It also can set the maximum number of multicast group allowing user
joining. IGMP Proxy function is generally used with IGMP Snooping or IGMP MVR.
7.6.1.2 Precondition
Before configuring IGMP filtering, you should create VLAN and join the corresponding interface to
the VLAN.
IGMP filtering under interface No maximum group limitation, the largest group
action is drop, no application filter template
IGMP filtering under interface + VLAN No maximum group limitation, the largest group
action is drop, no application filter template
154
www.raisecom.com User Manual
155
www.raisecom.com User Manual
7.7 Maintenance
Users can maintain multicast features operation and configuration by the following command.
Command Description
As Shown in Figure 7-7, the switch interface Port 1 connects with multicast router; interface Port 2
and Port 3 connects users. All multicast users belong to the same VLAN10; It is needed to configure
IGMP Snooping on the switch to receive multicast data with the address 234.5.6.7.
Enable the IGMP P roxy function on switch to r educe communication between the hosts and
multicast routers and achieve multicast function.
When the P C and set-top box a dd i nto t he s ame m ulticast gr oup, t he s witch r eceives t wo I GMP
Report messages and only sends one of them to multicast router. The IGMP Query message sent by
multicast will no longer forward downstream, but transmit IGMP Query message
156
www.raisecom.com User Manual
157
www.raisecom.com User Manual
As shown in Figure 7-8, interface Port 1 of Switch A connects with multicast router, interfaces Port 2
and Port 3 connect with users in different VLAN to receive multicast 234.5.6.7 and 225.1.1.1 data.
Configuring IGMP MVR function on Switch A to designate VLAN3 as a multicast VLAN, then the
multicast data can only be copied one time in the multicast VLAN instead of copying for each user
VLAN, thus saving bandwidth.
158
www.raisecom.com User Manual
159
www.raisecom.com User Manual
Enable IGMP filtering on switch, add interface filter rule to restrict multicast user.
As shown in Figure 7-9, create IGMP filtering rules Profile 1, set address range between 234.5.6.7
and 234.5.6.10, the action is in green light. According to IGMP filtering rules under the interface Port
2, set-top box can join the multicast group 234.5.6.7, but not the multicast group 234.5.6.11; Port 3
hasnt enabled filtering rule and PC can the multicast group 234.5.6.11.
Set the maximum gr oup l imitation to interface Port 2, a fter a dding s et-top boxe s 234.5. 6.7, a dd
234.5.6.8 and quit the previous 234.5.6.7 multicast group.
As Figure 7-9 shows, use IGMP MVR function to provide multicast service.
160
www.raisecom.com User Manual
161
www.raisecom.com User Manual
IGMP profile: 1
MaxGroup: 1
Currentgroup: 0
action: replace
Configure IGMP r ing f orwarding f unction on s ingle E thernet r ing t o make multicast s ervice more
stable and prevent multicast service from disrupting by some failure links.
As shown in Figure 7-10, Port 1 a nd Port 2 of Switch A, Port 2 a nd Port 3 of Switch B, Port 2 a nd
Port 4 of Switch C constitute an physical ring, multicast traffic input from Port 1 of Switch B. The
user who need multicast stream goes through Port 5 and Port 6 interfaces of Switch C. By doing this,
whichever links fail in the Switch, it will not affect customers on-demand multicast stream.
When using single Ethernet ring to provide multicast services, you can adopt IGMP MVR or IGMP
Snooping function to receive the multicast stream.
Take STP providing ring network detection and IGMP Snooping providing multicast function for an
example:
Enable STP function, create VLAN and add interface into the VLAN.
Configure Switch A
162
www.raisecom.com User Manual
SwitchA#config
SwitchA(config)#spanning-tree enable
SwitchA(config)#spanning-tree mode stp
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 200
SwitchA(config)#exit
SwitchA(config-port)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 200
Configura Switch B
SwitchB#config
SwitchB(config)#spanning-tree enable
SwitchB(config)#spanning-tree mode stp
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk native vlan 200
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk native vlan 200
Configura Switch C
SwitchC#config
SwitchC(config)#spanning-tree enable
SwitchC(config)#spanning-tree mode stp
SwitchC(config)#interface port 2
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#switchport trunk native vlan 200
SwitchC(config-port)#exit
SwitchC(config)#interface port 4
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#switchport trunk native vlan 200
Enable IGMP Snooping and IGMP ring network forwarding function.
Configure Switch A
SwitchA(config)#igmp ring port 1,2
SwitchA(config)#igmp snooping
SwitchA(config)#igmp snooping vlan 200
Configura Switch B
SwitchB(config)#igmp ring port 2,3
SwitchB(config)#igmp snooping
SwitchB(config)#igmp snooping vlan 200
Configura Switch C
163
www.raisecom.com User Manual
Disconnect any one link in ring link to check whether the multicast traffic can be reveived normally.
164
www.raisecom.com User Manual
Chapter 8 Security
Overview
ACL
RADIUS
TACACS+
Storm Control
Maintenance
Configuring applications
8.1 Overview
Network application is getting more and more popular with the continuous development of Internet.
More and more enterprises speed up its development by using network. To ensure data and resource
security in open network environemtn become more and more important. Besides, some user access
network unconsciously but cause damage to network also lead device performance degrade or even
cause abnormal.
To d eploy a ccess c ontrol, user a uthentication, e tc. s ecurity t echnology c an effectively i mprove
network and device security.
8.1.1 ACL
ACL (Access Control List) is a set of ordered rules, which can control the device to receive or refuse
to some data message.
User needs to configure rules in network to control illegal packets influent network perofmrnace and
decide packets allowed passing. These rules are defined by ACL.
ACL is a series of rule composed by permit | deny sentences. The rules are described according to
source a ddress, destination a ddress, por t I D of da ta pa ckets. Device j udges r eceiving or r ejecting
packets according to the rules.
8.1.2 RADIUS
RADIUS (Remote Authentication Dial I n User S ervice) i s a kind of s tandard communication
protocol t hat a uthenticate r emote acces s us ers intensively. RADIUS uses UDP a s t he t ransmission
protocol (port 1812 and port 1813) which has a good instantaneity; at the same time, RADIUS is in
support of retransmission mechanism and standby server mechanism which has a good reliability.
165
www.raisecom.com User Manual
RADIUS adopts c lient/server m ode, network access de vice i s us ed as cl ient of RADIUS server.
RADIUS server receives user connecting requests and authenticates users, then reply configuration
information to all clients for providing services. Control user access device and network and improve
network security.
Communication between client and RADIUS server is authenticated by sharing key, which wont be
transmitted on network. Besides, all user directions need to be encrypted when transmitting between
client device and RADIUS server to ensure security.
8.1.3 TACACS+
TACACS+ (Terminal Access Controller Access Control System) i s a ki nd of ne twork a ccess
authentication protocol similar to RADIUS. The differences between them are:
TACACS+ uses TCP port, which has higher transmission reliability compared with UPD port
used by RADIUS.
TACACS+ encrypts the holistic of packets except the standard head of TACACS+, and there
is an area to show whether the data packets are encrypted in the head of packet. Compared to
RADIUS user password encryption, the TACACS+ is much safer.
TACACS+ authentication function is separated from authorization and accounting functions;
it is more flexible in deployment.
In a w ord, TACACS+ is s afer a nd more r eliable than R ADIUS, but RADIUS is used w ider i n
network as an open protocol.
Restricting broadcast traffic flow generated from network on layer-2 device can suppress broadcast
storm and ensure common unicast forwarding normally.
The st orm suppression a llows the interface to filter broadcast pa cket in the ne twork. E nable storm
suppression, when the i nterface r eceiving broadcast m essages are accumulated to a pr edetermined
threshold, the interface will discard broadcast packets automatically. The broadcast packets will be
broadcast normally to the other switch interfaces if this function is not enabled or broadcast packets
are not accumulated to a threshold.
166
www.raisecom.com User Manual
ACL can help network device to recognize filter objects. The device recognizes special objects and
then permit or denay packets passing according to the configured policy.
IP ACL: make classification rule according to source or destination address taken by packets
IP head, port ID used by TCP or UDP, etc. attributes.
IPv6 A CL: m ake c lassification r ule a ccording t o s ource or de stination address t aken by
packets IPv6 head, tag value, etc. attributes.
MAC A CL: make c lassification r ule a ccording t o s ource M AC a ddress, de stination M AC
address, layer-2 protocol type taken by packets layer-2 frame head, etc. attributes.
MAP ACL: MAP ACL can define more protocols and more detailed protocol fields than IP
ACL and MAC ACL, also can match any bytes in the former 64 b ytes of layer-2 data frame
according to users definition.
There are 4 kinds of ACL application according to difference of application environment: ACL over
the whole device, over interface, over flow from ingress port to egress port and over VLAN.
8.2.1.2 Preconditions
N/A
167
www.raisecom.com User Manual
168
www.raisecom.com User Manual
169
www.raisecom.com User Manual
15 Raisecom(config-aclmap)#match ip tcp
{destination-port|source-port} {port-id
(Optional) Define m atch r ule f or por t ID o f
|bgp|domain|echo|exec|finger|ftp| ftp-data|
TCP packet. By default, dont match port ID
gopher|hostname|ident|irc|klogin| kshell| login|
of TCP packet.
lpd|nntp|pim-auto-rp|pop2|pop3|smtp |sunrpc|
syslog|tacacs|talk|telnet|time|uucp|whois|www}
16 Raisecom(config-aclmap)#match ip tcp { ack | (Optional) Define m atch rule f or TCP
fin | psh | rst | syn | urg } protocol t ag. By de fault, don t m atch TCP
protocol tag.
17 Raisecom(config-aclmap)#match ip udp
{destination-port | source-port}
(Optional) Define m atch rule f or po rt ID o f
{port-id|biff|bootpc|bootps|domain |
UDP packet. By default, dont match port ID
echo|mobile-ip|netbios-dgm|netbios-ns |
of UDP packet.
netbios-ss|ntp|pim-auto-rp|rip|snmp|snmptrap
|sunrpc|syslog|tacacs|talk|tftp|time|who}
18 Raisecom(config-aclmap)#match ip icmp (Optional) Define m atch rule for m essage
icmp-type-id [ icmp-code ] type of ICMP packet. By default, dont match
message type of ICMP packet.
19 Raisecom(config-aclmap)#match ip igmp (Optional) Define m atch rule for m essage
{igmp-type-id|dvmrp| query|leave-v2| type of IGMP packet. By de fault, don t
report-v1|report-v2|report-v3 | pim-v1} match message type of IGMP packet.
20 Raisecom(config-aclmap)#match ipv6 (Optional) Define m atch rule f or sour ce or
{ destination-address | source-address } destination a ddress of IPv6 packet. By
ipv6-address/mask default, dont match source or destination
address of IPv6 packet.
21 Raisecom(config-aclmap)#match ipv6 (Optional) Define match rule for flow tag of
flow-label label-id IPv6 packet. By default, dont match flow tag
of IPv6 packet.
22 Raisecom(config-aclmap)#match ipv6 protocol (Optional) Define m atch r ule f or pr otocol
protocol-id value of IPv6 packet. By default, dont match
protocol value of IPv6 packet.
23 Raisecom(config-aclmap)#match ipv6 (Optional) Define m atch rule for f low
traffic-class class-id classification of IPv6 packet. By de fault,
dont m atch flow c lassification of IPv6
packet.
24 Raisecom(config-aclmap)#match user-define (Optional) Confiugre m atch r ule f or
rule-string rule-mask offset user-defined field, that is, two pa rameters of
rule mask and offset take an y b yte f rom the
former 64 b ytes of da ta f rame, t hen
comparing with user-defined rule to filter out
matched data frame for processing.
For e xample, if w ant to f ilter a ll T CP
packets, user can defines t he r ule as 06,
rule mask is EF, offset is 27, the rule mask
and of fset v alue w ork t ogether t o f ilter out
content of T CP pr otocol I D f ield, then
comparing with rule and match with all TCP
packets.
Note: Rule must be even number of he x
digital, offset inc ludes f ield 802.1q V LAN
Tag, make the device receives untag packets.
170
www.raisecom.com User Manual
ACL application over traffic flow from ingress port to egress port
171
www.raisecom.com User Manual
172
www.raisecom.com User Manual
User can deploy RADIUS server in network to take authentication and accounting so as to control
user access to de vice and network. This device can be used as agent of RADIUS server, which
authorizes user accessing according to feedback from RADIUS.
8.3.1.2 Preconditions
N/A
173
www.raisecom.com User Manual
174
www.raisecom.com User Manual
8.4.1.2 Preconditions
N/A
175
www.raisecom.com User Manual
176
www.raisecom.com User Manual
Configure storm suppression in layer-2 network can control the broadcast storm when the broadcast
packets increasing in network and then ensure unicast be forwarded normally.
The f ollowing f lows m ay c ause br oadcast f low, us er needs t o s et r ate l imit on l ayer-2 device f or
themre spectively:
Unknown uni cast flow: de stination MAC is unicast f low not existing in MAC table,
broadcast this flow on layer-2 device.
Multicast flow: destination MAC is multicast flow, broadcast this flow on layer-2 device.
Broadcast flow: destination MAC is broadcast flow, broadcast this flow on layer-2 device.
8.5.1.2 Preconditions
Connect interfaces and configure physical pa rameters f or i nterface be fore con figuring s torm
suppression and make physical interface is Up.
177
www.raisecom.com User Manual
8.6 Maintenance
User can maintain system security through below command.
Command Description
As the Figure 8-1 shows below, configure ACL denies 192.168.1.1 to access server 192.168.1.100 on
Switch A to restrict client access server.
178
www.raisecom.com User Manual
Configure IP ACL.
Raisecom#config
Raisecom(config)#ip-access-list 1 permit ip any any
Raisecom(config)#ip-access-list 2 deny ip 192.168.1.1 255.255.255.255 192.168.1.100 255.255.255.255
Apply ACL on Port 1 of Switch A.
Raisecom(config)#filter ip-access-list 1-2 ingress port-list 1
Raisecom(config)#filter enable
As the Figure 8-2 shows below, user needs to configure RADIUS authentication and accounting
features on Switch A to authenticate login users on Switch A and record the operations. The packets
179
www.raisecom.com User Manual
update transmitting interval is 2 minutes. User will be offline if the accounting fails.
As the Figure 8-3 shows be low, configure TACACS+ a uthentication on Switch A to authenticate
login user and control user access to device.
181
www.raisecom.com User Manual
As the Figure 8-4 shows be low, to restrict influence on Switch A c aused by broadcast storm, user
needs to configure storm suppression feature on Switch A to control broadcast packets and unknown
unicast packets, threshold is 2000pps.
182
www.raisecom.com User Manual
Chapter 9 Reliability
This chapter introduces basic principle and configuration of network reliability and provides related
configuration applications.
Overview
Configure link aggregation
Configure interface backup
ELPS
ERPS
Configure Ethernet ring
Maintenance
Configuring applications
9.1 Overview
Ethernet is becoming more and more widely used for its simple structure, high-efficient and
cost-effective f eatures. One of t he i mportant reasons to restrict Ethernet ap plication in
telecommunication is the tr aditional E thernet r eliability. Packeting services ar e pr esented in burst
mode usually; it is difficult to ensure invariable traffic. As two features of Ethernet, statistic TDM
and a ddress l earning s ystem pr ovide e fficient a nd f lexible ba ndwidth a nd m eanwhile i mport
incertitude for service bandwidth and path.
In order to improve Ethernet reliability and meet demands of telecommunication network, customer
can deploy special reliability technology in Ethernet.
183
www.raisecom.com User Manual
The pe er r eceives L ACPDU and com pares i nformation with other interfaces received, c hoosing
interface i n Selected status. The i nterfaces at bot h ends be come consi stent i n Selected status. The
operation Key pe rforms a ggregation a nd c ontrol on t he a utomatical ge nerated c onfiguration gr oup
according to the interface configuration (speed, duplex mode, Up/Down status, basic configuration
information, etc.).
The m ain difference be tween static LACP aggregation a nd m anual a ggregation is: s tatic LACP
aggregation m ode ha s standby l ink, w hile a ll t he member i nterfaces of m anual a ggregation a re i n
forwarding status and share loading flow.
Link aggregation is the most widely used and simplest function in Ethernet reliability technology.
Interface ba ckup function is the ot her solution for STP pr otocol. Users can configure i nterface
manually to achieve the ba sic link redundancy when disabling S TP function. If the s witch enables
STP, the interface backup function will be disabled because STP already provides similar function.
Interface backup function can be achieved by setting interface backup group, which contains a pair
of interfaces, one is master interface and the other is standby interface. The master interface located
link is called master link, while the standby interface located link is called standby link. The member
interface in interface backup group is in support of physical interface and link aggregation group, but
not layer-3 interface.
In the interface backup group, when one interface is in forwarding (Up) state, the other will be in
standby (Standby) state. Any time, only one in two interfaces is in the forwarding state. The interface
in standby state will change to forwarding state to maintain the normal link when there is link failure
in forwarding state interface.
184
www.raisecom.com User Manual
Interface backup principle is shown in Figure 9-1. Port 1 and Port 2 on Switch A are connected with
the upstream switches respectively, the interface forwarding state is as follows:
In normal state, Port 1 on Switch A is master interface, Port 2 is standby interface, Port 1 and
upstream switch forward messages, while Port 2 and the upstream switch not.
When there is link failure between Port 1 and upstream switch, the standby interface Port 2
and upstream switch forward messages.
When the Port 1 link failure is recovered and kept for a period of time (restore delay), Port 1
will change to forwarding state, Port 2 becomes standby state.
The s witch will s end a Trap to report ne twork management s ystem when the master i nterface a nd
standby interface switch with each other.
Interface backup can be used on VLAN to make the two interfaces forward concurrently on different
VLAN. In Figure 9 -2, interface ba ckup function over V LAN i s achi eved by cr eating VLAN and
adding interface to it.
Figure 9-2 Sketch map of Interface backup over VLAN
185
www.raisecom.com User Manual
9.1.3 ELPS
ELPS (Ethernet Linear Protection Switching) is an APS (Automatic Protection Switching) protocol
over IT U-T G.8031 r ecommendation. It is a n end-to-end pr otection t echnology us ed t o pr otect a n
Ethernet connection.
ELPS de ploys pr otection r esources f or w orking r esources, l ike pa th a nd ba ndwidth, e tc. E LPS
technology takes a simple and fast predictable mode to realize network resource switching, easier for
carrier to program network more efficiently and know network active status.
9.1.4 ERPS
ERPS (Ethernet Ring Protection Switching) is an APS protocol over ITU-T G.8032 recommendation.
It is special used in Ethernet ring link protocol. Generally, ERPS can avoid broadcast storm caused
by data loopback. When Ethernet has loop or device malfault, ERPS can switch the link to backup
link and ensure service restore quickly.
ERPS t akes t he s pcial VLAN i n r ing ne twork t o t ransmit r ing ne twork c ontrol i nformation a nd
meanwhile, combining with the topology feature of ring network to discover network fault quickly
and enable backup link to restore service fast.
Ethernet ring technology is RAISECOM independent research and development protocol, which can
ensure that there is data loop in Ethernet by blocking some interface on the ring. Ethernet ring solves
the problems of weak protection to traditional data network and long time to fault recovery, which,
in theory, can provide 50ms rapid protection features.
Shown in Figure 9-3, blocked interface node is the master node, other nodes are transmission nodes.
The master node generates by election. Each node can specify one loop interface as the first interface,
the other as the second interface. The master node usually sends Hello messages periodically from
the f irst int erface and receives Hello message s ent by i tself in t he s econd i nterface unde r t he
circumstance of complete Ethernet ring. Then the master node w ill block the f irst int erface
immediately to ensure there is no l oop when the ring network is in a complete s tate. For the other
186
www.raisecom.com User Manual
nodes on t he Ethernet ring, the first interface No. and the second interface No. play the same role
basically.
Ethernet ring generates master node by the election, so each node needs to collect device information
on Ethernet ring, only the right collection leads to correct election. Topology collection is completed
by Hello messages, which contain all nodes information the node collected from the other interface.
The normal state of Ethernet ring is shown in Figure 9-3.
According to the interface state of node ring, the ring node state can be divided into three types:
Down: At least one of the two Ethernet ring interfaces is Down;
Block: At least one of the two Ethernet ring interfaces is Block;
Two-Forwarding: Both Ethernet ring interfaces are Forwarding.
The election rules of master node are as follows:
In all nodes on t he ring, node with Down state is prior for master node, followed by Block
and Two-Forward.
If the nodes are in the same state, the node with high-priority Bridge is master node.
If the nodes have the same state and priority, the node with large Mac is master node.
Interface Block rules:
If the node is not master node, the two interfaces are Forwarding.
If the node is master node, then one of two interfaces is Block, the other is Forwarding. Rules
are as follows:
Interface with Down link is prior for Block;
Both interfaces are Down, the Block is the first interface;
Both interfaces are Up, the Block is the first interface;
The Ethernet ring link failure is shown in Figure 9-4.
187
www.raisecom.com User Manual
Once there is link failure (such as link break), the failure adjacent node or interface will check the
fault i mmediately and send link failure messages to master node . T he master node will e nable the
first interface onc e r eceiving the m essages, in the meantime, send messages t o notify other
transmission nodes about the link failure and inform them to change transmission direction. The data
traffic will be switched to normal link after the transmission nodes updating forwarding entry.
When the failed link is restored, the failed node does not enable the blocked port immediately until
the ne w t opology c ollection i s s table. The origin node will f ind itself the m aster node, after som e
time de lay, it w ill block hi s f irst i nterface, a nd send Change m essages t o notify t he failed node
enabling the blocked interface.
Link a ggregation f unction can pr ovide hi gher communication bandwidth a nd r eliability f or l ink
between two devices. It aggregates several physical Ethernet interface together and make one logical
link. This f unction realizes upbound a nd downbound flow l oad s haring a mong m ember i nterfaces
and then increases bandwidth; at the same time, the member interfaces are dynamic to one another
which improve link reliability.
9.2.1.2 Preconditions
Please configure interface physical pa rameters be fore c onfiguring l ink a ggregation a nd m ake
interface physical layer in Up status.
188
www.raisecom.com User Manual
QinQ configuration: interface QinQ enable/disable status, added outer VLAN Tag, policy for
adding outer VLAN Tag by different inner VLANID.
VLAN c onfiguration: i nterface pe rmitting V LAN, de fault V LAN I D, i nterface l ink t ype
(Trunk, Hybrid, A ccess), s ub-net VL AN configuration, V LAN packets w ith T ag
configuration or not.
Interface at tributes conf iguration: i nterface i s adde d into i solation gr oup or not , i nterface
speed, duplex mode, link up.down status.
MAC a ddress l earning c onfiguration: M AC a ddress l earning e nable/disable, i nterface w ith
max. Learning MAC address number limit or not, MAC address table can control forwarding
when it is full.
Note:
Interface in s tatic LACP l ink a ggregation gr oup can b e i n a ctive or s tandby s tatus. Both
active interface and standby i nterface can receive/transmit LACP p ackets, but s tandby
interface cannot forward client packets.
System chooses default interface in the order of neighbor discover, interface maximum speed,
interface hi ghest LACP pr iority, interface minimum ID. The int erface is in active s tatus by
default, the interface with identical speed, identical peer and identical device operation key is
also in active status; other interfaces are in standby status.
1 Raisecom#show lacp Show loc al s ystem LACP int erface s tatus, mark, interface
internal [ detail ] priority, management key, operation key and status of interface
status machine.
2 Raisecom#show lacp Show ne ighbor LACP information, i ncluding mark, interface
neighbor[ detail ] priority, device ID, Age, operation key value, interface ID and
status of interface status machine.
3 Raisecom#show lacp Show i nterface LACP statistic inf ormation, including total
statistics [ port-list receiving a nd t ransmitting number L ACP pa ckets, r eceiving
port-list ] and t ransmitting num ber o f M arker pa ckets, r eceiving a nd
transmitting number of Marker Response packets, as well as
error packets.
4 Raisecom#show lacp Show gl obal e nable c ondition of loc al s ystem LACP, de vice
sys-id ID, including system LACP priority and system MAC address.
5 Raisecom#show Show c urrent s ystem link a ggregation e nable/disable, link
link-aggregation aggregation load sharing mode, group member interface set by
all c urrent link aggregation groups and current effective
member interfaces.
Note: Current ef fective member interface i ndicates t he
interface list in Up status in group member interfaces.
Configure interface backup function to achieve the redundancy backup and quick switch of master
and s tandby l inks w hen di sabling S TP f unction.It a lso c an a chieve t he l oad balancing b etween
interfaces by interface backup over VLAN.
Compared with STP function, interface backup ensures the fast millisecond switching and simplifies
the configuration.
191
www.raisecom.com User Manual
9.3.1.2 Preconditions
Create VLAN
Add interface to VLAN
Disable STP function
Raisecom(config-aggregator)#exit
Note:
The m aster a nd s tandby lnks w ill s witch w ith e ach ot her a fter c onfiguring f orced s witch
successfully; the working link will force to switch to standby link. For example, when both
the m aster i nterface and standby i nterface ar e in Up state, the da te w ill be tr ansmitted on
master link; after configuring forced switch, working link will be switched from master link
to standby link.
Interface keywords in command are s tandby interface No., optional parameters. Input
standby interface number if configuring multiple pairs of standby interface pairs under master
interface.
Step Configuration Description
193
www.raisecom.com User Manual
Configuring ELPS f eature in Ethernet can make Ethernet r eliability up to telecommunication level
(network self-heal time less than 50ms). It is an end-to-end protection technology used for protecting
an Ethenet link.
Detecting fault over physical interface status: to get link fault quickly and switching in time,
available to neighbor devices.
Detecting fault ov er C FM: a vailable to one-way de tection or m ulti-devices ac crossing
detection.
9.4.1.2 Preconditions
194
www.raisecom.com User Manual
HOLDOFF timer 0
2 Raisecom(config)#ethernet
line-protection line-id working Create ELPS pr otection l ine and configure
{ port port-id | port-channel protection m ode. The pr otection gr oup be comes
port-channel-number } vlan-list non-revertive mode i f configure the pa rameter of
protection { port port-id | non-revertive. In r evertive m ode, w hen w orking
port-channel port-channel-number } line f ault r ecover, traffic switches ba ck t o w orking
vlan-list { one-plus-one-bi | line from protection line; it doesnt switch back if in
one-plus-one-uni | one-to-one } non-revertive mode. By default, protection group is
[ non-revertive ] [ protocol-vlan in revertive mode.
vlan-id ]
3 Raisecom(config)#ethernet (Optional) Configure ELPS protection line name.
line-protection line-id name string
4 Raisecom(config)#ethernet (Optional) Configure WTR timer. In revertive mode,
line-protection line-id wtr-timer traffic waits WT R t imer ov ertime t o recover t o
wtr-timer working link after its fault restore. By default, WTR
timer value is 5 minutes.
Note: I t is be tter to configure WTR tim er a t tw o
ends c onsistent, or e lse f ast s witching i n 5 0ms
cannot be ensured.
5 Raisecom(config)#ethernet (Optional) Configure HOLDOFF timer. After
line-protection line-id hold-off-timer configuring HOLDOFF timer, system delays process
hold-off-timer fault time when working link is error, that is to say,
it switches to protection link after a delay time to
avoid f requent s witch c aused by working l ink
change. By default, HOLDOFF timer is 0.
Note: HOLDOFF t imer configures i n large v alue
will i nfluence 50m s s witching pe rformance, i t i s
recommended to use defaulted value 0.
6 Raisecom(config)#ethernet (Optional) Enable ELPS fault information reports to
line-protection trap enable NMS. It i s di sabled by de fault. The c ommand of
ethernet port-protection trap disable can di sable
this function.
195
www.raisecom.com User Manual
196
www.raisecom.com User Manual
With the development of Ethernet to telecom level network, voice and video multicast services bring
forth higher requirements on Ethernet redundant protection and fault-restore time. The fault-restore
convergent time of current STP system is in second level that is far away to meet requirement. By
defining different roles for nodes in a ring, ERPS can break loop link and avoid broadcast storm in
normal condition. Then the service link can switch to backup link if the ring link or node faults and
remove loop, perform fault protection switch and automatic fault restore, whats more, the protection
switch t ime is l ower t han 50ms. It is i n s upport of s ingle r ing, c rossed r ings a nd t angent r ings
networking modes.
Fault de tection ov er phy sical i nterface s tatus: t o ge t l ink f ault a nd s witching quickly,
available to adjacent devices.
Fault detection over CFM: available to uni-directional detection or multi-devices cross over
detection.
9.5.1.2 Preconditions
Protocol VLAN 1
197
www.raisecom.com User Manual
WTB timer 5s
Note:
Only one device set can be configured as RPL (Ring Protection Link) Owner in a ring, and
one de vice s et as RPL Neighbour, other de vices c an only be configured a s ring forwarding
node.
Tangent ring can be taken as two independent rings in fact, the configuration is identical to
common single ring; crossover rings has a master ring and a sub-ring, the configurations
please refer to the section of Create ERPS protection ring.
198
www.raisecom.com User Manual
199
www.raisecom.com User Manual
200
www.raisecom.com User Manual
201
www.raisecom.com User Manual
As a Metro Ethernet technology, Ethernet ring solves the problems of weak protection to traditional
data ne twork and long time to fault recovery, which, in the ory, can provide 50ms r apid protection
features and is compatible with traditional Ethernet protocol, is an important technology options and
solutions of metro broadband access network optimization transformation.
Ethernet r ing t echnology is R AISECOM i ndependent research a nd de velopment protocol, which
through simple c onfiguration a chieves the elimination o f ring loop, fault protection switching, a nd
automatic fault recovery function and makes the fault protection switching time less than 50ms.
Raisecom Ethernet r ing t echnology is in support of bo th single-ring and t angent ring networking
modes, but not intersecting ring networking. Tangent ring is actually two separate single rings, which
has the same configuration with common single ring.
9.6.1.2 Preconditions
Before configuring Ethernet ring, configure interface physical parameters to make interface physical
layer state Up.
202
www.raisecom.com User Manual
Bridge priority 1
203
www.raisecom.com User Manual
3 Raisecom#show ethernet ring port statistic Check Ethernet ring interface messages
statistics information.
9.7 Maintenance
User can maintain network reliability by the below commands:
Command Description
204
www.raisecom.com User Manual
As the Figure 9-5 shows below, in order to improve link reliability between Switch A and Switch B,
configure manual link aggregation for the two devices; add Port 1 and Port 2 into link aggregation
group t o b uild up a unique l ogical i nterface. T he l ink a ggregatin gr oup p erforms l oad s haring
according to source MAC.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#interface port-channel 1
SwitchA(config-aggregator)#mode manual
SwitchA(config-aggregator)#exit
Configure Switch B.
Raisecom#hostname SwitchB
SwitchA#config
SwitchB(config)#interface port-channel 1
SwitchB(config-aggregator)#mode manual
SwitchB(config-aggregator)#exit
Configure Switch A.
SwitchA(config)#interface port 1
SwitchA(config-port)#channel group 1
205
www.raisecom.com User Manual
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#channel group 1
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#channel group 1
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#channel group 1
SwitchB(config-port)#exit
Configure Switch A.
SwitchA(config)#link-aggregation load-sharing mode smac
Configure Switch B.
SwitchB(config)#link-aggregation load-sharing mode smac
Configure Switch A.
SwitchA(config)#link-aggregation enable
Configure Switch B.
SwitchB(config)#link-aggregation enable
Show global configuration of manual link aggregation by the command of show link-aggregation:
SwitchA#show link-aggregation
Link aggregation status:Enable
Load sharing mode:SMAC
Load sharing ticket generation algorithm:Direct-map
M - Manual L - Lacp-static
GroupID Mode MinLinks MaxLinks UpLinks Member Port List Efficient Port List
---------------------------------------------------------------------
1 M 1 8 0 1-2
2 M 1 8 0
3 M 1 8 0
206
www.raisecom.com User Manual
As the Figure 9-6 shows below, in order to improve link reliability between Switch A and Switch B,
configure static L ACP l ink a ggregation f or t he t wo devices, a dd Port 1 a nd Port 2 i nto l ink
aggregation group. Port 1 is the master link and Port 2 is standby link.
Configure static LACP link aggregation group on Switch A and set Switch A as active end.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#lacp system-priority 1000
SwitchA(config)#interface port-channel 1
SwitchA(config-aggregator)#mode lacp-static
SwitchA(config-aggregator)#exit
SwitchA(config)#interface port 1
SwitchA(config-port)#channel group 1
SwitchA(config-port)#lacp port-priority 1000
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#channel group 1
SwitchA(config-port)#exit
SwitchA(config)#link-aggregation enable
Configure static LACP link aggregation group on Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#lacp system-priority 1000
SwitchB(config)#interface port-channel 1
SwitchB(config-aggregator)#modelacp-static
SwitchB(config-aggregator)#exit
SwitchB(config)#interface port 1
207
www.raisecom.com User Manual
SwitchB(config-port)#channel group 1
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#channel group 1
SwitchB(config-port)#exit
SwitchB(config)#link-aggregation enable
Show static LACP link aggregation global configuration on Switch A by the command of show
link-aggregation:
Raisecom#show link-aggregation
Link aggregation status:Enable
Load sharing mode:SXORDMAC
Load sharing ticket generation algorithm:Direct-map
M - Manual L - Lacp-static
GroupID Mode MinLinks MaxLinks UpLinks Member Port List Efficient Port List
---------------------------------------------------------------------
1 L 1 8 0 1-2
2 M 1 8 0
3 M 1 8 0
4 M 1 8 0
5 M 1 8 0
6 M 1 8 0
7 M 1 8 0
8 M 1 8 0
Show pe er s ystem LACP i nterface s tatus, mark, i nterface pr iority, management ke y, ope ration key
and status of interface status machine on Switch A by the command of show lacp internal:
Raisecom(config)#show lacp internal
Flags:
S - Device is requesting Slow LACPDUs F - Device is requesting Fast LACPDUs
A - Device in Active mode P - Device in Passive mode
Show pe er system LACP interface s tatus, mark, interface pr iority, management ke y, ope ration key
and status of interface status machine on Switch A by the command of show lacp neighbor.
208
www.raisecom.com User Manual
As the Figure 9-7 shows below, to achieve the realiable accress from remote PC to server, configure
interface backup group on Switch A and assign VLAN list so as to achieve interface link protection
and load sharing. The requirement is as below:
Create VLAN 100VLAN 200 and add Port 1 and Port 2 into it.
Raisecom#config
Raisecom(config)#create vlan 100-200 active
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk allowed vlan 100-200 confirm
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk allowed vlan 100-200 confirm
Raisecom(config-port)#exit
Configure Port 1 as master interface and Port 2 as standby interface on VLAN 100VALN 150.
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport backup port 2 vlanlist 100-150
209
www.raisecom.com User Manual
Raisecom(config-port)#exit
Configure Port 2 as master interface and Port 1 as standby interface on VLAN 151VALN 200.
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport backup port 1 vlanlist 151-200
Check i nterface ba ckup s tatus i nformation i n c onditions of normal l ink s tatus a nd l ink fault
separately by the command of show switchport backup.
When the link of Port 1 and Port 2 is Up, Port 1 forwards traffics on VLAN 100VALN 1 50, while
Port 2 forwards traffics on VLAN 151VALN 200.
Raisecom#show switchport backup
Restore delay: 15s.
Restore mode: port-up.
Active Port(State) Backup Port(State) Vlanlist
---------------------------------------------------------
port1 (Up) port2 (Standby) 100-150
port2 (Up) port1 (Standby) 151-200
Break the link simulation fault between Switch A and Switch B manually, then the status of Port 1
will become Down, Port 2 will forward traffics on VLAN 100VALN 200.
Raisecom#show switchport backup
Restore delay: 15s
Restore mode: port-up
Active Port(State) Backup Port(State) Vlanlist
-----------------------------------------------------------------
port1 (Down) port2 (Up) 100-150
port2 (Up) port1 (Down) 150-200
When Port1 recovers t o Up st atus for 15s (re cover de lay), Port 1 will forward traffics on VLAN
100VALN 150, and Port 2 on VLAN 151VALN 200.
As the Figure 9-8 shows below, in order to improve link reliability between Switch A and Switch B,
configure 1:1 ELPS on the two devices and detect fault over physical interface status. Port 1 and Port
2 set in VLAN range 100~200.
210
www.raisecom.com User Manual
Create VLAN 100~VLAN 200 and add interface into VLAN 100~VLAN 200.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 100-200 active
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchA(config-port)#exit
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 100-200 active
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchB(config-port)#exit
Configure Switch A.
SwitchA(config)#ethernet line-protection 1 working failure-detect physical-link
SwitchA(config)#ethernet line-protection 1 protection failure-detect physical-link
Configure Switch B.
SwitchB(config)#ethernet line-protection 1 working failure-detect physical-link
211
www.raisecom.com User Manual
Show 1:1 mode ELPS APS protocol information on t he device by the command of show ethernet
line-protection aps.
Take Switch A for example:
SwitchA#show ethernet line-protection 1 aps
Id Type Direction Revert Aps State Signal(Requested/Bridged)
--------------------------------------------------------------------
1-Local 1:1 bi yes yes NR-W null/null
1-Remote 1:1 bi yes yes NR-W null/null
As the Figure 9-9 shows below, in order to improve link reliability between Switch A and Switch B,
configure 1+1 one-way ELPS on the two devices and detect fault over CFM. Port 1 and Port 2 set in
VLAN range 100~200.
212
www.raisecom.com User Manual
Create VLAN 100~VLAN 200 and add interface into VLAN 100~VLAN 200.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 100-200 active
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchA(config-port)#exit
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 100-200 active
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 100-200 confirm
SwitchB(config-port)#exit
Configure CFM.
Configure Switch A.
SwitchA(config)#ethernet cfm domain md-name md1 level 7
SwitchA(config)#service ma1 level 7
SwitchA(config-service)#service vlan-list 100
SwitchA(config-service)#service mep down mpid 1 port 1
SwitchA(config-service)#service mep down mpid 2 port 2
SwitchA(config-service)#service remote-mep 3
SwitchA(config-service)#service remote-mep 4
SwitchA(config-service)#service cc enable mep 1
SwitchA(config-service)#service cc enable mep 2
SwitchA(config-service)#exit
SwitchA(config)#ethernet cfm enable
Configure Switch B.
213
www.raisecom.com User Manual
Configure Switch A.
SwitchA(config)#ethernet line-protection 1 working port 1 100-200 protection port 2 100-200 one-plus-one-uni
Configure Switch B.
SwitchB(config)#ethernet line-protection 1 working port 1 100-200 protection port 2 100-200 one-plus-one-uni
Show 1+ 1 m ode E LPS configuration on the de vice by the c ommand of show ethernet
line-protection.
214
www.raisecom.com User Manual
Show 1+1 mode ELPS APS protocol information on t he device by the command of show ethernet
line-protection aps.
Take Switch A for example:
SwitchA#show ethernet line-protection 1 aps
Id Type Direction Revert Aps State Signal(Requested/Bridged)
--------------------------------------------------------------------
1-Local 1+1 uni yes yes NR-W null/normal
As the Figure 9-10 shows below, in order to improve Ethernet reliability, the four devices Switch A,
Switch B, Switch C and Switch D build up an ERPS single ring.
Switch A device i s R PLOwner, Switch B i s R PLNeighbour; the RPL link between Switch A a nd
Switch B is blocked.
The fault de tection mode between Switch A and Switch D i s physical-link-or-cc, other links adopt
default fault detection mode (physical-link).
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
215
www.raisecom.com User Manual
Configure CFM.
Configure Switch A.
SwitchA(config)#ethernet cfm domain md-name md1 level 7
SwitchA(config)#service ma1 level 7
SwitchA(config-service)#service vlan-list 1
SwitchA(config-service)#service mep down mpid 1 port 2
SwitchA(config-service)#service remote-mep 2
SwitchA(config-service)#service cc enable mep 1
SwitchA(config-service)#exit
SwitchA(config)#ethernet cfm enable
Configure Switch D.
SwitchD(config)#ethernet cfm domain md-name md1 level 7
216
www.raisecom.com User Manual
Configure Switch A.
SwitchA(config)#ethernet ring-protection 1 east port 1 west port 2 node-type rpl-owner rpl east
Configure Switch B.
SwitchB(config)#ethernet ring-protection 1 east port 1 west port 2 node-type rpl-neighbour rpl west
Configure Switch C.
SwitchC(config)#ethernet ring-protection 1 east port 1 west port 2
Configure Switch D.
SwitchD(config)#ethernet ring-protection 1 east port 1 west port 2
Check i f E RPS protection ring is ef fective on the de vice b y t he command of show ethernet
ring-protection status.
Cut off link between Switch B and Switch C by manual to simulate fault, execute command to show
ERPS protection ring status on Switch A again, RPL link switches to forwarding status.
SwitchA#show ethernet ring-protection status
Id/Name Status Last Occur(ago) East-State West-State sc Traffic-vlanlist
-------------------------------------------------------------------
1 Protection 0 day 0055950 forwarding forwarding 1 1-4094
217
www.raisecom.com User Manual
As the Figure 9-11 shows below, in order to improve Ethernet reliability, the devices Switch A,
Switch B, Switch C, Switch D, Switch E and Switch F build up double ring ERPS network.
Switch A, Switch B, Switch C and Switch D build up the master ring, Switch D is master ring
RPLOwner, S witch C i s m aster r ing R PLNeighbour, c ongest S witch D Port 1 i nterface, pr otocol
VLAN adopts default value 1.
Switch A, Switch B, S witch E and Switch F bui ld up secondary r ing, S witch F i s s econdary r ing
RPLOwner, Switch A is secondary ring RPLNeighbour, congest Switch F Port 1 i nterface, protocol
VLAN is 4094. Virtual path mode of secondary ring is defaulted with mode.
Congestion VLAN range of master and secondary ring are both defaulted 1~4094.
Master ring devices all adopt physical-link-or-cc mode to detect fault, secondary ring adopt defaulted
fault detection mode (physical-link).
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
218
www.raisecom.com User Manual
SwitchF#config
SwitchF(config)#interface port 1
SwitchF(config-port)#switchport mode trunk
SwitchF(config-port)#exit
SwitchF(config)#interface port 2
SwitchF(config-port)#switchport mode trunk
SwitchF(config-port)#exit
Configure Switch A.
SwitchA(config)#ethernet cfm domain md-name md1 level 7
SwitchA(config)#service ma1 level 7
SwitchA(config-service)#service vlan-list 1
SwitchA(config-service)#service mep down mpid 1 port 1
SwitchA(config-service)#service mep down mpid 2 port 2
SwitchA(config-service)#service cc enable mep 1
SwitchA(config-service)#service cc enable mep 2
SwitchA(config-service)#exit
SwitchA(config)#ethernet cfm enable
Configure Switch B.
SwitchB(config)#ethernet cfm domain md-name md1 level 7
SwitchB(config)#service ma1 level 7
SwitchB(config-service)#service vlan-list 1
SwitchB(config-service)#service mep down mpid 3 port 1
SwitchB(config-service)#service mep down mpid 4 port 2
SwitchB(config-service)#service cc enable mep 3
SwitchB(config-service)#service cc enable mep 4
SwitchB(config-service)#exit
SwitchB(config)#ethernet cfm enable
Configure Switch C.
SwitchC(config)#ethernet cfm domain md-name md1 level 7
SwitchC(config)#service ma1 level 7
SwitchC(config-service)#service vlan-list 1
SwitchC(config-service)#service mep down mpid 5 port 1
SwitchC(config-service)#service mep down mpid 6 port 2
SwitchC(config-service)#service cc enable mep 5
SwitchC(config-service)#service cc enable mep 6
SwitchC(config-service)#exit
SwitchC(config)#ethernet cfm enable
Configure Switch D.
SwitchD(config)#ethernet cfm domain md-name md1 level 7
SwitchD(config)#service ma1 level 7
220
www.raisecom.com User Manual
SwitchD(config-service)#service vlan-list 1
SwitchD(config-service)#service mep down mpid 7 port 1
SwitchD(config-service)#service mep down mpid 8 port 2
SwitchD(config-service)#service cc enable mep 7
SwitchD(config-service)#service cc enable mep 8
SwitchD(config-service)#exit
SwitchD(config)#ethernet cfm enable
Configure Switch A.
SwitchA(config)#ethernet ring-protection 1 east port 1 west port 2
Configure Switch B.
SwitchB(config)#ethernet ring-protection 1 east port 1 west port 2
Configure Switch C.
SwitchC(config)#ethernet ring-protection 1 east port 1 west port 2 node-type rpl-neighbour rpl west
Configure Switch D.
SwitchD(config)#ethernet ring-protection 1 east port 1 west port 2 node-type rpl-owner rpl east
Configure Switch A.
SwitchA(config)#ethernet ring-protection 2 east port 3 node-type rpl-neighbour protocol-vlan 4094
221
www.raisecom.com User Manual
Execute the c ommand on Switch A, Switch D and Switch F r espectively, the r esult w ill s how a s
below if configure successfully.
SwitchA#show ethernet ring-protection status
Id/Name Status Last Occur(ago) East-State West-State sc Traffic-vlanlist
-------------------------------------------------------------------------
1 idle 0 day 0050750 forwarding forwarding 1 1-4094
Id/Name Status Last Occur(ago) East-State West-State sc Traffic-vlanlist
-------------------------------------------------------------------------
2 idle 0 day 0050750 forwarding forwarding 1 1-4094
The status and priority of four nodes are the same, Mac address of Switch D is biggest, and therefore,
Switch D is the master node of Ethernet ring.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#interface port 1
SwitchA(config-port)#ethernet ring 1 port 2
SwitchA(config-port)#exit
SwitchA(config)#ethernet ring 1 enable
Switch Switch B, Switch C, and Swtch C, please take Switch A configuration for reference.
223
www.raisecom.com User Manual
Hello Time: 1
Restore delay: 5
Hold Time 15
Protocol Vlan 2
Break l ink s imulation f ault be tween S witch A a nd S witch B m anually, P ort 1 of S witch D w ill
change i ts s tatus f rom B lock t o F orwarding, Port 1 of S witch B w ill c hange i ts status fr om
Forwarding to Block. Check Ethernet ring status again.
SwitchD#show ethernet ring
Ethernet Ring Upstream-Group:1
Ethernet Ring 1:
Ring Admin: Enable
Ring State: Unenclosed
Bridge State: Two-Forward
Ring state duration: 0 days, 3 hours, 30 minutes, 15 seconds
Bridge Priority: 1
Bridge MAC: 000E.5E00.000D
Ring DB State: Block
Ring DB Priority: 1
Ring DB: 000E.5E00.000B
Hello Time: 1
Restore delay: 15
Hold Time 15
Protocol Vlan 2
224
www.raisecom.com User Manual
Chapter 10 OAM
This chapter introduces basic principle and configuration of OAM and provides related configuration
applications.
Overview
EFM
CFM
SLA
E-LMI
Maintenance
Configuring applications
10.1 Overview
10.1.1 OAM overview
Ethernet i s de signed f or LAN initially; the OAM ( Operation, Administration and Management) i s
weak for its small scale and possesses administrative system of NE level. With the wider application
of E thernet i n t elecom ne twork, t he l ink l ength a nd network s cal become bi gger a nd bi gger, i t
demands an efficient management and maintenance system in telecom network.
To confirm connectivity of Ethernet virtual connection, detecting, confirming and locating fault from
Ethernet layer, as well as balance network utility and network performance, then providing service
according S LA (Service Level Agreement) i mplementing OAM o n E thernet has becoming a
inevitable developing trend.
Ethernet OAM is graded to achieve, as shown in Figure 10-1, it is generally divided into two levels:
Link level Ethernet OAM: mostly used to the Ethernet physical link between PE (P rovider
Edge) and CE (Customer Edge) (i.e.: the last mile) to monitor the link status between users
network and and operators network. The typical protocol is EFM (Ethernet in the First Mile)
OAM protocol.
Service-class Ethernet OAM: mostly us ed t o network access conv ergence l ayer to monitor
the e ntire ne twork connectivity, position network connectivity fault, and monitor link
performance. The typical protocol is CFM (Connectivity Fault Management) OAM protocol.
225
www.raisecom.com User Manual
10.1.2 EFM
Complied with IEEE 8802.3ah protocol, EFM is a kind of Ethernet OAM technology in link level,
which provides link connectivity detection function, link fault monitoring function, and remote fault
notification function, etc to the link between two straight-connection devices.
"The last mile" in EFM r efers t o the c onnection f rom telecommunications carrier t o the users. Its
goal is to promote the widely used E thernet technology to the telecommunications access ne twork
market, which can significantly improve network performance and reduce device and operating costs.
EFM is mainly used for user access network edge Ethernet link.
Switch device provides the IEEE 802.3ah standard EFM function.
10.1.3 CFM
CFM is a kind of Ethernet OAM technology in network level, implementing end-to-end connectivity
fault de tection, f ault n otification, j udgement a nd l ocation f unctions. It is us ed t o diagnose f ault
actively for EVC (Ethernet Virtual Connection) and provide c ost-effective ne twork maintenance
solution via fault management function and improve network maintenance.
The s witch provides CFM function which is compatible w ith IEEE 802.1ag and ITU-T Y.1731
recommendations.
226
www.raisecom.com User Manual
MD
MD (Maintenance D omain, al so cal led MEG, Maintenance E ntity Group) is a network that runs
CFM f unction. It de fines ne twork r ange f or OAM m anagement. M D ha s l evel pr operty w ith 8
different levels (level 0 to level 7), the bigger the number is, the higher the level is, and the larger the
corresponding range is. Protocol packets of lower level MD will be discarded after entering higher
level MD; while higher level MD packets can transmit through lower level MD. In one VLAN range,
different MD can be adjacent, embedded, but not crossed.
As the Figure 10-2 shows below, MD2 is contained in MD1. MD1 packets need to transmit through
MD2. Confiure MD1 level as 6, and MD2 l evel a s 3. Then MD1 pa ckets c an t ravel through MD2
and i mplement c onnectivity fault m anagement to the whole MD1, b ut M D2 pa ckets w ont di ffuse
into MD1. MD2 is server layer and MD1 is client layer.
Service instance
Service Instance also called MA (Maintenance Association) is part of MD. One MD can be divided
into one or multiple service instances. One service instance corresponds to one service, mapping to
one V LAN group; VLAN of different service instances cannot cross. Though service instance can
map to multiple VLAN, one instance can use one VLAN for transmitting or receiving OAM packets.
This VLAN is master VLAN of the intance.
MEP
As the Figure 10-3 shows below, MEP (Maintenance associations End Point) is edge node of service
intance. MEP can transmit a nd deal with CFM packets, instance that MEP located and MD decide
the VLAN and level for MEP packets transmission and reception
MEP o n a ny de vice r unning C FM i n ne twork i s c alled l ocal MEP; MEP on ot her de vices i n t his
instance is called RMEP (Remote Maintenance association End Point).
One i nstance can configure multiple MEP; packets s ent by M EP i n one i nstance t ake i dentical
S-VLAN TAG, priority and C-VLAN TAG. MEP can receive OAM packets sent by other MEP in
the instance, stop packets with the same level or lower than its own level and transmit packets higher
than its own level.
227
www.raisecom.com User Manual
MIP
As the Figure 10-3 shows above, MIP (Maintenance association Intermediate Point) is inner node of
service instance, which is created by device automatically. MIP cannot send CFM p ackets actively
but can manage and answer LTM (LinkTrace Message) and LBM (LoopBack Message) packets.
MP
MEP and MIP are both called MP (Maintenance Point).
10.1.4 SLA
SLA is a telecommunication service evaluating standard negotiated by service provider and users to
provide agreement to service quality, priority and responsibility, etc.
In technology, S LA is real-time ne twork performance de tection and statistic technology which c an
give s tatistics to responding t ime, ne twork j itter, delay, packet loss rate, etc. SLA can choose
different task for different application and monitor related measurement value.
Detection
Dynamic concept: it is used to describe a procedure of transmitting-receiving packet in operation test.
According to definition of operation, one operation test can contain multiple detections (one test only
contains one time of detection for Echo operation).
Schedule
Dynamic concept: it is used to describe a schedule of one operation; one schedule contains multiple
periodical tests executions.
228
www.raisecom.com User Manual
10.1.5 E-LMI
Refering to Frame Relay Local Management Interface Specification, MEF (Metro Ethernet Forum)
defines t he E thernet L ocal M anagement I nterface. E -LMI i s the O AM pr otocol to locate in UNI
(User-Network Interface), mainly used between CE and PE devices.
10.2 EFM
10.2.1 Preparation for configuration
10.2.1.1 Networking situation
Deploy E FM f eature be tween s traight t hrough c onnected de vices c an efficiently improve E thernet
link management and maintenance capability and ensure network running stable.
10.2.1.2 Preconditions
Before c onfiguring E FM, users ha ve to c onnect interface a nd configure physical pa rameters f or it,
the interface is Up at physical layer.
229
www.raisecom.com User Manual
230
www.raisecom.com User Manual
Note: EFM active function must be configured when the device is in active mode.
231
www.raisecom.com User Manual
232
www.raisecom.com User Manual
is configured at local.
233
www.raisecom.com User Manual
10.3 CFM
10.3.1 Preparation for configuration
10.3.1.1 Networking situation
234
www.raisecom.com User Manual
packet to confirm the status of RMEP. The device fault or link configuration error may make MEP
cannot fail to receive and process CCM from RMEP. If MEP hasnt recived remote CCM packet in
3.5 CCM intervals, the link is considered to be fault, system will send fault trap according to alarm
priority configuration.
Anyway, CFM implements end-to-end service OAM technology, reducing service provider operation
cost and improve competion.
10.3.1.2 Preconditions
235
www.raisecom.com User Manual
Note: CFM fault detection and location function cannot take effect unless enabling CFM function on
the device.
236
www.raisecom.com User Manual
237
www.raisecom.com User Manual
238
www.raisecom.com User Manual
239
www.raisecom.com User Manual
240
www.raisecom.com User Manual
241
www.raisecom.com User Manual
2 Raisecom#show ethernet cfm domain [ level level ] Show MD and service instance
configuration.
3 Raisecom#show ethernet cfm errors [ level level ] Shoe error CCM database
information.
4 Raisecom#show ethernet cfm lck [ level level ] Show Ethernet lockout signal.
10.4 SLA
10.4.1 Preparation for configuration
10.4.1.1 Networking situation
Carrier and customer sign SLA protocol to guarantee users can enjoy certain quality network service.
To perform SLA protocol effectively, carrier needs to deploy SLA feature test performance on device
and the test result is evidence to ensure users performance.
SLA feature chooses two testing node, configure SLA operation on one node and schedule executing
242
www.raisecom.com User Manual
SLA f eature s tatistics t he s huttle pa ckets dr opping r ate, s huttle or one -way ( SD/DS) de lay, jitter,
variance of jitter, distribution of jitter, etc. data and notify data to upper layer monitor software (like
NMS), then analyze network performance and get users wanted data.
10.4.1.2 Preconditions
243
www.raisecom.com User Manual
244
www.raisecom.com User Manual
10.5 E-LMI
10.5.1 Preparation for configuration
10.5.1.1 Networking situation
By E -LMI, PE can s end t he m apping i nformation from VLAN to EVC to CE and achieve t he
automatic configuration function of CE d evice. This not onl y reduces the work of t he business
establishment, but also the coordination work between service providers and enterprise users. As a
result, enterprise users neednt to know the configuration of CE devices; service provider will take
the integrateconfiguration and management which reduces the risk of human errors.
Cooperating w ith O AM pr otocol ( such a s C FM pr otocol), E -LMI can give f eedback of the EV C
status inf ormation in service pr ovider ne twork t o C E de vice timely. Once the E VC f ails, PE will
notify the CE device to access side route for switching.
10.5.1.2 Preconditions
Connect interface and configure the interface physical pa rameters, make the physical l ayer
status of interface Up;
Configure the physical layrer interface between PE and CE for Trunk mode.
Configure CFM between PE devices.
Value of N393counter 4
245
www.raisecom.com User Manual
Configure EVC
Step Configuration Description
2 Raisecom(config)#ethernet lmi evc Create EVC and enter EVC configuration mode.
evc-number evc-name
3 Raisecom(config-evc)#oam-protoco Bind EVC and CFM.
l cfm svlan vlan-id level level
The binding CFM service instance must be existed
and MEP is Up.
246
www.raisecom.com User Manual
Configure UNI
Step Configuration Description
247
www.raisecom.com User Manual
7 Raisecom(config-port)#ethernet lmi n391 value (Optional) Configure the value for N391 counter.
8 Raisecom(config-port)#ethernet lmi n393 value (Optional) Configure the value for N393 counter
of CE device.
248
www.raisecom.com User Manual
10.6 Maintenance
User can maintain OAM features by the below commands.
Command Description
As the Figure 10-5 s hows be low, de ploy E FM f eature on de vice t o i mprove E thernet l ink
management and maintenance capa bility be tween Switch A and Switch B. Switch A is active end,
Switch B is passive end. Deploy OAM event trap function on Switch A.
249
www.raisecom.com User Manual
As t he Figure 10-6 shows b elow, users communicate w ith server through t he ne twork bui ldup by
Switch A, Switch B a nd Switch C. To make E thernet l ink between server and user ge t
telecommunication service l evel, user can deploy C FM f eature on Switch device t o realize act ive
fault detection, acknowledgement and location. Switch A and Switch C are MEP, Switch B is M IP,
detecting Ethernet fault from Switch A Port 1 to Switch C Port 2, maintenance domain level is 3.
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
251
www.raisecom.com User Manual
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#create vlan 100 active
SwitchC(config)#interface port 2
SwitchC(config-port)#switch access vlan 100
SwitchC(config-port)#exit
SwitchC(config)#interface port 1
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
Configure Switch A.
SwitchA(config)#ethernet cfm domain level 3
SwitchA(config)#service ma1 level 3
SwitchA(config-service)#service vlan-list 100
SwitchA(config-service)#service mep up mpid 301 port 1
SwitchA(config-service)#service remote-mep 302
SwitchA(config-service)#service cc enable mep all
SwitchA(config-service)#exit
SwitchA(config)#ethernet cfm enable
Configure Switch B.
SwitchB(config)#ethernet cfm domain level 3
SwitchB(config)#service ma1 level 3
SwitchB(config-service)#service vlan-list 100
SwitchB(config-service)#exit
SwitchB(config)#ethernet cfm enable
Configure Switch C.
SwitchC(config)#ethernet cfm domain level 3
SwitchC(config)#service ma1 level 3
SwitchC(config-service)#service vlan-list 100
SwitchC(config-service)#service mep up mpid 302 port 2
SwitchC(config-service)#service remote mep 301
SwitchC(config-service)#service cc enable mep all
SwitchC(config-service)#exit
252
www.raisecom.com User Manual
253
www.raisecom.com User Manual
As the Figure 10-7 shows b elow, users com municate with server through t he ne twork bui ldup by
Switch A, Switch B and Switch C, deploying CFM on Switch to make Ethernet link between server
and user get telecommunication service level. C arrier deploys SLA feature on Switch A and
schedules execution periodically, then it is able to detect network performance between Switch A and
Switch C.
Switch A performs layer-2 delay test to Switch C. Configure y1731-echo on Switch A, operation ID
is 2, remote MEP is 2, MD level is 3, VLAN-ID is 100, service level is 0. Schedule life period is 20
seconds, testing period is 10 seconds.
254
www.raisecom.com User Manual
Cos: 0
Service Vlan ID: 100
Customer Vlan ID: 0
MD Level: 3
Remote MEP ID: 302
Timeout(sec): 5
Schedule Life(sec): 20
Schedule Period(sec): 10
Schedule Status: Completed!
As the Figure 10-8 shows below, users edge de vices CE A an d CE B acces s service provider
network and interconnect through PE A and PE B separately. Deploy CFM feature on PE device to
make t he E thernet l ink between PE ge t t elecommunication service levels and realize act ive f ault
detection. Deploy E-LMI between PE and CE to reduce the service provider and user coordination
working a nd r ealize t he a utomatic c onfiguration of CE, a nd a t t he s ame t ime m onitor E VC s tatus
through CFM. The MD level of CFM is 3, and SVLAN is 100.
Configure PE A.
Raisecom#hostname PEA
PEA#config
PEA(config)#create vlan 100 active
PEA(config)#interface port 1
PEA(config-port)#switchport mode trunk
PEA(config-port)#exit
PEA(config)#interface port 2
PEA(config-port)#switchport mode trunk
PEA(config-port)#exit
Configure PE B.
Raisecom#hostname PEB
PEB#config
PEB(config)#create vlan 100 active
255
www.raisecom.com User Manual
PEB(config)#interface port 1
PEB(config-port)#switchport mode trunk
PEB(config-port)#exit
PEB(config)#interface port 2
PEB(config-port)#switchport mode trunk
PEB(config-port)#exit
Configure PE A.
PEA(config)#ethernet cfm domain level 3
PEA(config)#service ma1 level 3
PEA(config-service)#service vlan-list 100
PEA(config-service)#service mep up mpid 301 port 1
PEA(config-service)#service remote-mep 302
PEA(config-service)#service cc enable mep all
PEA(config-service)#exit
PEA(config)#ethernet cfm enable
Configure PE B.
PEB(config)#ethernet cfm domain level 3
PEB(config)#service ma1 level 3
PEB(config-service)#service vlan-list 100
PEB(config-service)#service mep up mpid 302 port 2
PEB(config-service)#service remote-mep 301
PEB(config-service)#service cc enable mep all
PEB(config-service)#exit
PEB(config)#ethernet cfm enable
Configure PE A.
PEA(config)#ethernet lmi enable
PEA(config)#ethernet lmi pe
PEA(config)#ethernet lmi evc 1 evc1
PEA(config-evc)#oam-protocol cfm svlan 100 level 3
PEA(config-evc)#exit
PEA(config)#interface port 1
PEA(config-port)#ethernet lmi uni uni1
PEA(config-port)#ethernet lmi uni bundling
PEA(config-port)#ethernet lmi evc 1
PEA(config-port)#ethernet lmi ce-vlan map 100 evc 1
PEA(config-port)#exit
Configure PE B.
PEB(config)#ethernet lmi enable
256
www.raisecom.com User Manual
PEB(config)#ethernet lmi pe
PEB(config)#ethernet lmi evc 1 evc1
PEB(config-evc)#oam-protocol cfm svlan 100 level 3
PEB(config-evc)#exit
PEB(config)#interface port 2
PEB(config-port)#ethernet lmi uni uni1
PEB(config-port)#ethernet lmi uni bundling
PEB(config-port)#ethernet lmi evc 1
PEB(config-port)#ethernet lmi ce-vlan map 100 evc 1
PEB(config-port)#exit
Configure CE A.
Raisecom#hostname CEA
CEA#config
CEA(config)#ethernet lmi enable
CEA(config)#ethernet lmi ce
Configure CE B.
Raisecom#hostname CEB
CEB#config
CEB(config)#ethernet lmi enable
CEB(config)#ethernet lmi ce
Check whether E-LMI configuration is correct on PE device by the command of show ethernet lmi
config port-list port-list.
Take PE A as example.
PEA#show ethernet lmi config port-list 1
E-LMI Global Enable Status: Enable (default is disabled)
TrapEnable: Enable (default is enabled)
Mode: PE (default is PE)
-------------------------------------------------------------------------
E-LMI Interface client1 configuration:
E-LMI Interface Enable status: Enable (default is enabled)
Max EVC number: 64
N393: 4 (default is 4)
Notify Type: Aysn (default is Aysn)
T392 Enable Status: Enable (default is enabled)
T392: 15s (default is 15s)
Check whether the VLAN configuration is learnt correctly on CE device by the command of show
257
www.raisecom.com User Manual
vlan.
Take CE A as example.
CEA#show vlan
Switch Mode: --
VLAN Name State Status Priority Member-Ports
---------------------------------------------------------------
1 Default active static -- 1-6
100 VLAN0100 active static -- 3
258
www.raisecom.com User Manual
Overview
SNMP
KeepAlive
RMON
Cluster management
LLDP
Expanded OAM
SFP digital diagnostics
System LOG
Alarm management
Hardware environment detection
Fan monitor
CPU monitor
Check device information
Ping
Traceroute
Maintenance
Configuring applications
11.1 Overview
11.1.1 SNMP
SNMP ( Simple N etwork Management P rotocol) i s a dvanced by IETF (Internet E ngineering Task
Force) f or s olving m anagement pr oblem of ne twork de vices i n I nternet. S NMP l ets r emote
management for network devices supporting this protocol through one NMS (Network Management
System) possible, including monitor network status, modify network device configuration, receiving
network event alarm, etc. It is the widest applied network management protocol in TCP/IP network.
SNMP is separated into two parts: Agent and NMS. The Agent and NMS communicate b y SNMP
packets being sent through UDP. The working system of SNMP is shown in the Figure 11-1:
259
www.raisecom.com User Manual
Raisecom NView NNM system can provide friendly H MI ( Human Machine Interface) to facilitate
network management. The below functions can be realized through it:
Send request packets to the managed device.
Receive reply packets and Trap packets from the managed device, and show result.
Agent is a program stays in the managed device, realizing the below functions:
Receive/reply request packets from NView NNM system
To read/write packets and generate replay packets according to the packets type, then return
the result to NView NNM system
Define t rigger c ondition a ccording t o pr otocol m odules, e nter/exit s ystem or r eboot de vice
when c onditions a re s atisfied; r eplying module s ends Trap pa ckets t o N View NNM system
via agent to report current status of device.
Note: Agent can configure several versions, and different version communicates with different NMS.
But SNMP version of NMS must be consistent with agent when they are communicating so that they
can intercommunicate.
11.1.1.3 MIB
MIB ( Management Information B ase) i s t he c ollection of a ll obj ects managed by N MS. It de fines
attributes for the managed objects:
260
www.raisecom.com User Manual
Name
Access right
Data type
The device-related statistic contents can be reached by accessing data items. Each proxy has its own
MIB. MIB can be taken as an interface between NMS and Agent, through which NMS can
read/write every managed object in Agent to manage and monitor the device.
MIB store information in a tree structure, its root is on the top, without name. Nodes of the tree are
the managed obj ects, which take a u niquely pa th s tarting f rom r oot ( OID) f or i dentication. S NMP
protocol packets can access network devices by checking the nodes in MIB tree directory.
11.1.2 KeepAlive
KeepAlive packet is a ki nd of keepAlive mechanism running i n HDLC ( High-Level D ata Link
Control) l ink l ayer pr otocol. The de vice w ill s end a KeepAlive pa cket to c onfirm w hether the
opposite side is online every several seconds so as to realize neighbor detection mechanism.
Trap is the unrequested information sent by the device actively to NMS, used to report some urgent
and important events.
Switch s ends K eepAlive Trap pockers act ively which includes the basic inf ormation of s witch
(device name, device OID, MAC address and IP address). Network management synchronizes device
information by IP t o m ake t he NMS di scover ne twork s egment i n a s hour t ime, i mprove w orking
efficiency and reduce working load of administrators.
11.1.3 RMON
RMON ( Remote Network Monitoring) is a standard stipulated by IETF (Internet Engineering Task
Force) for network data monitoring through different network Agent and NMS.
RMON is achieved based on SNMP architecture, including the network management center and the
Agent running on network devices. On the foundation of SNMP, increase the subnet traffic, statistics,
and analysis to achieve the monitoring to one network segment and the whole network, while SNMP
only c an monitor t he partial inf ormation of a s ingle de vice and it is difficult for i t t o monitor one
network segment.
RMON Ag ent is c ommonly r eferred t o a s the pr obe pr ogram; R MON Probe can take the
communication s ubnet s tatistics a nd pe rformance a nalysis. W henever it finds network f ailure,
RMON Probe can report network management center, and describes the capture information under
unusual ci rcumstances so t hat the ne twork management cent er doesnt ne ed t o pol l the de vice
constantly. Compared with SNMP, RMON can monitor remote de vices more act ively and more
effectively, ne twork a dministrators c an t rack t he ne twork, network segment or de vice m alfunction
more quickly. T his a pproach r educes t he data traffics be tween network m anagement cent er and
Agent, makes it pos sible to manage l arge ne tworks simply and pow erfully, and m akes up the
limitations of SNMP in growing distributed Internet.
Embedded RMON. Embed RMON Agent directly to network devices (such as switches) to
make the m w ith RMON Probe f unction. N etwork m anagement c enter will collect network
management i nformation through the basic operation of SNMP and the exchange data
information of RMON Agent.
Our d evices a re e mbedded RMON. S hown i n F igure 1 1-2, t he de vice i mplements R MON Agent
function. Through this function, the management station can obtain the overall traffic, error statistics
and performance statistics information of this network segment connected to the managed network
device interface so as to achieve the monitoring to one segment.
RMON MIB can be divided into nine groups according to function. Currently, there are four function
groups achieved: statistics group, history group, alarm group, and event group.
Statistics group, responsible f or c ollecting statistics on an interface, including the r eceived packet
count and size distribution statistics;
History gr oup, s imilar t o t he s tatistics gr oup, but i t c ollects statistics information i n a de signated
testing period;
Alarm gr oup, w ithin t he s pecified t ime i nterval, monitor a s pecific m anagement i nformation base
(MIB) objects, and set the rising threshold and falling threshold; if the monitored object reaches the
threshold, an event is triggered;
Event group, coordinating with the alarm group, when the alarm triggers an event, it will be used to
record the c orresponding e vent information, s uch a s s end Trap i nformation, w rite into t he l og a nd
etc.
Users can set up a cl uster by master s witch so as to achieve the centralized management and
configuration to multiple devices added to the cluster. The main switch is called command device,
the other managed switches are member devices. Command device has a public IP address, while the
member devices do not set the IP address; the management and maintenance of member devices are
often achieved by command device redirection.
The c luster m anagement c an r educe t he w orkload of e ngineering a nd m aintenance, and also save
public IP address resources. Administrators only need to configure public IP address on one device to
achieve the management and maintenance of all cluster equipment without logging into each device
for configuration.
The benefits of c luster management are beyond doubt. H owever, when using cluster management,
different manufacturers ha ve di fferent i mplementations on t he c luster pr ogram, g enerally us ing
262
www.raisecom.com User Manual
proprietary pr otocols, c luster, w hich shows t hat the c luster m anagement t echnology ha s i ts
limitations
According to the different position and function of switches, the cluster has different roles. User can
configure to specify the role of switch. The cluster role can be command device, member device and
candidate device.
Command device (Commander): also known as management device, used to assign public IP
address t o provide m anagement i nterface f or al l s witch in the c luster. C ommand de vice
manages m ember de vice by command redirection: n etwork m anagement s ystem s ends
commands t o t he c ommand de vice for pr ocessing via t he publ ic ne twork. The c ommand
device will f orward c ommands t o m ember de vice i f i t f inds t he c ommands s hould b e
executed on member device. Command device can discover neighbor information, collect the
entire network topology, manage cluster, maintain cluster state, and support a variety of agent
functions.
Member device (Member): members in cluster, generally do not configure public IP address.
User manages member devices by commands redirection via the command device. Member
device can discover neighbor information, accept command device management, equipment,
execute t he c ommands from command device, and report fault/log. M ember device can b e
managed through network management system or Telnet mode directly on c ommand device
after activating.
Candidate device (Candidate): ha s not joi ned any c lusters but s till ha s c luster a bility to
become a cl uster m ember s witch. The di fference from member de vice i s the t opology
information of candidate device has already collected by command device but not yet joined
the c luster. When adding a candidate device to the cluster, the de vice will be come member
device; w hen r emoving a member device from the cluster, t he device will recover to
candidate device again.
As s hown i n Figure 1 1-3, the s witch c onfigured I P a ddress i s c ommand de vice, while the de vice
managed by command device redirection is member de vice. T he command device and member
263
www.raisecom.com User Manual
device can form a cluster. The device not joined cluster but still had cluster ability is candidate
device.
RNDP (Raisecom Neighbor Discover Protocol) is responsible for the neighbor discovery and
information gathering of devices.
RTDP (Raisecom Topology Discover Protocol) is responsible for the entire network topology
information collection and processing.
RCMP ( Raisecom C luster M anagement P rotocol) m ainly configures t o add, activate, and
delete cluster members.
RTDP and RCMP protocols take communication in the cluster V LAN. S o, if there are devices not
supporting RAISECOM cl uster m anagement function between the t wo devices f or cl uster
management, you ne ed t o c onfigure t he c luster VLAN to e nsure t he nor mal c ommunication of
RCMP and RTDP protocols.
Each cluster must specify a com mand device. After command device is specified, command device
can di scover and determine candidate de vice through neighbor discovery and topology gathering
protocol. Users can add candidate device to the cluster by corresponding configuration.
Candidate de vice will become m ember device af ter addi ng to cluster. If you w ant to m anage t he
device through cluster management function, you must activate the switch, or configure auto-active
function on switch.
11.1.5 LLDP
As the growing of network scale and the i ncreasing of network devices, ne twork t opology is
becoming m ore c omplex a nd network m anagement is become pa rticularly i mportant. T o t rack
changes i n network t opology information, m any ne twork management s oftware has a dopted the
"automatic di scovery" f unction, but m ost ne twork m anagement s oftware only can analyze t he
network layer topology without determining by which i nterface other devices connected t o other
devices.
LLDP ( Link Layer D iscovery P rotocol) is a link la yer di scovery pr otocol de fined by t he I EEE
802.1AB. Network m anagement s ystem c an m aster l ayer-2 network t opology a nd t he c hanges
quickly by the protocol.
LLDP or ganizes the l ocal device i nformation to di fferent T LV ( Type Length V alue uni t), a nd
encapsulates t hem in LLDPDU ( Link Layer D iscovery P rotocol Data U nit) to s end to direct-
connected neighbors. Meanwhile, LLDP will save the information from neighbors with the standard
MIB ( Management Information Base) f or m anagement s ystem to inquiry and judge links
communication status.
LLDPDU: da ta uni t of LLDP message. Before the c omposition of L LDPDU, the de vice w ill
264
www.raisecom.com User Manual
encapsulate local information to TLV, and a number of TLV will combine into one LLDPDU, which
encapsulated in the Ethernet data part will be transmitted.
Shown in Figure 11-4, LLDPDU is formed by a number of TLV, which contains four mandatory TLV
and a number of optional TLV.
TLV: uni t c ombining LLDPDU, which r efers t o t he unit de scribing t he object type, l ength a nd
information.
TLV st ructure is shown i n F igure 1 1-5: each TLV r epresents a piece of local i nformation. For
example, t he device ID and interface ID are corresponded to Chassis ID TLV and Por t ID TLV
separately.
TLV types are shown in Table 11-1, currently, it only uses the type of 0~8.
LLDP i s a poi nt-to-point one -way di stribution protocol, which sends L LDP m essages periodically
265
www.raisecom.com User Manual
from l ocal de vice t o oppo site de vice (or se nd LLDP messages w hen there i s cha nge in local
information) to notify the link state to opposite device.
The data traffic is as follows:
When sending, the de vice obtains system information r equired by the selected TLV, and
obtains configuration information from LLDP MIB, generates TLV, constitutes LLDPDU,
encapsulates to LLDP messages and sends them to opposite device.
After r eceiving LLDP messages, oppos ite de vice w ill a nalyze a ll the T LV information. If
there i s c hange, t he oppos ite de vice w ill upda te t he i nformation to LLDP neighbors M IB
table and inform NMS.
The aging time TTL (Time to live) of local device information in the neighbor node can be adjusted
by modifying t he pa rameter v alues of aging coefficient, s ends LLDP m essages t o ne ighbor node ,
after r eceiving LLDP messages, ne ighbor no de will adjust the a ging time of its neighbor n odes
(sending side) information. Aging time formula, TTL = Min {65535, (interval hold-multiplier)}:
Interval indicates the time period to send LLDP messages from neighbor node.
Hold-multiplier refers to the aging coefficient of device information in neighbor node.
Optical module digital diagnostics function can monitor the following performance parameters:
Module temperature
Inner supply voltage
Transmitting offset current
Transmitting optical power
Receiving optical power
When the pe rformance parameters r each alarm t hreshold or s tatus i nformation changes, the
corresponding Trap alarm will be generated.
System information and some debug outputs of ISCOM2924GF will be sent to system log. System
log s ends the i nformation t o di fferent de stination a ccording t o us er c onfiguration. The system log
destinations are as below:
Console: output log information to local Console through Console interface
Log host: output log information to log host in log file format
Monitor: output log information to monitor, such as Telnet terminal
File: output log information to device Flash in log file format
Buffer: output log information to buffer
Format of system log:
266
www.raisecom.com User Manual
Information levels:
critical 2 criticalstatus
Note: The severity level of output information can be set manually. According to the severity level, it
only outputs low level or the same level configuration information with severity level. For example,
configure i nformation out put f or s pecified level 3 (or a ssign the severity l evel e rrors di rectly); t he
level is 0 to 3, i.e. the information with severity level of emergencies ~ errors can be output.
Alarm information is used to report some of the urgent and important event and notify them to the
network administrator promptly, which provides strong support for monitoring device operation and
fault diagnosis.
Alarm information is stored in the alarm buffer, and at the same time generated to log information. If
configuring network management system, the alarm information will be sent to network management
267
www.raisecom.com User Manual
system through SNMP (Simple Network Management Protocol). The information sent to the network
management system is called Trap information.
The alarm information can be divided into three types according to alarm natures:
Fault alarm: refers t o the alarm for so me hardware fault or some abnormal important
functions, such as interface status down alarm;
Recovery alarm: re fers to the al arm for de vice failure or a bnormal function r eturning to
normal, such as interface status up alarm;
Event alarm: refers to the alarm indicating the prompted fault and recovery unmatched, such
as Ping probe failure alarm.
The alarm information can be divided into five types according to alarm functions:
Communication alarm: refers t o the alarms r elated to the processing of i nformation
transmission, i ncluding the c ommunication f ault between ne twork e lements, network
elements and network management systems or NMS and NMS.
Service quality alarm: refers to the alarms caus ed by service qua lity de gradation, including
congestion, performance decline, high resource utilization rate, and the bandwidth reducing.
Processing error alarm: refers t o the al arms caused by software or pr ocessing errors,
including s oftware e rrors, m emory ov erflow, v ersion mismatching, and t he a bnormal
program aborts.
Environmental a larm: refers t o the al arms caus ed by equipment l ocation-related pr oblems,
including the environment temperature, humidity, ventilation and other abnormal working
conditions.
Device alarm: refers to the alarms caused by physical resource failure, including power, fan,
processor, clock, input / output interfaces and other hardware devices.
Alarm information log output with the beginning of symbol "#", the output format is:
# Index TimeStamp HostName ModuleName / Severity / name: Arise From Description
The field description is shown in Table 11-3.
Field Description
268
www.raisecom.com User Manual
Field Description
The alarm level is used to identify the severity degree of an alarm. The level is defined in Table 11-4.
Critical (3) This alarm has affected system services and requires 1 (Alert)
immediate troubleshooting. Restore the device or source
immediately if they are completely unavailable, even it
is not during working time.
Major (4) This alarm has affected the service quality and requires 2 (Critical)
immediate troubleshooting. Restore the device or source
service quality if they decline; or take measures
immediately during working hours to restore all
performances.
Minor (5) This alarm hasnt influenced the existing service yet, 3 (Error)
which needs further observation and take measures at
appropriate time so as to avoid more serious fault.
Warning (6) This alarm will not affect the current service, but maybe 4 (Warning)
the potential error will affect the service, so it can be
considered as needing to take measures.
Indeterminate (2) Uncertain alarm level, usually the event alarm. 5 (Notice)
Cleared (1) This alarm shows to clear one or more reported alarms. 5 (Notice)
Alarm suppression
The device only records root-cause alarm, but not incidental alarm when enabling alarm suppression.
For example, the generation of alarm A will inevitably produce alarm B, then alarm B is suppressed
and doe snt appe ar i n alarm buffer and r ecord l og information when e nabling a larm s uppression.
Enabling alarm suppression can reduce the number of alarms effectively.
269
www.raisecom.com User Manual
The root-cause alarm and all other incidental alarms will be recorded on device when disabling alarm
suppression.
Alarm Auto-reporting
Auto-reporting refers to the a larm w ill be r eported t o network m anagement s ystem automatically
with i ts ge neration a nd ne ednt initiate inqui ries or s ynchronization. User can set auto-reporting
function to a larms generated f rom s ome property module ( alarm source), s ome interface ( alarm
source), and the specified property module in the specified interface.
Note: Alarm S ource: refers t o the alarm entities ge nerated related alarms, such as i nterface, alarm
module (in support of alarm features) and so on.
Alarm monitoring
Alarm monitoring is used to deal with each module alarms:
The alarm module will receive alarms generated by each module when enabling alarm
monitoring function, and deal with them according to the configuration of alarm module,
such as record alarm in alarm buffer, and record system logs, etc;
The a larm m odule w ill di scard t he a larm ge nerated by t he m odule without follow-up
treatment when disabling alarm monitoring function and the alarms will not be recorded
on the device.
User can take alarm monitoring to some property module, some interface or the specified property
module in the specified interface.
Currently, t he de vice is only in support of reverse mode configuration of the i nterface. There a re
three reverse modes to be set; the specific definitions are as follows:
No reverse mode
Device alarm is reported normally.
Manual reverse mode
Set the alarm reverse mode of an interface as manual reverse mode, then no matter what the current
alarm state is, the reported alarm state of the interface will be changed opposite to the actual alarm
state i mmediately, that is to say, not report when there are alarms, report when there arent alarms
actually. The interface will maintain the oppos ite alarm state regardless of the alarm state cha nges
before the alarm reverse state being restored to non-reverse mode.
Auto-reverse mode
Set the alarm re verse mode as aut o-reverse m ode. If t he i nterface hasnt actual r everse al arm
currently, the setting will return fail; if the interface has actual reverse alarm, the setting is success
and enter reverse m ode, i.e. t he i nterface r eported alarm s tatus is changed oppos ite t o t he actual
alarm s tatus immediately. After t he al arm is f inished, t he e nabling s tate of interface alarm reverse
will e nds automatically and cha nges to no n-reverse al arm mode so that t he al arm s tate can be
reported normally in next alarm.
Alarm delay
Alarm delay refers to the device will record alarms and report alarms to NMS after a delay time but
not immediately when alarms generate. Both recording delay time and reporting delay time are the
270
www.raisecom.com User Manual
same.
By default, the device alarm is reported once generating (0s), which is instant reporting; clear alarm
once it ends (0s), which is instant clearing.
271
www.raisecom.com User Manual
Power state change refers to the power present changes to power absent, or power absent changes to
power present state. ISCOM2924GF device is in support of dual power supplies, so the power state
change alarm can be divides into one power state of two powers changes and device power-down.
One power state of dual powers changes: the alarm e vent will inform user the state of
power 1/2 changes, which is in support of recording hardware monitoring alarm table,
Trap and Syslog output.
Device power-down: Both powers are down, that is to say, both powers are changed to
absent state, which is only support of Syslog output.
Temperature beyond threshold alarm
The device is in support of temperature beyond threshold alarm event, when the current temperature
is lower than low temperature threshold, the low temperature alarm event will generate, which is in
support of recording hardware monitoring alarm table, Trap and Syslog output.
When the device current temperature is higher than high temperature threshold, the high temperature
alarm e vent w ill ge nerate, w hich i s a lso i n support of recording ha rdware monitoring a larm t able,
Trap and Syslog output.
Voltage beyond threshold alarm
The device is in support of voltage beyond threshold alarm event, when the current voltage is lower
than low v oltage threshold, the low v oltage a larm e vent w ill ge nerate, w hich is in support of
recording hardware monitoring alarm table, Trap and Syslog output.
When the device current voltage is higher than high voltage threshold, the high voltage alarm event
will ge nerate, w hich i s a lso i n support of r ecording h ardware m onitoring a larm t able, T rap a nd
Syslog output.
Interface link-fault alarm: link failure alarm refers to the peer link signal loss. The alarm
event only aims at optical port, but not power port.
Interface link-down alarm: interface status Down alarm.
Interface not-forwarding alarm: The interface will change to non-forwarding state under
all VLAN.
All three alarm events are in support of recording hardware monitoring alarm table, Trap and Syslog
output.
272
www.raisecom.com User Manual
Trap output
Alarm information is output to network management center in Trap mode.
Trap output has global switch and all monitored alarm events still have their own Trap alarm output
switches. When enabling the global switch and monitored alarm events switches simultaneously, the
alarm will generate Trap output.
Field Description
Field Description
Mnemonics Alarm event type, please see table 11-5 for the detailed type deacription.
273
www.raisecom.com User Manual
Field Description
Check the ope rational s tatus of a ll ta sks and the de tailed running s tatus i nformation of assigned
tasks.
Check CPU history utilization within each period.
11.1.12 Ping
The na me of P ing comes from sonar location operation, us ed t o detect whether the ne twork
connection is normal.
Generally, Ping function is achieved with ICMP echo messages. Firstly, send echo request message
to an address, then the address corresponding device will respond to echo reply message. When echo
request reaches the de stination a ddress, the de vice w ill r eturn echo reply message to t he s ource
274
www.raisecom.com User Manual
address in an effective time to show the destination is reachable. If not receiving echo reply within
the effective time, the sending end will display timeout, which means the destination is unreachable.
Ping function principle is shown in Figure 11-6.
11.1.13 Traceroute
Same to P ing, Traceroute i s a commonly used maintenance method in network m anagement.
Traceroute function is often used to test the network nodes of messages from sender to destination,
detect whether the network connection is reachable and analyze network fault.
First, send a piece of TTL1 sniffer message (UDP port number of message is unavailable to
any application programs in destination side).
TTL deducts 1 when reaching the first hop; because the TTL value is 0, in the first hop, the
device returns an ICMP timeout message, indicating that this message cannot be sent.
The sending host will add 1 to TTL and resend this message.
Because TTL value was reduced to 0 in the second hop, the device will return an ICMP
timeout message, indicating that this message cannot be sent.
The above steps will continue until the messages reach destination host, which will not return ICMP
timeout message. Because the port number of destination host hasnt be used, destination host will
send port unreachable message and finish the test. Thus, the sending host can record the source
address of each ICMP T TL t imeout message, and a nalyze t he pa th t o de stination a ccording t o t he
response message. Traceroute function principle is shown in Figure 11-7.
275
www.raisecom.com User Manual
11.2 SNMP
11.2.1 Preparation for configuration
11.2.1.1 Networking situation
When us er needs t o l og o n ISCOM2924GF device t hrough N MS, pl ease configure SNMP basic
functions for ISCOM2924GF in advance.
11.2.1.2 Preconditions
276
www.raisecom.com User Manual
Community na me refers t o use different S NMP s tring to identify di fferent group. Different
community can have read-only or read-write access permission. G roups with read-only pe rmission
can only query the device information, while groups with read-write authority can configure the
device in addition to query the device information.
SNMP v1/ v2c uses t he community na me a uthentication scheme, a nd the SNMP packets which are
inconsistent to the community name will be discarded.
Please configure SNMP v1, v2c on the device as below.
277
www.raisecom.com User Manual
As the Figure 11-8 s hows, ne twrk m anagement s tation us es t he nor mal a ccess f rom S NMP v 3 t o
switch and the configuration is as below:
Configure user
Check which access group the user belongs to.
Configure view permission for access group.
Create view.
278
www.raisecom.com User Manual
Trap means the device sends unrequested information to NMS automatically, which is used to report
some critical events.
279
www.raisecom.com User Manual
11.3 KeepAlive
11.3.1 Preparation for configuration
11.3.1.1 Networking situation
Switch sends KeepAlive packet to make network management discover network segment in a short
time, improve working efficiency and reduce the working load of administrators. User can configure
to e nable or di sable t he K eepAlive t ransmission a nd i ts pe riod. When e nabling KeepAlive T rap
switch, if setting snmp enable traps and layer-3 IP address, switch will send a KeepAlive Trap to all
280
www.raisecom.com User Manual
11.3.1.2 Preconditions
Configure SNMP interface IP address.
Configure basic function of SNMP: SNMP v1 and v2c versions need to configure community
name; SNMP v3 needs to configure username and SNMP view.
Configure routing pr otocol, a nd m ake s ure r outing be tween ISCOM2924GF and N MS is
available.
Note: To avoid multiple de vices s ending KeepAlive Trap in the s ame t ime accor ding to the s ame
period and causing heavy network management load, the real transmission period of KeepAlive Trap
is timed as period+5s random transmission.
281
www.raisecom.com User Manual
11.4 RMON
11.4.1 Preparation for configuration
11.4.1.1 Networking situation
RMON can help user monitor network and statistic traffic flow.
RMON is a more efficient monitoring method than SNMP. User just needs to assign alarm threshold,
device over t hreshold w ill s end trap information without variable information, which r educes
communication amount between management device and managed device management and provides
simple and efficient management to network.
11.4.1.2 Preconditions
The monitored MIB variable must be real, and the data value type is correct. If the setting variable
does not exist or value type variable is incorrect, return error. In the successfully setting alarm, if the
variable can not be collected later, close the alarm; reset if you want to monitor the variable again.
By default, the triggered event number is 0, refers to no triggered event. If the number is not zero,
and there is no corresponding configuration in event group, when the control variable is abnormal, it
cannot trigger the event successfully until the event is established.
Alarm will be triggered as long as matching the condition when configuring the upper or lower limits
for one of the e vents in the event table. If there is no c onfiguration for the up per and lower limits
related alarm event (rising-event-id, falling-event-id) in the event table, alarm will not generate even
meeting the alarm conditions.
283
www.raisecom.com User Manual
11.5.1.2 Preconditions
285
www.raisecom.com User Manual
Note:
This configuration only applies to command device.
If the device is cluster member device, restart the device if you want to take it as command
device. At this time, the device has become the command device, but because there is already
a command device in network, the device still cannot manage other devices.
Please take the following configuration on the device:
In order to facilitate the users to add and activate cluster members on command device, allow user
using the s ame us er na me and password to add and activate a ll t he candi date de vices, or to all
candidate de vices which can activate aut omatically by this command, or t o add and activate al l
candidate devices one by one in the prompt of device command echo contents.
286
www.raisecom.com User Manual
User must set MAC address for auto-active subordinated command device after setting auto-active
function on candidate de vice, and t hen the ca ndidate d evice can be act ivated automatically b y i ts
subordinated command device if the command device is configured to add and activate all candidate
members to cluster automatically when connecting the device to network.
Please take the following configuration on the device:
In c luster c onfiguration m ode, us er can t ake r emote m anagement t o activated member de vices on
command device. User can login activated cluster members according to the following steps.
Please take the following configuration on the device:
287
www.raisecom.com User Manual
11.6 LLDP
11.6.1 Preparation for configuration
11.6.1.1 Networking situation
When users obtain connection information between devices through NView NNM system for
topology di scovery, the de vices need t o e nable L LDP f unction, not ify their inf ormation to the
neighbors mutually, and store neighbor information to facilitate the NView NNM system queries.
11.6.1.2 Preconditions
N/A
Aging coefficient 4
Restart timer 2s
288
www.raisecom.com User Manual
289
www.raisecom.com User Manual
Fault di agnostics f unction of opt ical m odule pr ovides a detection m ethod to SFP pe rformation
parameters; user can predict t he s ervice l ife of opt ical m odule, isolate s ystem f ault and check its
compatibility during installation through analyzing the monitoring data.
290
www.raisecom.com User Manual
11.7.1.2 Preconditions
N/A
291
www.raisecom.com User Manual
Device will generate the key information, debugging information, error information, etc. to system
log, output a s log file or transmit to log host, Console port or control c onsole to facilitate users to
check and locate the fault.
11.8.1.2 Preconditions
N/A
292
www.raisecom.com User Manual
Output log information to console Enable, the default level is information (6).
Output log information to host N/A, the default level is information (6).
Output log information to file Disable, the fixed level is warning (4).
Output log information to monitor Disable, the default level is information (6).
Output log information to buffer Disable, the default level is information (6).
294
www.raisecom.com User Manual
When t he d evice f ails, alarm management m odule will collect fault information and output alarm
occurrence time, alarm name and description information in log format to help users locate problem
quickly.
If the device is configured network management system, alarm information can be reported directly
to the network management system, providing possible alarm causes and treatment recommendations
to help users deal with fault.
Alarm management makes it easy for the user to take alarm suppression, alarm auto-reporting, alarm
monitoring, alarm reverse, alarm delay, alarm memory mode, alarm clear and alarm view directly on
the device.
11.9.1.2 Preconditions
N/A
296
www.raisecom.com User Manual
11.10.1.2 Preconditions
In Syslog output mode, alarm information will generate system log. When you need to send
alarm information to the system log host, please configure system log host IP address for the
device.
In Trap output mode, please configure network management center IP address for the device.
297
www.raisecom.com User Manual
298
www.raisecom.com User Manual
299
www.raisecom.com User Manual
When putting I SCOM2924GF in very hot environment, t he high temperature may influent he at
exhausting performance of the device, then configure fan monitor function to make the device adjust
temperature automatically according t o e nvironment t emperature a nd m aintain nor mal r unning of
device.
300
www.raisecom.com User Manual
11.11.1.2 Preconditions
N/A
CPU monitor can give real-time monitoring to task state, CPU utilization rate and stack usage in the
system, provide C PU ut ilization rate threshold alarm, de tect a nd e liminate hidden dangers, or he lp
administrator for fault location.
11.12.1.2 Preconditions
301
www.raisecom.com User Manual
302
www.raisecom.com User Manual
11.14 Ping
Please configure Ping function on the device as below:
11.15 Traceroute
Configure the I P address an d default ga teway f or ISCOM2924GF de vice be fore us ing T raceroute
function.
Please configure Traceroute function on the device as below:
303
www.raisecom.com User Manual
11.16 Maintenance
User can maintain system features by the following commands.
Command Description
As the Figure 11-9 shows below, route between NView NNM system and Switch is available, Nview
NNM can check the MIB unde r v iew corresponding to r emote s witch b y S NMP v 1/v2c, a nd t he
switch can send Trap automatically to Nview NNM in emergency.
By default, there is VLAN1 in switch and all physical interfaces belong to VLAN1.
304
www.raisecom.com User Manual
305
www.raisecom.com User Manual
Port: 162
User Name: raisecom
SNMP Version: v2c
Security Level: noauthnopriv
TagList: bridge config interface rmon snmp ospf
As t he Figure 11-10 s hows be low, r oute be tween NView N NM s ystem a nd S witch i s a vailable,
Nview N NM monitors A gent by S NMP v 3, and t he s witch c an s end Trap automatically to Nview
NNM when Agent is in emergency.
By default, there is VLAN1 in switch and all physical interfaces belong to VLAN1.
Create access view mib2, including all MIB variables under 1.3.6.1.x.1.
Raisecom(config)#snmp-server view mib2 1.3.6.1.2.1 1.1.1.1.0.1 included
Create user guestuser1, use md5 authentication algorithm, password is Raisecom.
Raisecom(config)#snmp-server user guestuser1 authentication md5 raisecom
Create gue stgroup a ccess g roup, s ecurity mode i s us msecurity le vel is a uthentication w ithout
encryption, readable view name is mib2.
Raisecom(config)#snmp-server access guestgroup read mib2 usm authnopriv
Configure guestuser1 user mapping to access group guestgroup.
Raisecom(config)#snmp-server group guestgroup user guestuser1 usm
306
www.raisecom.com User Manual
As the Figure 11-11 shows below, the IP address of switch is 192.168.1.2, Trap target host address of
SNMPv2c is 1 92.168.1.1, read a nd w rite c ommunity na me i s publ ic, S NMP v ersion i s v 2c.
Configure time interval sending KeepAlive Trap from switch to SNMP network management station
307
www.raisecom.com User Manual
As the Figure 11-12 shows below, ISCOM2924GF device is Agent, connecting to terminal through
Console interface, c onnecting t o r emote NNM s ystem t hrough I nternet. Enable RMON statistic
function and statistic performance for Port 3. When interface receiving packets exceeds the threshold
in a period, record log and send Trap alarm.
308
www.raisecom.com User Manual
Create e vent w ith index I D 10, us ed t o r ecord a nd s end l og information with description s tring
High-ifOutErrors, the owner of log information is system.
Raisecom#config
Raisecom(config)#rmon event 1 log description High-ifOutErrors owner system
Create a larm i tem w ith i ndex I D 1 0, used t o m onitor M IB variables 1.3.6.1.2.1.2.2.1.20.1, c heck
every 20 seconds, if the variable increases over 15, the Trap alarm is triggered, the owner of alarm
information is also system.
Raisecom(config)#rmon alarm 10 1.3.6.1.2.1.2.2.1.20.1 interval 20 delta rising-threshold 15 1 falling-threshold
0 owner system
Check w hether t here i s e vent gr oup i nformation on t he de vice by t he c ommand of show rmon
alarms.
Raisecom#show rmon alarms
Alarm 10 is active, owned by system
Monitors 1.3.6.1.2.1.2.2.1.20.1 every 20 seconds
Taking delta samples, last value was 0
Rising threshold is 15, assigned to event 1
Falling threshold is 0, assigned to event 0
On startup enable rising and falling alarm
Check w hether t here i s a larm gr oup i nformation on t he de vice by the c ommand of show rmon
events.
Raisecom#show rmon events
Event 1 is active, owned by system
Event generated at 0:0:0
Send TRAP when event is fired.
When alarm event is triggered, user can also check related information by alarm management part of
NNM system.
309
www.raisecom.com User Manual
A lot of de vices in layer-2 network ne ed to be managed, but current IP a ddress re source in public
network is limited. User wants to use one device to manage other device.
Cluster management function can us e one IP ad dress t o manage m upltiple devices i n a cl uster.
Manage all member devices in cluster through command device and remote log in member device
for configuration and maintenance.
As the Figure 11-13 shows below, Switch A is command device, MAC address is 000e.5e03.5318;
Switch B an d Switch C is cl uster m ember de vice, M AC ad dress i s 000E.5EBD.5951 and
000E.5E03.023C separately. Configure cluster management function to realize remote management
and maintenance from Switch A log onto Switch B and Switch C.
310
www.raisecom.com User Manual
SwitchA(config)#cluster-autoactive
Assign itself for command device and start cluster management function.
SwitchA(config)#cluster
Configure auto-build and activate all candidate devices.
SwitchA(config-cluster)#member auto-build active raisecom raisecom all
SwitchA(config-cluster)#exit
Configure to enable RNDP and RTDP function on Switch B, and enable auto-active function, assign
MAC address for auto-active command device.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#rndp enable
SwitchB(config)#interface port 3
SwitchB(config-port)#rndp enable
SwitchB(config-port)#exit
SwitchB(config)#rtdp enable
SwitchB(config)#cluster-autoactive
SwitchB(config)#cluster-autoactive commander-mac 000e.5e03.5318
Configure to enable RNDP and RTDP function on Switch C, and enable auto-active function, assign
MAC address for auto-active command device.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#rndp enable
SwitchC(config)#interface port 3
SwitchC(config-port)#rndp enable
SwitchC(config-port)#exit
SwitchC(config)#rtdp enable
SwitchC(config)#cluster-autoactive
SwitchC(config)#cluster-autoactive commander-mac 000e.5e03.5318
311
www.raisecom.com User Manual
SwitchA(config)#cluster
SwitchA(config-cluster)#rcommand SwitchC
Login: raisecom
Password:
SwitchC>
As the Figure 11-14 shows below, switch is c onnected t o Nview N NM; enable LLDP be tween
Switch A and Switch B, query layer-2 link change through Nview NNM system. The neighbor aging,
new neighbor and neighbor i nformation changes w ill be reported LLDP a larm to N View NNM
system.
312
www.raisecom.com User Manual
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#lldp enable
SwitchA(config)#snmp-server lldp-trap enable
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#lldp enable
SwitchB(config)#snmp-server lldp-trap enable
SwitchB(config)#interface ip 1
SwitchB(config-ip)#ip address 10.10.10.2 1024
Configure Switch A.
SwitchA(config)#lldp message-transmission interval 60
SwitchA(config)#lldp message-transmission delay 9
SwitchA(config)#lldp trap-interval 10
Configure Switch B.
SwitchB(config)#lldp message-transmission interval 60
SwitchB(config)#lldp message-transmission delay 9
SwitchB(config)#lldp trap-interval 10
As the Figure 11-15 shows below, configure sytem log function, output device log information to log
host for user to check.
Raisecom#show logging
Syslog logging: enable
Dropped Log messages: 0
Dropped debug messages: 0
Rate-limited: 2 messages per second
Logging config: disable
Logging config level: informational(6)
Squence number display: disable
Log time stamp: datetime
Debug time stamp: none
Log buffer size: 4kB
Debug level: low
Syslog history logging: disable
Syslog history table size:1
Dest Status Level LoggedMsgs DroppedMsgs Discriminator
-----------------------------------------------------------------------------
buffer disable informational(6) 0 0 0
console enable informational(6) 203 4 0
trap disable warnings(4) 0 0 0
file disable warnings(4) 0 0 0
monitor disable informational(6) 0 0 0
Log host information:
Max number of log server: 10
Current log server number: 1
Target Address Port Level Facility Sent Drop Discriminator
-----------------------------------------------------------------------------------------------
20.0.0.168 0 warnings(4) local7 1 0 0
Show device log information typed from PC terminal emulation program interface.
07-01-2008 11:31:28 Local0.Debug 20.0.0.6 JAN 01 10:22:15 ISCOM2924GF:
CONFIG-7-CONFIG:USER " raisecom " Run " logging on "
07-01-2008 11:27:41 Local0.Debug 20.0.0.6 JAN 01 10:18:30 ISCOM2924GF:
CONFIG-7-CONFIG:USER " raisecom " Run " ip address 20.0.0.6 255.0.0.0 1 "
07-01-2008 11:27:35 Local0.Debug 20.0.0.10 JAN 01 10:18:24 ISCOM2924GF:
CONFIG-7-CONFIG:USER " raisecom " Run " ip address 20.0.0.6 255.0.0.1 1 "
07-01-2008 11:12:43 Local0.Debug 20.0.0.10 JAN 01 10:03:41 ISCOM2924GF:
CONFIG-7-CONFIG:USER " raisecom " Run " logging host 20.0.0.168 local0 7 "
07-01-2008 11:12:37 Local0.Debug 20.0.0.10 JAN 01 10:03:35 ISCOM2924GF:
CONFIG-7-CONFIG:USER " raisecom " Run " logging on "
As the Figure 11-16 shows below, configure hardware environment monitoring function to monitor
device temperature information. When the temperature exceeds threshold, alarm information will be
output t o network m anagement c enter i n Trap m ode. U ser w ill t ake c orresponding m easures t o
316
www.raisecom.com User Manual
prevent fault.
317
www.raisecom.com User Manual
Power Supply
Notifies: Disabled
Syslog: Enabled
Temperature
High threshold(Celsius): 50
Low threshold(Celsius): 20
Notifies: Enabled
Syslog: Enabled
Voltage
High threshold: 3450mV
Low threshold: 3150mV
Notifies: Disabled
Syslog: Disabled
318
www.raisecom.com User Manual
Provide a port association solution, extending link backup range. Transport fault
Failover of upper layer device quickly to downstream device by monitoring upstream link
and synchronize downstream link, then trigger switching between master and
standby device and avoid traffic loss.
IEEE 1588 v2 protocol is also called PTP (Precision Time Protocol), a
Precision Time high-precision time protocol for synchronization used in measurement and
ProtocolPTP control systems residing on a local area network. Accuracy in the
sub-microsecond range may be achieved with low-cost implementations.
Connectivity A standard defined by IEEE. It defines protocols and practices for OAM
Fault (Operations, Administration, and Maintenance) for paths through 802.1 bridges
and local area networks (LANs). Used to diagnose fault for EVC (Ethernet
Management
Virtual Connection). Cost-effective by fault management function and improve
CFM
Ethernet maintenance.
A computer networking term which describes using multiple network
Link
cables/ports in parallel to increase the link speed beyond the limits of any one
Aggregation
single cable or port, and to increase the redundancy for higher availability.
A technology adopts Ethernet link codes recover clock, similar to SDH clock
SyncE synchronization quality, SyncE provides frequency synchronization of high
precision. Unlike traditional Ethernet just synchronize data packets at receiving
node, SyncE implements real-time synchronization system for inner clock.
QinQ is (also called Stacked VLAN or Double VLAN) extended from 802.1Q,
defined by IEEE 802.1ad recommendation. Basic QinQ is a simple layer-2 VPN
802.1Q in tunnel technology, encapsulating outer VLAN Tag for client private packets at
802.1Q carrier access end, the packets take double VLAN Tag passing through trunk
network (public network). In public network, packets only transmit according to
outer VLAN Tag, the private VLAN Tag are transmitted as data in packets.
Solve communication problem from BTS to BSC for 2G, NodeB to RNC for 3G.
Mobile backhaul for 2G focuses on voice service, not request high bandwidth,
implemented by TDM microwave or SDH/PDH device.
Mobile
Backhaul In 3G times, lots of data service as HSPA, HSPA+, etc concerning to IP service,
voice is changing to IP as well, namely IP RAN, to solve problem of IP RAN
mobile backhaul is solving whole network backhaul, satisfying both data
backhaul and voice transportation over IP (clock synchronization).
Ethernet Ring An APS (Automatic Protection Switching) protocol based on ITU-T G.8032
Protection Recommendation to provide backup link protection and recovery switching for
Switching Ethernet traffic in a ring topology and at the same time ensuring that there are no
ERPS loops formed at the Ethernet layer.
Ethernet Linear A protocol based on ITU-T G.8031 APS (Automatic Protection Switching) to
Protection protect an Ethernet connection. It is a kind of end-to-end protection technology.
Switching Including two linear protection modes: linear 1:1 protection switching and linear
ELPS 1+1 protection switching.
319
www.raisecom.com User Manual
Appendix B Acronym
320
www.raisecom.com User Manual
IP Internet Protocol
MA Maintenance Association
MD Maintenance Domain
PC Personal Computer
Q
321
www.raisecom.com User Manual
SP Strict-Priority
322
Address: Building 2, No. 28 of the Shangdi 6th Street, Haidian District, Beijing. Postcode:
100085 Tel: +86-10-82883305 Fax: +86-10-82883056 Email: [email protected]
http://www.raisecom.com