Iscom2828f Configuration Guide Rel - 01 PDF
Iscom2828f Configuration Guide Rel - 01 PDF
com
ISCOM2828F (D)
Configuration Guide
(Rel_01)
Raisecom Technology Co., Ltd. provides customers with comprehensive technical support and services. For any
assistance, please contact our local office or company headquarters.
Website: http://www.raisecom.com
Tel: 8610-82883305
Fax: 8610-82883056
Email: [email protected]
Address: Building 2, No. 28, Shangdi 6th Street, Haidian District, Beijing, P.R.China
Postal code: 100085
-----------------------------------------------------------------------------------------------------------------------------------------
Notice
Copyright © 2013
Raisecom
All rights reserved.
No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in Writing from Raisecom
Technology Co., Ltd.
Preface
Objectives
This guide describes features supported by the ISCOM2828F, and related configurations,
including basic principles and configuration procedures of Ethernet, route, reliability, OAM,
security, and QoS, and related configuration examples. The appendix lists terms, acronyms,
and abbreviations involved in this guide.
By reading this guide, you can master principles and configurations of the ISCOM2828F, and
how to network with the ISCOM2828F.
Versions
The following table lists the product versions related to this document.
Conventions
Symbol conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates a hazard with a medium or low level of risk which, if
not avoided, could result in minor or moderate injury.
Symbol Description
Indicates a tip that may help you solve a problem or save time.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman.
Arial Paragraphs in Warning, Caution, Notes, and Tip are in Arial.
Boldface Names of files, directories, folders, and users are in boldface.
For example, log in as user root.
Italic Book titles are in italics.
Lucida Console Terminal display is in Lucida Console.
Command conventions
Convention Description
Change history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Issue 01 (2013-08-02)
Initial commercial release
Contents
2 Ethernet ......................................................................................................................................... 35
2.1 MAC address table ......................................................................................................................................... 35
2.1.1 Introduction ........................................................................................................................................... 35
2.1.2 Preparing for configurations ................................................................................................................. 37
2.1.3 Default configurations of MAC address table ....................................................................................... 37
2.1.4 Configuring static MAC address ........................................................................................................... 37
2.1.5 Configuring multicast filtering mode for MAC address table ............................................................... 38
2.1.6 Configuring MAC address learning ...................................................................................................... 38
2.1.7 Configuring MAC address limit............................................................................................................ 38
2.1.8 Configuring aging time of MAC addresses ........................................................................................... 39
2.1.9 Checking configurations ....................................................................................................................... 39
2.1.10 Maintenance ........................................................................................................................................ 39
2.1.11 Example for configuring MAC address table ...................................................................................... 40
2.2 VLAN ............................................................................................................................................................. 41
2.2.1 Introduction ........................................................................................................................................... 41
2.2.2 Preparing for configurations ................................................................................................................. 43
2.2.3 Default configurations of VLAN .......................................................................................................... 43
2.2.4 Configuring VLAN attributes ............................................................................................................... 44
2.2.5 Configuring interface mode .................................................................................................................. 44
2.2.6 Configuring VLAN on Access interface ............................................................................................... 45
2.2.7 Configuring VLAN on Trunk interface ................................................................................................. 45
2.2.8 Checking configurations ....................................................................................................................... 46
2.3 QinQ ............................................................................................................................................................... 47
2.3.1 Introduction ........................................................................................................................................... 47
2.3.2 Preparing for configurations ................................................................................................................. 48
3 IP services ..................................................................................................................................... 73
3.1 ARP ................................................................................................................................................................ 73
3.1.1 Introduction ........................................................................................................................................... 73
3.1.2 Preparing for configurations ................................................................................................................. 74
4 QoS ................................................................................................................................................. 97
4.1 Introduction .................................................................................................................................................... 97
4.1.1 Service model........................................................................................................................................ 97
4.1.2 Priority trust .......................................................................................................................................... 98
4.1.3 Traffic classification .............................................................................................................................. 99
4.1.4 Traffic policy ....................................................................................................................................... 100
4.1.5 Priority mapping ................................................................................................................................. 101
4.1.6 Congestion management ..................................................................................................................... 102
4.1.7 Rate limiting based on interface and VLAN ....................................................................................... 103
4.2 Configuring basic QoS ................................................................................................................................. 103
4.2.1 Preparing for configurations ............................................................................................................... 103
4.2.2 Default configurations of basic QoS ................................................................................................... 103
4.2.3 Enabling global QoS ........................................................................................................................... 104
4.2.4 Checking configurations ..................................................................................................................... 104
4.3 Configuring traffic classification and traffic policy ..................................................................................... 104
4.3.1 Preparing for configurations ............................................................................................................... 104
4.3.2 Default configurations of traffic classification and traffic policy ....................................................... 104
4.3.3 Creating traffic classification .............................................................................................................. 105
4.3.4 Configuring traffic classification rules ................................................................................................ 105
4.3.5 Creating token bucket and rate limiting rules ..................................................................................... 106
4.3.6 Creating traffic policy ......................................................................................................................... 106
4.3.7 Defining traffic policy mapping .......................................................................................................... 106
4.3.8 Defining traffic policy operations ....................................................................................................... 107
4.3.9 Applying traffic policy to interfaces .................................................................................................... 108
4.3.10 Checking configurations ................................................................................................................... 108
4.3.11 Maintenance ...................................................................................................................................... 109
4.4 Configuring priority mapping ...................................................................................................................... 109
4.4.1 Preparing for configurations ............................................................................................................... 109
4.4.2 Default configurations of basic QoS ................................................................................................... 109
4.4.3 Configuring interface-trusted priority type ......................................................................................... 110
4.4.4 Configuring CoS to local priority ....................................................................................................... 110
4.4.5 Configuring mapping from DSCP to local priority ............................................................................. 111
4.4.6 Configuring mapping from local priority to DSCP ............................................................................. 111
6 Security........................................................................................................................................ 146
6.1 ACL .............................................................................................................................................................. 146
6.1.1 Introduction ......................................................................................................................................... 146
6.1.2 Preparing for configurations ............................................................................................................... 146
6.1.3 Default configurations of ACL............................................................................................................ 147
6.1.4 Configuring IP ACL ............................................................................................................................ 148
6.1.5 Configuring MAC ACL ...................................................................................................................... 148
6.1.6 Configuring MAP ACL ....................................................................................................................... 148
6.1.7 Applying ACL ..................................................................................................................................... 151
6.1.8 Checking configurations ..................................................................................................................... 153
6.1.9 Maintenance ........................................................................................................................................ 153
6.2 Secure MAC address .................................................................................................................................... 153
6.2.1 Introduction ......................................................................................................................................... 153
6.2.2 Preparing for configurations ............................................................................................................... 155
6.2.3 Default configurations of port security MAC ..................................................................................... 155
6.2.4 Configuring basic functions of port security MAC ............................................................................. 155
6.2.5 Configuring static secure MAC address.............................................................................................. 156
6.2.6 Configuring dynamic secure MAC address ........................................................................................ 156
6.2.7 Configuring sticky secure MAC address ............................................................................................ 157
6.2.8 Checking configurations ..................................................................................................................... 158
Figures
Figure 1-1 Accessing the ISCOM2828F through PC connected with Console interface ....................................... 2
Figure 1-2 Communication parameters in Hyper Terminal .................................................................................... 3
Figure 2-6 Networking with VLAN mapping based on single Tag ...................................................................... 55
Figure 5-1 Mapping relation between IPv4 multicast address and multicast MAC address .............................. 122
Figure 6-11 Accessing the network through PPPoE authentication ................................................................... 192
Figure 7-9 VLAN packet forward failure due to RSTP ..................................................................................... 226
Figure 7-13 Networking of multiple spanning trees instances in MST domain ................................................. 234
Figure 8-4 Network Sketch Map of MEP and MIP ............................................................................................ 273
Figure 9-9 Providing remote access through cluster management ..................................................................... 316
Figure 9-14 Configuring extended OAM to manage the remote device ............................................................ 341
Tables
Table 1-1 Function keys description for command line message display characteristics ..................................... 13
Table 2-1 Interface mode and packet processing.................................................................................................. 42
Table 4-1 Mapping relationship of local priority, DSCP priority, and CoS priority ........................................... 101
Table 4-2 Mapping between local priority and queue ........................................................................................ 102
Table 4-3 Default CoS to local priority and color mapping relationship ............................................................ 110
Table 4-4 Default DSCP to local priority and color mapping relationship ......................................................... 110
1 Basic configurations
This chapter introduces the basic configuration and configuration process about the
ISCOM2828F and provides related configuration examples, including the following sections:
Accessing device
CLI
Managing users
Managing files
Configuring clock management
Configuring interface management
Configuring basic information
Task scheduling
Watchdog
Loading and upgrading
When logging in to the ISCOM2828F through the Console interface, use the CBL-
RS232-DB9F/RJ45-2m cable delivered with the ISCOM2828F. If you need to make
the Console serial cable, see ISCOM2828F (D) Hardware Description.
If you want to access the ISCOM2828F through PC via Console interface, connect Console
interface and PC RS-232 serial interface, as shown in Figure 1-1; then run the terminal
emulation program such as Windows XP Hyper Terminal program in PC to configure
communication parameters as shown in Figure 1-2, and then log in to the ISCOM2828F.
Figure 1-1 Accessing the ISCOM2828F through PC connected with Console interface
Telnet Client: connect the ISCOM2828F with a PC through the terminal emulation
program or Telnet client program on the PC, then telnet other ISCOM2828F devices for
configuration and management. As shown in Figure 1-4, Switch A not only acts as Telnet
server but also provides Telnet client service.
which can effectively prevent the disclosure of information in remote management through
data encryption, and provides greater security for remote login and other network services in
network environment.
SSHv2 allows data to be exchanged via TCP and it builds up a secure channel over TCP.
Besides, SSHv2 supports other service ports besides standard port 22, thus avoiding illegal
attack from network.
Before accessing the ISCOM2828F via SSHv2, you must log in to the ISCOM2828F through
Console interface and startup SSHv2 service.
Default configurations to access the ISCOM2828F through SSHv2 are as below.
1.2 CLI
1.2.1 Introduction
CLI is the path for communication between user and the ISCOM2828F. You can configure,
monitor, and manage the ISCOM2828F by executing related commands.
You can log in to the ISCOM2828F through a PC that runs the terminal emulation program or
the CPE device. You can enter into CLI once the command prompt appears.
The features of CLI:
Local configuration through the Console interface is available.
Local or remote configuration through Telnet, Secure Shell v2 (SSHv2) is available.
Protection for different command levels, users in different levels can only execute
commands in corresponding levels.
Different command types belong to different command modes. You can only execute a
type of configuration in its related command mode.
You can operate commands by shortcut keys.
You can view or execute a historical command by transferring history record. The
ISCOM2828F supports saving the latest 20 historical commands.
Online help is available by inputting "?" at any time.
Support smart analysis methods, such as incomplete matching and context association, to
facilitate user input.
Raisecom>
Input the enable command and correct password, and then enter privileged EXEC mode. The
default password is raisecom.
Raisecom>enable
Password:
Raisecom#
In privileged EXEC mode, input the config terminal command to enter global configuration
mode.
Raisecom#config terminal
Raisecom(config)#
Command line prompt "Raisecom" is the default host name. You can use the
hostname string command to modify the host name in privileged EXEC mode.
Some commands can be used both in global configuration mode and other modes,
but the accomplished functions are closely related to command line modes.
Generally, in a command line mode, you can go back to the previous level
command line mode by using the quit or exit command, but in the privileged
EXEC mode, you need to use the disable command to go back to user EXEC
mode.
Users can go back to privileged EXEC mode through the end command from any
command line mode except the user EXEC mode or privileged EXEC mode.
The ISCOM2828F supports the following command line modes:
Shortcut Description
Up cursor key (↑) Show previous command if there is any command input
earlier; the display has no change if the current command is
the earliest one in history records.
Down cursor key (↓) Show next command if there is any newer command; the
display has no change if the current command is the newest
one in history records.
Left cursor key (←) Move the cursor one character to left; the display has no
change if the cursor is at the beginning of command.
Right cursor key (→) Move the cursor one character to right; the display has no
change if the cursor is at the end of command.
Backspace Delete the character before the cursor; the display has no
change if the cursor is at the beginning of command.
Tab Click Tab after inputting a complete keyword, cursor will
automatically appear a space to the end; click Tab again, the
system will show the follow-up inputting keywords.
Click Tab after inputting an incomplete keyword, system
automatically executes partial helps:
System take the complete keyword to replace input if the
matched keyword is the one and only, and leave one word
space between the cursor and end of keyword;
In case of mismatch or matched keyword is not the one and
next line and prompt error, the input keyword will not
change.
Shortcut Description
Ctrl+A Move the cursor to the head of line.
Ctrl+C Break off some running operation, such as ping, traceroute
and so on.
Ctrl+D or Delete Delete the cursor location characters
Ctrl+E Move the cursor to the end of line.
Ctrl+K Delete all characters behind the cursor (including cursor
location).
Ctrl+X Delete all characters before the cursor (except cursor
location).
Ctrl+Z Return to privileged EXEC mode from other modes (except
user EXEC mode).
Space or Y When the terminal printing command line information
exceeds the screen, continue to show the information in next
screen.
Enter When the terminal printing command line information
exceeds the screen, continue to show the information in next
line.
Complete help
You can get complete help in the below three conditions:
You can enter a question mark (?) at the system prompt to display a list of commands
and brief descriptions available for each command mode.
Raisecom>?
After you enter a keyword, press Space and enter a question mark (?), all correlated
commands and their brief descriptions are displayed if the question mark (?) matches
another keyword.
Raisecom(config)#ntp ?
After you enter a parameter, press Space and enter a question mark (?), associated
parameters and descriptions of these parameters are displayed if the question mark (?)
matches a parameter.
Raisecom(config)#interface ip ?
Partial help
You can get partial help in the below three conditions:
After you enter part of a particular character string and a question mark (?), a list of
commands that begin with a particular character string is displayed.
Raisecom(config)#c?
After you enter a command, press Space, and enter a particular character string and a
question mark (?), a list of commands that begin with a particular character string is
displayed.
Raisecom(config)#show li?
After you enter a partial command name and press Tab, the full form of the keyword is
displayed if there is a unique match command. Otherwise, press Tab continuously to
display different keywords and then you can select the required one.
Shortcut Description
% " * " Incomplete command. User inputs incomplete command.
% Invalid input at '^' marked. Keyword marked "^" are invalid or do not exist.
% Ambiguous input at '^' marked, Keyword marked with "^" is not clear.
follow keywords match it.
% Unconfirmed command. The command line input by the user is not
unique.
% Unknown command. The command line input by the user does not
exist.
% You Need higher priority! The user does not have enough right to execute
the command line.
If there is error prompt message mentioned above, please use the command line
help message to solve the problem.
Displaying characteristics
CLI provides the following display characteristics:
The help message and prompt message in CLI are displayed in both Chinese and English
languages.
Provide pause function when one time display message exceeds one screen, you have the
following options at this time, as shown below.
Table 1-1 Function keys description for command line message display characteristics
Function key Description
Press Space or Y Continue to display next screen message
Press Enter Continue to display next line message
Press any letter key (except Y) Stop the display and command execution
Terminal page-break
Terminal page-break refers to the pause function when displayed message exceeds one screen.
You can use the function keys in Table 1-1 to control message display. If message page-break
is disabled, it will not provide pause function when displayed message exceeds one screen; all
the messages will be displayed circularly at one time.
By default, terminal page-break is enabled.
Configure the ISCOM2828F as below.
Most configuration commands have default values, which often are restored by no
option.
Operation Description
? List all executable operations.
b Quick execution for system bootrom software.
E Format the memory of the ISCOM2828F.
h List all executable operations.
u Download the system startup file through the XMODEM.
N Set Medium Access Control (MAC) address.
R Reboot the ISCOM2828F.
T Download the system startup software through TFTP and replace it.
V Show device BootROM version.
System files are the files needed for system operation (such as, system startup software and
configuration file). These files are usually saved in the memory. The ISCOM2828F manages
them by a file system which facilitates users to manage the memory. The file system supports
creating, deleting, and modifying the file and directory.
Besides, the ISCOM2828F supports a dual system; that is, it can store two versions of system
software in memory. You can shift to the other version when one version cannot work due to
system upgrade failure.
When you set system time manually, if the system uses DST, such as DST from 2
a.m. on the second Sunday, April to 2 a.m. on the second Sunday, September
every year, you have to advance the clock one hour faster during this period, set
time offset as 60 minutes and from 2 a.m. to 3 a.m. on the second Sunday, April
each year is an inexistent time. The time setting manually during this period shows
failure.
The summer time in southern hemisphere is opposite to northern hemisphere,
which is from September to April of next year. If user configures start time later
than ending time, system will suppose it is in the Southern Hemisphere. That is to
say, the summer time is the start time this year to the ending time of next year.
The purpose of NTP is to synchronize all clocks in a network quickly and then the
ISCOM2828F can provide different application over a unified time. Meanwhile, NTP can
ensure very high accuracy, with accuracy of 10ms around.
The ISCOM2828F in support of NTP cannot only accept synchronization from other clock
source, but also to synchronize other devices as a clock source.
The ISCOM2828F adopts multiple NTP working modes for time synchronization:
Server/Client mode
In this mode, client sends clock synchronization message to different servers. The server
works in server mode by automation after receiving synchronization message and send
answering message. The client received answering message and perform clock filer and
selection, then synchronize it to privileged server.
In this mode, client can synchronize to server but the server cannot synchronize to client.
Symmetric peer mode
In this mode, active equity send clock synchronization message to passive equity. The passive
equity works in passive mode by automation after receiving message and send answering
message back. By exchanging messages, the two sides build up symmetric peer mode. The
active and passive equities in this mode can synchronize each other.
The NTP default configuration is as below.
If the ISCOM2828F is configured as NTP reference clock source, the NTP server or
NTP equity are not configurable; and vice versa, the ISCOM2828F cannot be
configured as NTP reference clock if the NTP server or equity are configured.
After being configured with SNTP server address, the ISCOM2828F will try to get
clock information from SNTP server every 3s, and the maximum timeout for clock
information is 10s.
1.9 Watchdog
The interference of outside electromagnetic field will influence the working of single chip
microcomputer, and cause program fleet and dead circulation so that the system cannot work
normally. Considering the real-time monitoring to the running state of single chip
microcomputer, it generates a program specially used to monitor the running status of switch
hardware, which is commonly known as the Watchdog.
The system will reboot automatically when the ISCOM2828F cannot continue to work for
task suspension, dead circulation, or not feeding the dog within a feeding cycle.
The watchdog function configuration can prevent the system program from dead circulation
caused by uncertainty fault so as to improve the stability of system.
Configure the ISCOM2828F as below.
Loading
Traditionally, configuration files are loaded through the serial port, which takes a long time to
load at a low rate, and is unavailable for remote loading. FTP and TFTP loading modes can
solve those problems and make operations more convenient.
The ISCOM2828F supports TFTP auto-loading mode.
TFTP auto-loading means that users get configuration files from server to the device, and then
configure the device. Auto-loading function allows configuration files to contain related
commands for multiple configurations loading so as to meet file auto-loading requirements in
complex network environment.
The ISCOM2828F provides several methods to confirm configuration file name in TFTP
server, such as inputting manually, obtaining by DHCP Client, and using default configuration
file name. Besides, users can assign certain naming conventions for configuration files. So the
device can confirm the name according to the rules considering its attributions (device type,
MAC address, and software version, and so on).
Upgrading
The ISCOM2828F needs to upgrade if you want to add new features, optimize functions or
solve current software version bugs.
The ISCOM2828F supports the following two upgrade modes:
Upgrade by BootROM
Upgrade by command line
Step Operation
1 Log in device through serial port as administrator and enter Privileged EXEC
mode, reboot the ISCOM2828F by using the reboot command.
Raisecom#reboot
Please input 'yes' to confirm:yes
Rebooting ...
Step Operation
2 Click Space key to enter interface of raisecom when the display shows "Press
space into Bootstrap menu...", then input "?" to display command list:
[Raisecom]:?
? - List all available commands
h - List all available commands
V - Show bootstrap version
b - Boot an executable image
E - Format both DOS file systems
T - Download system program
u - XMODEM download system boot image
N - set ethernet address
R - Reboot
[Raisecom]:T
dev name:et
unit num:1
file name: system_boot.Z ROS_4.14.1781.ISCOM2828F.167.20120813
local ip: 192.168.1.1 192.168.18.250
server ip: 192.168.1.2 192.168.18.16
user:wrs 1
password:wrs 123456
Loading... Done
Saving file to flash...
Ensure the input file name here is correct, the file name should not be
longer than 80 characters.
4 Input "b" to quick execute bootstrap file. The ISCOM2828F will reboot and load
the downloaded system boot file.
Configure IP address for FTP/TFTP server to make sure that ISCOM2828F can access
the server.
Upgrade system software through CLI as below.
Networking requirements
As shown in Figure 1-5, connect the TFTP server with the switch, and configure auto-loading
function on the switch to make the switch automatically load configuration file from TFTP
server. Hereinto, the IP address of the TFTP server is 192.168.1.1, subnet mask is
255.255.255.0, and the naming convention for configuration file name meets the following
conditions:
Device model is included in configuration file name.
Complete MAC address is included in configuration file name.
First 2 digits of software version are included in configuration file name.
No extension rules are supported.
Configuration steps
Step 1 Configure IP address for TFTP server.
Raisecom#config
Raisecom(config)#service config tftp-server 192.168.1.1
Raisecom(config)#service config
Checking results
Show auto-loading configuration by using the show service config command.
2 Ethernet
This chapter describes the configuration and principle of Ethernet features, also provides
some related configuration examples, including the following sections:
MAC address table
VLAN
QinQ
VLAN mapping
Interface protection
Port mirroring
Layer 2 protocol transparent transmission
Unicast: when a MAC address entry, related to the destination MAC address of a packet,
is listed in the MAC address table, the ISCOM2828F will directly forward the packet to
the receiving port through the egress port of the MAC address entry. If the entry is not
listed, the ISCOM2828F broadcasts the packet to other devices.
Multicast: when the ISCOM2828F receives a packet of which the destination MAC
address is a multicast address, and multicast is enabled, the ISCOM2828F sends the
packet to the specified Report interface. If an entry corresponding to the destination
address of the packet is listed in the MAC address table, the ISCOM2828F transmits the
packet from the egress port of the entry. If the corresponding entry is not listed, the
ISCOM2828F broadcasts the packet to other interfaces except the receiving interface.
Broadcast: when the ISCOM2828F receives a packet with an all-F destination address,
or its MAC address is not listed in the MAC address table, the ISCOM2828F forwards
the packet to all ports except the port that receives this packet.
address table. If packets from other interface are sent to the MAC address, the
ISCOM2828F can send them to the related interface.
If failed, it broadcasts packets to all interfaces except the source interface, and records
the source MAC address in the MAC address table.
Scenario
Configure static MAC address table in the following situations:
Static MAC address can be set for fixed server, special persons (manager, financial staff,
etc.) fixed and important hosts to make sure all data flow forwarding to these MAC
addresses are forwarded from static MAC address related interface in priority.
For the interface with fixed static MAC address, you can disable MAC address learning
to avoid other hosts visiting LAN data from the interface.
Configure aging time for dynamic MAC address table to avoid saving too many MAC address
entries in MAC address table and running out of MAC address table resources so as to
achieve dynamic MAC address aging function.
Prerequisite
N/A
The MAC address of the source device, multicast MAC address, FFFF.FFFF.FFFF,
and 0000.0000.0000 cannot be configured as static unicast MAC address.
The maximum number of static unicast MAC addresses supported by the
ISCOM2828F is 1024.
2.1.10 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Networking requirements
Configure static unicast MAC address for Port 2 on Switch A, and configure the aging time
for dynamic MAC addresses (it takes effect only after dynamic MAC address learning is
enabled).
As shown in Figure 2-1, configure Switch A as below:
Create VLAN 10 and activate it.
Configure a static unicast MAC address 0001.0203.0105 on Port 2 and set its VLAN to
VLAN 10.
Set the aging time to 500s.
Configuration steps
Step 1 Create VLAN 10 and active it, and add Port 2 into VLAN 10.
Raisecom#config
Raisecom(config)#create vlan 10 active
Raisecom(config)#interface port 2
Step 2 Configure a static unicast MAC address on Port 2, and set its VLAN to VLAN 10.
Checking results
Show MAC address configuration by using the show mac-address-table l2-address port
port-id command.
2.2 VLAN
2.2.1 Introduction
Overview
Virtual Local Area Network (VLAN) is a protocol to solve Ethernet broadcast and security
problems. It is a Layer 2 isolation technique that divides a LAN into different broadcast
domains logically rather than physically, and then the different broadcast domains can work as
virtual groups without any influence from one another. As for the function, VLAN has the
same features as LAN, but members in one VLAN can access one another without restriction
by physical location.
Scenario
Main function of VLAN is to divide logic network segments. There are 2 typical application
modes:
One kind is in small size LAN, one device is carved up to several VLAN, the hosts that
connect to the device are carved up by VLAN. So hosts in the same VLAN can
communicate, but hosts between different VLAN cannot communicate. For example, the
financial department needs to divide from other departments and they cannot access each
other. Generally, the interface to connect host is in Access mode.
The other kind is in bigger LAN or enterprise network, multiple devices connected to
multiple hosts and the devices are concatenated, data packet takes VLAN Tag for
forwarding. Identical VLAN interface of multiple devices can communicate, but hosts
between different VLAN cannot communicate. This mode is used in enterprise that has
many employees and needs a large number of hosts, in the same department but different
position, the hosts in one department can access one another, so customer has to divide
VLANs on multiple devices. Layer 3 devices like router is required if users want to
communicate among different VLAN. The concatenated interfaces among devices are set
in Trunk mode.
When configuring IP address for VLAN, you can associate a Layer 3 interface for it. Each
Layer 3 interface is corresponding to one IP address and one VLAN.
Prerequisite
N/A
The VLAN created by the vlan vlan-id command is in suspend status. Use the
state active command to activate the VLAN if you want to make it effective in
system.
VLAN 1 is the default VLAN. All interfaces in Access mode belong to the default
VLAN. VLAN 1 cannot be created and deleted.
By default, name of the default VLAN (VLAN 1) is Default. Other VLANs are
named by "VLAN + 4-digit VLAN ID". For example, VLAN 10 is named VLAN 0010
by default, and VLAN4094 is named as VLAN 4094 by default.
All configurations of VLAN are not effective until the VLAN is activated. When the
VLAN is in suspend status, you can configure the VLAN, such as delete/add
interfaces and set VLAN name, etc. The configurations will be saved by the
system. Once the VLAN is activated, the configurations will take effect in the
system.
The interface allows Access VLAN packets to pass regardless of configuration for
VLAN permitted by Access interface. The forwarded packets do not carry VLAN
TAG.
When setting Access VLAN, the system creates and activates VLAN automatically
if you have not created and activated VLAN in advance.
If you delete or suspend Access VLAN manually, system will set the interface
Access VLAN as default VLAN by automation.
If the configured Access VLAN is not default VLAN and there is no default VLAN
in allowed VLAN list of Access interface, the interface does not permit default
VLAN packets to pass.
Allowed VLAN list of Access interface is only effective to static VLAN, and
ineffective to cluster VLAN, GVRP dynamic VLAN, etc.
2.3 QinQ
2.3.1 Introduction
QinQ (also known as Stacked VLAN or Double VLAN) technique is an extension for 802.1Q
defined in IEEE 802.1ad standard.
Basic QinQ is a simple Layer 2 VPN tunnel technique, which encapsulate outer VLAN Tag
for user private network packet at the carrier access end, then the packet takes double VLAN
Tag to transmit through backbone network (public network) of carrier. In public network,
packet just be transmitted in accordance with outer VLAN Tag (namely the public network
VLAN Tag), the user private network VLAN Tag is transmitted as data in packet.
This technique can save public network VLAN ID resource. You can mark out private
network VLAN ID to avoid conflict with public network VLAN ID.
Basic QinQ
Figure 2-3 shows typical networking with basic QinQ, with the ISCOM2828F as the Provider
Edge (PE).
Selective QinQ
Selective QinQ is an enhancement of basic QinQ. This technique is realized by combination
of interface and VLAN. Selective QinQ can implement all functions of basic QinQ, and can
even perform different actions on different VLAN Tags received by one interface and add
different outer VLAN IDs for different inner VLAN IDs. By configuring mapping rules for
inner and outer Tag, you can encapsulate different outer Tag for different inner Tag packet.
Selective QinQ makes carrier network structure more flexible. You can classify different
terminal users at access device interface by VLAN Tag and then, encapsulate different outer
Tag for different class users. On the Internet, you can configure QoS policy according to outer
Tag and configure data transmission priority flexibly so as to make users in different class
receive the corresponding services.
Scenario
With application of basic QinQ, you can add outer VLAN Tag to plan Private VLAN ID
freely so as to make the user device data at both ends of carrier network take transparent
transmission without conflicting with VLAN ID in service provider network.
Prerequisite
Connect the interface and configure interface physical parameters to make the physical
status Up.
Create VLANs.
2.3.8 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear double-tagging-vlan Clear statistics of double
statistics outer { vlan-id | any } inner VLAN Tag packets.
{ vlan-id | any }
Networking requirements
As shown in Figure 2-4, Switch A and Switch B are connected to VLAN 100 and VLAN 200
respectively. Department C and department E need to communicate through the carrier
network. Department D and Department F need to communicate, too. Thus, you need to set
the outer Tag to VLAN 1000. Set Port 2 and Port 3 to dot1q-tunnel mode on Switch A and
Switch B, and connect these two interfaces two different VLANs. Port 1 is the uplink
interface connected to the ISP, and it is set to the Trunk mode to allow double Tag packets to
pass. The carrier TPID is 9100.
Configuration steps
Step 1 Create VLAN 100, VLAN 200, and VLAN 1000 and activate them. TPID is 9100.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#mls double-tagging tpid 9100
SwitchA(config)#create vlan 100,200,1000 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#mls double-tagging tpid 9100
SwitchB(config)#create vlan 100,200,1000 active
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 1000
SwitchA(config-port)#switchport qinq dot1q-tunnel
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk native vlan 1000
SwitchA(config-port)#switchport qinq dot1q-tunnel
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk native vlan 1000
SwitchB(config-port)#switchport qinq dot1q-tunnel
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk native vlan 1000
SwitchB(config-port)#switchport qinq dot1q-tunnel
SwitchB(config-port)#exit
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 1000 confirm
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 1000 confirm
Checking results
Use the show switchport qinq command to view QinQ configurations.
Take Switch A for example.
Networking requirements
As shown in Figure 2-5, the carrier network contains common PC Internet service and IP
phone service. PC Internet service is assigned to VLAN 1000, and IP phone service is
assigned to VLAN 2000.
Configure Switch A and Switch B as below to make client and server communicate through
carrier network:
Add outer Tag VLAN 1000 to the VLANs 100–150 assigned to PC Internet service.
Add outer Tag 2000 for VLANs 300–400 for IP phone service.
The carrier TPID is 9100.
Configuration steps
Step 1 Create and activate VLAN 100, VLAN 200, and VLAN 1000. The TPID is 9100.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#mls double-tagging tpid 9100
SwitchA(config)#create vlan 100-150,300-400,1000,2000 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#mls double-tagging tpid 9100
SwitchB(config)#create vlan 100-150,300-400,1000,2000 active
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport vlan-mapping 100-150 add-outer 1000
SwitchA(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport vlan-mapping 300-400 add-outer 2000
SwitchA(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport vlan-mapping cvlan 100-150 add-outer 1000
SwitchB(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport vlan-mapping cvlan 300-400 add-outer 2000
SwitchB(config-port)#switchport trunk untagged vlan 1000,2000 confirm
SwitchB(config-port)#exit
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 1000,2000 confi rm
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 1000,2000 confirm
Checking results
Use the show interface port port-id vlan-mapping add-outer command to view QinQ
configuration.
Take Switch A for example.
Scenario
Different from QinQ, VLAN mapping is to change the VLAN Tag without encapsulating
multilayer VLAN Tag so that packets are transmitted according to the carrier's VLAN
mapping rules. VLAN mapping does not increase the frame length of the original packet. It
can be used in the following scenarios:
A user service needs to be mapped to a carrier's VLAN ID.
Multiple user services need to be mapped to a carrier's VLAN ID.
Prerequisite
Before configuring VLAN mapping,
Connect the interface and configure its physical parameters to make it Up.
Create a VLAN.
Networking requirements
As shown in Figure 2-7, Port 2 and Port 3 of Switch A are connected to Department E of
VLAN 100 and Department F of VLAN 200, Port 2 and Port 3 of Switch B are connected to
Department C of VLAN 100 and Department D of VLAN 200. The ISP assigns VLAN 1000
to transmit packets of Department E and Department C, and VLAN 2008 to transmit packets
of Department F and Department D.
Configure 1:1 VLAN mapping on the Switch A and Switch B to implement normal
communication between PC or terminal users and servers.
Configuration steps
Configurations of Switch A and Switch B are the same. Take Switch A for example.
Step 1 Create VLANs and activate them.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 100,200,1000,2008 active
SwitchA(config)#vlan-mapping enable
Step 2 Set Port 1 to Trunk mode, allowing packets of VLAN 1000 and VLAN 2008 to pass.
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 1000,2008 confirm
SwitchA(config-port)#exit
Step 3 Set Port 2 to Trunk mode, allowing packets of VLAN 100 to pass. Enable VLAN mapping.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 100 confirm
SwitchA(config-port)#switchport vlan-mapping ingress 100 translate 1000
SwitchA(config-port)#switchport vlan-mapping egress 1000 translate 100
SwitchA(config-port)#exit
Step 4 Set Port 3 to Trunk mode, allowing packets of VLAN 200 to pass. Enable VLAN mapping.
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 200 confirm
SwitchA(config-port)#switchport vlan-mapping ingress 200 translate 2008
SwitchA(config-port)#switchport vlan-mapping egress 2008 translate 200
Checking results
Use the show interface port port-id vlan-mapping { ingress | egress } translate command
to show configurations of 1:1 VLAN mapping.
Scenario
To isolate Layer 2 data from the interfaces in the same VLAN, like physical isolation, you
need to configure interface protection.
The interface protection function can realize mutual isolation of the interfaces in the same
VLAN, enhance network security, and provide flexible networking solutions for you.
Prerequisite
N/A
Networking requirements
As shown in Figure 2-8, PC 1, PC 2, and PC 5 belong to VLAN 10, and PC 3 and PC 4
belong to VLAN 20. The interfaces connecting two devices are in Trunk mode, but do not
allow VLAN 20 packets to pass. As a result, PC 3 and PC 4 fail to communicate with each
other. Enable interface protection on the interfaces of PC 1 and PC 2 which are connected to
Switch B. As a result, PC 1 and PC 2 fail to communicate with each other, but they can
communicate with PC 5 respectively.
Configuration steps
Step 1 Create VLAN 10 and VLAN 20 on both Switch A and Switch B, and activate them.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 10,20 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 10,20 active
Step 2 Add Port 2 and Port 3 of Switch B to VLAN 10 in Access mode, add Port 4 to VLAN 20 in
Access mode, and set Port 1 in Trunk mode to allow VLAN 10 packets to pass.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 10
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 10
SwitchB(config-port)#exit
SwitchB(config)#interface port 4
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 20
SwitchB(config-port)#exit
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#switchport trunk allowed vlan 10 confirm
SwitchB(config-port)#exit
Step 3 Add Port 2 of Switch A to VLAN 10 in Access mode, add Port 3 to VLAN 20 in Trunk mode,
and set Port 1 in Trunk mode to allow VLAN 10 packets to pass.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 10
SwitchA(config-port)#exit
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 20
SwitchA(config-port)#exit
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#switchport trunk allowed vlan 10 confirm
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport protect
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport protect
Checking results
Use the show vlan command to check whether VLAN configurations are correct.
SwitchB#show vlan
VLAN Name State Status Port Untag-Port Priority Create-Time
-------------------------------------------------------------------------
1 Default active static 1-10 1-10 -- 0:0:7
10 VLAN0010 active static 1-3 2,3 -- 0:1:1
20 VLAN0020 active static 4 4 -- 0:1:1
Use the show interface port port-id switchport command to check whether interface VLAN
is correctly configured.
Take Switch B for example.
Use the show switchport protect command to check whether interface protection is correctly
configured.
Check whether PC 1 and PC 5, PC 2 and PC 5, and PC 3 and PC 4 can ping through each
other or not. Check whether the VLAN allowed to pass on the Trunk interface is correct.
If PC 1 can ping through PC 5 successfully, VLAN 10 communicates properly.
If PC 2 can ping through PC 5 successfully, VLAN 10 communicates properly.
If PC 3 fails to ping through PC 4, VLAN 20 fails to communicate.
By pinging through PC 1 and PC 2, check whether interface protection is correctly configured.
If PC 1 fails to ping through PC 2, interface protection has taken effect.
Scenario
Port mirroring is mainly used to monitor network data type and flow regularly for the network
administrator.
Interface mirroring function is to copy the interface flow monitored to a monitor interface or
CPU so as to obtain the ingress/egress interface failure or abnormal flow of data to analyze,
discover the root cause and solve them timely.
Prerequisite
N/A
When you configure to mirror packets to the CPU, the monitor port receives no
packets.
There can be multiple source mirroring ports but only one monitor port.
The ingress/egress mirroring port packet will be copied to the monitor port after
port mirroring takes effect. The monitor port cannot be set to the mirroring port
again.
Configure local port mirroring for the ISCOM2828F as below.
Networking requirements
As shown in Figure 2-10, the network administrator hopes to monitor on user network 1
through data monitor device, then to catch the fault or abnormal data flow for analyzing and
discovering problem and then solve it.
The ISCOM2828F is disabled with storm control and automatic packets sending. User
network 1 accesses the ISCOM2828F through Port 1, user network 2 accesses the
ISCOM2828F through Port 2, and data monitor device is connected to Port 3.
Configuration steps
Enable port mirroring on the switch.
Raisecom#config
Raisecom(config)#mirror monitor-port 3
Raisecom(config)#mirror source-port-list both 1
Raisecom(config)#mirror enable
Checking results
Show interface mirror information by using the show mirror command.
Raisecom#show mirror
Mirror: Enable
Monitor port: 3
Non-mirror port: Not block
-----------the both mirror rule-----------
Mirrored ports: 1
Divider: 0
MAC address: 0000.0000.0000
-----------the both mirror rule-----------
Mirrored ports: --
Divider: 0
MAC address: 0000.0000.0000
Scenario
This function enables layer 2 protocol packets of one user network cross through carrier
network to make one user network unified operating one Layer 2 protocol at different region.
You can configure rate limiting on transparent transmission packets to prevent packet loss.
Prerequisite
Configure physical parameters for the interface to set it in Up status before configuring Layer
2 protocol transparent transmission function.
2.7.6 Maintenance
Maintain Ethernet features as below.
Command Description
Raisecom(config)#clear relay statistics Clear statistics of transparent
[ port-list port-list ] transmission packets.
Raisecom(config-port)#no relay shutdown Enable the interface again.
Networking requirements
As shown below, Switch A and Switch B connect to two user networks VLAN 100 and
VLAN 200 respectively. You need to configure Layer 2 protocol transparent transmission
function on Switch A and Switch B in order to make the same user network in different
regions run STP entirely.
Configuration steps
Step 1 Create VLAN 100, 200 and activate them.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 100,200 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchA#config
SwitchA(config)#create vlan 100,200 active
Step 2 Set the switching mode of Port 2 to Access mode, set the Access VLAN to 100, and enable
STP transparent transmission.
Configure Switch A.
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 100
SwitchA(config-port)#relay stp
SwitchA(config-port)#relay port 1
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode access
Step 3 Set the switching mode of Port 3 to Access mode, set the Access VLAN to 200, and enable
STP transparent transmission.
Configure Switch A.
SwitchA(config)#interface port 3
SwitchA(config-port)#switchport mode access
SwitchA(config-port)#switchport access vlan 200
SwitchA(config-port)#relay stp
SwitchA(config-port)#relay port 1
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport mode access
SwitchB(config-port)#switchport access vlan 200
SwitchB(config-port)#relay stp
SwitchB(config-port)#relay port 1
SwitchB(config-port)#exit
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
Checking results
Use the show relay command to check whether Layer 2 protocol transparent transmission is
correctly configured.
3 IP services
This chapter introduces basic principles and configurations of routing features, and provides
the related configuration examples, including the following sections:
ARP
Layer 3 interface
Default gateway
DHCP Client
DHCP Relay
DHCP Snooping
DHCP Option
3.1 ARP
3.1.1 Introduction
In TCP/IP network environment, each host is assigned with a 32-bit IP address that is a logical
address used to identify host between networks. To transmit packet in physical link, you must
know the physical address of the destination host, which requires mapping IP address to
physical address. In Ethernet environment, physical address is 48-bit MAC address. Users
have to transfer the 32-bit destination host IP address to 48-bit Ethernet address for
transmitting packets to destination host correctly. The Address Resolution Protocol (ARP) is
applied to analyze IP address to MAC address and set mapping relationship between them.
ARP address mapping table includes the following two types:
Static entry: bind IP address and MAC address to avoid ARP dynamic learning cheating.
− Static ARP address entry needs to be added/deleted manually.
− No aging to static ARP address.
Dynamic entry: MAC address automatically learned through ARP.
− This dynamic address entry is automatically generated by the switch. You can adjust
partial parameters of it manually.
− The dynamic ARP address entry will age at the aging time if no use.
The ISCOM2828F supports the following two ARP address mapping entry dynamic learning
modes:
Learn-all: in this mode, the ISCOM2828F learns both ARP request packets and response
packets. When device A sends its ARP request, it writes mapping between its IP address
and physical address in ARP request packets. When device B receives ARP request
packets from device A, it learns the mapping in its address table. In this way, device B
will no longer send ARP request when sending packets to device A.
Learn-reply-only mode: in this mode, the ISCOM2828F learns ARP response packets
only. For ARP request packets from other devices, it responds with ARP response
packets only rather than learning ARP address mapping entry. In this way, network load
is heavier but some network attacks based on ARP request packets can be prevented.
Scenario
The mapping relationship between the IP address and MAC address is stored in ARP address
mapping table.
Generally, ARP address mapping table is dynamic maintained by the ISCOM2828F. The
ISCOM2828F searches the mapping relationship between the IP address and MAC address
automatically according to the ARP protocol. You only need to configure the ISCOM2828F
manually for preventing ARP dynamic learning cheating or adding static ARP address entries.
Prerequisite
N/A
The IP address of static ARP entry must belong to the IP network segment of
switch Layer 3 interface.
The static ARP entry needs to be added and deleted manually.
Configure static ARP entries for the ISCOM2828F as below.
3.1.8 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Networking requirements
As shown in Figure 3-1, the ISCOM2828F connects to host, connects to the upstream router
by Port 1. IP address of Router is 192.168.1.10/24, subnet mask is 255.255.255.0. MAC
address is 0050-8d4b-fd1e.
To improve communication security between Device and Router, you need to configure
related static ARP entries on the ISCOM2828F.
Configuration steps
Step 1 Create an ARP static entry.
Raisecom#config
Raisecom(config)#arp 192.168.1.10 0050.8d4b.fd1e
Checking results
Use the show arp command to check whether all entry information in ARP address mapping
table is correct.
Raisecom#show arp
ARP table aging-time: 1200 seconds(default: 1200s)
ARP mode: Learn reply only
Ip Address Mac Address Type Interface ip
---------------------------------------------------------
192.168.1.10 0050.8d4b.fd1e static --
Total: 2
Static: 1
Dynamic: 1
Scenario
You can associate a Layer 3 interface with a VLAN when configuring the IP address for the
VLAN. Each Layer 3 interface corresponds to an IP address and is associated with a VLAN.
Prerequisite
Configure the associated VLAN and activate it before you configure the Layer 3 interface.
Configure the VLAN associated with the Layer 3 interface, and the VLAN must be
activated. Suspended VLAN can be activated for configurations through the state
{ active | suspend } command. When you configure the mapping between a
Layer 3 interface and a VLAN which does not exist or is deactivated, the
configuration can be successful but does not take effect.
The ISCOM2828F can be configured with 15 Layer 3 interfaces in the range of 0
to 14.
Networking requirements
As shown in Figure 3-2, configure the Layer 3 interface to the switch so that the host and the
ISCOM2828F can Ping through each other.
Configuration steps
Step 1 Create a VLAN and add the interface to the VLAN.
Raisecom#config
Raisecom(config)#create vlan 10 active
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport access vlan 10
Step 2 Configure Layer 3 interface on the ISCOM2828F, and configure the IP address, and associate
the IP address with the VLAN.
Raisecom(config)#interface ip 10
Raisecom(config-ip)#ip address 192.168.1.2 255.255.255.0 10
Checking results
Check whether the binding relation of VLAN and physical interface is correct by using the
show vlan command:
Raisecom#show vlan 10
VLAN Name State Status Port Untag-Port Priority Create-Time
-------------------------------------------------------------------------
10 VLAN0010 active static 2 2 -- 1:16:49
Check whether the Layer 3 interface configuration is correct and whether the mapping
between the Layer 3 interface and VLAN is correct by using the show interface ip command.
Raisecom#show interface ip
Index Ip Address NetMask Vid Status Mtu
-------------------------------------------------------------------------
0 192.168.27.63 255.255.255.0 1 active 1500
10 192.168.1.2 255.255.255.0 10 active 1500
Check whether the ISCOM2828F and PC can ping each other by using the ping command.
Raisecom#ping 192.168.1.3
Type CTRL+C to abort
Sending 5, 8-byte ICMP Echos to 192.168.1.3, timeout is 3 seconds:
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Reply from 192.168.1.3: time<1ms
Scenario
When the packet to be forwarded is not configured with a route, you can configure the default
gateway to enable a device to send the packet to the default gateway.
Prerequisite
Configure the IP address of the switch in advance; otherwise, configuring the default gateway
will fail.
The IP address of the default gateway should be in the same network segment of any
local IP interface.
Configure the ISCOM2828F as below.
The ISCOM2828F can be used as a DHCP client to obtain the IP address from a DHCP server
for future management, as shown in Figure 3-5.
Scenario
As a DHCP client, the ISCOM2828F obtains the IP address assigned from the DHCP server.
The IP address assigned by a DHCP server is limited with a certain lease period in dynamic
address distribution mode. The DHCP server will take back the IP address when it is expired.
Then, the DHCP client has to relet IP addresses for continuous use. The DHCP client can
release the IP address if it does not want to use it any more before its expiration.
It is recommended that the number of DHCP relays be smaller than 4 if the DHCP client
needs to obtain IP addresses from the DHCP server through multiple DHCP relays.
Prerequisite
Create a VLAN and add a Layer 3 interface to the VLAN.
Both DHCP snooping and DHCP Relay features are disabled.
If the ISCOM2828F obtains IP addresses from the DHCP server through DHCP
previously, it will restart the application process for IP addresses if users modified the
DHCP server address by using the ip address dhcp command.
Networking requirements
As shown in Figure 3-6, the switch is used as a DHCP client and the host name is raisecom.
The DHCP server should assign the IP address to the switch through the SNMP interface to
enable the NView NNS platform dicover and manage the switch.
Configuration steps
Step 1 Configure DHCP client information.
Raisecom#config
Raisecom(config)#interface ip 0
Raisecom(config-ip)#ip dhcp client hostname raisecom
Checking results
Check whether DHCP client configuration is correct by using the show ip dhcp client
command.
Step 3 The DHCP server sends acknowledgement packet to the DHCP client through the DHCP
relay device according to the information contained in the request packet. In this way, the
configuration of the DHCP client is dynamically configured.
Scenario
When DHCP clients and the DHCP server are not in the same network segment, you can use
the DHCP Relay feature to make the DHCP server and clients in different network segments
carry relay service and relay DHCP protocol packets across network segments to the
destination DHCP server, so that DHCP clients in different network segments can share the
same DHCP server.
Prerequisite
DHCP Relay is exclusive to DHCP Client, or DHCP Snooping. Namely, you cannot configure
DHCP Relay on the device configured with DHCP Client, or DHCP Snooping.
When the ISCOM2828F receives a DHCP request packet, it processes the packet
according to the processing policy configured by the user, padding mode, and whether
the Option field is included or not, and then forwards the processed packet to the DHCP
server.
When the ISCOM2828F receives a DHCP reply packet, if the packet contains the Option
field, delete the field and forward the packet to the DHCP client; if the packet does not
contain the Option field, forward the packet directly.
Scenario
DHCP Snooping is a security feature of DHCP, used to guarantee DHCP clients to obtain IP
addresses from the legal DHCP server and record mappings between IP addresses and MAC
addresses of DHCP clients.
The Option field in DHCP packet records position information about DHCP clients. The
administrator can use this option to locate the DHCP client and implement security control
and accounting. The device configured with DHCP Snooping and DHCP Option can process
packets accordingly based on whether packets contain the Option field or not.
Prerequisite
DHCP Snooping is exclusive to DHCP Client or DHCP Replay, that is, you should make sure
that the global DHCP Client and DHCP Relay featues are disabled before configuring DHCP
Snooping.
Networking requirements
As shown in Figure 3-9, the switch is used as the DHCP Snooping device. The network
requires the DHCP client to obtain the IP address from a legal DHCP server and supports
Option82 to facilitate client management; you can configure circuit ID sub-Option
information on Port 3 as raisecom, and remote ID sub-option as user01.
Configuration steps
Step 1 Configure global DHCP Snooping.
Raisecom#config
Raisecom(config)#ip dhcp snooping
Raisecom(config)#interface port 1
Raisecom(config-port)#ip dhcp snooping trust
Raisecom(config-port)#quit
Step 3 Configure DHCP Snooping to Option 82 function and configure the field Option 82.
Checking results
Use the show ip dhcp information option command to check whether DHCP snooping is
correctly configured.
Options Description
255 Ending option
Options 18, 61, and 82 in DHCP Option are relay agent information options in DHCP packets.
When a request packet sent by the DHCP client arrives at the DHCP server with traversing a
DHCP relay or DHCP Snooping, the DHCP relay or DHCP Snooping device adds Option
fields into the request packet.
Options 18, 61, and 82 implement the recording of DHCP client information on the DHCP
server. By using them with other software, the device can implement functions such as
limiting on the assignment of IP addresses and accounting. For example, when you use them
with IP Source Guard, the device can defend IP address+MAC address spoofing.
Option 82 can contain up to 255 sub-options. If Option82 is defined, at least one sub-option
must be defined. The ISCOM2828F supports 2 sub-option types currently: Sub-Option 1
(Circuit ID) and Sub-Option 2 (Remote ID).
Sub-Option 1: contain the interface number of the request packet sent by the DHCP
client, the VLAN that the interface belongs to, and attaching information.
Sub-Option 2: contain the interface MAC address (DHCP relay), bridge MAC address
(DHCP Snooping device), or customized character string contained in the request packet
sent from the DHCP client.
Scenario
Options 18, 61, and 82 in DHCP Option are relay agent information options in DHCP packets.
When a request packet sent by the DHCP client arrives at the DHCP server with traversing a
DHCP relay or DHCP Snooping, the DHCP relay or DHCP Snooping device adds Option
fields into the request packet.
DHCP Options18 is used to record DHCP client information over IPv6. DHCP Options 61
and 82 fields are used to record DHCP client information over IPv4. By using them with other
software, the device can implement functions such as limiting on the assignment of IP
addresses and accounting.
Prerequisite
N/A
4 QoS
This chapter introduces basic principle and configuration of QoS and provides related
configuration examples, including the following sections:
Introduction
Configuring basic QoS
Configuring traffic classification and traffic policy
Configuring priority mapping
Configuring congestion management
Configuring rate limiting based on interface and VLAN
Configuring examples
4.1 Introduction
With the increasing rich types of network applications, users make different demands on
service qualities for network applications. So network resources should be distributed and
scheduled properly according to customers' demands. Quality of Service (QoS) can ensure the
realtime and integrity of services and guarantee the whole network to run high efficiently
when the network is overloaded or congested.
QoS is composed of the following flow management technologies:
Service model
Priority trust
Traffic classification
Traffic policy
Priority mapping
Congestion management
Best-effort service
Best-effort service is the most basic and simplest service model over store and forward
mechanism Internet (IPv4 standard). In Best-effort service model, the application program can
send any number of packets at any time without permitting in advance and notifying the
network. For Best-effort service, the network will send packets as possible as it can, but
cannot guarantee the delay and reliability.
Best-effort is the default Internet service model now, applying to most network applications,
such as FTP, E-mail, etc. which is achieved by First In First Out (FIFO) queue.
Integrated Service
Int-Serv model can meet various QoS requirements through the Resource Reservation
Protocol (RSVP). RSVP operates on every device from the source end to the destination end.
You can monitor each data flow to avoid the device to consume too much resource. This
model can clearly differentiate and ensure the service quality of each service flow, thus
providing the finest-granularity service quality differentiation.
Inter-Serv mode imposes high requirements on the device. When the amount of data flow on
the network is too large, storage and processing performance of the device will undergo a lot
of pressure. Moreover, Inter-Serv model is poor in expandability, so it is difficult to be
implemented on the core network of the Internet.
Differentiated Service
DiffServ model is a multi-service model, which can satisfy different QoS requirements.
DiffServ model does not need to maintain state for each flow. It provides differentiated
services according to the QoS classification of each packet. Many different methods can be
used for QoS packet classification, such as IP packet priority (IP precedence), the packet
source address or destination address and so on.
Generally, DiffServ is used to provide end to end QoS services for a number of important
applications, which is achieved mainly through the following techniques:
Committed Access Rate (CAR): CAR refers to classify the packets according to the pre-
set packets matching rules, such as IP packets priority, the packet source address or
destination address, etc. Continue to send the packets if the flow is in line with the rules
of token bucket. If it is beyond the specified flow, discard the packets or remark IP
precedence, DSCP, EXP, etc. CAR not only can control the flows, but also mark and
remark the packets.
Queue technology: the queuing technologies of SP, WRR, SP+WRR cache and schedule
the congestion packets to achieve congestion management.
Interface priority
CoS priority
IEEE802.1Q-based VLAN packets are modifications of Ethernet packets. A 4-byte 802.1Q
header is added between the source MAC address and protocol type, as shown in Figure 4-4.
The 802.1Q header consists of a 2-byte Tag Protocol Identifier (TPID) filed with the value of
0x8100 and a 2-byte Tag Control Information (TCI) field.
Rate limiting
Rate limiting refers to limiting network traffics. Rate limiting is used to control the rate of
traffic on the network. By discarding the traffic that exceeds the rate, you can control the
traffic within a reasonable range. Therefore, network resources and Carrier's benefits are
protected.
The ISCOM2828F supports rate limiting based on traffic policy on the ingress interface.
Moreover, the ISCOM2828F supports using token bucket for rate limiting, including single-
token bucket and dual-token bucket.
Re-direction
Redirection refers that a packet is not forwarded according to the mapping relationship
between the original destination address and the interface. Instead, the packet is redirected to
a specified interface for forwarding, realizing routing based on traffic policy.
The ISCOM2828F supports redirecting packets on the ingress interface to a specified
interface for forwarding.
Re-marking
Re-marking refers to re-configuring some priority fields for some packets, so that devices can
re-classify packets based on their own standards. In addition, downstream nodes can provide
differentiated QoS services depending on re-marking information.
The ISCOM2828F supports re-marking the following priority fields for packets:
IP priority of IP packets
DSCP priority
CoS priority
Traffic statistics
Traffic statistics is used to take statistics of data packets of specified service flow, which is the
number of passed and discarded packets and bytes in packets matched with the traffic
classification.
Traffic statistics is not a QoS control measuret, but it can be used in combination with other
QoS actions to improve network supervision.
Table 4-1 Mapping relationship of local priority, DSCP priority, and CoS priority
Local priority 0 1 2 3 4 5 6 7
CoS 0 1 2 3 4 5 6 7
Local priority refers to a kind of packet priority with internal meaning assigned by the
ISCOM2828F, i.e. the priority corresponding to queue in QoS queue scheduling.
Local priority ranges from 0 to 7. Each interface of the ISCOM2828F supports eight queues.
The local priority and interface queue is in one-to-one corresponding relationship. Packets can
be sent to assigned queue according to the mapping relationship between the local priority and
queue, as shown below.
Queue 1 2 3 4 5 6 7 8
Scenario
QoS enables the carrier to provide different service qualities for different applications, and
assign and schedule different network resources.
Prerequisite
N/A
Scenario
Traffic classification is the basis of QoS. You can classify packets from the upstream device
according to the priorities and ACL rules. After classification, the ISCOM2828F can perform
corresponding operations on packets in different categories and provide corresponding
services.
Traffic classification configuration will not take effect until you bind it to the traffic policy.
Applying the traffic policy is related to the current network loading condition and phase.
Generally, traffic rate is limited according to the committed rate when it enters the network;
and priority is remarked according to service features of packets.
Prerequisite
Enable global QoS.
You should configure corresponding rules for traffic classification, that is, perform
match configuration.
For traffic classification quoted by the traffic policy, you cannot modify the traffic
classification rule, that is, you cannot modify the match parameter of traffic
classification.
You can define one or more traffic classifications into one traffic policy.
Define traffic policy mapping on the ISCOM2828F as below.
4.3.11 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear service-policy statistics Clear statistics
[ egress port-id [ class-map class-map-name ] | ingress of QoS packets.
port-id [ class-map class-map-name ] | port port-id ]
Scenario
You can choose to trust priorities of the packets sent form the upstream device. For packets
whose priorities are distrusted, they are processed according to the traffic classification and
policy. After being configured with the priority trust mode, the ISCOM2828F processes
packets according to their priorities and provides related service.
To specify local priorities for packets is the prerequisite for queue scheduling. For packets
from the upstream device, you can not only map the external priority carried by packets to
different local priorities, but also directly configure local priorities for packets based on the
interface, and then the ISCOM2828F will perform queue scheduling according to local
priorities of packets. Generally, IP packets need to be configured with the mapping
relationship between the IP priority/DSCP priority and local priority; while VLAN packets
need to be configured with the mapping relationship between the CoS priority and local
priority.
Prerequisite
N/A
Table 4-3 Default CoS to local priority and color mapping relationship
CoS 0 1 2 3 4 5 6 7
Local 0 1 2 3 4 5 6 7
Table 4-4 Default DSCP to local priority and color mapping relationship
DSCP 0–7 8–15 16–23 24–31 32–39 40–47 48–55 56–63
Local 0 1 2 3 4 5 6 7
Scenario
When the network is congested, you can configure queue scheduling if you intend to:
Balance delay and delay jitter of various packets, preferentially process packets of key
services (like video and voice).
Fairly process packets of secondary services (like E-mail) with identical priority.
Process packets of different priorities according to respective weight values.
To choose what scheduling algorithm depends on the current service condition and customer
requirements.
Prerequisite
Enable global QoS.
Scenario
When the network is congested, you can configure rate limiting based on the interface or
VLAN if you intend to restrict the burst flow on a specified interface or VLAN to make
packets be sent at a well-proportioned rate and relieve the congestion.
Prerequisite
Create the related VLAN before configuring rate limiting based on VLAN or QinQ.
4.6.6 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear rate-limit Clear statistics of packet loss due to
statistics vlan [ vlan-id ] rate limiting based on VLAN.
Networking requirements
As shown below, the user uses voice, video, and data services.
CoS priority of the voice service is 5; CoS priority of the video service is 4; CoS priority of
the data service is 2. CoS priorities 5, 4, and 2 of these three kinds of services are mapped to
local priorities 6, 5, and 2 respectively.
It is easy for Switch A to have congestion. To reduce network congestion, you need to make
following rules according to different services types:
For voice services, perform SP scheduling to make sure that this part of flow passes
through in priority.
For video services, perform WRR scheduling, with the weight value of 50.
For data services, perform WRR scheduling, with the weight value of 20.
Configuration steps
Step 1 Configure interface priority trust mode.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#mls qos enable
SwitchA(config)#interface port 2
SwitchA(config-port)#mls qos trust cos
SwitchA(config-port)#quit
Step 2 Configure mapping profile between CoS priority and local priority.
Checking results
Show interface priority trust mode.
Check whether mapping relationship between Cos priority and local priority is correctly
configured.
CoS: 0 1 2 3 4 5 6 7
----------------------------------------------
LocalPriority: 0 1 2 3 5 6 6 7
Networking requirements
As shown below, User A, User B, and User C are respectively connected to the Switch,
namely, the ISCOM2828F, through the Switch A, Switch B, and Switch C.
User A requires voice and video services; User B requires voice, video, and data services;
User C requires video and data services.
According to service requirements, user needs to make rules as below:
For User A, provide 25 Mbit/s assured bandwidth, permitting burst flow 100 KB and
discarding redundant flow.
For User B, provide 35 Mbit/s assured bandwidth, permitting burst flow 100 KB and
discarding redundant flow.
For User C, provide 30 Mbit/s assured bandwidth, permitting burst flow 100 KB and
discarding redundant flow.
Configuration steps
Step 1 Configure rate limiting based on interface.
Raisecom#config
Raisecom(config)#rate-limit port-list 2 ingress 25000 100
Raisecom(config)#rate-limit port-list 3 ingress 35000 100
Raisecom(config)#rate-limit port-list 4 ingress 30000 100
Checking results
Use the show rate-limit interface-type interface-number command to show rate limiting
configurations based on the interface.
5 Multicast
This chapter introduces basic principle and configuration of multicast and provides related
configuration examples, including the following sections:
Overview
Configuring IGMP Snooping
Configuring MVR
Configuring MVR Proxy
Configuring IGMP filtering
Maintenance
Configuration examples
5.1 Overview
With the continuous development of Internet, various interacting network data, voice, and
video will become more and more. On the other hand, the emerging e-commerce, online
meetings, online auctions, Video on Demand (VoD), distance learning, and other services also
rise gradually. These services come up with higher requirements for network bandwidth,
information security, and costs. Traditional unicast and broadcast cannot meet these
requirements well, while multicast has met them timely.
Multicast is a point to multipoint data transmission method. The method can effectively solve
the single point sending and multipoint receiving problems. During the network packet
transmission, it can save network resources and improve information security.
All hosts joined a multicast group will become a member of the multicast group. Multicast
group members are dynamic, hosts can join or leave multicast group at any time. Group
members may be widely distributed in any part of the network.
Multicast source
Multicast source refers to a server which regards multicast group address as the destination
address to send IP packet. A multicast source can send data to multiple multicast groups;
multiple multicast sources can send to a multicast group.
Multicast router
The router that supports Layer 3 multicast is called the multicast router. Multicast router can
achieve multicast routing, guide multicast packet forwarding and provide multicast group
management function to distal network segment connecting with users.
Router interface
The router interface is also called source interface. It refers to the interface toward multicast
router between multicast router and the host. The ISCOM2828F receives multicast packets
from this interface.
Member interface
Known as the receiving interface, the member interface is the interface toward host between
multicast router and the host. The ISCOM2828F sends multicast packets from this interface.
Multicast address
In order to make multicast source and multicast group members communicate across the
Internet, you need to provide network-layer multicast address and link-layer multicast address,
i.e. IP multicast address and multicast MAC address. Note: multicast address only can be
destination address, but not source address.
IP multicast address
IANA (Internet Assigned Numbers Authority) assigns Class D address space to IPv4 multicast;
the range of IPv4 multicast address is from 224.0.0.0 to 239.255.255.255.
Multicast MAC address
When Ethernet transmits unicast IP packet, the destination MAC address will use the recipient
MAC address. However, when multicast packets are in transmission, the destination is no
longer a specific receiver, but a group with uncertain member, so it needs to use multicast
MAC address.
Multicast MAC address for link layer identifies the receiver of the same multicast group.
According to IANA, the high 24-bit of multicast MAC address are 0x01005E, the 25-bit is
fixed 0, the 23-bit corresponds to the low 23-bit of IPv4 multicast address.
The mapping relation between IP multicast address and MAC address is shown below.
Figure 5-1 Mapping relation between IPv4 multicast address and multicast MAC address
Since the first 4 bits of IP multicast address are 1110, indicating multicast identification. In the
last 28bits, only 23 bits are mapped to the multicast MAC address. And the missing 5 bits
information will make 32 IP multicast addresses map to the same multicast MAC address.
Therefore, in Layer 2, the ISCOM2828F may receive some other data out of IPv4 multicast
group, and these extra multicast data need to be filtered by the upper device.
5.1.3 MVR
MVR is a multicast constraining mechanism running on Layer 2 devices, used for managing
and controlling multicast groups and achieving Layer 2 multicastst.
MVR adds member interfaces belonging to different user VLANs on the Layer device to
multicast VLAN by configuring multicast VLAN and makes different VLAN user use one
common multicast VLAN, then the multicast data will be transmitted only in one multicast
VLAN without copying one for each user VLAN, thus saving bandwidth. At the same time,
multicast VLAN and user VLAN are completely isolated, which also increases the security.
Both MVR and IGMP Snooping can achieve Layer 2 multicast, but the difference is that
multicast VLAN in IGMP Snooping is the same with the user VLAN, while multicast VLAN
in MVR can be different from the user VLAN.
One switch can be configured with up to 10 multicast VLANs and at least one
multicast VLAN as well as the multicat address set. It supports up to 1024 multicast
groups.
device sends the first Report packet to the multicast router only rather than other identical
Report packets, to reduce packet quantity on the network.
To ensure information security, the administrator needs to limit the multicast users, such as
what multicast data are allowed to receive and what are not.
Configure IGMP Profile filtering rules to control the interface. One IGMP Profile can be set
one or more multicast group access control restrictions and access the multicast group
according to the restriction rules (permit and deny). If a rejected IGMP Profile filter profile is
applied to the interface, the interface will discard the IGMP report packet from this group
directly once receiving it and does not allow receiving this group of multicast data.
IGMP filtering rules can be configured on interface or VLAN.
IGMP Profile only applies to dynamic multicast groups, but not static ones.
Limit to the maximum number of multicast group
The maximum allowed adding number of multicast group and the maximum group limitation
rule can be set on interface or interface+VLAN.
The maximum group limitation rule sets the actions for reaching the maximum number of
multicast group users added, which can be no longer allowing user adding groups, or covering
the original adding group.
Scenario
Multiple hosts belonging to the same VLAN receive data from the multicast source. Enable
IGMP Snooping on the Layer 2 device that connects the multicast router and hosts. By
listening IGMP packets transmitted between the multicast router and hosts, creating and
maintaining the multicast forwarding table, you can implement Layer 2 multicast.
Prerequisite
Create a VLAN, and add related interfaces to the VLAN.
IGMP Snooping can dynamically learn router interfaces (on the condition that the
multicast router is enabled with multicast route protocol, and through IGMP query
packets), or you can manually configure dynamic learning so that downstream
multicast report and leaving packets can be forwarded to the router interface.
There is aging time for the router interface dynamically learnt and no aging time
for manually configured router interface.
The aging time of IGMP Snooping configured by the previous command takes effects
on all dynamically learnt router interfaces and multicast forwarding entries on the
ISCOM2828F.
Scenario
Multiple hosts receive data from the multicast sources. These hosts and the multicast router
belong to different VLANs. Enable MVR on Switch A, and configure multicast VLAN. In this
way, users in different VLANs can share a multicast VLAN to receive the same multicast data,
and reduce bandwidth waste.
Prerequisite
Create VLANs and add related interfaces to VLANs.
Scenario
In a network with multicast routing protocol widely applied, there are multiple hosts and
client subnets receiving multicast information. Enable IGMP Proxy on the Layer 2 device that
connects the multicast router and hosts, to block IGMP packets between hosts and the
multicast router and relieve the network load.
Configure IGMP Proxy to relive configuration and management of client subnet for the
multicast router and to implement multicast connection with the client subnet.
Prerequisite
Enable MVR.
Configure multicast VLAN and group address set.
Configure the source interface and the receiving interface, and add related interfaces to
the corresponding VLANs.
When IGMP Proxy is disabled, the following parameters of MVR Proxy can be
configured: source IP address, query interval, maximum response time to send
Query packets, and interval for last member to send Query packets. After IGMP
Proxy is enabled, these configurations will take effect immediately.
Scenario
The different users in the same multicast group receive different multicast requirements and
permissions, and allow configuring filtering rules on the switch which connects multicast
router and user host so as to restrict multicast users. The maximum number of multicast
groups allowed for users to join can be set.
Prerequisite
Enable MVR.
Configure multicast VLAN and group address set.
Configure the source interface and receiving interfaces, and add the related interfaces to
the responding VLANs.
Before configuring IGMP filter profile or the maximum group limitation, use the ip
igmp filter command to enable global IGMP filtering.
By default, there is no limit for the multicast group number. The action for the
maximum multicast group is deny.
5.6 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear mvr interface- Clear MVR statistics on the
type [ interface-number ] statistics interface.
Networking requirements
As shown below, Port 1 on the switch is connected with the multicast router; Port 2 and Port 3
connect users. All multicast users belong to the same VLAN 10; you need to configure IGMP
Snooping on the switch to receive multicast data with the address 234.5.6.7.
Configuration steps
Step 1 Create VLAN and add interface to VLAN.
Raisecom#config
Raisecom(config)#create vlan 10 active
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 10
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport access vlan 10
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#switchport access vlan 10
Raisecom(config-port)#exit
Raisecom(config)#igmp snooping
Raisecom(config)#igmp snooping vlan-list 10
Checking results
Check whether IGMP Snooping configuration is correct.
Networking requirements
As shown below, Port 1 of the switch connects with the multicast router, and Port 2 and Port 3
connect with users in different VLANs to receive data from multicast 234.5.6.7 and 225.1.1.1.
Configure MVR on the switch to designate VLAN 3 as a multicast VLAN, and then the
multicast data can only be copied one time in the multicast VLAN instead of copying for each
user VLAN, thus saving bandwidth.
Enabling MVR Proxy on the switch reduces communication between hosts and the multicast
router without implementing multicast functions.
When the PC and set-top box are added into the same multicast group, the switch receives two
IGMP Report packets and only sends one of them to the multicast router. The IGMP Query
packet sent by multicast will no longer be forwarded downstream, but the switch transmits
IGMP Query packet periodically.
Configuration steps
Step 1 Create VLANs on the switch A and add interfaces to them.
Raisecom(config)#config
Raisecom(config)#creat vlan 3,12,13 active
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 3
Raisecom(config-port)#switchport trunk untagged vlan 12,13
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 12
Raisecom(config-port)#switchport trunk untagged vlan 3
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 13
Raisecom(config-port)#switchport trunk untagged vlan 3
Raisecom(config)#mvr enable
Raisecom(config)#interface port 2
Raisecom(config-port)#mvr
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#mvr
Raisecom(config)#mvr vlan 3
Raisecom(config)#mvr vlan 3 group 234.5.6.7
Raisecom(config)#mvr vlan 3 group 225.1.1.1
Raisecom(config)#mvr proxy
Raisecom(config)#mvr proxy suppression
Raisecom(config)#ip igmp querier enable
Raisecom(config)#mvr proxy source-ip 192.168.1.2
Raisecom(config)#interface port 1
Raisecom(config-port)#mvr type source
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 3
Raisecom(config-port)#switchport trunk untagged vlan 12,13
Raisecom(config)#interface port 2
Raisecom(config-port)#mvr type receiver
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 12
Raisecom(config-port)#switchport trunk untagged vlan 3
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#mvr type receiver
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 13
Raisecom(config-port)#switchport trunk untagged vlan 3
Checking results
Check MVR configurations on the switch.
Raisecom#show mvr
MVR Running: Enable
MVR Multicast VLAN(ref):3(2)
MVR Max Multicast Groups: 3840
Networking requirements
Enable IGMP filtering on the switch. Add filtering rules on the interface to filter multicast
users.
As shown below,
Create an IGMP filtering rule Profile 1, set the action to pass for the multicast group
ranging from 234.5.6.7 to 234.5.6.10.
Apply filtering IGMP filtering rule Profile 1 on Port 2, allow the Set Top Box (STB) to
join the 234.5.6.7 multicast group, forbid it to join the 234.5.6.11 multicast group.
Apply no filtering rule on Port 3, and allow PCs to join the 234.5.6.11 multicast group.
Configure the maximum multicast group number on Port 2. After the STB is added to the
234.5.6.7 multicast group, add it to the 234.5.6.8 multicast group. Then, it quits the 234.5.6.7
multicast group.
Configuration steps
Step 1 Create VLANs, and create IGMP filtering rules.
Raisecom#config
Raisecom(config)#creat vlan 3,12,13 active
Raisecom(config)#ip igmp profile 1
Raisecom(config-igmp-profile)#range 234.5.6.7 234.5.6.10
Raisecom(config-igmp-profile)#permit
Raisecom(config)#mvr enable
Raisecom(config)#mvr vlan 3
Raisecom(config)#mvr vlan 3 group 234.5.6.7 5
Raisecom(config)#ip igmp filter
Raisecom(config)#interface port 1
Raisecom(config-port)#mvr type source
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 3
Raisecom(config-port)#switchport trunk untagged vlan 12,13
Step 4 Configure the RX interface on the STB, and apply IGMP filtering rule and set the maximum
multicast group number.
Raisecom(config)#interface port 2
Raisecom(config-port)#mvr type receiver
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 12
Raisecom(config-port)#switchport trunk untagged vlan 3
Raisecom(config-port)#ip igmp filter 1
Raisecom(config-port)#ip igmp max-groups 1
Raisecom(config-port)#ip igmp max-groups action replace
Raisecom(config)#interface port 3
Raisecom(config-port)#mvr type receiver
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 13
Raisecom(config-port)#switchport trunk untagged vlan 3
Checking results
Check whether IGMP filtering is correctly configured on the interface.
Networking requirements
Enable IGMP filtering on the switch. Add filtering rules in the VLAN to filter multicast users.
As shown below,
Create an IGMP filtering rule Profile 1, set the action to pass for the multicast group
ranging from 234.5.6.7 to 234.5.6.10.
Apply filtering IGMP filtering rule Profile 1 on VLAN 12, allow the STB to join the
234.5.6.7 multicast group, forbid it to join the 234.5.6.11 multicast group.
Apply no filtering rule on VLAN 3, and allow PCs to join the 234.5.6.11 multicast group.
Configure the maximum multicast group number in VLAN 12. After the STB is added to the
234.5.6.7 multicast group, add it to the 234.5.6.8 multicast group. Then, it quits the 234.5.6.7
multicast group.
Configuration steps
Step 1 Create a VLAN, and create IGMP filtering rules.
Raisecom#config
Raisecom(config)#creat vlan 3,12,13 active
Raisecom(config)#ip igmp profile 1
Raisecom(config-igmp-profile)#range 234.5.6.7 234.5.6.10
Raisecom(config-igmp-profile)#permit
Raisecom(config)#mvr enable
Raisecom(config)#mvr vlan 3
Raisecom(config)#mvr vlan 3 group 234.5.6.7 5
Raisecom(config)#ip igmp filter
Step 4 Configure the receiving interface on the STB, and apply IGMP filtering rule and set the
maximum multicast group number.
Raisecom(config)#interface port 1
Raisecom(config-port)#mvr type source
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 3
Raisecom(config-port)#switchport trunk untagged vlan 12,13
Raisecom(config)#interface port 2
Raisecom(config-port)#mvr type receiver
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 12
Raisecom(config-port)#switchport trunk untagged vlan 3
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#mvr type receiver
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk native vlan 13
Raisecom(config-port)#switchport trunk untagged vlan 3
Checking results
Check whether IGMP filtering is correctly configured in the VLAN.
6 Security
This chapter introduces basic principle and configuration of security and provides related
configuration examples, including the following sections:
ACL
Secure MAC address
Dynamic ARP inspection
RADIUS
TACACS+
Storm control
802.1x
IP Source Guard
PPPoE+
Loopback detection
Line detection
6.1 ACL
6.1.1 Introduction
Access Control List (ACL) is a set of ordered rules, which can control the ISCOM2828F to
receive or discard some data packets, thus prevent illegal packets from impacting network
performance.
ACL is composed of permit | deny sentences. The rules are described by the
source/destination MAC address, source/destination IP address, and port ID of data packets.
The ISCOM2828F judges whether to receive or discard packets according to these rules.
Scenario
ACL can help the network device recognize and filter specified data packtes. Only after the
device recognizes the specified packets, it can permit/deny corresponding packets to pass
according to the configured policy.
Prerequisite
N/A
ACL cannot take effect until it is added into a filter. Multiple ACL match rules can be
added into the filter to form multiple filtering rules. When you configure the filter, the
order to add ACL match rules decides priority of the rule. The later the rules are
added, the higher the priority is. If the multiple rules are conflicted in matching
calculation, take the higher priority rule as standard. Pay attention to the order of
rules to filter packets correctly.
6.1.9 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear filter statistics Clear filter statistics.
When sticky learning is enabled, all dynamic secure MAC addresses learnt from
an interface will be converted to sticky secure MAC addresses.
When sticky learning is disabled, all sticky secure MAC addresses on an interface
will be converted to dynamic secure MAC addresses.
When the MAC address is in drift, that is, the secure interface A receives one user
access corresponding a secure MAC address on secure interface B, secure interface
A will process it as a security violation.
Scenario
In order to ensure the security of data accessed by the interface of the switch, you can control
the input packets according to the source MAC address. With port security MAC, you can
configure permitting specified users to access the interface, or permitting specified number of
users to access through this interface only. However, when the number of users exceeds the
limit, accessed packets will be processed according to the secure MAC violation policy.
Prerequisite
N/A
Configure basic functions of port security MAC for the ISCOM2828F as below.
When the secure MAC violation policy is in Shutdown mode, you can use this
command to re-enable the interface which is shut down due to violating port
security MAC.
When the interface is Up, the configured port security MAC violation mode will
continue to be valid.
Use the switchport port-security command to enable port security MAC and
dynamic secure MAC learning at the same time.
6.2.9 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config-port)#clear port- Clear secure MAC addresses of a specified
security { all | configured | type on a specified interface.
dynamic | sticky }
Networking requirements
As shown below, the switch connects 3 user networks. To ensure the security of switch
interface access data, the configuration is as below.
Port 1 permits 3 users to access network at most. The MAC address of one user is
specified to 0000.0000.0001. The other 2 users dynamically learn the MAC addresses;
the NView NNM system will receive Trap information once the user learns a MAC
address. Violation mode is set to Protect and the aging time of the two learned MAC
addresses is set 10min.
Port 2 permits 2 users to access network at most. The 2 user MAC addresses are
confirmed through learning; once they are confirmed, they will not age. Violation mode
is set to Restrict mode.
Port 3 permits 1 user to access network at most. The specified user MAC address is
0000.0000.0002. The user MAC address can be controlled whether to age. Violation
mode adopts Shutdown mode.
Configuration steps
Step 1 Configure the secure MAC address of Port 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport port-security
Raisecom(config-port)#switchport port-security maximum 3
Raisecom(config-port)#switchport port-security mac-address 0000.0000.0001
vlan 1
Raisecom(config-port)#switchport port-security violation protect
Raisecom(config-port)#switchport port-security trap enable
Raisecom(config-port)#exit
Raisecom(config)#port-security aging-time 10
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport port-security
Raisecom(config-port)#switchport port-security maximum 2
Raisecom(config-port)#switchport port-security mac-address sticky
Raisecom(config-port)#switchport port-security violation restrict
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#switchport port-security
Raisecom(config-port)#switchport port-security maximum 1
Raisecom(config-port)#switchport port-security mac-address sticky
0000.0000.0002 vlan 1
Raisecom(config-port)#switchport port-security mac-address sticky
Checking results
Use the show port-security [ port-list port-list ] command to show port security MAC
configurations.
Use the show port-security mac-address command to show secure MAC address and secure
MAC address learning configurations on an interface.
Interface+IP+MAC
Interface+IP+VLAN
Interface+IP+MAC+VLAN
Dynamic ARP inspection interfaces are divided into the following two kinds according to
trust status:
Trusted interface: the interface will stop ARP inspection, which means taking no ARP
protection on the interface. All ARP packets are allowed to pass.
Untrusted interface: the interface takes ARP protection. Only ARP packets that match the
binding table rules are allowed to pass. Otherwise, they are discarded.
Scenario
Dynamic ARP inspection is used to prevent the common ARP spoofing attacks on the network,
which isolates the ARP packets with unsafe sources. Trust status of an interface depends on
whether trust ARP packets. However, the binding table decides whether the ARP packets meet
requirement.
Prerequisite
Enable DHCP Snooping if there is a DHCP user.
Before enabling dynamic binding of dynamic ARP inspection, you need to use the ip
dhcp snooping command to enable DHCP Snooping.
Configure dynamic binding of dynamic ARP inspection for the ISCOM2828F as below.
Networking requirements
To prevent ARP attacks, you need to configure dynamic ARP inspection function on Switch A,
as shown in Figure 6-3.
Uplink Port 3 permits all ARP packets to pass.
Downlink Port 1 permits ARP packets with specified IP address 10.10.10.1 to pass.
Other interfaces permit ARP packets complying with dynamic binding learnt by DHCP
snooping to pass.
Downlink Port 2 configures ARP packets rate limiting. The rate threshold is set to 20 pps
and rate limiting recovery time is set to 15s.
Configuration steps
Step 1 Set Port 3 to the trusted interface.
Raisecom#config
Raisecom(config)#interface port 3
Raisecom(config-port)#ip arp-inspection trust
Raisecom(config-port)#exit
Step 3 Enable binding between dynamic ARP inspection and dynamic DHCP Snooping.
Raisecom(config)#interface port 2
Raisecom(config-port)#ip arp-rate-limit rate 20
Raisecom(config-port)#ip arp-rate-limit enable
Raisecom(config-port)#exit
Checking results
Use the show ip arp-inspection command to show interface trust status configurations and
static/dynamic ARP binding configurations.
Raisecom#show ip arp-inspection
Static Config ARP Inspection: Enable
DHCP Snooping ARP Inspection: Enable
DHCP Relay ARP Inspection: Disable
ARP Inspection Protect Vlan : 1-4094
Bind Rule Num : 1
Vlan Acl Num : 0
Remained Acl Num : 512
Port Trust
-------------
1 no
2 no
3 yes
4 no
…
Use the show ip arp-inspection binding command to show dynamic ARP binding table
information.
Use the show ip arp-rate-limit command to show interface rate limiting configurations and
rate limiting auto-recovery time configurations.
Raisecom#show ip arp-rate-limit
arp rate limit auto recover: enable
arp rate limit auto recover time: 15 second
Port Enable-Status Rate(Num/Sec) Overload
--------------------------------------------------
1 Disabled 100 No
2 Enabled 20 No
3 Disabled 100 No
4 Disabled 100 No
…
6.4 RADIUS
6.4.1 Introduction
Remote Authentication Dial In User Service (RADIUS) is a standard communication protocol
that provides centralized Authentication, Authorization, and Accounting (AAA) management
for remote users. RADIUS uses the User Datagram Protocol (UDP) as the transport protocol
(port 1812/1813) and has good instantaneity. In addition, RADIUS supports re-transmission
mechanism and backup server mechanism. Therefore, it provides good reliability.
RADIUS accounting
RADIUS accounting is designed for RADIUS authenticated users. When a user logs in to the
device, the device sends an accounting packet to the RADIUS accounting server to begin
accounting. During login, the device sends accounting update packets to the RADIUS
accounting server. When the user exits from the device, no accounting packet is sent to the
RADIUS accounting server. These packets contain the login time. With these packets, the
RADIUS accounting server can record the access time and operation of each user.
Scenario
You can deploy the RADIUS server on the network to conduct authentication and accounting
to control users to access to the ISCOM2828F and network. The ISCOM2828F can be used as
agent of the RADIUS server, which authorizes user to access according to feedback from
RADIUS.
Prerequisite
N/A
Networking requirements
As shown in Figure 6-4, you need to configure RADIUS authentication and accounting on
switch A to authenticate login users and record their operations. The period for sending update
packets is 2min. The user will be offline if the accounting fails.
Configuration steps
Step 1 Authenticate login users through RADIUS.
Raisecom#radius 192.168.1.1
Raisecom#radius-key raisecom
Raisecom#user login radius-user
Raisecom#enable login local-radius
Checking results
Use the show radius-server command to show RADIUS server configurations.
Raisecom#show radius-server
Authentication server IP: 192.168.1.1 port:1812
Backup authentication server IP:0.0.0.0 port:1812
Authentication server key: raisecom
Accounting server IP: 192.168.1.1 port:1813
Backup accounting server IP: 0.0.0.0 port:1813
Accounting server key: raisecom
Use the show aaa accounting command to show RADIUS accounting configurations.
6.5 TACACS+
6.5.1 Introduction
Terminal Access Controller Access Control System (TACACS+) is a network access
authentication protocol similar to RADIUS. Compared with RADIUS, TACACS+ has the
following features:
Use TCP port 49, providing the higher transmission reliability. RADIUS uses a UDP port.
Encapsulate the whole standard TACACS+ packet but for the TACACS+ header, a field
in the header indicates whether the packet is encapsulated. Compared with RADIUS
which encapsulates the user password only, TACACS+ provides higher security.
Separate TACACS+ authentication from TACACS+ authorization and TACACS+
accounting, providing a more flexible deployment mode.
Therefore, compared with RADIUS, TACACS+ is more secure and reliable. However, as an
open protocol, RADIUS is more widely used.
Scenario
You can authenticate and account on users by deploying a TACACS+ server on the network to
control user to access the ISCOM2828F and network. TACACS+ is safer and more reliable
than RADIUS. The ISCOM2828F can be used as an agent of the TACACS+ server, and
authorize users access according to feedback result from the TACACS+ server.
Prerequisite
N/A
6.5.8 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom#clear tacacs statistics Clear TACACS+ statistics.
Networking requirements
As shown in Figure 6-5, you need to configure TACACS+ authentication on Switch A to
authenticate users who log in to the ISCOM2828F.
Configuration steps
Step 1 Authenticate login users through TACACS+.
Raisecom#tacacs-server 192.168.1.1
Raisecom#tacacs-server key raisecom
Raisecom#user login tacacs-user
Raisecom#enable login local-tacacs
Checking results
Use the show tacacs-server command to show TACACS+ configurations.
Raisecom#show tacacs-server
Server Address: 192.168.1.1
Backup Server Address: --
Sever Shared Key: raisecom
Total Packet Sent: 0
Total Packet Recv: 0
Accounting server Address: --
Backup Accounting server Address: --
Scenario
Configuring storm control on Layer 2 devices can prevent broadcast storm occurring when
broadcast packets increase sharply on the network. Therefore, it makes sure that unicast
packets can be properly forwarded.
The following forms of traffic may cause broadcast traffic, so you need to limit the bandwidth
for them on Layer 2 devices.
Unknown unicast traffic: the unicast traffic whose MAC destination address is not in
MAC address table. It is broadcasted by Layer 2 devices.
Unknown multicast traffic: the multicast traffic whose MAC destination address is not in
MAC address table. Generally, it is broadcasted by Layer 2 devices.
Broadcast traffic: the traffic whose MAC destination address is a broadcast MAC
address. It is broadcasted by Layer 2 devices.
Prerequisite
To configure storm control, you need to:
Connect the interface and configure its physical parameters.
Make the physical layer of the interface Up.
Networking requirements
As shown in Figure 6-6, to restrict influence on Switch A caused by broadcast storm, you
need to configure storm control on Switch A to control broadcast packets and unknown
unicast packets. The control threshold is set to 640 Kbit/s, and burst is set to 80 KBytes.
Configuration steps
Step 1 Configure storm control on Switch A.
Raisecom#config
Raisecom(config)#storm-control broadcast enable port 1-2
Raisecom(config)#storm-control dlf enable port 1-2
Raisecom(config)#storm-control bps 640 80
Checking results
Use the show storm-control command to show storm control configurations.
Raisecom#show storm-control
Threshold: 640 kbps
Burst: 80 kB
Port Broadcast Multicast DLF_Unicast
-----------------------------------------------------------
1 Enable Disable Enable
2 Enable Disable Enable
3 Enable Disable Disable
6.7 802.1x
6.7.1 Introduction
802.1x, based on IEEE 802.1x, is a VLAN-based network access control technology. It is
mainly used to solve authentication and security problems of LAN users.
It is used to authenticate and control access devices at the physical layer of the network device.
It defines a point-to-point connection mode between the device interface and user devices.
User devices, connected to the interface, can access resources in the LAN if they are
authenticated. Otherwise, they cannot access resources in the LAN through the switch.
802.1x structure
As shown in Figure 6-7, 802.1x authentication uses the Client/Server mode, including the
following 3 parts:
Supplicant: a user-side device installed with the 802.1x client software (such as Windows
XP 802.1x client), such as a PC
Authenticator: an access control device supporting 802.1x authentication, such as a
switch
Authentication Server: a device used for authenticating, authorizing, and accounting
users. In general, the RADIUS server is taken as the 802.1x authentication server.
Both the authenticator and the suppliant can initiate the 802.1x authentication procedure. This
guide takes the suppliant for an example, as shown below:
Step 1 The user enters the user name and password. The supplicant sends an EAPoL-Start packet to
the authenticator to start the 802.1x authentication.
Step 2 The authenticator sends an EAP-Request/Identity to the suppliant, asking the user name of the
suppliant.
Step 3 The suppliant replies an EAP-Response/Identity packet to the authenticator, which includes
the user name.
Step 4 The authenticator encapsulates the EAP-Response/Identity packet to the RADIUS protocol
packet and sends the RADIUS protocol packet to the authentication server.
Step 5 The authentication server compares with received encrypted password with the one generated
by itself.
If identical, the authenticator modifies the interface state to authorized state, allowing users to
access the network through the interface and sends an EAP-Success packet to the suppliant.
Otherwise, the interface is in unauthorized state and sends an EAP-Failure packet to the
suppliant.
802.1x timers
During 802.1x authentication, the following 5 timers are involved:
Reauth-period: re-authorization t timer. After the period is exceeded, the ISCOM2828F
re-initiates authorization.
Quiet-period: quiet timer. When user authorization fails, the ISCOM2828F needs to keep
quiet for a period. After the period is exceeded, the ISCOM2828F re-initiates
authorization. During the quiet time, the ISCOM2828F does not process authorization
packets.
Tx-period: transmission timeout timer. When the ISCOM2828F sends a Request/Identity
packet to users, the ISCOM2828F will initiate the timer. If users do not send an
authorization response packet during the tx-period, the ISCOM2828F will re-send an
authorization request packet. The ISCOM2828F sends this packet three times in total.
Supp-timeout: Supplicant authorization timeout timer. When the ISCOM2828F sends a
Request/Challenge packet to users, the ISCOM2828F will initiate supp-timeout timer. If
users do not send an authorization response packet during the supp-timeout, the
ISCOM2828F will re-send the Request/Challenge packet. The ISCOM2828F sends this
packet twice in total.
Server-timeout: Authentication server timeout timer. The timer defines the total timeout
period of sessions between authorizer and the RADIUS server. When the configured time
is exceeded, the authenticator will end the session with RADIUS server and start a new
authorization process.
Scenario
To realize access authentication on LAN users and ensure access user security, you need to
configure 802.1x authentication on the ISCOM2828F.
If users are authenticated, they are allowed to access network resources. Otherwise, they
cannot access network resources. By performing authentication control on user access
interface, you can manage the users.
Prerequisite
If RADIUS authentication server is needed during 802.1x authentication, you need to perform
following operations:
Configure the IP address of the RADIUS server and the RADIUS shared key.
The ISCOM2828F can ping through the RADIUS server successfully.
802.1x and STP are exclusive on the same interface. You cannot enable them
concurrently.
Only one user authentication request is processed on an interface at one time.
Configure basic functions of 802.1x for the ISCOM2828F as below.
To configure EAP relay authentication mode, ensure that the RADIUS server
supports EAP attributes.
If 802.1x is disabled in global/interface configuration mode, the interface access
control mode of 802.1x is set to authorized-force mode.
6.7.8 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Networking requirements
To make users access external network, you need to configure 802.1x authentication on the
switch, as shown in Figure 6-8.
Configure the switch.
− IP address: 10.10.0.1
− Subnet mask: 255.255.0.0
− Default gateway address: 10.10.0.2
Perform authorization and authentication through the RADIUS server.
− IP address of the RADIUS server: 192.168.0.1
− Password of the RADIUS server: raisecom
Set the interface access control mode to protocol authorized mode.
After authorized successfully, the user can initiate re-authentication in 600s.
Configuration steps
Step 1 Configure the IP addresses of the switch and RADIUS server.
Raisecom#config
Raisecom(config)#interface ip 0
Raisecom(config-ip)#ip address 10.10.0.1 255.255.0.0 1
Raisecom(config-ip)#exit
Raisecom(config)#ip default-gateway 10.10.0.2
Raisecom(config)#exit
Raisecom#radius 192.168.0.1
Raisecom#radius-key raisecom
Raisecom#config
Raisecom(config)#dot1x enable
Raisecom(config)#interface port 1
Raisecom(config-port)#dot1x enable
Checking results
Use the show dot1x port-list port-list command to show 802.1x configurations.
Scenario
There are often some IP source spoofing attacks in network. For example, the attacker
pretends legal users to send IP packets to the server, or the attacker forges the source IP
address of another user to communicate. This makes the legitimate users cannot get network
services normally.
With IP Source Guard binding, you can filter and control packets forwarded by the interface,
prevent the illegal packets passing through the interface, thus to restrict the illegal use of
network resources and improve the interface security.
Prerequisite
Enable DHCP Snooping/DHCP Relay if there is a DHCP user.
The configured static binding relationship does not take effect when global static
binding is disabled. Only when global static binding is enabled, the static binding
relationship takes effect.
For an identical IP address, the manually-configured static binding relationship will
cover the dynamic binding relationship. However, it cannot cover the existing
static binding relationship. When the static binding relationship is deleted, the
system will recover the covered dynamic binding relationship automatically.
The dynamic binding relationship learnt through DHCP Snooping does not take
effect when global dynamic binding is disabled. Only when global dynamic binding
is enabled, the dynamic binding relationship takes effect.
If an IP address exists in the static binding table, the dynamic binding relationship
does not take effect. In addition, it cannot cover the existing static binding
relationship.
Networking requirements
As shown in Figure 6-10, to prevent IP address embezzlement, you need to configure IP
Source Guard on the switch.
The switch permits all IP packets on Port 1 to pass.
Port 2 permits IP packets with specified the IP address 10.10.10.1 and subnet mask
255.255.255.0 and the IP packets meeting DHCP Snooping learnt dynamic binding
relationship to pass.
Other interfaces only permit the packets meeting DHCP Snooping learnt dynamic
binding relationship to pass.
Configuration steps
Step 1 Set Port 1 to a trusted interface.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-port)#ip verify source trust
Raisecom(config-port)#exit
Checking results
Use the show ip source binding command to show static binding table configurations.
Use the show ip verify source command to show interface trust status and IP Source Guard
static/dynamic binding configurations.
6.9 PPPoE+
6.9.1 Introduction
PPPoE Intermediate Agent (PPPoE+) is used in processing of authentication packet. PPPoE+
adds device information into the authentication packet to bind account and access device so
that the account is not shared and stolen, and the carrier's and users' interests are protected.
This will give the server enough information to identify users, avoiding account sharing and
theft and ensuring the network security.
With PPPoE dial-up mode, you can access the network through various interfaces of the
device only when one authentication is successfully. However, the server cannot accurately
differentiate users just by the authentication information, which contains the user name and
password. With PPPoE+, besides the user name and the password, other information, such as
the interface ID, is included in the authentication packet for authentication. If the interface ID
identified by the authentication server cannot match with the configured one, authentication
fails. This helps prevent illegal users from stealing accounts of other legal users for accessing
the network.
The PPPoE protocol adopts Client/Server mode, as shown in Figure 6-11. The switch acts as a
relay agent. Users access the network through PPPoE authentication. If the PPPoE server
needs to locate users, more information should be contained in the authentication packet.
Scenario
To prevent illegal client from accessing the network during PPPoE authentication, you need to
configure PPPoE+ to add additional user identification information in PPPoE packets for
network security.
Because the added user identification information is related to the specified switch and
interface, the authentication server can bind the user with the switch and interface to
effectively prevent account sharing and theft. In addition, this helps locate users to ensure
network security.
Prerequisite
N/A
PPPoE+ is used to process PADI and PADR packets. It is designed for the PPPoE
client. In general, PPPoE+ is only enabled on interfaces that are connected to the
PPPoE client. Trusted interfaces are interfaces through which the switch is connected
to the PPPoE server. PPPoE+ and trusted interface are exclusive. An interface is
either enabled with PPPoE+ or is a trusted interface.
Enabling PPPoE+
After interface PPPoE+ is enabled, PPPoE authentication packets sent to the interface will be
attached with user information and then are forwarded to the trusted interface.
Enable PPPoE+ for the ISCOM2828F as below.
Because PPPoE+ is designed for the PPPoE client instead of the PPPoE server,
downlink interfaces of the device cannot receive the PADO and PADS packets. It
means that interfaces, where PPPoE+ is enabled, should not receive PADO and
PADS packet. If there interfaces receive these packets, it indicates that there are
error packets and the packets should be discarded. However, these interfaces can
forward PADO and PADS packets of trusted packet. In addition, PADI and PADR
packets are forwarded to the trusted interface only.
Configuring Circuit ID
The Circuit ID has 2 padding modes: Switch mode and ONU mode. By default, Switch mode
is adopted. In ONU mode, the Circuit ID has a fixed format. The following commands are
used to configure the padding contents of the Circuit ID in Switch mode.
In switch mode, the Circuit ID supports 2 padding modes:
Default mode: when customized Circuit ID is not configured, the padding content is the
VLAN ID, interface ID, or the attached string. If the attached string is not defined, it is
set to hostname by default.
Customized mode: when customized Circuit ID is configured, the padding content is the
Circuit IS string.
Configure Circuit ID for the ISCOM2828F as below.
In default mode, the Circuit ID contains an attached string. By default, the attached string is
set to the hostname of the switch. You can set it to a customized string.
Configure the attached string of the Circuit ID for the ISCOM2828F as below.
Configuring Remote ID
The Remote ID is padded with a MAC address of the switch or a client. In addition, you can
specify the form (binary/ASCII) of the MAC address.
Configure Remote ID for the ISCOM2828F as below.
6.9.7 Maintenance
You can maintain operating status and configurations on the PPPoE+ feature through the
below command.
Command Description
Networking requirements
As shown in Figure 6-12, to prevent illegal access during PPPoE authentication and to control
and monitor users, you need to configure PPPoE+ on the switch.
Port 1 and Port 2 are connected to Client 1 and Client 2 respectively. Port 3 is connected
to the PPPoE server.
Enable global PPPoE+ and enable PPPoE+ on Port 1 and Port 2. Set Port 3 to the trusted
interface.
Set the attached string of the Circuit ID to raisecom. Set the padding content of the
Circuit ID on Port 1 to user01. Set the padding content of the Remote ID on Port 2 to the
MAC address of the client. The padding contents are in ASCII mode.
Enable Tag overriding on Port 1 and Port 2.
Configuration steps
Step 1 Set Port 3 to the trusted interface.
Raisecom#config
Raisecom(config)#interface port 3
Raisecom(config-port)#pppoenagent trust
Raisecom(config-port)#exit
Raisecom(config)#interface port 1
Raisecom(config-port)#pppoeagent vendor-specific-tag overwrite enable
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#pppoeagent vendor-specific-tag overwrite enable
Raisecom(config-port)#exit
Raisecom(config)#interface port 1
Raisecom(config-port)#pppoeagent enable
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#pppoeagent enable
Checking results
Use the show pppoeagent [ port-list port-list ] command to show PPPoE+ configurations.
Self-loop: user loop in the same Ethernet interface on the same device, user network B
has loop itself, which forms self-loop;
Internal loop: the loop formed in different Ethernet interfaces on the same device, Switch
C interface 1 and interface 3 forms internal loop with the user network A;
External loop: the loop formed in the Ethernet interface of different devices, Switch A,
Switch B and Switch C form external loop with user network C.
Scenario
On the network, hosts or Layer 2 devices under access devices may form loop by network
cable intentionally or involuntary. Enable loopback detection function at downlink interface
of access device to avoid the network jam formed by unlimited copies of data flow caused by
downlink interface loop. Block the loop interface once there is a loop.
Prerequisite
Configure interface physical parameters to make it Up before configuring loopback detection.
Loopback detection function and STP are exclusive, only one can be enabled at
one time.
The straight connection device cannot enable loopback detection in both ends
simultaneously; otherwise the interfaces at both ends will be blocked.
Configure loopback detection function as below.
6.10.6 Maintenance
Maintain the ISCOM2828F by below commands.
Command Description
Raisecom(config-port)#clear loopback- Clear loopback detection statistics.
detection statistic
Networking requirements
As shown in Figure 6-14, Port 1 of Switch A is connected to core network; Port 2 and Port 3
of Switch A are connected to user network. There is loop in user network. Enable loopback
detection function on Switch A to detect loop in user network and then can block the related
port.
Configuration steps
Step 1 Create VLAN 3 and add Port 2 and Port 3 into VLAN 3.
Raisecom#config
Raisecom(config)#create vlan 3 active
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport access vlan 3
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#switchport access vlan 3
Raisecom(config-port)#exit
Checking results
Use the show loopback-detection command to show interface loopback detection status.
Period of loopback-detection:3s
Restore time:infinite
Port State Status exloop-act Last Last-Occur Open-Time vlan
Loop-with (ago) (ago)
-------------------------------------------------------------------------
2 Ena no trap-only -- -- -- --
3 Ena no trap-only -- -- -- --
Scenario
With this function, you can query status of physical lines between devices, analyze faults, and
maintain the network.
Prerequisite
N/A
Networking requirements
As shown in Figure 6-15, to help you analyze fault source, detect lines with the switch.
No line detection is done before.
Configuration steps
Perform line detection on Ports 1–3 on the ISCOM2828F.
Checking results
Use show cable-diagnostics port-list [ all | port-list ] command to check whether Port 1 and
Port 2 on the ISCOM2828F are correctly configured.
Remove the line that connects PC 1 and the ISCOM2828F from the PC 1, and perform line
detection again. Use the show cable-diagnostics port-list [ all | port-list ] command to check
whether line detection is correctly configured.
7 Reliability
This chapter introduces basic principle and configuration of reliability, and provides related
configuration examples, including the following sections:
Link aggregation
Interface backup
Failover
STP
MSTP
ERPS
RRPS
After receiving the LACPDU, the peer compares its information with the one received by
other interfaces to select a selected interface. Therefore, the interface and the peer are in the
same Selected status. The operation key is a configuration combination automatically
generated based on configurations of the interface, such as the rate, duplex mode, and
Up/Down status. In a link aggregation group, interfaces in the Selected status share the
identical operation key.
Dynamic LACP link aggregation
In dynamic LACP link aggregation, the system automatically creates and deletes the LAG and
member interfaces through LACP. Interfaces cannot be automatically aggregated into a group
unless their basic configurations, rates, duplex modes, connected devices, and the peer
interfaces are identical.
In manual aggregation mode, all member interfaces are in forwarding status, sharing loads. In
static/dynamic LACP mode, there are backup links.
Link aggregation is the most widely-used and simplest Ethernet reliability technology.
Scenario
When needing to provide higher bandwidth and reliability for a link between two devices, you
can configure the link aggregation.
With link aggregation, multiple physical Ethernet ports are added to a Trunk group and are
aggregated to a logical link. The link aggregation helps sharing uplink and downlink traffics
among members in one aggregation group. Therefore, the link aggregation helps get higher
bandwidth and helps members in one aggregation group back up data for each other, which
improving the reliability of Ethernet connection.
Prerequisite
Before configuring link aggregation, you need to configure physical parameters on a interface
and make the physical layer Up.
In the same LAG, member interfaces that share loads must be identically configured.
These configurations include QoS, QinQ, VLAN, interface properties, and MAC
address learning.
QoS: traffic policing, rate limit, SP queue, WRR queue scheduling, interface
priority and interface trust mode.
QinQ: QinQ enabling/disabling status on the interface, added outer VLAN tag,
policies for adding outer VLAN Tags for different inner VLAN IDs.
VLAN: the allowed VLAN, default VLAN and the link type (Trunk or Access) on
the interface, subnet VLAN configurations, protocol VLAN configurations, and
whether VLAN packets carry Tag.
Port properties: whether the interface is added to the isolation group, interface
rate, duplex mode, and link Up/Down status.
MAC address learning: whether enabling the MAC address learning, and
whether the MAC address limit is configured on the interface.
Interfaces in a static LACP LAG can be in active or standby status. Both active
interfaces and standbys interface can receive/transmit LACP packets, but standby
interfaces cannot forward client packets.
The system selects a default interface based on the following conditions in order:
whether its neighbour is discovered, maximum interface rate, highest interface
LACP priority, and smallest interface ID. The default interface is in active status.
Interfaces, which have the same rate, peer device, and operation key with the
default interface, are in active status. Other interfaces are in standby status.
Networking requirements
As shown in Figure 7-1, to improve link reliability between Switch A and Switch B, you
should configure manual link aggregation for the two devices. Add Port 1 and Port 2 into a
LAG to create a logical interface. Member interfaces in the LAG share loads according to the
source MAC address.
Configuration steps
Step 1 Create a manual LAG.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#trunk group 1 port 1-2
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#trunk group 1 port 1-2
Configure Switch B.
SwitchA(config)#trunk enable
Configure Switch B.
SwitchB(config)#trunk enable
Checking results
Use the show trunk command to show global configurations on manual link aggregation.
SwitchA#show trunk
Trunk: Enable
Loading sharing mode: SMAC
Trunk Group Mode Member Ports Efficient Ports
-----------------------------------------------------------
1 manual 1,2 1,2
Networking requirements
As shown in Figure 7-2, to improve link reliability between Switch A and Switch B, you can
configure static LACP link aggregation between these 2 devices. Add Port 1 and Port 2 into
one LAG, where Port 1 is used as the current link and Port 2 is the protection link.
Configuration steps
Step 1 Configure a static LACP LAG on Switch A and set Switch A to the active end.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#truck group 1 port 1-2 lacp-static
SwitchA(config)#lacp system-priority 1000
SwitchA(config)#trunk group 1 min-active links 1
SwitchA(config)#interface port 1
SwitchA(config-port)#lacp port-priority 1000
SwitchA(config-port)#exit
SwitchA(config)#trunk enable
Raisecom#hostname SwitchB
SwitchB#config
Checking results
Use the show trunk command on Switch A to show global configurations on static LACP
link aggregation.
SwitchA#show trunk
Trunk: Enable
Loading sharing mode: SMAC
Trunk Group Mode Member Ports Efficient Ports
-----------------------------------------------------------
1 static 1,2 --
Use the show lacp internal command on Switch A to show LACP interface status, flag,
interface priority, administration key, operation key, and interface status of the state machine
about the local system.
Use the show lacp neighbour command on Switch A to show LACP interface status, flag,
interface priority, administration key, operation key, and interface status of the state machine
about the peer system.
Interface backup, targeted for dual uplink networking, implements redundancy backup and
quick switching through working and protection links. It ensures performance and simplifies
configurations.
Interface backup is another solution of STP. When STP is disabled, you can realize basic link
redundancy by manually configuring interfaces. If the switch is enabled with STP, you should
disable interface backup because STP has provided similar functions.
Principles
Interface backup is realized by configuring the interface backup group. Each interface backup
group contains a primary interface and a backup interface. The link, where the primary
interface is, is called a primary link while the link, where the backup interface is, is called the
backup interface. Member interfaces in the interface backup group supports physical
interfaces and link aggregation groups. However, they do not support Layer 3 interfaces.
In the interface backup group, when an interface is in Up status, the other interface is in
Standby statue. At any time, only one interface is in Up status. When the Up interface fails,
the Standby interface is switched to the Up status.
Scenario
When STP is disabled, by configuring interface backup, you can realize redundancy backup
and fast switching of primary/backup link, and load sharing between different interfaces.
Compared with STP, interface backup not only ensures millisecond level fast switching, also
simplifies configurations.
Prerequisite
Create VLANs.
Add interfaces to VLANs.
Disable STP.
Interface backup and STP, loopback detection, Ethernet ring, ELPS, and ERPS may
interfere with each other. Configuring any two of them concurrently on an interface is
not recommended.
Step Command Description
1 Raisecom#config Enter global configuration mode.
2 Raisecom(config)#interface port Enter physical layer interface
port-id configuration mode.
3 Raisecom(config- Configure the interface backup
port)#switchport backup port group.
port-id [ vlanlist vlan-list ]
4 Raisecom(config-port)#exit Return to global configuration mode.
5 Raisecom(config)#switchport (Optional) configure the restore-delay
backup restore-delay period period.
6 Raisecom(config)#switchport (Optional) configure the restoration
backup restore-mode { disable | mode.
neighbor-discover | port-up }
After Force switch (FS) is successfully configured, the primary/backup link will be
switched; namely, the current link is switched to the backup link (without considering
Up/Down status of the primary/backup interface). For example, when both the
primary interface and backup interface are in Up status, data are transmitted on the
primary link. In this situation, if you perform FS, the working link changes from the
primary link to the backup link.
In the command, the backup interface ID is optional. If the primary interface is
configured with multiple interface backup groups, you should input the backup
interface ID.
Configure FS on interfaces for the ISCOM2828F as below.
Networking requirements
When only link aggregation is configured, all VLAN data comes from only one interface,
where packet discarding occurs and services are impacted. In this situation, you can configure
two link aggregation groups to sharing VLAN data to two interfaces so that load balancing
can work and the protection feature of link aggregation groups can be inherited.
As shown in Figure 7-5, the PC accesses the server through switches. To realize a reliable
remote access from the PC to the server, configure an interface backup group on Switch A and
specify the VLAN list so that the two interfaces concurrently forward services in different
VLANs and share load. Configure Switch A as below:
Switch A is in VLANs 100–150. Port 1 is the primary interface and Port 2 is the backup
interface.
Switch A is in VLANs 151–200. Port 2 is the primary interface and Port 1 is the backup
interface.
When Port 1 or its link fails, the system switches to the backup Port 2 to resume the link.
Switch A should support interface backup while Switch B, Switch C, and Switch D do not
need to support interface backup.
Configuration steps
Step 1 Create VLANs 100–200 and add Port 1 and Port 2 to VLANs 100–200.
Raisecom#config
Raisecom(config)#create vlan 100-200 active
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk allowed vlan 100-200 confirm
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport mode trunk
Raisecom(config-port)#switchport trunk allowed vlan 100-200 confirm
Raisecom(config-port)#exit
Step 2 Set Port 1 to the primary interface and set Port 2 to the backup interface in VLANs 100–150.
Raisecom(config)#interface port 1
Raisecom(config-port)#switchport backup port 2 vlanlist 100-150
Raisecom(config-port)#exit
Step 3 Set Port 2 to the primary interface and set Port 1 to the backup interface in VLANs 151–200.
Raisecom(config)#interface port 2
Raisecom(config-port)#switchport backup port 1 vlanlist 151-200
Checking results
Use the show switchport backup command to view status of interface backup under normal
or faulty conditions.
When both Port 1 and Port 2 are Up, Port 1 forwards traffic of VLANs 100–150, and Port 2
forwards traffic of VLANs 151–200.
Manually disconnect the link between Switch A and Switch B to emulate a fault. Then, Port 1
becomes Down, and Port 2 forwards traffic of VLANs 100–200.
When Port 1 resumes and keeps Up for 15s (restore-delay), it forwards traffic of VLANs 100–
150 while Port 2 forwards traffic of VLANs 151–200.
7.3 Failover
7.3.1 Introduction
Failover provides a port linkage scheme to extend the range of link backup. By monitoring
uplinks and synchronizing downlinks, add uplink and downlink interfaces to a failover group.
Therefore, the downlink devices can be informed of faults of uplink devices immediately to
trigger switching. Failover can be used to prevent traffic loss due to uplink failures.
Once all uplink interfaces fail, downlink interfaces are in Down status. When at least one
uplink interface recovers, downlink interface recovers to Up status. Therefore, faults of uplink
devices can be transmitted to the downlink devices immediately. Uplink interfaces are not
influenced when downlink interfaces fail.
Scenario
When the uplink on the intermediate device fails, traffic cannot switch to the standby link if
downlink devices are not informed in time, and then the traffic transmission will be
interrupted.
Through failover, you can add the uplink and downlink interfaces on the intermediate device
into a failover group and monitor the uplink interface in real time. When all uplink interfaces
fails, downlink devices will be informed immediately to trigger switching.
Prerequisite
To configure failover, you need to:
Connect the interface and configure its physical parameters.
Make the physical layer of the interface Up.
One failover group can contain several uplink interfaces. Failover will not be
performed when at least one uplink interface is Up. Only when all uplink interfaces
are Down, failover occurs.
In global configuration mode, use the no link-state-tracking group group-number
command to disable failover. The failover group will be deleted if there is no
interface in it.
Use the no link-state-tracking group command to delete an interface from the
failover group in physical layer interface configuration mode. If there is no other
interface and failover is disabled, the failover group will be deleted when the
interface is deleted.
Networking requirements
As shown in Figure 7-6, to improve network reliability, Link 1 and Link 2 of Switch B are
connected to Switch A and Switch C respectively. Link 1 is the primary link and Link 2 is the
standby link. Link 2 will not be used to forward data until Link 1 is fault.
Switch A and Switch C are connected to the uplink network in link aggregation mode. When
all uplink interfaces of Switch A and Switch C fails, Switch B needs to sense fault in time
switches traffic to the standby link. Therefore, you should deploy failover on Switch A and
Switch C.
Configuration steps
Step 1 Configure failover on Switch A.
Create the failover group.
Raisecom#config
Raisecom(config)#link-state-tracking group 1
Raisecom(config)#interface port 1
Raisecom(config-port)#link-state-tracking group 1 upstream
Raisecom(config-port)#exit
Raisecom(config)#interface port 2
Raisecom(config-port)#link-state-tracking group 1 upstream
Raisecom(config-port)#exit
Raisecom(config)#interface port 3
Raisecom(config-port)#link-state-tracking group 1 downstream
Checking results
This guide takes configurations on Switch A for example.
Use the show link-state-tracking group command to show failover group configurations.
After all uplinks of Switch A fail, use the show link-state-tracking group command to show
failover group configurations. In this case, you can see that downlink Port 3 is disabled.
7.4 STP
7.4.1 Introduction
STP
With the increasing complexity of network structure and growing number of switches on the
network, Ethernet network loops become the most prominent problem. Because of the packet
broadcast mechanism, network loop will make the network generate network storm, exhaust
network resources, and have serious impact to the normal data forwarding. The network storm
caused by network loops is shown as below.
RSTP
For improving the slow convergent speed of STP, IEEE 802.1w establishes Rapid Spanning
Tree Protocol (RSTP), which increases the mechanism to change interface blocking state to
forwarding state, speed up the topology convergence rate.
The purpose of STP/RSTP is to simplify a bridge connection LAN to a unitary spanning tree
in logical topology and so as to avoid broadcast storm.
The disadvantages of STP/RSTP are exposed with the rapid development of VLAN
technology. The unitary spanning tree simplified from STP/RSTP leads the below problems:
The whole switched network has only one spanning tree, which will lead to longer
convergence time in a larger network.
Waste of bandwidth since a link does not carry any flow after it is blocked;
Packet of partial VLAN cannot be forwarded when network structure is unsymmetrical.
As shown below, Switch B is the root switch, RSTP blocks the link between Switch A
and Switch C logically and makes that the VLAN 100 packet cannot be transmitted and
Switch A and Switch C cannot communicate.
Networking situation
In big LANs, multiple devices are concatenated for inter-access among hosts. They need to
enable STP to avoid loop among the devices, MAC address learning fault, and broadcast
storm and network down caused by quick copy and transmission of data frame. STP
calculation can block one interface in a broken loop and make sure that there is only one path
from data flow to destination host, which is also the best path.
Preconditions
Configure interface physical parameters to make it Up before configuring STP.
Networking requirements
As shown below, Switch A, Switch B, and Switch C forms a ring network, so the loopback
problem must be solved in the situation of a physical ring. Enable STP on them, set the
priority of Switch A to 0, and path cost from Switch B to Switch A to 10.
Configuration steps
Step 1 Enable STP on Switch A, Switch B, and Switch C.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#spanning-tree enable
SwitchA(config)#spanning-tree mode stp
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#spanning-tree enable
SwitchB(config)#spanning-tree mode stp
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#spanning-tree enable
SwitchC(config)#spanning-tree mode stp
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
Configure Switch C.
SwitchC(config)#interface port 1
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
SwitchC(config)#interface port 2
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
SwitchA(config)#spanning-tree priority 0
SwitchA(config)#interface port 2
SwitchA(config-port)#spanning-tree inter-path-cost 10
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#spanning-tree inter-path-cost 10
Checking results
Use the show spanning-tree command to view bridge status. Take Switch A for example.
SwitchA#show spanning-tree
Spanning-tree Admin State: enable
Spanning-tree protocol Mode: STP
BridgeId: Mac 000E.5E7B.C557 Priority 0
Root: Mac 000E.5E7B.C557 Priority 0 RootCost 0
Operational: HelloTime 2, ForwardDelay 15, MaxAge 20
Configured: HelloTime 2, ForwardDelay 15, MaxAge 20 TransmitLimit 3
Use the show spanning-tree port-list port-list command to view interface status. Take
Switch A for example.
Port2
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
EdgedPort: admin: auto oper: no BPDU Filter: disable
LinkType: admin: auto oper: point-to-point
Partner STP Mode: stp
7.5 MSTP
7.5.1 Introduction
Multiple Spanning Tree Protocol (MSTP) is defined by IEEE 802.1s. Recovering the
disadvantages of STP and RSTP, the MSTP realizes fast convergence and distributes different
VLAN flow following its own path to provide an excellent load sharing mechanism.
MSTP divides a switch network into multiple domains, called MST domain. Each MST
domain contains several spanning trees but the trees are independent one another. Each
spanning tree is called a Multiple Spanning Tree Instance (MSTI).
MSTP protocol introduces Common Spanning Tree (CST) and Internal Spanning Tree (IST)
concepts. CST refers to take MST domain as a whole to calculate and generate a spanning tree.
IST means to generate spanning tree in internal MST domain.
Compared with STP and RSTP, MSTP also introduces total root (CIST Root) and domain root
(MST Region Root) concepts. The total root is a global concept; all switches running
STP/RSTP/MSTP can only have one total root, which is the CIST Root. The domain root is a
local concept, which is relative to an instance in a domain. As shown below, all connected
devices only have one total root, and the number of domain root contained in each domain is
associated with the number of instances.
Each VLAN can map to one MSTI; that is to say, data of one VLAN can only be
transmitted in one MSTI while one MSTI may correspond to several VLAN.
Compared with the previous STP and RSTP, MSTP has obvious advantages, including
cognitive ability of VLAN, load balance sharing ability, similar RSTP port status switching
ability as well as binding multiple VLAN to one MST instance to reduce resource occupancy
rate. In addition, MSTP running devices in network are also compatible with the devices
running STP and RSTP.
Scenario
In big LAN or residential region aggregation, the aggregation devices will make up a ring for
link backup, at the same time avoid loop and realize service load sharing. MSTP can select
different and unique forwarding path for each one or a group of VLAN.
Prerequisite
Configure interface physical parameters to make it Up before configuring MSTP.
The maximum hop count is MST domain maximum hop count if and only if the
configured device is root of the domain; other roots cannot configure this item
effectively.
We do not recommend modifying the priority of any device on the network if you
adopt the method of directly assigning root bridge method; otherwise, the assigned
root bridge or backup bridge may be invalid.
Configure root bridge or backup bridge for the ISCOM2828F as below.
You can confirm the effective instance of the root bridge or backup bridge through
the parameter instance instance-id. The current device will be assigned as the
The value of priority must be multiples of 4096, like 0, 4096, 8192, etc. It is 32768 by
default.
The maximum hop count of MST domain is used to restrict domain scale, while network
diameter is a parameter to denote the whole network scale. The bigger the network diameter is,
the bigger the network scale is.
Similar to the maximum hop count of MST domain, if and only if configuring the
ISCOM2828F as CIST root device, this configuration is effective. MSTP will automatically
set Hello Time, Forward Delay and Max Age parameters to a privileged value by calculation
when configuring network diameter.
Configure network diameter for switch network for the ISCOM2828F as below.
All devices in the whole switch network adopt the three time parameters on CIST root device,
so only the root device configuration is valid.
Configure timer for the ISCOM2828F as below.
local interface remains in RSTP mode, and process packets as external information of
domain.
Configure the ISCOM2828F as below.
7.5.20 Maintenance
Maintain the ISCOM2828F as below.
Networking requirements
As shown below, three ISCOM2828F devices are connected to form a ring network through
MSTP, with the domain name aaa. Switch B, connected with a PC, belongs to VLAN 3.
Switch C, connected with another PC, belongs to VLAN 4. Instant 3 is related to VLAN 3.
Instant 4 is related to VLAN 4. Configure the path cost of instance 3 on Switch B so that
packets of VLAN 3 and VLAN 4 are forwarded respectively in two paths, which eliminates
loopback and implements load balancing.
Configuration steps
Step 1 Create VLAN 3 and VLAN 4 on Switch A, Switch B, and switch C respectively, and activate
them.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 3-4 active
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#create vlan 3-4 active
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#create vlan 3-4 active
Step 2 Configure Port 1 and Port 2 of Switch A to allow all VLAN packets to pass in Trunk mode.
Configure Port 1 and Port 2 of Switch B to allow all VLAN packets to pass in Trunk mode.
Configure Port 1 and Port 2 of Switch C to allow all VLAN packets to pass in Trunk mode.
Configure Port 3 and Port 4 of Switch B and Switch C to allow packets of VLAN 3 and
VLAN 4 to pass in Access mode.
Configure Switch A.
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
Configure Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
SwitchB(config)#interface port 3
SwitchB(config-port)#switchport access vlan 3
SwitchB(config-port)#exit
SwitchB(config)#interface port 4
SwitchB(config-port)#switchport access vlan 4
SwitchB(config-port)#exit
Configure Switch C.
SwitchC(config)#interface port 1
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
SwitchC(config)#interface port 2
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
SwitchC(config)#interface port 3
SwitchC(config-port)#switchport access vlan 3
SwitchC(config-port)#exit
SwitchC(config)#interface port 4
SwitchC(config-port)#switchport access vlan 4
SwitchC(config-port)#exit
Step 3 Set spanning tree mode of Switch A, Switch B, and Switch C to MSTP, and enable STP.
Enter MSTP configuration mode, and set the domain name to aaa, revised version to 0. Map
instance 3 to VLAN 3, and instance 4 to VLAN 4. Exist from MST configuration mode.
Configure Switch A.
Configure Switch B.
Configure Switch C.
Step 4 Set the inner path coast of Port 2 of spanning tree instance 3 to 500000 on Switch B.
SwitchB(config)#interface port 1
SwitchB(config-port)#spanning-tree instance 3 inter-path-cost 500000
Checking results
Use the show spanning-tree region-operation command to show configurations of the MST
domain.
Instances running: 3
Digest: 0X7D28E66FDC1C693C1CC1F6B61C1431C4
Instance Vlans Mapped
-------- ----------------------
0 1,2,5-4094
3 3
4 4
Use the show spanning-tree instance 3 command to check whether basic information about
spanning tree instance 3 is correct.
Switch A
Switch B
Switch C
Use the show spanning-tree instance 4 command to check whether basic information about
spanning tree instance 4 is correct.
Switch A
Switch B
Switch C
MST ID: 4
-----------------------------------------------------------
BridgeId: Mac 0000.0000.0003 Priority 32768
RegionalRoot: Mac 0000.0000.0001 Priority 32768 InternalRootCost
200000
PortId PortState PortRole PathCost PortPriority LinkType TrunkPort
-------------------------------------------------------------------------
2 forwarding root 200000 128 point-to-point no
3 discarding alternate 200000 128 point-to-point no
…
7.6 ERPS
7.6.1 Introduction
Ethernet Ring Protection Switching (ERPS) is an APS protocol over ITU-T G.8032
recommendation. It is specially used in Ethernet ring link protocol. Generally, ERPS can
avoid broadcast storm caused by data loopback. When Ethernet has loop or device
malfunction, ERPS can switch the link to backup link and ensure service restore quickly.
ERPS takes the control VLAN in ring network to transmit ring network control information
and meanwhile, combining with the topology feature of ring network to discover network
fault quickly and enable backup link to restore service fast.
Scenario
With the development of Ethernet to telecom level network, voice and video multicast
services bring forth higher requirements on Ethernet redundant protection and fault-restore
time. The fault-restore convergent time of current STP system is in second level that is far
away to meet requirement. ERPS can blocks a loop to avoid broadcast storm by defining
different roles in the ring under normal situations. ERPS can switch the service link to backup
link if the ring link or node faults and remove loop, perform fault protection switch and
automatic fault restore, what's more, the protection switching time is lower than 50ms. It
supports single ring, crossed rings and tangent rings networking modes.
ERPS supports fault detection in two modes:
Fault detection based on physical interface status: to get link fault and switching quickly,
available to neighbor devices
Fault detection based on CFM: used in unidirectional fault detection or on multiple
devices
Prerequisite
Connect interface and configure physical parameters for it, the interface is Up at physical
layer.
Create a VLAN, and add interfaces to the VLAN.
CFM detection is configured between devices which are set to neighbor relations (for
CFM mode).
Only one device can be configured as the RPL (Ring Protection Link) Owner in a
ring, and one device as the RPL Neighbour, other devices can only be configured
as ring forwarding node.
Tangent ring can be taken as two independent rings in fact, the configuration is
identical to common single ring; intersecting rings has a master ring and a sub-
ring, the configurations please refer to the section 7.6.5 (Optional) creating ERPS
sub-ring.
Configure ERPS for the ISCOM2828F as below.
Only the intersecting rings network contains master ring and sub-ring.
The master ring configuration is identical to the configuration of single ring or
tangent ring. For details, see section 7.6.4 Creating ERPS ring.
Un-crossed node on sub-ring is identical to configuration of single ring or tangent
ring; see section 7.6.4 Creating ERPS ring for details.
Configure ERPS intersecting rings for ISCOM2828F as below.
By default, flow will switch to protection link when current link is fault. Thus ERPS is
needed in some special conditions.
Configure ERPS for the ISCOM2828F as below.
7.6.9 Maintenance
Maintain the ISCOM2828F as below.
7.7 RRPS
7.7.1 Introduction
With the development of Ethernet to the MAN, voice, video and multicast service has come
up with higher requirements to the Ethernet redundancy protection and fault recovery time.
The fault recovery convergence time of original STP mechanism is in the second level, which
is far to meet the fault recovery time requirements of MAN.
Raisecom Ring Protection Switching (RRPS) technology is RAISECOM independent
research and development protocol, which can ensure that there is data loop in Ethernet by
blocking some interface on the ring. RRPS solves the problems of weak protection to
traditional data network and long time to fault recovery, which, in theory, can provide 50ms
rapid protection features.
As shown below, blocked interface node is the master node, other nodes are transmission
nodes. The master node generates by election. Each node can specify one loop interface as the
first interface, the other as the second interface. The master node usually sends Hello packets
periodically from the first interface and receives Hello packet sent by itself in the second
interface under the circumstance of complete Ethernet ring. Then the master node will block
the first interface immediately to ensure there is no loop when the ring network is in a
complete state. For the other nodes on the RRPS, the first interface No. and the second
interface No. play the same role basically.
RRPS generates master node by the election, so each node needs to collect device information
on RRPS, only the right collection leads to correct election. Topology collection is completed
by Hello packets, which contain all nodes information the node collected from the other
interface. The normal state of RRPS is shown below.
In all nodes on the ring, node with Down state is prior for master node, followed by
Block and Two-Forward.
If the nodes are in the same state, the node with high-priority Bridge is master node.
If the nodes have the same state and priority, the node with large MAC address is master
node.
Interface Block rules:
All Link Down interfaces are Block.
If the node is not master node, all Link Up ring interfaces are Forwarding.
If the node is master node, then one of two interfaces is Block, the other is Forwarding.
Rules are as follows:
– Both interfaces are Up, the Block is the first interface;
– If one interface is Down, then Block this interface.
The RRPS link failure is shown below.
Scenario
As a Metro Ethernet technology, Ethernet ring solves the problems of weak protection to
traditional data network and long time to fault recovery, which, in theory, can provide 50ms
rapid protection features and is compatible with traditional Ethernet protocol, is an important
technology options and solutions of metro broadband access network optimization
transformation.
RRPS technology is Raisecom independent research and development protocol, which
through simple configuration achieves the elimination of ring loop, fault protection switching,
and automatic fault recovery function and makes the fault protection switching time less than
50ms.
RRPS technology supports both single-ring and tangent ring networking modes, but not
intersecting ring networking. Tangent ring is actually two separate single rings, which has the
same configuration with common single ring.
Preconditions
Before configuring RRPS, configure physical parameters of the interface and make the
interface physical layer Up.
For all devices on a ring, we recommend configuring the fault recovery time,
interval for Hello packets, ring protocol VLAN, and aging time of the ring interface
separately with the same value
The aging time of interfaces must be twice greater than the Hello time.
Configure the basic function of RRPS on the ISCOM2828F as below.
Master node election: at the beginning, all nodes consider themselves the master
node, one of two interfaces is Block, so no data loop on the ring; when two interfaces
on the ring node receive the same Hello packets for many times, the node considers
that the ring topology is stable and can elect master node. Other nodes will not
enable the blocked interface, usually only one master node, which ensures only one
blocked interface, and ensures the connectivity of the nodes on the ring.
7.7.7 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear Clear RRPS interface statistics, including RRPS
ethernet ring ring-id ID, ring interface ID, Hello packet, Change
statistics packet, and Flush packet.
Networking requirements
As shown below, to improve the reliability of Ethernet, the Switch A, Switch B, Switch C,
Switch D have constituted an Ethernet single ring Ring 1.
The figure shows that the four switches are added to Ring 1 interface. MAC addresses are
Switch A (000E.5E00.000A), Switch B (000E.5E00.000B), Switch C (000E.5E00.000C), and
Switch D (000E.5E00.000D).
The status and priority of four nodes are the same, MAC address of Switch D is biggest, and
therefore, Switch D is the master node of RRPS.
Configuration steps
Step 1 Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#interface port 1
SwitchA(config-port)#ethernet ring 1 port 2
SwitchA(config-port)#exit
SwitchA(config)#ethernet ring 1 enable
Step 2 Configure Switch B, Switch C, and Switch D. Their configurations are the same as
configurations of Switch A.
Checking results
Check RRPS configuration by using the show ethernet ring command.
Take Switch D for example, when the loop is normal, the first ring interface of master node
Switch D: Port 1 block clears data loop.
Break link simulation fault between Switch A and Switch B manually, Port 1 of Switch D will
change its status from Block to Forwarding, Port 1 of Switch B will change its status from
Forwarding to Block. Check RRPS status again.
8 OAM
This chapter describes basic principles and configuration procedures of OAM, including the
following sections:
EFM
CFM
SLA
8.1 EFM
8.1.1 Introduction
Initially, Ethernet is designed for LANs. Operation, Administration and Maintenance (OAM)
is weak in performance for its small size and NE-level administrative system. With
continuous development of Ethernet technology, the application scale of Ethernet on the
carrier-grade network becomes wider and wider. Compared with LAN, the carrier-grade
network requires a much longer link length and bigger size. Lack of an effective management
and maintenance mechanism has become the biggest obstacle for the Ethernet to be applied
on the carrier-grade network.
To confirm connectivity of Ethernet virtual connection, effectively detect faults, confirm and
locate faults on the Ethernet layer, balance network utilization, measure network performance,
and provide services according to the Service Level Agreement (SLA), implementing OAM is
a must for widespread use of the carrier-grade Ethernet.
Ethernet OAM is realized in different levels. As show in Figure 8-1, there are two levels:
Link-level Ethernet OAM: it is applied in Ethernet physical link (that is the first mile)
between Provider Edge (PE) and Customer Edge (CE), which is used to monitor link
state between user network and operator network, and the typical protocol is Ethernet in
the First Mile (EFM) OAM protocol.
Business-level Ethernet OAM: it is applied in access aggregation layer of network,
which is used to monitor connectivity of the whole network, locate connectivity fault of
network, monitor and control performance of link, and the typical protocol is
Connectivity Fault Management (CFM) OAM protocol.
Scenario
Deploying EFM between directly connected devices can effectively improve the management
and maintenance capability of Ethernet links and ensure network running smoothly.
Prerequisite
To configure EFM, you need to:
OAM Disable
The active EFM must be configured when the ISCOM2828F is in active mode.
By getting the current variable of the peer, you can get status of current link.
IEEE802.3 Clause 30 defines and explains supported variable and its denotation
gotten by OAM in details. The variable takes Object as the maximum unit. Each
object contains Package and Attribute. A package contains several attributes.
Attribute is the minimum unit of a variable. When getting an OAM variable, it defines
object, package, branch and leaf description of attributes by Clause 30 to describe
requesting object, and the branch and leaf are followed by variable to denote object
responds variable request. The ISCOM2828F supports getting OAM information and
interface statistics.
Peer variable cannot be gotten until EFM is connected.
The peer EFM remote loopback will not take effect until the remote loopback
response is configured on the local device.
The OAM link monitoring is used to detect and report link errors in different conditions.
When detecting a fault on a link, the ISCOM2828F provides the peer with the
generated time, window and threshold setting, etc. by OAM event notification packets.
The peer receives event notification and reports it to the NMS center via SNMP Trap.
Besides, the local device can directly report events to the NMS center via SNMP Trap.
By default, the system sets default value for error generated time, window and
threshold setting.
8.1.8 Maintenance
Maintain the EFM feature as below.
Command Description
Raisecom(config-port)#clear oam Clear EFM OAM interface link statistics.
statistics
Raisecom(config-port)#clear oam Clear EFM OAM interface link event
event information.
Networking requirements
As shown in Figure 8-2, to improve the management and maintenance capability of the
Ethernet link between Switch A and Switch B, you need to deploy EFM on Switch A. Switch
A works in active mode and is deployed with OAM event alarm function.
Configuration steps
Step 1 Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#oam active
SwitchA(config)#interface port 1
SwitchA(config-port)#oam enable
SwitchA(config-port)#oam event trap enable
SwitchA(config-port)#oam peer event trap enable
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#interface port 1
SwitchB(config-port)#oam enable
Checking results
Use the show oam command to show EFM configurations on Switch A.
Use the show oam trap command to show OAM event alarm configurations on Switch A.
8.2 CFM
8.2.1 Introduction
Connectivity Fault Management (CFM) is a network-level Ethernet OAM technology,
providing end-to-end connectivity fault detection, fault notification, fault judgement, and fault
location. CFM is used to actively diagnose faults for Ethernet Virtual Connection (EVC), and
provide cost-effective network maintenance solutions, and improve network maintenance
through fault management.
The ISCOM2828F provides CFM function compliant wiith ITU-Y.1731 and IEEE802.1ag
recommendations.
CFM Component
CFM consists of following components:
MD
Maintenance Domain (MD), also called Maintenance Entity Group (MEG), is a network that
runs CFM. It defines network range of OAM management. MD has a level property, with 8
levels (level 0 to level 7). The bigger the number is, the higher the level is and the larger the
MD range is. Protocol packets in a lower-level MD will be discarded after entering a higher-
level MD. If no Maintenance association End Point (MEP) but a Maintenance association
Intermediate Point (MIP) is in a high-level MD, the protocol can traverse the higher-level MD.
However, packets in a higher-level MD can traverse lower-level MDs. In the same VLAN
range, different MDs can be adjacent, embedded, but not crossed.
As shown in Figure 8-3, MD 2 is in MD 1. Packets in MD 1 need to traverse MD 2. Configure
MD 1 to be at level 6, and MD 2 to be at level 3. Then packets in MD 1 can traverse MD 2
and implement connectivity fault management of the whole MD 1. However, packets in MD 2
cannot diffuse into MD 1. MD 2 is a server layer while MD 1 is a client layer.
As shown in Figure 8-4, the MEP is an edge node of a service instance. MEPs can be used to
send and process CFM packets. The service instance and the MD where the MEP locates
decide VLANs and levels of packets received and sent by the MEP.
For any device that runs CFM on the network, the MEP is called local MEP. For MEPs on
other devices of the same service instance, they are called Remote Maintenance association
End Points (RMEP).
Multiple MEPs can be configured in a service instance. Packets sent by MEPs in one instance
take identical S-VLAN TAG, priority, and C-VLAN TAG. A MEP can receive OAM packets
sent by other MEPs in the instance, intercept packets which at the same or lower level, and
forward packets of higher level.
Scenario
To expand application of Ethernet technologies on the carrier-grade network, the Ethernet
must ensure the same QoS as the carrier-grade transport network. CFM solves this problem by
providing overall OAM tools for the carrier-grade Ethernet.
CFM can provide following OAM functions:
Fault detection (Continuity Check, CC)
The function is realized by periodically sending Continuity Check Messages (CCMs). One
MEP sends CCM and other MEPs in the same service instance can verify the RMEP status
when receiving this packet. If the ISCOM2828F fails or a link is incorrectly configured,
MEPs cannot properly receive or process CCMs sent by RMEPs. If no CCM is received by a
MEP during 3.5 CCM intervals, it is believed that the link fails. Then a fault Trap will be sent
according to configured alarm priority.
Prerequisite
Connect the interface and configure physical parameters for it to make it physically Up.
Create VLANs.
Add interfaces into VLANs.
CFM fault detection, location function cannot take effect unless enables CFM function
on the ISCOM2828F.
Step Command Description
1 Raisecom#config Enter global configuration mode.
2 Raisecom(config)#ethern Enable global CFM function.
et cfm enable
3 Raisecom(config)#interf Enter physical layer interface configuration
ace port port-id mode.
4 Raisecom(config- Enable CFM on interface.
port)#ethernet cfm
enable
Use the ethernet cfm disable command to
disable this function. After it is disabled, the
interface cannot receive or send CFM packets.
Make sure global CFM function enable before executing this command, otherwise
the command will be executed unsuccessfully;
If there is no MEP configured in service instance, ping unsuccessfully because of
fail to find source MEP;
4 Raisecom(config)# (Optional) configure saved data amount. You can set the
ethernet cfm saved data amount when the function is enabled. It is 100
traceroute cache by default; does not save data if the function is disabled.
size size
5 Raisecom(config)# Enter service instance configuration mode.
service cisid
level level
6 Raisecom(config- Execute Layer 2 Traceroute function for fault locating.
service)#tracerou By default, packets TLV size is 64, search an available
te { mac-address source MEP by automation.
| mep mep-id }
[ ttl ttl ] CFM should find MAC address of destination MEP by
[ source mep-id ] mep-id to complete traceroute operation if Layer 2
traceroute operation is operated by specified destination
mep-id. Users can find the following content by data
base of RMEP: data information of RMEP is saved in
RMEP database in MEP after source MEP found RMEP
and it is stable, you can find MAC address of RMEP
according to mep-id in RMEP database.
Make sure global CFM function enable before executing this command, otherwise
the command will be executed unsuccessfully;
If there is no MEP configured in service instance, Traceroute unsuccessfully
because of fail to find source MEP;
8.2.10 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear ethernet cfm Clear CCM error database
errors [ level level ] information.
Raisecom(config)#clear ethernet cfm Clear RMEP.
remote-mep [ level level ]
Raisecom(config)#clear ethernet cfm Clear traceroute cache database.
traceroute-cache
Networking requirements
As shown in Figure 8-5, the PC communicates with the server through the network consisting
of by Switch A, Switch B and Switch C. You can deploy CFM feature on Switch Device to
realize active fault detection, acknowledgement and location, then make Ethernet link
between PC and Server achieving telecommunication service level. Switch A and Switch C
are MEP, Switch B is MIP, detecting Ethernet fault from Switch A Port 1 to Switch C Port 2,
maintenance domain level is 3.
Configuration steps
Step 1 Configure interface adding into VLAN.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#create vlan 100 active
SwitchA(config)#interface port 1
SwitchA(config-port)#switchport access vlan 100
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#switchport mode trunk
SwitchA(config-port)#exit
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#interface port 1
SwitchB(config-port)#switchport mode trunk
SwitchB(config-port)#exit
SwitchB(config)#interface port 2
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#create vlan 100 active
SwitchC(config)#interface port 2
SwitchC(config-port)#switch access vlan 100
SwitchC(config-port)#exit
SwitchC(config)#interface port 1
SwitchC(config-port)#switchport mode trunk
SwitchC(config-port)#exit
Configure Switch B.
Configure Switch C.
Checking results
Use the show ethernet cfm command to show CFM configuration on the switch.
Take Switch A for example.
8.3 SLA
8.3.1 Introduction
SLA is a telecommunication service evaluation standard negotiated by the service provider
and users. It is an agreement in service quality, priority and responsibility, etc.
In technology, SLA is real-time network performance detection and statistic technique for
responding time, network jitter, delay, packet loss rate, etc. SLA can choose different
operations to monitor measurement values for different applications.
The
Operation
It is a static concept. It is SLA network performance testing task from end to end, including
delay/jitter test (y1731-jitter/y1731-pkt-loss) on the Layer 2 network and delay/jitter test
(ICMP-echo/ICMP-jitter) on the Layer 3 network.
Test
It is a dynamic concept. It is used to describe an execution of one operation.
Detection
It is a dynamic concept. It is used to describe a procedure of transmitting-receiving packet in
operation test. According to definition of operation, one operation test can contain multiple
detections (a test only contains only one detection for Echo operation).
Scheduling
It is a dynamic concept, which is used to describe the scheduling of a specified operation. One
scheduling contains multiple periodical tests.
Scenario
The carrier and users sign SLA protocol to guarantee users can enjoy certain quality network
service. To perform SLA protocol effectively, carrier needs to deploy SLA feature test
performance on the ISCOM2828F and the test result is evidence to ensure user's performance.
SLA feature chooses two testing node, configure SLA operation on one node and schedule
executing it to implement network performance test between the two nodes.
SLA takes statistics of round-trip packet loss rate, round-trip or unidirectional (SD/DS) delay,
jitter, jitter variance, jitter distribution, etc, and informs the upper monitoring software (such
as NMS) of these data, analyse network performance, and provide data required by the user.
Prerequisite
Deploy CFM between the tested devices.
Configure IP (scheduling of icmp-echo and icmp-jitter).
SLA supports at most 100 operations being scheduled at one time, but wait a
schedule to finish (reach schedule life time or stop schedule) before schedule
again or modify schedule information.
Networking requirements
As shown in Figure 8-6, the PC communicates with the server through the network consisting
of by Switch A, Switch B and Switch C. You can deploy CFM feature on switches to make the
Ethernet link between the server and the PC to reach the telecom-grade level. SLA is
deployed on Switch A to effectively carry out SLA agreement signed with the users. SLA is
periodically scheduled to test the network performance between Switch A and Switch C.
Conduct Layer 2 delay test on Switch A towards Switch C. Configure the y1731-echo
operation on Switch A, with operation number of 2, remote MEP of 2, MD level of 3, VLAN
ID of 100, CoS of 0, life period of scheduling of 20s, and test period of 10s.
Configuration steps
Step 1 Configure CFM on Switches.
For details, see section 8.2.11 Example for configuring CFM.
Step 2 Configure y1731-echo operation on Switch A, and enable operation scheduling.
SwitchA#config
SwitchA(config)#sla 2 y1731-echo remote-mep 302 level 3 svlan 100 cos 0
SwitchA(config)#sla schedule 2 life 20 period 10
Checking results
Use the show sla Command command on Switch B to see whether SLA configurations are
correct.
Use the show sla Command command on Switch C to see whether SLA configurations are
correct.
9 System management
This chapter introduces basic principle and configuration of system management and
maintenance, and provides related configuration examples, including the following sections:
SNMP
KeepAlive
RMON
Cluster management
LLDP
Extended OAM
Optical module DDM
System log
Power monitoring
CPU monitoring
Ping
Traceroute
9.1 SNMP
9.1.1 Introduction
Simple Network Management Protocol (SNMP) is designed by the Internet Engineering Task
Force (IETF) to resolve problems in managing network devices connected to the Internet.
Through SNMP, a network management system can manage all network devices that support
SNMP, including monitoring network status, modifying configurations of a network device,
and receiving network alarms. SNMP is the most widely used network management protocol
in TCP/IP networks.
Working mechanism
SNMP is divided into two parts: Agent and NMS. The Agent and NMS communicate by
SNMP packets being sent through UDP. The working system of SNMP is shown in Figure 9-1.
Agent can be configured with several versions. Agent use different versions to
communicate with different Nview NNM systems. However, SNMP version of the
NView NNM system must be consistent with the one on Agent when they are
communicating. Otherwise, they cannot communicate properly.
Protocol versions
Till now, SNMP has three versions: v1, v2c, and v3, described as below.
SNMP v1 uses community name authentication mechanism. The community name, a
string defined by an agent, acts like a secret. The network management system can visit
the agent only by specifying its community name correctly. If the community name
carried in a SNMP message is not accepted by the ISCOM2828F, the message will be
dropped.
Compatible with SNMP v1, SNMP v2c also uses community name authentication
mechanism. SNMP V2c supports more operation types, data types, and error codes, and
thus better identifying errors.
SNMP v3 uses User-based Security Model (USM) and View-based Access Control
Model (VACM) security mechanism. You can configure whether USM authentication is
enabled and whether encryption is enabled to provide higher security. USM
authentication mechanism allows authenticated senders and prevents unauthenticated
senders. Encryption is to encrypt messages transmitted between the network
management system and agents, thus preventing interception.
MIB
Management Information Base (MIB) is the collection of all objects managed by NMS. It
defines attributes for the managed objects:
Name
Access authority
Data type
The device-related statistic contents can be reached by accessing data items. Each proxy has
its own MIB. MIB can be taken as an interface between NMS and Agent, through which NMS
can read/write every managed object in Agent to manage and monitor the device.
MIB store information in a tree structure, its root is on the top, without name. Nodes of the
tree are the managed objects, which take a uniquely path starting from root (OID) for
identification. SNMP packets can access network devices by checking the nodes in MIB tree
directory.
The ISCOM2828F supports standard MIB and Raisecom customized MIB.
Scenario
When you need to log in to the ISCOM2828F through NMS, please configure SNMP basic
functions for ISCOM2828F in advance.
Prerequisite
Configure the IP address of the SNMP interface.
Configure the routing protocol and ensure that the route between the ISCOM2828F and
NMS is reachable.
Trap configurations on SNMP v1, v2c, and v3 are identical except for Trap target host
configurations. Please configure Trap as required.
Trap means the device sends unrequested information to NMS automatically, which is used to
report some critical events.
Before configuring Trap, you need to perform the following configurations:
Configure basic functions of SNMP. SNMP v1 and v2c need to configure the community
name; SNMP v3 needs to configure the user name and SNMP view.
Configure the routing protocol and ensure that the route between the ISCOM2828F and
NMS is reachable.
Configure Trap of SNMP for the ISCOM2828F as below.
Networking requirements
As shown in Figure 9-3, the route between the NView NNM system and Agent is reachable.
The Nview NNM system can view MIBs in the view of the remote switch through SNMP
v1/v2c. And the switch can automatically send Trap to Nview NNM in emergency.
By default, there is VLAN 1 in the ISCOM2828F and all physical interfaces belong to VLAN
1.
Configuration steps
Step 1 Configure the IP address of the switch.
Raisecom#config
Raisecom(config)#interface ip 0
Raisecom(config-ip)#ip address 20.0.0.10 255.255.255.0 1
Raisecom(config-ip)#exit
Checking results
Use the show interface ip command to show IP address configurations.
Raisecom#show interface ip
Index Ip Address NetMask Vid Status Mtu
------------------------------------------------------------------------
0 20.0.0.10 255.255.255.0 1 active 1500
Index: 1
View Name: system
OID Tree: 1.3.6.1.2.1.1
Mask: --
Type: included
Index: 2
View Name: internet
OID Tree: 1.3.6
Mask: --
Type: included
Use the show snmp host command to show Trap target host configurations.
Networking requirements
As shown in Figure 9-4, the route between the NView NNM system and Agent is reachable.
The Nview NNM system monitors Agent through SNMP v3. And the Agent can automatically
send Trap to Nview NNM in emergency.
By default, there is VLAN 1 in the ISCOM2828F and all physical interfaces belong to VLAN
1.
Configuration steps
Step 1 Configure the IP address of the switch.
Raisecom#config
Raisecom(config)#interface ip 0
Raisecom(config-ip)#ip address 20.0.0.10 255.255.255.0 1
Raisecom(config-ip)#exit
Create user gusterusr1. Adopt md5 authentication algorithm and set the password to raisecom.
Create the guestgroup access group. Set the security mode to usm. Set the security level to
authnopriv. Set the name of the read-only view to mib2.
Checking results
Use the show snmp access command to show SNMP access group configurations.
Index: 0
Group: initial
Security Model: usm
Security Level: authnopriv
Context Prefix: --
Context Match: exact
Read View: internet
Write View: internet
Notify View: internet
Index: 1
Group: guestgroup
Security Model: usm
Security Level: authnopriv
Context Prefix: --
Context Match: exact
Read View: mib2
Write View: --
Notify View: internet
Index: 2
Group: initialnone
Security Model: usm
Security Level: noauthnopriv
Context Prefix: --
Context Match: exact
Read View: system
Write View: --
Notify View: internet
Use the show snmp group command to show the mapping relationship between users and the
access group.
Use the show snmp host command to show Trap target host configurations.
9.2 KeepAlive
9.2.1 Introduction
The keepAlive packet is a kind of KeepAlive mechanism running in High-Level Data Link
Control (HDLC) link layer protocol. The ISCOM2828F will send a KeepAlive packet to
confirm whether the peer is online every several seconds to realize neighbour detection
mechanism.
Trap is the unrequested information sent by the ISCOM2828F actively to NMS, used to report
some urgent and important events.
The ISCOM2828F sends KeepAlive Trap packet actively to the NView NNM system. The
KeepAlive Trap packet includes the basic information of ISCOM2828F, such as the name,
OID, MAC address, and IP address. The Nview NNM system synchronizes device
information based on IP address to discover NEs in a short time. This helps improve working
efficiency and reduce working load of the administrator.
Scenario
The ISCOM2828F sends KeepAlive Trap packet actively to the NView NNM system.
Therefore, the Nview NNM system can discover NEs in a short time. This helps improve
working efficiency and reduce working load of the administrator. You can enable or disable
the KeepAlive Trap and configure the period for sending KeepAlive Trap. When KeepAlive
Trap is enabled, if configured with snmp enable traps and Layer 3 IP address, the
ISCOM2828F will send a KeepAlive Trap to all target hosts with Bridge Trap every
KeepAlive Trap Interval.
Prerequisite
Configure the IP address of the SNMP interface.
Configure basic functions of SNMP. SNMP v1 and v2c need to configure the community
name; SNMP v3 needs to configure the user name and SNMP view.
Configure the routing protocol and ensure that the route between the ISCOM2828F and
NMS is reachable.
To avoid multiple devices sending KeepAlive Trap at the same time according to the
same period and causing heavy network management load, the real transmission
period of KeepAlive Trap is timed as period+5s random transmission.
Networking requirements
Figure 9-5 shows how to configure KeepAlive.
IP address of the switch: 192.169.1.2
IP address of the SNMP v2c Trap target host: 192.168.1.1
Name of the read-write community: public
SNMP version: SNMP v2c
Period for sending KeepAlive Trap: 120s
KeepAlive Trap: enabled
Configuration steps
Step 1 Configure the management IP address of the switch.
Raisecom#config
Raisecom(config)#interface ip 0
Raisecom(config-ip)#ip address 192.168.1.2 255.255.255.0 1
Raisecom(config-ip)#exit
Checking results
Show KeepAlive configurations by using the show keepalive command.
Raisecom#show keepalive
Keepalive Admin State:Enable
Keepalive trap interval:120s
Keepalive trap count:1
9.3 RMON
9.3.1 Introduction
Remote Network Monitoring (RMON) is a standard stipulated by IETF (Internet Engineering
Task Force) for network data monitoring through different network Agent and NMS.
RMON is achieved based on SNMP architecture, including the network management center
and the Agent running on network devices. On the foundation of SNMP, increase the subnet
flow, statistics, and analysis to achieve the monitoring to one network segment and the whole
network, while SNMP only can monitor the partial information of a single device and it is
difficult for it to monitor one network segment.
RMON Agent is commonly referred to as the probe program; RMON Probe can take the
communication subnet statistics and performance analysis. Whenever it finds network failure,
RMON Probe can report network management center, and describes the capture information
under unusual circumstances so that the network management center does not need to poll the
device constantly. Compared with SNMP, RMON can monitor remote devices more actively
and more effectively, network administrators can track the network, network segment or
device malfunction more quickly. This approach reduces the data flows between network
management center and Agent, makes it possible to manage large networks simply and
powerfully, and makes up the limitations of SNMP in growing distributed Internet.
RMON Probe data collection methods:
Distributed RMON: network management center obtains network management
information and controls network resources directly from RMON Probe through
dedicated RMON Probe collection data.
Embedded RMON: embed RMON Agent directly to network devices (such as switches)
to make them with RMON Probe function. Network management center will collect
network management information through the basic operation of SNMP and the
exchange data information of RMON Agent.
The ISCOM2828F adopts embedded RMON, as shown in Figure 9-6. The ISCOM2828F
implements RMON Agent. Through this function, the management station can obtain the
overall flow, error statistics, and performance statistics of this network segment connected to
the managed network device interface to a monitor the network segment.
RMON MIBs are grouped into 9 groups according to functions. Currently, there are 4 groups
achieved: statistics group, history group, alarm group, and event group.
Statistics group: collect statistic information on each interface, including number of
received packets and packet size distribution statistics.
History group: similar with the statistics group, but it only collect statistic information in
an assigned detection period.
Alarm group: monitor an assigned MIB object, set the upper and lower thresholds in an
assigned time interval, and trigger an event if the monitored object exceeds the threshold.
Event group: cooperating with the alarm group, when alarm triggers an event, it records
the event, such as sending Trap or writing it into the log, etc.
Scenario
RMON helps monitor and account network traffics.
Compared with SNMP, RMON is a more high-efficient monitoring method. After you
specifying the alarm threshold, the ISCOM2828F actively sends alarms when the threshold is
exceeded without gaining the variable information. This helps reduce the traffic of
management and managed devices and facilitates managing the network.
Prerequisite
The route between the ISCOM2828F and the NView NNM system is reachable.
triggered when the monitored variable is abnormal. The event cannot be successfully trigged
unless the event is established.
The alarm will be triggered as long as the upper or lower threshold of the event in the event
table is matched. The alarm is not generated even when alarm conditions are matched if the
event related to the upper/lower threshold (rising-event-id or falling-event-id) is not
configured in the event table.
Configure RMON alarm group for the ISCOM2828F as below.
9.3.9 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Networking requirements
As shown in Figure 9-7, the ISCOM2828F is Agent, connecting to terminal through Console
interface, connecting to remote NNM system through Internet. Enable RMON statistics and
perform performance statistics on Port 3. When the number of packets received by Port 2
exceeds the threshold in a period, the ISCOM2828F record logs and sends Trap alarm to the
NView NNM system.
Configuration steps
Step 1 Create event 1. Event 1 is used to record and send the log information which contains the
string High-ifOutErrors. The owner of the log information is set to system.
Raisecom#config
Raisecom(config)#rmon event 1 log description High-ifOutErrors owner
system
Step 2 Create alarm 10. Alarm 10 is used to monitor the MIB variable (1.3.6.1.2.1.2.2.1.20.1) every
20 seconds. If the value of the variable is added by 15 or greater, a Trap is triggered. The
owner of the Trap is also set to system.
Checking results
Check whether there is event group information on the device by using the show rmon
alarms command.
Check whether there is alarm group information on the device by using the show rmon
events command.
When an alarm event is triggered, you can view related records at the alarm management
dialog box of the NView NNM system.
Cluster roles
According to the different position and function of switches, the cluster has different roles.
You can configure to specify the role of switch. The cluster role can be command device,
member device and candidate device.
Commander: also known as management device, used to assign public IP address to
provide management interface for all switch in the cluster. Command device manages
member device by command redirection: network management system sends commands
to the command device for processing via the public network. The command device will
forward commands to member device if it finds the commands should be executed on
member device. Command device can discover neighbor information, collect the entire
network topology, manage cluster, maintain cluster state, and support a variety of agent
functions.
Member: members in cluster; generally do not configure public IP address. You manage
member devices by commands redirection via the command device. Member device can
discover neighbor information, accept command device management, equipment,
execute the commands from command device, and report fault/log. Member device can
be managed through network management system or Telnet mode directly on command
device after activating.
Candidate: has not joined any clusters but still has cluster ability to become a cluster
member switch. The difference from member device is the topology information of
candidate device has already collected by command device but not yet joined the cluster.
When adding a candidate device to the cluster, the ISCOM2828F will become member
device; when removing a member device from the cluster, the device will recover to
candidate device again.
device and member device can form a cluster. The device not joined cluster but still had
cluster ability is candidate device.
Scenario
There are a large number of switches needed to be managed in Layer 2 network, but the
usable IP address is limited, cluster management function can use one IP address to manage
multiple devices in one cluster.
Prerequisite
Make sure that the link between command device and member device is reachable before
configuring cluster management.
Add and activate candidate devices automatically for the ISCOM2828F as below.
Networking requirements
A lot of devices in Layer 2 network need to be managed, but current public IP address
resources are limited. To manage multiple devices through a device, you can configure cluster
management.
Cluster management uses one IP address to manage multiple devices in a cluster. Cluster
management can be used to manage all member devices in cluster through command device
and log in to member devices remotely for configuration and maintenance.
As shown in Figure 9-9, Switch A can log in to Switch B and Switch C for remote
management and maintenance. The following table list configurations on Switch A, Switch B,
and Switch C.
Configuration steps
Step 1 Enable global RNDP and enable RNDP on interfaces. Enable RTDP on Switch A.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#rndp enable
SwitchA(config)#rtdp enable
SwitchA(config)#interface port 1
SwitchA(config-port)#rndp enable
SwitchA(config-port)#exit
SwitchA(config)#interface port 2
SwitchA(config-port)#rndp enable
SwitchA(config-port)#exit
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#rndp enable
SwitchB(config)#interface port 3
SwitchB(config-port)#rndp enable
SwitchB(config-port)#exit
Configure Switch C.
Raisecom#hostname SwitchC
SwitchC#config
SwitchC(config)#rndp enable
SwitchC(config)#interface port 4
SwitchC(config-port)#rndp enable
SwitchC(config-port)#exit
Step 2 Enable cluster management on Switch A and automatically activate all candidate devices.
SwitchA(config)#cluster
SwitchA(config-cluster)#member auto-build active raisecom raisecom all
SwitchA(config-cluster)#exit
SwitchA#config
SwitchA(config)#cluster
SwitchA(config-cluster)#rcommand SwitchB
Login:raisecom
Password:
SwitchB>
Step 4 Log in to Switch C through Switch A. Steps are identical to the ones used for logging in to
Switch B.
Checking results
Show cluster information on Switch A by using the show cluster command.
SwitchA#show cluster
Identity:Commander
Current member number:2
Max member number:128
Show cluster member information on Switch A by using the show cluster command.
SwitchB#show cluster
Identity:Member
Autoactive:OFF
Autoactive commander mac:0000.0000.0000
Commander mac:000e.5e03.5318
Show cluster information on Switch c by using the show cluster command. Configurations
are identical to the ones on Switch B.
9.5 LLDP
9.5.1 Introduction
With the enlargement of network scale and increase of network devices, the network topology
becomes more and more complex and network management becomes very important. A lot of
network management software adopts "auto-detection" function to trace changes of network
topology, but most of the software can only analyze to the 3rd layer and cannot make sure the
interfaces connect to other devices.
Link Layer Discovery Protocol (LLDP) is based on IEEE 802.1ab standard. Network
management system can fast grip the Layer 2 network topology and changes.
LLDP organizes the local device information in different Type Length Value (TLV) and
encapsulates in Link Layer Discovery Protocol Data Unit (LLDPDU) to transmit to straight-
connected neighbour. It also saves the information from neighbour as standard Management
Information Base (MIB) for network management system querying and judging link
communication.
Basic concepts
LLDP packet is to encapsulate LLDPDU Ethernet packet in data unit and transmitted by
multicast.
LLDPDU is data unit of LLDP. The device encapsulates local information in TLV before
forming LLDPDU, then several TLV fit together in one LLDPDU and encapsulated in
Ethernet data for transmission.
As shown in Figure 9-11, LLDPDU is made by several TLV, including 4 mandatory TLV and
several optional TLV.
Scenario
When you obtain connection information between devices through NView NNM system for
topology discovery, the ISCOM2828F needs to enable LLDP, notify their information to the
neighbours mutually, and store neighbour information to facilitate the NView NNM system
queries.
Prerequisite
N/A
After global LLDP is disabled, you cannot re-enable it immediately. Global LLDP
cannot be enabled unless the restart timer times out.
When you obtain connection information between devices through NView NNM system for
topology discovery, the ISCOM2828F needs to enable LLDP, notify their information to the
neighbours mutually, and store neighbour information to facilitate the NView NNM system
queries.
Enable global LLDP for the ISCOM2828F as below.
When configuring the delay timer and period timer, the value of the delay timer
should be smaller than or equal to a quarter of the period timer value.
Configure basic functions of LLDP for the ISCOM2828F as below.
After being enabled with LLDP alarm, the ISCOM2828F sends Traps upon detecting
aged neighbours, newly-added neighbours, and changed neighbour information.
9.5.9 Maintenance
Maintain the ISCOM2828F as below.
Networking requirements
As shown in Figure 9-12, switches are connected to the NView NNM system. Enable LLDP
on links between Switch A and Switch B. And then you can query the Layer 2 link changes
through the NView NNM system. If the neighbour is aged, the neighbour is added, or the
neighbour information changes, Switch A and Switch B sends LLDP alarm to the NView
NNM system.
Configuration steps
Step 1 Enable LLDP globally and enable LLDP alarm.
Configure Switch A.
Raisecom#hostname SwitchA
SwitchA#config
SwitchA(config)#lldp enable
SwitchA(config)#snmp-server lldp-trap enable
Configure Switch B.
Raisecom#hostname SwitchB
SwitchB#config
SwitchB(config)#lldp enable
SwitchB(config)#snmp-server lldp-trap enable
Configure Switch B.
Configure Switch B.
Checking results
Use the show lldp local config command to show local LLDP configurations.
Use the show lldp remote command to show LLDP neighbour informations.
When the ISCOM2828F works as the CO device, different remote devices may
support different extended OAM functions. Whether an extended OAM function is
supported depends on the remote device. For details, see the corresponding
manuals.
For example, the remote device is the RC551E, which supports to be configured with the
following extended OAM functions:
Configure the IP address (including the default gateway and IP address of the out-of-
band interface).
Configure the name of the remote host.
Configure network management of the remote device.
Manage configuration files of the remote device.
Reboot the remote device.
Clear statistics of extended OAM links.
Show extended OAM capabilities of the remote device.
Show basic information about the remote device.
Show interface information about the remote device.
Show Trap function status of the remote device.
Show extended OAM link status.
Scenario
Extended OAM is mainly used to establish connection between Central Office (CO) device
and remote device so as to achieve remote management.
Prerequisite
You need to complete the following tasks before configure extended OAM:
Establish OAM link between devices to establish extended OAM link.
The following configurations take ISCOM2828F as the CO device. For different remote
devices, the extended OAM networking situation and configuration commands may be
different; please take configuration according to the specific remote networking situation.
You need to establish OAM link between devices to establish extended OAM link and
both sides of devices are OAM active mode and passive mode respectively.
Establish OAM link on CO device and remote device as below.
The interface can enter remote configuration mode only when OAM link is
established between CO device and remote device.
Take the following configuration on CO device.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
On the CO device, you can use the show oam capability command to show remote device
extended OAM capacity, and then take configuration according to the specific device.
Configure the CO device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure the CO device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure the remote device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure the remote device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure different remote interface parameters in different mode:
In remote interface configuration mode, configure remote interface Up/Down, rate, and
working mode, etc.
In remote configuration mode, configure remote interface auto-negotiation, interface
bandwidth, and failover, etc.
On the remote device, download files from the FTP/TFTP server to the remote device as
below.
On the remote device, upload files from the remote device to the server as below.
On the remote device, download files from the CO device to the remote device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
To configure remote Trap, some remote devices need to perform the extended-oam
notification enable command to enable to send extended OAM notification function
in remote configuration mode.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Different remote devices may have different configuration commands.
You can configure remote VLAN and deal with packets received by the remote device
according to VLAN property configuration, such as set remote VLAN status, VLAN tag
property and create remote VLAN group, etc.
Remote VLAN status:
dot1q: remote VLAN mode is Dot1q; the packets entering device interface will be
forwarded in accordance with dot1q mode.
forbid: forbid remote VLAN function; the packets entering device interface will be
forwarded in accordance with transparent transmission mode.
port: remote VLAN is Port mode.
Enable remote VLAN CoS function, deal with the packets entering device interface according
to VLAN priority, high priority first and low priority second.
Configure the CO device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure the CO device as below.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure the CO device as below.
During resetting or rebooting remote device, OAM link maybe disconnect and the
CO device will not connect with remote device.
Whether the remote device supports this function varies with the specific remote
device. For details, see the corresponding manuals.
Configure the CO device as below.
Whether the remote device supports the following items varies with the specific
remote device. For details, see the corresponding manuals.
Use the following commands to check configuration results.
9.6.19 Maintenance
Maintain the ISCOM2828F as below.
Command Description
Raisecom(config)#clear extended-oam Clear statistics of extended OAM
statistics [ port-list port-list ] packets.
Networking requirements
As shown below, the RC551E is connected to the switch. Configured with extended OAM,
the switch can remotely manage the RC551E. Configure the host name and IP address of the
RC551E on the switch.
Configuration steps
Step 1 Establish an OAM link between the RC551E and the switch.
Set the RC551E to work in OAM passive mode, and enable OAM.
Raisecom#hostname RC55x
RC55x#config
RC55x(config)#oam passive
RC55x(config)#interface line 1
RC55x(config-port)#oam enable
Set the switch to work in OAM active mode, and enable OAM.
Raisecom#hostname Switch
Switch#config
Switch(config)#oam active
Switch(config)#interface port 1
Switch(config-port)#oam enable
Step 2 Configure the host name and IP address of the RC551E on the switch.
Switch(config-port)#remote-device
Switch(config-remote)#hostname RC551E
Switch(config-remote)#ip address 192.168.18.100 255.255.255.0 200
Checking results
Show configurations of the remote device on the switch.
When SFP performance parameters exceed thresholds or when SFP state changes, related
Trap is generated.
Scenario
SFP DDM provides a method for monitoring performance parameters of the SFP module. By
analyzing monitored data, you can predict the lifetime for the SFP module, isolate system
faults, as well as verify the compatibility of the SFP module.
Prerequisite
N/A
According to the severity level, the log is identified by 8 severity levels, as listed in Table 9-2.
The severity of output information can be manually set. When you send information
according to the configured severity, you can just send the information whose
severity is less than or equal to that of the configured information. Such as, when the
information is configured with the level 3 (or the severity is errors), the information
whose level ranges from 0 to 3,that is, the severity ranges from emergencies to
errors, can be sent.
Scenario
The ISCOM2828F generates critical information, debugging information, or error information
of the system to system logs and outputs the system logs to log files or transmit them to the
host, Console interface, or monitor for viewing and locating faults.
Prerequisite
N/A
Networking requirements
As shown in Figure 9-15, configure system log to output system logs of the switch to the log
server, facilitating view them at any time.
Configuration steps
Step 1 Configure the IP address of the switch.
Raisecom#config
Raisecom(config)#interface ip 0
Raisecom(config-ip)#ip address 20.0.0.6 255.0.0.0 1
Raisecom(config-ip)#exit
Raisecom(config)#logging on
Raisecom(config)#logging time-stamp date-time
Raisecom(config)#logging rate 2
Raisecom(config)#logging host 20.0.0.168 local3 warnings
Checking results
Use the show logging command to show system log configurations.
Raisecom#show logging
Syslog logging:Enable, 0 messages dropped, messages rate-limited 2 per
second
Console logging:Enable, level=informational, 19 Messages logged
Monitor logging:Disable, level=informational, 0 Messages logged
Time-stamp logging messages: date-time
Scenario
You can configure the power alarm function to monitor faults. When the power is abnormal,
the system generates the Syslog or sends Trap message, informing you to take actions
accordingly to avoid power failure.
Prerequisite
N/A
Function Description
Power alarm Trap sending status Enable
Scenario
CPU monitoring can monitor state, CPU utilization, and stack usage in real time, provide
CPU utilization threshold alarm, detect and eliminate hidden dangers, or help administrator
for fault location.
Prerequisite
Before configuring CPU monitoring, you need to perform the following operation:
When the CPU monitoring alarm needs to be output in Trap mode, configure Trap output
target host address, which is IP address of NView NNM system.
9.11 Ping
Configure Ping for the ISCOM2828F as below.
The ISCOM2828F cannot carry out other operations in the process of executing the
ping command. You can perform other operations only after Ping is finished or is
interrupted by pressing Ctrl+C.
9.12 Traceroute
Before using Traceroute, you should configure the IP address and default gateway of the
ISCOM2828F.
Configure Traceroute for the ISCOM2828F as below.
10 Appendix
This chapter describes terms and abbreviations involved in this guide, including the following
sections:
Terms
Abbreviations
10.1 Terms
C
Connectivity Fault Management (CFM) is end to end service-level
Ethernet OAM technology. This function is used to actively diagnose
CFM fault for Ethernet Virtual Connection (EVC) and provide cost-effective
network maintenance solution via fault management function and
improve network maintenance.
E
Ethernet
An APS protocol based on ITU-T G.8031 Recommendation to protect
Linear
an Ethernet link. It is an end-to-end protection technology, including two
Protection
line protection modes: linear 1:1 protection switching and linear 1+1
Switching
protection switching.
(ELPS)
Ethernet Ring An APS protocol based on ITU-T G.8032 Recommendation to provide
Protection backup link protection and recovery switching for Ethernet traffic in a
Switching ring topology and at the same time ensuring that there are no loops
(ERPS) formed at the Ethernet layer.
L
A computer networking term which describes using multiple network
Link cables/ports in parallel to increase the link speed beyond the limits of
aggregation any one single cable or port, and to increase the redundancy for higher
availability.
Q
QinQ is (also called Stacked VLAN or Double VLAN) extended from
802.1Q, defined by IEEE 802.1ad recommendation. Basic QinQ is a
simple Layer 2 VPN tunnel technology, encapsulating outer VLAN Tag
QinQ for client private packets at carrier access end, the packets take double
VLAN Tag passing through trunk network (public network). In public
network, packets only transmit according to outer VLAN Tag, the
private VLAN Tag are transmitted as data in packets.
10.2 Abbreviations
A
ACL Access Control List
APS Automatic Protection Switching
C
CCM Continuity Check Message
CFM Connectivity Fault Management
CoS Class of Service
D
DoS Deny of Service
DRR Deficit Round Robin
DSCP Differentiated Services Code Point
E
EFM Ethernet in the First Mile
ELPS Ethernet Linear Protection Switching
ERPS Ethernet Ring Protection Switching
EVC Ethernet Virtual Connection
F
FTP File Transfer Protocol
G
GARP Generic Attribute Registration Protocol
GPS Global Positioning System
GSM Global System for Mobile Communications
GVRP GARP VLAN Registration Protocol
I
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IP Internet Protocol
International Telecommunications Union - Telecommunication
ITU-T
Standardization Sector
L
LACP Link Aggregation Control Protocol
LBM LoopBack Message
LBR LoopBack Reply
LLDP Link Layer Discovery Protocol
LLDPDU Link Layer Discovery Protocol Data Unit
LTM LinkTrace Message
LTR LinkTrace Reply
M
MA Maintenance Association
MAC Medium Access Control
MD Maintenance Domain
MEG Maintenance Entity Group
MEP Maintenance associations End Point
MIB Management Information Base
MIP Maintenance association Intermediate Point
MSTI Multiple Spanning Tree Instance
MSTP Multiple Spanning Tree Protocol
N
NNM Network Node Management
O
OAM Operation, Administration and Management
P
PC Personal Computer
Q
QoS Quality of Service
R
RADIUS Remote Authentication Dial In User Service
RMON Remote Network Monitoring
RMEP Remote Maintenance association End Point
RSTP Rapid Spanning Tree Protocol
S
SFP Small Form-factor Pluggables
SLA Service Level Agreement
SNMP Simple Network Management Protocol
SNTP Simple Network Time Protocol
SP Strict-Priority
SSHv2 Secure Shell v2
STP Spanning Tree Protocol
T
TACACS+ Terminal Access Controller Access Control System
TCP Transmission Control Protocol
TFTP Trivial File Transfer Protocol
TLV Type Length Value
ToS Type of Service
V
VLAN Virtual Local Area Network
W
WRR Weight Round Robin
A
ACL Access Control List
APS Automatic Protection Switching
C
CCM Continuity Check Message
CFM Connectivity Fault Management
CoS Class of Service
D
DoS Deny of Service
DRR Deficit Round Robin
DSCP Differentiated Services Code Point
E
EFM Ethernet in the First Mile
ELPS Ethernet Linear Protection Switching
ERPS Ethernet Ring Protection Switching
EVC Ethernet Virtual Connection
F
FTP File Transfer Protocol
G
GARP Generic Attribute Registration Protocol
GPS Global Positioning System
GSM Global System for Mobile Communications
GVRP GARP VLAN Registration Protocol
I
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IP Internet Protocol
International Telecommunications Union - Telecommunication
ITU-T
Standardization Sector
L
LACP Link Aggregation Control Protocol
LBM LoopBack Message
LBR LoopBack Reply
LLDP Link Layer Discovery Protocol
LLDPDU Link Layer Discovery Protocol Data Unit
LTM LinkTrace Message
LTR LinkTrace Reply
M
MA Maintenance Association
MAC Medium Access Control
MD Maintenance Domain
MEG Maintenance Entity Group
MEP Maintenance associations End Point
MIB Management Information Base
MIP Maintenance association Intermediate Point
MSTI Multiple Spanning Tree Instance
MSTP Multiple Spanning Tree Protocol
N
NNM Network Node Management
O
OAM Operation, Administration and Management
P
PC Personal Computer
Q
QoS Quality of Service
R
RADIUS Remote Authentication Dial In User Service
RMON Remote Network Monitoring
RMEP Remote Maintenance association End Point
RSTP Rapid Spanning Tree Protocol
S
SFP Small Form-factor Pluggables
SLA Service Level Agreement
SNMP Simple Network Management Protocol
SNTP Simple Network Time Protocol
SP Strict-Priority
SSHv2 Secure Shell v2
STP Spanning Tree Protocol
T
TACACS+ Terminal Access Controller Access Control System
TCP Transmission Control Protocol
TFTP Trivial File Transfer Protocol
TLV Type Length Value
ToS Type of Service
V
VLAN Virtual Local Area Network
W
WRR Weight Round Robin