Configuration Management
Configuration Management
Version: V2.x
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
URL: http://support.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION
Copyright 2021 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction
or distribution of this document or any portion of this document, in any form by any means, without the
prior written consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document
All company, brand and product names are trade or service marks, or registered trade or service marks,
This document is provided as is, and all express, implied, or statutory warranties, representations or
conditions are disclaimed, including without limitation any implied warranty of merchantability, fitness for
a particular purpose, title or non-infringement. ZTE CORPORATION and its licensors shall not be liable
for damages resulting from the use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applica-
tions covering the subject matter of this document. Except as expressly provided in any written license
between ZTE CORPORATION and its licensee, the user of this document shall not acquire any license
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without
further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related infor-
mation.
is delivered together with this product of ZTE, the embedded software must be used as only a component
of this product. If this product is discarded, the licenses for the embedded software must be void either
and must not be transferred. ZTE will provide technical support for the embedded software of this product.
Revision History
I
3.3.7 Configuring DSCP-CoS Remarking in the Egress Direction..................... 34
3.3.8 Configuring the Queue Depth................................................................... 35
3.3.9 Configuring Traffic Shaping.......................................................................35
3.3.10 Configuring a Traffic Policy..................................................................... 36
4 Configuring an ACL................................................................................... 37
5 Configuring STP......................................................................................... 39
6 DHCP Configuration...................................................................................43
6.1 Configuring DHCP Snooping................................................................................. 43
6.2 Configuring the DHCP Relay................................................................................. 45
6.3 Configuring the DHCP Server................................................................................47
6.4 Configuring the DHCP Client................................................................................. 49
7 Uplink Protection Configuration............................................................... 50
7.1 Configuring Link Aggregation.................................................................................50
7.2 Configuring the UAPS Function............................................................................. 54
8 Access Security Configuration................................................................. 57
8.1 User Port Identification Configuration.................................................................... 57
8.1.1 Configuring a Format Template................................................................ 57
8.1.2 Configuring a Carrier Template.................................................................59
8.1.3 Configuring the Port Identification Function.............................................. 61
8.2 Configuring the IP Source Guard Function............................................................62
8.3 Configuring the MAC Address Anti-Flapping Function...........................................63
8.4 Configuring the MFF Function............................................................................... 65
9 System Security Configuration.................................................................67
9.1 Configuring the SSH Service................................................................................. 67
9.2 Configuring TACACS+............................................................................................70
9.3 Configuring RADIUS.............................................................................................. 73
9.4 Configuring a Management ACL............................................................................76
9.5 Configuring Control-Plane Security........................................................................ 77
9.6 Configuring DoS Attack Prevention....................................................................... 77
Figures............................................................................................................ 80
Tables.............................................................................................................. 81
Glossary.......................................................................................................... 82
II
Chapter 1
VLAN Configuration
Table of Contents
Configuring the Basic VLAN............................................................................................. 1
Configuring a VLAN Cross Connection............................................................................ 3
TLS VLAN Used to add an SVLAN to a packet to implement the TLS service no mat-
ter whatever the user access mode is, or no matter whether users' up-
stream packets have a VLAN tag, or whatever the VLAN tag is.
VLAN conversion Implements conversion from a user VLAN to a network VLAN and adds
different SVLANs based on different VLANs on the user side.
VLAN cross connection Used to set dedicated channels for service ports and uplink ports. The
packets are forwarded in 1:1 mode in accordance with the VLAN ID.
Context
By configuring a service port VLAN for the Vport interface, you can implement VLAN
conversion at the ONU level. The service port configuration of the ZXA10 C610 supports
the following:
Adding CVLAN + SVLAN to untagged packets.
Adding SVLANs to user VLANs in accordance with the user VLAN range.
Converting user VLANs to VLAN + SVLAN.
Converting user VLANs to VLAN + SVLAN based on the combination type (user
VLAN, Ethernet protocol type, or 802.1p priority).
Modifying the priority of SVLAN 802.1p.
TLS VLANs
Steps
1. In ZXAN(config)# mode, run the interface xgei-1/x/x command to enter uplink port
configuration mode.
2. In ZXAN(config-if-xgei-1/x/x)# mode, run the switchport vlan command to config-
ure an uplink port VLAN.
Note
When you configure an uplink port VLAN, the system automatically creates the cor-
responding VLAN.
Example
ZXAN(config)#interface xgei-1/1/1
ZXAN(config)#interface vport-1/3/1.1:1
Interface vport-1/3/1.1:1
Sport Vport BeginVid EndVid OuterVid InnerVid UserPrio Etype Vlan Cos
-----------------------------------------------------------------------
-------------------------------------------------------
-- -- -- -- -- -- -- YES
2 1 -- -- -- -- -- -- -- --
-- -- 300 -- -- -- -- YES
3 1 101 110 -- -- 2 -- -- --
500 -- -- -- -- -- -- YES
Context
A VLAN cross connection is a dedicated channel for a user port and an uplink port, an
uplink port and an uplink port or a user port and a user port. After a VLAN cross connec-
tion is configured, packets are forwarded in 1:1 mode in accordance with the VLAN ID
but not forwarded in MAC + VLAN mode.
With the VLAN cross connection, data is exchanged based on the following:
SVLAN
Dual-layer (CVLAN + SVLAN) tags
Steps
1. In ZXAN(config)# mode, run the interface xgei-1/x/x command to enter uplink port
configuration mode.
2. In ZXAN(config-if-xgei-1/x/x)# mode, run the switchport vlan command to config-
ure an uplink port VLAN.
3. In ZXAN(config)# mode, run the interface vport-1/x/x.x:x command to enter Vport
interface configuration mode.
4. In ZXAN(config-if-vport-1/x/x.x:x)# mode, run the service-port command to config-
ure a service port VLAN.
5. In ZXAN(config)# mode, run the vlan-connect svlan command to set the 1:1 VLAN
mode for the VLAN.
Example
ZXAN(config)#interface xgei-1/1/1
ZXAN(config-if-xgei-1/1/1)#exit
ZXAN(config)#interface vport-1/3/1.2:1
ZXAN(config-if-vport-1/3/1.2:1)#exit
----------------------------------------------------------------------
vport-1/3/1.2:1 xgei-1/1/1 5 -- OK OK
The ZXA10 C610 has a carrier class multicast operation capability, supports multicast
protocols and controllable multicast, supports all user and network protocols, and pro-
vides a base for value-added broadband multicast services and multicast service man-
agement. The ZXA10 C610 provides controllable multicast services, and supports IGM-
Pv1/v2/v3 and three modes: IGMP Snooping, IGMP Proxy, and IGMP Router.
Supports IGMPv1/v2/v3.
Supports MLDv1/v2.
Supports IGMP Snooping/Proxy/Router.
Supports MLD Snooping/Proxy.
Supports 8K multicast items.
Supports 4094 multicast VLANs.
Layer-2 multicast services are copied on the OLT and ONU (2-layer). Related configura-
tions are as follows:
Basic service parameter configurations on the OLT
Basic parameters involved in layer-2 multicast control include multicast VLANs,
source ports, receive ports, and multicast program addresses. A multicast VLAN
bears multicast data. The source ports are uplink ports connecting the multicast
source, the receive ports are ONU interfaces connecting multicast users, and a multi-
cast program address is composed of a group IP address and a source address.
Configuration of the OLT multicast protocol mode
The ZXA10 C610 supports IPv4 multicast dual-stack protocols. It can be flexibly con-
figured to accept or drop multicast packets of various protocol versions. Three work-
ing modes can be configured based on a multicast VLAN: Snooping, Router, and
Proxy.
Steps
Verification
You can use the show igmp command to display global IGMP configurations.
You can use the show igmp mvlan command to display the configurations of the
IGMP MVLAN.
Example
IGMP Enable
MVLAN ID 200
ZXAN(config)#interface xgei-1/1/1
ZXAN(config-if-xgei-1/1/1)#no shutdown
ZXAN(config-if-xgei-1/1/1)#exit
ZXAN(config)#interface vport-1/3/1.1:1
ZXAN(config-if-vport-1/3/1.1:1)#exit
ZXAN(config)#igmp enable
4. Configure an MVLAN.
ZXAN(config-igmp-mvlan-200)#work-mode proxy
ZXAN(config-igmp-mvlan-200)#host-version v3
ZXAN(config-igmp-mvlan-200)#group-filter enable
ZXAN(config-igmp-mvlan-200)#source-port xgei-1/1/1
ZXAN(config-igmp-mvlan-200)#receive-port vport-1/3/1.1:1
ZXAN(config-igmp-mvlan-200)#end
ZXAN#show igmp
----------------------------------------------------
Act Port is 0.
Cvlan is 0.
MaxGroupNum is 8192.
Host ip is 192.168.2.14.
Router ip is 192.168.2.14.
Robustness variable is 2.
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
xgei-1/1/1 v3 v3 0 0
Receive Port
----------------------------
vport-1/3/1.1:1
----------------------------
Steps
Verification
You can use the show mld command to display global MLD configurations.
You can use the show mld mvlan command to display the configurations of the
MLD MVLAN.
Example
MLD Enable
MVLAN ID 200
ZXAN(config)#interface xgei-1/1/1
ZXAN(config-if-xgei-1/1/1)#no shutdown
ZXAN(config-if-xgei-1/1/1)#exit
ZXAN(config)#interface vport-1/3/1.1:1
ZXAN(config-if-vport-1/3/1.1:1)#exit
ZXAN(config)#mld enable
4. Configure an MVLAN.
ZXAN(config-mld-mvlan-200)#work-mode proxy
ZXAN(config-mld-mvlan-200)#host-version v1
ZXAN(config-mld-mvlan-200)#source-port xgei-1/1/1
ZXAN(config-mld-mvlan-200)#receive-port vport-1/3/1.1:1
ZXAN(config-mld-mvlan-200)#exit
ZXAN(config)#show mld
----------------------------------------------------
Act Port is 0.
Cvlan is 0.
MaxGroupNum is 8192.
Host ip is fe80::c0a8:20e.
Router ip is fe80::c0a8:20e.
Robustness variable is 2.
----------------------------------------------------------------------------
----------------------------------------------------------------------------
xgei-1/1/1 v1 v1 0
Receive Port
----------------------------
vport-1/3/1.1:1
----------------------------
Steps
Verification
You can use the show qos cos-to-cos-profile name command to display the configu-
rations of the CoS priority remarking template.
Example
-----------------------------------------------------------------
profile detail :
-----------------------------------------------------------------
old-cos : 0 1 2 3 4 5 6 7
new-cos : 3 1 2 3 4 5 6 7
used-count : 0
profile used by :
-----------------------------------------------------------------
Steps
Verification
You can use the show qos dscp-to-cos-profile name command to display the configu-
rations of the DSCP priority remarking template.
Example
-----------------------------------------------------------------
profile detail :
-----------------------------------------------------------------
dscp-list : 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
cos-value : 0 0 0 0 0 0 0 0 1 1 1 1 3 1 1 1
-----------------------------------------------------------------
dscp-list : 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
cos-value : 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3
-----------------------------------------------------------------
dscp-list : 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
cos-value : 4 4 4 4 4 4 4 4 5 5 5 5 5 5 5 5
-----------------------------------------------------------------
dscp-list : 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
cos-value : 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7
used-count : 0
profile used by :
-----------------------------------------------------------------
Steps
Verification
You can use the show qos dscp-to-dscp-profile name command to display the config-
urations of the DSCP priority remarking template.
Example
-----------------------------------------------------------------
profile detail :
-----------------------------------------------------------------
old-dscp : 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
new-dscp : 0 1 2 3 4 5 6 7 8 9 5 11 12 13 14 15
-----------------------------------------------------------------
old-dscp : 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
new-dscp : 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
-----------------------------------------------------------------
old-dscp : 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
new-dscp : 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
-----------------------------------------------------------------
old-dscp : 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
new-dscp : 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63
used-count : 0
profile used by :
-----------------------------------------------------------------
Steps
Verification
You can use the show qos queue-conf-profile name command to display the configu-
rations of the QoS queue configuration template.
Example
-----------------------------------------------------------------
profile detail :
-----------------------------------------------------------------
queue id : 0 1 2 3 4 5 6 7
used-count : 0
profile used by :
-----------------------------------------------------------------
Steps
Verification
You can use the show qos traffic-profile name command to display the configurations
of the QoS traffic template.
Example
ZXAN(config)#traffic-profile test cir 10240 cbs 1000 pir 20480 pbs 1000
-----------------------------------------------------------------
profile detail :
-----------------------------------------------------------------
Counting information:
-----------------------------------------------------------------
profile used by
-----------------------------------------------------------------
Steps
Note
Example
green-discard-ratio 30
Steps
Example
ZXAN(config-flowPrf-F1)#exit
2. Configure the flow-group on xgei_1/1/2, on the egress direction, traffic limit for cos0,
cos1, cos2 in VLAN 100 + VLAN 200 + VLAN 300 is 3M, traffic limit for cos5 in VLAN
100 + VLAN 200 + VLAN 300 cos5 is 20M.
ZXAN(config)#interface xgei-1/1/2
ZXAN(config-flowPrf-F5)#flow 1 traffic-profile 1M
ZXAN(config-flowPrf-F5)#flow 2 traffic-profile 2M
ZXAN(config-flowPrf-F5)#flow 3 traffic-profile 3M
ZXAN(config-flowPrf-F5)#flow 4 traffic-profile 5M
4. Configure the flow-group on xgei_1/1/4, in the ingress direction, traffic limit for VLAN
200 is 1M, traffic limit for VLAN 300 is 2M, traffic limit for VLAN 400 is 3M, traffic limit
for VLAN 500 is 5M.
ZXAN(config)#interface xgei-1/1/4
Steps
1. In ZXAN(config)# mode, run the qos cos-to-dei command to configure CoS-DEI re-
mark profile.
2. In ZXAN(config-sub-vid)# mode, run the cos-to-dei-profile command to apply an
CoS-DEI profile to the VLAN.
3. In ZXAN(config-sub-vid)# mode, run the egress-dei-mark command to enable the
egress DEI mark function on the VLAN.
Example
1. Configure a CoS-DEI profile to modify SVLAN DEI according to SVLAN CoS, and
cos0/cos1/cos3/cos5/cos6 are remarked to yellow (1), cos2/cos4/cos7 are remarked
to green (0).
2. Apply the CoS-DEI profile to VLAN 100 and enable the egress DEI mark function.
ZXAN(config)#vlan 100
ZXAN(config-sub-100)#cos-to-dei-profile test
ZXAN(config-sub-100)#egress-dei-mark
Context
If an Ethernet interface trusts a CoS priority, the CoS priority of a packet is marked
in the override>cos-remark>trust priority sequence based on the CoS priority in the
ingress direction.
If an Ethernet interface trusts a DSCP priority, the CoS priority of a packet is marked
based on the preset DSCP-to-CoS mapping relationship.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface xgei-1/1/1
Context
If the Ethernet interface trusts a CoS priority, subsequent messages can be processed
as follows.
If the override function is configured, all CoS priorities of the services on a virtual port
are forcibly modified as the default CoS priority, including those of untagged packets.
If the override function is not configured, the default CoS priority is valid for only un-
tagged packets.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface xgei-1/1/1
Context
If the Ethernet interface trusts a CoS priority and the default priority is not configured
with the override function, after a CoS priority remarking template is configured, the ser-
vice CoS priority is modified according to the mapping relationship in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface xgei-1/1/1
Context
If the Ethernet interface trusts a DSCP priority, after a DSCP priority remarking template
is used, the service CoS priority can be modified according to the mapping relationship
in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface xgei-1/1/1
Context
If the Ethernet interface trusts a DSCP priority, after a DSCP priority remarking template
is used, the service DSCP priority can be modified according to the mapping relationship
in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface xgei-1/1/1
Context
If the Ethernet interface trusts a CoS priority and the default priority is not configured
with the override function, after a CoS priority remarking template in the egress direction
is used, the service CoS priority is modified according to the mapping relationship in the
template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If an Ethernet interface trusts a DSCP priority, after a DSCP priority remarking template
in the egress direction is used, the service CoS priority can be modified according to the
mapping relationship in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Ethernet interface.
Example
ZXAN(config)#interface xgei-1/1/1
Steps
Example
ZXAN(config)#interface xgei-1/1/1
Steps
Example
Context
If a Vport interface trusts a CoS priority, the CoS priority of a packet is marked ac-
cording to the override>cos-remark>trust priority sequence based on the CoS priority
in the ingress direction.
If a Vport interface trusts a DSCP priority, the CoS priority of a packet is marked
based on the DSCP-to-CoS mapping relationship.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If a Vport interface trusts a CoS priority, subsequent packets can be processed as fol-
lows.
If the override function is configured, all CoS priorities of the services on a virtual port
are forcibly modified as the default CoS priority, including those of untagged packets.
If the override function is not configured, the default CoS priority is valid for only un-
tagged packets.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If a Vport interface trusts a CoS priority and the default priority is not configured with the
override function, after a CoS priority remarking template is configured, the service CoS
priority is modified according to the mapping relationship in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configuration of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If a Vport interface trusts a DSCP priority, after a DSCP priority remarking template is
used, the service CoS priority can be modified according to the mapping relationship in
the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If a Vport interface trusts a DSCP priority, after a DSCP priority remarking template is
configured, the service DSCP priority can be modified according to the mapping relation-
ship in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If a Vport interface trusts a CoS priority and the default priority is not configured with the
override function, after a CoS priority remarking template is used, the service CoS priori-
ty is modified according to the mapping relationship in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Context
If a Vport interface trusts a DSCP priority, after a DSCP priority remarking template in
the egress direction is used, the service CoS priority can be modified according to the
mapping relationship in the template.
Steps
Verification
You can use the show qos interface command to display the QoS configurations of the
Vport interface.
Example
ZXAN(config)#interface vport-1/3/1.1:1
Steps
Example
ZXAN(config)#interface vport-1/3/1.1:1
Steps
Example
ZXAN(config)#interface vport-1/3/1.1:1
Steps
Example
Configure a traffic policy on a Vport interface to restrict the traffic rate in receiving direc-
tion.
ZXAN(config)#interface vport-1/3/1.1:1
Context
Network devices filter data packets and control policy-based routing and special traffic
through an ACL. A number of rules are configured for an ACL to identify the packets to
be filtered, and corresponding packets are accepted or rejected based on a preset poli-
cy.
An ACL is composed of one or more statements. Each statement accepts or rejects traf-
fic based on a specified parameter. The ACL compares the traffic with each statement in
the list until it finds a matching statement or all statements are compared. The last state-
ment of an ACL is an implicit reject statement.
Steps
Verification
You can use the show acl command to display the ACL configuration.
You can use the show access-list bound command to display the interface bound
to the ACL.
Example
1. Create an ACL.
ZXAN(config-acl-101)#
0000.0001.0000 0000.0000.ffff
ZXAN(config--acl-101)#exit
ZXAN(config)#interface vport-1/3/1.1:1
ZXAN(config-if-vport-1/3/1.1:1)#show acl
rule 2 deny any any 192.168.1.0 0.0.0.255 ipv4 src-mac 0000.0001.0000 0000.0000
.ffff
vport-1/3/1.1:1 in 101
Context
Steps
Note
The MSTP packet format of the devices from CISCO and Huawei does not meet all
the requirements of IEEE. When interconnecting the ZXA10 C610 with a device from
the above vendors, you must configure the values of KEY and DIGEST to intercon-
nect the devices in an area.
Verification
You can use the show spantree mst-config command to display the MSTP configu-
rations.
You can use the show spantree instance command to display the instance configu-
rations.
Example
ZXAN(config)#spantree
ZXAN(config-stp-0)#enable
ZXAN(config-stp-0)#mode mstp
ZXAN(config-stp-0)#mst revision 10
ZXAN(config)#interface xgei-1/1/1
Name : [zte]
Revision : 10
-------- --------------------------------------------------------
0 1-9,21-4094
1 10-20
MST01
Forward-Delay 15 sec;
Interface Prio.Nbr
-------------------------------------------------------------------------
Steps
1. In ZXAN(config)# mode, run the ip dhcp snooping enable command to enable the
global DHCP function.
2. In ZXAN(config-xgei-1/x/x)# mode, run the switchport vlan command to configure
an interface VLAN.
3. In ZXAN(config)# mode, run the ip dhcp snooping vlan command to enable the
DHCP Snooping function of a VLAN.
4. In ZXAN(config-if-vport-1/x/x.x)# mode, run the service-port command to config-
ure an interface VLAN.
Verification
You can use the show ip dhcp snooping dynamic database command to display DHCP
Snooping information.
Example
ZXAN(config)#interface xgei-1/1/1
ZXAN(config-if-xgei-1/1/1)#exit
ZXAN(config)#interface vport-1/3/1.1:1
ZXAN(config-if-vport-1/3/1.1:1)#exit
Vlan State
-------------------------------
100 enable
/1.1:1 /9/2018
/1.1:1 /9/2018
Context
The ZXA10 C610 supports the DHCP relay and DHCP proxy functions. The DHCP
proxy mode is the extension of the DHCP relay mode, which can quickly detect whether
a user is offline.
Steps
Note
The IP address of the relay agent should be consistent with the IP address of the
VLAN interface.
6. In ZXAN(config)# mode, run the ip dhcp relay server group command to create a
DHCP server group.
7. In ZXAN(config-dhcp-server-group)# mode, run the algorithm command to config-
ure server polling algorithm.
8. In ZXAN(config-dhcp-server-group)# mode, run the server command to configure
the DHCP server IP address.
9. In ZXAN(config-dhcp-if-vlanid)#mode, run the relay server group command to
configure the DHCP relay server with the layer-3 interface.
10. In ZXAN(config-dhcp-if-vlanid)#mode, run the relay forward mode command to
configure forwarding mode for the DHCP relay server with the layer-3 interface.
Verification
You can use the show ip dhcp relay user command to query the DHCP relay users.
Example
ZXAN(config)#dhcp
ZXAN(config-dhcp)#enable
ZXAN(config)#interface vlan100
ZXAN(config-if-vlan100)#exit
ZXAN(config)#interface vlan200
ZXAN(config-if-vlan200)#exit
ZXAN(config)#dhcp
ZXAN(config-dhcp)#interface vlan200
ZXAN(config-dhcp-if-vlan200)#mode relay
ZXAN(config-dhcp-if-vlan200)#exit
ZXAN(config-dhcp)#exit
ZXAN(config-dhcpr-server-group)#algorithm forward-all
ZXAN(config-dhcpr-server-group)#server 1 10.1.1.2
ZXAN(config-dhcpr-server-group)#exit
ZXAN(config-dhcp)#exit
6. On the VLAN interface, configure the DHCP relay server and forwarding mode.
ZXAN(config)#dhcp
ZXAN(config-dhcp)#interface vlan200
Steps
12. In ZXAN(config-ip-pool)# mode, run the range command to configure the IP ad-
dress pool for DHCP clients.
Verification
You can use the show ip dhcp server user interface command to query the DHCP server
clients.
Example
ZXAN(config)#dhcp
ZXAN(config-dhcp)#enable
ZXAN(config)#dhcp
ZXAN(config-dhcp)#interface vlan100
ZXAN(config-dhcp-if-vlan100)#mode server
ZXAN(config-dhcp-if-vlan100)#policy zte
ZXAN(config-dhcp-if-vlan100)#exit
ZXAN(config-dhcp)#exit
ZXAN(config-dhcp-policy)#dhcp-pool zte
ZXAN(config-dhcp-policy)#exit
ZXAN(config-dhcp-pool)#ip-pool zte
ZXAN(config-dhcp-pool)#default-router 200.1.1.5
ZXAN(config-ip-pool)#exit
Steps
Verification
Run the show ip dhcp client runr interface command to query the interface IP address.
Example
ZXAN(config)#dhcp
ZXAN(config-dhcp)#enable
ZXAN(config-dhcp)#interface vlan300
ZXAN(config-dhcp-if-vlan300)#mode client
3. Acquire an IP address.
ZXAN(config-dhcp-if-vlan300)#client start
Prerequisite
The peer device is configured with link aggregation and has the same working rate and
VLAN attributes as those of the local end.
Context
Aggregation crossing interface boards is allowed and member interfaces can be dis-
tributed on any interface board.
Member interfaces must operate in full duplex mode and have the same work rate
and VLAN attributes.
The logical interface formed the ZXA10 C610 after link aggregation is named smart-
group and has the same attributes as the default VLAN of common Ethernet interfaces.
Steps
1. In ZXAN(config)# mode, run the interface xgei-1/x/x command to enter uplink inter-
face configuration mode.
2. In ZXAN(config-if-xgei-1/x/x)# mode, run the switchport mode command to config-
ure interface mode.
3. In [ZXAN(config-if-xgei-1/x/x)#] mode, run the switchport vlan command to config-
ure interface VLAN.
4. In [ZXAN(config-if-xgei-1/x/x)#] mode, run the no shutdown command to enable
the interface.
5. In ZXAN(config)# mode, run the interface smartgroupid command to create a
smartgroup。
6. In ZXAN(config-if-smartgroupid# mode, run the switchport mode command to
configure smartgroup mode.
7. In ZXAN(config-if-smartgroupid# mode, run the switchport vlan command to con-
figure smartgroup VLAN.
Note
8. In ZXAN(config)# mode, run the lacp command to enter LACP configuration mode.
9. In ZXAN(config-lacp)# mode, run the interface smartgroup command to create an
aggregation group.
10. In ZXAN(config-lacp-sg-if-smartgroupx)# mode, run the lacp load-balance com-
mand to configure the load sharing mode for the aggregation group.
Note
The ZXA10 C610 supports load sharing based on the source IP address, destina-
tion IP address, both the source and destination IP addresses, source MAC address,
destination MAC address, or both the source and destination MAC addresses. The
default value is based on both the source and destination MAC addresses.
Note
Verification
You can use the show lacp counter command to display the aggregation group traffics.
You can use the show lacp internal command to display the aggregation group status.
Example
ZXAN(config)#interface xgei-1/1/2
ZXAN(config-if-xgei-1/1/2)#no shutdown
ZXAN(config-if-xgei-1/1/2)#exit
ZXAN(config)#interface xgei-1/1/3
ZXAN(config-if-xgei-1/1/3)#no shutdown
ZXAN(config-if-xgei-1/1/3)#exit
2. Configure a smartgroup.
ZXAN(config)#interface smartgroup1
ZXAN(config-if-smartgroup1)#exit
ZXAN(config)#lacp
ZXAN(config-lacp)#interface smartgroup1
ZXAN(config-lacp-sg-if-smartgroup1)#
4. Configure the load sharing mode and operation mode for the aggregation group.
ZXAN(config-lacp-sg-if-smartgroup1)#exit
5. Add an interface to the aggregation group and configure the interface aggregation
mode.
ZXAN(config)#lacp
ZXAN(config-lacp)#interface xgei-1/1/2
ZXAN(config-lacp-member-if-xgei-1/1/2)#exit
ZXAN(config-lacp)#interface xgei-1/1/3
ZXAN(config-lacp-member-if-xgei-1/1/3)#exit
Smartgroup:1
-------------------------------------------------------------------
Smartgroup:1
--------------------------------------------------------------------------------
Smartgroup 1 neighbors
-------------------------------------------------------------------------------
Context
The ZXA10 C610 supports the UAPS function of an Ethernet port. The system periodi-
cally detects the working mode of an uplink port. If it detects that the working port is dis-
connected or the link quality is degraded to be unavailable, it automatically switches ser-
vices over to the slave port so that services will not be interrupted.
Steps
Note
The master and slave ports of the UAPS group must be consistent.
Note
If a switchover occurs in a UAPS group, no more switchover will occur within the pro-
tection period.
Note
Verification
You can use the show uaps groupid command to display the configurations of the
UAPS group.
Example
ZXAN(config)#uaps-group 1
ZXAN(cfg-uaps-1)#
2. Configure the master and slave ports for the UAPS group.
3. Enable the automatic recovery function of the master and slave ports of the UAPS
group.
ZXAN(cfg-uaps-1)#revertive enable
ZXAN(cfg-uaps-1)#protect-time 300
ZXAN(cfg-uaps-1)#switch-type common-port
Protect-time : 300s
Is-in-protect-time : no
Next-hop : 0.0.0.0
Link-detect-retry : 5
Link-detect-interval : 3s
Failure-time : 43s
Swap-reason : no swap
xgei-1/1/1 : down
xgei-1/1/2 : down
Steps
Verification
You can use the show port-identification format-profile command to display all
format templates.
You can use the show port-identification format-profile command to display the
details of all format templates.
Example
ZXAN(config-portloc-format-profile-abc)#
index 1
width 5 index 3
index 11
1 CHINA-NETCOM-DSL
2 CHINA-NETCOM-PON
3 CHINA-TELECOM-DSL
4 CHINA-TELECOM-PON
5 DEFAULT-ONU-PROFILE
6 DSL-FORUM-ATM
7 DSL-FORUM-ETH
8 DSL-FORUM-PON
9 FT
10 GT
11 UNI-BASE
12 abc
1 Variable Access-Node-ID 0
2 Delimiter Space 1
3 Variable Access-Node-Type 5
4 Delimiter Space 1
5 Variable Rack 0
6 String / 1
7 Variable Frame 0
8 String / 1
9 Variable Port 0
10 String : 1
11 Variable Onu-ID 3
Cid-Syntax Format:
Context
The default port identification format template, a carrier template, is the template for Chi-
na Telecom.
Steps
Verification
Run the show port-identification operator-profile info command to display the details
of a carrier template.
Example
ZXAN(config-portloc-operator-profile-abc)#
ZXAN(config-portloc-operator-profile-abc)#dhcpv4-l2-relay-agent enable
ZXAN(config-portloc-operator-profile-abc)#pppoe-intermediate-agent enable
Port-identification format:
pon: DSL-FORUM-PON
lan: DSL-FORUM-ETH
Pppoe-intermediate-agent configuration:
subopt90
Dhcpv4-l2-relay-agent configuration:
subopt81
Steps
Verification
You can use the show port-identification global command to display the global
port identification configuration.
You can use the show port-identification port command to display the port identifi-
cation configuration.
Example
access-node-name : ZXA10-C610
access-node-id-type : access-node-name
rackno :1
frameno : 1
Context
The ZXA10 C610 supports the IP source guard function for both IPv4 addresses.
Legal IPv4 users can be obtained through the DHCP Snooping table. Alternatively, IPv4
addresses can be configured to support access of users with static IPv4 addresses.
Steps
Verification
You can use the show ip-source guard command to display the global configura-
tions of the IP source guard function.
You can use the show ip-source-guard user vport-1/x/x.x:x command to display
the configurations of users using static IPv4 addresses.
Example
ZXAN(config)#ip-source-guard enable
ZXAN(config)#ip-source-guard bind-type IP
ZXAN(config)#interface vport-1/3/1.1:1
5. Configure the IP addresses for a user using static IPv4 and IPv6 addresses.
128 sport 1
ZXAN(config-if-vport-1/3/1.1:1)#show ip-source-guard
7. Display the configurations for users using static IPv4 and IPv6 addresses.
Context
The MAC address anti-flapping function of the ZXA10 C610 has the following character-
istics:
Restricts MAC address learning on user ports. A MAC item that has been learned on
a user port cannot be learned on other ports. This prevents the same address from
flapping between different ports.
Once a user port is detected attempting address flapping, a notification message is
reported, carrying the port and MAC address.
Supports uplink port protection. The MAC address of a user port can flap to an up-
link port, but the MAC address of an uplink port cannot flap to a user port. The MAC
address between uplink ports can flap. Thus the gateway MAC address of an uplink
port is protected.
Steps
Verification
You can use the show security mac-anti-spoofing configuration command to dis-
play the MAC address anti-flapping configuration.
You can use the show security mac-move-log command to display the MAC ad-
dress fraud log.
Example
mac-move-report :enable
mac-anti-spoofing :enable
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------------------------------------
Context
The MFF function disables two users in the same subnet to directly communicate with
each other, and forcibly forwards users' uplink traffic to the gateway, which forwards the
traffic. Thus 3-layer intercommunication between users is implemented. The gateway
can monitor the traffic between users to prevent malicious attacks.
Steps
Verification
You can use the show ip-service mac-forced-forwarding command to display the
global MFF configuration.
You can use the show ip-service gateway command to display the gateway infor-
mation of the VLAN with the MFF function.
Example
2. Set the gateway address of the VLAN with the MFF function.
4. Display the gateway information of the VLAN with the MFF function.
--------------------------------------------------------------------
Prerequisite
Context
The SSH service can encrypt transmitted data and prevents man-in-the-middle attacks.
In addition, data transmitted through the SSH is compressed, so the transmission is ac-
celerated. When an SSH client communicates with an SSH server, both the user name
and the password are encrypted to avoid password wiretapping.
The ZXA10 C610 supports the functions of the SSH server.
Note
Because Telnet has potential risk in remote access, it is recommended to use SSH for
remote access and use the line telnet server disable command to disable the Telnet
service.
To ensure the remote CLI access, SSH and Telnet cannot be disabled simultaneously.
When the SSH service is disabled, the Telnet service is enabled automatically.
You can use a management ACL to disable all remote CLI access, refer to 9.4 Configur-
ing a Management ACL.
Verification
1. In ZXAN(config)# mode, run the ssh server enable command to enable the func-
tions of the SSH server.
2. In ZXAN(config)# mode, run the ssh server version command to configure the pro-
tocol version of the SSH server.
3. In ZXAN(config)# mode, run the ssh server username command to configure the
SSH server authentication type.
Result
You can use the show acl command to display the SSH configuration.
You can use the show ssh server authentication-info command to display the
SSH authentication information.
Example
ZXAN(config)#show ssh
=================================================================
SSH configuration
=================================================================
SSH version : 2
-----------------------------------------------------------------
SSH users:
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
zte password
Related Task
1. In a Windows OS, run the SSH client software (PuTTY, for example).
2. In the PuTTY Configuration dialog box, select Connection > SSH from the left nav-
igation tree, select 2 for SSH protocol version in the right pane, see Figure 9-1.
3. Select from the left navigation tree, type Hostname and Port (default: 22), select
SSH for Connection type, see Figure 9-2,and then click Open.
Note
4. In the pop-up PuTTY Security Alert dialog box, click Yes to save the RSA key, or
click Noto skip.
5. In the pop-up window, type the username and password to log in.
Context
Steps
Verification
You can use the show tacacs global-config command to display the TACACS+
configuration.
You can use the show tacacs-server command to display the TACACS+ server con-
figuration.
You can use the show tacplus group-server command to display the TACACS+
server group configuration.
Example
ZXAN(config)#tacacs enable
ZXAN(config)#tacacs-client 172.10.4.200
ZXAN(config-sg)#exit
ZXAN(config-system-user)#user-name zte1
ZXAN(config-system-user-username)#exit
ZXAN(config)#aaa-authentication-template 2128
ZXAN(config-aaa-authen-template)#aaa-authentication-type tacacs
ZXAN(config-aaa-authen-template)#authentication-radius-group zte1
ZXAN(config-aaa-authen-template)#exit
ZXAN(config)#aaa-authorization-template 2128
ZXAN(config-aaa-author-template)#aaa-authorization-type tacacs
ZXAN(config-aaa-author-template)#authorization-radius-group zte1
ZXAN(config-aaa-author-template)#exit
tacacs:enable
packet:1024
timeout:5
deadtime:5
hashType:md5
tacacs-client 172.10.4.200
state:active
Context
Steps
Note
Note
If the ZXA10 C610 is connected to the RADIUS server in in-band network man-
agement mode, skip this step.
Verification
You can use the show radius-server all command to display the RADIUS server
configuration.
You can use the show aaa-authentication-template command to display the AAA
authentication template configuration.
You can use the show aaa-authorization-template command to display the AAA
authorization template configuration.
Example
ZXAN(config-authgrp-zte1)#nas-ip-address 172.10.4.200
ZXAN(config-authgrp-zte1)#exit
ZXAN(config)#aaa-authentication-template 2128
ZXAN(config-aaa-authen-template)#aaa-authentication-type radius
ZXAN(config-aaa-authen-template)#authentication-radius-group zte1
ZXAN(config-aaa-authen-template)#exit
ZXAN(config)#aaa-authorization-template 2128
ZXAN(config-aaa-author-template)#aaa-authorization-type radius
ZXAN(config-aaa-author-template)#authorization-radius-group zte1
ZXAN(config-aaa-author-template)#exit
ZXAN(config)#system-user
ZXAN(config-system-user)#authentication-template 128
ZXAN(config-system-user-authen-temp)#exit
ZXAN(config-system-user)#authorization-template 128
ZXAN(config-system-user-author-temp)#exit
ZXAN(config-system-user)#user-name zte1
ZXAN(config-system-user-username)#exit
------------------------------------------------------------------------
------------------------------------------------------------------------
------------------------------------------------------------------------
ZXAN(config)#show aaa-authentication-template
authen-template:2001
authen-type:local
authen-template:2128
authen-type:radius
authen-radius-group:zte1
ZXAN(config)#show aaa-authorization-template
author-template:2001
author-type:local
author-template:2128
author-type:radius
author-radius-group:zte1
Steps
Example
1. Create an ACL.
ZXAN(config)#ipv4-access-list zte
ZXAN(config-ipv4-acl)#
ZXAN(config-ipv4-acl)#exit
Steps
Example
ZXAN(config)#control-panel
ZXAN(control-panel)#packet-limit dhcp 20
ZXAN(control-panel)#packet-limit arp_user_side 50
Context
After the DoS attack prevention function is enabled, the ZXA10 C610 monitors the pro-
tocol packets that users send to the system CPU. If the number of times that the system
continuously detects attacks exceeds the alarm value, the user interface is added to the
blacklist and an alarm is reported. In this case, the data packets sent through user in-
terfaces are processed according to a preset processing policy. If the device detects no
DoS attacks in a period, it deletes the user interface from the blacklist.
Steps
1. In ZXAN(config)# mode, run the security anti-dos enable command to enable the
DoS attack prevention function.
2. In ZXAN(config)# mode, run the security anti-dos packet-limit command to con-
figure the rate threshold of protocol packets for DoS attack prevention.
Verification
You can use the show security anti-dos config command to display the DoS attack
prevention configuration.
You can use the show security anti-dos black-list command to display the blacklist
for DoS attack prevention.
Example
2. Configure the rate threshold of the protocol packets for DoS attack prevention.
global-status: enable
-------------------------------------------------------------------------------
--------------------------------------------------------------------------------
AAA
ACL
ARP
AS
- Autonomous System
BFD
BGP
CBS
CCM
CFM
CIR
CLI
CoS
- Class of Service
DoS
- Denial of Service
DSCP
IGMP
IGP
IP
- Internet Protocol
LACP
LB
- Loopback
LBM
- Loopback Message
LSP
LT
- Link Trace
LTM
MA
- Maintenance Association
- Maintenance Domain
MEP
MFF
- MAC-Forced Forwarding
MLD
MPLS
MSTP
MVLAN
ONU
OSPF
PBS
PIR
PPPoE
QoS
- Quality of Service
RSTP
SNMP
SP
- Strict Priority
SSH
- Secure Shell
SSTP
SVLAN
TACACS+
TLS
UAPS
VLAN
WRED
WRR