User Manual6615
User Manual6615
UMN : CLI
DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Non-observance of these conditions and the safety instructions can result in personal injury or in
property damage.
Therefore, only trained and qualified personnel may install and maintain the system.
The system complies with the standard EN 60950-1 / IEC 60950-1. All equipment connected has to
comply with the applicable safety standards.
In elektrischen Anlagen stehen zwangsläufig bestimmte Teile der Geräte unter Spannung. Einige
Teile können auch eine hohe Betriebstemperatur aufweisen.
Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Körperverletzungen und
Sachschäden führen.
Deshalb wird vorausgesetzt, dass nur geschultes und qualifiziertes Personal die Anlagen installiert
und wartet.
Das System entspricht den Anforderungen der EN 60950-1 / IEC 60950-1. Angeschlossene Geräte
müssen die zutreffenden Sicherheitsbestimmungen erfüllen.
Trademarks:
All designations used in this document can be trademarks, the use of which by third parties for their
own purposes could violate the rights of their owners.
2 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Details:
Issue History
Issue Date of Reason for Update
Number Issue
3 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
This document consists of a total of 454 pages. All pages are Issue 1.
Contents
1. Preface ............................................................................................................................................ 24
3. Using Command.............................................................................................................................. 32
4 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
5 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
6 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
6. System Environment......................................................................................................................109
6.1.4. NTP................................................................................................................................................112
6.2.4. Reloading.......................................................................................................................................124
7 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
8 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
7.4. RMON............................................................................................................................................176
9 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
10 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
11 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
12 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
13 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
14 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
8.9.7. Whole-packet-checksum................................................................................................................364
8.12. DHCP.............................................................................................................................................385
15 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
8.12.5. Registering DNS Server that is common to all IP Pools ................................................................ 395
8.12.6. Configuring IP Available Time that is common to all IP Pools ........................................................ 395
8.12.10.5. Remote-ID, Circuit-ID and the Number of Assigning IP Address ................................................... 403
16 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
17 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
9.3.4. Creating Static Route available only for RIP .................................................................................. 447
18 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
19 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Illustrations
Fig. 2-1 Network Structure with SURPASS hiD 6615 ........................................................................................ 27
Fig. 8-1 VLAN structure based on the port in Layer 2 environment................................................................. 255
Fig. 8-2 The process of deciding packet route based on VLAN....................................................................... 256
Fig. 8-4 In case the packets going outside in Layer 2 environment ................................................................. 265
Fig. 8-5 In case external packets enter under Layer 2 environment ①........................................................... 266
Fig. 8-6 In case external packet enter in Layer 2 environment② .................................................................... 267
20 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Fig. 8-38 Example ① The Multicast packet registered in the IGMP group .....................................................347
Fig. 8-39 Example ② The unregistered Multicast packet ...............................................................................347
Fig. 8-43 Network that multicast source are not directly connected to multicast group....................................364
21 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
22 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Tables
23 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
1. Preface
This Manual provides helpful information and instruction how to configure SURPASS
hiD 6615. All users should carefully read this guide before handing this product and fol-
low all instructions. For reader’s comprehension, it contains detail description and prac-
tical example of product configuration.
This guide is designed for network administrators who will be installing and maintaining
SURPASS hiD 6615. The system administrator should be familiar with the fundamen-
tals of LAN and have technical networking experience and professional knowledge
about network equipment.
24 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
This guide uses the following conventions to convey instructions and information.
Information
This information symbol provides useful information when using commands to config-
ure.
Note
This note symbol means reader take note. Notes contain helpful suggestions or refer-
ences.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury
or broke the equipment. Before you work on any equipment, be aware of the hazards
involved with electrical circuitry and be familiar with standard practices for preventing
accidents by making quick guide based on this guide.
The following table shows commands used in console terminal of SURPASS hiD 6615.
Please be aware of each command to use them correctly.
Notation Description
25 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
◈ Notation of Guide
The following table shows commands used in guidebook. Please be aware of each
command to use them correctly.
Notation Description
26 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
2. Product Introduction
SURPASS hiD 6615 L3 switch is typical Layer 3 switch intended to construct large-
scale network, which provides aggregated function of upgraded LAN network consisted
of typical Ethernet switch. Layer 3 switch can connect to PC, web server, LAN equip-
ment, backbone equipment, or another switch through various interfaces.
SURPASS hiD 6615 L3 switch supports routing based on VLAN, IP multicasting, and
provides Layer 3 switching service such as IP packet filtering or DHCP.
The following picture is an example of network construction using SURPASS hiD 6615.
Internet
Switch
Switch Switch
27 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
2.1. Features
In SURPASS hiD 6615 switch, QoS-based forwarding sorts traffic into a number of
classes and marks the packets accordingly. Thus, different quality of service is provided
to each class, which the packets belong to. The rich QoS capabilities enable network
managers to protect mission-critical applications and support differentiated level of
bandwidth for managing traffic congestion. SURPASS hiD 6615 switch supports delay
priority of the packet based on the IEEE 802.1p class of services (CoS) standard.
Multicast Communication
Since SURPASS hiD 6615 switch provides IGMP Snooping and IGMP Querier, you can
use multicast communication. Through multicast communication, packets can be
transmitted to hosts who need them so that overloading can be prevented.
Switch in SNMP is mounted can manage and monitor switch at remote place. SUR-
PASS hiD 6615 switch supports SNMP version 1,2, and four kinds of groups’ RMON so
that administrator can check static data anytime.
IP Routing
Generally, switches are operating at Layer 2 of OSI layers. But, since SURPASS hiD
6615 switch is Layer 3 switch, it peforms IP routing that routers have. So you can save
cost for installing router additionally.
Newly upgraded SURPASS hiD 6615 switch can restore the way of IP packet forward-
ing in terms of network so that entry remembered in switching chip is enlarged. Maxi-
mum thirteen ways of IP packet forwarding based on network can be restored.
SURPASS hiD 6615 switch supports DHCP, which automatically assigns IP address to
clients, accessed to network. You can effectively utilize limited IP source and lower cost
to manage network because DHCP server manages all IP addresses from center.
28 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
VLAN(Virtual Local Area Network) is made by dividing one network into several logical
networks. Packet cannot be transmitted and received between different VLANs. There-
fore it can prevent needless packets accumulating and strengthen security of VLAN.
SURPASS hiD 6615 switch recognizes 802.1Q tagged frame and supports maximum
4K VLANs.
ARP-alias
ARP-alias makes concentrating switch response to ARP request from equipment with-
out registered IP address for clients’ communication.
Proxy-ARP
Packet Filtering
IP packet filtering limits network users so that only specific equipments and users can
access to network. Through this function, user can not only block unnecessary informa-
tion and prevent outflow of specific data, but also block unidentified users to strengthen
network security. In addition, when Martian-filter to block outgoing packet with other
source IP address and LAN service is provided in apartment or some areas, NetBIOS
filtering is also supported to protect clients’ private information.
Stacking
In switch group, a switch configured as master can configure, manage, and monitor the
other switches called slave with one IP address. Since one IP address can manage
several switches, IP source can be saved.
Port Trunk
SURPASS hiD 6615 L3 switch aggregates several physical interfaces into one logical
port(aggregate port). Port trunk aggregates interfaces with the standard of same speed,
same duplex mode, and same VLAN ID. According to IEEE 802.3ad, SURPASS hiD
6615 L3 switch can configure maximum six aggregate ports, which can include maxi-
mum eight ports to decrease traffic and improve fault recovery function.
29 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 switch supports LACP, complying with IEEE 802.3ad, which ag-
gregates multiple links of equipments to use more enlarged bandwidth.
Rate-limit
SURPASS hiD 6615 switch provides graded bandwidths to all ports. Through providing
bandwidths graded by user’s configuration, ISP can charge graded billing plan and
manage efficient and economized lines.
Flood-Guard
STP(Spanning Tree Protocol) enables switches, which have double-path to use the
double-path without loops. That is, it activates only one path, which is the shortest one
among several paths and blocks the others to prevent loop.
SURPASS hiD 6615 switch supports PVST(Per VLAN Spanning Tree) that STP is in-
dependently operated per each VLAN. PVST(Per VLAN Spanning Tree) prevents entire
network freezing caused by Loop in one VLAN.
It is possible to construct stable and flexible network on metro Ethernet RING or exist-
ing P-to-P through supporting RSTP(Rapid Spanning Tree Protocol) complying with
IEEE 802.1W. RSTP is designed to innovately decrease STP Reconvergency time. It
innovate saves time of Fail over on Layer 2 switch, which has Redundant link.
30 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 switch restricts clients attempting to access to port by 802.1x au-
thentication to enhance security and portability of network management. When a client
attempts to connect to port of 802.1x authentication enabled, the switch transfers re-
quired information to RADIUS server for authentication. Therefore, only authorized cli-
ent who has access right can connect to the port.
SURPASS hiD 6615 switch supports client authentication protocol, that is RA-
DIUS(Remote Authentication Dial-In User Service) and Tacacs+(Terminal Access Con-
troller Access Control System+). Not only user IP and password registered in switch but
also authentication through RADIUS server and TACACS+ server are required to ac-
cess. So, security of system and network management is strengthened.
SSH Server
Through enabled SSH(Secure Shell) server, the security of telnet and ftp server can be
strengthen.
Broadcast storm control is, when too much of broadcast packets are being transmitted
to network, a situation of network timeout because the packets occupy most of transmit
capacity. SURPASS hiD 6615 switch supports broadcast packet, multicast packet, and
Broadcast storm control, which disuses Flooding packet, that exceed the limit during
the time configured by user.
31 DDJ:A-M-5212B0-01
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
3. Using Command
3.1. Command Mode
You can be configured and managed SURPASS hiD 6615 switch by console terminal
that is installed on User’s PC. When you configure and manage SURPASS hiD 6615
switch by console terminal, you can use the CLI-based interface command. Connect
RJ-45-to-DB-9 console cable to console port of SURPASS hiD 6615 switch.
Configuration Console
& Management Terminal
installed in
PC
This chapter explains how CLI command mode is organized before installing. CLI
command mode is consisted as follow:
32 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When user logs in successfully, the command mode is on Privilege Exec View Mode.
Privilege Exec View Mode is a read-only mode provided to all users accessing to the
switch. In Privilege Exec View Mode, it is possible to check the configuration of switch.
Table 3-1 shows main commands used on Privilege Exec View Mode of the SURPASS
hiD 6615.
Command Function
To have not only reading right but also configuring right, you must enter into Privilege
Exec Enable Mode. It is possible to enter into Privilege Exec Enable Mode using “en-
able” command in Privilege Exec View Mode. After enter into Privilege Exec Enable
Mode, the command prompt changes SWITCH> to SWITCH#.
To enhance the security more, the administrator can designate the password. In Privi-
lege Exec Enable Mode, if the user successfully logs in the switch, enters to Privilege
Exec Enable Mode of CLI command.
The command in Privilege Exec Enable Mode is used to check the changes of terminal
configuration, network status and system information.
DDJ:A-M-5212B0-01 33
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Tab.3-2 is the command in OS 2.15 Privilege Exec Enable Mode of SURPASS hiD
6615.
Command Function
To enter into Global Configuration Mode, input the command, “configure terminal” on
Privilege Exec Enable Mode. After entering into Global Configuration Mode, the system
prompt is supposed to change to SWITCH(config)# from SWITCH#.
configure terminal Enable Enters into configuration mode from Enable mode.
Command Function
34 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You can enter into Rule Configuration Mode using the “rule name create” command in
Global Configuration Mode. If you enter into Rule Configuration Mode, the system
prompt changes from SWTCH(config)# to SWITCH(config-rule[name])#.
rule name create Global Enters into Rule configuration mode from Configuration.
Table 3-4 is the command of configuring OS 2.15 Rule Configuration Mode of SUR-
PASS hiD 6615.
Command Function
DDJ:A-M-5212B0-01 35
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To enter into DHCP Configuration Mode, input the command, “ip dhcp pool pool-
name” on configuration mode as follow. Then the system prompt is changed to
SWITCH(config-dhcp[pool-name])# from SWITCH(config)#.
ip dhcp pool pool-name Global Enters into DHCP Configuration Mode to configure DHCP.
Command Function
36 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In Global Configuration Mode, if you use “ip dhcp option82” command, system prompt
is changed to SWITCH(config-opt82)# from SWITCH(config)# and enters into
DHCP Option-82 Configuration Mode.
In DHCP configuration mode, configure the range of IP address used in DHCP server
and designate the group in subnet and configure default gateway of the subnet. Table
3-6 is the main commands of configuring OS 2.15 DHCP Option82 Configuration Mode
of SURPASS hiD 6615.
Command Function
Command Function
owner Shows the subject, which configures each Rmon and uses related information.
DDJ:A-M-5212B0-01 37
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To enter into PIM Configuration Mode, use the following command. The system prompt
will be changed to SWITCH (config_pim)# from SWITCH(config)#.
router pim Global Enters into PIM Configuration Mode from Global Configuration Mode.
Command Function
To enter into VRRP Configuration Mode, use the following command. The system
prompt is supposed to be changed to SWITCH(config-vrrp)# from SWITCH
(config)#.
38 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
On VRRP Configuration Mode, you can configure VRRP to activate it. Table 3-9 shows
main commands of VRRP Configuration Mode.
Command Function
Configures Advertisement time, which means the interval that Master router
vr_timers
distributes its information to another Virtual Router.
When you input the command, “bridge” on configuration mode as follow, the system
prompt is changed to SWITCH (bridge)# from SWITCH(config)#.
Bridge mode is to manage MAC address and to configure switch functions of Layer 2
such as VLAN, mirroring, STP.
Command Function
DDJ:A-M-5212B0-01 39
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To enter into Interface configuration mode, input the command, “interface interface-
name” on configuration mode. When you enter into Interface configuration mode, the
system prompt is changed to SWITCH(config-if)# from SWITCH(config)#.
interface interface-name Global Enters into Interface configuration mode from configu-
ration mode.
Command Function
ip Assigns IP address.
To enter into Router Configuration Mode, use the following command. The system
prompt is supposed to be changed to SWITCH(config-router)# from
SWITCH(config)#.
According to routing protocol way, Router Configuration Mode is divided into BGP, RIP,
and OSPF. They are used to configure each IP routing protocol.
40 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Command Function
To enter into Route-Map Configuration Mode, use the following command. The system
prompt is supposed to be changed to SWITCH(config-route-map)# from SWITCH
(config)#.
On Route-Map Configuration Mode, you can configure the place where information is
from and sent in routing table.
Command Function
DDJ:A-M-5212B0-01 41
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
This section provides useful functions for user’s convenience while using DSH com-
mands. They are as follow.
To find out available commands, input question mark(?). When you input the question
mark(?) in each command mode, you can see available commands used in the mode
and variables following after the commands. The following is the available commands
on Privilege Exec Enable Mode of hiD 6615.
SWITCH# ?
Exec commands:
clear Reset functions
clock Manually set the system clock
configure Enter configuration mode
copy Copy from one file to another
debug Debugging functions (see also 'undebug')
disconnect Disconnect user connection
enable Turn on privileged mode command
erase Erase saved configuration
exit End current mode and down to previous mode
halt Halt process
help Description of the interactive help system
no Negate a command or set its defaults
ping Send echo messages
quote Execute external command
rcommand Management stacking node
release Release the acquired address of the interface
reload Reload the system
renew Re-acquire an address for the interface
restore Restore configurations
show Show running system information
ssh Configure secure shell
tech-support Technical Supporting Function for Diagnosis System
(ommitted)
SWITCH#
42 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Question mark(?) will not be seen in the screen and you do not need to press Enter
key to display commands list. This guide is designed for the standard OS V2.15. The
displayed contents may vary depending on OS version.
In case of SURPASS hiD 6615 installed CLI, you can find out commands starting with
specific alphabet. Input the first letter and question mark without space. The following is
an example of finding out the commands starting ‘s’ in Privilege Exec Enable Mode of
SURPASS hiD 6615.
SWITCH# s ?
show Show running system information
ssh Configure secure shell
SWITCH# s
Also, it is possible to view variables you should input following after commands. After
inputting the command you need, make one space and input question mark. The fol-
lowing is an example of viewing variables after the command, write. Please note that
you must make one space after inputting
SWITCH# write ?
memory Write to NV memory
terminal Write to terminal
SWITCH# write
If you need to find out the list of available commands in each mode and the variables in
more detail, use the command, show list. The following is an example of displaying list
of available commands in Privilege Exec Enable Mode and the variables by using the
command, show list.
Press any key to skip to the next list while you see “more”.
DDJ:A-M-5212B0-01 43
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
This guide is designed for the standard OS V2.15. The displayed contents may vary
depending on OS version.
In case of DSH, you do not have to enter repeated command again. When you need to
call command history, use this arrow key, (↑). When you press the arrow key, the latest
command you used will be seen one by one.
The following is an example of calling command history after using several commands.
After using these commands in order : show clock→configure terminal→interface 1→
exit, press the arrow key(↑) and then you will see the commands from latest one: exit
→interface 1→configure terminal→show clock.
In hiD6625, user can check command list that had used with below command. It can be
shown up to 100 lines and the last command is listed at the bottom of history.
Global/Bridge
44 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Command Abbreviation
Clock cl
Show sh
Syslog sys
In SURPASS hiD 6615, the user can use the commands of Privilege Exec Enable
Mode in the other mode.
To use the commands of Privilege Exec Enable Mode in the other mode, use the fol-
lowing command.
Global/RMON/DHCP/
It is possible to use Privilege Exec
do command Option-82/Bridge/Interface
Enable Commands in another mode.
/Rule/PIM/VRRP/Router/ Route-map
In SURPASS hiD 6615, it is possible to return to the previous mode or move to Privi-
lege Exec Enable mode. On other hand, moving to previous mode is impossible in
Privilege Exec View mode and Privilege Exec Enable mode but it is possible to system
log out in the mode.
To return to the previous mode or Privilege Exec Enable Mode, use the following com-
mand.
DDJ:A-M-5212B0-01 45
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The same command is used for system log out in Privilege Exec View mode and Privilege
Exec Enable mode.
The following is to log out of the system in Privilege Exec View mode and Privilege
Exec Enable mode.
46 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After installing switch, SURPASS hiD 6615 is supposed to examine that each port is
rightly connected to network and management PC. And then, user connects to system
to configure and manage SURPASS hiD 6615.
This section provides instructions how to change password for system connection,
connect to system through telnet as the following order.
• System Login
• Changing Login Password
• Configuring password for Privilege Exec Enable Mode
• Configuring Auto-logout function
• Managing the user’s account
• Limiting the number of users
• Telnet Access
• Disconnecting Telnet Access
• System Reboot
• System Logout
After installing SURPASS hiD 6615, finally make sure that each port is correctly con-
nected to PC for network and management. And then, turn on the power and boot the
system as follow.
DDJ:A-M-5212B0-01 47
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Step 1 When you turn on the switch, booting will be automatically started and
login prompt will be displayed.
************************************************************
* *
* Boot Loader Version 4.61 *
* Siemens AG *
* *
************************************************************
Press 's' key to go to Boot Mode: 0
Load Address: 0x01000000
Image Size: 0x0097ac00
Start Address: 0x01000000
console=ttyS0,9600 root=/dev/ram rw
NOS version 3.02 #3022
CPU : Motorola [rev=1014]
Total Memory Size : 128 MB
Calibrating delay loop... 175.71 BogoMIPS
Switch init...
Step 2 When you enter login IP at the login prompt, password prompt will be dis-
played. And enter password to move into Privilege Exec View mode. By default setting,
login ID is configured as “admin” and it is possible to access without password.
Step 3 In Privilege Exec View Mode, you can check only the configuration for the
switch. To configure and manage the switch, you should enter into Privilege Exec En-
able Mode. The following is an example of entering into Privilege Exec Enable Mode.
SWITCH> enable
SWITCH#
48 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Administrator who manages and configures the switch can change system Login pass-
word. For thorough security, you would better to change the password whenever nec-
essary.
To change system password, use the following command on Global configuration mode.
You can make password from at least five characters up to eight characters. Please
avoid similar one with login ID.
In order to change the Login password of added user with reading right, use the follow-
ing command.
passwd user-name Global Changes the Login password of added user with reading right.
[ Sample Configuration 1 ]
SWITCH(config)# passwd
Changing password for admin
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password: networks
Re-enter new password: networks
Password changed.
SWITCH(config)#
The password you enter will not be seen in the screen, so please be careful. You
need to enter the password twice not to make mistake.
DDJ:A-M-5212B0-01 49
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can configure the password to enhance the security when you change the mode
from Privilege Exec View Mode to Privilege Exec Enable Mode. To configure the pass-
word for changing, use the following command.
The password that you had configured is displayed in configuration mode with the
command show running-config. For the security reasons, you can configure not to
display with show running-config command. The password is displayed with being en-
crypted so that the user cannot recognize the password. by show running-config
command.
However, even though you configure the encrypted password with service password-
encryption command, the other user can check the password disabling this command.
To enhance the security for the password, you can configure to check the encrypted
password without service password-encryption command. However, in order to user it,
the user should input the character string for encrypted password.
To configure the character string for encrypted password not to show the password,
use the following command.
passwd enable 8 encrypted- Global Configures the password with the character string
50 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If you want to check the character string for encrypted password, first configure the
password using passwd enable password command and then enable service pass-
word-encryption and then check the password with show running-config.
no passwd enable Global Deletes the configured password to enter into Privilege Exec
Enable
[ Sample Configuration 1 ]
DDJ:A-M-5212B0-01 51
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 2 ]
The following is to configure the password as networks using the character string for
the encrypted password and then log in.
You can check the character string for encrypted password like [ Sample Configura-
tion 1 ]. Configure the password with passwd enable password command and enable
service password-encryption and then check the password by show running-config
command.
For security reasons of SURPASS hiD 6615, if no command is entered within the con-
figured inactivity time, the user is automatically logged out of the system. Administrator
can configure the inactivity timer.
52 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
0-59 > time, the user is automatically logged out of the system.
The time unit for <1-35791> is minute and the time unit for < 0-59 > is second.
SWITCH(config)# exec-timeout 60
SWITCH(config)# show exec-timeout
Log-out time : 60 seconds
SWITCH(config)#
In SURPASS hiD 6615, the administrator can add the other user’s account. And it is
possible to designate the level from Level o to Level 5 to enhance the security for the
switch.
The following describes how to manage the user’s account such as adding user, con-
figuring the user’s right.
DDJ:A-M-5212B0-01 53
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, the administrator can add the other user’s account. When you
add the user’s account, it is possible to designate the user’s right at once. If the user’s
right is not designated, the right for Level 0 is basically configured. To add the user’s
account, user the following command.
user add name description Adds the user’s account having the right of Level 1.
user add name level Global Add the user’s account with designating user’s right.
<0-15> description
In order to show the added user’s account, use the following command.
In SURPASS hiD 6615, it is possible to configure the Level for the user’s right from 0 to
15. Level 15, as the highest level, has both Read-Write right. The administrator can
configure from Level 0 to Level 14. The administrator decides which Level user uses
which commands in which level. As the basic right from Level 0 to Level 14, it is possi-
ble to use exit and help command in Privilege Exec View Mode and it is not possible to
access to Privilege Exec Enable Mode. The following is to configure the user’s right ac-
cording to the user’s Level.
54 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
privilege bgp level <0-15> {commandㅣ Uses the specific command of BGP configu-
privilege bridge level <0-15> {command Uses the specific command of Bridge mode
privilege configure level <0-15> Uses the specific command of Global mode
privilege dhcp-pool level <0-15> Uses the specific command of DHCP con-
privilege enable level <0-15> {command Uses the specific command of Privilege
privilege interface level <0-15> {com- Uses the specific command of Interface
privilege ospf level <0-15> {commandㅣ G Uses the specific command of OSPF mode
privilege pim level <0-15> {commandㅣ O Uses the specific command of PIM mode in
privilege rip level <0-15> {commandㅣ A Uses the specific command of RIP mode in
{commandㅣall}
privilege rmon-event level <0-15> Uses the specific command of RMON mode
{commandㅣall}
privilege rule level <0-15> {commandㅣ Uses the specific command of Rule mode in
privilege view level <0-15> {commandㅣ Uses the specific command of Privilege
privilege vrrp level <0-15> {commandㅣ Uses the specific command of VRRP mode
DDJ:A-M-5212B0-01 55
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The commands that can be used in low Level can be also used in the higher Level.
For example, the command in Level 0 can be used in from Level 0 to Level 14.
The commands should be input same as the displayed commands by show list.
Therefore, it is not possible to input the commands in the bracket seperately.
It is not possible to configure clear ip bgp * ipv4 unicast in. You should configure like
clear ip bgp * ipv4 {unicastㅣmulticast} in.
The commands starting with the same character are applied by inputting only the starting
commands. For example, if you input show, all the commands starting with show are ap-
plied.
To delete the configuration for user’s right, use the following command.
<0-15> {commandㅣall}
<0-15> {commandㅣall}
no privilege configure level Global Deletes the configuration by user’s right for
<0-15> {commandㅣall}
<0-15> {commandㅣall}
56 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
<0-15> {commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
{commandㅣall}
{commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
<0-15> {commandㅣall}
To show the right for the Level configured by administrator, use the following command.
show privilege now Enable Checks the Level of the current access.
DDJ:A-M-5212B0-01 57
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 1 ]
The following is to add test0 having the right as Level10 and test1 having the right as
Level1 without password.
58 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
EXEC(ENABLE) 1 clock
EXEC(ENABLE) 1 configure terminal
EXEC(VIEW) 0 enable
EXEC(ENABLE) 0 show
4 entry(s) found.
SWITCH(config)#
In SURPASS hiD 6615, you can limit the number of users accessing to the switch. Here,
the user means who access to the switch through both console port and remote. In
case the switch is configured as RADIUS server, or TACACS+ server, the users ac-
cessing to the server are contained in the number of it.
To limit the number of users accessing to the switch, use the following command.
login connect <1-8> Global Limits the number of users accessing to the switch.
DDJ:A-M-5212B0-01 59
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
number
When you save configuration with telnet connection, you should wait for [OK] message. Or, all
new configurations will be deleted when telnet session is disconnected. Please wait for [OK] mes-
sage and disconnect it.
Administrator of SURPASS hiD 6615 can show users connected from remote place and
make some of them disconnected, as administrator wants. To view tty of users con-
nected from remote place, before disconnecting a user, use the following command.
To disconnect a user connected from remote place by using this information, use the
following command.
The following is to check the remote user and disabling remote user ,“ttyp1”,
60 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH(config)# where
admin at ttyS0 from console for 23 hours 50 minutes 17.27 seconds
User’s ID admin at ttyp0 from 172.16.30.2:3246 for 4 hours 31 minutes 46.65 seconds
hyun at ttyp1 from 172.16.119.201:2633 for 2 hours 31 minutes 51.61 seconds
SWITCH(config)# disconnect ttyp1
SWITCH(config)#
After downloading new system image from TFTP/FTP server, reboot the system. Input
the command, reload on Privilege Exec Enable Mode to reboot in other cases when
rebooting is needed during installing and managing switch through terminal program.
If you reboot system without saving new configuration, new configuration will be de-
leted. So, you have to save the configuration before rebooting. Not to make that mis-
take, SURPASS hiD 6615 is supposed to print the following message to ask if user
really wants to reboot and save configuration.
If you want to continue to reboot, press “y” key, if you want to save new configuration,
press “n” key.
SWITCH# reload
Warning : Changed configuration was not saved to flash memory.
Do you still want to reload the system?[y|N]
DDJ:A-M-5212B0-01 61
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 reboots the system according to user’s configuration. There are
two basises for system rebooting. They are CPU and Memory. CPU is rebooted in case
CPU Load or Interrupt Load continues for the configured time. Memory is automatically
rebooted in case Memory low occurs as the configured times.
count--memory-low -memory-low.
The configurable range for cpu-load-average is from 50 to 100 and for interrupt-load-average is
from 1 to 100
The default for Time threshold of memory low is 10 minutes and the default for count
of memory low is 5 times.
62 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 1 ]
SWITCH(bridge)#
[ Sample Configuration 2 ]
The following is to configure to reboot automatically in case Memory low occurs 3 times
in 10 minutes.
SWITCH(bridge)#
It is possible to log out of the system in Privilege Exec View mode or Privilege Exec
Enable mode. Therefore you should return to Privilege Exec Enable mode to log out if
you are configuring in the other mode. To log out of the system, use the following com-
mand.
DDJ:A-M-5212B0-01 63
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The switch uses only the data’s MAC address to determine where traffic needs to come
from and which ports should receive the data. Switches do not need IP addresses to
transmit packets. However, if you want to access to SURPASS hiD 6615 from remote
place with TCP/IP through SNMP or telnet, it requires IP address.
As the default setting, SURPASS hiD 6615 is configured with virtual interface 1 and all
of the ports are member port of virtual interface 1.
You can enable interface to communicate with switch interface on network and assign
IP address as the following in order.
• Enabling Interface
• Disabling Interface
• Assigning IP Address to Network Interface
• Configuring Static Route and Default Gateway
Before you assign IP address to network interface, you need to show that interface to
communicate is enabled. Unless the interface is enabled, you can communicate by as-
signing IP address. To check if interface is enabled, use the command, “show run-
ning-config”.
There are two ways to enable interface; on Global Configuration Mode and on Interface
Configuration Mode.
64 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You also can enable interface on Interface configuration mode. Before enabling inter-
face on Interface Configuration Mode, you should enter into the mode. To enter into In-
terface Configuration Mode of the interface you are about to enable interface, use the
following command.
fied interface.
You also can disable interface on Interface configuration mode. Before enabling inter-
face on Interface configuration mode, you should enter into the mode.
To enter into Interface configuration mode of the interface you are about to enable inter-
face, use the following command.
DDJ:A-M-5212B0-01 65
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
It is possible to configure Static route in SURPASS hiD 6615. Static route is a route that
user configures. Packets are transmitted to destination through Static route. Static route
includes destination address, neighbor router to receive packet, number of routes that
packets have to go through.
66 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
null} [1-255]
ip-address
DDJ:A-M-5212B0-01 67
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can configure the maximum number of pathes when there are various multipahes.
To configure the maximum number of pathes, use the following command.
[ Sample Configuration 1 ]
① On Configuration Mode
68 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 2 ]
SWITCH(config-if)#
[ Sample Configuration 3 ]
4.3. SSH
Network security is getting more important and more important according to using net-
work has been generalized between users. However, typical ftp and telnet service have
big weakness for security. SSH(Secure Shell) is security shell for login. Through SSH,
all data are encoded, traffic is compressed. So, transmit rate becomes faster, and tun-
nel for existing ftp and pop, which are not safe in security, is supported.
SURPASS hiD 6615 can be operated as server. You can configure the following things
in SURPASS hiD 6615 as SSH server.
DDJ:A-M-5212B0-01 69
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
It is possible to view clients who are connected to SSH server, SURPASS hiD 6615. To
view on-line clients, use the following command.
show ssh Enable/Global Shows clients who are connected to SSH server.
The following is an example of viewing clients who are connected to SSH server.
It is possible to disconnect clients who are connected on SSH server. To have clients
disconnected, use the following command.
ssh disconnect pid Global Disconnects clients who are connected to SSH server.
70 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
“pid” is SSH client’s number. It can be displayed by using the command, “show ssh”.
It is possible to view connection history of clients who are connected to SSH server af-
ter SURPASS hiD 6615 is operated as the server. To view connection history of client,
use the following command.
show ssh history Global Shows connection history of clients who are connected
When you use the command, “show ssh history” to view connection history, you can
view the history of only disconnected clients. To view connected clients at present,
use the command, “show ssh”.
SURPASS hiD 6615 can be used for the following ways as client of SSH server.
To log in to SSH server after configuring SURPASS hiD 6615 as SSH client, use the
following command.
DDJ:A-M-5212B0-01 71
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can input IP address or「ID@IP address or host domain name(ex : [email protected])」
at “destination”.
It is possible to copy file or open file in server through SSH after SURPASS hiD 6615 is
configured as client. To copy file through SSH, use the following command.
copy {scp l sftp} config Connects to file through SSH. “source” is source file
Global
{download l upload} config-file and “destination” is file to be copied.
SSH client can access to server through authentication key after configuring authenti-
cation key and informing it to server. It is safer to use authentication key than inputting
password every time for login, and it is also possible to connect to many SSH server
with using one authentication key. To configure authentication key in SURPASS hiD
6615, use the following command.
“rsa1” is authentication way supported in ssh1, and “rsa” and “dsa” are authentication
ways supported in ssh2.
To configure authentication key and connect to server with the authentication key, per-
form the following steps.
72 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Step 2 Copy file, in which authentication key is stored into SWITCH B, which is SSH
server. You should connect to SWITCH B to copy. So, you have to input password of ID,
“root”. In this time, IP address of SWITCH B is 172.16.209.10.
To enhance security and portability of network management, there are two ways of Au-
thentication based on MAC address and Port-Base Authentication which restrict clients
attempting to access to port.
In a word, Port-Base Authentication (802.1x) decides to give access to RADIUS server
having the information about user who tries to access.
DDJ:A-M-5212B0-01 73
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In this case, Supplicant and Authenticator are came under PAE(Port Authentication En-
tities). Authenticator operates only as a bridge and it has no information about user. Da-
tabase of the user’s information needed for authentication has RADIUS server.
PC
Switch RADIUS
1
[ Suppliant ] [ Authenticator ] [ Authentication
Server ]
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity Radius-Access-Request
EAP-Request Radius-Access-Challenge
EAP-Response Radius-Access-Request
EAP-Success Radius-Access-Accept
In order to enable 802.1x authentication on port of hiD 6615, you must be able to per-
form the following tasks.
• Configuring 802.1x
• Configuring 802.1x Re-authentication
• Initializing the authentication status
• Applying the default value
• Showing 802.1x configuration
There are two ways of Authentication based on MAC address and Port-Base Authenti-
cation which restrict clients attempting to access to the LAN.
74 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure 802.1x, the user should enable 802.1x demon first. In order to en-
able 802.1x demon, use the following command.
C : 30.1.1.1
J : 100.1.1.1
DDJ:A-M-5212B0-01 75
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
If you register in several server, the authentication server starts form RADIUS server
registered as first one, then requests the second RADIUS server in case there’s no re-
sponse. According to the order of registering the authentication request, the authentica-
tion request is tried and the server which responds to it becomes the Default server
from the point of response time.
After Default server is designated, all requests start from the RADIUS server. If there’s
no response from Default server again, the authentication request is tried for RADIUS
server designated as next one.
To configure IP address of RADIUS server and key value, use the following command.
dot1x radius-server host {ip-addressㅣ Register RADIUS server with key value
name} auth-port <0-65535> key key and UDP port of radius server.
Global
dot1x radius-server host {ip-addressㅣ Configures IP address of RADIUS
Authenticator and RADIUS server need extra data authenticating each other besides
they register each other’s IP address. The data is Key and should be the same value
for each other. For the Key value, every kinds of character can be used except the
space or special character.
{nameㅣip-address }
You can configure the priority for the radius server that have configured by user.
dot1x radius-server move {nameㅣip- Configures the priority for the configured
Global
address } priority priority server.
76 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You can give the access right for clients using MAC address or Port number. To select
the authentication mode, use the following command.
Before configuring 802.1x based on MAC address, you should deny all packets enter-
ing into the authentication port using the mac-filter default-policy deny port-number
command.
After configuring 802.1x authentication mode, you should select the authentication port.
In SURPASS hiD 6615, you can permit the users requesting the access regardless of
the authentication from RADIUS server. For example, even though a client is authenti-
cated from the server, it is possible to configure not to be authenticated from the server.
In order to manage the approval for the designated port, use the following command.
DDJ:A-M-5212B0-01 77
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Default is “auto”.
In SURPASS hiD 6615, it is possible to specify how long the device waits for a client to
send back an response/identity packet after the device has sent an request/identity
packet. If the Client does not send back an response/identity packet during this time,
the device retransmits the request/identity packet.
To configure the number of seconds that the switch waits for a response to an re-
quest/identity packet, use the following command.
dot1x timeout tx-period <1-65535> port- Sets reattempt interval for requesting re-
Global
number quest/identity packet.
To disable the interval for requesting identity, use the following command.
no dot1x timeout tx-period port-number Global Disables the interval for requesting identity
After 802.1x authentication being configured as explained above, when the user tries to
connect with the port, the process of authentication is progressed among user’s PC
and the equipment as Authenticator and RADIUS server. It is possible to configure how
many times the device which will be authenticator requests for authentication to RA-
DIUS server.
78 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure times of authentication request in SURPASS hiD 6615, please use
the command in Global mode.
In SURPASS hiD 6615, basically you can configure the authentication request three
times.
In SURPASS hiD 6615, it is possible to set the time for the retransmission of packets to
check RADIUS server. If there’s a response from other packets, the switch waits for a
response from RADIUS server during the configured time before resending the request.
You should consider the distance from the server for configuring the interval of re-
questing the authentication to Radius server. If you configure the interval too short,
the authentication couldn’t be realized. If it happens, you’d better to reconfigure the in-
terval longer.
DDJ:A-M-5212B0-01 79
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In hiD 6615 S331, it is possible to update the authentication status on the port periodi-
cally. To enable re-authentication on the port, perform the below order.
RAIDIUS server contains the database about the user who has access right. The data-
base is real-time upgraded so it is possible for user to lose the access right by updated
database even though he is once authenticated. In this case, even though the user is
accessible to network, he should be authenticated so that the changed database is ap-
plied to. Besides, because of various reasons managing RADIUS server and 802.1x
authentication port, the user is supposed to be re-authenticated every regular time. The
administer of SURPASS hiD 6615 can configure a term of re-authentication
80 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When the authenticator sends Request/Identity packet for re-authentication and no re-
sponse is received from the suppliant for the number of seconds, the authenticator re-
transmits the request to the suppliant. In hiD 6615, you can set the number of seconds
that the authenticator should wait for a response to request/identity packet from the
suppliant before retransmitting the request.
dot1x timeout quiet-period <1-65535> port- Sets reattempt interval for requesting re-
Besides, because of various reasons managing RADIUS server and 802.1x authentica-
tion port, the user is supposed to be re-authenticated every regular time.
DDJ:A-M-5212B0-01 81
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The user can initialize all the configuration on the port. Once the port is initialized, the
supplicants accessing to the port should be re-authenticated.
dot1x initialize port-number Global Initializes the authentication status on the port.
To apply the default value to the system, use the following command.
/Global
82 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
It is possible for user to make reset state by showing and deleting the statistics of
802.1x user authentication. To show the statistics about the process of 802.1x user au-
thentication, use the following command.
show dot1x statistics port-number Global Shows the statistics of 802.1x user authentication
on the port.
To make reset state by deleting the statistics of 802.1x user authentication, use the fol-
lowing command.
dot1x clear statistic port-number Global Makes Reset state by deleting the statistics of
The following is to show the configuration after configuring pot number 4 as the authen-
tication port and registering IP address of authentication port and information of RA-
DIUS server.
DDJ:A-M-5212B0-01 83
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 2]
[Sample Configuration 3]
The following is an example of showing the configuration after configuring the authenti-
cation based on MAC address.
SWTICH(config)#
84 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 is enhanced security of client authentication and user is able to
configure authorization method in diverse ways.
Usually, ID/password registered in switch is used but if you use RADIUS(Remote Au-
thentication Dial-In User Service), which is client authentication protocol, and TA-
CACS+(Terminal Access Controller Access Control System+), only clients recorded in
each server can connect to the system. With TACACS+ configured, sends client infor-
mation for authorization.
Sends Result
With TACACS+ configured,
sends client information for
authorization.
TACACS
Server
You need to configure the followings for system authentication in SURPASS hiD 6615.
DDJ:A-M-5212B0-01 85
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To enable RACIUS or TACACS+, add user with reading right named「user」by using
the command, “user add”. Or, all users connecting through authentication protocol
are supposed to receive a right as 「root」. Refer to 「4.1.5 Managing the user’s
account」for the instruction to add user with reading right.
You can authorize clients attempting to access to SURPASS hiD 6615 by using regis-
tered ID/password, RADIUS and TACACS+. It is possible to take all of three and to se-
lect one of them.
86 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After configuring authorization in diverse ways, you can configure priority of authoriza-
tion method which method will be the first or second or the last.
By default, priority of SURPASS hiD 6615 authentication is set to “host → radius → ta-
cacs” in order.
User is able to check configured priority of authorization method. To do it, use the fol-
lowing command.
DDJ:A-M-5212B0-01 87
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
After configuring RADIUS for client authentication, you need to configure RADIUS
server to be used in switch. To configure RADIUS server, use the following command.
It is possible to configure up 5 RADIUS Server in hiD 6615. In the case of multiple RA-
DIUS Servers, you can give the priority for the servers.
The server having higher priority is supposed to be used first. The smaller number the
higher priority.
login radius server move ip-address Global Gives the priority for configured RADIUS
priority server.
88 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When SURPASS hiD 6615 cannot get any response from RADIUS server, it is sup-
posed to retransmit request. By default, frequency of retransmit is three times, but user
can configure the number of the times. To configure frequency of retransmit, use the
following command.
login radius retransmit count Global Configures the number of times to retransmit in-
In SURPASS hiD 6615, the number of seconds that the switch waits for a response
from RADIUS server is configured. User can configure it for convenience. To configure
timeout of response, use the following command.
login radius timeout time Global Configures the number of seconds that the switch waits
DDJ:A-M-5212B0-01 89
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
After configuring TACACS+ for client authentication, you need to configure TACACS
server to be used in switch. To configure TACACS server, use the following command.
login tacacs server ip-address key Global Registers IP address and key value of
And then, you should register interface of TACACS server connected to user’s switch.
Use the following command.
You can register maximum five TACACS servers in SURPASS hiD 6615.
To register port of TACACS server connected to user’s switch, use the following com-
mand.
login tacacs socket-port port-number Global Registers port of TACACS server connected
to user’s switch.
90 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
It is possible to configure up 5 TACAS Server in hiD 6615. In the case of multiple TA-
CAS Servers, you can give the priority for the servers. The server having higher priority
is supposed to be used first. The smaller number the higher priority.
login tacacs server move ip- Global Gives the priority for configured TACAS server.
address priority
When you configure TACACS+ for authentication, you need to select authorization type
of TACACS+. To select authorization type of TACACS+, use the following command.
pap stands for Password Authentication Protocol and chap stands for Challenge Hand-
shake Authentication Protocol.
In SURPASS hiD 6615, the number of seconds that the switch waits for a response
from TACACS server is configured. User can configure it for convenience. To configure
timeout of response, use the following command.
login tacacs timeout time Global Configures the number of seconds that the switch
no login tacas timeout time waits for a response from TACACS server.
DDJ:A-M-5212B0-01 91
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
login tacacs priority-level {minㅣuserㅣ Global Configures priority of client’s right to use
When user configures RADIUS or TACACS+ for system authentication, the system re-
cords specific services user has taken. Through this function, it is possible to apply bill-
ing policy to specific service. To enable this function, use the following command.
stopㅣboth}
“start” sets the standard on user’s login and “stop” sets the standard on user’s logout.
“both” takes both of them and “none” releases applied billing policy.
92 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Then, show the configuration. And The following is an example of configuring frequency
of retransmit and timeout of response after registering RADIUS server.
------------------------------------
[RADIUS]
<Radius Servers & Key>
100.1.1.1 1
Radius Retries : 5
Radius Timeout : 10
Radius Interface : default
------------------------------------
[TACACS]
<Tacacs Servers & Key>
Tacacs Timeout : 3
Tacacs Socket Port : 49
Tacacs Interface : default
Tacacs PPP Id : 1
Tacacs Authen Type : ASCII
Tacacs Priority Level : MIN
SWITCH(config)#
DDJ:A-M-5212B0-01 93
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
------------------------------------
[RADIUS]
<Radius Servers & Key>
Radius Retries : 3
Radius Timeout : 3
Radius Interface : default
------------------------------------
[TACACS]
<Tacacs Servers & Key>
200.1.1.1 1
Tacacs Timeout : 10
Tacacs Socket Port : 1
Tacacs Interface : default
Tacacs PPP Id : 1
Tacacs Authen Type : PAP
Tacacs Priority Level : MAX(ROOT)
SWITCH(config)#
94 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
It is possible to configure default environment of port such as port state, speed. To con-
figure port, you need to enter into Bridge configuration mode by using bridge command
on configuration mode.
When you are entered into Bridge configuration mode, system prompt will be changed
to SWITCH(bridge)# from SWITCH(config)#.
SWITCH(config)# bridge
SWITCH(bridge)#
VLAN Default
DDJ:A-M-5212B0-01 95
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To view the configuration of user’s switch port, use the following command.
When you use the command, show port command, if you input letter at port-number,
the message, “% Invalid port: port'” will be displayed, and if you input wrong number,
the message, “% Invalid range: 100 [1-32]” will be displayed.
On CLI command mode, you can use “,” and “-” at port-number to choose several ports.
You can configure the below functions about port basic configuration.
Because hiD6615 S223 switch ports have two types (RJ45 and SFP), user should se-
lect port type what to use.
96 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To view the configuration of switch port type, use the following command.
The following is an example of deactivating port 1 Ethernet port and showing it.
DDJ:A-M-5212B0-01 97
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can configure auto-negotiation for a port, automatically to match the transmission
speed and the duplex mode of the attached device.
To determine if the speed and duplex mode are set to auto-negotiate, use the following
command in the bridge configuration mode at configuration level.
The following is an example of deleting auto-negotiate of port 1 and 2 and showing it.
98 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
It is possible to configure transmit rate of each port. To configure transmit rate of port,
use the following command.
port speed port-number {10ㅣ100ㅣ Bridge Configure transmit rate of port as 10, 100, or
1000} 1000Mbps.
The following is an example of configuring transmit rate of port 1 as 10Mbps and show-
ing it.
To configure duplex mode of 10/100BaseTx Ethernet port, use the following command.
DDJ:A-M-5212B0-01 99
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
port duplex port-number {full | half} Bridge Configures duplex mode of port.
The following is an example of configuring duplex mode of port 2 as half mode and
showing it.
Before connecting the link, the port of hiD 6615 is basically configured as 「Half du-
plex mode」.
Ethernet ports on the switches use flow control to restrain the transmission of packets
to the port for a period of time. Typically, if the receive buffer becomes full, the port
transmits a "pause" packet that tells remote ports to delay sending more packets for a
specified period of time. In addition, the Ethernet ports can receive and act upon
"pause" packets from other devices. To configure flow control on the Ethernet port, use
the following command.
100 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
For user’s reference, you can make description for each port.
Bridge/Interface more.
DDJ:A-M-5212B0-01 101
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To display traffic average of each port or interface MIB, RMON MIB data defined in
SNMP MIB, use the following commands.
102 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
DDJ:A-M-5212B0-01 103
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The user can show the information of the port where module is installed. To display the
module information, use the following command.
To clear all recorded statistics of port and initiate, use the following command. It is pos-
sible to initiate statistics of port and select specific port.
clear port statistics { port-number ㅣall} Global Initializes port statistics. It is possible to se-
104 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Port mirroring is the function of monitoring a designated port. Here, one port to monitor
is called “monitor port” and a port to be monitored is called “mirrored port”. Traffics
transmitted from mirrored port are copied and sent to monitor port so that user can
monitor network traffic.
The following is a network structure to analyze the traffic by configuring port mirroring It
analyzes traffic on the switch and network status by configuring Mirrored port and Moni-
tor port and connecting the computer, that the watch program is installed, to the port
configured as Monitor port.
MONITORING
Mornitor port
Mirrored Mirrored
Port 1 Port 3
To configure port Mirroring in hiD 6615, designate Mirrored port and Monitor port and
enable port mirroring function. Monitor port should be connected to PC that Watch pro-
gram is installed. You can designate only one Monitor port but many Mirrored ports for
one switch.
You should assign monitor port and mirrored port, and then you can configure Port-
mirroring. To assign monitor port and mirrored port, use the following command.
DDJ:A-M-5212B0-01 105
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To configure over 2 Mirrored ports, you can input the port-number using 「,」or「-」.
If CPU is monitoring the traffic on Mirrored port, it can cause CPU overloads.
To use port mirroring function, you should enable port mirroring first. To enable port mir-
roring, use the following command.
Also, you have to disable port mirroring to release it. To do it, use the following com-
mand.
You’d better to delete Mirrored port or disable Mirroring port after data analyzing. Us-
ing Mirroring function too long time can cause CPU overload so that packet process
would be delayed.
106 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Step 1 Connect PC, that Watch program is installed for, to the port number 1 as Moni-
tor port.
Step 2 Configure port number 1 as Monitor port and port number 2,3,4,5 as Mirroring
ports.
SWITCH(bridge)#
DDJ:A-M-5212B0-01 107
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Step 1 Configure 2,3,4,5 port as Mirroring port and monitor them by CPU.
SWITCH(bridge)#
108 DDJ:AM-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
6. System Environment
This chapter explains how to configure host name and time of system and how to man-
age it.
• Environment Configuration
• Configuration Management
• System Check
• Host name
• Date and Time
• Time-zone
• NTP
• SNTP
• Output Condition of Terminal Screen
• DNS Server
• Log-in Banner
• Fan Operation
• Demon Operation
hostname name Global Configures host name of switch with new name user assigns.
DDJ:A-M-5212B0-01 109
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The variable, “name” which follows command is the new name of switch user assigns.
Default is “SWITCH”.
To configure or change time and date in switch, use the command, “clock” on Privilege
Exec Enable Mode.
clock datetime Enable Configures or change time and date in user’s switch.
The variable, “datetime” you need to enter after the command is “Day Month Year
Hour:Minute”.
The following is an example of configuring as Dec., 13th , PM 04:14 in 2002.
6.1.3. Time-zone
You can configure Time-zone to the SURPASS hiD 6615 with the following command.
Time-zone is classified GMT, UCT, UTC.
110 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If you want to know what kind of Time-zone can you configure, Use the “show time-
zone” command. Time-zone is predefined as the UTC(Universal Coordinated Time) at
the factory configuration
The command, “show time-zone” only displays kinds of Time-zone. To show configura-
tion about Time-zone, use the command, “show clock”.
The following table shows the kinds of Time-zone, which can configure to the Switch
and a main country or area, belong to the Time-zone.
Hawaii, Hono-
GMT-10 GMT-1 Azores GMT+8 Hong Kong, Peking
lulu
Switch.
DDJ:A-M-5212B0-01 111
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
show clock Enable/Global Shows user’s configuration about date/time and Time-zone.
The following is an example of configuring Time-zone as Seoul and viewing the con-
figuration.
6.1.4. NTP
NTP(Network Time Protocol) can be used to configure user’s switches to 1/1000 sec-
ond to guarantee the exact time on networks. The Switch and NTP server constantly
transmit the massage each other to converge the correct time. It is very important to
configure exact time to the Switch so that switch operates properly. The details about
NTP will be given at STD and RFC 1119. To configure the switch in NTP, use the follow-
ing commands.
You do not need ntp start command. After configuration of above command, NTP
function starts automatically.
We can use the public NTP server and private NTP server both and enter the Domain
name or IP address of NTP server. The「time.nuri.net」is used in Korea, IP address is
「203.255.112.96」.
112 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH(config)# no ntp
SWITCH(config)# show ntp
ntp stoped
SWITCH(config)#
6.1.5. SNTP
NTP (Network Time Protocol) and SNTP (Simple Network Time Protocol) are the same
TCP/IP protocol in that they use the same UDP time packet from the Ethernet Time
Server message to compute accurate time. The basic difference in the two protocols is
the algorithms being used by the client in the client/server relationship.
The NTP algorithm is much more complicated than the SNTP algorithm. NTP normally
uses multiple time server to verify the time and then controls the rate of adjustment or
slew rate of the PC which provides a very high degree of accuracy. The algorithm de-
termines if the values are accurate by identifying time server that don't agree with other
time servers. It then speeds up or slows down the PC's drift rate so that the PC's time
is always correct and there won't be any subsequent time jumps after the initial correc-
tion. Unlike NTP, SNTP usually uses just one Ethernet Time Server to calculate the
time and then it "jumps" the system time to the calculated time. It can, however, have
back-up Ethernet Time Servers in case one is not available.
DDJ:A-M-5212B0-01 113
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You do not need sntp start command. After configuration of above command, SNTP
function starts automatically.
You can configure up to 3 servers so that you use second and third servers as backup
use in case the first server is down.
To configure the number of displayed lines on terminal screen, use the following com-
mand on Privilege Exec Enable Mode.
114 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To disable the configuration for terminal length, use the following command.
no service terminal length View/Enable Disables the configuration for the number of dis-
After registering DNS server with using the above command, DNS server is connected
to network. Then, you can use hostname or URL instead of IP address with commands
such as telnet, ftp, tftp, and ping.
To support this function, SURPASS hiD 6615 and DNS server should be connected to
network.
DDJ:A-M-5212B0-01 115
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The following is an example of registering 168.126.63.1 as DNS server and checking it.
The above example is just for your reference. In real configuration, you must input the
DNS server you are going to use.
The following is an example of taking ping test with domain name after registering DNS
server.
116 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In addition, when you register specific domain name, you can use hostname in the do-
main instead of IP address to use the commands such as telnet, ftp, tftp, and ping.
SURPASS
Internet
Domain name - A
In the above example, after domain name “A” is registered in hiD 6615, it is possible to
use hostname instead of IP address to use the commands such as telnet, ftp, tftp, and
ping.
To support this function, SURPASS hiD 6615 and DNS server should be connected to
network.
The following is an example of inputting hostname instead of IP address for ping test to
host “B” after registering domain “A”.
DDJ:A-M-5212B0-01 117
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In the above example, “A” and “B” are just example. In real configuration, you should
input actual domain name and hostname instead of A and B.
To delete registered DNS server and domain name, use the following command.
It is possible to write message in system login page. Through the message, administra-
tor can leave a message to another user. To write a message in system login page, use
the following command.
118 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To delete login banner in system login page, use the following command.
no banner login-fail Deletes displayed message when fail to login the system.
[ Sample Configuration 1 ]
When you use the above command, the following message will be displayed.
SWITCH(config)# banner
Save & Exit : CTRL-D When you press Ctrl + D key, you can exit
to system prompt.
Write message you need. When you finish the message, press Ctrl+D key.
SWITCH(config)# banner
When you press Ctrl+D key after writ-
Save & Exit : CTRL-D
ing a message, you can exit to system
do not change the configuration
prompt.
SWITCH(config)#
SWITCH# exit
DDJ:A-M-5212B0-01 119
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In SURPASS hid 6615, it is possible to configure FAN operation. To configure FAN op-
eration, use the following command.
On other hand, if Fan is on, it is possible to configure to start and stop Fan operation.
on specific temperature. To configure to operate Fan by temperature, use the following
command.
threshold fan start-temperature Configures the starting and stopping temperature for
Global
stop-temperature fan operation.
It is possible to configure up to 100℃ for starting temperature and -30℃ for stopping
temperature.
To check Fan status and the temperature for Fan operation, use the following com-
mand.
show status fan View/Enabl Check the Fan status and the temperature for the
The following is to configure the starting temperature as 25℃ and stopping tempera-
ture as 5℃ for Fan operation.
120 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Fan A : None
Fan B : None
Fan A-1 : None
Fan A-2 : None
Fan A-3 : None
Fan B-1 : None
Fan B-2 : None
Fan B-3 : None
Fan operation : ON
Fan threshold : Run 25 C / Stop 5 C
SWITCH(config)#
The user can stop the demon operation unnessarily occupying CPU. To stop certain
demon operation, use the following command.
You can display PID of demon with the show process command.
DDJ:A-M-5212B0-01 121
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
User can check if user’s configurations are correct and save them in system. This sec-
tion contains the following functions.
User can view switch configuration. To do it, use the following command.
bridgeㅣdnsㅣfullㅣhostnameㅣloginㅣpmㅣ
qosㅣrmon-alarmㅣrmon-eventㅣrmon-
historyㅣruleㅣsnmpㅣsyslogㅣtime-zoneㅣ
All Shows only the configuration that
time_out }
corresponds to each option.
show running-config interface interface-
name
| rip | vrrp}
122 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After you download a new system image to SURPASS hiD 6615 from TFTP/FTP server,
if the configuration files are changed, you must save the changed file in the flash mem-
ory. Unless you saved the changed file, the configuration file will delete incase of re-
booting. To save the configuration files in the flash memory, use the following command.
When you store configurations with using this command, please wait for [OK] mes-
sage without any key pressed.
6.2.3. Auto-Saving
In hiD 6615, it is possible to save the configuration automatically. To configure the con-
figuration periodically, use the following command.
DDJ:A-M-5212B0-01 123
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
6.2.4. Reloading
User can delete an individual configuration one by one, and also can reload the switch
with the default setting. To reload the switch, use the following command on configura-
tion mode.
It is possible to save user’s configurations and to use for the data recovery or system
operating. To back up user’s configuration, use the following commands.
To use back up file, use the following command. Variable “name” is a kind of file name
that can be configured by user.
copy file-name1 file- name2 Copies backup file with another name.
124 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To use back up file using ftp or tftp server, use the following commands.
copy {ftp|tftp} config upload Uploads a file to ftp or fttp server with a name con-
copy {ftp|tftp} config Downloads a file from ftp or fttp server with a name
config} Enable
copy {ftp|tftp} os upload {os1| Uploads a file to ftp or fttp server with a name of os1
os2} or os2.
copy {ftp|tftp} os download Downloads a file from ftp or fttp server with a name
To access to FTP to back up the configuration or use the backup file, you should know
FTP user ID and the password.
To back up the configuration or use the file through FTP, you can check the transmis-
sion rate of file because hash on function is automatically
copy file-name startup-config Enable Opens backup file named name to use as startup
configuration.
DDJ:A-M-5212B0-01 125
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The following is an example of copying the current configuration with a name and
showing it.
When there is any problem in switch, user must find what the problem is and its solu-
tion. Also neither he nor she should always check switch to prevent trouble. Therefore
user should not only be aware of switch status but also check if configurations are cor-
rectly changed.
126 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To check if user’s switch is correctly connected to network, use the command, ping. In
IP network, the command, ping transmits echo message to ICMP(Internet Control Mes-
sage Protocol). ICMP is internet protocol that notifies fault situation and provides infor-
mation on the location where IP packet is received. When ICMP echo message is re-
ceived at the location, its replying message is returned to the place where it came from.
To operate Ping test to check network status, use the following commands in privileged
mode.
The following is the basic information to operate Ping test. Input the following configura-
tions after operating Ping test in Privilege Exec Enable Mode.
DDJ:A-M-5212B0-01 127
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
When a number of IP addresses are configured in user’s switch, sometimes you need
to check the connection status between the specific IP address and network status.
To take Sping test, use the same process as Ping test and then input the followings af-
ter ‘ Extended commands’. It is possible to check the connection between specific IP
address and network using the following command. The following is the information to
use Sping test.
Source address or inter- Designates the address where the relative device should respond in
Set DF bit in IP header? not. Default is no. If the user choose ‘yes’, when the packets pass
[no] through the segment compromised with the smaller data unit, it prevents
Use “sping” in the case there are a number of IP addresses in user’s switch. It is not
necessary for the switch having only one IP address.
[ Sample configuration 1 ]
The following is an example of Ping test 5 times to check network status with IP ad-
dress 172.16.1.254.
SWITCH# ping
Protocol [ip]: ip
Target IP address: 172.16.1.254
Repeat count [5]: 5
Datagram size [100]: 100
Timeout in seconds [2]: 2
Extended commands [n]: n
PING 172.16.1.254 (172.16.1.254) 100(128) bytes of data.
Warning: time of day goes back (-394us), taking countermeasures.
108 bytes from 172.16.1.254: icmp_seq=1 ttl=255 time=0.058 ms
108 bytes from 172.16.1.254: icmp_seq=2 ttl=255 time=0.400 ms
108 bytes from 172.16.1.254: icmp_seq=3 ttl=255 time=0.403 ms
108 bytes from 172.16.1.254: icmp_seq=4 ttl=255 time=1.63 ms
108 bytes from 172.16.1.254: icmp_seq=5 ttl=255 time=0.414 ms
128 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample configuration 2 ]
In case that user’s switch is configured with several IP addresses, sometimes you need
to check network connection of between specific IP address and partner.
SWITCH# ping
Protocol [ip]:
Target IP address: 172.16.1.254
Repeat count [5]: 5
Datagram size [100]:100
Timeout in seconds [2]:2
Extended commands [n]: y Input to select Extended com-
Source address or interface: 172.16.157.100 mands to operate “sping”.
Type of service [0]:0
If you implement PING test to check the status of network connection, icmp request ar-
rives at the final destination as the closest route according to the routing theory.
DDJ:A-M-5212B0-01 129
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Reply B
Request
E
PC
In the above figure, if you implement PING test from PC to C, it goes through the route
of 「A→B→C」This is the general case. But, in SURPASS hiD 6615, it enables to im-
plement PING test from PC as the route of 「A→E→D→C」.
Reply Request
B
PC
To implement PING test as the route which the manager designated, use the following
steps.
130 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Step 2 Implements the PING test from PC as the designate route with the 「ping –k
ip-address ip-address…」command.
In hiD 6615, the user can check the tracing route while the packet goes to the destina-
tion. To show the tracing route, traceroute command displays the returning time for
every passing route after sending test packet. If there’s no response until the returning
time, (*) is displayed.
To trace packet route, use the following command in Privilege Exec Enable.
Source address or inter- Designates the address where the relative device should respond in
not.Default is no. If the user choose ‘yes’, when the packets pass
Set DF bit in IP header?
through the segment compromised with the smaller data unit, it pre-
[no]
vents the packet to be Fragment. Therefore there could be error mes-
sage.
DDJ:A-M-5212B0-01 131
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The following is an example of checking if there is any accessed user from remote
place.
SWITCH# where
admin at ttyS0 from console for 4 hours 6 minutes 21.57 seconds
SWITCH#
To display MAC table recorded in specific port, use the following command.
number] Bridge
132 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
There are more than about a thousand MAC addresses in MAC table. And it is difficult
to find information you need at one sight. So, The system shows certain amount of ad-
dresses displaying 「-more-」on standby status. Press any key to search more. After
you find the information, you can go back to the system prompt without displaying the
other table by pressing “q”.
SURPASS hiD 6615 records MAC Table to prevent Broadcast packets from transmitting.
And unnecessary MAC address that does not response during specified time is deleted
from the MAC table automatically. The specified time is called Ageing time.
User can view time how long user’s switch has been running after booting.
DDJ:A-M-5212B0-01 133
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To view system information such as product model, memory size, hardware specifica-
tion, and OS version, use the following command.
It is possible to check average of CPU utilization. To do it, use the following command.
It is possible to check CPU loading process classified by each process. Through this
function, user can see which demon possesses the most of CPU, if there is unneces-
sary demon, and operating process of troubled demon. This information is useful data
to solve problem.
134 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
{bgp | dhcp | imi | lib| nsm | ospf |pim | rip } /Bridge function.
User can view current system image version of SURPASS hiD 6615. To view the cur-
rent system image version, use the following command.
User can show the size of the current system image file of SURPASS hiD 6615. To do
this, use the following command.
It is possible to view utilization of flash memory. To do it, use the following command.
In SURPASS hiD 6615, it is possible to provide Dual-OS according to Flash Memory in-
stalled in the switch.
DDJ:A-M-5212B0-01 135
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
It is possible to check Flash Memory with show system command.The following is the
information of providing Dual-OS.
SWITCH#
The following is to show NOS installed in the switch that supports Dual-OS.
Flash Information(Bytes)
136 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When there are two kinds of system images installed, user can configure one of two as
Default OS as user wants in SURPASS hiD 6615.
User can configure default OS used in case of booting or rebooting the system. To do
this, use the follow command.
To show configured Default OS, view the system image installed in flash memory by
using the command, show flash. The following is an example of configuring os2 as De-
fault OS of SURPASS hiD 6615 by changing from os1.
Flash Information(Bytes)
Area total used free
--------------------------------------------------------------
OS1(default)(running) 16777216 9922240 6854976 3.02 #3021
OS2 16777216 9613344 7163872 2.09-01 #3006
CONFIG 4194304 684032 3510272
--------------------------------------------------------------
Total 37748736 20219616 17529120
SWITCH# default-os os2
SWITCH# show flash
Flash Information(Bytes)
Area total used free
--------------------------------------------------------------
OS1(default)(running) 16777216 9922240 6854976 3.02 #3021
OS2 16777216 9613344 7163872 2.09-01 #3006
CONFIG 4194304 684032 3510272
--------------------------------------------------------------
Total 37748736 20219616 17529120
DDJ:A-M-5212B0-01 137
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can check temperature of switch, power status, and fan status. To do it, use the fol-
lowing commands.
In SURPASS hiD 6615, you can check the configuration and configuration file, log in-
formation, register, memory, debugging information using the following commands. By
checking Tech-supporting, check the system errors and use it for solving the problem.
sole
View/Enable
tech-support {all | crash-info} re- Save the contents of Tech-support in the
If you choose all among options, you can check all of Tech-support information and if
you choose crash-info, you can check [SYSTEM], [SYSINFO], [VERSION], [TAG],
[SHOW RUNNING-CONFIG], [VOLATILE SYSLOG], [NON-VOLATILE SYSLOG],
[SWITCHING ASIC INFO], [UPTIME INFO], [FLASHINFO].
138 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
7. Network Management
This chapter provides guidelines to manage SURPASS hiD 6615 and network in which
SURPASS hiD 6615 is. It contains the following sections.
• SNMP
• RMON
• Syslog
• QoS and Packet Filtering
• MAC Filtering
• Configuring Max Host
• Managing MAC Table
• Configuring ARP Table
• ARP-Alias
• Proxy-ARP
• Configuring Gratuitous ARP
• ICMP Message Control
• IP TCP flag control
• Routing Table
7.1. SNMP
The SNMP agent sends trap to administrator for some cases. Trap is a warning mes-
sage to alert network status to SNMP administrator. Trap informs improper user au-
thentication, rebooting, connection status(activate or deactivate), closing of TCP con-
nection, disconnected to neighbor switch.
DDJ:A-M-5212B0-01 139
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Internet
Managed Device
Requested information
(Each SNMP Agent included) transferred to SNMP
manager
Request information
to SNMP Agent
SNMP Manager
NMS(Network Management
System) used
SURPASS hiD 6615 has supported SNMP v1, v2c, v3. SURPASS hiD 6615 enhances
accessing management of SNMP agent more and limit the range of OID opened to
agents. The following is how to configure SNMP in SURPASS hiD 6615.
Only authorized person can access to the SNMP agent installed in the switch by con-
140 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To configure the community in SNMP v1, use the following command on Global con-
figuration mode.
snmp community {ro | rw} community Global Configures community to allow authorized
Community means password as we usually know. You can configure the community
by entering password you want at community. And it is possible to give access right
only to read or both to read and to write according to configuring password.
The abbreviations following, ro stands for read-only and rw stands for read/write.
They are commands to distinguish access right.
Enable/
show snmp community Checks Community.
Global
[ Sample configuration 1]
The followings are two examples of giving access right both to read and write by con-
figuring password as public, and giving access right only to read by configuring pass-
word as private.
DDJ:A-M-5212B0-01 141
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Community List
Community Source OID
--------------------------------------------
community rw public
community ro private
SWITCH(config)#
You can configure accessed person and location of the SNMP agent so that these de-
scriptions can be saved at SNMP configuration file. To configure accessed person and
location of the SNMP agent, use the following commands.
To delete accessed person and location of the SNMP agent, use the following com-
mand.
To check accessed person and location of the SNMP agent, use the following com-
mand.
142 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[Sample Configuration 2]
The following is to configure the information about system administrator of SNMP agent
as dasan<02.3484.6500> and the location of the switch where SNMP agent configured
as Seoul,Korea.
contact dasan<02.3484.6500>
location Seoul,Korea
SWITCH(config)#
SNMP v2 authorizes the host to access the agent, according to the identity of the host
and Community name. The command, com2sec, specifies the mapping from the iden-
tity of the host and Community name to Security name. To create Security name, use
the following command.
snmp com2sec security-name Specifies the mapping from the identity of the
Global
{ip-addressㅣip-address/m} community host and Community name to Security name.
DDJ:A-M-5212B0-01 143
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 3]
com2sec list
---------------------------------------
com2sec test 100.1.1.1 public
SWITCH(config)#
User can make SNMP Manager that can access SNMP Agent and its Community be-
longs to a group. To create SNMP group, use the following command.
User can choose the security type from {v1ㅣv2cㅣv3}. security-name takes the one
created from the command, com2sec. However, security-name is a part of the basic
SNMP protocol in SNMP v3, so user also can specify this without com3sec configura-
tion.
The SNMP v2c and v3 can block the user with only access to limited OID. OID which
limits the open range is “view”.
144 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
View A
View B
snmp view view included oid [mask] Configures OID which contains Sub-tree as “view”
snmp view view excluded oid Global Configure OID which doesn’t contain Sub-tree is
DDJ:A-M-5212B0-01 145
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 4]
View list
-------------------------------------------
view TEST included 410
SWITCH(config)#
In SURPASS hiD 6615, the manager can configure for the particular Group to look at
limited OID(=View).
To permit the particular group to access to limited OID, use the following command.
snmp access group-name {v1ㅣv2c} read- Configures View to permit for appropriate
146 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To release the configuration for accessing to limited OID, use the following command.
To check the group which gets the permission for limited OID, use the following com-
mand.
In SNMP v3, register the agent as user. If you register User, you should configure it
with the authentication key. To configure SNMP v3, user the following command.
DDJ:A-M-5212B0-01 147
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SNMP trap is alert message that SNMP agent notifies SNMP manager about certain
problems. If you configure SNMP trap, switch transmits pertinent information to network
management program. In this case, trap message receivers are called trap-hosts.
To configure trap-host who receives trap message, use the following command. In this
case, you should input IP address of trap-host who is supposed to receive trap. For ex-
ample, if SNMP manager is trap-host, you should input IP address of SNMP manager.
In hiD 6615, it is possible to configure trap-host of SNMP v1 and SNMP v2c and SNMP
v3 inform-trap-host.
priate IP address.
148 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
show snmp trap Enable/Global Checks configured SNMP trap-host and SNMP trap.
When you configure more than one trap-host, you can configure it by inputting IP ad-
dress one by one or inputting the IP addresses at once.
[ Sample Configuration 5 ]
DDJ:A-M-5212B0-01 149
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 6 ]
Trap-Host List
Host Community
------------------------------------------
inform-trap-host 30.1.1.1
trap2-host 20.1.1.1
trap-host 10.1.1.1
Trap List
Trap-type Status
--------------------------
auth-fail enable
cold-start enable
cpu-threshold enable
port-threshold enable
dhcp-lease enable
power enable
module enable
fan enable
temp-threshold enable
SWITCH(config)#
There are nine kinds of SNMP trap messages provided by SNMP – authentication-
failure, cold-start, link-Up/Down, CPU-threshold, port-threshold, temp-threshold, DHCP-
lease, fan, module, power.
(1) authentication-failure is shown to inform wrong community is input when user try-
ing to access to SNMP inputs wrong community.
150 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
(2) cold-start is shown when SNMP agent is turned off and rebooted again.
(4) cpu-threshold is shown when CPU utilization rises above the threshold configured
by user referred to「6.3.3 Configuring Threshold of CPU Utilization」. Also, when
CPU utilization falls below the threshold, trap message will be shown to notify it.
(5) dhcp-lease is shown when there is no more IP address can be assigned in subnet
of DHCP server. Even though only one subnet does not have IP address to assign
when there are several subnets, this trap message will be seen.
(6) port-threshold is shown when the port traffic rises above the threshold configured
by user referred to「7.3.4 Configuring Threshold of Port Traffic」. Also, when port
traffic falls down below the threshold, port-threshold will be shown.
(7) fan/module/power is shown when there is any problem in Fan, Module, and Power.
(8) temp-threshold is shown when temperature rises above the threshold configured
by user referred to Configuring Threshold of Temperature.
SNMP Trap message provided by each switch can be different. Each switch that sup-
ports SNMP function can use all or a part of the following commands when you config-
ure the switch. To check the command provided by each switch, use snmp trap ? in
Global Configuration Mode.
However, it may inefficiently work if all these trap messages are too frequently sent.
Therefore, user can select type of trap sent to trap-host.
DDJ:A-M-5212B0-01 151
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To configure kinds of trap messages that user wants to receive, use the following com-
mands.
snmp trap cpu-threshold sent when CPU utilization rises above the
snmp trap port-threshold sent when the port traffic rises above the
Global
threshold and falls down below the threshold.
snmp trap temp-threshold sent when the temperature rises above the
152 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
show snmp trap Global Checks configured SNMP trap-host and SNMP trap.
DDJ:A-M-5212B0-01 153
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 6 ]
Trap-Host List
Host Community
------------------------------------------
inform-trap-host 30.1.1.1
trap2-host 20.1.1.1
trap-host 10.1.1.1
Trap List
Trap-type Status
--------------------------
auth-fail disable
cold-start enable
cpu-threshold enable
port-threshold enable
dhcp-lease enable
power enable
module enable
fan enable
temp-threshold enable
SWITCH(config)#
In this mode, you can configure the Alarm notification. The notification will be sent to a
configured trap host whenever the configuration change occurs through CLI and ACI-E.
This enhanced alarm notification allows the network administrator to customize the se-
verity on each alarm.
snmp notify-activity Global Enables the activity for the general notifi-
154 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To configure the severity for general alarm notifications, use the following command.
snmp alarm-severity default{ criti- Configures the severity for alarm notifica-
Global
cal|major|minor |warning|intermediate} tions.
If the severity is not configured for an alarm-notification, the default severity, which is
“minor”, is applied to the alarm notification. This can be changed by network adminis-
trator. To configure the alarm-severity criteria in CLI, use the following command.
This alarm-severity can be configured through CLI command or ACI-E, but this is spe-
cific to EMS function. For example, if alarm-severity criterion is configured as “major” .
then all other alarms that are greator than (or equal to) this severity are only allowed to
be shown in ACI-E, otherwise, will not be shown in ACI-E.
DDJ:A-M-5212B0-01 155
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
snmp alarm-severity fan-fail Sends alarm notification with the severity when there’s a
snmp alarm-severity cold-start Sends alarm notification severity when SNMP agent is
snmp alarm-severity broadcast-over Sends alarm notification with the severity when broadcast
snmp alarm-severity cpu-load-over Sends alarm notification with the severity in the case of
snmp alarm-severity dhcp-illegal Sends alarm notification with the severity when there’s ip
snmp alarm-severity fan-remove Global Sends alarm notification with the severity when the fan is
snmp alarm-severity ipconflict Sends alarm notification with the severity when IP ad-
snmp alarm-severity memory-over Sends alarm notification with the severity in the case of
snmp alarm-severity mfgd-block Sends alarm notification with the severity when MAC
snmp alarm-severity port-link-down Sends alarm notification with the severity when network
snmp alarm-severity port-remove Sends alarm notification with the severity when the port is
snmp alarm-severity port-thread-over Sends alarm notification with the severity when port traffic
156 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
snmp alarm-severity power-fail Sends alarm notification with the severity when there’s
snmp alarm-severity power-remove Sends alarm notification with the severity when the power
snmp alarm-severity rmon-alarm-rising Sends alarm notification with the severity when traffic is
snmp alarm-severity rmon-alarm-falling Sends alarm notification with the severity when traffic is
Global
{ critical|major|minor |warning|intermediate} falling over rmon alarm threshold.
snmp alarm-severity system-restart Sends alarm notification with the severity when system is
snmp alarm-severity module-remove Sends alarm notification with the severity when the mod-
snmp alarm-severity temperature-high Sends alarm notification with the severity when there is
no snmp alarm-severity dhcp-illegal To disable the user's configuration, use the following
Global
no snmp alarm-severity fan-remove commands.
DDJ:A-M-5212B0-01 157
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
no snmp alarm-severity rmon-alarm-rising To disable the user's configuration, use the following
Global
no snmp alarm-severity rmon-alarm-falling commands.
To configure the severity of alarms for ADVA status, use the following commands.
snmp alarm-severity adva-fan-fail Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-if-misconfig Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-if-opt-thres Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-if-rcv-fail Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-if-sfp-mismatch Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-psu-fail Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-temperature Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-voltage-high Sends alarm notification with the severity when ADVA in-
snmp alarm-severity adva-voltage-low Sends alarm notification with the severity when ADVA in-
158 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
high
To configure the severity of alarms for ERP status, use the following commands.
mechanism.
{critical|major|minor|warning|intermediate} domains
DDJ:A-M-5212B0-01 159
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
reach-fail
To configure the severity of alarms for STP Guard status, use the following commands.
To check the severity of alarms that user configure, use the following commands.
160 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 8 ]
To show what kind of alarm has been transmitted, use the following command.
show snmp alarm-history Enable/Global Shows what kind of alarm has been transmitted.
To deletes the recorded alarm in the system, use the following command.
snmp clear alarm-history Global Deletes the recorded alarm in the system.
The following is to show the transmitted alarm and delete the records.
To show the current alarms which are not cleared, use the following command.
Enable/
show snmp alarm-report Shows the current alarms which are not cleared.
Global/Bridge
DDJ:A-M-5212B0-01 161
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In case SNMP agent has various IP addresses, SNMP transmits information through
the best route when SNMP manager requests for information. Therefore, when the
manager requests information, the information having different address from referred IP
address could be transmitted.
IP : 10.1.1.1 IP : 20.1.1.1
( contain SNMP agent )
In SURPASS hiD 6615, user can designate IP address of SNMP agent in order to re-
ceive information again when the administrator requests for information. As the above
picture, if SNMP manager configures IP address as 10.1.1.1, SNMP information is
transmitted through IP address 10.1.1.1. In order to configure IP address of SNMP
agent, use the following command.
If the designated IP address of SNMP agent is deleted from the switch, SNMP may
not respond.
If you try to delete the designated IP as the IP address of SNMP agent from device, it
informs that SNMP may not respond as follows.
162 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When you use the above command, all configurations concerned with SNMP will be de-
leted.
DDJ:A-M-5212B0-01 163
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
For OAM Loopback function, the user’s switch and host connected to the user’s device
should support OAM function. OAM Loopback function enables Loopback function from
the user’s device to host connected to the user’s device and operate it.
To enable Loopback function of the host connected to the user’s switch, use the follow-
ing command.
oam remote loopback enable port-number Bridge Enables Loopback function of Peer device.
oam remote loopback disable port-number Bridge Disables Loopback function of Peer de-
vice.
164 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Both Request and Loopback are possible for Local OAM active.
Whereas, Request or Loopback is impossible in Local OAM passive.
When RX is impossible in Local OAM, it is possible to send the information by using TX.
oam local unidirection enable port-number Bridge Sends the information by using TX
To disable to transmit the information by using TX, use the following command.
oam local unidirection disable port-number Bridge Disables to transmit the information by
using TX.
oam remote oam admin <1-2> enable port- Bridge Enables Remote OAM.
number
DDJ:A-M-5212B0-01 165
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
oam remote oam admin <1-2> disable Bridge Disables Remote OAM.
port-number
oam remote oam mode <1-2> {activeㅣ Bridge Configures the mode of Remote OAM.
passive} port-number
Both Request and Loopback are possible for Remote OAM active. Whereas, Request
or Loopback is impossible in Remote OAM passive.
To check the information of peer host using OAM function, use the following command.
65535> port-number
255> port-number
65535> port-number
Bridge Check the information of peer host using
oam remote alarm electrical mode {fullㅣ
OAM function.
half} port-number
{enableㅣdisable} port-number
<0-4294967295> port-number
string port-number
forceAㅣforceB} port-number
166 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
number
slave} port-number
cific<0-255><0-255><0-4> port-
number
The following is to configure to enable OAM Loopback function through 25 port of the
user’s switch and operate once.
DDJ:A-M-5212B0-01 167
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
REMOTE PORT[25]
-------------------------------------------
item | value
-------------------------------------------
mode | ACTIVE
MAC address | 00:d0:cb:27:00:94
variable | UNSUPPORT
link event | UNSUPPORT
loopback | SUPPORT(enable)
uni-direction | UNSUPPORT
-------------------------------------------
SWITCH(bridge)# oam remote loopback start 25
PORT[25]: The remote DTE loopback is success.
SWITCH(bridge)#
LLDP(Link Layer Discovery Protocol) is the function of transmitting data for network
management for the switches connected in LAN according to IEEE 802.1ab standard.
hiD 6615 supporting LLDP transmits the management information between near
switches. The information shows the management information that can recognize the
switches and the function. Then this information is saved in internal MIB(Management
Information Base).
When LLDP starts to operate, the switches send their information to near switches. If
Local status is changed, it sends their changed information to near switch to inform
their changes. For example, if the port statue is changed to disable, it informs that the
port is disabled to near switches. On other hand, the switch that receives the informa-
tion from near switches processes LLDP frame and saves the information of the other
switches. The information received from other switches is Ageing.
168 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If LLDP is enabled on the port, then you should configure how to operate LLDP.
Tx-only is to receive LLDP frame and rx-only is to send LLDP frame. Both is to receive
and send LLDP frame. To configure not to process LLDP operation, use the following
command.
LLDC is transmitted through TLV. There are Mandatory TLV and Optional TLV. In op-
tional TLV, there are Basic TLV and organizationally specific TLV. Basic TLV must be in
the switch where LLDP is realized , specific TLV can be added according to the feature
of the switch..
In hiD 6615, the administrator can enable and disable Basic TLV by selecting it.
lldp port-number {portdescriptionㅣ Bridge Select Basic TLV that is sent in the port..
sysnameㅣsysdescriptionㅣsyscap}
DDJ:A-M-5212B0-01 169
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In hiD 6615, it is possible to configure the interval time and times of sending LLDP
message. To configure the interval time and times of LLDP message, use the following
command.
lldp msg txhold <2-10> Configures the periodic times of LLDP message.
In hiD 6615, the administrator can configure the interval time of enabling LLDP frame
after configuring not to process it.
To configure the interval time of enabling LLDP frame after configuring not to process it,
use the following command.
lldp reinitdelay <1-10> Bridge Configures the interval time of enabling LLDP
LLDP frame.
In hiD 6615 , the administrator can configure Delay time of transmitting LLDP frame. To
configure Delay time of transmitting LLDP frame, use the following command.
170 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
lldp txdelay <1-8192> Bridge Configures Delay time of transmitting LLDP frame
show lldp statistics port-number Enable/Global/Bridge Shows LLDP operation and statistics.
To initialize the accumulated statistics on the port, use the following command.
clear lldp statistics port-number Bridge Initializes the accumulated statistics on the port
show lldp remote port-number Enable/Global/Bridge Shows the statistics of Remote entry.
DDJ:A-M-5212B0-01 171
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 1 ]
The following is to enable LLDP on the port 25,26 and show it.
172 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 2 ]
Port 26:
MSAP-Identifier: 00 d0 cb 27 00 8d 65 74 68 32 36
ChassisType : macAddress(4)
ChassisID : 00 d0 cb 27 00 8d
PortType : interfaceAlias(1)
PortID : 'eth26'
PortDescription: 'port26-TX-10/100/1000'
SystemName : 'EL3'
SystemDescript.: 'hiD6615 NOS 3.02/DS-QA-07D-B0'
SysCapabilities: [0x16] repeater(0x02), bridge(0x04), router(0x10),
SysCapEnabled : [0x04] bridge(0x04),
Mgmt: ifType ifId ifAddress |OID
SWITCH(bridge)#
DDJ:A-M-5212B0-01 173
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 3 ]
174 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 4 ]
DDJ:A-M-5212B0-01 175
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
7.4. RMON
Since RMON processes quite lots of data, its processor share is very high. Therefore,
administrator should take intensive care to prevent performance degradation and not to
overload network transmission caused by RMON. There are nine defined RMON MIB
groups in RFC 1757: Statistics, History, Alarm, Host, Host Top N, Matrix, Filter, Packet
Capture and Event. SURPASS hiD 6615 supports three MIB groups of them, most ba-
sic ones: History, Alarm and Event.
RMON History is periodical sample inquiry of statistical data about each traffic occurred
in Ethernet port. Statistical data of all ports are pre-configured to be monitored at 30-
minute interval, and 50 statistical data stored in one port. It also allows you to configure
the time interval to take the sample and the number of samples you want to save.
You need to enter into History configuration mode first to configure RMON history. To
enter into History configuration mode, use the following command. After entering into
History configuration mode, the system prompt is changed to SWITCH(config-
rmonhistory[n]# from SWITCH(config)#. The variable “n” is number to be con-
figured to distinguish each different History.
176 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH(config)# rmon-history 5
SWITCH(config-rmonhistory[5])#
Input a question mark(?) at the system prompt on History configuration mode if you
want to list available commands.
SWITCH(config-rmonhistory[1])# ?
RMON history configuration commands:
active Activate the history
data-source Set data source name for the ethernet port
do To run exec commands in config mode
exit End current mode and down to previous mode
help Description of the interactive help system
interval Define the time interval for the history
owner Assign the owner who define and is using the history re-
sources
requested-buckets Define the bucket count for the interval
show Show running system information
SWITCH(config-rmonhistory[1])#
The question mark(?) you enter will not be seen. Right after entering the question
mark, the commands will be displayed.
To return into configuration mode, or to enter into Privilege Exec Enable Mode, use the
following commands.
DDJ:A-M-5212B0-01 177
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The followings are examples of returning to Global Configuration Mode and going back
to Privilege Exec Enable Mode from RMON-History Configuration Mode.
SWITCH(config-rmonhistory[5])# exit
SWITCH(config)#
SWITCH(config-rmonhistory[5])# end
SWITCH#
When you configure RMON History, you have to assign source port of statistical data.
To invest statistical data from a certain port as sample inquiry, assign the port by using
the following command.
data-source data-object-id RMON Assigns a source port of statistical port. The variable
User can configure RMON History and identify subject using many kinds of data from
History.
178 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH(config-rmonhistory[5])# requested-buckets 25
SWITCH(config-rmonhistory[5])#
interval time RMON Configures the interval of sample inquiry. The default
setting is 30 seconds.
SWITCH(config-rmonhistory[5])# interval 60
SWITCH(config-rmonhistory[5])#
You can configure the interval of sample inquiry as maximum 3,600 seconds.
DDJ:A-M-5212B0-01 179
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
After finishing all configurations, you need to activate RMON History. To activate RMON
History, use the following command.
The following is an example of activating RMON History and viewing the configuration
SWITCH(config-rmonhistory[5])# active
SWITCH(config-rmonhistory[5])# show running-config
Building configuration...
(Omitted)
rmon-history 5
owner test
data-source ifindex.hdlc1
interval 60
requested-buckets 25
active
(Omitted)
SWITCH(config-rmonhistory[5])#
Before activating RMON History, check if user’s configuration is correct. After RMON
History is activated, you cannot change its configuration. If you need to change configu-
ration, you have to delete RMON History and configure it again.
When you need to change configuration of RMON History, you should delete RMON
History of the number and change the configuration again.
SWITCH(config)# no rmon-history 5
SWITCH(config)#
180 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
RMON Alarm invests sample data at the interval as use configured, and when the data
is not in the configured threshold.
There are two ways to compare with the threshold: Absolute comparison and Delta
comparison.
You need to enter into RMON Alarm configuration mode first to configure RMON Alarm.
To enter into RMON Alarm configuration mode, use the following command. After enter-
ing into RMON Alarm configuration mode, the system prompt is changed to
SWITCH(config-rmonalarm[n]# from SWITCH (config)#. The variable “n” is
number to be configured to distinguish each RMON Alarm.
SWITCH(config)# rmon-alarm 1
SWITCH(config-romonalarm[1]#
Input a question mark(?) at the system prompt on Alarm configuration mode if you want
to list available commands.
SWITCH(config-rmonalarm[1])# ?
RMON alarm configuration commands:
active Activate the event
do To run exec commands in config mode
exit End current mode and down to previous mode
DDJ:A-M-5212B0-01 181
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH(config-rmonalarm[1])#
The question mark(?) you enter will not be seen. Right after entering the question
mark, the commands will be displayed.
To return into configuration mode, or to enter into Privilege Exec Enable Mode, use the
following commands.
The followings are examples of returning to Configuration mode and going back to
Privilege Exec Enable Mode from History configuration mode.
SWITCH(config-rmonalarm[1])# exit
SWITCH(config)#
SWITCH(config-rmonalarm[1])# end
SWITCH#
User needs to configure RMON Alarm and identify subject using many kinds of data
from Alarm. To identify subject using Alarm, use the following command.
owner name RMON Configures RMON Alarm and identifies subject using
182 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When you identify subject of RMON Alarm, it is possible to input maximum 32 letters.
If you input more than 32 letters, the error message, “%Too long owner name” will be
displayed.
User needs object value used for sample inquiry to provide RMON Alarm. The following
is rule of object for sample inquiry.
To assign object used for sample inquiry, use the following command.
sample-variable mib-object RMON Assigns MIB object used for sample inquiry.
It is possible to select the way to compare MIB object used for sample inquiry in case of
configuring RMON Alarm. Absolute comparison directly compares object selected as
sample with the threshold. For instance, when you want to know the point of 30,000
times of sample inquiry, if you configure apSvcConnections as 30,000, it is for Absolute
comparison.
To compare object selected as sample with the threshold, use the following command.
DDJ:A-M-5212B0-01 183
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Delta comparison compares difference between current data and the latest data with
the threshold. For instance, in order to know the point of variable notation rule 100,000
more than the former rule, configure apCntHits as Delta comparison.
sample-type delta RMON Compares difference between current data and the
latest data with the threshold.
If you need to occur Alarm when object used for sample inquiry is more than upper
bound of threshold, you have to configure the upper bound of threshold.
You can configure upper bound of threshold as maximum 2,147,483,647. If you con-
figure it as 0, then there will not be Alarm.
After configuring upper bound of threshold, configure to occur RMON Event when ob-
ject is more than configured threshold. Use the following command.
rising-event <0-65535> RMON Configures to occur RMON Event when object is more
than configured threshold.
The following is an example of configuring to occur RMON event 1 when object is more
than configured threshold.
SWITCH(config-rmonalarm[1])# rising-event 1
SWITCH(config-rmonalarm[1])#
184 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If you configure the standard, the upper bound of threshold as 0, there will not be
Event.
If you need to occur Alarm when object used for sample inquiry is less than lower
bound of threshold, you should configure lower bound of threshold. To configure lower
bound of threshold, use the following command.
SWITCH(config-rmonalarm[1])# falling-threshold 90
SWITCH(config-rmonalarm[1])#
You can configure lower bound of threshold as maximum 2,147,483,647. If you config-
ure it as 0, there will not be Alarm.
After configuring lower bound of threshold, configure to occur RMON Event when ob-
ject is less than configured threshold. Use the following command.
The following is an example of configuring ro occur RMON Event when object is less
than configured threshold.
SWITCH(config-rmonalarm[1])# falling-event 2
SWITCH(config-rmonalarm[1])#
It is possible for users to configure standard when Alarm is first occurred. User can se-
lect the first point when object is more than threshold, or the first point when object is
less than threshold, or the first point when object is more than threshold or less than
DDJ:A-M-5212B0-01 185
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
threshold. To configure the first RMON Alarm to occur when object is less than lower
bound of threshold first, use the following command.
threshold first.
To configure the first Alarm to occur when object is firstly more than upper bound of
threshold, use the following command.
threshold.
To configure the first Alarm to occur when object is firstly more than threshold or less
than threshold, use the following command.
than threshold.
The interval of sample inquiry means time interval to compare selected sample data
with upper bound of threshold or lower bound of threshold in terns of seconds. To con-
figure interval of sample inquiry for RMON Alarm, use the following command.
SWITCH(config-rmonalarm[1])# sample-interval 60
SWITCH(config-rmonalarm[1])#
186 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After finishing all configurations, you need to activate RMON Alarm. To activate RMON
Alarm, use the following command.
The following is an example of activating RMON Alarm and viewing the configuration.
SWITCH(config-rmonalarm[1])# active
SWITCH(config-rmonalarm[1])# show running-config
Building configuration...
(Omitted)
rmon-alarm 1
owner test
sample-variable ifinerrors.n1/port2
sample-type absolute
startup-type rising
rising-threshold 100
falling-threshold 90
rising-event 1
falling-event 2
sample-interval 60
active
(Omitted)
SWITCH(config-rmonalarm[1])#
You should make sure that all configurations are correct before activating RMON Alarm.
After activating RMON Alarm, you cannot change configuration. If you need to change
configuration, you have to delete RMON Alarm and configure it again.
When you need to change configuration of RMON Alarm, you should delete RMON
Alarm of the number and configure it again. To delete RMON Alarm, use the following
command.
DDJ:A-M-5212B0-01 187
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH(config)# no rmon-alarm 1
SWITCH(config)#
RMON Event identifies all operations such as RMON Alarm in switch. User can config-
ure Event message or Trap message to be sent to SNMP management server when
sending RMON Alarm. You need to enter into Event configuration mode to configure
RMON Event. When you enter into Event configuration mode by using the following
command, the system prompt is changed to SWITCH(config-rmonevent[n]# from
SWITCH(config)#. The variable “n” is a number to distinguish each different Event.
SWITCH(config)# rmon-event 1
SWITCH(config-rmonevent[1])#
To list available commands for RMON Event, input the question mark(?) at the system
prompt on Event configuration mode.
SWITCH(config-rmonevent[1])# ?
RMON event configuration commands:
active Activate the event
community Define a community to an unactivated event
description Define description of RMON event
do To run exec commands in config mode
exit End current mode and down to previous mode
help Description of the interactive help system
owner Assign the owner who define and is using the history resources
show Show running system information
type Define the event type determines where send the event notification
SWITCH(config-rmonevent[1])#
The question mark(?) you enter will not be seen. Right after entering the question
mark, the commands will be displayed.
188 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To return into configuration mode, or to enter into Privilege Exec Enable Mode, use the
following commands.
The followings are examples of returning to configuration mode and going back to Privi-
lege Exec Enable Mode from Event configuration mode.
SWITCH(config-rmonevent[1])# exit
SWITCH(config)#
SWITCH(config-rmonevent[1])# end
SWITCH#
When RMON Event is happened, you need to input community to transmit SNMP trap
message to host. Community means a password to give message transmission right.
To configure community for trap message transmission, use the following command.
community password RMON Configures password for trap message transmission right.
It is possible to describe Event briefly when Event is happened. However, the descrip-
tion will not be automatically made. Thus administrator should make the description. To
make a description about Event, use the following command.
DDJ:A-M-5212B0-01 189
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
User should configure Event and identify subject using various data from Event. To
identify subject of Event, use the following command.
When you identify subject of RMON Event, it is possible to input maximum 32 letters. If
you input more than 32 letters, the error message, “%Too long owner name” will be dis-
played.
When RMON Event is happened, you need to configure Event type to arrange where to
send Event.
190 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After finishing all configurations, you should activate RMON Event. To activate RMON
Event, use the following command.
The following is an example of activating RMON Event and viewing the above configu-
ration.
SWITCH(config-rmonevent[1])# active
SWITCH(config-rmonevent[1])# show running-config
Building configuration...
(omitted)
!
rmon-event 1
owner test
community password
description This event ...
type log-and-trap
active
(omitted)
SWITCH(config-rmonevent[1])#
You should make sure that all configurations are correct before activating RMON
Event. After activating RMON Event, you cannot change configuration. If you need to
change configuration, you have to delete RMON Event and configure it again.
Before changing the configuration of RMON Event, you should delete RMON Event of
the number and configure it again.
DDJ:A-M-5212B0-01 191
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH(config)# no rmon-event 1
SWITCH(config)#
7.5. Syslog
The function of syslog massage is to inform the troubles that occurred in user’s switch,
to the network manager. By default, system logger is activated in SURPASS hiD 6615.
Therefore, although you delete this function, it will be activated again.
In hiD 6615, Syslog message is transmitted with Level and Priority. To mark level for all
Sylslog message regardless of Priority, use the following command. Here, it is also
possible to configure the destination of syslog message.
192 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To configure level of syslog message and place to transmit, use the following com-
mands.
There are seven levels of syslog message according to its importance; emergencyㅣ
alertㅣcriticalㅣerrorㅣwarningㅣnoticeㅣinfo. Emergency is the highest level and info is
the lowest level in importance.
User can configure level of syslog, but user cannot receive messages of lower levels
than user’s configured level. That means, in order to receive all messages, user have
to configure the level as info. When user configures syslog level as error, he can re-
ceive messages of higher level than error.
If you want to receive syslog message through console on user’s PC, enter console,
and if you want to receive it within the system, enter local, and if you want to receive it
remote host, enter remote.
address
DDJ:A-M-5212B0-01 193
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Provide Local-code to Facility of Syslog message with the command. With the local-
code, you can manage the system or syslog message per system group.
In hiD 6615, it is possible to configure the Priority for Syslog Message, and transmit
specific syslog message that is selected by user. Here, Level and the destination
should be configured at once.
console
local {volatileㅣnon-volatile}
mote ip-address
194 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You can choose auth, authpriv, kern, syslog, user as the priority in hiD 6615. As the pri-
ority, you can also configure from local 0 to local 7. This is used to sort out Syslog mes-
sage of each host when Syslog server receives Syslog message from many hosts. To
transmit Syslog message by configuring Priority, use the following command.
local3ㅣlocal4ㅣlocal5ㅣlocal6ㅣlocal7} {emergㅣ
alertㅣcritㅣerrㅣwarningㅣnoticeㅣinfo } console
local3ㅣlocal4ㅣlocal5ㅣlocal6ㅣlocal7} {emergㅣ
Transmit Sylsog message by con-
alertㅣcritㅣerrㅣwarningㅣnoticeㅣinfo } local Global
figuring the Priority.
{volatileㅣnon-volatile}
local3ㅣlocal4ㅣlocal5ㅣlocal6ㅣlocal7} {emergㅣ
alertㅣcritㅣerrㅣwarningㅣnoticeㅣinfo } remote
ip-address
To relase the configuration of transmitting syslog message, use the following command.
ㅣ syslogㅣuser} {emergㅣalertㅣcritㅣerrㅣ
warningㅣnoticeㅣinfo} console
volatile}
ㅣsyslogㅣuser} {emergㅣalertㅣcritㅣerrㅣ
DDJ:A-M-5212B0-01 195
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 1 ]
The following is an example of configuring syslog message to send all logs higher than
notice to external host 10.1.1.1 and configuring local1.info to transmit to console.
[ Sample Configuration 2 ]
The following is to configure Priority of all Syslog message, that is transmitted to re-
mote, as local0.
196 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To show the configuration of the syslog massage, use the following “show” commands.
Take notice that the configuration of the syslog can’t be showed by using “show run-
ning-config” command.
show syslog {volatileㅣnon- Shows memory size which used for syslog infor-
The following shows the configuration that Emergency massage is saved in the console
and Info massage and the higher massage than Info is saved in the volatile file.
If you need to delete the log massage that is saved in the syslog file, use the following
command.
clear syslog local {volatileㅣnon- Global Deletes the log massage in the Syslog file.
volatile}
The user can designate which IP address to be assigned for syslog message for-
warded remotely. In order to designate which IP address to be assigned for syslog
DDJ:A-M-5212B0-01 197
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
syslog bind-address ip-address Global Designates IP address for syslog message for-
For the user who accesses from remote, it is possible to check Syslog message
through the server by sending syslog message to the server. In hiD 6615, it is possible
to check Debug message in user’s own Console window even from remote.
To check Debug message in remote user’s Console window, use the following com-
mand.
The following is to check Debug message in remote user’s own Console window.
To disable terminal monitor in remote user’s own Console window, use the following
command.
198 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 has a function that sends syslog message to inform when CPU
utilization excesses configured threshold or is less than the threshold. To configure
threshold of CPU utilization, use the following command.
threshold cpu <20-100> {5ㅣ Configures threshold of CPU utilization. The unit is “%”
The default is 50% and you can configure 5, 60,600 seconds as time interval.
cpuload threshold : 70
timer interval : 60 seconds
After you configure as the above, the following message will be displayed when CPU
utilization excesses 70%.
Oct 18 17:37:24 zebra[80]: CPU Overload Warning : Threshold [70] < CPU Load [86]
DDJ:A-M-5212B0-01 199
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
And the following message will be displayed when the CPU utilization goes down less
than 70%.
Oct 18 17:37:29 zebra[80]: CPU Overload Cleared : Threshold [70] > CPU Load [39]
SURPASS hiD 6615 has a function that sends syslog message to inform when port
traffic excesses configured threshold or is less than the threshold.
threshold port port-number range {5ㅣ60 Global Configures threshold of port traffic. The unit
The port threshold is basically configured as maximum rate value. 1000000kbps is con-
figured for Giga port and 100000kbps is configured for 100M port.
200 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The contents for show status fan can be different according to the product.
The user can control the Fan operation in certain temperature. The fan automatically
stops and runs by the temperature. To configure the temperature to run or stop the fan
operation, use the following command.
threshold fan start-temperature stop- Global Configures the temperature to run or stop the
The highest operating temperature is 100℃ and the lowest temperature is -30℃.
To show the fan status and the operating temperature, use the following command.
The following is to configure the operating temperature as 25℃ and stopping tempera-
ture as 5℃.
Fan A : Installed
Fan B : Installed
Fan A-1 : OK
Fan A-2 : OK
Fan A-3 : OK
Fan B-1 : OK
Fan B-2 : OK
DDJ:A-M-5212B0-01 201
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Fan B-3 : OK
Fan operation : ON
Fan threshold : Run 25 C / Stop 5 C
SWITCH(config)#
In hiD 6615, If the user configures the threshold for the switch temperature, the system
informs by syslog message when the temperature accesses the threshold and goes
down under the threshold.
To configure the threshold for the temperature of the switch, use the following com-
mand in Global configuration mode.
To show the temperature status and the threshold for the switch, use the following
command.
The following is to configure the threshold of the temperature as 45℃ and checking it.
Temperature 1 current : 37 C
Temperature 2 current : 31 C
Temp Threshold : 45 C
SWITCH(config)#
The contents for show status fan can be different according to the product.
202 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 provides Rule and Qos function for traffic management. Rule func-
tion analyzes the transmitted packets and decides packet forwarding by classified ac-
cording to the designated policy. MAC address, VLAN ID, IP address are used for dis-
tinguishing the packets in order to configure the policy of Rule function. And the packets
by this function operate as the user has configured. The user can configure the policy
in order to block unnecessary data and keep important data thorough Rule function.
QoS can give a priority to a specific traffic by basically offering the priority to the traffic
or limiting the others. When processing data, data are usually supposed to be proc-
essed in time-order like first in, first out. This way, not processing specific data first,
might lose all data in case of overloading traffics.
However, in case of overloading traffics QoS can apply processing order to traffic by
reorganizing priorities according to its importance. By favor of QoS, user can predict
network performance in advance and manage bandwidth more effectively.
◆ Rule Creation
To classify the packets according to the specific basis, configure the policies about
them first. The basis used to classify the packets is IP address, TCP/UDP, Port number,
Protocol.
◆ Rule Action
Configure the policy classifying the packets and Precedence and DiffServ, Cos to des-
ignate the priority for the classified packets.
Prescribe Rule action for the classified packets according to the user’s requirements.
DDJ:A-M-5212B0-01 203
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
“Deny” operates for the traffic which do not meet the requirements.
“Mirror” transmits the classified traffic to monitor port.
“Redirect” re-transmits the appropriate traffics.
◆ Scheduling
• Creating Rule
• Configuring the priority
• Configuring the condition for the packets
• Configuring Rule Operation
• Configuring Cos value and Tos value
• Packet Counter
• Saving Rule
• Checking Rule Profile
• Modifying Rule contents
• Deleting Rule
In SURPASS hiD 6615, in order to create rule, enter into Rule configuration mode first.
To enter Rule configuration mode, use the following command.
After entering into Rule creation mode, the prompt changes SWITCH(config)# into
SWITCH(config-rule[name])#.
The following is to enter into Rule creation mode in order to create new Rule named by
“TEST”.
204 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After entering into Rule configuration mode, configure Rule that the user wants. For the
rule, configure the packet condition and how to process the packets.
To configure the priority for the Rule, use the following command. The higher priority
Rule has, the faster it is processed.
priority {lowㅣmediumㅣhighㅣhighest} Rule Configure the priority for the new Rule.
In Rule, configure the condition for the packets and how to process the packets. Con-
figure Rule of the condition with various basis.
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
{dst-ip-addressㅣdst-ip-address/mㅣany}
Configure the Rule based on Source IP
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
address and Destination IP address.
{dst-ip-addressㅣdst-ip-address/mㅣany} <0-
255>
{icmpㅣtcpㅣudp} tocol.
DDJ:A-M-5212B0-01 205
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure Message type and Code value
{dst-ip-addressㅣdst-ip-address/mㅣany}
of ICMP.
icmp {<0-255>ㅣany} {<0-255>ㅣany}
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
flagㅣany]
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure the rule based on UDP Source
{dst-ip-addressㅣdst-ip-address/mㅣany}
port and Destination port.
udp {<1-65535>ㅣany} {<1-65535>ㅣany}
no cos
no ethtype
no ip
no mac
no tos
no vlan
206 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After configuring the packet condition for Rule, then configure how to process the
packets. To configure Rule operation, use the following command.
no match bandwidth
no match copy-to-cpu
no match deny
no match dmac
no match dscp Release the configuration for the process of the pack-
Rule
no match egress ets that correspond to Rule.
no match mirror
no match permit
no match redirect
no match vlan
DDJ:A-M-5212B0-01 207
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
no-match copy-to-cpu Sends the packets that don’t correspond to Rule to CPU.
no-match redirect port- Sends the packets that don’t correspond to Rule to the
no no-match copy-to-cpu
no no-match deny
Release the process for the packets that don’t correspond
no no-match dscp Rule
to Rule.
no no-match mirror
no no-match redirect
To apply the scheduling value using the configured Rule, first apply a class that can ad-
just to the scheduling value for each rule. CoS value is classified as 8 class. On the
other hand, “overwite “ variable decides whether the packets are processed with CoS
class only in internal of the switch or they are transmitted to external network with the
designated CoS value. Therefore, if the command contains “overwrite”, CoS value ad-
just to the packets when they communicate with external and if it is not contained in the
command, it is only for internal.
208 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To apply the class to the packets that correspond to Rule, use the following command.
To adjust the class when the packets that don’t correspond to Rule, use the following
command.
value.
Rule
Designate IP ToS precedence for the packets
no-match ip-prec <0-7>
that don’t correspond to Rule.
value.
DDJ:A-M-5212B0-01 209
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
When packets defined in rule are come, QoS policy is applied. However, suppose that
packet defined to throw out is come. In that case, it will be thrown out without any no-
tice or record. For administrators, it would better to know the packet is transmitting al-
though it is unnecessary and harmful. It is possible to know how many times packet de-
fined in specified rule are come.
In SURPASS hiD 6615, it is possible to know how many times packet defined in speci-
fied rule are come. To check how many times packet defined in specified rule are come,
use the following command.
To release the configuration for how many times packet defined in specified rule are
come, use the following command.
no match counter Rule Release the configuration for how many times
To clear the statistics of packets that have been transmitted in the Rule, use the follow-
ing command.
clear rule counter {NAME| all} Global To clear the statistics of packets that have been
210 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After configuring rule using the above commands, apply it to the switch by saving. If
you don’t save and apply rule to the switch, all configurations are deleted.
It is possible to modify the Rule configuration. To modify them, use the following com-
mand.
rule name modify Global To modify Rule named by “name”, enter into Rule con-
figuration mode.
DDJ:A-M-5212B0-01 211
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, it is possible to Mapping to Queue with CoS configured for
packets. Basically, they are Mapping as below.
0 0 4 4
1 1 5 5
2 2 6 6
3 3 7 7
To create QoS Map, in order to classify the rule having a class to Queue, use the fol-
lowing command in Global Configuration Mode.
212 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
qos map <0-7> <0-7> Global Classify the rule to Queue. CoS number is 0~7,
To return to Basic QoS map, use the following command in Global Configuration Mode.
To process Queue, it is possible to use Strict Priority Queuing, WFQ, WRR method.
Strict Priority Queuing is used to process firstly more important data than the others.
Since all data are processed by their priorities, data with high priorities can be proc-
essed fast but data without low priorities might be delayed and piled up. This method
has a strong point of providing the distinguished service with a simple way. However, if
the packets having higher priority enter, the packets having lower priority are not proc-
essed.
The processing order in Strict Priority Queuing in case of entering packets hav-
ing the Queue number as below.
3
7
6
7 1 3 4 6 7 7 7
7
4
1
DDJ:A-M-5212B0-01 213
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
WRR processes packets as much as Weight. Processing the packets that have higher
priority is the same way as Strict Priority Queuing. However, it passes to next stage af-
ter processing as configured Weight so that it is possible to configure for packet proc-
ess not to be partial to the packets having higher priority. However, there’s a limitation
of providing differentiated service from those existing service.
The processing in WRR when the packets having following Queue numbers
3
Queue W
7
0 1
1 1 6
2 1 7 6 7 1 3 6 7 7
3 1
4 1 7
5 1 6
6 1
7 2 1
WFQ has only good points of Strict Priority Queuing and WRR. If the bandwidth is con-
figured for all Queues, the packets of appropriate Queue can be processed in the as-
signed bandwidth.
The processing in WRQ when the packets having following Queue numbers
3
Que BW 7
7
0 7 50M
1 6
7
2 7
3
7 6 50M
4
5 6 6
6 50Mbps
1
7 50Mbps
214 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To decide one among three scheduling methods, use the following command.
In WRR, the packets are processed by Weight. The user can configure the weight
value.
Queue processing for CPU packet can be set up by user with two scheduling methods,
Strict Priority Queuing, WRR (Weighted Round Robin)
To select which scheduling method of the two, use the following command.
qos cpu scheduling-mode sp Global Selects scheduling method for CPU packet.
WRR method is a packet processing method according to weight value. Weight value
can be designated by user.
DDJ:A-M-5212B0-01 215
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, it is possible to configure to block the service access such as
telnet, ftp, icmp, snmp accessing to switch. To block the service such as telnet, ftp,
icmp, snmp entering to switch, use Admin access rule.
In SURPASS hiD 6615, in order to create Admin access rule, enter into Rule configura-
tion mode first.
216 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To enter Admin access rule configuration mode, use the following command.
After entering into Admin access rule mode, the prompt changes SWITCH(config)#
into SWITCH(config-admin-rule [name])#.
The following is to enter into Admin access rule mode in order to create new Admin ac-
cess rule named by “TEST”.
After entering into Admin access rule configuration mode, configure Admin access rule
that the user wants. For the Admin access rule, configure the packet condition and how
to process the packets.
To configure the priority for the Rule, use the following command. The higher priority
Rule has, the faster it is processed.
.
priority {lowㅣmediumㅣhigh Configure the priority for the new Admin Ac-
Admin access rule
ㅣhighest} cess Rule.
In Admin access rule, you can configure the condition for the packet and how to proc-
ess the packets that correspond to the condition. Configure Admin access rule with
various conditions.
DDJ:A-M-5212B0-01 217
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
{dst-ip-addressㅣdst-ip-address/mㅣany}
Configure a rule based on Source IP ad-
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
dress and Destination IP address.
{dst-ip-addressㅣdst-ip-address/mㅣany} <0-
255>
ip {src-ip-addressㅣsrc-ip-address/mㅣany} ac-
Configure Message type and Code value
{dst-ip-addressㅣdst-ip-address/mㅣany} cess
of ICMP.
icmp{<0-255>ㅣany} {<0-255>ㅣany} rule
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
[tcp-flagㅣany]
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure the rule based on UDP Source
{dst-ip-addressㅣdst-ip-address/mㅣany}
port and Destination port.
udp {<1-65535>ㅣany} {<1-65535>ㅣany}
After configuring the condition of packets for Admin access rule, configure how to proc-
ess the packets.
218 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To process the packets that don’t correspond to the Rule, use the following command.
After configuring Admin access rule using the above commands, apply it to the switch
by saving. If you don’t save and apply Admin access rule to the switch, all configura-
tions are deleted.
To save and apply Admin access rule, use the following command.
apply Admin access rule Save Admin access rule and apply it to the switch.
DDJ:A-M-5212B0-01 219
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To check the configured Admin access rule Profile, use the following command.
show rule-profile Admin access rule Check the Profile of appropriate Admin access rule.
admin
View/Enable/Global
show rule admin Check the profile of all Admin access rule.
show rule all Check all Rule and all Admin access rule Profile.
To delete the configure Admin access rule, use the following command.
no rule all Delete all of Rule and all of Admin access rule.
The following is an example of configuring Rule as “TEST” and applying it to the sys-
tem.
220 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST create
SWITCH(config-rule[TEST])# priority high
SWITCH(config-rule[TEST])# ip 10.1.1.1 20.1.1.1 tcp 22 any
SWITCH(config-rule[TEST])# cos 0
SWITCH(config-rule[TEST])# match deny
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config-rule[TEST])# apply You should apply it to the system.
SWITCH(config-rule[TEST])# exit
SWITCH(config)# show rule
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config)#
If you don’t apply it to the system and change to other configuration, all the configura-
tion is deleted as follows.
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST create
SWITCH(config-rule[TEST])# priority high
SWITCH(config-rule[TEST])# ip 10.1.1.1 20.1.1.1 tcp 22 any
SWITCH(config-rule[TEST])# cos 0
SWITCH(config-rule[TEST])# match deny
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config-rule[TEST])# exit
SWITCH(config)# show rule
There is no configured rule.
SWITCH(config)#
DDJ:A-M-5212B0-01 221
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST modify
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config-rule[TEST])# match permit
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match permit
SWITCH(config-rule[TEST])# apply
SWITCH(config-rule[TEST])# exit
SWITCH(config)#
222 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The following is how to configure Strict Priority Queuing on SURPASS hiD 6615.
PORT Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7
-------------------------------------
1 UN UN UN UN UN UN UN 50
2 UN UN UN UN UN UN UN 50
3 UN UN UN UN UN UN UN 50
4 UN UN UN UN UN UN UN 50
5 UN UN UN UN UN UN UN 50
6 UN UN UN UN UN UN UN UN
7 UN UN UN UN UN UN UN UN
8 UN UN UN UN UN UN UN UN
9 UN UN UN UN UN UN UN UN
10 UN UN UN UN UN UN UN UN
11 UN UN UN UN UN UN UN UN
12 UN UN UN UN UN UN UN UN
13 UN UN UN UN UN UN UN UN
14 UN UN UN UN UN UN UN UN
15 UN UN UN UN UN UN UN UN
16 UN UN UN UN UN UN UN UN
17 UN UN UN UN UN UN UN UN
18 UN UN UN UN UN UN UN UN
19 UN UN UN UN UN UN UN UN
20 UN UN UN UN UN UN UN UN
21 UN UN UN UN UN UN UN UN
22 UN UN UN UN UN UN UN UN
23 UN UN UN UN UN UN UN UN
24 UN UN UN UN UN UN UN UN
25 UN UN UN UN UN UN UN UN
26 UN UN UN UN UN UN UN UN
SWITCH(config)#
DDJ:A-M-5212B0-01 223
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
PORT Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7
-------------------------------------------------------------
1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
2 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
3 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
4 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
5 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
6 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
7 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
8 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
9 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
10 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
11 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
12 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
13 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
14 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
15 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
16 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
17 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
18 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
19 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
20 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
21 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
22 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
23 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
24 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
25 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
26 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
SWITCH(config)#
224 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
PORT Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7
---------------------------------------------------------------------
1 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
2 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
3 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
4 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
5 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
6 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
7 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
8 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
9 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
10 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
11 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
12 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
13 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
14 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
15 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
16 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
17 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
18 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
19 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
20 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
21 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
22 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
23 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
24 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
25 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
26 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
SWITCH(config)#
DDJ:A-M-5212B0-01 225
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH(config)#
The following is an exmple of configuring not to permit all telent to the switch.
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST create admin
SWITCH(config-admin-rule[TEST])# priority high
SWITCH(config-admin-rule[TEST])# ip 10.1.1.1 20.1.1.1 tcp 22 any
SWITCH(config-admin-rule[TEST])# match deny
SWITCH(config-admin-rule[TEST])# apply
SWITCH(config-admin-rule[TEST])# exit
SWITCH(config)#
If you save the configured Admin access rule and go out from Admin access rule con-
figuration mode without applying it to the switch, all of the configuration would be de-
leted.
226 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
NetBIOS is used at LAN(Local Area Network) environment where should share infor-
mation with each other to communicate between computers. However, in case
ISP(Internet Service Provider) provides internet communication through LAN service to
specific area such as apartments, customer’s information should be kept.
Cyber Apt.
LAN environment for Internet Service Internet
Information Shared
In this case, without NetBIOS filtering, customers’ data may be opened to each other
even though the data should be kept. To keep customer’s information and prevent shar-
ing information in the above case, NetBIOS filtering is necessary.
To release NetBIOS filtering according to user’s request, use the following command.
DDJ:A-M-5212B0-01 227
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The following is an example of configuring NetBIOS filtering in port 1~5 and showing it.
DHCP filtering helps to operate DHCP service by blocking Request which enters
through subscriber’s port and goes out into uplink port or the other subscriber’s port
and Reply which enters to the subscriber’s port.
In the below example, server A has the IP area from 192.168.10.1 to 192.168.10.10.
Suppose a user connects with Client 3 that can be DHCP server to A in order to share
IP address from 10.1.1.1 to 10.1.1.10.
228 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Here, if Client 1 and Client 2 are not blocked from Client 3 of DHCP server, Client 1 and
Client 2 will request and receive IP from Client 3 so that communication blockage will
be occurred.
Therefore, the filtering function should be configured between Client 1 and Client 3,
Client 2 and Client 3 in order to make Client 1 and Client 2 receive IP without difficulty
from DHCP server A
To configure DHCP filtering function in particular port according to user’s demand, after
enabling filtering function, designate the port needing DHCP filtering function by using
the following command.
Enable/Global/
show dhcp-server-filter Checks DHCP server packet filtering.
Bridge
DDJ:A-M-5212B0-01 229
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The following is an example for configuring DHCP filtering from 1 to 5 and checking it.
It is possible to block packets, which try to bring different source IP out from same net-
work. If packet brings different IP address, not its source IP address, then it is impossi-
ble to know it makes a trouble. Therefore, you would better prevent this kind of packet
outgoing from your network. This function is named as Martian-filter.
To block packets, which try to bring different source IP out from same network, use the
following command.
It is not possible to configure both Qos and Martin Filtering at the same time.
230 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
ip martian-filter default
(omitted)
SWITCH(config)#
The basic policy of filtering based on system is set to allow all packets for each port.
However the basic policy can be changed for user’s requests.
After configuring basic policy of filtering for all packets, use the following command on
Bridge mode to show the configuration.
Enable/
show mac-filter default-policy Shows the basic policy.
Global/Bridge
By default, basic filtering policy provided by system is configured to permit all packets
in each port.
DDJ:A-M-5212B0-01 231
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[ Sample Configuration 1 ]
You can add the policy to block or to allow some packets of specific address after con-
figuring the basic policy of MAC Filtering. To add this policy, use the following com-
mands on Bridge mode.
mac-filter add mac-address {denyㅣ Allows or blocks packet which brings configured
Bridge
permit} mac address to specified port.
232 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To show user’s configuration about MAC filter policy, use the following commands.
Enable/
/Bridge
[ Sample Configuration 2 ]
mac-filter del source-mac-address Bridge Deletes filtering policy for specified MAC ad-
dress.
DDJ:A-M-5212B0-01 233
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
When you need to make many MAC filtering policies at a time, it is hard to input com-
mand one by one. In this case, it is more convenient to save MAC filtering policies at
“/etc/mfdb.conf” and display the list of MAC filtering policy. To view the list of MAC filter-
ing policy at /etc/mfdb.conf, use the following command.
/etc/mfdb.conf.
User can limit the number of users by configuring maximum number of users also
named as Max host for each port. In this case, you need to consider not only the num-
ber of PCs in network but also devices such as switches in network.
For SURPASS hiD 6615, you have to lock the port like MAC filtering before configuring
Max Host. In case of ISPs, it is possible to arrange billing plan for each user by using
this configuration.
234 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When Max host is configured as “0”, no one can connect to the port.
The following is an example of configuring to allow two MAC addresses to port 1, and
five addresses to port 2,3 ,and to ten addresses to port 4.
SWITCH(bridge)# max-hosts 1 2
SWTICH(bridge)# max-hosts 2 5
SWTICH(bridge)# max-hosts 3 5
SWTICH(bridge)# max-hosts 4 10
SWTICH(bridge)#
Max-new-hosts are to limit the number of users by configuring the number of MAC ad-
dress that can be Learning on the system and on the port for a second. The number of
MAC address that ca be Learning on the system has the priority. To configure Max-
new-hosts, use the following command.
DDJ:A-M-5212B0-01 235
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
max-new-hosts port-number max- The number of MAC address that can be Learning
If MAC that is already counted disappears before passing 1 seconds and again starts
Learning, it is not counted.
In case the same MAC changes the port, it is not counted again. For example, if MAC
that is Learning port number 1 is Learning port number 2, it is supposed to move the
port. So, it is deleted from port number 1 and Learning on port number 2 but it is not
counted.
236 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 1 ]
The following is to limit the number of MAC address that can be Learning on the sys-
tem for a second as 10 and limit the number of MAC address that can be Learning on
the port number 1-10 for a second as 3.
port 1 : 3
port 2 : 3
port 3 : 3
port 4 : 3
port 5 : 3
port 6 : 3
port 7 : 3
port 8 : 3
port 9 : 3
port 10 : 3
port 11 : Unlimited
port 12 : Unlimited
port 13 : Unlimited
port 14 : Unlimited
port 15 : Unlimited
port 16 : Unlimited
port 17 : Unlimited
port 18 : Unlimited
port 19 : Unlimited
port 20 : Unlimited
port 21 : Unlimited
--More--
SWITCH(bridge)#
In the above configuration, after MAC is Learning on the port number 1-10, when 11th
MAC starts Learning, it is limited because the number of MAC address, that can be
Learning on the system for a second, is already exceeded.
DDJ:A-M-5212B0-01 237
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
There are two types of addresses registered in MAC table: Dynamic address and Static
address. Dynamic address is deleted when it is not used after the switch registers it in
MAC table. Static address is the configured address by user that is remained even after
rebooting. To register Static address in MAC table, use the following command on
Bridge configuration mode.
Enable/
show mac bridge-name [port-
Global/ Shows MAC address user configured.
number]
Bridge
The following is an example of showing MAC address of destination, the specified port
number, VLAN ID, and time registered in table.
To delete Static address in MAC table, use the following commands on Bridge configu-
ration mode.
238 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To reset the addresses registered in MAC table, use the following command.
Devices connected to IP network have two address, LAN address and network address.
LAN address is sometimes called as data link because it is used in Layer 2 level, but
more commonly the address is known as MAC address.
Switch on Ethernet needs 48-bit-MAC address to transmit packets. In this case, the
process of finding proper MAC address from IP address is called as address resolution.
On the other hand, the progress of finding proper IP address from MAC address is
called as reverse address resolution. Siemens’ switches find MAC address from IP ad-
dress through Address Resolution Protocol(ARP). ARP saves these addresses in ARP
table for quick search. Referring to IP address in ARP table, packet attached IP address
is transmitted to network. When configuring ARP table, it is possible to do it only in
some specific interfaces.
To match a specific IP address and MAC address, use the following command on con-
figuration mode.
arp ip-address mac-address Saves IP address and MAC address in ARP table.
Global
[interface-name] Also possible to configure a specific interface.
To view ARP table, use the following command on Privilege Exec Enable Mode or con-
figuration mode.
address] Global
DDJ:A-M-5212B0-01 239
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To release ARP function about IP address and MAC address, use the following com-
mand on configuration mode.
240 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
7.14. ARP-Alias
Although clients are joined in same client switch, it may be impossible to communicate
between clients for their private security. When you need to make them communicate
each other, SURPASS hiD 6615 supports ARP-alias, which responses ARP request
from client net through Concentrating switch.
Internet
Concentrating
Client Switch
② ARP requests of
10.1.1.2~10.1.1.5 sent to
Concentration Switch
Client Net
For private security
10.1.1.2 10.1.1.3 10.1.1.4 10.1.1.5 impossible to communicate
between clients
∴ No ARP between Clients.
To register address of client net range in ARP-Alias, use the following command.
arp-alias start-ip-address end-ip- Global Registers IP address range and MAC address in
request.
DDJ:A-M-5212B0-01 241
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Unless you input MAC address, MAC address of user’s equipment will be used for ARP
response.
【 Sample Configuration 1 】
Unless you input MAC address as the above example, MAC address of hiD 6615 will
be used.
242 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
7.15. Proxy-ARP
SURPASS hiD 6615 has Proxy-ARP, which responses ARP request instead of other
equipment. In the below picture, Host A has IP address 172.16.10.100 and the subnet
mask is set to /16. So, it is considered as connecting to network 172.16.0.0.
In case Host A needs to send packet to Host D, Host A is supposed to send ARP re-
quest considering that Host D is on the same network. Since ARP request is trans-
ferred through broadcast, the ARP request from Host A is sent not to Host D, but to 1
interface and nodes belonged to subnet A.
Host A Host B
172.16.10.100/16 172.16.10.200/24
default 172.16.10.99/24
subnet A
subnet B
Host C Host D
172.16.20.100/24 172.16.20.200/24
However, SURPASS hiD 6615 is aware that Host D belongs to other subnet and able to
transmit packet to Host D. Therefore it responses to ARP request from Host A with its
own MAC address. Using this way, all ARP requests from subnet A to subnet B are re-
sponded with MAC address of SURPASS hiD 6615. Packets, which should be transmit-
ted to Host D from Host A are well transmitted through SURPASS hiD 6615.
DDJ:A-M-5212B0-01 243
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
【 Sample Configuration 1 】
In SURPASS hiD 6615 3.02 NOS, by broadcasting Gratuitous ARP containing IP ad-
dress and MAC address of gateway, the network is accessible even though IP ad-
dresses of specific host’s gateway are repeatedly assigned.
Configure Gratuitous ARP interval and transmission count using following commands.
And configure transmission delivery-start in order to transmit Gratuitous ARP after ARP
reply.
Gratuitous ARP is transmitted after some time from transmitting ARP reply.
244 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH(config)# arp-patrol 10 4
SWITCH(config)# show running-config
Building configuration...
Current configuration:
hostname SWITCH
(Omitted)
arp-patrol 10 4
!
no snmp
!
SWITCH(config)#
ICMP stands for Internet Control Message Protocol. When it is impossible to transmit
data or configure route for data, ICMP sends error message about it to host.
The first 4 bytes of all ICMP messages are same, but the other parts are different ac-
cording to type field value and code field value.
There are fifteen values of field to distinguish each different ICMP message, and code
field value helps to distinguish each type in detail.
0 7 15 16 31
DDJ:A-M-5212B0-01 245
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The following table shows explanations for fifteen values of ICMP message type.
11 time exceeded
It is possible to control ICMP message through user’s configuration. You can configure
not to send echo reply message to the partner who is taking ping test to device and in-
terval to transmit ICMP message. You can configure the following to control ICMP mes-
sage.
It is possible to configure not to send echo reply message to the partner who is taking
ping test to device. To block echo reply message, use the following commands.
246 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
It is possible to configure interval to transmit ICMP message. After you configure the in-
terval, ICMP message will not be sent until configured time based on the last message
is up. For example, if you configure the interval as 1 second, ICMP will not be sent
within 1 second after the last message has been sent.
To configure interval to transmit ICMP message, the administrator should configure the
type of message and the interval time.
To configure the interval to transmit ICMP message, use the following command.
ip icmp interval rate-mask mask Global Configures the interval to transmit ICMP message
ICMP_ECHOREPLY 0 ICMP_DEST_UNREACH 3
ICMP_SOURCE_QUENCH 4 ICMP_REDIRECT 5
ICMP_ECHO 8 ICMP_TIME_EXCEEDED 11
ICMP_PARAMETERPROB 12 ICMP_TIMESTAMP 13
ICMP_TIMESTAMPREPLY 14 ICMP_INFO_REQUEST 15
ICMP_INFO_REPLY 16 ICMP_ADDRESS 17
ICMP_ADDRESSREPLY 18
DDJ:A-M-5212B0-01 247
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
TYPE STATUS
ICMP_ECHOREPLY(0) OFF
ICMP_DEST_UNREACH(3) ON
ICMP_SOURCE_QUENCH(4) ON
ICMP_REDIRECT(5) OFF
ICMP_ECHO(8) OFF
ICMP_TIME_EXCEEDED(11) ON
ICMP_PARAMETERPROB(12) ON
ICMP_TIMESTAMP(13) OFF
ICMP_TIMESTAMPREPLY(14) OFF
ICMP_INFO_REQUEST(15) OFF
ICMP_INFO_REPLY(16) OFF
ICMP_ADDRESS(17) OFF
ICMP_ADDRESSREPLY(18) OFF
248 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To configure how much time ICMP transmission time is limited, use the following com-
mand.
ip icmp interval rate-limit interval Global Configures how much time ICMP transmission
time is limited
[Sample Configuration 1]
The following is to limit the transmission rate of the message for ICMP_ECHO,
ICMP_INFO_REQUEST, ICMP_INFO_REPLY.
DDJ:A-M-5212B0-01 249
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
User can configure to transmit ICMP Redirect Message. Transmitting ICMP Redirect
Message is one of the ways preventing DoS(Denial of Service), and this can make the
switch provide the constant service to the hosts.SURPASS hiD 6615 transmits more
optimized route to the host than the present route between the host connected to the
switch and the specific destination.
To activate the function transmitting ICMP Redirect Message, use the following com-
mand.
250 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The following is an example for configuring ICMP Redirect Message and checking the
configuration.
(omitted)
interface 1
ip address 222.121.68.247/24
!
!
!
SWITCH(config)# ip redirects
SWITCH(config)# show running-config
(omitted)
interface 1
ip address 222.121.68.247/24
!!
ip redirects
!
!
SWITCH(config)#
TCP(Transmission Control Protocol) header includes six kinds of flags that are URG,
ACK, PSH, RST, SYN, and FIN. In SURPASS hiD 6615, you can configure RST and
SYN as the below.
• RST Configuration
• SYN Configuration
RST sends a message that TCP connection cannot be done to a person who tries to
make it. However, it is also possible to configure not to send the message. This func-
tion will help prevent that hackers can find impossible connections.
DDJ:A-M-5212B0-01 251
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To configure not to send the message that informs TCP connection cannot be done,
use the following command.
ip tcp ignore rst-unknown Global Configures not to send the message that informs TCP
SYN sets up TCP connection. SURPASS hiD 6615 transmits cookies with SYN to a
person who tries to make TCP connection. And only when transmitted cookies are re-
turned, it is possible to permit TCP connection. This function prevents connection over-
crowding because of accessed users who are not using and helps the other users use
service. To permit connection only when transmitted cookies are returned after sending
cookies with SYN, use the following command.
ip tcp syncookies Global Permits only when transmitted cookies are re-
252 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[Sample Configuration 1]
The following is an example of disabling RST and permitting only when transmitted
cookies are returned after sending cookies with SYN.
The packet routing based on host uses L3 table as it’s memory. It searches the infor-
mation of destination addess in L3 table to get the Nexthop information and transmits
packets through Rewriting process.
If it does not find the information of destination in L3 table, it refers to CPU routing table
and records Nexthop information in L3 table and then transmits the packets through
Rewriting process. hiD 6615 provides 4k of L3 table.
The packet routing based on network complements the ineffectual process of recording
with packet unit.
HiD 6615 uses LPT table as it’s memory and it provides 16k of LPM table.
To show the usage of L3 table, LPM table or interface used in packet routing, use the
following command.
show ip tables summary Enable Show the usage of L3 table or LPM table or interface.
DDJ:A-M-5212B0-01 253
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
This chapter describes main functions of this switch such as VLAN, Port trunking, and
STP. It contains the following sections.
• VLAN
• Port Trunking
• LACP Configuration
• STP and RSTP, PVST and MSTP
• Stacking
• Configuring Port Bandwidth
• Flood-Guard
• Configuring Bandwidth-share-group
• IP IGMP
• PIM-SM
• VRRP
• Bandwidth
• DHCP
• Broadcast Storm Control
• Blocking Direct Broadcast
254 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Every nodes in the same LAN could get the information from a node by Broadcast.
However, there’s the inconvenience of having unnecessary information from Broadcast.
Here, if you divide LAN into logical LAN again, nodes only on the same logical LAN
would get the information from Broadcast.
LAN, separated like this way is named VLAN (Virtual LAN). It is logical Network logi-
cally separated as user’s needs and a VLAN contains many ports. The network com-
posed of VLAN can transmit the packets only in the same VLAN if there’s no routing
function.
br 1 br 3
br 2
In the above figure, default, br2, br3 configured as VLAN is logically configured virtual
network. If it operates as Layer 2, it is possible to communicate in the same virtual net-
work, however it is impossible to communicate with other virtual network. SURPASS
hiD 6615 provides Layer 3 switching function so that it makes the ports in the other
VLAN to communicate with each other.
VLAN decreases Ethernet traffic to improve transmit rate and strengthens security by
transmission per VLAN. You can construct VLAN based on port, MAC address, and
protocol. VLAN based on the port designate VLAN as ports, a port could belong to
various VLANs. VLAN based on MAC addresses configures VLAN with their MAC ad-
DDJ:A-M-5212B0-01 255
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
dresses. Even though the administrator changes the connection port, VLAN is not
changed because it uses its own MAC address. Also, VLAN based on protocol is the
way of structuring VLAN by the protocol. SURPASS hiD 6615 supports VLAN based on
the port and the protocol. The number of VLAN which can be generated from VLAN is
4096 and it is possible to generate up to 8 VLAN based on the protocol.
In order to decide the packet path, first of all, VLAN based on the protocol is used.
When the packet is transmitted, it is forwarded to VLAN as the user configured. How-
ever, if the user did not configure VLAN for the packet, the packet path would be de-
cided according to the port.
SURPASS hiD 6615 according to IEEE 802.1q standards already has VLAN ID(PVID)
on the all ports. If the packet entering to Tagged port keeps its VLAN ID and the packet
transmitting to Untagged port receives PVID that the system configured. In other words,
if a port of SURPASS hiD 6615 ports constructing VLAN network can transmit packets
to VLAN by PVID.
The following is how to decide packet route by VLAN configured in SURPASS hiD 6615.
→ d → ets by giving
256 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
◆ Cost-Effective Way
When you use VLAN to prevent unnecessary traffic loading because of broadcast, you
can get cost-effective network composition since switch is not needed.
◆ Strengthened Security
Usually node shares broadcast information, in some case, authorization is required for
the information. VLAN supports the way for VLAN member consisted of only authorized
users so that network security can be more strengthened.
• Default VLAN
• Configuring VLAN based on the port
• Configuring VLAN based on the protocol
• Configuring VLAN based on MAC address
• Configuring VLAN based on Subnet
• Configuring QinQ
• Configuring FID
• Showing the configuration related to VLAN
In SURPASS hiD 6615, all ports are basically configured as Default VLAN. Default
VLAN designates PVID as 1 and it is impossible to deleted. In order to contain the ports
in newly generated VLAN without duplication, the user should delete the ports from De-
fault VLAN. The ports deleted from other VLAN are automatically contained in Default.
Also, the ports that are once the member port of Trunk port and then released are con-
tained in Default VLAN.
The following is an example of deleting port number 3 from br2 and showing it to return
to Default status again.
DDJ:A-M-5212B0-01 257
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to configure VLAN based on the port in SURPASS hiD 6615, first of all, newly
make VLAN and designate the member and assign PVID for them. The following de-
scribes VLAN configuration as follows.
• Making VLAN
• Specifying PVID
• Assigning Port in VLAN
• Releasing VLAN
In SURPASS hiD 6615, make vlan-name form “brN” (N=integer) in order to make VLAN.
Here, VID for each VLAN is automatically configured as “N”. In other words, VID for br2
is 2 and VID for br100 is 100. Default VLAN is VLAN that has VID 1.
Therefore the user can not make VLAN which has the name of default.
In order to configure new VLAN in user’s network, user the following command.
258 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
vlan create vlan-name Bridge By designating VLAN name, make new VLAN.
Make vlan-name form “brN” (N=integer) or “N”. If you input wrong letter, not BrN, the fol-
lowing message will be displayed.
In order to use vlan-name for “N”, you can input large range by using “-” and display
them by using “,”.
For the form “brN”, you should configure one by one.
In SURPASS hiD 6615, “N” for vlan-name is automatically configured as VID. For ex-
ample, if vlan-name is configured as “br2” or “2”, VID will be also “2”
The user can designate PVID. In order to designate PVID on the port, use the following
command.
vlan pvid port-number <1-4094> Bridge The user can configure PVID as their pleases. It is
After making VLAN newly, you should assign port for it. In SURPASS hiD 6615, be-
cause all ports are basically integrated in interface “default”, you should delete all ports
from “default” in order to assign ports to another VLAN without duplication.
In SURPASS hiD 6615, all ports basically belong to “default”. In order to assign them
to VLAN without duplication, fist of all, delete the ports from “default”.
DDJ:A-M-5212B0-01 259
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
vlan add vlan-name port-number Designate the port which VLAN to belong and
When you designate many ports in VLAN, displays the port number using “,” without va-
cancy. In order to designate a series of port range, input them using “-”.
After making VLAN, you can describe for specific VLAN. The following is a command of
describing for specific VLAN.
In order to delete VLAN configured in SURPASS hiD 6615, you should delete all ports
in appropriate VLAN first After disable VLAN interface, delete VLAN.
Step 1 In bridge mode, delete all ports in VLAN by using the commands.
Step 2 Enter interface mode from configuration mode in order to disable virtual inter-
face.
260 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If you delete VLAN, all ports in appropriate VALN will be disabled. There ports keep dis-
abled status until they are assigned to new VLAN.
In order to configure VLAN based on protocol, user should designate port, protocol and
PVID. If an entering packet corresponds to the protocol composing of VLAN, it is
transmitted to VLAN according to the configured PVID.
no vlan pvid port-number ether- Bridge Clears configured VLAN based on protocol.
type [ethertype]
In order to configure VLAN based on MAC address, user should designate MAC ad-
dress.
In order to configure VLAN based on MAC address, use the following command.
vlan macbase MAC-address <1- Bridge Configure VLAN based on MAC address
4094>
DDJ:A-M-5212B0-01 261
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to clear VLAN based on MAC address, use the following command.
no vlan macbase MAC-address Bridge Clears configured VLAN based on MAC address.
4094>
To make precedence between MAC address and Subnet based VLAN, user can
choose one of both with below command.
vlan precedence {MAC / Subnet} Bridge Configure precedence between MAC based VLAN
In existing network environment, suppose that there are two switches composed of dif-
ferent VLAN. For all switches connecting those two switches, VLAN should be config-
ured just the same. However, you don’t need to configure a number of VLAN by using
QinQ function in SURPASS hiD 6615.
262 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Network A-1
communication with PVID 10 Network A-1/A-2 and Network other
VLAN is configured with PVID 3.
In above figure, when Network A-1 sends packet to Network A-2, packets are transmit-
ted to QinQ port of SWITCH 1 and the transmitted packets are sent to Network A-2
through SWITCH 2 where Qin Q has been configured.
If you configure QinQ on the port connected to Network A-2, the original PVID shows
by taking off covered PVID.
Here, if packets are sent to SWITCH 1 from Network A-1, the packets going out from
QinQ port attaching other Tag. This Tag is to use transmit packets from Network where
a number of VLAN are configured. When packets are transmitted to Network A-2
through QinQ of SWITCH 2, the attached Tag on QinQ port is removed and the original
Tag of packet is transmitted.
Because not QinQ port but other ports should transmit Tagged packet, it should be con-
figured as Tagged port.
DDJ:A-M-5212B0-01 263
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to configure QinQ, configure the port where other VLAN is configured as QinQ
and configure PVID used for other VLAN ‘s network on that port. In case of 【 Figure
7-1-3 】The construction example of QinQ configuration, configure PVID as “3”.
Step 1 In order to configure the port where QinQ is configured, follow below order.
vlan dot1q-tunnel enable port-number Bridge Configure QinQ on the designated port.
The port where QinQ is configured does not operate as a member of VLAN.
Step 2 Configure the same PVID with network communicating to other VLAN on the
port where QinQ is configured.
vlan pvid port-number <1-4094> Bridge The user Configure PVID from 1~4094.
TPID(Tag Protocol Identifier) shows the kind of Tag protocol and currently used protocol.
The user can change TRIP.
In TPID, the port configuring 802.1q(0x8100) does not operate as the member of VLAN.
264 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
vlan dot1q-tunnel disable port-number Bridge Release the configuration as QinQ port.
This configuration is applied if only SURPASS hiD 6615 is used as L2 dedicated switch.
SURPASS hiD 6615 is actually Layer 3 switch and it is possible to use as Layer 2 dedi-
cated switch. In case the user uses it as Layer 2 switch, because there’s no routing
function, it is not possible to communicate between VLAN. Specially, the port desig-
nated as Uplink port should receive packets from all VLAN. In case of using it as Layer
2 switch, if the user doesn’t configure Uplink port in all VLAN, it is not possible to re-
ceive packets.
Therefore, in order to configure VLAN in Layer 2 Switch, you should configure Uplink
port to belong in all VLAN as below.
default
X
br2
External
Network
X
br3
br4 X
Uplink Port
DDJ:A-M-5212B0-01 265
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In the above configuration, when Untagged packet enters into port number 1, PVID
would attach tag 1. Because Uplink port 24 belongs to VLAN 1, it is possible to transmit
to port number 24.
The problem is Untagged packet entering into Uplink port. It is hardly known Untagged
packet coming down Uplink port would be transmitted to which port with what kind of
PVID.
default
X
br2
External
Network
? X
br3
br4 X
Uplink When untagged packets that
Port should be transmitted to br3
through Uplink port, it is impos-
sible to know what kind of PVID
should be attached
In order to transmit untagged packets Uplink port to the other port, you should create a
VLAN having all pots containing Uplink port as a member.
By this configuration, Uplink port recognizes all ports. Here, what helps packet trans-
mission is FID.FID is used to control MAC table and it is possible to inform the packet
266 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
process because same FID manages with same MAC table. If you don’t configure FID
equally, packet would be Flooded because the switch cannot recognize the information
through MAC table.
SWITCH(bridge)#
default
br2
External
Network br3
br4
Uplink
Port
Packet transmission to br3 is possible since a
connection is established among them.
Therefore for L2 exclusive use, add Uplink port to all VLAN as a member and create
one more VLAN having all ports as a member and configure FID equally for the com-
munication between VLANs. In order to configure FID, use the following command.
vlan fid vlan-name fid Bridge Fid value is from 1to 4094
DDJ:A-M-5212B0-01 267
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The Port Isolation feature is a method that restricts L2 switching between isolated ports
in a VLAN. But flows between isolated port and non-isolated port are not restricted. If
you configure ‘port protected’ command, packet cannot be transmitted between pro-
tected ports. However, to non-protected ports, communication is possible.
In SURPASS hiD 6615, it is possible to show port based VLAN, protocol based VLAN,
QinQ.How to show the configuration is as follows.
268 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
DDJ:A-M-5212B0-01 269
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
270 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The following is configuring protocol based VLAN on the port number 2 and port num-
ber 4.
With above configuration, the packets from port number 2 and 4 are decided according
to the protocol kinds. In case the protocol is incongruous, the route is decided accord-
ing to the port based VLAN.
DDJ:A-M-5212B0-01 271
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
10 port of SWITCH 1 and 11 port of SWITCH 2 are connected to the network where dif-
ferent VLAN is configured. In order to communicate without changing VLAN configura-
tion of SWITCH 1 and SWITCH 2 which communicate with PVID 10, configure it as fol-
lows.
You should configure the ports connected to network communicating with PVID 11 as
Tagged VLAN port.
The network
communicating
with PVID 11
272 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Configure br2, br3, br4 in SURPASS hiD 6615 configured Layer 2 environment and 24
ports as Uplink port is configured. In order to transmit Untagged packet through Uplink
port rightly, follow below configuration.
default
br2
External
Network br3
br4
Uplink
Port
DDJ:A-M-5212B0-01 273
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
LACP(Link Aggregation Control Protocol) complying with IEEE 802.3ad bundles sev-
eral physical ports together to from one logical port so that user can get enlarged
bandwidth”.
In SURPASS hiD 6615, it is possible to make the configured logical port with Link aggregation
up to maximum 14 and contain physical port in logical port up to 8.
SURPASS hiD 6615 supports two kinds of Link aggregation as port trunk and LACP.
There is a little difference in these two ways.
In case of Port Trunking, it is quite troublesome to set the configuration manually and
the rate to adjust to the network environment changes when connecting to the switch
using logical port. However, if the user configures physical port aggregated with the
logical port in each switches, the switches are connected as the configuration. There-
fore it is easier for user to configure comparing to the port trunk and could quickly re-
spond to the environmental changes.
SWICH C SWICH A
SWICH B
274 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Link aggregation function should be used for the above configuration. Here, if port trunk
is use for the configuration, first the user should configure the logical port by aggregat-
ing 3 physical ports and the logical ports by aggregating 2 physical ports. Configure a
logical port by aggregating 2 physical ports in SWITCH B and configure a logical port
by aggregating three physical ports. If the user connects the ports with cables, it oper-
ates as Link aggregation status.
However, using LACP could make the configuration to be easier. The link is automati-
cally generated if logical port and physical port which is going to be aggregated as logi-
cal port are configured.
For SWITCH A, after making two logical ports, designate 5 physical ports which will be
contained in the logical port. Then, even though there’s no configuration as above, it
operates as Link aggregation status by connecting the cable.The following is how to
configure port trunk and LACP.
Port trunking enables you to dynamically group similarly configured interfaces into a
single logical link (aggregate port) to increase bandwidth, while reducing the traffic
congestion.
In order to make logical port by aggregating the ports, use the following command.
trunk distmode <0-5> {dstipㅣ Designate physical port as logical port and
Bridge
dstmacㅣsrcdstipㅣsrcdstmacㅣ decide which packets are transmitted to the
DDJ:A-M-5212B0-01 275
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
It is possible to input Group-id from “0” to “13” because SURPASS hiD 6615 supports 14
logical ports.
If packets enter to logical port aggregating several ports and there’s no way to decide
packet route, the packets could be gathered on particular member port so that it is not
possible to use logical port effectively. Therefore SURPASS hiD 6615 is configured to
decide the way of packet route in order to divide on member port effectively when
packets enter. It is decided with Source IP address, Destination IP address, Source
MAC address, Destination Mac address and the user could get information of packets
to decided packet route. dstip is Destination IP address and dstmac means Destination
MAC address .srcdstip means Destination IP address and srcdstmac means Source
Destination MAC address. srcip is Source IP address and srcmac is Source MAC ad-
dress.
In SURPASS hiD 6615, Source Destination MAC address is basically used to decide
packet route.
The port designated as member port of port trunk is automatically deleted from existing
VLAN as the following example. Therefore, if member port and aggregated port exist in
other VLAN, VLAN configuration should be changed for the aggregated port.
If member port and aggregated port exist in other VLAN, VLAN configuration for aggre-
gated port should be changed.
In order to release the configured port trunk, use the following command.
If the user deleted member port from logical port or release port trunk, they are auto-
matically contained as Default VLAN.
276 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to show the configuration of port trunk, use the following command.
LACP(Link Aggregation Control Protocol) is the function of using more wide bandwidth
by aggregating more than two ports as a logical port as previously stated port trunk
function. However, what is different from port trunk is to make aggregated bandwidth
automatically in case logical Aggregator that aggregates the ports and physical mem-
ber port which will be aggregated as logical port are configured.
If the integrated port by configuring from port trunk is in other VLAN which is different
from VLAN where existing member port is originally belong to, it should be moved to
VLAN where the existing member port is belong to. However, the integrated port con-
figured by LACP is automatically added to appropriate VLAN.
The integrated port from LACP could support up to 14 so that it is possible to input Ag-
gregator-number from “0” to “13”.
• Enabling LACP
• Configuring packet route
• Configuring member port
• Configuring operation mode of member port
• Configuring the priority of the switch
• Deciding if LACP of member port is aggregated
• Configuring the cycle of BPDU transmission
• Configuring Key value of member port
• Configuring port priority
• Showing LACP configuration
DDJ:A-M-5212B0-01 277
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To configure LACP function in SURPASS hiD 6615, fist enable LACP function.
On the other hand, in order to release LACP and delete the configuration of LACP, use
the following command.
When packets enter to logical port integrating several ports, if there’s no process to de-
cide packet route, it is possible not to use logical port effectively from focusing packets
on a particular member port.
If packets enter to logical port aggregating several ports and there’s no way to decide
packet route, the packets could be gathered on particular member port so that it is not
possible to use logical port effectively.
Therefore SURPASS hiD 6615 is configured to decide the way of packet route in order
to divide on member port effectively when packets enter. It is decided with Source IP
address, Destination IP address, Source MAC address, Destination Mac address and
the user could get information of packets to decided packet route. dstip is Destination
IP address and dstmac means Destination MAC address .srcdstip means Destination
IP address and srcdstmac means Source Destination MAC address. srcip is Source IP
address and srcmac is Source MAC address.
In SURPASS hiD 6615, Source Destination MAC address is basically used to decide
packet route.
278 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
After configuring aggregator, you should configure packets transmitting aggregator port.
The following is the command of configuring packets transmitting aggregator port.
srcdstmacㅣsrcipㅣsrcmac } port.
After the configuration for Aggregator, configure the physical port that is a member of
aggregated port. In order to configure member port of aggregated port, use the follow-
ing command in Bridge mode.
After configuring member port, configure the mode of member port. There are two
kinds of mode of “Active Mode ” and “Passive mode ” in member port. The port of
Passive mode starts LACP when there’s Active mode on the port of opposite switch.
The priority of Active mode is higher that that of Passive mode so that the port of Pas-
sive mode follows the port of Active mode.
If each member ports of the connected switch is configured as“ active mode” and “pas-
sive mode”, “active mode” is the standard. If both switches are configured as “passive
mode”, Link for member ports of two switches is not realized.
DDJ:A-M-5212B0-01 279
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to configure the mode of member port, use the following command in Bridge
mode.
In order to release the operating mode of configured member port, use the following
command.
After releasing operating mode of configured member port, the basic configuration re-
turns to default.
In case the member ports of connected switches are configured as Active mode, it is
required to configure which switch would be a standard for it. For this case, the user
could configure the priority on switch.. The following is the command of configuring the
priority of the switch in LACP function.
lacp system priority <1-65535> Bridge Sets the priority of the switch in LACP function.
If each member ports of the connected switch is configured as“ active mode” and
“passive mode”, “active mode” is the standard. If all of them is configured as “active
mode”, the switch having higher priority would be the standard.
280 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to release the priority of configured switch, use the following command.
no lacp system priority Bridge Clears the priority of the configured switch.
After clearing operating mode of configured member port, the basic configuration re-
turns to default.
In SURPASS hiD 6615, the member port is basically configured to aggregated to LACP.
In order to clear aggregated to LACP of configured member port, use the following
command.
no lacp port aggregation port-number Bridge Clears the configured member in LACP.
DDJ:A-M-5212B0-01 281
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Member port transmits BPDU with it’s information. In SURPASS hiD 6615, it is possible
to configure the BPDU transmission rate, use the following command.
In SURPASS hiD 6615, BPDU transmission rate of member port is basically configured as
“long”.
no lacp port timeout port-number Bridge Clears BPDU transmission rate of configured
member port.
Member port of LACP has key value. All member ports in one aggregator have same
key values. In order to make an aggregator consisted of specified member ports, con-
figure different key value with key value of another port.
lacp port admin-key port-number <1-15> Bridge Configure Key value of member port.
In hiD 6615, key value of all ports are basically configured as “1”.
For example, switch A and switch B are linked with switch C in the below picture. Two
aggregators are configured in switch A and ports 7 ~ 10 are configured as member port.
One aggregator is configured in switch B and ports 7 ~ 8 are configured as member
port. And one aggregator is configured as switch C and port 9 ~ 10 are configured as
member port. After these configurations, ports 7~8 of switch A and B are linked with
ports 9~10 of switch A and C, then switch A is linked with switch B and C through ag-
gregators.
282 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH B
Meanwhile, switch A is linked with switch B in the below picture. Two aggregators are
configured in both switch A and B, ports 7~10 are configured as member port. With this
configuration, if ports 7~10 are connected through cable, one aggregator including the
ports is made. However, if key values of ports 7~10 are differently configured, two ag-
gregators are made.
SWITCH A
Internet
SWITCH B
DDJ:A-M-5212B0-01 283
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to delete key value of configured member port, use the following command.
no lacp port admin-key port-number Bridge Delete key value of member port.
If you delete Key value of configured member port, it returns to default configuration.
One aggregator can include maximum eight ports. When there are ten ports configured,
higher priories are selected. However, user can configure the priority when user wants
specific port to configure as member port regardless of its priority. In order to configure
priority of LACP member port, use the following command.
In SURPASS hiD 6615, the LACP priority of a member port is basically configured.
“32768(=0x8000)”.
In order to clear port priority of configured member port, use the following command.
no lacp port priority port-number Bridge Clears port priority of member port.
After releasing the priority of configuring member port, it returns to default configuration.
284 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH A
SWITCH B
DDJ:A-M-5212B0-01 285
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH_A(bridge)#
SWITCH_A(bridge)#
“AGGR” shows ID of Aggregator by using the “show lacp port” command. It is different
from Aggregator-number.
286 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH A
Internet
The following example is configuring two intergrate ports and 7-10 port as member port
in SWITCH A and SWITCH B without changing Key value.
<SWITCH A>
SWITCH_A(bridge)#
<SWITCH B>
DDJ:A-M-5212B0-01 287
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH_B(bridge)#
The above configiuration shows 4 integrated ports are integrated to a port. However,
you can make 2 integrated ports by configuring key value of port 7,8 and 9,10 in
SWITCH A and SWITCH B.
<SWITCH A>
SWITCH_A(bridge)#
<SWITCH B>
SWITCH_B(bridge)#
288 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
LAN, which is composed of double-path like token ring, has the advantage that it is
possible to access in case of disconnection with one path. However there is another
problem named Loop when you always use the double-path. Loop is; when there are
more than two paths between switches as below figure(SWITCH A,B), PC A sends
packet through broadcast or multicast and then the packet keeps rotating. It causes su-
perfluous data-transmission and network fault.
SWITCH A SWITCH B
PC A PC B
STP(Spanning-Tree Protocol) is the function to prevent Loop in LAN with more than two
paths and to utilize the double-path efficiently. It is specified in IEEE 802.1d. When STP
is configured, there is no Loop since it chooses more effective path of them and closes
the other path. In other words, when SWITCH C in the below figure sends packet to
SWITCH C, path 1 is chosen and path 2 is closed.
SWITCH A
SWITCH B SWITCH E
Path 1
Path 2 SWITCH D
SWITCH C
DDJ:A-M-5212B0-01 289
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Also, 802.1w includes 802.1d inside, so it can provide comparability with 802.1d. For
more detail description of STP and RSTP, refer to the following.
• STP operation
• RSTP operation
• Configuring STP/RSTP/MSTP/PVSTP/PVRSTP mode
• Configuring STP/RSTP/MSTP
• Configuring PVSTP/PVRSTP
• Configuring Root Guard
• BPDU(Bridge Protocol Data Unit) configuration
The 802.1d STP defines port state as Blocking, Listening, Learning, and Forwarding.
When STP is configured in LAN with double-path, switches exchange their information
including Bridge ID.
It is named as BPDU(Bridge Protocol Data Unit). Switches decide port state based on
exchanged BDPU and automatically decide optimized path to communicate with Root
switch as standard of Spanning-Tree.
◆ Root Switch
The critical information to decide Root switch is Bridge ID. Bridge ID is composed of 2
bytes-Priority and 6 Bytes-MAC address. The Root switch is decided with the lowest
Bridge ID.
SWITCH A
Priority : 8
ROOT
SWITCH B SWITCH C
Priority : 9 Priority : 10
SWITCH D
Fig. 8-13 Root Switch
290 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
For example, suppose there are three linked switches as below picture. After configur-
ing STP, switches exchange their information. The Priority of SWITCH A is 8, the Prior-
ity of SWITCH B is 9 and the Priority of SWITCH C is 10. In this case, SWITCH A is
automatically configured as Root switch.
◆ Designated Switch
After deciding Root switch, when SWTCH A transmits packet to SWITCH C, SWITCH A
compares exchanged BDPU to decide path. The critical information to decide path is
path-cost. Path-cost depends on transmit rate of LAN interface and path with lower
path-cost is selected.
The standard to decide designated switch is total Root path-cost which is added with
path-cost to Root. Path-cost depends on transmit rate of switch LAN interface and
switch with lower path-cost is selected to be designated switch.
SWITCH A
Priority : 8
ROOT
Designated
SWITCH
SWITCH B SWITCH C
Priority : 9 Priority : 10
SWITCH D
: Path 1
: Path2
(PATH 1=50+100=150, PATH 2=100+100=200, PATH 1< PATH 2, ∴ PATH 1 selected)
In case of the above picture showing SWITCH C sends packet, path-cost of PATH 1 is
150 and path- cost of PATH 2 is total 200(100 + 100 ; path-cost of SWITCH C to B +
path-cost of SWITCH B to C). Therefore lower path-cost, PATH 1 is chosen. In this
case, port connected to Root switch is named Root port. In the above picture, port of
SWITCH C connected to SWITCH A as Root switch is Root port. There can be only one
Root port in one equipment.
DDJ:A-M-5212B0-01 291
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The standard to decide designated switch is total Root path-cost which is added with path-
cost to Root. switch with lower path-cost is selected to be designated switch. When Root
path-costs are same, bridge ID is compared.
However, since Loop is created transmitting packet to SWITCH D, one of two must be
selected by comparing information of BDPU. As a result, if PATH 1 is selected, Des-
ignated switch against segment transmitted to SWITCH D is SWITCH B.
Except Root port in each switch, selected port to communicate is Designated port. The
other ports, except Root port and Designated port, are named Blocked port.
SWITCH A
ROOT
Designated▶
Port
SWITCH B
◀ Root Port
Designated
SWITCH
Designated ▶ SWITCH C
Port
PATH 1 PATH 2
SWITCH D
◆ Port-priority
Meanwhile, when path-costs of two paths are same, port-priority is compared. As the
below picture, suppose that two switches are connected.
Since the path-costs of two paths are 100, same, their port-priorities are compared and
port with smaller port-priority is selected to transmit packet.
292 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
- Path-cost 100
- Port priority 7
ROOT - Port 1
PATH 1
PATH 2
- Port 2
- Port priority 8
- Path-cost 100
PATH 1 port priority = 7, PATH 2 port priority = 8, PATH 1< PATH 2, ∴ PATH 1 is chosen )
All these functions are automatically performed by BDPU, which is the information of
switch. It is also possible to configure BDPU to change Root switch or path manually.
Refer to ‘8.4.4 Configuring BPDU (Bridge Protocol Data Unit) Transmission’.
When SRP or RSTP is configured on network where Loop can be created, result of the
last Previlegedology is same. However, RSTP is more rapidly progressed than STP at
the stage of reaching to the last Previlegedology. This section describes how the RSTP
more improved than STP works. It contains the below sections.
• Port States
• BPDU Policy
• Rapid Network Convergence
• Comparability with 802.1d
RSTP defines port states as Discarding, Learning, and Forwarding. Blocking of 802.1d
and Listening is combined into Discarding. Same as STP, Root port and Designated
port are decided by port state. But existing Blocked port is divided into Alternate port
and Backup port.
Alternate port means a port blocked by receiving BDPU of priority of high numerical
value from another equipment, and Backup port means a port blocked by receiving
BDPU of priority of high numerical value from another port of same equipment. The be-
low picture shows Alternate port and Backup port.
DDJ:A-M-5212B0-01 293
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH A
ROOT
SWITCH B SWITCH C
SWITCH D
The difference of between Alternate port and Backup port is that Alternate port can al-
ternate path of packet when there is a problem between Root switch and SWITCH C
but Backup port cannot provide stable connection in that case.
802.1d forwards BDPU following Hello-time installed in Root switch and the other
switch except Root switch its own BDPU only when receiving BDPU from Root switch.
However, in 802.1w not only Root switch but also all the other switches forward BDPU
following Hello-time. BDPU is more frequently changed than the interval Root switch
exchanges, but with 802.1w it becomes faster to be master of the situation of changing
network.
By the way, when low BDPU is received from Root switch or Designated switch, it is
immediately accepted. For example, suppose that Root switch is disconnected to
SIWTCH B. Then, SWITCH B is considered to be Root because of the disconnection
and forwards BDPU.
294 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH A
ROOT
New
ROOT PORT
▼
SWITCH B SWITCH C
BPDU including
Low BPDU Root information
② Transmit
BDPU at
SWITCH B SWITCH C Listen state
③ Blocking to
prevent Loop
: BPDU Flow-
SWITCH D
As the above picture, suppose that there is a new link connected between SWITCH A
and Root. Root and SIWTCH A is not directly connected, but indirectly through
SSIWTCH D. After SWITCH A is newly connected to Root, packet cannot be transmit-
ted between the ports because state of two switches becomes listening, and no Loop is
created.
DDJ:A-M-5212B0-01 295
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In this state, if Root transmits BDPU to SWITCH A, SWITCH A transmits new BDPU to
SWITCH A and SWITCH C, SIWTCH C transmits new BDPU to SWITCH D. SWITCH
D, which received BDPU from SWITCH C makes port connected to SWITCH C Block-
ing state to prevent Loop after new link.
This is very an epochal way of preventing Loop, the matter is that communication is
disconnected during two times of BDPU Forward-delay till a port connected to SIWTCH
D and SWITCH C is blocked.
The below picture shows the progress of 802.1w to save the time of disconnection.
There is a new link between SWITCH A and Root.
Then, right after the connection, it is possible to transmit BDPU although packet cannot
be transmitted between SIWTCH A and Root.
ROOT
① New link
SWITCH A created
② Negotiate between
SWITCH B SWITCH A and Root
SWITCH C
(Traffic Blocking)
SWITCH D
SWITCH A negotiates with Root through BDPU. To make link between SWITCH A
and Root, port state of non-edge designated port of SWITCH is changed to Blocking.
Although SWITCH A is connected to Root, Loop will not be created because SWITCH A
is blocked to SWITCH Band C. In this state, BDPU form Root is transmitted to SWITCH
B and C through SWITCH A. To configure Forwarding state of SWITCH A, SWITCH A
negotiates with SWITCH B and SWITCH A does with SWITCH C.
296 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
ROOT
③ Forwarding
SWITCH A
SWITCH D
SWITCH B has only edge-designated port. Edge designated does not cause Loop, so it
is defined in 802.1w to be changed to Forwarding state. Therefore, SWITCH B does
not need to block specific port to Forwarding state of SWITCH A. However since
SWITCH C has a port connected to SWITCH D, you should make Blocking sate of the
port.
ROOT
SWITCH A
SWITCH B SWITCH C
④ Blocking
to make Forwarding SWITCH D
state of SWITCH A
It is same with 802.1d to block the connection of SWITCH D and SWITCH C. However,
802.1w does not need any configured time to negotiate between switches to make
Forwarding state of specific port. So it is very fast progressed. During progress to For-
warding sate of port, Listening and Learning are not needed. These negotiations use
BDPU.
DDJ:A-M-5212B0-01 297
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
RSTP internally includes STP, so it has comparability with 802.1d. Therefore, RSTP
can recognize BDPU of STP. But, STP cannot recognize BDPU of RSTP. For example,
assume that SWITCH A and SWITCH B are operated as RSTP and SWITCH A is con-
nected to SWITCH C as Designated switch. Since SWITCH C, which is 802.1d ignores
RSTP BDPU, it is interpreted that SIWTCH C is not connected to any switch or seg-
ment.
However, SWITCH A converts a port received BDPU into RSTP of 802.1d because it
can read BDPU of SWITCH C. Then SWITCH C can read BDPU of SWITCH A and ac-
cepts SWITCH A as Designated switch.
STP BPDU
In order to operate the network more effectively, SURPASS hiD 6615 uses PVSTP(Per
VLAN Spanning Tree Protocol) or MSTP(Multiple Spanning Tree Protocol). It consti-
tutes the network with VLAN subdividing existing LAN domain logically and configure
the route by VLAN or VLAN group instead of existing routing protocol.
298 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
8.3.3.1. Operation
In case of STP/RSTP, there’s only a STP on all of VLAN and it does not provide multi-
ple Instances.
SWITCH A
Root
BPDU BPDU
SWITCH B SWITCH C
While existing STP is a protocol to prevent Loop in a LAN domain and PVSTP(Per
VLAN Spanning Tree Protocol) establishes STP per VLAN in order to realize Routing
suitable to VLAN environment.
In case of PVSTP/PVRSTP, each STP could be supported for a VLAN. In this case, it is
required to calculate 100 of STP from 100 of VLAN so that there’s a defect of burden-
ing on a switch.
SWITCH A
VLAN 1-50
VLAN 1-50
VLAN 51-100
VLAN 51-100
SWITCH B SWITCH C
DDJ:A-M-5212B0-01 299
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In IEEE 802.1s MSTP using RSTP for rapid convergence, it is possible to classify sev-
eral VLAN with Instance unit. Each Instance operates with different Spanning Tree Pre-
vilegedology.
It does not need to calculate all STP for several VLAN so that traffic overload could be
reduced. By reducing unnecessary overload and providing multiple transmission route
for data forwarding, it realizes load balancing and provides many VLAN through In-
stances.
SWITCH A
Instance 1 Instance 1
Instnace 2 Instance 2
SWITCH B SWITCH C
8.3.3.2. MSTP
300 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
CST
Legacy 802.1d
Region B(IST)
Legacy 802.1d
CST Root & IST Root
*B *C
IST Root
Instance 2 Instance 1
IST Root
Instance 2
*D Instance 1
*E
Region A(IST)
In CST, A and B are the switches operating with STP and C, D and, E are those operat-
ing with MSTP. First, in CST, CIST is established to decide CST Root. After CST Root is
decided, the closest switches to CST Root is decided as IST Root of the Region. Here,
CST Root in IST is IST Root.
DDJ:A-M-5212B0-01 301
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
CST
Legacy 802.1d
*B IST Root *C
Instance 2 Instance 1
IST Root
Instance 2
Instance 1
*D *E
Region A(IST)
In above situation, if B operates with MSTP, B will send it’s BPDU to CST Root and IST
Root in order to request itself to be CST Root. However, if any BPDU having higher pri-
ority than that of B is sent, B cannot be CST Root.
In SURPASS hiD 6615, the commands configuring MSTP are also used to configure
STP and RSTP. The commands configuring PVST are used to configure PVRSTP.
In SURPASS hiD 6615, in order to configure STP, fist of all, configure Force-version in
order to decide the mode. In order to decide Force-version, use the following command.
302 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to clear STP configuration from the switch, use the following command.
In order to enable STP, RSTP, MSTP in the Force-version, use the following command
in Bridge configuration mode.
With using above commands, STP, RSTP, MSTP can be enabled by the configuration.
Even though STP function does not operated, loop event does not occur in a switch
which belongs to the non-dual path LAN environment.
In order to disable configured STP, RSTP, or MSTP, use the following command.
In order establish STP, RSTP, or MSTP function, first of all, Root switch should be de-
cided. In STP or RSTP, it is Root switch and in MSTP it is IST Root switch. Each switch
has its own Bridge ID and Root switch on same LAN is decided by comparing their
Bridge ID. However, the user can change Root switch by configuring Priority for it. The
switch having lowest priority is decided as Root switch.
DDJ:A-M-5212B0-01 303
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to change Root switch by configuring Priority for it, use the following command..
After deciding Root switch, you need to decide to which route you will forward the
packet. To do this, the standard is path-cost.
You can use same commands to configure STP and RSTP, but their path-costs are to-
tally different. Please be careful not to make mistake.
4M 250
10M 100
100M 19
1G 4
10G 2
304 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
4M 20,000,000
10M 2,000,000
100M 200,000
1G 20,000
10G 2,000
When the route decided by path-cost gets overloading, you would better take another
route. Considering these situations, it is possible to configure path-cost of Root port so
that user can configure route manually.
When all conditions of two routes are same, the last standard to decide route is port-
priority. It is also possible to configure port priority so that user can configure route
manually.
DDJ:A-M-5212B0-01 305
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
STP edge port is a bridge port where STP does not need to be enabled, which means
loop detection does not need for the bottom switches or STP neighbor does not exist in
the bottom of the port.
In case of RSTP, STP should be enabled in edge port. If RSTP is not enabled on edge
port, packets transmitting the port would cause to exceed the convergence time. Once
a port is configured as Edge port, it is immediately changed into forwarding state.
In STP, Rapid transition is guranteed by 1:1 connectivity between two stations. If they
are connected as shared edge port, both stations could receive BPDU from a station. In
this case, you cannot guarantee Rapid transition in STP. To decide the link type, use
the following command.
306 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
With “auto” , the switch automatically decides the link type between point-to-point or
shared link type.
Full-duplex is considered as point-to-point link type and half-duplex is configured as
shared link type.
“force-false” is used for the interface which is connected by more than two bridges and
the administrator compulsorily configures the link type as shared link.
If MSTP is established in SURPASS hiD 6615, decide which MST Region the switch is
going to belong to by configuring MST Configuration ID. Configuration ID contains Re-
gion name, Revision, VLAN map.
In order to set Configuration ID, use the following command.
stp mst config-id name name Designate the name for the Region.
In case of configuring STP and RSTP, you don’t need to configure Configuration ID. If
it is configured, error message is displayed.
DDJ:A-M-5212B0-01 307
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
After configuring Configuration ID in SURPASS hiD 6615, you should apply the configu-
ration to the switch. After changing or deleting the configuration, you must apply it to
the switch. If not, it does not being injected into the switch.
In order to apply the configuration to the switch after configuring Configuration ID, use
the following command.
stp mst config-id commit Bridge Committing the configuration of the Region.
After deleting the configured Configuration ID, apply it to the switch using the above com-
mand.
In order to show the configuration after configuring STP, RSTP, MSTP, use the following
command.
With 「show stp」command, it is possible to show the information for STP/ RSTP/MSTP.
How to distinguish them is to check which one is marked on the「mode」.
In case STP or RSTP is configured in SURPASS hiD 6615, you should configure
mstid_range as「0」.
308 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In case of configure MSTP in switch, use the following command to show Configuration
ID.
show stp mst config-id currnet Shows the current Configuration ID.
For example, after the user configures Configuration ID, if you apply it to the switch with
stp mst config-di commit command, you can check Configuration ID with the show stp
mst config-id currnet command and the show stp mst config-id pending command.
However, if the user didn’t use stp mst config-di commit command in order to apply to
the switch after configuration, the configuration could be showed with show stp mst
config-id pending command and you can check the configuration with the show stp mst
config-id currnet command.
In SURPASS hiD 6615, in order to configure PVSTP or PVRSTP, fist of all, configure
Force-version in order to decide the mode. In order to decide Force-version, use the
following command.
PVSTP is activated after selecting PVSTP in Force-version using the above command
and PVRSTP is activated after selecting PVRSTP using the above commands.
Vlan-range can be input with VLAN name or integral. It is possible to input integral using
「-」.
In PVSTP and PVRSTP, it is possible to configure only the current VLAN. If you input
VLAN that does not exist, error message is displayed.
DDJ:A-M-5212B0-01 309
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
For the switches in LAN where dual pathdoesn’t exist, Loop does not generate even
though STP function is not configured. In order to release configured PVSTP, PVRSTP,
use the following command.
In order establish STP, RSTP, or MSTP function, first of all, Root switch should be de-
cided. Each switch has its own Bridge ID and Root switch on same LAN is decided by
comparing their Bridge ID. However, the user can change Root switch by configuring
Priority for it. The switch having lowest priority is decided as Root switch.
In order to change Root switch by configuring Priority for it, use the following command..
After deciding Root switch, you need to decide to which route you will forward the
packet. To do this, the standard is path-cost. Generally, path-cost depends on trans-
mission speed of LAN interface in switch. In case the route is overload based on Path-
cost, it is better to take another route.
By considering the situation, in SURPASS hiD 6615, the user can configure Path-cost
of Root port in order to designate the route on ones own. In order to configure Path-
310 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When all conditions of two routes are same, the last standard to decide route is port-
priority. It is also possible to configure port priority so that user can configure route
manually. In order to configure port-priority, use the following command.
Root-Guard is a feature that protects the LAN from an undesired switch becoming root.
It will be useful when integrating two LANs and want to keep the current root switch in
one LAN or VLAN from another switch becoming root switch of the network.
The switch having the lowest Bridge ID is supposed to be Root switch in STP network.
In hiD6615 switch, user can use Root-guard function to protect the Root- switch in the
STP network.
DDJ:A-M-5212B0-01 311
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
When superior message is transmitted to the root-guard enabled port on switch, the
port will be put into a blocking state, preventing the ranger switch from becoming root
for the entire VLAN and preserving the current root, block switch.
If BPDU is not transmitted to the switch while Forward Delay time, the Blocking status
is released automatically. Any switch as well as root switch can be configured as Root-
guard . That depends on the network topology.
number
Disables Root Guard
no stp mst root-guard MSTID_range port
number
There are two switches which configured as STP and RSTP. Usually, in this case, STP
portocol is used between two switches. But if someone configures the STP switch to
RSTP mode, what happens? Because the RSTP switch already recevied STP protocol
packet, the two switches still can work with STP mode even though RSTP is enabled at
both.
To prevent this, hiD6615 switch provides ‘stp clear-detected-recovery’ command. If
you enable this command, the switch checks STP protocol packet once again.
This command is not saved at configuration file. This means Restarting Protocol Migra-
tion should be enabled by user not by automatically.
312 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
◆ Hello time
Hello time decides an interval time when a switch transmits BPDU. It can be configured
from 1 to 10 seconds. The default is 2 seconds.
◆ Max Age
Root switch transmits new information every time based on information from another
switches. However, if there are many switches on network, it takes lots of time to
transmit BDPU. And if network status is changed while transmitting BDPU, this informa-
tion is useless. To get rid of useless information, Max Age is identified in each informa-
tion.
◆ Forward Delay
Switches find location of another switches connected to LAN though received BDPU
and transmit packets. Since it takes certain time to receive BDPU and find the location
before transmitting packet, switches send packet at regular interval. This interval time is
named Forward Delay.
The configuration for BPDU is applied as selected in Force-version. The same commands
are used for STP, RSTP and MSTP and the same commands are used for PVSTP and
PVRSTP.
DDJ:A-M-5212B0-01 313
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
stp mst hello-time <1 – 10> STP, RSTP, MSTP. The default setting of the sys-
tem is 2 seconds.
Bridge
Configures Hello time to transmit the message in
stp pvst hello-time vlan-range <1
PVST, PVRST. The default setting of the system
– 10>
is 2 seconds.
It is possible to configure Forward delay, which means time to take port status from Lis-
tening to Forwarding. In order to configure Forward delay, use the following command.
– 30> PVRSTP.
314 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Max Age shows how long path message is valid. In order to configure Max Age to de-
lete useless messages, use the following command.
stp pvst max-age vlan-range <6-40> Configures Max age in PVST or PVRST.
It is recommended that Max Age is configured less than twice of Forward Delay and
more than twice of Hello Time.
In order to release the configured Max age, use the following command.
In MSTP, it is possible to configure the number of Hop in order to prevent BPDU from
wandering. BPDU passes the switches as the number of Hop by this function.
In order to configure the number of Hop of BPDU in MSTP, use the following command.
DDJ:A-M-5212B0-01 315
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
stp mst max-hops <1-40> Bridge Configures the number of Hop for BPDU.
In order to delete the configured number of Hop for BPDU, use the following command.
no stp mst max-hops Bridge Delete the number of Hop for BPDU in MSTP.
BPDU filtering allows you to avoid transmitting on the ports that are connected to an
end system. If the BPDU Filter feature is enabled on the port, then incoming BPDUs
will be filtered and BPDUs will not be sent out of the port. To set the BPDU filter on the
port, use the following command.
stp bpdu-filter (enable|disable) Sets the BPDU filter state on the port.
Bridge
port-number
By default, it is disabled.
The bpdu filter-enabled port acts as if STP is disabled on the port. This feature can be used for the
ports that are usually connected to an end system or the port that you don’t want to receive and
send unwanted BPDU packets. Be cautious about using this feature on STP enabled uplink or trunk
port.
If the port is removed from VLAN membership, then correspond BPDU filter will be automati-
cally deleted.
BPUD guard is designed to allow network designers to enforce the STP domain bor-
ders and keep the active topology predictable. The devices behind the ports with STP
edge-port enabled are not allowed to influence the STP topology. This is achieved by
disabling the port upon receipt of BPDU. This feature prevents Denial of Service (DoS)
attack on the network by permanent STP recalculation That is caused by the temporary
introduction and subsequent removal of STP devices with low bridge priority.
316 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
However, BPDU Guard can be corrupted by unexpected cause. In this case, the edge
port is blocked immediately and remains at this state until user recovers it. To prevent
this problem, hiD6615 switch provides BPDU Guard auto-recovery function. When an
edge port is down for BPDU packet which came from other switch, the port is recov-
ered automatically after configured time.
<10-1000000> Bridge
time
User can also recover the down port by manually. To configure BPDU Guard err-
recovery, use the following command.
DDJ:A-M-5212B0-01 317
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to show the configuration for BPDU, use the following command.
Although there is no double path in user’s equipment, Loop can be caused by network
environment and cable condition connected to equipment. To prevent this, SURPASS
hiD 6615 has Self Loop detection to perceive that outgoing packet is got back. Through
the Self Loop detection, you can prevent packet, which comes back because it blocks
the port. In order to enable Self Loop detection, use the following command.
In order to check Self Loop detection or the port where Loop occurred, use the follow-
ing command.
318 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The following is an example of configuring PVSTP when Default and br2, br3 is config-
ured as VLAN.
DDJ:A-M-5212B0-01 319
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
8003.00d0cb000183 ( 3) enabled
SWITCH(bridge)#
The following is an example of changing Path-cost into 100 on the port number 1 in
PVSTP and showing the configuration.
SWITCH(bridge)#
320 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
name TEST
revision 1
instance vlans
-------------------------------------------------------------------
CIST 51-4094
2 1-50
-------------------------------------------------------------------
SWITCH(bridge)#
The following is an example of showing the configuration after enabling Self Loop De-
tection.
DDJ:A-M-5212B0-01 321
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Ethernet Ring Protection (ERP) is a concept and protocol optimized for fast failure de-
tection and recovery on Ethernet ring topologies. The Protection of fast failure detection
and recovery occurs on RM Node.
An Ethernet ring consists of two or more switches. One of the nodes on the ring is des-
ignated as redundancy manager (RM) and the two ring ports on the RM node are con-
figured as primary port and secondary port respectively.
The RM blocks the secondary port for all non-control traffic belong to this ERP domain.
Here, if Line failure occurs, the Nodes detecting Link Failure transmit Link Down mes-
sage and Link Failure port becomes Blocking status.
When the RM nodes receive this link-down message, it immediately declares failed
state, and opens the logically blocked protected VLANs on the secondary port. Then,
Ethernet Ring restarts the communication.
Normal Normal
Node Node
② Link failure
P
2.1.1. R
① Secondary Port of RM node is
Blocking status in Normal state.
Fig. 8-30 Ethernet ring operation in failure state
322 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
② Sends
Link Down Message
When a Link Failure is recovered, a temporary loop may occur. To rectify this condition,
ERP sends a “link up” message to the RM. The RM will logically block the protected
VLANs on its secondary port and generate a “RM link up” packet to make sure that all
transit nodes are properly reconfigured. This completes fault restoration and the ring is
back in normal state.
② The Nodes detecting Link Failure ② The Nodes detecting Link Failure
Send Link Up message Send Link Up message
DDJ:A-M-5212B0-01 323
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
③ Unblocks the
② Sends
port recovered
RM Link Up message
from Link Failure
S
8.4.2. LOTP
ERP recognizes the Link Failure using LOTP(Loss of Test Packet). RM Node regularly
sends RM Test Packet message. If the message is not retransmitted to RM Node
through Ethernet Ring, it means that Loop doesn’t occur. Therefore, RM Node unblocks
Secondary port. The condition that RM Test Packet from RM Node doesn’t return is
LOTP state.
To realize ERP, you should fist configure domain for ERP. To configure the domain, use
the following command.
324 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To add the description for configured domain, use the following command.
no erp rmnode domain-id Bridge Configures ERP Node Mode as Normal Node.
To configure Primary Port and Secondary port of RM Node, use the following command.
DDJ:A-M-5212B0-01 325
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
erp protections domain-id vid Bridge Configures Protected VLAN of ERP Domain.
The delete the configured Protected VLAN, use the following command.
326 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To return the configured Wait-to-Restore Time as Default, use the following command.
fault.
erp learn-dis-time domain-id <0-500> Bridge Configures ERP Learning Disable Time.
To return the configured Learning Disable Time as Default, use the following command.
default.
DDJ:A-M-5212B0-01 327
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To return ERP Test Packet Interval as Default, use the following command.
no erp test-packet-interval domain-id Bridge Configures ERP Test Packet Interval as default.
show erp {allㅣdomain-id} Enable/Globa l/Bridge Shows the information for ERP.
328 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[ Sample Configuration 1 ]
The following is an example of configuring primary port number 1, secondary port num-
ber 2, VLAN 201-300 as protection VLAN in a Domain when tree switches are con-
nected.
SWITCH A SWITCH B
RM Node
SWITCH C
Here, VID same as Domain ID should be configured before configuring ERP domain,
the port as Primary port and Secondary port should be configured as Tagged VLAN as
follows.
SWITCH(bridge)#
DDJ:A-M-5212B0-01 329
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
330 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
SWITCH_B(bridge)#
DDJ:A-M-5212B0-01 331
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH_C(bridge)#
332 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
8.5. Stacking
It is named One IP Management because you can easily manage various switches and
subscribers connected to the switch with this stacking function. SURPASS hiD 6615
provides the function.
SWITCH
Internet
SWITCH A
(Master switch) SWITCH SWITCH
SWITCH B
(Slave switch)
Manage with the same IP
SWITCH C
(Slave switch)
DDJ:A-M-5212B0-01 333
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You shold configure all the switches configured with stacking function to be in the same
VLAN. In order to configure the switches as a switch group which belongs in the same
VLAN, use the following command.
stack device bridge-name Global Configure all swithes configured with stakcing
For manging the stacking function, the port connecting Master switch and Slave switch
must be in the same VLAN.
After designating Master switch, register Slave switch for Master switch.
In order to register Slave switch or delete the registered Slave switch, use the following
command.
To make stacking operate well, it is required to enable the interface of Slave switch.
The switches in different VLAN cannot be added to the same switch group.
You shold register Slave switch registered in Master switch as Slave switch. In order to
334 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to show the configuration for stakcing, use the following command.
After configuring all stakcing configuration, it is possible to configure and mange by ac-
cessing to Slave switch from Master switch.
In order to access to Slave switch from Mater switch, use the following command in
Bridge configuration mode.
node-number means “node ID” from configuring stacking in Slave switch. If you input
the above command in Mater switch, Telnet connected to Slave switch is displayed and
it is possible to configure Slave switch using DSH command. If you use “exit” command
in Telnet, the connection to Slave switch is down.
DDJ:A-M-5212B0-01 335
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH A
(Master switch)
Step 1 Assign IP address in Interface configuration mode of Switch and enable inteface
using “no shutdown” command. In order to enter into Interface configuration mode, you
should enter into Interface configuration mode of VLAN to register as a switch group for
stacking.
If there are several switches, rest of them are managed by IP address of Master switch.
Therefore you don’t need to configure IP address in Slave switch.
Step 2 Configure Switch A as Master switch. Configure VLAN to belong in the same
switch group and after registering Slave switch, configure it as a Master switch.
336 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Step 3 Configure VLAN in order to belong to the same switch group in Switch B regis-
tered in Master switch as Slave switch and configure as a Slave switch.
Step 4 Show the configuration. The information you can check in Master switch and
Slave switch is different as belows.
The following is an example of accessing to Slave switch from Master switch config-
ured in [ Sample Configuration 1 ].. If you show the configuration of Slave switch in
[ Sample Configuration 1 ], you recognizes node-number is 2.
SWITCH(bridge)# rcommand 2
Trying 127.1.0.1(23)...
Connected to 127.1.0.1.
Escape character is '^]'.
SWITCH login: root
Password: vertex25
SWITCH#
DDJ:A-M-5212B0-01 337
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SWITCH# exit
Connection closed by foreign host.
SWITCH(bridge)#
User can customize port bandwidth according to user’s environment. Through this con-
figuration, you can prevent a certain port to monopolize whole bandwidth so that all
ports can use bandwidth equally. egress and ingress can be configured both to be
same and to be different.
Unless you input neither egress nor ingress, they are configured to be same. To switch,
egress is incoming packet. So, it is upload to PC user. On the otherhand, when the
packets over the configured bandwidth enter, Rate limit has been drop the packets un-
conditionally.
338 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The following is an example of the configuration after setting the bandwidth of port
number 1 as 64Mbps and the bandwidth of port number 2 as 52Mbps.
SWTICH(bridge)# rate 1 64
SWTICH(bridge)# rate 2 52
SWTICH(bridge)# show rate
----------------------------------------------------------------
Port Ingress Egress | Port Ingress Egress
--------------------------------+-------------------------------
1 64( 64.000) 64( 64.000) | 2 52( 52.000) 52( 52.000)
3 N/A N/A | 4 N/A N/A
5 N/A N/A | 6 N/A N/A
(Omitted)
SWTICH(bridge)#
8.7. Flood-Guard
Flood-guard limits number of packets, how many packets can be transmitted, in config-
ured bandwidth, whereas Rate limit described in 「 8.6 Configuring Rate Limit 」
controls packets through configuring width of bandwidth, which packets pass through.
This function prevents receiving packets more than configured amount without enlarg-
ing bandwidth.
3
Control . ‘n’ packets
bandwidth .
. allowed for
.
a second
n
DDJ:A-M-5212B0-01 339
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to limit the number of packets which can be transmitted in a second, use the
following command.
In order to clear the configured Flood Guard, use the following command.
In order to check the configuration of Flood Guard, use the following command.
[mac-address]
The following is an example of showing the configuration after limiting the number of
packets transmitted to the port number 1 as 10,000.
340 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
13 Unlimited | 14 Unlimited
15 Unlimited | 16 Unlimited
17 Unlimited | 18 Unlimited
(Omitted)
SWITCH(bridge)#
The Multicast packet is transmitted to a part of group request the Multicast packet.
IGMP(Internet Group Management Protocol) is the internet protocol that helps to inform
Multicast groups to Multicast router. In the Multicast Network, Multicast router sends
only IGMP Query massage that quest whether receive Multicast packet when Multicast
packet is transmitted.
If a switch sends the join massage to Multicast router, Multicast router transmits the
Multicast packet only to that switch.
Multicast Packet
Multicast Router
No packet transmission
Before join message. Sends IGMP Query Message
DDJ:A-M-5212B0-01 341
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Multicst Packet
Multicast Router
Muticast Packet
IGMP Snooping is a function that finds port, which sends 「Join message」to join in
specific multicast group to receive multicast packet or「leave message」to get out of
the multicast group because it does not need packets.
Only when the switch is connected to multicast router, IGMP Snooping can be enabled.
On the otherhand, in order to release IGMP snooping, use the following command in
Global Configuration Mode.
342 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Since PIM-SM includes IGMP Snooping, both IGMP Snooping and PIM-SM can be en-
abled at the same time.
4094> /Brigde
no ip igmp snooping querier vlan <1- Global Disables Querier in IGMP Snooping config-
show ip igmp snooping querier vlan Global Shows Querier in IGMP Snooping configured
<1-4094> in VLAN.
DDJ:A-M-5212B0-01 343
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
8.8.3. Fast-leave
If the Multicast client sends the leave massage to leave out Multicast group, Multicast
router sends IGMP Query massage to the client again, and when the client does not
respond, delete the client from the Multicast group.
Therefore, it takes time the Multicast router to delete the client. But, you can configure
the function that the client has no sooner sent the leave massage than Multicast router
has delete it from the Multicast group by using the following command. That function is
called fast-leave.
To remove fast-leave from the SURPASS hiD 6615, use the following command.
In order to view IGMP snooping fast-leave configration, use the following command.
If the clients in multicast group sends leave message in order to leave from multicast
group, multicast router sends IGMP Query message again. If there’s no respond about
the message, it takes some time because it deletes the host from multicast group.
In order to send IGMP Query message and configure the respond time, use the follow-
ing command.
344 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, the respond wating time is basically configured as 1000ms.
In order to release the waiting time for respond after sending IGMP Query message,
use the following command.
last-member-query-interval
Enable Show IGMP snooping last-member-query-
show ip igmp snooping
/Global interval configuration.
last-member-query-interval vlan
<1-4094>
DDJ:A-M-5212B0-01 345
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To designate the port connected to multicast router, use the following command.
ip igmp snooping mrouter port Designate the port where multicast router is
In order to release the port where multicast router is connected, use the following
command.
no ip igmp snooping mrouter port Release the port where multicast router is con-
port-number nected.
Global
no ip igmp snooping mrouter port Release the port where multicast router is con-
In order to view IGMP snooping mrouter configuration, use the following command.
When the Multicast packet is transmitted to the switch, the switch transmits it as IGMP
table. The packet that is registered in the IGMP group is transmitted to the interface of
the same group.
346 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
But, the unregistered Multicast packet can be transmitted from the device connected
with user’s switch, too. If the unregistered Multicast packet is transmitted to the switch,
the switch will drops or floods it as user’s decision. Therefore, you have to decide how
to do the unregistered packet.
Multicast
Packet of
Gourp A
Current IGMP Table
interface group
b, e A
Transmit to the b and
c registered in the
IGMP table
a b c d e
Fig. 8-38 Example ① The Multicast packet registered in the IGMP group
Multicast
Packet of
Group B
Current IGMP Table
a b c d e
In order to filter all unregistered multicast packet in IGMP table, use the following com-
mand.
DDJ:A-M-5212B0-01 347
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
User can filter IGMP packet, according to packet. In order to configure the policy of
IGMP packet filtering, use the following command.
name}
In order to view IGMP packet filtering configuration, use the following command.
348 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In the Multicast Network, it takes time that Multicast client send the join massage and
receive Multicast packet. But, SURPASS hiD 6615 can transmit Multicast packet
promptly when the client request the Multicast packet, because it receives Multicast
packets previously and keeps them.
If you want to keep the Multicast packets transmitted to do Multicasting quickly, config-
ure your switch to Multicast group by using the following command
After using the above command, you need to show that SURPASS hiD 6615 joins in
multicast group through multicast router. In order to do it, use the following command.
The above example is a case when there is no registration. It may vary according to
registered information.
In order to delete switch from multicast group, use the following command.
User can check IGMP Snooping Table with the following command.
number / cpu}
Global Shows IGMP Snooping table.
show ip igmp snooping state vlan vlan-id
{ip address}
DDJ:A-M-5212B0-01 349
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
IGMP is the protocol to help multicast communication between switch and host, and
PIM is the protocol for multicast communication between router and router. There are
two kinds of PIM, PIM-DM(Protocol Independent Multicast – Dense Mode) and PIM-
SM(Protocol Independent Multicast – Sparse Mode), SURPASS hiD 6615 supports
PIM-SM.
Protocol of dense mode can send information about data packet and member to inter-
face, which is not connected to multicast source or receiver, and multicast router saves
connection state to all the nodes. In this case, when most hosts are belonged to multi-
cast group and there is enough bandwidth to support flow of controlling message be-
tween constituent members, these overheads are acceptable, but the other cases are
inefficient.
Contrary to dense mode, PIM-SM receives multicast packet only when request comes
from specific host in multicast group. Therefore PIM-SM is proper when constituent
members of group are dispersed in wide area or bandwidth used for the whole is small.
Sparse mode is the most useful on WAN and can be used on LAN. For standard of
PIM-SM, you can refer to RFC 2362.
RP(Rendezvous Point) works in a central role for PIM-SM. Viewing the below chart,
multicast packet is transmitted to D as RP from A as source, through B and C. And
D(RP) transmits multicast packet after receiving join message from E or F. That is, all
multicast packets are transmitted with passing through RP(Rendezvous Point). For in-
stance, even though F needs multicast packet, the packet is passed through 『A → B
→ C → D → C →F』, not 『A → B → C → F』.
Like this, route made with focusing on RP is RPT(Rendezvous Point Tree) or shared
tree. There is only one RP in one multicast group. RPT has (*, G) entry because re-
ceiver can send a message to RP without knowing source. “G” means multicast group.
350 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
1.Multicast packet
transmitted to RP
A
B
2. Asks RP for
multicast packet
D
E Source
RP 2. Asks RP for
(Rendezvous Point) multicast packet
3. RP transmits multicast
packet for the request.
C F
3. RP transmits multicast
packet for the request.
RP
(Rendezvous Point) F
3. RP transmits multicast
packet for the request.
DDJ:A-M-5212B0-01 351
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to configure PIM-SM in SURPASS hiD 6615, you should refer to the following
sections.
• Enabling PIM-SM
• Deciding RP
• Configuring Static RP
• Configuring BSR
• Configuring RP Information
• Configuring Assert message Information
• Whole-packet-checksum
• Configuring Interval of Cache-check
• Configuring Multicast Routing Table
• Configuring Multicast Routing vid
• Configuring PIM-SM on Ethernet Interface
• Viewing PIM-SM Information
Before configuring PIM-SM in switch, you should enable PIM-SM. In order to enable
PIM-SM, use the following command. When you enable PIM-SM by using the following
command, the system is supposed to enter into PIM configuration mode. When you en-
ter into PIM configuration mode, the system prompt is changed to
SWITCH(config_pim)# from SWITCH(config)#.
router pim Global Enables PIM-SM and enters into PIM configuration mode.
PIM-SM supports both IGMP Querier and IGMP Snooping, therefore you cannot configure
them at the same time.
The commands, “ip igmp static” and “ip igmp fast-leave” can be used when IGMP
and PIM-SM are enabled at same time.
no router pim Global Enables PIM-SM and enters into PIM configuration mode.
352 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[Sample Configuration 1]
The following is an example of enabling PIM-SM and entering into PIM configuration
mode from configuration mode.
Use “exit” command to go back to configuration mode. And use “end” command to en-
ter into Privilege Exec Enable Mode.
SWITCH(config_pim)# exit
SWITCH(config)#
SWITCH(config_pim)# end
SWITCH#
8.9.2. Deciding RP
There are two ways to decide RP as central of PIM-SM on multicast network. One is
that network administrator manually decides RP and the other way is that RP is auto-
matically decided by exchanging information between multicast routers installed on
network. The information transmitted between multicast routers in the automatic way is
called Bootstrap message and the router, which sends this Bootstrap message, is
called BSR(Bootstrap Router). All PIM routers existed on multicast network can be BSR.
Routers that want to be BSP are named candidate-BSR and one router, which has the
highest priority, becomes BSR among them. If there are routers, which have same pri-
ority, then one router, which has the highest IP address, becomes BSR. Bootstrap
message includes priority to decide BSR, hash-mark to be used in Hash, and RP in-
formation. After deciding BSR, routers, which support RP, transmit candidate-RP mes-
sage to BSR. Candidate-RP message includes priority, IP address, and multicast group.
Then BSR adds candidate-RP message to Bootstrap message and transmits it to an-
other PIM router. Through this transmitted Bootstrap message, RP of multicast group is
decided.
User’s equipment belonged in PIM-SM network can be candidate-BSR and BSR is de-
cided among them. Candidate-BSR transmits Bootstrap message to decide BSR. You
can configure priority to decide BSR among Bootstrap messages and Hash-mask in
SURPASS hiD 6615.
DDJ:A-M-5212B0-01 353
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
The information transmitted between multicast routers in the automatic way is called
Bootstrap message and the router, which sends this Bootstrap message, is called
BSR(Bootstrap Router). All PIM routers existed on multicast network can be BSR.
Routers, which want to be BSP, are named candidate-BSR and one router, which has
the highest priority, becomes BSR among them. If there are routers, which have same
priority, then one router, which has the highest IP address, becomes BSR.
• Candidate-BSR IP Address
• Candidate-BSR Priority
• Candidate-BSR Hash-mask
354 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Since it is possible to assign several IP addresses in SURPASS hiD 6615, the switch
may have several IP addresses assigned. User can select one IP address among sev-
eral IP addresses to be used in switch as candidate-BSR. In order to select IP address
to be used in candidate-BSR, use the following command.
When you decide BSR among candidate-BSRs, priority in Bootstrap message is com-
pared to decide it. The highest priority of candidate-BSR becomes BSR. In order to
configure priority of Bootstrap message, use the following command.
DDJ:A-M-5212B0-01 355
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 2]
356 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
• Candidate-RP IP Address
• Multicast Group of Candidate-RP
• Candidate-RP Priority
• Interval of Candidate-RP Information Transmit
• Blocking Candidate-RP of Another Member
DDJ:A-M-5212B0-01 357
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
When BSR decides RP, priority of candidate-RP is compared. In order to configure this
priority, use the following command.
358 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to delete interval to transmit candidate-RP message, use the following com-
mand.
[Sample Configuration 3]
DDJ:A-M-5212B0-01 359
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
One network may include different multicast groups and routers that are not members
of multicast group. Therefore it can happen that routers, which are members of another
network or not members of multicast group, apply for RP and transmit candidate-RP
message.
In order to prevent this case, user can block candidate-RP message of another router
by making only candidate-RP in multicast group communicate. In order to block candi-
date-RP message from routers which are not members, perform the below tasks.
cand-rp access deny network-address PIM Blocks all packets transmitted on specified
network.
Step 2 Allow only packets transmitted by routers that will exchange candidate-RP
message.
cand-rp access permit ip-address/M PIM Allows only packets transmitted by routers
360 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[Sample Configuration 4]
The following is an example of allowing only packets transmitted by routers that will ex-
change candidate-RP message and showing it.
DDJ:A-M-5212B0-01 361
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
When there are several PIM-SM routers on same LAN, they may exchange packets are
not needed. In order to prevent this problem, you need to assign one PIM-SM router to
transmit multicast packet. In this case, assigned router is named Assert.
In the below example, there are router B, C which can transmit multicast packet in case
of receiving Join message from receiver. D and E, which send Join message, cannot
decide which router to receive.
And C may transmit same packet to B belonged in multicast group. In this case, if As-
sert is decided, multicast group is well organized because D and E transmit Join
message only to Assert.
RP
A
B C
Unnecessary
same packet sent
When Assert is decided, Metric and Preference in Assert message are compared.
Lower Metric has priority and higher Preference has priority.
• Configuring Metric
• Configuring Preference
362 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to delete configured Metric of Assert message, use the following command.
In order to delete configured Preference of Assert message, use the following com-
mand.
DDJ:A-M-5212B0-01 363
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 5]
SWITCH(config_pim)# metric 1
SWITCH(config_pim)# preference 1
SWITCH(config_pim)# show running-config
Building configuration...
(Omitted)
router pim
preference 1
metric 1
(Omitted)
SWITCH(config_pim)#
8.9.7. Whole-packet-checksum
Source
Multicast Packet
First-Hop Router
RP
Fig. 8-43 Network that multicast source are not directly connected to multicast group
364 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to follow RFC standard by deleting comparability with Cisco router, use the fol-
lowing command.
RP receives packet from multicast source and transmits it to receiver. However, it there
is no packet received from source for certain period, it is not necessary to keep multi-
cast item. Therefore, RP checks whether packet is received from source at regular in-
terval and this function is named Cache-check. In order to configure the interval of
Cache-check, use the following command.
DDJ:A-M-5212B0-01 365
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Source
B(RP) A C
SPT
RPT
However, user can configure ROUTER D as RPF by configuring multicast routing table
manually. It is possible for users to configure router as RPF by configuring multicast
routing table manually.
In order to configure multicast routing table manually to configure RPF, use the follow-
ing command.
366 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to delete configured multicast routing table, use the following command.
You need to enter into Interface configuration mode of specified interface for activating
PIM-SM on Ethernet Interface. In order to enter into Interface configuration mode, use
the following command.
In order to activate PIM-SM after entering into the Interface configuration mode, use the
following command.
DDJ:A-M-5212B0-01 367
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
It may happen that some of receivers in multicast group cannot receive packet because
of not satisfying terms to receive multicast packet. It is possible to configure not to re-
ceive multicast packets that cannot be sent to receiver.
In order to block transmitting packet to specified multicast group, use the following
command.
When all equipments configured PIM are considered as one big PIM domain, it may
cause that unnecessary Bootstrap messages can be transmitted between group mem-
bers which are operated as different service, and then it results to confuse to decide
RP.
To prevent this problem, you can prohibit transmitting Bootstrap message between mul-
ticast groups, which are operated as different service.
368 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Source A Source B
Multicast Packet
Multicast Packet
Bootstrap Message
Mutlcast Domain A blocked
DDJ:A-M-5212B0-01 369
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Unless you configure Assert message information on Ethernet interface, value config-
ured at “7.6.6 Configuring Assert Message Information” is used on all interfaces.
In order to configure Assert message interface on Ethernet interface, use the following
commands.
In order to delete configured Assert message information on Ethernet interface, use the
following commands.
370 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
[Sample Configuration 6]
SWITCH(config)# interface 1
SWITCH(config-if)# ip pim sparse-mode
SWITCH(config-if)# ip pim border
SWITCH(config-if)# ip pim metric 5
SWITCH(config-if)# ip pim preference 10
SWITCH(config-if)# ip pim threshold 100
SWITCH(config-if)# show running-config
Building configuration...
(omitted)
interface 1
no shutdown
ip address 172.16.209.1/16
ip pim sparse-mode
ip pim threshold 100
ip pim preference 10
ip pim metric 5
ip pim border
!
router pim
preference 1
metric 1
!
ip route 0.0.0.0/0 172.16.1.254
(omitted)
!
no snmp
!
SWITCH(config-if)#
DDJ:A-M-5212B0-01 371
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
8.9.11.3. RP Table
show ip pim rp group ip- address able/Global Shows RP table recorded in switch.
In order to view PIM-SM configured on Ethernet interface, use the following command.
372 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to view static IP multicast routing table, use the following command.
DDJ:A-M-5212B0-01 373
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Internet
Virtual Router
Associate IP : 10.0.0.5/24
In case routers have same priorities, then a router, which has lower IP address, gets
the precedence. The below picture shows an example of configuring three routers
which have IP addresses, 10.0.0.1/24, 10.0.0.2/24 and 10.0.0.3/24 for each one as Vir-
tual router by Associated IP,10.0.0.5/24. If theses three routers have same Priority, a
router, which has the smallest IP, address, 10.0.0.1/24 is decided to be Master Router.
Also, switches and PCs connected to the Virtual Router are to have IP address of Vir-
tual Router, 10.0.0.5/24 as default gateway.
374 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure SURPASS hiD 6615 as device in Virtual Router, use the following
command on configuration mode. Then you can configure VRRP by entering into
VRRP configuration mode.
The following is an example of entering into VRRP configuration mode by using the
above command. When you enter into VRRP configuration mode, the system prompt
will be changed for SWITCH(config-vrrp)# from SWITCH(config)#.
show vrrp interface inter- Enable/Global Shows current configuration of specified inter-
Enable/Global
/Bridge
show running-config Shows switch’s configuration.
/Interface
/VRRP
In order to return into configuration mode, or to enter into Privilege Exec Enable Mode,
use the following commands.
DDJ:A-M-5212B0-01 375
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
After configuring Virtual Router, you need to assign Associated IP address in Virtual
Router. Assign unified IP address to routers in one Group.
If you configure the function of accessing Associated IP address , you can access As-
sociated IP address by the commands such as ping.
To configure the function of accessing Associated IP address, use the following com-
mand.
IP address.
Siemens, Inc. products configure Master Router and Backup Router by comparing Pri-
ority and IP address of devices in Virtual Router. First of all, it compares Priority. A de-
vice, which has higher Priority, is to be higher precedence. And when devices have
same Priority, then it compares IP address. A device, which has lower IP address, is to
be higher precedence. In case of trouble with Master Router, when there are more than
two routers, one of them is selected according to their precedence.
376 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure Priority of Virtual Router or delete the configuration, use the follow-
ing commands.
In order to set Vrrp timers or delete the configuration, use the following commands.
The following is an example of configuring Master Router and Backup Router by com-
paring their Priorities: Virtual Routers, Layer 3 SWITCH 1 – 101 and Layer 3 SWITCH 2
– 102. Then, regardless of IP addresses, one that has higher Priority, Layer 3 SWITCH
2 becomes Master Router.
DDJ:A-M-5212B0-01 377
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
By default, Priority of SURPASS hiD 6615 is configured as “100”. So, unless you con-
figure specific Priority, this switch becomes Master Router because a device, which has
lower IP address, has higher precedence.
Also, when there are more than two Backup Routers, IP addresses are compared to
decide order. The following is an example of configuring Master Router and Backup
Router by comparing IP addresses: Virtual Routers, Layer 3 SWITCH 1 – 10.0.0.1 and
Layer 3 SWITCH 2 – 10.0.0.2.
378 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When the link connected to Master Router of VRRP is off as below, if link of Master
Router is not recognized, the users on the interface are not able to communicate be-
cause the interface is not able to access to Master Router.
In the condition that Link to VRRP's master router is link down as the figure shown be-
low, if the link of Master Router cannot be recognized, the communication would be im-
possible..
DDJ:A-M-5212B0-01 379
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, you can configure Master Router to be changed by giving lower
Priority to Master Router when the link of Mater Router is disconnected. This function is
VRRP Track.
Internet
Virtual Router
Associate IP : 10.0.0.5/24
① Link down
In order to configure VRRP Track in SURPASS hiD 6615, use the following command.
track interface interface-name prior- Configures VRRP Track. The Priority becomes
VRRP
ity <1-254> lower as the configured value.
If the user configures priority value as less than 1, the priority will be 1.
380 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If you configure VIP as your IP address, so priority becomes 255, the priority does not
become lower by Track function.
After user configures Virtual Router, if anyone knows Group ID And Associated IP ad-
dress, it is possible to configure another devices as Virtual Router. To prevent it, user
needs to configure a password, named authentication password that can be used only
in Virtual Router user configured. In order to configure an authentication password for
security of Virtual Router, use the following command on VRRP configuration mode.
DDJ:A-M-5212B0-01 381
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Preempt is a function that an added device with the highest Priority user gave is auto-
matically configured as Master Router without rebooting or specific configuration when
you add an other device after Virtual Router is configured. In order to configure Pre-
empt, use the following command on VRRP configuration mode.
SWITCH(config)#
Also, in order to make Preempt “enable” as default setting, use the following command
on VRRP configuration mode.
382 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Master Router in Virtual Router transmits its data to the other routers in VRRP group at
regular interval. The interval is named as Advertisement Time. User can configure Ad-
vertisement Time in SURPASS hiD 6615. In order to configure Advertisement Time, use
the following command on VRRP configuration mode.
SWITCH(config)#
In order to delete configured Advertisement Time for default setting, use the following
command.
For SURPASS hiD 6615, Advertisement Time can be configured for 1 second to 10
seconds.
DDJ:A-M-5212B0-01 383
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to view statistics that packets have bees sent and received, use the following
command.
show vrrp stat View/ Enable/Global Shows statistics of packets in Virtual Router Group.
SWITCH(config)#
In order to clear statistics that packets have bees sent and received, use the following
command.
384 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
8.11. Bandwidth
Routing protocol uses bandwidth information to measure routing distance value. In or-
der to configure bandwidth of interface, use the following command.
The bandwidth can be from 1 to 10,000,000Kbits. This bandwidth is for routing information
implement and it does not concern physical bandwidth.
8.12. DHCP
◆ Saving COST
With limited IP source, many users can connect to internet. So, it can save IP source
and the cost.
DDJ:A-M-5212B0-01 385
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
DHCP Server
IP Request
(Broadcast)
DHCP Pack
(Unicast)
PC PC PC
Subnet
※ PC=DHCP Client
SURPASS hiD 6615 can be the DHCP server or the DHCP Relay agent according to
user’s configuration. The DHCP Relay agent’s function is to connect the DHCP server
to the DHCP client.You need to know the following functions.
In order to provide DHCP server to DHCP client by configuring the switch as DHCP
server, configure as switch as DHCP server mode.
386 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure the user’s switch as DHCP server, use the following command in
Configuration mode.
ip dhcp active server Global Configures the user’s switch as DHCP server.
Meanwhile, SURPASS hiD 6615 supports special function that prohibits assigning plu-
ral IP address to one MAC address. Usually, SURPASS hiD 6615 assigns IP address to
equipment, which already has assigned IP address because it may need more than
one IP address.
However, although personal computer does not need plural IP addresses, it gets them.
This function prevents that case. In other words, it is possible for SURPASS hiD 6615
both to assign plural IP address to equipments and also prohibit assigning plural IP ad-
dress to one MAC address. In order to prohibit assigning plural IP address to one MAC
address, use the following command.
When you do not need the function to prohibit assigning IP address to one MAC address,
activate DHCP server with the command, “ip dhcp server”.
no ip dhcp active server Global Disable the user’s switch as DHCP server.
8.12.2. IP Pool
The assembly place for IP address which DHCP server assign to clients is called IP
Pool. The manager can configure the name for their IP Pool. If you configure the name
for IP Pool, you will enter DHCP IP Pool configuration mode. After that, system prompt
DDJ:A-M-5212B0-01 387
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In IP Pool configuration mode, you can configure subnet, the range of IP address, de-
fault gateway of subnet. In order to enter from IP Pool configuration mode to configura-
tion mode, input the command “exit” and in order to enter Privilege Exec Enable Mode
immediately, input the “end” command. In order to delete configured IP Pool , use the
following command in Global Configuration Mode.
In order to designate the subnet, use the following command in IP Pool configuration
mode.
388 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You have to configure default gateway all IP addresses can be allowed so that DHCP
server can communicate with unspecified IP address. In order to configure default
gateway of subnet, use the following command.
address IP Pool
After configuring DHCP subnet, you need to configure IP address range used in the
subnet.
In order to delete the configured IP address range, use the following command.
DDJ:A-M-5212B0-01 389
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
DHCP server administrator can configure the available time to use IP address assigned
to DHCP client. This time is named IP address lease time. The default is one-hour and
the system asks if DHCP client wants to extend it by the end of the time. In order to
configure IP address lease time, use the following command.
The default is one hour(3600 seconds), and the maximum is two hours.
DHCP server basically informs IP address, default gateway, IP address lease time ,and
available DNS server when DHCP client is accessed. Therefore, you should register
DNS server that can be used in DHCP server. You can register up to two servers.
390 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to delete the configured DNS server, use the following command.
In order to check lease data of IP address which is assigned to the IP Pool, use the fol-
lowing command.
abandonㅣofferㅣfixedㅣfree} pool-
Global Check the list of assigned IP address.
name
fixed shows fixed-IP addresses and bound shows IP addresses assigned from the
server by Discover-Offer-Request-Ack when a clinet requests IP address to the server
and offer shows IP address that the server presented to the client in offer stage. free
DDJ:A-M-5212B0-01 391
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
shows the addresses that the clients can currently use and abandon shows IP ad-
dresses that have been requested from the clients even the server did not present
them and you can check all of the IP addresses with the command all.
[Sample Configuration 1]
The default gateway of subnet is configured as 192.168.1.254 and DHCP server is ac-
tivated.
Supported informations:
Lease time (default) 3600
Lease time (Maximum) 3600
Default gateway
192.168.1.254
SWITCH(config)#
392 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to check the assigned IP addresses of each IP Pool, use the following com-
mand.
In SURPASS hiD 6615, it is possible to block to use IP Pool resources as fixed by us-
ing the assigned IP addresses without renewing them.
The following is the commands of blocking the user who uses IP address as fixed.
ip dhcp authorized-arp
Use IP address for lease-time. Blok the
{default-lease-timeㅣhalf-lease-timeㅣ
Global fixed IP.
max-lease-time}
You can check the information of valid IP and invalid IP after enabling “ blocking the
fixed IP” function using the following commands.
show ip dhcp authorized-arp invalid and the used IP address and the time of
blocking IP address.
DDJ:A-M-5212B0-01 393
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to deleted the data of fixed IP, use the following command.
In SURPASS hiD 6615, it is possible to block the specific client with MAC address. If
the blocked MAC address by an administrator requests IP address, the server does not
assign IP. This function is to strength the security of DHCP server.
ip dhcp filter-port port-number Global Configure the port in order not to assign IP.
IP address.
394 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
DHCP server basically informs IP address, default gateway, IP address lease time ,and
available DNS server when DHCP client is accessed. Therefore, you should register
DNS server that can be used in DHCP server. You can register up to two servers. This
server is applied to all IP Pools if you don’t configure DNS server for IP Pools seper-
ately.
In order to register DNS server that is common to all IP Pools, use the following com-
mand in IP Pool mode.
In order to delete the registered DNS server, use the following command.
address
Global
no ip dhcp default-config dns-server ip- Delete all registered DNS server..
address
DHCP server administrator can configure IP available time that is common to all IP
Pools. This time is applied to all IP Pools if you don’t configure DNS server for IP Pools
seperately. The default time is an hour and the server sends Request Packet in order to
ask if DHCP clinet prolongs the time of using IP.
To configure available time of using IP, use the following command in Global Configura-
tion Mode.
ip dhcp default-config lease-time defalut Configure default time of using IP. The
DDJ:A-M-5212B0-01 395
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, the default time for using IP address is 1 hour (3600 sec).
In order to release the the configured time, use the following command.
fault Global
You can configure the system to forward IP address that is requested from DHCP cli-
ents in hiD 6615. It called the DHCP Relay agent. The DHCP Relay agent is of avail to
manage a wide DHCP subnet.
DHCP Server
※ PC=DHCP Client
PC PC PC PC PC PC
Subnet 1 Subnet 2
The following is how to configure SURPASS hiD 6615 as DHCP Relay agent.
After configuring SURPASS hiD 6615 as Relay agent, register DHCP server. In order to
register DHCP server, use the following command in Global Configuration Mode.
396 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
ip dhcp active relay server-address Register DHCP server and configure the user’s
Global
[server-address2] [server-address 3] switch as Relay agent.
The following is how to delete the registered DHCP server and configuring the user’s
switch as Relay agent.
[ Sample Configuration 1 ]
The following is an example of configuring DHCP Relay and register DHCP server.
!
SWITCH(config)#
hiD6615 switch offers an enhanced DHCP security feature, called DHCP snooping, that
allows Network Administrator to be able to utilize and configure the certain ports in or-
der to restrict access to only authorized traffic.
Enabling DHCP Snooping on the port will only permit authorized traffic and filter out all
other traffics which are not recorded in DHCP snooping table. For instance, once a user
gets DHCP address from the server, his IP address, MAC address and Lease Time are
stored in the DHCP snooping table. Only this IP address traffic is permitted and all
other users who have static IP address or don’t have dynamic assigned IP address will
be denied.
DDJ:A-M-5212B0-01 397
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
This feature is designed for isolating malicious activity and disallowing possible attacks
from unauthorized users.
When you configure DHCP snooping on your switch, use the following command
You are able to delete certain IP address in the DHCP snooping table. Once the entry is
removed from the table, the user must be re-authorized in order to continue to use the
network services.
address/m
Global Removes IP address of Entry.
clear ip dhcp snooping port-number
subnet-address/m
The DHCP snooping table contains IP address, MAC address and Lease Time that cor-
respond to the authorized IP address.
398 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In hiD6615 switch, user can check and delete DHCP packet statistics which transmitted
to other switches with below command.
SURPASS hiD 6615 transmits port number and Remote ID with Option-82 to DHCP
server. The priority of port number is higher than that of Remote ID. When it receives
Request packet without Option-82 information, it attaches its information. In case Re-
mote ID recorded in Option-82 is same with MAC address of its system, it transmits
packets after removing Option-82 by designated port number.
DDJ:A-M-5212B0-01 399
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
DHCP Server
④ DHCP Rspond+Option-82
② DHCP Request+Option-82
⑤ DHCP Respond
① DHCP Request
In order to enable DHCP Option-82 in hiD 6615, use the following command.
In order to return into configuration mode, or to enter into Privilege Exec Enable Mode,
use the following commands.
400 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
User can configure how to process the packets when DHCP Option-82 packets come
to DHCP server or DHCP relay agent. In order to configure the policy for Option-82
packet, use the following command in Option-82 configuration mode.
In order to configure the policy for Option-82 packet, use the following command in Op-
tion-82 configuration mode. “drop” means to throw away Option-82 packet. “keep”
means that Relay agent transmits packets preserving Option-82 which the agent sends,
“replace” means to transmit by changing into it’s Option-82 information.
DHCP Server
④ DHCP Rspond+Option-82
② DHCP Request+Option-82
⑤ DHCP Respond
① DHCP Request
It is possible to configure the rule for Option-82 packets when hiD 6615 is DHCP server
or DHCP Relay agent.
DDJ:A-M-5212B0-01 401
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
<0-2147483637>
<0-2147483637>
To delete remote-ID and designate the number of assigning IP address for the remote-
ID, use the following command.
When the administrator configures the remote-id, he can also configure from where ip
addresses are assigned. To configure Remote-ID and IP Pool, use the following com-
mands.
remote-id hex hexstring pool pool-name Option-82 Configures remote-ID and pool.
402 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In SURPASS hiD 6615, you can assign IP addresses by Remote-ID and Circuit-ID. If
you configure Remote-ID and Circuit-ID, the server assigns IP addresses for the pack-
ets having the designated Remote-ID and Circuit-ID. And you can also limit the number
of assigning IP address in this configuration. To assign IP address with Remote-ID and
Circuit-ID and limit the number of IP address, use the following commands.
<0-2147483637>
<0-2147483637>
limit <0-2147483637>
<0-2147483637>
<0-2147483637>
limit <0-2147483637>
DDJ:A-M-5212B0-01 403
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
To delete Remote-ID and Circuit-ID and the number of IP address, use the following
commands.
limit
limit
limit
Assigns IP address
no remote-id hex hexstring circuit-id text circuit-id lease-
with Remote-ID and
limit Option-
Circuit-ID and limits
no remote-id hex hexstring circuit-id index <0-65535> 82
the number of IP ad-
lease-limit
dress.
no remote-id hex hexstring circuit-id all lease-limit
limit
limit
lease-limit
In SURPASS hiD 6615, you can assign IP addresses by Remote-ID and Circuit-ID. If
you configure Remote-ID and Circuit-ID, the server assigns IP addresses for the pack-
ets having the designated Remote-ID and Circuit-ID. And you can also configure IP
Pool in this configuration.To assign IP address with Remote-ID and Circuit-ID and con-
figure IP Pool, use the following commands.
404 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
name
name
Assigns IP address
remote-id hex hexstring circuit-id text circuit-id pool pool-name
Option- with Remote-ID and
remote-id hex hexstring circuit-id index <0-65535> pool pool-
82 Circuit-ID and config-
name
ure IP Pool
remote-id text remote-id circuit-id hex hexstring pool pool-
name
name
name
To delete Remote-ID and Circuit-ID and IP Pool, use the following commands.
no remote-id hex hexstring circuit-id text circuit-id pool Option- with Remote-ID and
no remote-id hex hexstring circuit-id index <0-65535> pool 82 Circuit-ID and config-
ure IP Pool.
no remote-id hex hexstring circuit-id all pool
DDJ:A-M-5212B0-01 405
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In option-82 environment, the packet from the switch is transmitted with remote ID or
circuit ID. In SURPASS hiD 6615, remote ID is MAC address by default and circuit ID is
port number by default. Here, it is possible to change the form for remote ID and circuit
ID of the switch in easier way to recognize.
To change the form of Remote ID of the switch, use the following commands.
string
mote-id
To disable to change the form fo Remote ID and Circuit ID, use the following command.
no system-remote-id Option-
Configures remote-ID.
no system-circuit-id port-number 82
This feature prevents to be exhausted DCHP pool’s IP addresses from DHCP packet
with unexpected Option82 field information.
After issue ‘trust default deny’ command, you can control which Option82 field informa-
tion is valid or not.
406 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In hiD 6615, it is possible to save DHCP lease data base. To Back-up DHCP lease da-
tabase,use the following command.
ip dhcp leasedb backup ip- address <1- Back-up DHCP lease database and config-
clear ip dhcp leasedb ip-address/M Resets the DHCP lease database per subnet.
Enable/
clear ip dhcp leasedb pool pool-name Resets the DHCP lease database per IP pool.
Global
clear ip dhcp leasedb all Resets all the DHCP lease database .
DDJ:A-M-5212B0-01 407
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
SURPASS hiD 6615 supports Broadcast Storm Control for Broadcast packet. Broad-
cast Storm is overloading situation of broadcast packets since they need major part of
transmit capacity. Broadcast storm may be often occurred because of difference of ver-
sions.For example, when there are mixed 4.3 BSD and 4.2 BSD, or mixed Appletalk
Phase I and Phase II in TCP/IP, Storm may be occurred.
Also, when information of routing protocol regularly transmitted from router is wrong
recognized by system, which does not support the protocol, Broadcast Storm may be
occurred.
Broadcast Storm Control is operated by system counts how many Broadcast packets
are there for a second and if there are packets over configured limit, they are discarded.
SURPASS hiD 6615 provides not only broadcast storm but also control of multicast and
DLF(Destination Lookup Fail) storm. In order to use control of muticast and DLF storm,
use the following commands. Then all configurations of Broadcast storm control will be
equally applied to all VLANs.
To enable multicast storm control and DLF storm control, use the following commands.
The default is enabled DLF storm control and disabled multicast storm control.
In order to disable multicast storm control and DLF storm control, use the following
commands.
408 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The packet range that can be capable to accept is from 64 Bytes to 1,518 bytes. There-
fore, packets not between this range will not be taken. However, SURPASS hiD 6615
can accept Jumbo-frame larger than 1,518 bytes through user’s configuration.
In order to configure to accept Jumbo-frame larger than 1,158 bytes, use the following
command.
DDJ:A-M-5212B0-01 409
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
[Sample Configuration 1]
RFC 2644 recommends that system blocks broadcast packet of same network band-
width with interfaceof equipment, namely Direct broadcast packet. Hereby, SURPASS
hiD 6615 supposed to block Direct broadcast packet by default setting. However, you
can enable or disable it in SURPASS hiD 6615. In order to block Direct broadcast
packet, use the following command.
In order to disable blocking Direct broadcast packet, use the following command.
410 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to view configuration about blocking Direct broadcast packet, use the following
command.
The following is an example of blocking Direct broadcast packet and showing it.
8.16. MTU
Different maximum value for the length of the data payload can be transmitted. User
can control Maximum Transmission Unit with below command.
DDJ:A-M-5212B0-01 411
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
9. IP Routing Protocol
This chapter describes on layer 3 switching and how to configure the switch for sup-
ported IP routing protocols. It is intended to provide enough information for a network
administrator to get the protocols up and running.
BGP(Border Gateway Protocol) is, as defined in RFC 1163, 1267, EGP(Exterior Gate-
way Protocol) to connect to exterior Network. BGP manages routing information in net-
work so that AS(Autonomous System) can transmit and receive routing information.
BGP consists of network number, which packet is passed through and autonomous
system number.
SURPASS hiD 6615 supports BGP version 4 defined in RFC 1771. BGP version 4 pro-
vides Aggregate route by using CIDR(classless interdomain routing) to reduce size of
routing table. CIDR provides IP prefix, which is network address instead of IP address
on BGP network.
User can configure MED(Multi Exit Discriminator) by using route map. When new rout-
ing information is transmitted to neighbor BGP, MED is passed without any change.
Thus, BGP routers located in same AS can select path with same standard.
BGP configuration is roughly divided into basic configuration and advanced configura-
tion. Basic configuration includes the following.
• Activating BGP
• Configuring BGP Neighbor Router
• Changing Routing Policy
• Configuring BGP Weights
• BGP Route Filtering
• AS Route Filtering
• BGP Route Filtering through Prefix Lists
• Blocking information Transmission to Next Destination
412 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
Step 1 Enter into BGP router configuration mode by using the following command.
Then BGP will be activated.
router bgp <1-65535> BGP Config Assigns AS number to configure BGP routing.
AS number is an identification of autonomous system used for detecting the BGP con-
nection. AS number is a digit between 1 and 655367. AS number 65512 through 65535
are defined as private AS number. Private number cannot be advertised on the Config
Internet.
Step 2 Configure BGP network and register it in BGP routing table by using the fol-
lowing commands.
network prefix nlri [multicast | unicast] Decides where to send routing information.
EGP should know neighbor router. Therefore BGP, as one of EGP, has to configure
neighbor router.
BGP neighbor router includes internal neighbor router, which is located in same AS and
external neighbor router, which is located in different AS. Usually, internal neighbor
router in same AS is not directly connected, but external neighbor router is directly con-
nected to share partner’s sub network.
DDJ:A-M-5212B0-01 413
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Routing policy is to decide which information to receive and which information to pro-
vide through route-map, distribute-list and prefix-list when exchanging routing informa-
tion with neighbor router. When you change routing policy, you should modify routing
information to follow new policy by deleting routing information of old policy or resetting
default route.
In order to receive routing information of new policy, you need to configure inbound
reset, and in order to provide the information, you need to configure outbound reset.
When BGP router provides routing information of new policy, neighbor routers are sup-
posed to receive the information.
If both BGP router and neighbor router support route refresh capability, it is possible to
renew routing information by using inbound reset. This way has the following advan-
tages.
In order to check if neighbor router supports route refresh capability, use the following
command.
If all BGP routers support route refresh capability, user can receive route information by
using soft reset.
In order to configure routing information to follow new policy, use the following com-
mand.
414 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
When administrator recoveries default routing policy from configured one, route refresh
capability is used. You do not have to delete configured policy one by one in case of
this function.
Meanwhile, if a router does not support route refresh capability, you should delete old
routing information by using “neighbor soft-reconfiguration”. However, you would
better take another way as possible because it may cause network problem.
If you do not want to reconfigure BGP information but create new information, you have
to save all incoming information to BGP network in BGP router without processing rout-
ing information in order. Please note that this way may cause overloading of memory.
Therefore you would better avoid it. On the other hand, memory is not required to pro-
vide changed information. After BGP router transmits new information, neighbor router
receives the information.
In order to change BGP configuration through saved routing policy, follow the below
steps.
Step 1 After reconfiguring BGP router, configure to save received information from
neighbor router. And then, all incoming information to BGP router will be saved.
DDJ:A-M-5212B0-01 415
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
information.
In order to check it routing information is correctly changed through routing table and
BGP neighbor router, use the following command.
Weight is number assigned to route to decide route. It is available from 0 to 65534 only
in BGP. If you want to give priority to information from specific router, you can assign
higher weight to the information to do it. In order to configure BGP weight, use the fol-
lowing command.
By default setting, SURPASS hiD 6615 uses AS to decide route. However, you can
change it to decide route as IETF.
In order to disregard length required to reach to AS in case of deciding route, use the
following command.
416 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
If you want to block specific routing information in system, you can optionally receive in-
formation, which is transmitted to and received from neighbor router. In this case, user
should configure access list and prefix list. Then routing information will be filtered with
configured standard.
In order to filter BGP routing information, use the following command.
As filtering information with network address on BGP network, it is possible to filter in-
formation going through AS. Policies applied to decide route are registered in access
list. In order to filter routing information with AS standard, configure filtering policy in
access list and apply the policy to neighbor router.
DDJ:A-M-5212B0-01 417
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Step 3 Apply defined access list to filter routing information, which AS transmits or re-
ceives.
neighbor ip-address filter-list Applies defined access list to filter routing in-
Router
access-list-number {in | out} formation, which AS transmits or receives.
When you restrict BGP route, prefix list is preferred than access list because of the fol-
lowing reasons;
• saves time to search and apply data in case of massive filter lists.
• unlimited registration in filter lists.
• easy to use
Before applying prefix list, user should configure prefix list. User can assign number to
each policy registered in prefix list.
Filtering through prefix list processes routing information in specific order by applying
policy defined in filter list. It is similar to access list but there are more detail rules as
follow;
Routers search policy in prefix list from the top in order. When they find required policy,
418 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
they sPrevileged searching. For faster operation, user can make quick search list on
the top of the list by using seq provided from ip prefix-list. In order to view assigned
number to policy, use the command, show ip prefix-list. Policies configured by user are
automatically assigned number. If you do not configure it, you should assign number to
each policy by using the command, ip prefix-list SEQ-VALUE.
description] [seq value] prefix [ge value] [le value] prefix list.
You can add policy to prefix list one by one. Use the following command.
ip prefix-list name seq value {deny|permit} any | Global Configures policy of prefix list and
You can input ge and le optionally, and they are used when you configure more than
one network. If you do use neither ge nor le, network range is more clearly configured.
When only ge attribute us configured, network range is configured from ge-value, and
when only le attribute is configured, network range is configured from netmask to le-
value.
In order to view information about prefix table, use the following command.
DDJ:A-M-5212B0-01 419
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
show ip prefix-list name [prefix] first- Shows policy first applied to specified
match network.
By default system records number how many times prefix list is inquired. In order to de-
lete the number, use the following command.
It is possible to block new routing information transmitting to next destination. This func-
tion is useful when system is not connected to same IP network like Frame Relay.
There are two ways to bock new routing information transmitting to next destination as
follow;
420 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
This command informs router’s address instead of neighbor router address and makes
BGP routers transmit information with the address. It is more effective than assigning
specific address which to receive routing information.
To make the next destination of BGP be neighbor router, use the command, set ip next-
hop. In order to configure neighbor router as the next destination of BGP, use the fol-
lowing command.
set ip next-hop ip-address Route-map as the next destination of BGP and configure neighbor
By default, system supports BGP version 4. It is also possible to change the version as
user needs.
In order to make a connection to neighbor router with specified BGP version, use the
following command.
neighbor ip-address version {4 | 4-} Router Configures BGP version to be used when
DDJ:A-M-5212B0-01 421
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can process routes in specific order or change various attributes through route
map. It is possible for route map to apply both received information and distributed in-
formation.
Define route map and then it is possible to receive or distribute only matched routes to
route map. Routing information is processed in order; AS route first, then community,
and network number last.
To prescribe process term, AS route uses as-path access-list, community uses com-
munity-list and network uses ip access-list. In order to define route map, use the fol-
lowing command.
422 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure aggregate address to routing table, use the following commands.
BGP supports transmit policy distributing routing information. Distributing routing infor-
mation is operated based on not only community list but also IP address and AS route.
Community list makes community according to each destination and routing policy is
applied based on community standard. It helps configure BGP speaker that distributes
routing information.
Community is destination group that shares some common attributes. One destination
can be belonged to more than one community. As administrator can configure to which
community destination is belonged. By default, all destinations are configured to be in
internet community.
DDJ:A-M-5212B0-01 423
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
User can assign router ID number for BGP router, which transmits BGP route. If you
want delete this function and change to default ID number, use “no”.
It is possible to register route made in another place in BGP routing table. For instance,
it is possible to transmit connected route, kernel route, static route and route made by
routing protocol to BGP. This function is applied to all IP routing protocol.
In order to distribute route made in another place to BGP, use the following command.
One way to reduce complicate multi-connection of BGP network is to divide one AS into
several small ASs and to group them into one confederation. To the outside, the con-
federation looks like a single AS. All systems in each AS are connected to each other,
but all they are not directly connected to another AS in same confederation. In this case,
communicating with neighbor router in another AS is considered as communicating with
interior BGP router. Especially, next destination, MED, and priority value in network
are applied as they are. In order to configure BGP confederation, you should configure
ID number for confederation. To the outside, a series of AS group looks like a single AS
which has each different confederation number.
424 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
BGP requires that all of speaker routers in network be connected to each other. How-
ever, it is impossible when there are many speaker routers.
By using route reflector, all BGP speaker routers do not need to be fully connected to
each other because it is possible to distribute transmitted route to neighbor route. Inte-
rior neighbor router distributes route to next destination.
In order to configure route reflector and client router, which receives the route, use the
following command.
To provide BGP routing information to lots of neighbors, you can configure BGP to re-
ceive information from neighbors by using access list. In order to configure BGP route
through neighbor, use the following commands.
DDJ:A-M-5212B0-01 425
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
neighbor ip-address
Saves received information.
soft-reconfiguration inbound
Router
neighbor ip-address
Configures peer not to reflect changed route.
dont-capability-negotiate
neighbor ip-address Configures not to display the next hop although peer is
override-capability route.
neighbor ip-address
Configures interface of neighbor router.
interface interface-name
426 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to activate BGP neighbor router again, use the following command.
You can configure which networks are reachable by using a backdoor route that the
border router should use. In order to configure border router, use the following com-
mand.
DDJ:A-M-5212B0-01 427
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to decide type of route for sending to neighbor router, use the following com-
mand.
Routes through exterior BGP are given exterior distance, routes through interior BGP
are given interior distance and routes through local BGP are given local distance.
distance bgp external internal local Router Configures BGP distance value.
Since it may be risky to change BGP distance, it is not recommended. The exterior dis-
tance should be lower than any other routing protocol, and the interior distance and lo-
cal distances should be higher than any other dynamic routing protocol.
You need to configure BGP timer so that BGP can transmit keepalive message at regu-
lar interval and control it when there is no response from its destination. Keepalive
timer configured by BGP system is 60 seconds and holdtimer is 180 seconds. It is pos-
sible to configure monitor timer in all neighbor router.
In order to configure BGP timer for all neighbor routers, use the following command.
428 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to adjust BGP timer for specified neighbor router, use the following command.
To delete time value configured in BGP neighbor router, use no neighbor timers com-
mand.
In order to check imported information from remote network, use the following com-
mand.
In order to configure neighbor router as the first AS, use the following command.
bgp enforce-first-as Assigns number of the first AS to neighbor router. Checks im-
Router
number ported information from remote network on BGP network.
It is possible to make high preference low preference by changing priority of local net-
work. The default setting of priority is 100. In order to change priority of local network,
use the following command.
bgp default local-preference value Router Changes default priority of local network.
DDJ:A-M-5212B0-01 429
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to select route of the lowest number as the optimized route among similar
routes from exterior BGP router, use the following command. If you recovery default
setting, use “no”.
In order to configure route without MED attribute as the worst route, use the following
command.
bgp bestpath med missing-as- Configures the router to consider a missing MED as
Router having a value of infinity, choosing a path among
worst
confederation paths.
MED is one of the parameters that is considered when deciding the best route among
many alternative routes. Route with a lower MED is preferred over route with a higher
MED. By default, MED is compared just in same AS to decide the best route. To do it,
use the following command.
To configure router to consider MED value when deciding route, use the following
command.
430 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure router to use MED to decide the best route among routes distrib-
uted by a single sub-AS in a confederation, use the following command.
In order save route reflection from BGP route reflector to clients, use the following
command.
Route dampening is designed not to distribute routes, which repeat being available and
unavailable. A route is considered to be flapping when it is repeatedly available, then
unavailable, then available, then unavailable, and so on.
DDJ:A-M-5212B0-01 431
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
In order to change the default values of various dampening factors, use the following
command.
User can delete all factors of cache, table and database. Also it is possible to display
specific statistics.
432 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You can delete all contents of specific cache, table, and database when some factors
are invalid or unreliable. In order to delete cache, table or database, use the following
commands.
You can display specific statistics such as contents of BGP routing table, cache, and
database. Information provided can be used to determine resource utilization and solve
network problems. You can also display information about node reachability and dis-
cover the routing path your device's packets are taking through the network. In order to
display various routing statistics, use the following commands.
show ip bgp filter-list Shows routes that are matched by the specified
DDJ:A-M-5212B0-01 433
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
show ip bgp regexp Shows routes that match the specified regular
The first thing you should do on OSPF network is to configure border router and AS
boundary router. And then, you need to configure basic setting to operate OSPF router
and interface in area.
When you customize OSPF router for user’s environment, you have to show that all
configurations are same in each router.
434 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
In order to configure routing protocol in router, you need to enter into Router configura-
tion mode by taking the following steps.
Step 2 Configure network ID of OSPF. Network ID decides IPv4 address of this net-
work.
Step 3 Configures an interface on which OSPF runs and specifies the area ID or IP
address for that interface.
After enabling OSPF, you can select the following items to configure.
DDJ:A-M-5212B0-01 435
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
As there are various OSPF versions, there are various OSPF configurations according
to equipments. In order to configure OSPF protocol of equipment, configure equipment
type named ABR by using the following command. Please note that SURPASS hiD
6615 is complied with RFC 2328.
You can alter certain interface-specific OSPF parameters as needed. You are not re-
quired to alter any of these parameters, but some interface parameters must be consis-
tent across all routers in an attached network.
Those parameters are controlled by “ip ospf hello-interval”, “ip ospf dead-interval”, and
“ip ospf authentication-key” commands.
Therefore, be sure that if you configure any of these parameters, the configurations for
all routers on your network have compatible values.
436 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
onds.
is 4.
DDJ:A-M-5212B0-01 437
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
• Broadcast Network
• NBMA(Nonbroadcast multi-access) Network
• Point-to-point Network
IP source is economized because you do not have to assign Neighbor router and there
is no additional process to configure designated router.
• Management cost is saved because it does not need to be linked with all router on
network like a spider's thread.
• It can provide more stable network service since it can communicate even when
virtual circuit is disconnected.
438 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
You can configure several area parameters including authentication, defining stub ar-
eas, and assigning specific costs to the default route. Authentication allows password-
based protection against unauthorized access to an area. Stub areas are areas into
which information on external routes is not sent. Instead, there is a default external
route generated by the area border router, into the stub area for destinations outside
the autonomous system. To further reduce the number of link state advertisements sent
into a stub area, “no-summary” configuration on the ABR is allowed to prevent it from
sending summary link advertisement into the stub area.
Use the following commands as you need. The parameter, “area-id” can be formed as
IP address or from 0 to 4,294,967,295.
Through route summarization, you can configure ABR to transmit single summarized
route to other areas. In OSPF, ABR transmits network information of an area to other
areas. When the networks’ addresses are in consecutive range, you can configure a
representative address including each network as network route.
DDJ:A-M-5212B0-01 439
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
area id-id range ip-address {suppress | Configures network range that does not
In OSPF, all areas must be connected to a backbone area. If there is a break in back-
bone continuity, or the backbone is purposefully portioned, you can establish a virtual
link.
The virtual link must be configured in both routers. The configuration information in
each router consists of the other virtual endpoint, and the nonbackbone area that the
two routers have in common (called the transit area). Note that virtual link cannot be
configured through stub areas.
In order to create a virtual link, perform the following task in router configuration mode.
The parameter, “area-id” can be formed as IP address or from 0 to 4,294,967,295.
OSPF calculates metric based on interface bandwidth. For example, default metric of
T1 link is 64, but default metric of 64K line is 1562.
If there are plural lines in the bandwidth, you can view costs to use line by assigning
metric to each line. In order to classify costs to use line, use the following command.
440 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
4,294,967Mbir/s.
After notice of OSPF network organization changed, you can configure interval to cal-
culate route, which starts calculating ‘the shortest path first’. In order to configure the in-
terval, use the following command.
The originating router keeps track of LSAs and performs refreshing LSAs when a re-
fresh timer is reached. You can configure the refresh time when OSPF LSAs gets re-
freshed and sent out. In order to do this, use the following command.
Redistributing routes into OSPF from other routing protocols, static, kernel or from con-
nected devices will cause these routes to become OSPF external routes.
In order to redistribute routes into OSPF, use the following tasks associated with route
redistribution.
| rip | bgp} [metric value] [metric-type Transmits external route to OSPF network.
DDJ:A-M-5212B0-01 441
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can configure Autonomous System Boundary router to transmit default route to
OSPF network. Autonomous System Boundary router transmits route created exter-
nally to OSPF network. However, it does not create system default route.
In order to have autonomous System Boundary router create system default route, use
the following command.
In order to change any of the OSPF distance values, use the following commands.
Interface configured as passive in OSPF network is operated like stub network. There-
fore, it is impossible to transmit and receive OSPF routing information in passive inter-
face. In order to block routing information in interface, use the following command.
specified interface.
442 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
To block OSPF routing information to other routers, you should configure to block re-
newed routing information. Please note that this function can be configured only for ex-
ternal routes.
You can view all kinds of statistics and database recorded in IP routing table. These in-
formation can be used to enhance system utility and solve problem in case of trouble.
You can check network connection and routes that data went through when transmitting
data also.In order to view routing statistics, use the following commands.
When network trouble is occurred, you can find what the cause is by using debugging
command.In order to view OSPF information, use the following commands.
DDJ:A-M-5212B0-01 443
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
RIP uses broadcast UDP(User Datagram Protocol) data packets to exchange routing
information. The OS software sends routing information updates every 30 seconds.
This process is termed advertised. If a router does not receive an update from another
router for 180 seconds or more, it marks the routes served by the nonupdating router
as being unusable. If there is still no update after 120 seconds, the router removes all
routing table entries for the nonupdating router.
The metric that RIP uses to rate the value of different routes is hop count. The hop
count is the number of routers that can be traversed in a route. A directly connected
network has a metric of zero; an unreachable network has a metric of 16. This small
range of metrics makes RIP an unsuitable routing protocol for large networks.
444 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
A router that is running RIP can receive a default network via an update from another
router that is running RIP, or the router can source (generate) the default network itself
with RIP. In both cases, the default network is advertised through RIP to other RIP
neighbors.
RIP sends updates to the interfaces in the specified networks. If an interface's network
is not specified, it will not be advertised in any RIP update. The system supports RIP
version 1and 2.
Step 1 Enter into Router configuration mode by using the following command.
router rip Global Enters into Router configuration mode and operates
The command “network ip-address” enables RIP interfaces between certain numbers
of a special network address. For example, if the network for 10.0.0.0/24 is RIP en-
abled, this would result in all the addresses from 10.0.0.0 to 10.0.0.255 being enabled
for RIP. RIP packet is transmitted to port specified with the command, “network inter-
face-name”.
DDJ:A-M-5212B0-01 445
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
Since RIP is broadcast protocol, routers should be connected to transmit routing infor-
mation of RIP to non-broadcast network. In order to configure neighbor router to trans-
mit RIP information, use the following command.
Siemens’ routers basically support RIP version 1 and 2. However, you can configure to
receive only version 1 type packet or only version 2 type packet. In order to configure
RIP version, use the following command.
version {1 | 2} Router Configures version to transmit one of RIP 1 type packet and
The preceding task controls default RIP version settings. You can override the routers
RIP version by configuring a particular interface to behave differently. To control which
RIP version an interface sends, perform one of the following tasks after entering into
RIP interface configuration mode.
446 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
ip rip send version 1 Transmits only RIP version 1 type packet in the interface.
ip rip send version 2 Interface Transmits RIP version 2 type packet on the interface.
Similarly, to control how packets received from an interface are processed, perform one
of the following tasks.
ip rip receive version 1 Receives only RIP version 1 type packet in the interface.
ip rip receive version 2 Interface Receives only RIP version 2 type packet on the interface.
This feature is provided only by Siemens’ route command creates static route available
only for RIP. If you are not familiar with RIP protocol, you would better use redistribute
static command.
route ip-address/m Router Creates static route available only for RIP.
SURPASS hiD 6615 can redistribute routing information from a source route entry into
the RIP tables. For example, you can instruct the router to re-advertise connected, ker-
nel, or static routes as well as routing protocol-derived routes. This capability applies to
all the IP-based routing protocols.
In order to redistribute routing information from a source route entry into the RIP table,
use the following command.
DDJ:A-M-5212B0-01 447
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You may also conditionally control the redistribution of routes between the two domains
using “route map” command. In order to define a route map for redistribution, use the
following command.
One or more match and set commands typically follow a route-map command. If there
are no match commands, then everything matches. If there are no set commands,
nothing is done. Therefore, you need at least one match or set command. To define
conditions for redistributing routes from a source route entry into the RIP tables, per-
form at least one of the following tasks in route-map configuration node.
metric.
The metrics of one routing protocol do not necessarily translate into the metrics of an-
other. For example, the RIP metric is a hop count and the OSPF metric is a combina-
tion of five quantities. In such situations, an artificial metric is assigned to the redistrib-
uted route. Because of this unavoidable tampering with dynamic information, carelessly
exchanging routing information between different routing protocols can create routing
loops, which can seriously degrade network operation.
In order to set metrics for redistributed routes, use the following command.
448 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The metric of all protocol can be configured from 0 to 4294967295. It can be configured
from 1 to 16 for RIP.
You can force an autonomous system boundary router to generate a default route into
an RIP routing domain. Whenever you specifically configure redistribution of routes into
an RIP routing domain, the router automatically becomes an autonomous system
boundary router. However, an autonomous system boundary router does not, by default,
generate a default route into the RIP routing domain.
In order to force the autonomous system boundary router to generate a default route,
use the following command.
DDJ:A-M-5212B0-01 449
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
You can filter routing protocol information by performing the following tasks.
To prevent other routers on a local network from learning about routes dynamically, you
can keep routing update messages from being sent through a router interface. This fea-
ture applies to all IP-based routing protocols except BGP.
of router.
An offset list is the mechanism for increasing incoming and outgoing metrics to routes
learned via RIP. You can limit the offset list with an access list.
In order to increase the value of routing metrics, use the following command.
Routing protocols use several timers that determine such variables as the frequency of
routing updates, the length of time before a route becomes invalid, and other parame-
ters. You can adjust these timers to tune routing protocol performance to better suit
your internet needs. The default settings for the timers are as follows.
450 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
The update timer is 30 seconds. Every update timer seconds, the RIP process is
awakened to send an unsolicited response message containing the complete routing
table to all neighboring RIP routers.
The timeout timer is 180 seconds. Upon expiration of the timeout, the route is no longer
valid; however, it is retained in the routing table for a short time so that neighbors can
be notified that the route has been dropped.
The garbage collect timer is 120 seconds. Upon expiration of the garbage-collection
timer, the route is finally removed from the routing table.
timers basic update timeout garbage Router Adjusts routing protocol timers.
Normally, routers that are connected to broadcast-type IP networks and that use dis-
tance-vector routing protocols employ the split horizon mechanism to reduce the possi-
bility of routing loops. Split horizon blocks information about routes from being adver-
tised by a router out any interface from which that information originated. This behavior
usually optimizes communications among multiple routers, particularly when links are
broken. However, with nonbroadcast networks, such as Frame Relay, situations can
arise for which this behavior is less than ideal. For these situations, you might want to
disable split horizon.
In order to activate or deactivate or disable split horizon, perform the following tasks in
interface configuration mode.
DDJ:A-M-5212B0-01 451
UMN:CLI User Manual
SURPASS hiD 6615 R1.0
RIP Version 1 does not support authentication. If you are sending and receiving RIP
Version 2 packets, you can enable RIP authentication on an interface.
The key chain determines the set of keys that can be used on the interface. If a key
chain is not configured, plain text authentication can be performed using string com-
mand.
Do not use plain text authentication in RIP packets for security purposes, because the
unencrypted authentication key is sent in every RIP Version 2 packet. Use plain text au-
thentication when security is not an issue, for example, to ensure that misconfigured
hosts do not participate in routing.
ip rip authentication string string tication. The string must be shorter than 16
characters.
You can display specific router statistics such as the contents of IP routing tables, and
databases. Information provided can be used to determine resource utilization and
solve network problems. You can also discover the routing path your router’s packets
are taking through the network.
452 DDJ:A-M-5212B0-01
User Manual UMN:CLI
SURPASS hiD 6615 R1.0
show ip route rip Shows routing table information concerned with RIP.
Enable/Global
Shows current status of using RIP protocol and the
show ip protocols
information.
DDJ:A-M-5212B0-01 453