S4600 - 3.1.1 - Configuration Guide
S4600 - 3.1.1 - Configuration Guide
4.2 DCSCM.............................................................................................4-4
5.4 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN ... 5-38
................................................................................................... 7-1
7.1.1 Ping...........................................................................................................7-1
7.1.2 Ping6.........................................................................................................7-1
7.1.3 Traceroute ................................................................................................7-1
7.1.4 Traceroute6 ..............................................................................................7-2
7.1.5 Show .........................................................................................................7-2
7.1.6 Debug .......................................................................................................7-3
7.4 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY CPU
...............................................................................................................7-8
8.1 NTP...................................................................................................8-1
1-1
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Serial port cable One end attach to the RS-232 serial port, the other end to the
Console port.
Switch Functional Console port required.
1-2
S4600_Configuration Guide Chapter 1 Basic Management Configuration
1-3
S4600_Configuration Guide Chapter 1 Basic Management Configuration
The user can now enter commands to manage the switch. For a detailed description for the
commands, please refer to the following chapters.
1-4
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Step 1: Configure the IP addresses for the switch and start the Telnet Server function on the
switch.
First is the configuration of host IP address. This should be within the same network
segment as the switch VLAN1 interface IP address. Suppose the switch VLAN1 interface IP
address is 10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run “ping
10.1.128.251” from the host and verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below. Before in-band
management, the switch must be configured with an IP address by out-of-band management (i.e.
Console mode), the configuration commands are as follows (All switch configuration prompts are
assumed to be “Switch” hereafter if not otherwise specified):
Switch>
Switch>enable
Switch#config
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.128.251 255.255.255.0
Switch(Config-if-Vlan1)#no shutdown
To enable the Telnet Server function, users should type the CLI command telnet-server
enable in the global mode as below:
Switch>enable
Switch#config
Switch(config)# telnet-server enable
Run Telnet client program included in Windows with the specified Telnet target.
1-5
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Login to the Telnet configuration interface. Valid login name and password are required,
otherwise the switch will reject Telnet access. This is a method to protect the switch from
unauthorized access. As a result, when Telnet is enabled for configuring and managing the switch,
username and password for authorized Telnet users must be configured with the following
command: username <username> privilege <privilege> [password (0|7) <password>]. To open
the local authentication style with the following command: authentication line vty login local.
Privilege option must exist and just is 15. Assume an authorized user in the switch has a
username of “test”, and password of “test”, the configuration procedure should like the following:
Switch>enable
Switch#config
Switch(config)#username test privilege 15 password 0 test
Switch(config)#authentication line vty login local
Enter valid login name and password in the Telnet configuration interface, Telnet user will be
able to enter the switch’s CLI configuration interface. The commands used in the Telnet CLI
interface after login is the same as that in the Console interface.
1-6
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Step 1: Configure the IP addresses for the switch and start the HTTP server function on the
switch.
For configuring the IP address on the switch through out-of-band management, see the
telnet management chapter.
To enable the WEB configuration, users should type the CLI command IP http server in the
global mode as below:
Switch>enable
Switch#config
Switch(config)#ip http server
Open the Web browser on the host and type the IP address of the switch, or run directly the
HTTP protocol on the Windows. For example, the IP address of the switch is “10.1.128.251”;
Login to the Web configuration interface. Valid login name and password are required,
otherwise the switch will reject HTTP access. This is a method to protect the switch from
unauthorized access. As a result, when Telnet is enabled for configuring and managing the switch,
username and password for authorized Telnet users must be configured with the following
command: username <username> privilege <privilege> [password (0|7) <password>]. To open
the local authentication style with the following command: authentication line web login local.
Privilege option must exist and just is 15. Assume an authorized user in the switch has a
username of “admin”, and password of “admin”, the configuration procedure should like the
following:
Switch>enable
Switch#config
Switch(config)#username admin privilege 15 password 0 admin
Switch(config)#authentication line web login local
The Web login interface of S4600-28P-SI is as below:
1-8
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Software
The necessities required by SNMP network management software to manage switches:
1) IP addresses are configured on the switch;
1-9
S4600_Configuration Guide Chapter 1 Basic Management Configuration
2) The IP address of the client host and that of the VLAN interface on the switch it
subordinates to should be in the same segment;
3) If 2) is not met, the client should be able to reach an IP address of the switch through
devices like routers;
4) SNMP should be enabled.
The host with SNMP network management software should be able to ping the IP address of
the switch, so that, when running, SNMP network management software will be able to find it
and implement read/write operation on it. Details about how to manage switches via SNMP
network management software will not be covered in this manual, please refer to “Snmp
network management software user manual”.
1-10
S4600_Configuration Guide Chapter 1 Basic Management Configuration
“Switch(config)#”. Use the exit command under other configuration modes such as Port Mode,
VLAN mode will return to Global Mode.
The user can perform global configuration settings under Global Mode, such as MAC Table,
Port Mirroring, VLAN creation, IGMP Snooping start and STP, etc. And the user can go further to
Port Mode for configuration of all the interfaces.
Interface Mode
Use the interface command under Global Mode can enter the interface mode specified.
Switch provides three interface type: 1. VLAN interface; 2. Ethernet port; 3. port-channel,
accordingly the three interface configuration modes.
Interface Type Entry Operates Exit
VLAN Interface Type interface vlan <Vlan-id> Configure switch IPs, Use the exit
command under Global Mode. etc command to
return to Global
Mode.
Ethernet Port Type interface ethernet Configure supported Use the exit
<interface-list> command under duplex mode, command to
Global Mode. speed, etc. of return to Global
Ethernet Port. Mode.
port-channel Type interface port-channel Configure Use the exit
<port-channel-number> port-channel related command to
command under Global Mode. settings such as return to Global
duplex mode, Mode.
speed, etc.
VLAN Mode
Using the vlan <vlan-id> command under Global Mode can enter the corresponding VLAN
Mode. Under VLAN Mode the user can configure all member ports of the corresponding VLAN.
Run the exit command to exit the VLAN Mode to Global Mode.
ACL Mode
ACL type Entry Operates Exit
Standard IP Type ip access-list Configure parameters for Use the exit
ACL Mode standard command under Standard IP ACL Mode. command to return
Global Mode. to Global Mode.
Extended IP Type ip access-list Configure parameters for Use the exit
ACL Mode extanded command under Extended IP ACL Mode. command to return
1-12
S4600_Configuration Guide Chapter 1 Basic Management Configuration
record is found.
This command is not exist in current The command is recognized, but this command can
mode not be used under current mode.
Please configure precursor command The command is recognized, but the prerequisite
"*" at first! command has not been configured.
syntax error : missing '"' before the end Quotation marks are not used in pairs.
of command line!
Command Explanation
Normal User Mode/ Admin Mode
The User uses enable command to step into
enable [<1-15>] admin mode from normal user mode or modify
disable the privilege level of the users. The disable
command is for exiting admin mode.
Admin Mode
config [terminal] Enter global mode from admin mode.
Various Modes
Exit current mode and enter previous mode, such
as using this command in global mode to go
exit
back to admin mode, and back to normal user
mode from admin mode.
show privilege Show privilege of the current users.
1-15
S4600_Configuration Guide Chapter 1 Basic Management Configuration
1.2.2.1 Telnet
1-16
S4600_Configuration Guide Chapter 1 Basic Management Configuration
1-17
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Command Explanation
Admin Mode
telnet [vrf <vrf-name>] {<ip-addr> | <ipv6-addr> Login to a remote host with the Telnet
| host <hostname>} [<port>] client included in the switch.
1.2.2.2 SSH
Command Explanation
Global Mode
ssh-server enable Enable SSH function on the switch; the no
no ssh-server enable command disables SSH function.
username <username> [privilege Configure the username and password of
<privilege>] [password [0 | 7] <password>] SSH client software for logging on the switch;
no username <username> the no command deletes the username.
Configure timeout value for SSH
ssh-server timeout <timeout>
authentication; the no command restores the
no ssh-server timeout
default timeout value for SSH authentication.
Configure the number of times for retrying
ssh-server authentication-retires
SSH authentication; the no command
<authentication-retires>
restores the default number of times for
no ssh-server authentication-retries
retrying SSH authentication.
ssh-server host-key create rsa modulus Generate the new RSA host key on the SSH
<moduls> server.
Admin Mode
Display SSH debug information on the SSH
terminal monitor client side; the no command stops displaying
terminal no monitor SSH debug information on the SSH client
side.
1-19
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Command Explanation
Global Mode
interface vlan <vlan-id> Create VLAN interface (layer 3 interface); the
no interface vlan <vlan-id> no command deletes the VLAN interface.
2. Manual configuration
Command Explanation
VLAN Interface Mode
ip address <ip_address> <mask> [secondary] Configure IP address of VLAN interface; the no
no ip address <ip_address> <mask> command deletes IP address of VLAN interface.
[secondary]
ipv6 address <ipv6-address / prefix-length> Configure IPv6 address, including aggregation
[eui-64] global unicast address, local site address and
no ipv6 address <ipv6-address / prefix-length> local link address. The no command deletes
IPv6 address.
1-20
S4600_Configuration Guide Chapter 1 Basic Management Configuration
3. BOOTP configuration
Command Explanation
VLAN Interface Mode
Enable the switch to be a BootP client and
ip bootp-client enable obtain IP address and gateway address through
no ip bootp-client enable BootP negotiation; the no command disables
the BootP client function.
4. DHCP configuration
Command Explanation
VLAN Interface Mode
Enable the switch to be a DHCP client and
ip bootp-client enable obtain IP address and gateway address through
no ip bootp-client enable DHCP negotiation; the no command disables
the DHCP client function.
1-21
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Get-Bulk-Request
Set-Request
Trap
Inform-Request
NMS sends queries to the Agent with Get-Request, Get-Next-Request, Get-Bulk-Request and
Set-Request messages; and the Agent, upon receiving the requests, replies with Get-Response
message. On some special situations, like network device ports are on Up/Down status or the
network topology changes, Agents can send Trap messages to NMS to inform the abnormal
events. Besides, NMS can also be set to alert to some abnormal events by enabling RMON
function. When alert events are triggered, Agents will send Trap messages or log the event
according to the settings. Inform-Request is mainly used for inter-NMS communication in the
layered network management.
USM ensures the transfer security by well-designed encryption and authentication. USM
encrypts the messages according to the user typed password. This mechanism ensures that the
messages can’t be viewed on transmission. And USM authentication ensures that the messages
can’t be changed on transmission. USM employs DES-CBC cryptography. And HMAC-MD5 and
HMAC-SHA are used for authentication.
VACM is used to classify the users’ access permission. It puts the users with the same access
permission in the same group. Users can’t conduct the operation which is not authorized.
1-22
S4600_Configuration Guide Chapter 1 Basic Management Configuration
4. Configure engine ID
5. Configure user
6. Configure group
7. Configure view
8. Configuring TRAP
9. Enable/Disable RMON
4. Configure engine ID
Command Explanation
Global Mode
snmp-server engineid <engine-string> Configure the local engine ID on the switch.
no snmp-server engineid This command is used for SNMP v3.
5. Configure user
1-24
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Command Explanation
Global Mode
snmp-server user <use-string> <group-string>
[{authPriv | authNoPriv} auth {md5 | sha}
<word>] [access {<num-std>|<name>}]
Add a user to a SNMP group. This command is
[ipv6-access {<ipv6-num-std>|<ipv6-name>}]
used to configure USM for SNMP v3.
no snmp-server user <user-string> [access
{<num-std>|<name>}] [ipv6-access
{<ipv6-num-std>|<ipv6-name>}]
6. Configure group
Command Explanation
Global Mode
snmp-server group <group-string>
{noauthnopriv|authnopriv|authpriv} [[read
<read-string>] [write <write-string>] [notify
<notify-string>]] [access
Set the group information on the switch. This
{<num-std>|<name>}] [ipv6-access
command is used to configure VACM for SNMP
{<ipv6-num-std>|<ipv6-name>}]
v3.
no snmp-server group <group-string>
{noauthnopriv|authnopriv|authpriv} [access
{<num-std>|<name>}] [ipv6-access
{<ipv6-num-std>|<ipv6-name>}]
7. Configure view
Command Explanation
Global Mode
snmp-server view <view-string> <oid-string>
{include|exclude} Configure view on the switch. This command is
no snmp-server view <view-string> used for SNMP v3.
[<oid-string>]
8. Configuring TRAP
Command Explanation
Global Mode
snmp-server enable traps Enable the switch to send Trap message. This
no snmp-server enable traps command is used for SNMP v1/v2/v3.
snmp-server host { <host-ipv4-address> | Set the host IPv4/IPv6 address which is used to
<host-ipv6-address> } {v1 | v2c | {v3 receive SNMP Trap information. For SNMP
{noauthnopriv | authnopriv | authpriv}}} v1/v2, this command also configures Trap
<user-string> community string; for SNMP v3, this command
no snmp-server host { <host-ipv4-address> | also configures Trap user name and security
<host-ipv6-address> } {v1 | v2c | {v3 level. The “no” form of this command cancels
{noauthnopriv | authnopriv | authpriv}}} this IPv4 or IPv6 address.
1-25
S4600_Configuration Guide Chapter 1 Basic Management Configuration
<user-string>
snmp-server trap-source {<ipv4-address> |
Set the source IPv4 or IPv6 address which is
<ipv6-address>}
used to send trap packet, the no command
no snmp-server trap-source {<ipv4-address> |
deletes the configuration.
<ipv6-address>}
Port mode
[no] switchport updown notification enable Enable/disable the function of sending the trap
message to the port of UP/DOWN event.
9. Enable/Disable RMON
Command Explanation
Global mode
rmon enable
Enable/disable RMON.
no rmon enable
The NMS can use private as the community string to access the switch with read-write permission,
or use public as the community string to access the switch with read-only permission.
Scenario 2: NMS will receive Trap messages from the switch (Note: NMS may have community
string verification for the Trap messages. In this scenario, the NMS uses a Trap verification
community string of usertrap).
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 1.1.1.5 v1 usertrap
Switch(config)#snmp-server enable traps
1-26
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Scenario 4: NMS wants to receive the v3Trap messages sent by the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 10.1.1.2 v3 authpriv tester
Switch(config)#snmp-server enable traps
Scenario 5: The IPv6 address of the NMS is 2004:1:2:3::2; the IPv6 address of the switch (Agent)
is 2004:1:2:3::1. The NMS network administrative software uses SNMP protocol to obtain data
from the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server community rw private
Switch(config)#snmp-server community ro public
Switch(config)#snmp-server securityip 2004:1:2:3::2
The NMS can use private as the community string to access the switch with read-write
permission, or use public as the community string to access the switch with read-only permission.
Scenario 6: NMS will receive Trap messages from the switch (Note: NMS may have community
string verification for the Trap messages. In this scenario, the NMS uses a Trap verification
community string of usertrap).
The configuration on the switch is listed below:
Switch(config)#snmp-server host 2004:1:2:3::2 v1 usertrap
Switch(config)#snmp-server enable traps
status” command to verify SNMP configuration information; Use “debug snmp packet” to
enable SNMP debugging function and verify debug information.
If users still can’t solve the SNMP problems, Please contact our technical and service center.
cable
Console cable
connection
connection
1-28
S4600_Configuration Guide Chapter 1 Basic Management Configuration
As shown in the figure, a PC is used as the console for the switch. A console cable is used to
connect PC to the management port on the switch. The PC should have TFTP server software
installed and has the image file required for the upgrade.
Step 2:
Press 'ctrl+b' on switch boot up until the switch enters BootROM monitor mode. The
operation result is shown below:
[Boot]:
Step 3:
Under BootROM mode, run 'setconfig' to set the IP address and mask of the switch under
BootROM mode, server IP address and mask. Suppose the switch address is 192.168.1.2,
and PC address is 192.168.1.66, and the configuration should like:
[Boot]: setconfig
Host IP Address: [10.1.1.1] 192.168.1.2
Server IP Address: [10.1.1.2] 192.168.1.66
[Boot]:
Step 4:
Enable TFTP server in the PC. Run TFTP server program. Before start downloading upgrade file to
the switch, verify the connectivity between the server and the switch by ping from the switch. If
ping succeeds, run 'load' command in the BootROM mode from the switch; if it fails, perform
troubleshooting to find out the cause.
The following update file boot.rom. (This device only supports the upgrading of the boot file
under the BootROM mode.)
[Boot]: load boot.rom
TFTP from server 192.168.1.66; our IP address is 192.168.1.2
Filename 'boot.rom'.
Load address: 0x81000000
Loading: #################################################################
################################
done
Bytes transferred = 438700 (6b1ac hex)
[Boot]:
Step 5:
Execute write boot.rom in BootROM mode. The following saves the update file.
[Boot]: write boot.rom
File exists, overwrite? (Y/N)[N] y
Writing flash:/boot.rom......
Write flash:/boot.rom OK.
1-29
S4600_Configuration Guide Chapter 1 Basic Management Configuration
[Boot]:
Step 6:
After successful upgrade, execute run or reboot command in BootROM mode to return to CLI
configuration interface.
[Boot]: run(or reboot)
4 file(s), 0 dir(s)
Total size:31457280 bytes , files used size:23158571 bytes, free size:8298709 bytes
[Boot]:
2. boot command
Used to set the IMAGE file to run upon system start-up, and the configuration file to run upon
configuration recovery.
[Boot]: boot img nos.img primary
0 bytes written, 2704 bytes skipped.
flash:/nos.img will be used as the primary img file at the next time!
[Boot]:
that belonging to fourth layer(application layer) of the TCP/IP protocol stack, used for transferring
files between hosts, hosts and switches. Both of them transfer files in a client-server model. Their
differences are listed below.
FTP builds upon TCP to provide reliable connection-oriented data stream transfer service.
However, it does not provide file access authorization and uses simple authentication mechanism
(transfers username and password in plain text for authentication). When using FTP to transfer
files, two connections need to be established between the client and the server: a management
connection and a data connection. A transfer request should be sent by the FTP client to establish
management connection on port 21 in the server, and negotiate a data connection through the
management connection.
There are two types of data connections: active connection and passive connection.
In active connection, the client transmits its address and port number for data transmission
to the server, the management connection maintains until data transfer is complete. Then, using
the address and port number provided by the client, the server establishes data connection on
port 20 (if not engaged) to transfer data; if port 20 is engaged, the server automatically generates
some other port number to establish data connection.
In passive connection, the client, through management connection, notify the server to
establish a passive connection. The server then creates its own data listening port and informs
the client about the port, and the client establishes data connection to the specified port.
As data connection is established through the specified address and port, there is a third
party to provide data connection service.
TFTP builds upon UDP, providing unreliable data stream transfer service with no user
authentication or permission-based file access authorization. It ensures correct data transmission
by sending and acknowledging mechanism and retransmission of time-out packets. The
advantage of TFTP over FTP is that it is a simple and low overhead file transfer service.
Switch can operate as either FTP/TFTP client or server. When switch operates as a FTP/TFTP
client, configuration files or system files can be downloaded from the remote FTP/TFTP servers
(can be hosts or other switches) without affecting its normal operation. And file list can also be
retrieved from the server in ftp client mode. Of course, switch can also upload current
configuration files or system files to the remote FTP/TFTP servers (can be hosts or other switches).
When switch operates as a FTP/TFTP server, it can provide file upload and download service for
authorized FTP/TFTP clients, as file list service as FTP server.
Here are some terms frequently used in FTP/TFTP.
ROM: Short for EPROM, erasable read-only memory. EPROM is repalced by FLASH memory in
switch.
SDRAM: RAM memory in the switch, used for system software operation and configuration
sequence storage.
FLASH: Flash memory used to save system file and configuration file.
System file: including system image file and boot file.
System image file: refers to the compressed file for switch hardware driver and software support
program, usually refer to as IMAGE upgrade file. In switch, the system image file is allowed to
save in FLASH only. Switch mandates the name of system image file to be uploaded via FTP in
Global Mode to be nos.img, other IMAGE system files will be rejected. Boot file: refers to the file
initializes the switch, also referred to as the ROM upgrade file (Large size file can be compressed
1-31
S4600_Configuration Guide Chapter 1 Basic Management Configuration
as IMAGE file). In switch, the boot file is allowed to save in ROM only. Switch mandates the name
of the boot file to be boot.rom.
Configuration file: including start up configuration file and running configuration file. The
distinction between start up configuration file and running configuration file can facilitate the
backup and update of the configurations.
Start up configuration file: refers to the configuration sequence used in switch startup. Startup
configuration file stores in nonvolatile storage, corresponding to the so-called configuration save.
If the device does not support CF, the configuration file stores in FLASH only, if the device
supports CF, the configuration file stores in FLASH or CF, if the device supports multi-config file,
names the configuration file to be .cfg file, the default is startup.cfg. If the device does not
support multi-config file, mandates the name of startup configuration file to be startup-config.
Running configuration file: refers to the running configuration sequence use in the switch. In
switch, the running configuration file stores in the RAM. In the current version, the running
configuration sequence running-config can be saved from the RAM to FLASH by write command
or copy running-config startup-config command, so that the running configuration sequence
becomes the start up configuration file, which is called configuration save. To prevent illicit file
upload and easier configuration, switch mandates the name of running configuration file to be
running-config.
Factory configuration file: The configuration file shipped with switch in the name of
factory-config. Run set default and write, and restart the switch, factory configuration file will be
loaded to overwrite current start up configuration file.
1-32
S4600_Configuration Guide Chapter 1 Basic Management Configuration
1-33
S4600_Configuration Guide Chapter 1 Basic Management Configuration
10.1.1.2
10.1.1.1
Scenario 1: The switch is used as FTP/TFTP client. The switch connects from one of its ports to a
computer, which is a FTP/TFTP server with an IP address of 10.1.1.1; the switch acts as a FTP/TFTP
client, the IP address of the switch management VLAN is 10.1.1.2. Download “nos.img” file in the
computer to the switch.
FTP Configuration
Computer side configuration:
Start the FTP server software on the computer and set the username “Switch”, and the password
“superuser”. Place the “12_30_nos.img” file to the appropriate FTP server directory on the
computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#exit
Switch#copy ftp: //Switch:[email protected]/12_30_nos.img nos.img
With the above commands, the switch will have the “nos.img” file in the computer
downloaded to the FLASH.
1-34
S4600_Configuration Guide Chapter 1 Basic Management Configuration
TFTP Configuration
Computer side configuration:
Start TFTP server software on the computer and place the “12_30_nos.img” file to the
appropriate TFTP server directory on the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#exit
Switch#copy tftp: //10.1.1.1/12_30_nos.img nos.img
Scenario 2: The switch is used as FTP server. The switch operates as the FTP server and connects
from one of its ports to a computer, which is a FTP client. Transfer the “nos.img” file in the switch
to the computer and save as 12_25_nos.img.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#ftp-server enable
Switch(config)# username Admin password 0 superuser
Scenario 3: The switch is used as TFTP server. The switch operates as the TFTP server and
connects from one of its ports to a computer, which is a TFTP client. Transfer the “nos.img” file in
the switch to the computer.
The configuration procedures of the switch are listed below:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch(config)#tftp-server enable
Computer side configuration:
Login to the switch with any TFTP client software, use the “tftp” command to download
“nos.img” file from the switch to the computer.
Scenario 4: Switch acts as FTP client to view file list on the FTP server. Synchronization conditions:
The switch connects to a computer by an Ethernet port, the computer is a FTP server with an IP
address of 10.1.1.1; the switch acts as a FTP client, and the IP address of the switch management
1-35
S4600_Configuration Guide Chapter 1 Basic Management Configuration
FTP Configuration:
PC side:
Start the FTP server software on the PC and set the username “Switch”, and the password
“superuser”.
Switch:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-Vlan1)#no shut
Switch(Config-if-Vlan1)#exit
Switch#copy ftp: //Switch: [email protected]
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
331 User name okay, need password.
230 User logged in, proceed.
200 PORT Command successful.
150 Opening ASCII mode data connection for /bin/ls.
recv total = 480
nos.img
nos.rom
parsecommandline.cpp
position.doc
qmdict.zip
…(some display omitted here)
show.txt
snmp.TXT
226 Transfer complete.
read file ok
send file
150 Opening ASCII mode data connection for nos.img.
226 Transfer complete.
close ftp client.
The following is the message displays when files are successfully received. Otherwise, please
verify link connectivity and retry “copy” command again.
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
331 User name okay, need password.
230 User logged in, proceed.
200 PORT Command successful.
recv total = 1526037
************************
write ok
150 Opening ASCII mode data connection for nos.img (1526037 bytes).
226 Transfer complete.
If the switch is upgrading system file or system start up file through FTP, the switch must not be
restarted until “close ftp client” or “226 Transfer complete.” is displayed, indicating upgrade is
successful, otherwise the switch may be rendered unable to start. If the system file and system
start up file upgrade through FTP fails, please try to upgrade again or use the BootROM mode to
upgrade.
restarted until “close tftp client” is displayed, indicating upgrade is successful, otherwise the
switch may be rendered unable to start. If the system file and system start up file upgrade
through TFTP fails, please try upgrade again or use the BootROM mode to upgrade.
1-38
S4600_Configuration Guide Chapter 1 Basic Management Configuration
1-39
S4600_Configuration Guide Chapter 1 Basic Management Configuration
1.3.4 Troubleshooting
If errors occur when users try to implement file system operations, please check whether
they are caused by the following reasons
Whether file names or paths are entered correctly.
When renaming a file, whether it is in use or the new file name is already used by an existing
file or directory.
1.4 Cluster
1-40
S4600_Configuration Guide Chapter 1 Basic Management Configuration
management
The commander switch can upgrade and configure any member switches in the cluster
Command Explanation
Global Mode
cluster run [key <WORD>] [vid <VID>] Enable or disable cluster function in
no cluster run the switch.
2. Create a cluster
1-41
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Command Explanation
Global Mode
cluster ip-pool <commander-ip> Configure the private IP address pool
no cluster ip-pool for cluster member devices.
cluster commander [<cluster_name>]
Create or delete a cluster.
no cluster commander
cluster member {candidate-sn <candidate-sn> |
mac-address <mac-addr> [id <member-id> ]}
Add or remove a member switch.
no cluster member {id <member-id> |
mac-address <mac-addr>}
Command Explanation
Global Mode
Enable or disable adding newly
cluster auto-add
discovered candidate switch to the
no cluster auto-add
cluster.
Change automatically added members
cluster member auto-to-user
into manually added ones.
cluster keepalive interval <second> Set the keep-alive interval of the
no cluster keepalive interval cluster.
Set the max number of lost keep-alive
cluster keepalive loss-count <int>
messages that can be tolerated in the
no cluster keepalive loss-count
cluster.
Admin mode
clear cluster nodes [nodes-sn <candidate-sn-list> | Clear nodes in the list of candidate
mac-address <mac-addr>] switches maintained by the switch.
Command Explanation
Global Mode
cluster keepalive interval <second> Set the keep-alive interval of the
no cluster keepalive interval cluster.
Set the max number of lost keep-alive
cluster keepalive loss-count <int>
messages that can be tolerated in the
no cluster keepalive loss-count
clusters.
Command Explanation
Admin Mode
1-42
S4600_Configuration Guide Chapter 1 Basic Management Configuration
Command Explanation
Global Mode
Enable http function in commander
switch and member switch.
Notice: must insure the http function
be enabled in member switch when
ip http server commander switch visiting member
switch by web. The commander
switch visit member switch via beat
member node in member cluster
topology.
7. Manage cluster network with snmp
Command Explanation
Global Mode
Enable snmp server function in
commander switch and member
switch.
Notice: must insure the snmp server
function be enabled in member
snmp-server enable switch when commander switch
visiting member switch by snmp. The
commander switch visit member
switch via configure character string
<commander-community>@sw<mem
ber id>.
1-43
S4600_Configuration Guide Chapter 1 Basic Management Configuration
E1 E2 E1 E2 E1 E1
1-44
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Global Mode
interface ethernet <interface-list> Enters the network port configuration mode.
2. Configure the properties for the Ethernet ports
Command Explanation
Port Mode
media-type {copper |
copper-preferred-auto | fiber | Sets the combo port mode (combo ports only).
sfp-preferred-auto}
shutdown
Enables/Disables specified ports.
no shutdown
description <string> Specifies or cancels the name of specified
no description ports.
speed-duplex {auto [10 [100 [1000]] [auto
| full | half |]] | force10-half |
force10-full | force100-half | force100-full Sets port speed and duplex mode of
| force100-fx [module-type 100/1000Base-TX or 100Base-FX ports. The no
{auto-detected | no-phy-integrated | format of this command restores the default
phy-integrated}] | {{force1g-half | setting, i.e., negotiates speed and duplex
force1g-full} [nonegotiate [master | mode automatically.
slave]]}| force10g-full}
no speed-duplex
Enables/Disables the auto-negotiation
negotiation {on|off}
function of 1000Base-FX ports.
bandwidth control <bandwidth> [both |
Sets or cancels the bandwidth used for
receive | transmit]
incoming/outgoing traffic for specified ports.
no bandwidth control
flow control Enables/Disables traffic control function for
no flow control specified ports.
2-2
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch 1 1/0/7
1/0/9
1/0/10
Switch 3
2-3
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2-4
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2-5
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
e1/0/15
Vlan 100
e1/0/1 S1 e1/0/10
S2 S3
vlan100 but communicate with each other in vlan101-120, while both of them can communicate
with the uplink port e1/0/15 in vlan100-120.
The configuration of S1:
Switch(config)#interference ethernet 1/0/1;10;15
Switch(config-if-port-range)#switchport mode trunk
Switch(config)#vlan 100
Switch(config-vlan 100)#isolate-port group test switchport interface ethernet 1/0/1;1/0/10
2-7
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Port Mode
loopback-detection control {shutdown
Enable and disable the function of port
|block }
loopback detection control.
no loopback-detection control
2-8
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Global Mode
Configure the loopback-detection control
loopback-detection control-recovery
mode (automatic recovery enabled or not)
timeout <0-3600>
or recovery time.
SWITCH
Network Topology
corresponding relation between the spanning tree instance and the VLAN should be configured.
Switch(config)#spanning-tree
Switch(config)#spanning-tree mst configuration
Switch(Config-Mstp-Region)#instance 1 vlan 1
Switch(Config-Mstp-Region)#instance 2 vlan 2
Switch(Config-Mstp-Region)#
2.4 ULDP
Switch A
g1/0/1
g1/0/2 g1/0/3
g1/0/4
Switch B
2-10
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch A
Switch B
g1/0/2
g1/0/1
g1/0/3 Switch C
2-12
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Command Explanation
Global configuration mode
Configure the interval of Recovery reset,
uldp recovery-time <integer>
ranging from 30 to 86400 seconds. The value
no uldp recovery-time <integer>
is 0 second by default.
2-13
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch A
g1/0/1
g1/0/2 g1/0/3
g1/0/4
Switch B
PC2
PC1
In the network topology in Graph, port g1/0/1 and port g1/0/2 of SWITCH A as well as port
g1/0/3 and port g1/0/4 of SWITCH B are all fiber ports. And the connection is cross connection. The
physical layer is connected and works normally, but the data link layer is abnormal. ULDP can
discover and disable this kind of error state of link. The final result is that port g1/0/1, g1/0/2 of
SWITCH A and port g1/0/3, g1/0/4 of SWITCH B are all shut down by ULDP. Only when the
connection is correct, can the ports work normally (won’t be shut down).
Switch A configuration sequence:
SwitchA(config)#uldp enable
SwitchA(config)#interface ethernet 1/0/1
SwitchA(Config-If-Ethernet1/0/1)#uldp enable
SwitchA(Config-If-Ethernet1/0/1)#exit
SwitchA(config)#interface ethernet 1/0/2
SwitchA(Config-If-Ethernet1/0/2)#uldp enable
Switch B configuration sequence:
SwitchB(config)#uldp enable
SwitchB(config)#interface ethernet1/0/3
SwitchB(Config-If-Ethernet1/0/3)#uldp enable
SwitchB(Config-If-Ethernet1/0/3)#exit
SwitchB(config)#interface ethernet 1/0/4
SwitchB(Config-If-Ethernet1/0/4)#uldp enable
As a result, port g1/0/1, g1/0/2 of SWITCH A are all shut down by ULDP, and there is
notification information on the CRT terminal of PC1.
%Oct 29 11:09:50 2007 A unidirectional link is detected! Port Ethernet1/0/1 need to be
shutted down!
%Oct 29 11:09:50 2007 Unidirectional port Ethernet1/0/1 shut down!
%Oct 29 11:09:50 2007 A unidirectional link is detected! Port Ethernet1/0/2 need to be
shutted down!
%Oct 29 11:09:50 2007 Unidirectional port Ethernet1/0/2 shutted down!
2-14
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Port g1/0/3, and port g1/0/4 of SWITCH B are all shut down by ULDP, and there is notification
information on the CRT terminal of PC2.
%Oct 29 11:09:50 2007 A unidirectional link is detected! Port Ethernet1/0/3 need to be
shutted down!
%Oct 29 11:09:50 2007 Unidirectional port Ethernet1/0/3 shutted down!
%Oct 29 11:09:50 2007 A unidirectional link is detected! Port Ethernet1/0/4 need to be
shutted down!
%Oct 29 11:09:50 2007 Unidirectional port Ethernet1/0/4 shutted down!
ULDP. The ports shut down manually by users or by other modules won’t be reset by ULDP.
2.5 LLDP
routers, application servers and network servers. Such details will be very meaningful for
schedule and investigate the source of network failure.
LLDP will be a very useful management tool, providing accurate information about network
mirroring, flow data and searching network problems.
2-18
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
10. Configure the size of space to store Remote Table of the port
Command Explanation
Port Configuration Mode
Configure the size of space to store
lldp neighbors max-num < value >
Remote Table of the port as the specified
no lldp neighbors max-num
value or default value.
11. Configure the type of operation when the Remote Table of the port is full
Command Explanation
Port Configuration Mode
lldp tooManyNeighbors {discard | Configure the type of operation when the
delete} Remote Table of the port is full.
2-19
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
In the network topology graph above, the port 1,3 of SWITCH B are connected to port 2,4 of
SWITCH A. Port 1 of SWITCH B is configured to message-receiving-only mode, Option TLV of port
4 of SWITCH A is configured as portDes and SysCap.
SWITCH A configuration task sequence:
SwitchA(config)# lldp enable
SwitchA(config)#interface ethernet 1/0/4
SwitchA(Config-If-Ethernet1/0/4)#lldp transmit optional tlv portDesc sysCap
SwitchA(Config-If-Ethernet1/0/4)exit
2.6 LLDP-MED
2-20
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
SysCapSupported :4
SysCapEnabled :4
2-24
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
SysCapSupported :4
SysCapEnabled :4
Explanation:
1) Both Ethernet2 of switch A and Ethernet1 of switch B are the ports of network connection
device, they will not send LLDP packets with MED TLV information forwardly. Although configure
Ethernet1 of switch B to send MED TLV information, it will not send the related MED information,
that results the corresponding Remote table without the related MDE information on Ethernet2
of switch A.
2) LLDP-MED device is able to send LLDP packets with MED TLV forwardly, so the corresponding
Remote table with LLDP MED information on Ethernet1 of switch A.
S1
S2
aggregation group.
Command Explanation
Global Mode
port-group <port-group-number>
Create or delete a port group.
no port-group <port-group-number>
Command Explanation
Port Mode
port-group <port-group-number> mode {active
Add the ports to the port group and set their
| passive | on}
mode.
no port-group
Command Explanation
Aggregation port configuration mode
load-balance {src-mac | dst-mac | dst-src-mac | src-ip
Set load-balance for port-group.
| dst-ip | dst-src-ip | ingress-port | dst-src-mac-ip }
Command Explanation
Global mode
Set the system priority of LACP
lacp system-priority <system-priority>
protocol, the no command restores the
no lacp system-priority
default value.
Command Explanation
2-29
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Port mode
Set the port priority in LACP protocol.
lacp port-priority <port-priority>
The no command restores the default
no lacp port-priority
value.
Command Explanation
Port mode
Set the timeout mode in LACP protocol.
lacp timeout {short | long}
The no command restores the default
no lacp timeout
value.
S1
S2
Switch1#config
Switch1(config)#interface ethernet 1/0/1-4
Switch1(Config-If-Port-Range)#port-group 1 mode active
Switch1(Config-If-Port-Range)#exit
Switch1(config)#interface port-channel 1
Switch1(Config-If-Port-Channel1)#
2-30
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch2#config
Switch2(config)#port-group 2
Switch2(config)#interface ethernet 1/0/6
Switch2(Config-If-Ethernet1/0/6)#port-group 2 mode passive
Switch2(Config-If-Ethernet1/0/6)#exit
Switch2(config)#interface ethernet 1/0/8-10
Switch2(Config-If-Port-Range)#port-group 2 mode passive
Switch2(Config-If-Port-Range)#exit
Switch2(config)#interface port-channel 2
Switch2(Config-If-Port-Channel2)#
Configuration result:
Shell prompts ports aggregated successfully after a while, now ports 1, 2, 3, 4 of S1 form an
aggregated port named “Port-Channel1”, ports 6, 8, 9, 10 of S2 form an aggregated port named
“Port-Channel2”; can be configured in their respective aggregated port mode.
S1
S2
2-31
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch2#config
Switch2(config)#port-group 2
Switch2(config)#interface ethernet 1/0/6
Switch2 (Config-If-Ethernet1/0/6)#port-group 2 mode on
Switch2 (Config-If-Ethernet1/0/6)#exit
Switch2 (config)#interface ethernet 1/0/8-10
Switch2(Config-If-Port-Range)#port-group 2 mode on
Switch2(Config-If-Port-Range)#exit
Configuration result:
Add ports 1, 2, 3, 4 of S1 to port-group1 in order, and we can see a group in 'on' mode is
completely joined forcedly, switch in other ends won’t exchange LACP PDU to complete
aggregation. Aggregation finishes immediately when the command to add port 1/0/2 to
port-group 1 is entered, port 1 and port 2 aggregate to be port-channel 1, when port 1/0/3 joins
port-group 1, port-channel 1 of port 1 and 2 are ungrouped and re-aggregate with port 3 to form
port-channel 1, when port 1/0/4 joins port-group 1, port-channel 1 of port 1, 2 and 3 are
ungrouped and re-aggregate with port 4 to form port-channel 1. (It should be noted that
whenever a new port joins in an aggregated port group, the group will be ungrouped first and
re-aggregated to form a new group.) Now all four ports in both S1 and S2 are aggregated in 'on'
mode and become an aggregated port respectively.
2.7.6 Troubleshooting
2-32
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2.8 MTU
2.9 bpdu-tunnel
function, namely, data information generated by user’s network is able to inextenso arrive at
other networks of the same corporation through the service provider network. To maintain a
local concept, it not only needs to transmit the data within the user’s private network across the
tunnel, but also transmit layer 2 protocol packets within the user’s private network.
Command Explanation
Global mode
2-34
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
bpdu-tunnel-protocol user-defined-protocol
<name> protocol-mac <mac> {group-mac <mac> |
default-group-mac}
bpdu-tunnel-protocol user-defined-protocol
<name> protocol-mac <mac> encape-type
ethernetii protocol-type <type> {group-mac
<mac> | default-group-mac}
Configure or cancel the tunnel MAC
bpdu-tunnel-protocol user-defined-protocol address globally.
<name> protocol-mac <mac> encape-type snap
{oui <oui>| } protocol-type <type> {group-mac
<mac> | default-group-mac}
bpdu-tunnel-protocol user-defined-protocol
<name> protocol-mac <mac> encape-type llc dsap
<dsap> ssap <ssap> {group-mac <mac> |
default-group-mac}
no bpdu-tunnel-protocol user-defined-protocol
<name>
Command Explanation
Port mode
bpdu-tunnel-protocol {stp| gvrp| dot1x|
Enable the port to support the tunnel,
user-defined-protocol <name>}
the no command disables the
no bpdu-tunnel-protocol {stp| gvrp| dot1x|
function.
user-defined-protocol <name>}
2-35
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
each other.
2.10 DDM
2-36
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2-37
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Command Explanation
User mode, admin mode and global mode
show transceiver [interface ethernet Show the monitoring of the
<interface-list>][detail] transceiver.
2. Configure the alarm or warning thresholds of each parameter for the transceiver
Command Explanation
Port mode
transceiver threshold {default | {temperature |
voltage | bias | rx-power | tx-power} {high-alarm
Set the threshold defined by the user.
| low-alarm | high-warn | low-warn} {<value> |
default}}
Command Explanation
Global mode
Set the interval of the transceiver
transceiver-monitoring interval <minutes> monitor. The no command sets the
no transceiver-monitoring interval interval to be the default interval of
15 minutes.
Command Explanation
Port mode
Set whether the transceiver
monitoring is enabled. Only the port
enables the transceiver monitoring,
transceiver-monitoring {enable | disable} the system records the abnormity
state. After the port disables the
function, the abnormity information
will be clear.
Command Explanation
Admin mode and global mode
2-39
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Command Explanation
Admin mode
clear transceiver threshold-violation [interface Clear the threshold violation of the
ethernet <interface-list>] transceiver monitor.
2-40
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Example2:
Ethernet 21 is inserted the fiber module with DDM. Configure the threshold of the fiber
module after showing the DDM information.
Step1: Show the detailed DDM information.
Switch#show transceiver interface ethernet 1/0/21 detail
Ethernet 1/0/21 transceiver detail information:
Base information:
……
Brief alarm information:
2-41
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
RX loss of signal
Voltage high
RX power low
Detail diagnostic and threshold information:
Diagnostic Threshold
Realtime Value High Alarm Low Alarm High Warn Low Warn
-------------- ----------- ----------- ------------ ---------
Temperature(℃) 33 70 0 70 0
Voltage(V) 7.31(A+) 5.00 0.00 5.00 0.00
Bias current(mA) 6.11(W+) 10.30 0.00 5.00 0.00
RX Power(dBM) -30.54(A-) 9.00 -25.00 9.00 -25.00
TX Power(dBM) -13.01 9.00 -25.00 9.00 -25.00
Step2: Configure the tx-power threshold of the fiber module, the low-warning threshold is -12,
the low-alarm threshold is -10.00.
Switch#config
Switch(config)#interface ethernet 1/0/21
Switch(config-if-ethernet1/0/21)#transceiver threshold tx-power low-warning -12
Switch(config-if-ethernet1/0/21)#transceiver threshold tx-power low-alarm -10.00
Step3: Show the detailed DDM information of the fiber module. The alarm uses the threshold
configured by the user, the threshold configured by the manufacturer is labeled with the bracket.
There is the alarm with ‘A-’ due to -13.01 is less than -12.00.
Switch#show transceiver interface ethernet 1/0/21 detail
Ethernet 1/0/21 transceiver detail information:
Base information:
……
Brief alarm information:
RX loss of signal
Voltage high
RX power low
TX power low
Detail diagnostic and threshold information:
Diagnostic Threshold
Realtime Value High Alarm Low Alarm High Warn Low Warn
-------------- ----------- ----------- ---------- ---------
Temperature(℃) 33 70 0 70 0
Voltage(V) 7.31(A+) 5.00 0.00 5.00 0.00
Bias current(mA) 6.11(W+) 10.30 0.00 5.00 0.00
RX Power(dBM) -30.54(A-) 9.00 -25.00 9.00 -25.00
TX Power(dBM) -13.01(A-) 9.00 -12.00(-25.00) 9.00 -10.00(-25.00)
Example3:
Ethernet 21 is inserted the fiber module with DDM. Enable the transceiver monitoring of the
2-42
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Step3: Show the transceiver monitoring of the fiber module. In the following configuration,
ethernet 21 enabled the transceiver monitoring, the last threshold-violation time is Jan 02
11:00:50 2011, the detailed DDM information exceeding the threshold is also shown.
Switch(config-if-ethernet1/0/21)#quit
Switch(config)#show transceiver threshold-violation interface ethernet 1/0/21-22
Ethernet 1/0/21 transceiver threshold-violation information:
Transceiver monitor is enabled. Monitor interval is set to 30 minutes.
The current time is Jan 02 12:30:50 2011.
The last threshold-violation time is Jan 02 11:00:50 2011.
Brief alarm information:
RX loss of signal
RX power low
Detail diagnostic and threshold information:
Diagnostic Threshold
Realtime Value High Alarm Low Alarm High Warn Low Warn
------------ ----------- ----------- ------------ ---------
Temperature(℃) 33 70 0 70 0
Voltage(V) 7.31 10.00 0.00 5.00 0.00
Bias current(mA) 3.11 10.30 0.00 5.00 0.00
RX Power(dBM) -30.54(A-) 9.00 -25.00(-34) 9.00 -25.00
TX Power(dBM) -1.01 9.00 -12.05 9.00 -10.00
If problems occur when configuring DDM, please check whether the problem is caused by
the following reasons:
Ensure that the transceiver of the fiber module has been inserted fast on the port, or else
DDM configuration will not be shown.
Ensure that SNMP configuration is valid, or else the warning event cannot inform the
network management system.
Because only some boards and box switches support SFP with DDM or XFP with DDM,
ensure the used board and switch support the corresponding function.
When using show transceiver command or show transceiver detail command, it cost much
time due to the switch will check all ports, so it is recommended to query the monitoring
information of the transceiver on the specified port.
Ensure the threshold defined by the user is valid. When any threshold is error, the
transceiver will give an alarm according to the default setting automatically.
2-44
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2. Link Monitoring
Fault detection in an Ethernet is difficult, especially when the physical connection in the
network is not disconnected but network performance is degrading gradually. Link monitoring is
used to detect and discover link faults in various environments. EFM OAM implements link
monitoring through the exchange of Event Notification OAMPDUs. When detecting a link error
event, the local OAM entity sends an Event Notification OAMPDU to notify the remote OAM
entity. At the same time it will log information and send SNMP Trap to the network management
system. While OAM entity on the other side receives the notification, it will also log and report it.
With the log information, network administrators can keep track of network status in time.
The link event monitored by EFM OAM means that the link happens the error event,
including Errored symbol period event, Errored frame event, Errored frame period event, Errored
frame seconds event.
Errored symbol period event: The errored symbol number can not be less than the low
threshold. (Symbol: the min data transmission unit of physical medium. It is unique for coding
system, the symbols may be different for different physical mediums, symbol rate means the
2-45
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2-46
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
802.3ah
Ethernet in
the First Mile
CE 802.1ah OAMPDU PE
Command Explanation
Port mode
Configure work mode of EFM OAM,
ethernet-oam mode {active | passive}
default is active mode.
ethernet-oam Enable EFM OAM of port, no
no ethernet-oam command disables EFM OAM of port.
Configure transmission period of
ethernet-oam period <seconds>
OAMPDU (optional), no command
no ethernet-oam period
restores the default value.
Configure timeout of EFM OAM
ethernet-oam timeout <seconds>
connection, no command restores the
no ethernet-oam timeout
default value.
Command Explanation
2-47
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Port mode
ethernet-oam link-monitor Enable link monitor of EFM OAM, no
no ethernet-oam link-monitor command disables link monitor.
ethernet-oam errored-symbol-period {threshold Configure the low threshold and
low <low-symbols> | window <seconds>} window period of errored symbol
no ethernet-oam errored-symbol-period period event, no command resotores
{threshold low | window } the default value. (optional)
ethernet-oam errored-frame-period {threshold Configure the low threshold and
low <low-frames> | window <seconds>} window period of errored frame
no ethernet-oam errored-frame-period {threshold period event, no command resotores
low | window } the default value.
ethernet-oam errored-frame {threshold low Configure the low threshold and
<low-frames> | window <seconds>} window period of errored frame
no ethernet-oam errored-frame {threshold low | event, no command resotores the
window } default value. (optional)
ethernet-oam errored-frame-seconds {threshold Configure the low threshold and
low <low-frame-seconds> | window <seconds>} window period of errored frame
no ethernet-oam errored-frame-seconds seconds event, no command
{threshold low | window } resotores the default value. (optional)
Command Explanation
Port mode
Enable remote failure detection of
EFM OAM (failure means
ethernet-oam remote-failure
critical-event or link-fault event of the
no ethernet-oam remote-failure
local), no command disables the
function. (optional)
ethernet-oam errored-symbol-period threshold Configure the high threshold of
high {high-symbols | none} errored symbol period event, no
no ethernet-oam errored-symbol-period threshold command restores the default value.
high (optional)
ethernet-oam errored-frame-period threshold Configure the high threshold of
high {high-frames | none} errored frame period event, no
no ethernet-oam errored-frame-period threshold command restores the default value.
high (optional)
ethernet-oam errored-frame threshold high Configure the high threshold of
{high-frames | none} errored frame event, no command
no ethernet-oam errored-frame threshold high restores the default value. (optional)
ethernet-oam errored-frame-seconds threshold Configure the high threshold of
high {high-frame-seconds | none} errored frame seconds event, no
no ethernet-oam errored-frame-seconds command restores the default value.
threshold high (optional)
2-48
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
CE 802.1ah OAMPDU PE
Configuration on PE:
PE(config)#interface ethernet 1/0/1
PE (config-if-ethernet1/0/1)#ethernet-oam
Other parameters use the default configuration.
<vlan-list>] interface.
When exceeding the maximum
number of the configured MAC
addresses, MAC address
accessing the interface does not
switchport port-security violation {protect | recovery |
belongs to this interface in MAC
restrict | shutdown}
address table or a MAC address
no switchport port-security violation
is configured to several
interfaces in same VLAN, both
of them will violate the security
of the MAC address.
switchport port-security aging {static | time <value> |
Enable port-security aging entry
type {absolute | inactivity}}
of the interface, specify aging
no switchport port-security violation aging {static | time
time or aging type.
| type}
Admin mode
clear port-security {all | configured | dynamic | sticky}
Clear the secure MAC entry of
[[address <mac-addr> | interface <interface-id>] [vlan
the interface.
<vlan-id> ]]
show port-security [interface <interface-id>] [address | Show port-security
vlan] configuration.
HOST A
Ethernet1/0/1 Internet
SWITCH
HOST B
2.15 VLAN
2-53
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
The key idea of VLAN technology is that a large LAN can be partitioned into many separate
broadcast domains dynamically to meet the demands.
VLAN1
Server Server Server
VLAN2
PC PC PC
VLAN3 PC PC
Laser Printer
Each broadcast domain is a VLAN. VLANs have the same properties as the physical LANs,
except VLAN is a logical partition rather than physical one. Therefore, the partition of VLANs can
be performed regardless of physical locations, and the broadcast, multicast and unicast traffic
within a VLAN is separated from the other VLANs.
With the aforementioned features, VLAN technology provides us with the following
convenience:
Improving network performance
Saving network resources
Simplifying network management
Lowering network cost
Enhancing network security
Switch Ethernet Ports can works in three kinds of modes: Access, Hybrid and Trunk, each
mode has a different processing method in forwarding the packets with tagged or untagged.
The ports of Access type only belongs to one VLAN, usually they are used to connect the
ports of the computer.
The ports of Trunk type allow multi-VLANs to pass, can receive and send the packets of
multi-VLANs. Usually they are used to connect between the switches.
The ports of Hybrid type allow multi-VLANs to pass, can receive and send the packets of
multi-VLANs. They can be used to connect between the switches, or to a computer of the user.
Hybrid ports and Trunk ports receive the data with the same process method, but send the
data with different method: Hybrid ports can send the packets of multi-VLANs without the VLAN
tag, while Trunk ports send the packets of multi-VLANs with the VLAN tag except the port native
VLAN.
2-54
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
The switch implements VLAN and GVRP (GARP VLAN Registration Protocol) which are
defined by 802.1Q. The chapter will explain the use and the configuration of VLAN and GVRP in
detail.
Command Explanation
Global Mode
vlan WORD
Create/delete VLAN or enter VLAN Mode
no vlan WORD
Command Explanation
VLAN Mode
name <vlan-name>
Set or delete VLAN name.
no name
Command Explanation
VLAN Mode
switchport interface <interface-list>
Assign Switch ports to VLAN.
no switchport interface <interface-list>
Command Explanation
Port Mode
Set the current port as Trunk, Access or
switchport mode {trunk | access | hybrid}
Hybrid port.
Command Explanation
Port Mode
switchport trunk allowed vlan {WORD | all | Set/delete VLAN allowed to be crossed by
add WORD | except WORD | remove WORD} Trunk. The “no” command restores the
no switchport trunk allowed vlan default setting.
switchport trunk native vlan <vlan-id>
Set/delete PVID for Trunk port.
no switchport trunk native vlan
Command Explanation
Port Mode
Add the current port to the specified
switchport access vlan <vlan-id>
VLAN. The “no” command restores the
no switchport access vlan
default setting.
Command Explanation
Port Mode
switchport hybrid allowed vlan {WORD | all |
add WORD | except WORD | remove WORD} Set/delete the VLAN which is allowed by
{tag | untag} Hybrid port with tag or untag mode.
no switchport hybrid allowed vlan
switchport hybrid native vlan <vlan-id>
Set/delete PVID of the port.
no switchport hybrid native vlan
Command Explanation
Port Mode
vlan ingress enable
Enable/Disable VLAN ingress rules.
no vlan ingress enable
Command Explanation
VLAN mode
private-vlan {primary | isolated | community} Configure current VLAN to Private VLAN.
no private-vlan The no command deletes private VLAN.
Command Explanation
VLAN mode
2-56
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
VLAN100
VLAN2 VLAN200
PC Workstation Workstation PC
PC
PC
Switch A
Trunk Link
Switch B
PC
PC
VLAN2
VLAN200
PC PC
Workstation VLAN100
Workstation
The existing LAN is required to be partitioned to 3 VLANs due to security and application
requirements. The three VLANs are VLAN2, VLAN100 and VLAN200. Those three VLANs are cross
two different location A and B. One switch is placed in each site, and cross-location requirement
can be met if VLAN traffic can be transferred between the two switches.
Configuration Item Configuration description
VLAN2 Site A and site B switch port 2-4.
VLAN100 Site A and site B switch port 5-7.
VLAN200 Site A and site B switch port 8-10.
Trunk port Site A and site B switch port 11.
Connect the Trunk ports of both switches for a Trunk link to convey the cross-switch VLAN
traffic; connect all network devices to the other ports of corresponding VLANs.
In this example, port 1 and port 12 are spared and can be used for management port or for
other purposes.
The configuration steps are listed below:
2-57
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch A:
Switch(config)#vlan 2
Switch(Config-Vlan2)#switchport interface ethernet 1/0/2-4
Switch (Config-Vlan2)#exit
Switch (config)#vlan 100
Switch (Config-Vlan100)#switchport interface ethernet 1/0/5-7
Switch (Config-Vlan100)#exit
Switch (config)#vlan 200
Switch (Config-Vlan200)#switchport interface ethernet 1/0/8-10
Switch (Config-Vlan200)#exit
Switch (config)#interface ethernet 1/0/11
Switch (Config-If-Ethernet1/0/11)#switchport mode trunk
Switch(Config-If-Ethernet1/0/11)#exit
Switch(config)#
Switch B:
Switch(config)#vlan 2
Switch(Config-Vlan2)#switchport interface ethernet 1/0/2-4
Switch (Config-Vlan2)#exit
Switch (config)#vlan 100
Switch (Config-Vlan100)#switchport interface ethernet 1/0/5-7
Switch (Config-Vlan100)#exit
Switch (config)#vlan 200
Switch (Config-Vlan200)#switchport interface ethernet 1/0/8-10
Switch (Config-Vlan200)#exit
Switch (config)#interface ethernet 1/0/11
Switch (Config-If-Ethernet1/0/11)#switchport mode trunk
Switch (Config-If-Ethernet1/0/11)#exit
2-58
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
internet
Switch A
Switch B
PC1 PC2
PC1 connects to the interface Ethernet 1/0/7 of SwitchB, PC2 connects to the interface
Ethernet 1/0/9 of SwitchB, Ethernet 1/0/10 of SwitchA connect to Ethernet 1/0/10 of SwitchB.
It is required that PC1 and PC2 can not mutually access due to reason of the security, but
PC1 and PC2 can access other network resources through the gateway SwitchA. We can
implement this status through Hybrid port.
Switch B:
2-59
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch(config)#vlan 7;9;10
Switch(config)#interface ethernet 1/0/7
Switch(Config-If-Ethernet1/0/7)#switchport mode hybrid
Switch(Config-If-Ethernet1/0/7)#switchport hybrid native vlan 7
Switch(Config-If-Ethernet1/0/7)#switchport hybrid allowed vlan 7;10 untag
Switch(Config-If-Ethernet1/0/7)#exit
Switch(Config)#interface Ethernet 1/0/9
Switch(Config-If-Ethernet1/0/9)#switchport mode hybrid
Switch(Config-If-Ethernet1/0/9)#switchport hybrid native vlan 9
Switch(Config-If-Ethernet1/0/9)#switchport hybrid allowed vlan 9;10 untag
Switch(Config-If-Ethernet1/0/9)#exit
Switch(Config)#interface Ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport mode hybrid
Switch(Config-If-Ethernet1/0/10)#switchport hybrid native vlan 10
Switch(Config-If-Ethernet1/0/10)#switchport hybrid allowed vlan 7;9;10 untag
Switch(Config-If-Ethernet1/0/10)#exit
2.16 GVRP
because intermediate switches without relevant VLANs. However, after GVRP is enabled on all
switches, its VLAN attribute transmission mechanism enables the intermediate switches
registering the VLANs dynamically, and the VLAN in VLAN100-1000 of A and G can communicate
with each other. The VLANs dynamically registered by intermediate switches will be deregistered
when deregistering VLAN100-1000 of A and G switches manually. So the same VLAN of two
unadjacent switches can communicate mutually through GVRP protocol instead of configuring
each intermediate switch manually for achieving the purpose of simplifying VLAN configuration.
Command Explanation
Global mode
garp timer join <200-500>
garp timer leave <500-1200> Configure leaveall, join and leave
garp timer leaveall <5000-60000> timer for GVRP.
no garp timer (join | leave | leaveAll)
Command Explanation
Port mode
gvrp Enable/ disable GVRP function of
no gvrp port.
Command Explanation
Global mode
gvrp Enable/ disable the global GVRP
no gvrp function of port.
2-61
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
To enable dynamic VLAN information register and update among switches, GVRP protocol is
to be configured in the switch. Configure GVRP in Switch A, B and C, enable Switch B to learn
VLAN100 dynamically so that two workstations connected to VLAN100 in Switch A and C can
communicate with each other through Switch B without static VLAN100 entries.
Switch(Config-If-Ethernet1/0/11)#exit
Switch B:
Switch(config)#gvrp
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport mode trunk
Switch(Config-If-Ethernet1/0/10)# gvrp
Switch(Config-If-Ethernet1/0/10)#exit
Switch(config)#interface ethernet 1/0/11
Switch(Config-If-Ethernet1/0/11)#switchport mode trunk
Switch(Config-If-Ethernet1/0/11)# gvrp
Switch(Config-If-Ethernet1/0/11)#exit
Switch C:
Switch(config)# gvrp
Switch(config)#vlan 100
Switch(Config-Vlan100)#switchport interface ethernet 1/0/2-6
Switch(Config-Vlan100)#exit
Switch(config)#interface ethernet 1/0/11
Switch(Config-If-Ethernet1/0/11)#switchport mode trunk
Switch(Config-If-Ethernet1/0/11)# gvrp
Switch(Config-If-Ethernet1/0/11)#exit
2.17 Dot1q-tunnel
2-63
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Trunk connection
Customer networks1 P
Trunk connection
Command Explanation
Port mode
dot1q-tunnel enable Enter/exit the dot1q-tunnel mode on the
no dot1q-tunnel enable port.
Command Explanation
Global mode
dot1q-tunnel tpid
Configure the global protocol type.
{0x8100|0x9100|0x9200|<1-65535>}
PE2:
Switch(config)#vlan 3
Switch(Config-Vlan3)#switchport interface ethernet 1/0/1
Switch(Config-Vlan3)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(Config-Ethernet1/0/1)# dot1q-tunnel enable
Switch(Config-Ethernet1/0/1)# exit
Switch(Config)#interface ethernet 1/0/10
Switch(Config-Ethernet1/0/10)#switchport mode trunk
Switch(Config-Ethernet1/0/10)#exit
Switch(config)#dot1q-tunnel tpid 0x9100
Switch(Config)#
1. Configure the port mapping relation between the inner tag and the outer tag
Command Explanation
Port mode
dot1q-tunnel selective s-vlan <s-vid> c-vlan
Configure/delete the port mapping
<c-vid-list>
relation of the inner tag and the outer tag
no dot1q-tunnel selective s-vlan <s-vid> c-vlan
for selective QinQ.
<c-vid-list>
Command Explanation
Port mode
dot1q-tunnel selective enable
Enable/disable selective QinQ of the port.
no dot1q-tunnel selective enable
Eth1/0/1 Eth1/0/2
SP网络
VLAN1000/2000 Eth1/0/9
SWITCHB
Eth1/0/9
SWITCHA
VLAN 200, and IP phone users belong to VLAN 201 through VLAN 300. Ethernet 1/0/9 of SwitchA
is connected to the public network.
2. Ethernet1/0/1 and Ethernet1/0/2 of SwitchB provide network access for PC users belonging to
VLAN 100 through VLAN 200 and IP phone users belonging to VLAN 201 through VLAN 300
respectively. Ethernet 1/0/9 is connected to the public network.
3. The public network permits packets of VLAN 1000 and VLAN 2000 to pass.
4. Enable the selective QinQ on Ethernet1/0/1 and Ethernet1/0/2 ports of Switch A and Switch B
respectively. Packets of VLAN 100 through VLAN 200 are tagged with the tag of VLAN 1000 as the
outer VLAN tag on Ethernet1/0/1, and packets of VLAN 201 through VLAN 300 are tagged with the
tag of VLAN 2000 as the outer VLAN tag on Ethernet1/0/2.
Steps of configuration:
# Create VLAN 1000 and VLAN 2000 on SwitchA.
switch(config)#vlan 1000;2000
# Configure Ethernet1/0/1 as a hybrid port and configure it to remove VLAN tags when forwarding
packets of VLAN 1000.
switch(config-if-ethernet1/0/1)#switchport hybrid allowed vlan 1000 untag
# Configure the mapping rules for selective QinQ on Ehernet1/0/1 to insert VLAN 1000 tag as the
outer VLAN tag in packets with the tags of VLAN 100 through VLAN 200.
switch(config-if-ethernet1/0/1)#dot1q-tunnel selective s-vlan 1000 c-vlan 100-200
# Enable selective QinQ on Ethernet1/0/1.
switch(config-if-ethernet1/0/1)#dot1q-tunnel selective enable
# Configure Ethernet 1/0/2 as a hybrid port and configure it to remove VLAN tags when
forwarding packets of VLAN 2000.
switch(config-if-ethernet1/0/2)#switchport mode hybrid
switch(config-if-ethernet1/0/2)#switchport hybrid allowed vlan 2000 untag
# Configure mapping rules for selective QinQ on Ehernet1/0/2 to insert VLAN 2000 tag as the
outer VLAN tag in packets with the tags of VLAN 201 through VLAN 300.
switch(config-if-ethernet1/0/2)#dot1q-tunnel selective s-vlan 2000 c-vlan 201-300
# Enable selective QinQ on Ethernet 1/0/2.
switch(config-if-ethernet1/0/2)#dot1q-tunnel selective enable
# Configure uplink port Ethernet 1/0/9 as a hybrid port and configure it to save VLAN tags when
forwarding packets of VLAN 1000 and VLAN 2000.
switch(config-if-ethernet1/0/2)#interface ethernet 1/0/9
switch(config-if-ethernet1/0/9)#switchport mode hybrid
switch(config-if-ethernet1/0/9)#switchport hybrid allowed vlan 1000;2000 tag
After the above configuration, packets of VLAN 100 through VLAN 200 from Ethernet1/0/1 are
automatically tagged with the tag of VLAN 1000 as the outer VLAN tag, and packets of VLAN 201
through VLAN 300 from Ethernet1/0/2 are automatically tagged with the tag of VLAN 2000 as the
outer VLAN tag on SwitchA.
The configuration on Switch B is similar to that on Switch A, the configuration is as follows:
switch(config)#vlan 1000;2000
switch(config)#interface ethernet 1/0/1
switch(config-if-ethernet1/0/1)#switchport mode hybrid
2-68
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2.19 VLAN-translation
Command Explanation
Port mode
vlan-translation enable Enter/exit the port VLAN-translation
no vlan-translation enable mode.
Command Explanation
2-69
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Global/Port mode
vlan-translation <old-vlan-id> to
<new-vlan-id> in Add/delete a VLAN-translation relation.
no vlan-translation old-vlan-id in
3. Configuration the VLAN-translation function on the port to check failture whether lose
packets
Command Explanation
Port mode
vlan-translation miss drop {in | out | both} Set/cancel VLAN-translation to check lose
no vlan-translation miss drop {in | out | both} packets when translation failed.
Command Explanation
Admin mode
Show the related configuration of
show vlan-translation
vlan-translation.
Trunk connection
Customer networks1 P
Trunk connection
2-70
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2-71
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
The MAC-based VLAN division is based on the MAC address of each host, namely every host
with a MAC address will be assigned to certain VLAN. By the means, the network user will
maintain his membership in his belonging VLAN when moves from a physical location to
another. As we can see the greatest advantage of this VLAN division is that the VLAN does not
have to be re-configured when the user physic location change, namely shift from one switch to
another, which is because it is user based, not switch port based.
The IP subnet based VLAN is divided according to the source IP address and its subnet mask
of every host. It assigns corresponding VLAN ID to the data packet according to the subnet
segment, leading the data packet to specified VLAN. Its advantage is the same as that of the
MAC-based VLAN: the user does not have to change configuration when relocated.
The VLAN is divided by the network layer protocol, assigning different protocol to different
VLANs. This is very attractive to the network administrators who wish to organize the user by
applications and services. Moreover the user can move freely within the network while
maintaining his membership. Advantage of this method enables user to change physical position
without changing their VLAN residing configuration, while the VLAN can be divided by types of
protocols which is important to the network administrators. Further, this method has no need of
added frame label to identify the VLAN which reduce the network traffic.
Notice: Dynamic VLAN needs to associate with Hybrid attribute of the ports to work, so the
ports that may be added to a dynamic VLAN must be configured as Hybrid port.
Command Explanation
Port Mode
switchport mac-vlan enable Enable/disable the MAC-based VLAN
no switchport mac-vlan enable function on the port.
Command Explanation
Global Mode
2-72
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
3. Configure the correspondence between the MAC address and the VLAN
Command Explanation
Global Mode
mac-vlan mac <mac-addrss> <mac-mask> vlan Add/delete the correspondence between
<vlan-id> priority <priority-id> the MAC address and the VLAN, it means
no mac-vlan {mac <mac-addrss> to make the specified MAC address
<mac-mask>|all} join/leave the specified VLAN.
Command Explanation
Port Mode
switchport subnet-vlan enable Enable/disable the port IP-subnet-base
no switchport subnet-vlan enable VLAN function on the port.
Command Explanation
Global Mode
subnet-vlan ip-address <ipv4-addrss> mask
Add/delete the correspondence between
<subnet-mask> vlan <vlan-id> priority
the IP subnet and the VLAN, namely
<priority-id>
specified IP subnet joins/leaves specified
no subnet-vlan {ip-address <ipv4-addrss>
VLAN.
mask <subnet-mask>|all}
Command Explanation
Global Mode
protocol-vlan mode {ethernetii etype
<etype-id>|llc {dsap <dsap-id> ssap
Add/delete the correspondence between
<ssap-id>}|snap etype <etype-id>} vlan
the Protocols and the VLAN, namely
<vlan-id> priority <priority-id>
specified protocol joins/leaves specified
no protocol-vlan {mode {ethernetii etype
VLAN.
<etype-id>|llc {dsap <dsap-id> ssap
<ssap-id>}|snap etype <etype-id>}|all}
Command Explanation
2-73
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Global Mode
dynamic-vlan mac-vlan prefer Configure the priority of the dynamic
dynamic-vlan subnet-vlan prefer VLAN.
VLAN100
VLAN200
VLAN300
M
SwitchB (Config)#exit
SwitchB#
Dynamic VLAN
192.168.1.100/24 192.168.1.200/24
(Organizationally Unique Identifier) will be considered the voice data traffic and transmitted to
the Voice VLAN.
The configuration is based on MAC address, acquiring a mechanism in which every voice
equipment transmitting information through the network has got its unique MAC address. VLAN
will trace the address belongs to specified MAC. By This means, VLAN allows the voice equipment
always belong to Voice VLAN when relocated physically. The greatest advantage of the VLAN is
the equipment can be automatically placed into Voice VLAN according to its voice traffic which
will be transmitted at specified priority. Meanwhile, when voice equipment is physically relocated,
it still belongs to the Voice VLAN without any further configuration modification, which is
because it is based on voice equipment other than switch port.
Notice: Voice VLAN needs to associate with Hybrid attribute of the ports to work, so the
ports that may be added to Voice VLAN must be configured as Hybrid port.
Command Explanation
Global Mode
voice-vlan vlan <vlan-id>
Set/cancel the VLAN as a Voice VLAN
no voice-vlan
Command Explanation
Global Mode
voice-vlan mac <mac-address> mask
<mac-mask> priority <priority-id> [name
Specify certain voice equipment join/leave
<voice-name>]
the Voice VLAN
no voice-vlan {mac <mac-address> mask
<mac-mask>|name <voice-name> |all}
Command Explanation
Port Mode
switchport voice-vlan enable Enable/disable the Voice VLAN function
no switchport voice-vlan enable on the port
2-76
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch
IP-phone1 IP-phone2
Configuration procedure:
Switch 1:
Switch(config)#vlan 100
Switch(Config-Vlan100)#exit
Switch(config)#voice-vlan vlan 100
Switch(config)#voice-vlan mac 00-03-0f-11-22-33 mask 255 priority 5 name company
Switch(config)#voice-vlan mac 00-03-0f-11-22-55 mask 255 priority 5 name company
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport mode trunk
Switch(Config-If-Ethernet1/0/10)#exit
switch(Config)#interface ethernet 1/0/1
switch(Config-If-Ethernet1/0/1)#switchport mode hybrid
switch(Config-If-Ethernet1/0/1)#switchport hybrid allowed vlan 100 untag
switch(Config-If-Ethernet1/0/1)#exit
switch(Config)#interface ethernet 1/0/2
switch(Config-If-Ethernet1/0/2)#switchport mode hybrid
switch(Config-If-Ethernet1/0/2)#switchport hybrid allowed vlan 100 untag
2-77
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
switch(Config-If-Ethernet1/0/2)#exit
Voice VLAN can not be applied concurrently with MAC-base VLAN. The Voice VLAN
support maximum 1024 sets of voice equipments, the exceeded number of
equipments will not be supported.
Command Explanation
Port mode
vlan-translation n-to-1 <WORD> to
Configure/delete Multi-to-One VLAN
<new-vlan-id>
translation.
no vlan-translation n-to-1 <WORD>
Command Explanation
Admin mode
Show the related configuration of
show vlan-translation n-to-1
Multi-to-One VLAN translation.
2-78
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
2-79
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Switch1、Switch2:
switch(Config)# vlan 1-3;100
switch(Config-Ethernet1/0/1)#switchport mode trunk
switch(Config-Ethernet1/0/1)# vlan-translation n-to-1 1-3 to 100
switch(Config)#interface ethernet 1/0/5
switch(Config-Ethernet1/0/5)#switchport mode trunk
switch(Config-Ethernet1/0/5)#exit
2-80
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
mapping between the MAC addresses and the ports; dynamic learning is the process in which the
switch learns the mapping between MAC addresses and ports, and updates the MAC table
regularly. In this section, we will focus on the dynamic learning process of MAC table.
2-81
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Command Explanation
Global Mode
mac-address-table {static | blackhole} address
<mac-addr> vlan <vlan-id > [interface
ethernet <interface-name>] |
[source|destination|both] Configure static MAC entries, filter address
no mac-address-table {static | blackhole | entires.
dynamic} [address <mac-addr>] [vlan
<vlan-id>][interface ethernet
<interface-name>]
l2-address-table static-multicast address
{<ip-addr> |<mac-addr>} vlan <vlan-id>
{interface [ethernet <interface-name>] |
port-channel <port-channel-id>}
Configure static multicast MAC entries.
no l2-address-table static-multicast address
{<ip-addr> |<mac-addr>} vlan <vlan-id>
{interface [ethernet <interface-name>] |
port-channel <port-channel-id>}
Command Explanation
2-83
S4600_Configuration Guide Chapter 2 Layer 2 services Configuration
Global Mode
mac-address-learning cpu-control Enable MAC learning through CPU
no mac-address-learning cpu-control control, the no command restores that
the chip automatically learn MAC
address.
show collision-mac-address-table Show the hash collision mac table.
Admin Mode
clear collision-mac-address-table Clear the hash collision mac table.
Using the show mac-address-table command, a port is found to be failed to learn the MAC
of a device connected to it. Possible reasons:
The connected cable is broken.
Spanning Tree is enabled and the port is in “discarding” status; or the device is just
connected to the port and Spanning Tree is still under calculation, wait until the
Spanning Tree calculation finishes, and the port will learn the MAC address.
If not the problems mentioned above, please check for the switch portand contact
technical support for solution.
Command Explanation
Global mode
snmp-server enable traps mac-notification Configure or cancel the global snmp
no snmp-server enable traps mac-notification MAC notification.
Command Explanation
Global mode
mac-address-table notification Configure or cancel the global MAC
no mac-address-table notification notification.
Command Explanation
Global mode
Configure the interval for sending the
mac-address-table notification interval <0-86400> MAC address notification, the no
no mac-address-table notification interval command restores the default
interval.
Command Explanation
Global mode
mac-address-table notification history-size Configure the history table size, the
<0-500> no command restores the default
no mac-address-table notification history-size value.
Command Explanation
Port mode
Configure or cancel the trap type of
mac-notification {added | both | removed}
MAC notification supported by the
no mac-notification
port.
Command Explanation
Admin mode
Show the configuration and the data
show mac-notification summary
of MAC notification.
Command Explanation
Admin mode
Clear the statistics of MAC notification
clear mac-notification statistics
trap.
2-87
S4600_Configuration Guide Chapter 3 IP services Configuration
3-1
S4600_Configuration Guide Chapter 3 IP services Configuration
3.2 IP Configuration
3-2
S4600_Configuration Guide Chapter 3 IP services Configuration
Mechanism collaborates with data packet source which enhances the processing efficiency of
router.
Address automatic configuration and plug-and-play is supported. Large amounts of hosts can
find network routers easily by address automatic configuration function of IPv6 while obtaining a
globally unique IPv6 address automatically as well which makes the devices using IPv6 Internet
plug-and-play. Automatic address configuration function also makes the readdressing of existing
network easier and more convenient, and it is more convenient for network operators to manage
the transformation from one provider to another.
Support IPSec. IPSec is optional in IPv4, but required in IPv6 Protocol. IPv6 provides security
extended header, which provides end-to-end security services such as access control,
confidentiality and data integrity, consequently making the implement of encryption, validation
and Virtual Private Network easier.
Enhance the support for Mobile IP and mobile calculating devices. The Mobile IP Protocol
defined in IETF standard makes mobile devices movable without cutting the existing connection,
which is a network function getting more and more important. Unlike IPv4, the mobility of IPv6 is
from embedded automatic configuration to get transmission address (Care-Of-Address);
therefore it doesn’t need Foreign Agent. Furthermore, this kind of binding process enables
Correspondent Node communicate with Mobile Node directly, thereby avoids the extra system
cost caused by triangle routing choice required in IPv4.
Avoid the use of Network Address Translation. The purpose of the introduction of NAT
mechanism is to share and reuse same address space among different network segments. This
mechanism mitigates the problem of the shortage of IPv4 address temporally; meanwhile it adds
the burden of address translation process for network device and application. Since the address
space of IPv6 has increased greatly, address translation becomes unnecessary, thus the problems
and system cost caused by NAT deployment are solved naturally.
Support extensively deployed Routing Protocol. IPv6 has kept and extended the supports for
existing Internal Gateway Protocols (IGP for short), and Exterior Gateway Protocols (EGP for
short). For example, IPv6 Routing Protocol such as RIPng, OSPFv3, IS-ISv6 and MBGP4+, etc.
Multicast addresses increased and the support for multicast has enhanced. By dealing with
IPv4 broadcast functions such as Router Discovery and Router Query, IPv6 multicast has
completely replaced IPv4 broadcast in the sense of function. Multicast not only saves network
bandwidth, but enhances network efficiency as well.
3.2.2 IP Configuration
Layer 3 interface can be configured as IPv4 interface, IPv6 interface.
3-4
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Command Explanation
3-5
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Admin Mode
3-6
S4600_Configuration Guide Chapter 3 IP services Configuration
If the connected PC has not obtained IPv6 address, you should check the RA announcement
switch (the default is turned off)
3.3 ARP
3-7
S4600_Configuration Guide Chapter 3 IP services Configuration
3-8
S4600_Configuration Guide Chapter 3 IP services Configuration
2. Configure the threshold of the port-based and IP-based ARP Scanning Prevention
Command Explanation
Global configuration mode
anti-arpscan port-based threshold
<threshold-value> Set the threshold of the port-based ARP
no anti-arpscan port-based Scanning Prevention.
threshold
anti-arpscan ip-based {level1|level2}
threshold <threshold-value> Set the threshold of the IP-based ARP
no anti-arpscan ip-based {level1|level2} Scanning Prevention.
threshold
4. Configure trusted IP
Command Explanation
Global configuration mode
anti-arpscan trust ip <ip-address>
[<netmask>]
Set the trust attributes of IP.
no anti-arpscan trust ip <ip-address>
[<netmask>]
3-9
S4600_Configuration Guide Chapter 3 IP services Configuration
3-10
S4600_Configuration Guide Chapter 3 IP services Configuration
SWITCH B
E1/0/1
E1/0/19
SWITCH A
E1/0/2
E1/0/2
PC PC
Server
192.168.1.100/24
Figure 3-1 ARP scanning prevention typical configuration example
In the network topology above, port E1/0/1 of SWITCH B is connected to port E1/0/19 of
SWITCH A, the port E1/0/2 of SWITCH A is connected to file server (IP address is 192.168.1.100/24),
and all the other ports of SWITCH A are connected to common PC. The following configuration
can prevent ARP scanning effectively without affecting the normal operation of the system.
SWITCH A configuration task sequence:
SwitchA(config)#anti-arpscan enable
SwitchA(config)#anti-arpscan recovery time 3600
SwitchA(config)#anti-arpscan trust ip 192.168.1.100 255.255.255.0
SwitchA(config)#interface ethernet1/0/2
SwitchA (Config-If-Ethernet1/0/2)#anti-arpscan trust port
SwitchA (Config-If-Ethernet1/0/2)#exit
SwitchA(config)#interface ethernet1/0/19
SwitchA (Config-If-Ethernet1/0/19)#anti-arpscan trust supertrust-port
Switch A(Config-If-Ethernet1/0/19)#exit
3-11
S4600_Configuration Guide Chapter 3 IP services Configuration
3.5.1 Overview
networks is to disable switch automatic update function; the cheater can’t modify corrected MAC
address in order to avoid wrong packets transfer and can’t obtain other information. At one time,
it doesn’t interrupt the automatic learning function of ARP. Thus it prevents ARP spoofing and
attack to a great extent.
A B
3-13
S4600_Configuration Guide Chapter 3 IP services Configuration
Equipment Explanation
Equipment Configuration Quality
switch IP:192.168.2.4; IP:192.168.1.4; mac: 00-00-00-00-00-04 1
A IP:192.168.2.1; mac: 00-00-00-00-00-01 1
B IP:192.168.1.2; mac: 00-00-00-00-00-02 1
C IP:192.168.2.3; mac: 00-00-00-00-00-03 some
and MAC address, causing problems in network communication. The danger of ARP cheating has
two forms: 1. PC4 sends an ARP message to advertise that the IP address of PC2 is mapped to the
MAC address of PC4, which will cause all the IP messages to PC2 will be sent to PC4, thus PC4 will
be able to monitor and capture the messages to PC2; 2. PC4 sends ARP messages to advertise
that the IP address of PC2 is mapped to an illegal MAC address, which will prevent PC2 from
receiving the messages to it. Particularly, if the attacker pretends to be the gateway and do ARP
cheating, the whole network will be collapsed.
PC1 Switch
HUB A B C D
PC2
PC3
3-15
S4600_Configuration Guide Chapter 3 IP services Configuration
1. Enable gratuitous ARP and configure the interval to send gratuitous ARP request.
Command Explanation
3-16
S4600_Configuration Guide Chapter 3 IP services Configuration
Switch
Interface vlan10
Interface vlan1
192.168.15.254
192.168.14.254
255.255.255.0
255.255.255.0
For the network topology shown in the figure above, interface VLAN10 whose IP address is
192.168.15.254 and network address mask is 255.255.255.0 in the switch system. Five PCs – PC1,
PC2, PC3, PC4, PC5 are connected to the interface. Gratuitous ARP can be enabled through the
following configuration:
3-17
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Global Mode
ip arp inspection vlan <vlan-id> Enable the dynamic ARP inspection function
no ip arp inspection vlan <vlan-id> based on vlan. The no command disables it.
Command Explanation
Port Mode
Configure the port as the trusted port of the
ip arp inspection trust
dynamic ARP inspection. The no command
no ip arp inspection trust
configures the untrusted port.
Command Explanation
Port Mode
3-18
S4600_Configuration Guide Chapter 3 IP services Configuration
ip arp inspection limit-rate <rate> Limit the ARP packet rate of the untrusted port.
no ip arp inspection limit-rate <rate> The no command cancels the limited cpu rate.
DHCP Server PC
Other Server
!
interface Vlan10
ip address 192.168.10.1 255.255.255.0
Explanation: In this case, there are two method of static and dynamic using of DAI. The ARP
packets from the untrusted port will all be transmitted to DHCP monitoring binding table for
checking if they are lawful.
After the client gotten the IP address dynamically, it can be modified to be the static IP
address, but it must be the same IP address to the dynamic one. If modifies to be other IP
address, it cannot be accessed in the network and the switch can send the warning about the
illegal ARP.
3.9 DHCP
Discover
Offer
Request
Ack
DHCP SERVER
DHCP CLIENT
3-20
S4600_Configuration Guide Chapter 3 IP services Configuration
2. On receiving the DHCPDISCOVER packet, DHCP server sends a DHCPOFFER packet along with
IP address and other network parameters to the DHCP client.
3. DHCP client broadcast DHCPREQUEST packet with the information for the DHCP server it
selected after selecting from the DHCPOFFER packets.
4. The DHCP server selected by the client sends a DHCPACK packet and the client gets an IP
address and other network configuration parameters.
The above four steps finish a Dynamic host configuration assignment process. However, if
the DHCP server and the DHCP client are not in the same network, the server will not receive the
DHCP broadcast packets sent by the client, therefore no DHCP packets will be sent to the client by
the server. In this case, a DHCP relay is required to forward such DHCP packets so that the DHCP
packets exchange can be completed between the DHCP client and server.
Switch can act as both a DHCP server and a DHCP relay. DHCP server supports not only
dynamic IP address assignment, but also manual IP address binding (i.e. specify a specific IP
address to a specified MAC address or specified device ID over a long period. The differences and
relations between dynamic IP address allocation and manual IP address binding are: 1) IP address
obtained dynamically can be different every time; manually bound IP address will be the same all
the time. 2) The lease period of IP address obtained dynamically is the same as the lease period
of the address pool, and is limited; the lease of manually bound IP address is theoretically endless.
3) Dynamically allocated address cannot be bound manually. 4) Dynamic DHCP address pool can
inherit the network configuration parameters of the dynamic DHCP address pool of the related
segment.
3-22
S4600_Configuration Guide Chapter 3 IP services Configuration
3-23
S4600_Configuration Guide Chapter 3 IP services Configuration
DHCPDiscover(Broadcast) DHCPDiscover
DHCPOFFER(Unicast) DHCPOFFER
DHCPREQUEST(Broadcast) DHCPREQUEST
DHCPACK(Unicast) DHCP Relay DHCPACK
DHCP Client DHCP Server
3. Configure share-vlan
3-24
S4600_Configuration Guide Chapter 3 IP services Configuration
When the user want to use layer 2 device as DHCP relay, there is the number limitation that
create layer 3 interface on layer 2 device, but using the layer 3 interface of share-vlan (it may
include many sub-vlan, however a sub-vlan only correspond to a share-vlan) can implement
DHCP relay forwarding, and the relay device needs to enable option82 function at the same time.
Command Explanation
Global Mode
ip dhcp relay share-vlan <vlanid>
sub-vlan <vlanlist> Create or delete share-vlan and it's sub-vlan.
no dhcp relay share-vlan
Switch(dhcp-B-config)#lease 1
Switch(dhcp-B-config)#default-route 10.16.2.200 10.16.2.201
Switch(dhcp-B-config)#dns-server 10.16.2.202
Switch(dhcp-B-config)#option 72 ip 10.16.2.209
Switch(dhcp-config)#exit
Switch(config)#ip dhcp excluded-address 10.16.2.200 10.16.2.201
Switch(config)#ip dhcp pool A1
Switch(dhcp-A1-config)#host 10.16.1.210
Switch(dhcp-A1-config)#hardware-address 00-03-22-23-dc-ab
Switch(dhcp-A1-config)#exit
Usage Guide: When a DHCP/BOOTP client is connected to a VLAN1 port of the switch, the client
can only get its address from 10.16.1.0/24 instead of 10.16.2.0/24. This is because the broadcast
packet from the client will be requesting the IP address in the same segment of the VLAN
interface after VLAN interface forwarding, and the VLAN interface IP address is 10.16.1.2/24,
therefore the IP address assigned to the client will belong to 10.16.1.0/24.
If the DHCP/BOOTP client wants to have an address in 10.16.2.0/24, the gateway forwarding
broadcast packets of the client must belong to 10.16.2.0/24. The connectivity between the client
gateway and the switch must be ensured for the client to get an IP address from the 10.16.2.0/24
address pool.
Scenario 2:
E1/0/1 E1/0/2
DHCP Client
192.168.1.1 10.1.1.1
DHCP Client
3-26
S4600_Configuration Guide Chapter 3 IP services Configuration
Switch(Config-Vlan-2)#exit
Switch(config)#interface Ethernet 1/0/2
Switch(Config-Erthernet1/0/2)#switchport access vlan 2
Switch(Config-Erthernet1/0/2)#exit
Switch(config)#interface vlan 2
Switch(Config-if-Vlan2)#ip address 10.1.1.1 255.255.255.0
Switch(Config-if-Vlan2)#exit
Switch(config)#ip forward-protocol udp bootps
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip help-address 10.1.1.10
Switch(Config-if-Vlan1)#exit
Note: It is recommended to use the combination of command ip forward-protocol udp <port>
and ip helper-address <ipaddress>. ip help-address can only be configured for ports on layer 3
and cannot be configured on layer 2 ports directly.
Scenario 3:
3-27
S4600_Configuration Guide Chapter 3 IP services Configuration
3-28
S4600_Configuration Guide Chapter 3 IP services Configuration
Code: represents the sequence number of the relay agent information option, the option 82 is
called so because RFC3046 is defined as 82.
Len: the number of bytes in Agent Information Field, not including the two bytes in Code
segment and Len segment.
Option 82 can have several sub-options, and need at least one sub-option. RFC3046 defines
the following two sub-options, whose formats are showed as follows:
SubOpt: the sequence number of sub-option, the sequence number of Circuit ID sub-option is 1,
the sequence number of Remote ID sub-option is 2.
Len: the number of bytes in Sub-option Value, not including the two bytes in SubOpt segment
and Len segment.
DHCP Reply
DHCP Client
DHCP Server
3-30
S4600_Configuration Guide Chapter 3 IP services Configuration
3-31
S4600_Configuration Guide Chapter 3 IP services Configuration
5. Configure delimiter
Command Explanation
Global mode
ip dhcp relay information option delimiter
Set the delimiter of each parameter for
[colon | dot | slash | space]
suboption of option82 in global mode, no
no ip dhcp relay information option
command restores the delimiter as slash.
delimiter
3-32
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Admin mode
This command will display the state
information of the DHCP option 82 in the
system, including option82 enabling switch,
show ip dhcp relay information option
the interface retransmitting policy, the
circuit ID mode and the DHCP server
option82 enabling switch.
This command is used to display the
information of data packets processing in
debug ip dhcp relay packet
DHCP Relay Agent, including the “add” and
“peel” action of option 82.
Linux ISC DHCP Server supports option 82, its configuration file /etc/dhcpd.con is
ddns-update-style interim;
ignore client-updates;
class "Switch3Vlan2Class1" {
match if option agent.circuit-id = "Vlan2+Ethernet1/0/2" and option
agent.remote-id=00:03:0f:02:33:01;
}
class "Switch3Vlan2Class2" {
match if option agent.circuit-id = "Vlan2+Ethernet1/0/3" and option
agent.remote-id=00:03:0f:02:33:01;
}
pool {
range 192.168.102.21 192.168.102.50;
default-lease-time 86400; #24 Hours
max-lease-time 172800; #48 Hours
allow members of "Switch3Vlan2Class1";
}
pool {
range 192.168.102.51 192.168.102.80;
default-lease-time 43200; #12 Hours
max-lease-time 86400; #24 Hours
allow members of "Switch3Vlan2Class2";
}
}
Now, the DHCP server will allocate addresses for the network nodes from Switch1 which are
relayed by Switch3 within the range of 192.168.102.21 ~ 192.168.102.50, and allocate addresses
for the network nodes from Switch1 within the range of 192.168.102.51~192.168.102.80.
DHCP option 82 needs the DHCP Relay Agent and the DHCP server cooperate to finish the
task of allocating IP addresses. The DHCP server should set allocating policy correctly
depending on the network topology of the DHCP Relay Agent, or, even the Relay Agent can
operate normally, the allocation of addresses will fail. When there is more than one kind of
Relay Agent, please pay attention to the retransmitting policy of the interface DHCP request
messages.
To implement the option 82 function of DHCP Relay Agent, the “debug dhcp relay packet”
command can be used during the operating procedure, including adding the contents of
option 82, the retransmitting policy adopted, the option 82 contents of the server peeled by
the Relay Agent and etc., such information can help users to do troubleshooting.
To implement the option 82 function of DHCP server, the “debug ip dhcp server packet”
command can be used during the operating procedure to display the procedure of data
packets processing of the server, including displaying the identified option 82 information of
the request message and the option 82 information returned by the reply message.
Defense against Fake DHCP Server: once the switch intercepts the DHCP Server reply packets
(including DHCPOFFER, DHCPACK, and DHCPNAK), it will alarm and respond according to the
situation(shutdown the port or send Black hole) 。
Defense against DHCP over load attacks: To avoid too many DHCP messages attacking CPU, users
should limit the DHCP speed of receiving packets on trusted and non-trusted ports.
Record the binding data of DHCP: DHCP SNOOPING will record the binding data allocated by
3-35
S4600_Configuration Guide Chapter 3 IP services Configuration
DHCP SERVER while forwarding DHCP messages, it can also upload the binding data to the
specified server to backup it. The binding data is mainly used to configure the dynamic users of
dot1x user based ports. Please refer to the chapter called“dot1x configuration” to find more
about the usage of dot1x use-based mode.
Add binding ARP: DHCP SNOOPING can add static binding ARP according to the binding data
after capturing binding data, thus to avoid ARP cheating.
Add trusted users: DHCP SNOOPING can add trusted user list entries according to the parameters
in binding data after capturing binding data; thus these users can access all resources without
DOT1X authentication.
Automatic Recovery: A while after the switch shut down the port or send blockhole, it should
automatically recover the communication of the port or source MAC and send information to Log
Server via syslog.
LOG Function: When the switch discovers abnormal received packets or automatically recovers, it
should send syslog information to Log Server.
The Encryption of Private Messages: The communication between the switch and the inner
network security management system TrustView uses private messages. And the users can
encrypt those messages of version 2.
Add authentication option82 Function: It is used with dot1x dhcpoption82 authentication mode.
Different option 82 will be added in DHCP messages according to user’s authentication status.
Command Explanation
Globe mode
3-36
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Globe mode
ip dhcp snooping binding enable Enable or disable the DHCP snooping binding
no ip dhcp snooping binding enable function.
Command Explanation
Globe mode
ip dhcp snooping binding arp
This command is not supported by the switch.
no ip dhcp snooping binding arp
3-37
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Port mode
ip dhcp snooping trust Set or delete the DHCP snooping trust attributes
no ip dhcp snooping trust of ports.
Command Explanation
Port mode
ip dhcp snooping binding dot1x Enable or disable the DHCP snooping binding
no ip dhcp snooping binding dot1x dot1x function.
Command Explanation
Port mode
ip dhcp snooping binding user-control
Enable or disable the DHCP snooping binding user
no ip dhcp snooping binding
function.
user-control
Command Explanation
Globe mode
ip dhcp snooping binding user <mac>
address <ipAddr> interface
Add/delete DHCP snooping static binding list
(ethernet|) <ifname>
entries.
no ip dhcp snooping binding user
<mac> interface (ethernet|) <ifname>
Command Explanation
Port mode
ip dhcp snooping action
{shutdown|blackhole} [recovery Set or delete the DHCP snooping automatic
<second>] defense actions of ports.
no ip dhcp snooping action
Command Explanation
Globe mode
ip dhcp snooping limit-rate <pps> Set rate limitation of the transmission of DHCP
no ip dhcp snooping limit-rate snooping messages.
3-38
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Admin mode
debug ip dhcp snooping packet
debug ip dhcp snooping event Please refer to the chapter on system
debug ip dhcp snooping update troubleshooting.
debug ip dhcp snooping binding
Command Explanation
Globe mode
ip dhcp snooping information option
This command is used to set subscriber-id format
subscriber-id format {hex | acsii |
of DHCP snooping option82.
vs-hp}
Set the suboption2 (remote ID option) content of
ip dhcp snooping information option
option 82 added by DHCP request packets (they
remote-id {standard | <remote-id>}
are received by the port). The no command sets
no ip dhcp snooping information
the additive suboption2 (remote ID option)
option remote-id
format of option 82 as standard.
ip dhcp snooping information option
Set the delimiter of each parameter for suboption
delimiter [colon | dot | slash | space]
of option82 in global mode, no command restores
no ip dhcp snooping information
the delimiter as slash.
option delimiter
ip dhcp snooping information option
self-defined remote-id {hostname | Set creation method for option82, users can
mac | string WORD} define the parameters of remote-id suboption by
no ip dhcp snooping information themselves.
option self-defined remote-id
ip dhcp snooping information option
Set self-defined format of remote-id for snooping
self-defined remote-id format [ascii |
option82.
hex]
ip dhcp snooping information option
self-defined subscriber-id {vlan | port
Set creation method for option82, users can
| id (switch-id (mac | hostname)|
define the parameters of circute-id suboption by
remote-mac) | string WORD}
themselves.
no ip dhcp snooping information
option type self-defined subscriber-id
ip dhcp snooping information option
Set self-defined format of circuit-id for snooping
self-defined subscriber-id format [ascii
option82.
| hex]
Port mode
3-39
S4600_Configuration Guide Chapter 3 IP services Configuration
Command Explanation
Globe mode
This command is used to set that allow untrusted
ip dhcp snooping information option ports of DHCP snooping to receive DHCP packets
allow-untrusted (replace|) with option82 option. When the "replace" is
no ip dhcp snooping information setting, the potion82 option is allowed to replace.
option allow-untrusted (replace|) When disabling this command, all untrusted ports
will drop DHCP packets with option82 option.
As showed in the above chart, Mac-AA device is the normal user, connected to the
non-trusted port 1/0/1 of the switch. It operates via DHCP Client, IP 1.1.1.5; DHCP Server and
GateWay are connected to the trusted ports 1/0/11 and 1/0/12 of the switch; the malicious user
Mac-BB is connected to the non-trusted port 1/0/10, trying to fake a DHCP Server(by sending
DHCPACK). Setting DHCP Snooping on the switch will effectively detect and block this kind of
network attack.
Configuration sequence is:
switch#
switch#config
switch(config)#ip dhcp snooping enable
switch(config)#interface ethernet 1/0/11
3-40
S4600_Configuration Guide Chapter 3 IP services Configuration
3-41
S4600_Configuration Guide Chapter 3 IP services Configuration
Code: represents the sequence number of the relay agent information option, the option 82 is
called so because RFC3046 is defined as 82.
Len: the number of bytes in Agent Information Field, not including the two bytes in Code
segment and Len segment.
Option 82 can have several sub-options, and need at least one sub-option. RFC3046 defines
the following two sub-options, whose formats are showed as follows:
SubOpt: the sequence number of sub-option, the sequence number of Circuit ID sub-option is 1,
the sequence number of Remote ID sub-option is 2.
Len: the number of bytes in Sub-option Value, not including the two bytes in SubOpt segment
and Len segment.
3-42
S4600_Configuration Guide Chapter 3 IP services Configuration
DHCPSNOOPING
DHCP Reply
DHCP Client
DHCP Server
3-43
S4600_Configuration Guide Chapter 3 IP services Configuration
Vlan1:eth1/0/3
DHCP Server
3-44
S4600_Configuration Guide Chapter 3 IP services Configuration
Linux ISC DHCP Server supports option 82, its configuration file /etc/dhcpd.conf is
ddns-update-style interim;
ignore client-updates;
class "Switch1Vlan1Class1" {
match if option agent.circuit-id = "Vlan1+Ethernet1/0/3" and option
agent.remote-id=00:03:0f:02:33:01;
}
authoritative;
pool {
}
}
Now, the DHCP server will allocate addresses for the network nodes from Switch1 within the
range of 192.168.102.51 ~ 192.168.102.80.
82 information of the request message, the option 82 information peeled by the reply
message.
3-46
S4600_Configuration Guide Chapter 3 IP services Configuration
3-47
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
This chapter will give an introduction to the configuration of IPv4 Multicast Protocol.
4-1
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
The destination address of Multicast message uses class D IP address with range from
224.0.0.0 to 239.255.255.255. D class address can not appear in the source IP address field of an
IP message. In the process of Unicast data transmission, the transmission path of a data packet is
from source address routing to destination address, and the transmission is performed with
hop-by-hop principle. However, in IP Multicast environment, the destination addresses is a group
instead of a single one, they form a group address. All message receivers will join in a group, and
once they do, the data flowing to the group address will be sent to the receivers immediately
and all members in the group will receive the data packets. The members in a Multicast group
are dynamic, the hosts can join and leave the Multicast group at any time.
Multicast group can be permanent or temporary. Some of the Multicast group addresses
are assigned officially; they are called Permanent Multicast Group. Permanent Multicast Group
keeps its IP address fixed but its member structure can vary within. The member amount of
Permanent Multicast Group can be arbitrary, even zero. The IP Multicast addresses which are not
kept for use by Permanent Multicast Group can be utilized by temporary Multicast groups.
224.0.0.0~224.0.0.255 are reserved Multicast addresses (Permanent Group Address),
address 224.0.0.0 is reserved but not assigned, and other addresses are used by Routing Protocol;
224.0.1.0~238.255.255.255 are Multicast addresses available to users(Temporary Group
Address) and are valid in the entire domain of the network; 239.0.0.0~239.255.255.255 are
local management Multicast addresses, which are valid only in specific local domain. Frequently
used reserved multicast address list is as follows:
Benchmark address (reserved)
224.0.0.1 Address of all hosts
224.0.0.2 Address of all Multicast Routers
224.0.0.3 Unassigned
224.0.0.4 DVMRP Router
224.0.0.5 OSPF Router
224.0.0.6 OSPF DR
224.0.0.7 ST Router
224.0.0.8 ST host
224.0.0.9 RIP-2 Router
224.0.0.10 IGRP Router
224.0.0.11 Active Agent
224.0.0.12 DHCP Server/Relay Agent
224.0.0.13 All PIM Routers
224.0.0.14 RSVP Encapsulation
224.0.0.15 All CBT Routers
224.0.0.16 Specified SBM
224.0.0.17 All SBMS
224.0.0.18 VRRP
224.0.0.22 IGMP
When Ethernet transmits Unicast IP messages, the destination MAC address it uses is the
receiver’s MAC address. But in transmitting Multicast packets, the transmission destination is not
a specific receiver any more, but a group with uncertain members, thus Multicast MAC address is
used. Multicast MAC address is corresponding to Multicast IP address. It is prescribed in IANA
4-2
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
(Internet Assigned Number Authority) that the higher 25 bits in Multicast MAC address is
0x01005e, and the lower 23bits in MAC address is the lower 23bits in Multicast IP address.
Since only 23bits out of the lower 28bits in IP Multicast address are mapped into MAC
address, therefore there are 32 IP Multicast addresses which are mapped into the same MAC
address.
4-3
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
4.2 DCSCM
4-4
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
4-5
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
Globally enable
destination control. The no operation
of this command will globally disable
[no] multicast destination-control destination control. All of the other
(required) configuration can only take effect after
globally enabled. The next is
configuring destination control rules,
which are similar.
Next is to configure the multicast destination control profile rule list and use the profile-id
number of 1-50.
Command Explanation
Global Configuration Mode
profile-id <1-50> {deny|permit}
{{<source/M> }|{host-source <source-host-ip>
(range <2-65535>|)}|any-source} Configure the destination control
{{<destination/M>}|{host-destination profile rule. The no command deletes
<destination-host-ip> (range it.
<2-255>|)}|any-destination}
no profile-id <1-50>
Then configure destination control rule. It is similar to source control, except to use ACL No.
of 6000-7999.
Command Explanation
Global Configuration Mode
[no] access-list <6000-7999> {{{add | delete}
profile-id WORD} | {{deny|permit} (ip) The rule used to configure destination
{{<source/M> }|{host-source <source-host-ip> control. This rule does not take effect
(range <2-65535>|)}|any-source} until it is applied to source IP or
{{<destination/M>}|{host-destination VLAN-MAC and port. Using the NO
<destination-host-ip> (range form of it can delete specified rule.
<2-255>|)}|any-destination}}
The last is to configure the rule to specified source IP, source VLAN MAC or specified port. It
is noticeable that, due to the above situations, these rules can only be used globally in enabling
IGMP-SNOOPING. And if IGMP-SNOOPING is not enabled, then only source IP rule can be used
under IGMP Protocol. The configuration commands are as follows:
Command Explanation
Port Configuration Mode
Used to configure the rules destination
[no] ip multicast destination-control
control uses to port, the NO form cancels
access-group <6000-7999>
the configuration.
Global Configuration Mode
Used to configure the rules destination
[no] ip multicast destination-control <1-4094>
control uses to specify VLAN-MAC, the
<macaddr> access-group <6000-7999>
NO form cancels the configuration.
4-6
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
4-7
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
Command Explanation
Global Mode
Enables IGMP Snooping for specified VLAN. The
ip igmp snooping vlan <vlan-id>
no operation disables IGMP Snooping for
no ip igmp snooping vlan <vlan-id>
specified VLAN.
ip igmp snooping proxy Enable IGMP Snooping proxy function, the no
no ip igmp snooping proxy command disables the function.
ip igmp snooping vlan < vlan-id > limit Configure the max group count of vlan and the
{group <g_limit> | source <s_limit>} max source count of every group. The “no ip
no ip igmp snooping vlan < vlan-id > limit igmp snooping vlan <vlan-id> limit” command
cancels this configuration.
ip igmp snooping vlan <1-4094> interface Configure the number of groups which are
(ethernet | port-channel|) IFNAME limit allowed joining and the maximum of the
{group <1-65535>| source <1-65535>} source in each group under the IGMP Snooping
strategy (replace | drop) port. Configure the strategy when it is up to the
no ip igmp snooping vlan <1-4094> interface upper limit, including “replace” and “drop”. No
(ethernet | port-channel|) IFNAME limit command configures as “no limitation”.
group source strategy
Set this vlan to layer 2 general querier. It is
ip igmp snooping vlan <vlan-id> recommended to configure a layer 2 general
l2-general-querier querier on a segment. The “no ip igmp
no ip igmp snooping vlan <vlan-id> snooping vlan <vlan-id>
l2-general-querier l2-general-querier”command cancels this
configuration.
ip igmp snooping vlan <vlan-id> Configure the version number of a general
l2-general-querier-version <version> query from a layer 2 general querier.
ip igmp snooping vlan <vlan-id> Configure the source address of a general
l2-general-querier-source <source> query from a layer 2 general querier.
4-9
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
ip igmp snooping vlan <vlan-id> mrpt Configure this survive time of mrouter port.
<value > The “no ip igmp snooping vlan <vlan-id> mrpt”
no ip igmp snooping vlan <vlan-id> mrpt command restores the default value.
ip igmp snooping vlan <vlan-id> Configure this query interval. The “no ip igmp
query-interval <value> snooping vlan <vlan-id> query-interval”
no ip igmp snooping vlan <vlan-id> command restores the default value.
query-interval
ip igmp snooping vlan <vlan-id> Enable the IGMP fast leave function for the
immediately-leave specified VLAN: the “no ip igmp snooping vlan
no ip igmp snooping vlan <vlan-id> <vlan-id> immediate-leave” command disables
immediately-leave the IGMP fast leave function.
ip igmp snooping vlan <vlan-id> query-mrsp Configure the maximum query response
<value> period. The “no ip igmp snooping vlan
no ip igmp snooping vlan <vlan-id> <vlan-id> query-mrsp” command restores to
query-mrsp the default value.
ip igmp snooping vlan <vlan-id> Configure the query robustness. The “no ip
query-robustness <value> igmp snooping vlan <vlan-id>
no ip igmp snooping vlan <vlan-id> query-robustness” command restores to the
query-robustness default value.
ip igmp snooping vlan <vlan-id> Configure the suppression query time. The “no
suppression-query-time <value> ip igmp snooping vlan <vlan-id>
no ip igmp snooping vlan <vlan-id> suppression-query-time” command restores to
suppression-query-time the default value.
4-10
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
Multicast router
Multicast Server 1 Multicast Server 2
Multicast port
IGMP Snooping
4-11
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
router is connected to port 1. As IGMP Snooping is disabled by default either in the switch or in
the VLANs, If IGMP Snooping should be enabled in VLAN 100, the IGMP Snooping should be first
enabled for the switch in Global Mode and in VLAN 100 and set port 1 of VLAN 100 to be the
mrouter port.
Multicast Configuration
Suppose two programs are provided in the Multicast Server using multicast address Group1 and
Group2, three of four hosts running multicast applications are connected to port 2, 6, 10 plays
program1, while the host is connected to port 12 plays program 2.
IGMP Snooping listening result:
The multicast table built by IGMP Snooping in VLAN 100 indicates ports 1, 2, 6, 10 in Group1 and
ports 1, 12 in Group2.
All the four hosts can receive the program of their choice: ports 2, 6, 10 will not receive the traffic
of program 2 and port 12 will not receive the traffic of program 1.
Scenario 2: L2-general-querier
Multicast
Server
Group 1 Group 2
Switch A
IGMP Snooping
L2 general querier
Multicast port
Switch B
IGMP Snooping
4-12
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
SwitchB#config
SwitchB(config)#ip igmp snooping
SwitchB(config)#ip igmp snooping vlan 100
SwitchB(config)#ip igmp snooping vlan 100 mrouter interface ethernet 1/0/1
Multicast Configuration
The same as scenario 1
IGMP Snooping listening result:
Similar to scenario 1
4-13
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
4-14
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
4. Configure Radius
Command Explanation
Global Mode
aaa enable
Enable or disable AAA function.
no aaa enable
radius-server key <word>
Configure or delete RADIUS server key.
no radius-server key
radius-server authentication host
<A.B.C.D> Configure or delete RADIUS
no radius-server authentication host authentication server address.
<A.B.C.D>
4-15
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
Configuration steps:
Switch#config
Switch(config)#ip igmp snooping
Switch(config)#ip igmp snooping vlan 1
Switch(config)#interface ethernet 1/0/1
Switch(config-if-ethernet1/0/1)#igmp snooping authentication enable
Switch(config-if-ethernet1/0/1)# exit
Switch(config)#ip igmp snooping authentication radius none
Switch(config)#interface vlan 10
Switch(config-if-vlan10)#ip address 10.1.1.2 255.255.255.0
Switch(config-if-vlan10)# exit
Switch(config)#radius-server authentication host 10.1.1.3
Switch(config)#radius-server key test
Switch(config)#aaa enable
saved. As the multicast VLAN is absolutely separated from the user VLAN, security and bandwidth
concerns can be met at the same time, after the multicast VLAN is configured, the multicast
traffic will be continuously sent to the users.
4-18
S4600_Configuration Guide Chapter 4 Multicast Protocol Related Configuration
SwitchB#config
SwitchB(config)#vlan 100
SwitchB(config-vlan100)#Switchport access ethernet 1/0/15
SwitchB(config-vlan100)exit
SwitchB(config)#vlan 101
SwitchB(config-vlan101)#Switchport access ethernet 1/0/20
SwitchB(config-vlan101)exit
SwitchB(config)# interface ethernet 1/0/10
SwitchB(Config-If-Ethernet1/0/10)#switchport mode trunk
SwitchB(Config-If-Ethernet1/0/10)#exit
SwitchB(config)#vlan 20
SwitchB(config-vlan20)#multicast-vlan
SwitchB(config-vlan20)#multicast-vlan association 100,101
SwitchB(config-vlan20)#exit
SwitchB(config)#ip igmp snooping
SwitchB(config)#ip igmp snooping vlan 20
When multicast VLAN supports IPv6 multicast, usage is the same with IPv4, but the
difference is using with MLD Snooping, so does not give an example.
4-19
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.1 ACL
5.1.1.1 Access-list
Access-list is a sequential collection of conditions that corresponds to a specific rule. Each
rule consist of filter information and the action when the rule is matched. Information included in
a rule is the effective combination of conditions such as source IP, destination IP, IP protocol
number and TCP port, UDP port. Access-lists can be categorized by the following criteria:
Filter information based criterion: IP access-list (layer 3 or higher information), MAC
access-list (layer 2 information), and MAC-IP access-list (layer 2 or layer 3 or higher).
Configuration complexity based criterion: standard and extended, the extended mode
allows more specific filtering of information.
Nomenclature based criterion: numbered and named.
Description of an ACL should cover the above three aspects.
5.1.1.2 Access-group
When a set of access-lists are created, they can be applied to traffic of incoming direction on
all ports. Access-group is the description to the binding of an access-list to the incoming direction
on a specific port. When an access-group is created, all packets from in the incoming direction
through the port will be compared to the access-list rule to decide whether to permit or deny
access.
The current firmware only supports ingress ACL configuration.
apply:
An access-list can consist of several rules. Filtering of packets compares packet
conditions to the rules, from the first rule to the first matched rule; the rest of the rules
will not be processed. Global default action applies only to IP packets in the
incoming direction on the ports.
Global default action applies only when packet flirter is enabled on a port and no ACL is
bound to that port, or no binding ACL matches.
5-2
S4600_Configuration Guide Chapter 5 Security Function Configuration
1. Configuring access-list
(1) Configuring a numbered standard IP access-list
Command Explanation
Global Mode
Creates a numbered standard IP
access-list, if the access-list
access-list <num> {deny | permit} {{<sIpAddr> <sMask>} already exists, then a rule will add
| any-source | {host-source <sIpAddr>}} to the current access-list; the “no
no access-list <num> access-list <num>“ command
deletes a numbered standard IP
access-list.
(2) Configuring a numbered extensive IP access-list
Command Explanation
Global Mode
access-list <num> {deny | permit} icmp {{<sIpAddr> Creates a numbered ICMP
<sMask>} | any-source | {host-source <sIpAddr>}} extended IP access rule; if the
{{<dIpAddr> <dMask>} | any-destination | numbered extended access-list of
{host-destination <dIpAddr>}} [<icmp-type> specified number does not exist,
[<icmp-code>]] [precedence <prec>] [tos then an access-list will be created
<tos>][time-range<time-range-name>] using this number.
Creates a numbered IGMP
access-list <num> {deny | permit} igmp {{<sIpAddr>
extended IP access rule; if the
<sMask>} | any-source | {host-source <sIpAddr>}}
numbered extended access-list of
{{<dIpAddr> <dMask>} | any-destination |
specified number does not exist,
{host-destination <dIpAddr>}} [<igmp-type>] [precedence
then an access-list will be created
<prec>] [tos <tos>][time-range<time-range-name>]
using this number.
access-list <num> {deny | permit} tcp {{<sIpAddr>
Creates a numbered TCP
<sMask>} | any-source | {host-source <sIpAddr>}} [s-port
extended IP access rule; if the
{<sPort> | range <sPortMin> <sPortMax>}] {{<dIpAddr>
numbered extended access-list of
<dMask>} | any-destination | {host-destination
specified number does not exist,
<dIpAddr>}} [d-port {<dPort> | range <dPortMin>
then an access-list will be created
<dPortMax>}] [ack+fin+psh+rst+urg+syn] [precedence
using this number.
<prec>] [tos <tos>][time-range<time-range-name>]
5-3
S4600_Configuration Guide Chapter 5 Security Function Configuration
Creates an extended IP
access-list basing on
nomenclature; the “no ip
ip access-list extended <name>
access-list extended <name>
no ip access-list extended <name>
“ command deletes the
name-based extended IP
access-list.
b. Specify multiple “permit” or “deny” rules
Command Explanation
Extended IP ACL Mode
[no] {deny | permit} icmp {{<sIpAddr> <sMask>} | Creates an extended
any-source | {host-source <sIpAddr>}} {{<dIpAddr> name-based ICMP IP access
<dMask>} | any-destination | {host-destination rule; the no form command
<dIpAddr>}} [<icmp-type> [<icmp-code>]] [precedence deletes this name-based
<prec>] [tos <tos>][time-range<time-range-name>] extended IP access rule.
[no] {deny | permit} igmp {{<sIpAddr> <sMask>} | Creates an extended
any-source | {host-source <sIpAddr>}} {{<dIpAddr> name-based IGMP IP access
<dMask>} | any-destination | {host-destination rule; the no form command
<dIpAddr>}} [<igmp-type>] [precedence <prec>] [tos deletes this name-based
<tos>][time-range<time-range-name>] extended IP access rule.
[no] {deny | permit} tcp {{<sIpAddr> <sMask>} |
any-source | {host-source <sIpAddr>}} [s-port {<sPort> | Creates an extended
range <sPortMin> <sPortMax>}] {{<dIpAddr> <dMask>} | name-based TCP IP access rule;
any-destination | {host-destination <dIpAddr>}} [d-port the no form command deletes
{<dPort> | range <dPortMin> <dPortMax>}] this name-based extended IP
[ack+fin+psh+rst+urg+syn] [precedence <prec>] [tos access rule.
<tos>][time-range<time-range-name>]
[no] {deny | permit} udp {{<sIpAddr> <sMask>} |
Creates an extended
any-source | {host-source <sIpAddr>}} [s-port {<sPort> |
name-based UDP IP access
range <sPortMin> <sPortMax>}] {{<dIpAddr> <dMask>} |
rule; the no form command
any-destination | {host-destination <dIpAddr>}} [d-port
deletes this name-based
{<dPort> | range <dPortMin> <dPortMax>}] [precedence
extended IP access rule.
<prec>] [tos <tos>][time-range<time-range-name>]
[no] {deny | permit} {eigrp | gre | igrp | ipinip | ip | ospf Creates an extended
| <protocol-num>} {{<sIpAddr> <sMask>} | any-source | name-based IP access rule for
{host-source <sIpAddr>}} {{<dIpAddr> <dMask>} | other IP protocols; the no form
any-destination | {host-destination <dIpAddr>}} command deletes this
[precedence <prec>] [tos name-based extended IP
<tos>][time-range<time-range-name>] access rule.
c. Exit extended IP ACL configuration mode
Command Explanation
Extended IP ACL Mode
Exits extended name-based IP
exit
ACL configuration mode.
5-5
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-6
S4600_Configuration Guide Chapter 5 Security Function Configuration
[no]{deny|permit}{any-source-mac|{host-source-mac<h
ost_smac>}|{<smac><smac-mask>}} Creates an extended
{any-destination-mac|{host-destination-mac name-based MAC access rule
<host_dmac>} |{<dmac> <dmac-mask>}} [cos <cos-val> matching MAC frame; the no
[<cos-bitmask>] [vlanId <vid-value> form command deletes this
[<vid-mask>][ethertype<protocol>[<protocol-mask>]]]] name-based extended MAC
access rule.
Creates an extended
[no]{deny|permit}{any-source-mac|{host-source-mac<h
name-based MAC access rule
ost_smac>}|{<smac><smac-mask>}}{any-destination-ma
matching untagged ethernet 2
c|{host-destination-mac<host_dmac>}|{<dmac><dmac-
frame; the no form command
mask>}}[untagged-eth2 [ethertype <protocol>
deletes this name-based
[protocol-mask]]]
extended MAC access rule.
Creates an name-based
[no]{deny|permit}{any-source-mac|{host-source-mac<h
extended MAC access rule
ost_smac>}|{<smac><smac-mask>}}
matching 802.3 frame; the no
{any-destination-mac|{host-destination-mac
form command deletes this
<host_dmac>}|{<dmac><dmac-mask>}}
name-based extended MAC
[untagged-802-3]
access rule.
[no]{deny|permit}{any-source-mac|{host-source-mac<h Creates an name-based
ost_smac>}|{<smac><smac-mask>}}{any-destination-ma extended MAC access rule
c|{host-destination-mac<host_dmac>}|{<dmac><dmac- matching tagged ethernet 2
mask>}}[tagged-eth2 [cos <cos-val> [<cos-bitmask>]] frame; the no form command
[vlanId <vid-value> [<vid-mask>]] [ethertype<protocol> deletes this name-based
[<protocol-mask>]]] extended MAC access rule.
Creates an name-based
[no]{deny|permit}{any-source-mac|{host-source-mac
extended MAC access rule
<host_smac>}|{<smac><smac-mask>}}
matching tagged 802.3 frame;
{any-destination-mac|{host-destination-mac<host_dmac
the no form command deletes
>}|{<dmac><dmac-mask>}} [tagged-802-3 [cos <cos-val>
this name-based extended
[<cos-bitmask>]] [vlanId <vid-value> [<vid-mask>]]]
MAC access rule.
5-8
S4600_Configuration Guide Chapter 5 Security Function Configuration
Global Mode
Creates a numbered standard
IPv6 access-list, if the
access-list already exists, then
ipv6 access-list <num> {deny | permit} {{<sIPv6Addr>
a rule will add to the current
<sPrefixlen>} | any-source | {host-source <sIpv6Addr>}}
access-list; the “no access-list
no ipv6 access-list <num>
<num>“ command deletes a
numbered standard IPv6
access-list.
5-11
S4600_Configuration Guide Chapter 5 Security Function Configuration
[no] absolute start <start_time> <start_data> [end Stop the function of the time
<end_time> <end_data>] range.
Scenario 2:
5-13
S4600_Configuration Guide Chapter 5 Security Function Configuration
The configuration requirement is stated as below: The switch should drop all the 802.3
datagram with 00-12-11-23-xx-xx as the source MAC address coming from interface 10.
Configuration description:
1. Create the corresponding MAC ACL.
2. Configure datagram filtering.
3. Bind the ACL to the related interface.
The configuration steps are listed as below.
Switch(config)#access-list 1100 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any-destination-mac
untagged-802-3
Switch(config)#access-list 1100 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any tagged-802
Switch(config)#firewall enable
Switch(config)#interface ethernet1/0/10
Switch(Config-If-Ethernet1/0/10)#mac access-group 1100 in
Switch(Config-If-Ethernet1/0/10)#exit
Switch(config)#exit
Configuration result:
Switch#show firewall
Firewall Status: Enable.
Scenario 3:
The configuration requirement is stated as below: The MAC address range of the network
connected to the interface 10 of the switch is 00-12-11-23-xx-xx, and IP network is 10.0.0.0/24.
FTP should be disabled and ping requests from outside network should be disabled.
Configuration description:
1. Create the corresponding access list.
2. Configure datagram filtering.
3. Bind the ACL to the related interface.
The configuration steps are listed as below.
Switch(config)#access-list 3110 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any-destination-mac
tcp 10.0.0.0 0.0.0.255 any-destination d-port 21
Switch(config)#access-list 3110 deny any-source-mac 00-12-11-23-00-00 00-00-00-00-ff-ff icmp
5-14
S4600_Configuration Guide Chapter 5 Security Function Configuration
Switch(config)#firewall enable
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#mac-ip access-group 3110 in
Switch(Config-Ethernet1/0/10)#exit
Switch(config)#exit
Configuration result:
Switch#show firewall
Firewall Status: Enable.
Switch#show access-lists
access-list 3110(used 1 time(s))
access-list 3110 deny 00-12-11-23-00-00 00-00-00-00-ff-ff
any-destination-mac
tcp 10.0.0.0 0.0.0.255 any-destination d-port 21
access-list 3110 deny any-source-mac 00-12-11-23-00-00 00-00-00-00-ff-ff icmp
any-source 10.0.0.0 0.0.0.255
Scenario 4:
The configuration requirement is stated as below: IPv6 protocol runs on the interface 600 of
the switch. And the IPv6 network address is 2003:1:1:1::0/64. Users in the 2003:1:1:1:66::0/80
subnet should be disabled from accessing the outside network.
Configuration description:
1. Create the corresponding access list.
2. Configure datagram filting.
3. Bind the ACL to the related interface.
The configuration steps are listed as below.
Switch(config)#ipv6 access-list 600 permit 2003:1:1:1:66::0/80 any-destination
Switch(config)#ipv6 access-list 600 deny 2003:1:1:1::0/64 any-destination
Switch(config)#firewall enable
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#ipv6 access-group 600 in
Switch(Config-If-Ethernet1/0/10)#exit
Switch(config)#exit
Configuration result:
Switch#show firewall
Firewall Status: Enable.
5-15
S4600_Configuration Guide Chapter 5 Security Function Configuration
Scenario 5:
The configuration requirement is stated as below: The interface 1, 2, 5, 7 belongs to vlan100,
Hosts with 192.168.0.1 as its IP address should be disabled from accessing the listed interfaces.
Configuration description:
1. Create the corresponding access list.
2. Configure datagram filtering.
3. Bind the ACL to the related interface.
The configuration steps are listed as below.
Switch (config)#firewall enable
Switch (config)#vlan 100
Switch (Config-Vlan100)#switchport interface ethernet 1/0/1;2;5;7
Switch (Config-Vlan100)#exit
Switch (config)#access-list 1 deny host-source 192.168.0.1
Switch (config)#interface ethernet1/0/1;2;5;7
Switch (config-if-port-range)#ip access-group 1 in
Switch (Config-if-Vlan100)#exit
Configuration result:
Switch (config)#show access-group interface vlan 100
Interface VLAN 100:
Ethernet1/0/1: IP Ingress access-list used is 1, traffic-statistics Disable.
Ethernet1/0/2: IP Ingress access-list used is 1, traffic-statistics Disable.
Ethernet1/0/5: IP Ingress access-list used is 1, traffic-statistics Disable.
Ethernet1/0/7: IP Ingress access-list used is 1, traffic-statistics Disable.
Checking for entries in the ACL is done in a top-down order and ends whenever an entry is
matched.
Default rule will be used only if no ACL is bound to the incoming direction of the port, or no
ACL entry is matched.Each ingress port can bind one MAC-IP ACL, one IP ACL, one MAC ACL,
one IPv6 ACL (via the physical interface mode or Vlan interface mode).
5-16
S4600_Configuration Guide Chapter 5 Security Function Configuration
When binding four ACL and packet matching several ACL at the same time, the priority
relations are as follows in a top-down order. If the priority is same, then the priority of
configuration at first is higher.
Ingress IPv6 ACL
Ingress MAC-IP ACL
Ingress IP ACL
Ingress MAC ACL
The number of ACLs that can be successfully bound depends on the content of the ACL
bound and the hardware resource limit. Users will be prompted if an ACL cannot be bound
due to hardware resource limitation.
If an access-list contains same filtering information but conflicting action rules,
binding to the port will fail with an error message. For instance, configuring
'permit tcp any any-destination' and 'deny tcp any any-destination' at the
same time is not permitted.
Viruses such as 'worm.blaster' can be blocked by configuring ACL to block
specific ICMP packets or specific TCP or UDP port packet.
If the physical mode of an interface is TRUNK, ACL can only be configured
through physical interface mode.
ACL configured in the physical mode can only be disabled in the physical mode.
Those configured in the VLAN interface configuration mode can only be
disabled in the VLAN interface mode.
When a physical interface is added into or removed from a VLAN (with the trunk interfaces
as exceptions), ACL configured in the corresponding VLAN will be bound or unbound
respectively. If ACL configured in the target VLAN, which is configured in VLAN interface
mode, conflicts with existing ACL configuration on the interface, which is configured in
physical interface mode, the configuration will fail to effect.
When no physical interfaces are configured in the VLAN, the ACL
configuration of the VLAN will be removed. And it can not recover if new interfaces
are added to the VLAN.
When the interface mode is changed from access mode to trunk mode, the
ACL configured in VLAN interface mode which is bound to physical interface will be
removed. And when the interface mode is changed from trunk mode to access mode,
ACL configured in VLAN1 interface mode will be bound to the physical interface. If
binding fails, the changing will fail either.
When removing a VLAN configuration, if there are any ACLs bound to the VLAN, the ACL will
be removed from all the physical interfaces belonging to the VLAN, and it will be bound to
VLAN 1 ACL(if ACL is configured in VLAN1). If VLAN 1 ACL binding fails, the VLAN removal
operation will fail.
5-17
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-18
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-19
S4600_Configuration Guide Chapter 5 Security Function Configuration
{in} vlan <vlanId> [traffic-statistic] of the specified VLAN, decide whether the
statistical counter should be added to the ACL
according to the options. The no command
deletes the configuration bound to the
specified VLAN.
5-21
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.3 802.1x
5-22
S4600_Configuration Guide Chapter 5 Security Function Configuration
system usually is a user terminal device. Users start 802.1x authentication by starting
supplicant system software. A supplicant system should support EAPOL (Extensible
Authentication Protocol over LAN).
The authenticator system is another entity on one end of the LAN segment to
authenticate the supplicant systems connected. An authenticator system usually is a
network device supporting 802,1x protocol, providing ports to access the LAN for
supplicant systems. The ports provided can either be physical or logical.
The authentication server system is an entity to provide authentication service for
authenticator systems. The authentication server system is used to authenticate and
authorize users, as well as does fee-counting, and usually is a RADIUS (Remote
Authentication Dial-In User Service) server, which can store the relative user
information, including username, password and other parameters such as the VLAN
and ports which the user belongs to.
The three entities above concerns the following basic concepts: PAE of the port, the
controlled ports and the controlled direction.
1. PAE
PAE (Port Access Entity) is the entity to implement the operation of algorithms and
protocols.
The PAE of the supplicant system is supposed to respond the authentication request from
the authenticator systems and submit user’s authentication information to the
authenticator system. It can also send authentication request and off-line request to
authenticator.
The PAE of the authenticator system authenticates the supplicant systems needing to access
the LAN via the authentication server system, and deal with the
authenticated/unauthenticated state of the controlled port according to the result of the
authentication. The authenticated state means the user is allowed to access the network
resources, the unauthenticated state means only the EAPOL messages are allowed to be
received and sent while the user is forbidden to access network resources.
2. controlled/uncontrolled ports
The authenticator system provides ports to access the LAN for the supplicant systems. These
ports can be divided into two kinds of logical ports: controlled ports and uncontrolled ports.
The uncontrolled port is always in bi-directionally connected status, and mainly used to
transmit EAPOL protocol frames, to guarantee that the supplicant systems can always send
or receive authentication messages.
The controlled port is in connected status authenticated to transmit service messages. When
unauthenticated, no message from supplicant systems is allowed to be received.
The controlled and uncontrolled ports are two parts of one port, which means each frame
5-23
S4600_Configuration Guide Chapter 5 Security Function Configuration
reaching this port is visible on both the controlled and uncontrolled ports.
3. Controlled direction
In unauthenticated status, controlled ports can be set as unidirectional controlled or
bi-directionally controlled.
When the port is bi-directionally controlled, the sending and receiving of all frames is
forbidden.
When the port is unidirectional controlled, no frames can be received from the supplicant
systems while sending frames to the supplicant systems is allowed.
5-24
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-25
S4600_Configuration Guide Chapter 5 Security Function Configuration
There is no Data domain in the packets of which the type is Success or Failure, and the value
of the Length domains in such packets is 4.
The format of Data domains in the packets of which the type is Request and Response is
illustrated in the next figure. Type is the authentication type of EAP, the content of Type data
depends on the type. For example, when the value of the type is 1, it means Identity, and is
used to query the identity of the other side. When the type is 4, it means MD5-Challenge,
like PPP CHAP protocol, contains query messages.
Figure 5-5 the Format of Data Domain in Request and Response Packets
Identifier: to assist matching the Request and Response messages.
Length: the length of the EAP packet, covering the domains of Code, Identifier, Length and
Data, in byte.
Data: the content of the EAP packet, depending on the Code type.
5-26
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-27
S4600_Configuration Guide Chapter 5 Security Function Configuration
Attention:
The switch, as the access controlling unit of Pass-through, will not check the content of
a particular EAP method, so can support all the EAP methods above and all the EAP
authentication methods that may be extended in the future.
In EAP relay, if any authentication method in EAP-MD5, EAP-TLS, EAP-TTLS and PEAP is
adopted, the authentication methods of the supplicant system and the RADIUS server
should be the same.
5-28
S4600_Configuration Guide Chapter 5 Security Function Configuration
generated session keys, requiring both the supplicant system and the Radius authentication
server to possess digital certificate to implement bidirectional authentication. It is the earliest
EAP authentication method used in wireless LAN. Since every user should have a digital
certificate, this method is rarely used practically considering the difficult maintenance. However
it is still one of the safest EAP standards, and enjoys prevailing supports from the vendors of
wireless LAN hardware and software.
The following figure illustrates the basic operation flow of the EAP-TLS authentication
method.
5-29
S4600_Configuration Guide Chapter 5 Security Function Configuration
encrypted tunnel established via the certificate of the authentication server. Any kind of
authentication request including EAP, PAP and MS-CHAPV2 can be transmitted within TTLS
tunnels.
5-30
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-31
S4600_Configuration Guide Chapter 5 Security Function Configuration
while the others can not. When one user becomes offline, the other users will not be
affected.
When the user-based (IP address+ MAC address+ port) method is used, all users can
access limited resources before being authenticated. There are two kinds of control in
this method: standard control and advanced control. The user-based standard control
will not restrict the access to limited resources, which means all users of this port can
access limited resources before being authenticated. The user-based advanced control
will restrict the access to limited resources, only some particular users of the port can
access limited resources before being authenticated. Once those users pass the
authentication, they can access all resources.
Notes: At present, Auto VLAN can only be used in the port-based access control mode, and
on the ports whose link type is Access.
2. Guest VLAN
Guest VLAN feature is used to allow the unauthenticated user to access some specified
resources.
The user authentication port belongs to a default VLAN (Guest VLAN) before passing the
5-32
S4600_Configuration Guide Chapter 5 Security Function Configuration
802.1x authentication, with the right to access the resources within this VLAN without
authentication. But the resources in other networks are beyond reach. Once authenticated, the
port will leave Guest VLAN, and the user can access the resources of other networks.
In Guest VLAN, users can get 802.1x supplicant system software, update supplicant system
or update some other applications (such as anti-virus software, the patches of operating system).
The access device will add the port into Guest VLAN if there is no supplicant getting
authenticated successfully in a certain stretch of time because of lacking exclusive authentication
supplicant system or the version of the supplicant system being too low.
Once the 802.1x feature is enabled and the Guest VLAN is configured properly, a port will be
added into Guest VLAN, just like Auto VLAN, if there is no response message from the supplicant
system after the device sends more authentication-triggering messages than the upper limit
(EAP-Request/Identity) from the port.
The authentication server assigns an Auto VLAN, and then the port leaves Guest VLAN
and joins the assigned Auto VLAN. When the user becomes offline, the port will be
allocated to the specified Guest VLAN again.
The authentication server assigns an Auto VLAN, and then the port leaves Guest VLAN
and joins the specified VLAN. When the user becomes offline, the port will be allocated
to the specified Guest VLAN again.
dot1x re-authenticate [interface Enables IEEE 802.1x re-authentication (no wait timeout
<interface-name> ] requires) for all ports or a specified port.
Ethernet1/0/3
VLAN10 VLAN2
Ethernet1/0/2 SWITCH
VLAN100 Ethernet1/0/6
VLAN5
Internet
User
Ethernet1/0/3
VLAN10 VLAN2
Ethernet1/0/2 SWITCH
VLAN10 Ethernet1/0/6
VLAN5
Internet
User
5-34
S4600_Configuration Guide Chapter 5 Security Function Configuration
Ethernet1/0/3
VLAN10 VLAN2
Ethernet1/0/2 SWITCH
VLAN5 Ethernet1/0/6
VLAN5
Internet
User
# Create VLAN100.
Switch(config)#vlan 100
5-35
S4600_Configuration Guide Chapter 5 Security Function Configuration
Using the command of show running-config or show interface ethernet1/0/2, users can check
the configuration of Guest VLAN. When there is no online user, no failed user authentication or
no user gets offline successfully, and more authentication-triggering messages
(EAP-Request/Identity) are sent than the upper limit defined, users can check whether the Guest
VLAN configured on the port takes effect with the command show vlan id 100.
2004:1:2:3::2
Switch(Config-If-Ethernet1/0/2)#dot1x enable
Switch(Config-If-Ethernet1/0/2)#exit
will broadcast the data frame over the VLAN it belongs to. If the dynamically learnt MAC address
matches no transmitted data in a long time, the switch will delete it from the MAC address list.
Usually the switch supports both the static configuration and dynamic study of MAC address,
which means each port can have more than one static set MAC addresses and dynamically learnt
MAC addresses, and thus can implement the transmission of data traffic between port and
known MAC addresses. When a MAC address becomes out of date, it will be dealt with broadcast.
No number limitation is put on MAC address of the ports of our current switches; every port can
have several MAC addressed either by configuration or study, until the hardware list entries are
exhausted. To avoid too many MAC addresses of a port, we should limit the number of MAC
addresses a port can have.
For each INTERFACE VLAN, there is no number limitation of IP; the upper limit of the
number of IP is the upper limit of the number of user on an interface, which is, at the same time,
the upper limit of ARP and ND list entry. There is no relative configuration command can be used
to control the sent number of these list entries. To enhance the security and the controllability of
our products, we need to control the number of MAC address on each port and the number of
ARP, ND on each INTERFACE VLAN. The number of static or dynamic MAC address on a port
should not exceed the configuration. The number of user on each VLAN should not exceed the
configuration, either.
Limiting the number of MAC and ARP list entry can avoid DOS attack to a certain extent.
When malicious users frequently do MAC or ARP cheating, it will be easy for them to fill the MAC
and ARP list entries of the switch, causing successful DOS attacks.
To summer up, it is very meaningful to develop the number limitation function of MAC and
IP in port, VLAN. Switch can control the number of MAC address of ports and the number ARP,
ND list entry of ports and VLAN through configuration commands.
Limiting the number of dynamic MAC and IP of ports:
1. Limiting the number of dynamic MAC. If the number of dynamically learnt MAC address
by the switch is already larger than or equal with the max number of dynamic MAC address, then
shutdown the MAC study function on this port, otherwise, the port can continue its study.
2. Limiting the number of dynamic IP. If the number of dynamically learnt ARP and ND by the
switch is already larger than or equal with the max number of dynamic ARP and ND, then
shutdown the ARP and ND study function of this port, otherwise, the port can continue its study.
Limiting the number of MAC, ARP and ND of interfaces:
1. Limiting the number of dynamic MAC. If the number of dynamically learnt MAC address
by the VLAN of the switch is already larger than or equal with the max number of dynamic MAC
address, then shutdown the MAC study function of all the ports in this VLAN, otherwise, all the
ports in this VLAN can continue their study (except special ports).
2. Limiting the number of dynamic IP. If the number of dynamically learnt ARP and ND by the
switch is already larger than or equal with the max number of dynamic ARP and ND, then the
VLAN will not study any new ARP or ND, otherwise, the study can be continued.
5-39
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-40
S4600_Configuration Guide Chapter 5 Security Function Configuration
5. Display and debug the relative information of number limitation of MAC and IP on ports
Command Explanation
Admin mode
show mac-address dynamic count {vlan Display the number of dynamic MAC in
<vlan-id> | interface ethernet corresponding ports and VLAN.
<portName> }
show arp-dynamic count {vlan
Display the number of dynamic ARP in
<vlan-id> | interface ethernet
corresponding ports and VLAN.
<portName> }
show nd-dynamic count {vlan
Display the number of dynamic NEIGHBOUR
<vlan-id> | interface ethernet
in corresponding ports and VLAN.
<portName> }
All kinds of debug information when limiting
debug switchport mac count
the number of MAC on ports.
no debug switchport mac count
debug switchport arp count All kinds of debug information when limiting
no debug switchport arp count the number of ARP on ports.
debug switchport nd count All kinds of debug information when limiting
no debug switchport nd count the number of NEIGHBOUR on ports.
All kinds of debug information when limiting
debug vlan mac count
the number of MAC in VLAN.
no debug vlan mac count
SWITCH A
SWITCH B
………
PC PC PC PC PC
5-41
S4600_Configuration Guide Chapter 5 Security Function Configuration
Figure 5-18 The Number Limitation of MAC and IP in Port, VLAN Typical Configuration
Example
In the network topology above, SWITCH B connects to many PC users, before enabling the
number limitation function of MAC and IP in Port, VLAN, if the system hardware has no other
limitation, SWTICH A and SWTICH B can get the MAC, ARP, ND list entries of all the PC, so limiting
the MAC, ARP list entry can avoid DOS attack to a certain extent. When malicious users
frequently do MAC, ARP cheating, it will be easy for them to fill the MAC, ARP list entries of the
switch, causing successful DOS attacks. Limiting the MAC, ARP, ND list entry can prevent DOS
attack.
On port 1/0/1 of SWITCH A, set the max number can be learnt of dynamic MAC address as 20,
dynamic ARP address as 20, NEIGHBOR list entry as 10. In VLAN 1, set the max number of
dynamic MAC address as 30, of dynamic ARP address as 30, NEIGHBOR list entry as 20.
5-42
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.5 AM
1. Enable AM function
Command Explanation
Global Mode
am enable
Globally enable or disable AM function.
no am enable
2. Enable AM function on an interface
Command Explanation
Port Mode
Enable/disable AM function on the port.
am port When the AM function is enabled on the
no am port port, no IP or ARP message will be
forwarded by default.
Port Mode
am ip-pool <ip-address> <num>
Configure the forwarding IP of the port.
no am ip-pool <ip-address> <num>
Internet
SWITCH
Port1 Port2
HUB1 HUB2
………
5-44
S4600_Configuration Guide Chapter 5 Security Function Configuration
security, the system manager will only take user with an IP address within that range as legal ones.
And the switch will only forward data packets from legal users while dumping packets from other
users.
According to the requirements mentioned above, the switch can be configured as follows:
Switch(config)#am enable
Switch(config)#interface ethernet1/0/1
Switch(Config-If-Ethernet 1/0/1)#am port
Switch(Config-If-Ethernet 1/0/1)#am ip-pool 10.10.10.1 10
5-45
S4600_Configuration Guide Chapter 5 Security Function Configuration
Sequence
Command Explanation
Global Mode
Enable/disable th
[no] dosattack-check srcip-equal-dstip
source address is
enable
address.
Command Explanation
Global Mode
[no] dosattack-check tcp-flags enable Enable/disable checking TCP label function.
Command Explanation
Global Mode
[no] dosattack-check srcport-equal-dstport
Enable/disable the prevent-port-cheat function.
enable
Task Sequence
Command Explanation
Global Mode
Enable/disable the prevent TCP fragment attack
[no] dosattack-check tcp-fragment enable
function.
Configure the minimum permitted TCP head
length of the packet. This command has no
dosattack-check tcp-header <size> effect when used separately, the user should
enable the dosattack-check tcp-fragment
enable.
Note: This function is not supported by switch.
Task Sequence
1. Enable the prevent ICMP fragment attack function
2. Configure the max permitted ICMPv4 net load length
Command Explanation
Global Mode
[no] dosattack-check icmp-attacking Enable/disable the prevent ICMP fragment
enable attack function.
Configure the max permitted ICMPv4 net load
length. This command has not effect when used
dosattack-check icmpv4-size <size>
separately, the user have to enable the
dosattack-check icmp-attacking enable.
5-47
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.7 TACACS+
5-48
S4600_Configuration Guide Chapter 5 Security Function Configuration
Switch(config)#interface vlan 1
Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-vlan1)#exit
Switch(config)#tacacs-server authentication host 10.1.1.3
Switch(config)#tacacs-server key test
Switch(config)#authentication line vty login tacacs
5-49
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.8 RADIUS
5-50
S4600_Configuration Guide Chapter 5 Security Function Configuration
Code field(1octets): is the type of the RADIUS packet. Available value for the Code field is show as
below:
1 Access-Request
2 Access-Accept
3 Access-Reject
4 Accounting-Request
5 Accounting-Response
11 Access-Challenge
Identifier field (1 octet): Identifier for the request and answer packets.
Length field (2 octets): The length of the overall RADIUS packet, including Code, Identifier, Length,
Authenticator and Attributes
Authenticator field (16 octets): used for validation of the packets received from the RADIUS server.
Or it can be used to carry encrypted passwords. This field falls into two kinds: the Request
Authenticator and the Response Authenticator.
Attribute field: used to carry detailed information about AAA. An Attribute value is formed by
Type, Length, and Value fields.
Type field (1 octet), the type of the attribute value, which is shown as below:
8 Framed-IP-Address 30 Called-Station-Id
9 Framed-IP-Netmask 31 Calling-Station-Id
10 Framed-Routing 32 NAS-Identifier
11 Filter-Id 33 Proxy-State
12 Framed-MTU 34 Login-LAT-Service
13 Framed-Compression 35 Login-LAT-Node
14 Login-IP-Host 36 Login-LAT-Group
15 Login-Service 37 Framed-AppleTalk-Link
16 Login-TCP-Port 38 Framed-AppleTalk-Network
17 (unassigned) 39 Framed-AppleTalk-Zone
18 Reply-Message 40-59 (reserved for accounting)
19 Callback-Number 60 CHAP-Challenge
20 Callback-Id 61 NAS-Port-Type
21 (unassigned) 62 Port-Limit
22 Framed-Route 63 Login-LAT-Port
Length field (1 octet), the length in octets of the attribute including Type, Length and Value
fields.
Value field, value of the attribute whose content and format is determined by the type and
length of the attribute.
Command Explanation
Global Mode
To enable the AAA authentication function.
aaa enable
The no form of this command will disable
no aaa enable
the AAA authentication function.
aaa-accounting enable To enable AAA accounting. The no form of
no aaa-accounting enable this command will disable AAA accounting.
Enable or disable the update accounting
aaa-accounting update {enable|disable}
function.
5-52
S4600_Configuration Guide Chapter 5 Security Function Configuration
Global Mode
To configure the encryption key for the
radius-server key {0 | 7} <string>
RADIUS server. The no form of this
no radius-server key
command will remove the configured key.
5-53
S4600_Configuration Guide Chapter 5 Security Function Configuration
A computer connects to a switch, of which the IP address is 10.1.1.2 and connected with a
RADIUS authentication server without Ethernet1/0/2; IP address of the server is 10.1.1.3 and the
authentication port is defaulted at 1812, accounting port is defaulted at 1813.
Configure steps as below:
Switch(config)#interface vlan 1
Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0
Switch(Config-if-vlan1)#exit
Switch(config)#radius-server authentication host 10.1.1.3
Switch(config)#radius-server accounting host 10.1.1.3
Switch(config)#radius-server key test
Switch(config)#aaa enable
Switch(config)#aaa-accounting enable
5-54
S4600_Configuration Guide Chapter 5 Security Function Configuration
2004:1:2:3::2
If the RADIUS authentication problem remains unsolved, please use debug aaa and other
debugging command and copy the DEBUG message within 3 minutes, send the recorded message
to the technical server center of our company.
5-55
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.9 SSL
5-56
S4600_Configuration Guide Chapter 5 Security Function Configuration
internet browser, we can use SSL function. The communication between client and switch
through SSL connect can improve the security.
Firstly, SSL should be enabled on the switch. When the client tries to access the switch
through https method, a SSL session will be set up between the switch and the client. When the
SSL session has been set up, all the data transmission in the application layer will be encrypted.
SSL handshake is done when the SSL session is being set up. The switch should be able to
provide certification keys. Currently the keys provided by the switch are not the formal
certification keys issued by official authentic, but the private certification keys generated by SSL
software under Linux which may not be recognized by the web browser. With regard to the
switch application, it is not necessary to apply for a formal SSL certification key. A private
certification key is enough to make the communication safe between the users and the switch.
Currently it is not required that the client is able to check the validation of the certification key.
The encryption key and the encryption method should be negotiated during the handshake
period of the session which will be then used for data encryption.
SSL session handshake process:
5-57
S4600_Configuration Guide Chapter 5 Security Function Configuration
ip http secure-server
Enable/disable SSL function.
no ip http secure-server
2. Configure/delete port number by SSL used
Command Explanation
Global Mode
Configure port number by SSL used, the“no ip
ip http secure-port <port-number>
http secure-port” command deletes the port
no ip http secure-port
number.
3. Configure/delete secure cipher suite by SSL used
Command Explanation
Global Mode
ip http secure-ciphersuite
Configure/delete secure cipher suite by SSL
{des-cbc3-sha|rc4-128-sha| des-cbc-sha}
used.
no ip http secure-ciphersuite
4. Maintenance and diagnose for the SSL function
Command Explanation
Admin Mode or Configuration Mode
show ip http secure-server status Show the configured SSL information.
debug ssl
Open/close the DEBUG for SSL function.
no debug ssl
Web Server
Date Acquisition
Fails
Malicious Users
PC Users
5-58
S4600_Configuration Guide Chapter 5 Security Function Configuration
Figure 5-25
Configuration on the switch:
Switch(config)# ip http secure-server
Switch(config)# ip http secure-port 1025
Switch(config)# ip http secure-ciphersuite rc4-128-sha
5.10 VLAN-ACL
5-60
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-61
S4600_Configuration Guide Chapter 5 Security Function Configuration
only the rules on port is effective if the packets match the rule on port and vlan at the same
time. Now, it will not meet the principle of deny priority. If the two acl are not the same kine
of acl, it can meet the principle of deny priority.
Each ACL of different types can only apply one on a VLAN, such as the basic IP ACL, each
VLAN can applies one only.
5-63
S4600_Configuration Guide Chapter 5 Security Function Configuration
Command Explanation
Captive Portal Configuration Mode
enable Enable/disable captive portal
disable function globally.
Command Explanation
Captive Portal Configuration Mode
external portal-server server-name <name> {ipv4
| ipv6} <ipaddr> [port <1-65535>] Configure/delete external portal
no external portal-server {ipv4 | server.
ipv6}server-name <name>
nas-ip4 <A.B.C.D> Configure the nas-ip address.
Configure/delete portal routine of
configuration <cp-id>
different types of users. 10 kinds of
no configuration <cp-id>
routines can be configured.
Captive Portal Instance Configuration Mode
redirect url-head <word> Configure the redirect url-head
no redirect url-head including transmission protocol, host
name, port and path. The no
command deletes the configuration.
5-64
S4600_Configuration Guide Chapter 5 Security Function Configuration
Command Explanation
Global Mode
aaa enable Enable/stop the AAA function of a
no aaa enable captive portal routine.
aaa group server radius <word> Configure/delete RADIUS name of
no aaa group server radius <word> AAA function.
Command Explanation
Global Mode
radius-server key <word> Configure/delete RADIUS server
no radius-server key key.
radius-server authentication host
<A.B.C.D> Configure/delete RADIUS
no radius-server authentication host authentication server address.
<A.B.C.D>
5-65
S4600_Configuration Guide Chapter 5 Security Function Configuration
Fi
connected to pc1, the port is enabled portal authentication function, and the redirection address
is configured as the IP and port of the portal server. So the Ethernet1/0/2 forbids all the traffic and
only allows the dhcp/dns/arp packets.
The switch2 is the convergence switch, the Ethernet1/0/2 is communicated to the radius
server, the Ethernet1/0/3 is communicated to the portal server. The address of the radius server is
192.168.40.100, and the address of the portal server is 192.168.40.99. The Ethernet1/0/4 is
connected to DHCP server and the Ethernet1/0/5 is connected to DNS server. The Ethernet1/0/6 is
the trunk port and connected to the Ethernet1/0/4 of the trunk port of switch1.
Configure the portal function and portal server under the portal instance:
Switch (config)#captive-portal
Switch (config-cp)#enable
Switch(config-cp)# nas-ipv4 192.168.40.50
Switch(config-cp)# external portal-server server-name abc ipv4 192.168.40.99
Switch (config-cp)# configuration 1
Switch (config-cp-instance)#name helix4
Switch (config-cp-instance)#radius-auth-server abc99
Switch (config-cp-instance)# redirect attribute nas-ip enable
Switch (config-cp-instance)#redirect attribute nas-ip name kk
Switch (config-cp-instance)#ac-name helix4
Switch (config-cp-instance)#redirect url-head http://192.168.40.99/a70.htm
Switch (config-cp-instance) # portal-server ipv4 abc
5-67
S4600_Configuration Guide Chapter 5 Security Function Configuration
Both the captive portal and the portal configuration should be open; otherwise, the captive
portal function will not work, the client also cannot be redirect to the specified page.
The authentication server name of AAA module is same to the configured authentication
name of captive portal.
Whether the port which connects the pc and switch is enabled portal authentication
function.
Command Explanation
Global Mode
radius-server accounting host <A.B.C.D> Configure/delete accounting server
no radius-server accounting host <A.B.C.D> address
Command Explanation
Global Mode
5-68
S4600_Configuration Guide Chapter 5 Security Function Configuration
Command Explanation
Captive Portal Configuration Mode
block
Block/unblock portal function
no block
name <word> Configure/delete captive portal
no name configuration name
radius accounting Enable/disable captive portal
no aaa-accounting accounting function
radius-acct-server <word> Configure/delete captive portal
no radius-acct-server accounting server name
session-timeout <0-86400> Configure/delete captive portal
session-timeout session time
5-69
S4600_Configuration Guide Chapter 5 Security Function Configuration
Command Explanation
Config Mode
5-70
S4600_Configuration Guide Chapter 5 Security Function Configuration
Case:
Set up an environment as shown below. The IP is the address segment for the Client1, and
the Destination IP is the address segment for client who wants to access the resources. Appoint
RADIUS server 1 as the authentication server, client1 and client2 can access the free-resource of
3.1.1.0/24 and will not be redirected to the authentication server.
Authentication white-list is used for some special users in the network. The administrator
can set permission to allow the users to connect to the network to use network resources
without authentication, but the administrator needs to get the user’s mac address. At the same
time the user who has the permission to use network resources do not need to billing. So the
user belongs to the advanced user.
Command Explanation
Config Mode
free mac < MACADD><MACMASK> Configure or delete the mac address
no free mac < MACADD><MACMASK> without needing to authenticate.
Case:
As shown below, client1 and client2 are the terminal clients; the port connected to the
switch is enabled portal authentication. But these two clients are the advanced users, they need
no authentication to access the network.
Successful Authentication
The automatic page pushing function after the successful authentication means that the
web page which user needs to access can be re-opened after the authentication. According to the
actual situation, the welcome page before the automatic pushing authentication or the
appointed web page by the automatic pushing function can be configured.
Authentication Configuration
Automatic Page Pushing after Successful Authentication Configuration is as below:
1. Enable/disable the captive portal authentication function
2. Configure the automatic page pushing after successful authentication
Command Explanation
Captive Portal Mode
enable Enable/disable the captive portal
disable authentication function on the switch.
5-73
S4600_Configuration Guide Chapter 5 Security Function Configuration
redirect attribute url-after-login encode Configure the encode of the pushed url after
{plain-text|base64} the successful authentication which is carried
in the redirect url.
redirect attribute url-after-login value Configure the appointed url which is popped
<url-value> up after the successful authentication. The no
no redirect attribute url-after-login value command deletes it.
Authentication Example
Case:
Configure the automatic page pushing after successful authentication on configuration1 of
http://www.test.com.
5-74
S4600_Configuration Guide Chapter 5 Security Function Configuration
Authentication Troubleshooting
When there is problem in using the automatic page pushing function after the successful
authentication, please check the following reasons:
Check if the captive portal authentication function is configured correctly. The automatic
page pushing function after the successful authentication can be effect when the captive
portal function is normal.
If the command of redirect attribute url-after-login value is configured, the configured page
url can be pushed automatically after the authentication; if that command is not configured,
the page that the user access before the authentication can be pushed.
Check if the page before the authentication or the pushed page appointed by command
exists, if not, the page cannot be accessed after pushing.
5.11.6 http-redirect-filter
2. Configure the portal function, portal server under the portal instance:
Switch (config)#captive-portal
Switch (config-cp)#enable
5-76
S4600_Configuration Guide Chapter 5 Security Function Configuration
The client can be redirected authentication only through accessing “test.permit.com” before
authentication. It cannot be redirected authentication by accessing other address.
5-77
S4600_Configuration Guide Chapter 5 Security Function Configuration
MAC authentication has the user experience that is "a authentication, multiple use". If you
opened the fast authentication of MAC, the user successfully authenticates the first landing
Portal page, subsequent user can use any application.
In order to achieve a large number of user's fast authentication of MAC, user must use an
external server to save the MAC binding information, and add it dynamically but not manually.
This new realization of the program is called fast authentication of MAC scheme, since the user
does not need to manually enter the user name and password for authentication when access
network again, also known as Portal non-perception of authentication scheme.
The created environment is as the following figure including the parts as below:
1. PC, user can access the network through the switch.
2. Public network, this part can be free or other switch devices.
3. Server, it includes:
MAC binding server, it is used to save the authenticated terminal mac address;
Radius server, it is used for the portal authentication and accounting;
Portal server, it is used for the portal authentication;
MAC binding server, Radius server and portal server can be the same one device. The mac
binding server is the spread on the radius server.
5-78
S4600_Configuration Guide Chapter 5 Security Function Configuration
Figure 5-33
2. Configure the portal function, portal server under the portal instance:
Switch (config)#captive-portal
Switch (config-cp)#enable
Switch(config-cp)# nas-ipv4 192.168.1.50
Switch(config-cp)# external portal-server server-name abc ipv4 172.16.1.26
Switch (config-cp)# configuration 1
Switch (config-cp-instance)#enable
Switch (config-cp-instance)#name helix4
Switch (config-cp-instance)#radius accounting
Switch (config-cp-instance)#radius-acct-server abc99
Switch (config-cp-instance)#radius-auth-server abc99
Switch (config-cp-instance)#redirect attribute nas-ip enable
Switch (config-cp-instance)#ac-name helix4
Switch (config-cp-instance)#redirect url-head http://172.16.1.26/a70.htm
Switch (config-cp-instance) # portal-server ipv4 abc
5-79
S4600_Configuration Guide Chapter 5 Security Function Configuration
The normal portal authentication is needed in the first access. After the first time, user can
use the non-perception authentication of portal.
Please check if the reasons are the following situations when there are problems in using the
function of portal non-perception:
Check whether the captive-portal function is enabled.
Check whether the quick mac authentication function is enabled.
Check whether issued the app table entry to the switch if the quick mac authentication is
not effective after configured.
The server triggers the following three configurations when the status changes from
reachable to unreachable, the administrator can select through the configuration:
Send trap: send the trap information to the network management server. In the trap, it
records the portal server name and the status information before and after the change
of the server status.
Send log: send the log information to the log server. In the log, it records the portal
server name and the status information before and after the change of the server
status.
permit-all: it is also named as portal escaping. It means to cancel the portal
authentication temporarily and allow all the portal users accessing the network when
the portal server is in the unreachable status (down).
The server triggers the following three configurations when the status changes from
unreachable to reachable. “Send trap” and “send log” can be selected through the configuration;
“Disable portal escaping” is enforced to carry on:
Send trap: send the trap information to the network management server. In the trap, it
records the portal server name and the status information before and after the change
of the server status.
Send log: send the log information to the log server. In the log, it records the portal
server name and the status information before and after the change of the server
status.
Disable portal escaping: If the portal server status changes to the reachable status (up),
the portal authentication function of VAP will be recovered. The new user must pass
the portal authentication for accessing the network.
Notice: The portal escaping function can only achieve that the new and old users are not
affected when accessing the network currently. For the situation that user cannot get down the
line normally, there are other methods. For example, the portal server is recovered to be UP, the
access device will enforce the user to get down the line and it ensure that user can get down the
line normally.
5-81
S4600_Configuration Guide Chapter 5 Security Function Configuration
1. Enable the Portal escaping function and configure the probing interval and maximum
number of failures
Command Explanation
Captive Portal Global Configuration Mode
portal-server-detect server-name <name> Enable the Portal server escaping function and
[interval <interval>] [retry <retries>][action configure the related parameters (selectable)
and the server configuration of status
{log | permit-all | trap }]
changing.
no portal-server-detect server-name <name>
passed the authentication before the portal server is broken, it will not be affected and it can still
access the network.
2. Configure the portal function, portal server under the portal instance:
Switch (config)#captive-portal
Switch (config-cp)#enable
Switch(config-cp)# nas-ipv4 192.168.1.50
Switch(config-cp)# external portal-server server-name abc ipv4 172.16.1.26
Switch (config-cp)# configuration 1
Switch (config-cp-instance)#enable
Switch (config-cp-instance)#name helix4
Switch (config-cp-instance)#radius accounting
Switch (config-cp-instance)#radius-acct-server abc99
Switch (config-cp-instance)#radius-auth-server abc99
Switch (config-cp-instance)#redirect attribute nas-ip enable
Switch (config-cp-instance)#ac-name helix4
Switch (config-cp-instance)#redirect url-head http://172.16.1.26/a70.htm
Switch (config-cp-instance) # portal-server ipv4 abc
5-83
S4600_Configuration Guide Chapter 5 Security Function Configuration
As shown above, the portal server of cmcc is bound to CP instance and the probing function
is configured; the probing interval is 600s. If the probing failed twice, send the trap information
and log of the unreachable server and the enable the portal escaping function to allow the user
without authentication accessing the network.
5-84
S4600_Configuration Guide Chapter 5 Security Function Configuration
Global Mode
radius-server escape detection-interval Configure the detection interval of radius
{default | <second>} server and the default value is 180s.
2 Configure the portal function, portal server under the portal instance:
Switch (config)#captive-portal
Switch (config-cp)#enable
Switch(config-cp)# nas-ipv4 192.168.1.50
5-85
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-86
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.12 MAB
Port Mode
mac-authentication-bypass enable
Enable the port MAB authentication function.
no mac-authentication-bypass enable
5-87
S4600_Configuration Guide Chapter 5 Security Function Configuration
mac-authentication-bypass
binding-limit <1-100> Set the max MAB binding-limit of the port.
no mac-authentication-bypass
binding-limit
Global Mode
mac-authentication-bypass timeout
reauth-period <1-3600> Set the reauthentication interval after the
no mac-authentication-bypass timeout authentication is unsuccessful.
reauth-period
mac-authentication-bypass timeout
offline-detect (0|<60-7200>)
Set offline detection interval.
no mac-authentication-bypass
timeout offline-detect
mac-authentication-bypass timeout
quiet-period <1-60>
Set quiet-period of MAB authentication.
no mac-authentication-bypass
timeout quiet-period
mac-authentication-bypass timeout
stale-period <0-60> Set the time that delete the binding after the
no mac-authentication-bypass port is down.
timeout stale-period
mac-authentication-bypass timeout
To obtain IP again, set the interval of
linkup-period <0-30> down/up when MAB binding is changing into
no mac-authentication-bypass timeout
VLAN.
linkup-period
5-88
S4600_Configuration Guide Chapter 5 Security Function Configuration
Switch2
Ethernet1/0/4
Ethernet1/0/4
Switch1
Eth1/0/1 Eth1/0/2 Eth1/0/3
MAB function.
Ethernet 1/0/3 is an access port, connects to the printer and enables MAB function.
Ethernet 1/0/4 is a trunk port, connects to Switch2.
5-90
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-91
S4600_Configuration Guide Chapter 5 Security Function Configuration
identification and location are the basic character and requirement for user, for example, when
supplying the application that use user accounts to login, this method supplied by PPPoE
Intermediate Agent can availably avoid user accounts embezzled.
There are two stages for PPPoE protocol work: discovery stage and session stage. Discovery
stage is used to obtain MAC address of the remote server to establish a point-to-point link and a
session ID with the server, and session stage uses this session ID to communicate. PPPoE
Intermediate Agent only relates to discovery stage, so we simply introduce discovery stage.
There are four steps for discovery stage:
1. Client sends PADI packet: The first step, client uses broadcast address as destination
address and broadcast PADI (PPPoE Active Discovery Initiation) packet to discover
access collector in layer 2 network. Notice: This message may be sent to many access
collector of the network.
2. Broadband Access Server responds PADO packet: The second step, server responds
PADO (PPPoE Active Discovery Offer) packet to client according to the received source
MAC address of PADI packet, the packet will take sever name and service name.
3. Client sends PADR packet: The third step, client selects a server to process the session
according to the received PADO packet. It may receives many PADO packets for PADI
message of the first step may be sent to many servers (select the server according to
whether the service information of PADO packet match with the servce information
needed by client). MAC address of the other end used for session will be known after
server is selected, and send PADR (PPPoE Active Discovery Request) packet to it to
announce server the session requirement.
4. Server responds PADS packet: The fourth step, server establishes a session ID according
to the received PADR packet, this session ID will be sent to client through PADS (PPPoE
Active Discovery Session-confirmation) packet, hereto PPPoE discovery stage is
completed, enter session stage.
PADT (PPPoE Active Discovery Terminate) packet is an especial packet of PPPoE, its’ Ethernet
protocol number (0x8863) is the same as four packets above, so it can be considered a packet of
discovery stage. To stop a PPPoE session, PADT may be sent at the discretional time of the session.
(It can be sent by client or server)
PPPoE Intermediate Agent supplies a function that identify and locate the user. When
passing network access device, PADI and PADR messages sent by client with the access link tag of
this device at PPPoE discovery stage, so as to exactly identify and locate the user on server.
If the direct-link access device is LAN switch, the added information include: MAC, Slot ID,
Port Index, Vlan ID, and so on. This function is implemented according to Migration to
Ethernet-based DSL aggregation.
PPPoE data
Version Type Code Session ID Length Field TLV1 …… TLV N
TLV frame
Type Length Data
5-93
S4600_Configuration Guide Chapter 5 Security Function Configuration
0x0000 The end of a series tag in PPPoE data field, it is saved for ensuring the version
compatibility and is applied by some packets.
0x0101 Service name. Indicate the supplied services by network.
0x0102 Server name. When user receives the PADO response packet of AC, it can obtain
the server name from the tag and select the corresponding server.
0x0103 Exclusive tag of the host. It is similar to tag field of PPPoE data packets and is used
to match the sending and reveiving end (Because broadcast network may exist
many PPPoE data packets synchronously).
0x0104 AC-Cookies. It is used to avoid the vicious DOS attack.
0x0105 The identifier of vendor.
0x0110 Relay session ID. PPPoE data packet can be interrupted to other AC, this field is
used to keep other connection.
0x0201 The error of service name. When the requested service name is not accepted by
other end, the response packet will take this tag.
0x0202 The error of server name.
0x0203 Common error.
Table 5-1 TAG value type of PPPoE
includes 5 fields, ANI (Access Node Identifier) can be configured by user, its length is less than 47
bytes. If there is no ANI configured, MAC is accessed by default, occupy 6 bytes and use space
symbol to compart, “eth” occupies 3 bytes and uses space symbol to compart, “Slot ID” occupies
2 bytes, use “/” to compart and occupy 1 byte, “Port Index” occupies 3 bytes, use “:” to compart
and occupy 1 byte, “Vlan ID” occupies 4 bytes, all fields use ASCII, user can configure ciucuit ID
for each port according to requirement.
ANI Space eth Space Slot ID / Port Index : Vlan ID
(n byte) ( 1byte) (3 byte) (1 byte) (2 byte) (1byte) (3 byte) (1 byte) (4 byte)
Figure 5-39 ent Circuit ID value
MAC of the access switch is the default remote ID value of PPPoE IA. remote ID value can be
configured by user flexibly, the length is less than 63 bytes.
Command Explanation
Global Mode
pppoe intermediate-agent Enabel global PPPoE Intermediate Agent
no pppoe intermediate-agent function.
pppoe intermediate-agent type tr-101
circuit-id access-node-id <string> Configure access node ID field value of
no pppoe intermediate-agent type tr-101 circuit ID in added vendor tag.
circuit-id access-node-id
5-95
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-96
S4600_Configuration Guide Chapter 5 Security Function Configuration
5-97
S4600_Configuration Guide Chapter 5 Security Function Configuration
5.14 QoS
5-98
S4600_Configuration Guide Chapter 5 Security Function Configuration
A field of the MPLS packets means the service class, there are 3 bits, the ranging from 0 to 7.
Internal Priority: The internal priority setting of the switch chip, it’s valid range relates with the
chip, it’s shortening is Int-Prio or IntP.
Drop Precedence: When processing the packets, firstly drop the packets with the bigger drop
precedence, the ranging is the ranging is 0-2 in three color algorithm, the ranging is 0-1 in dual
color algorithm. It’s shortening is Drop-Prec or DP.
Classification: The entry action of QoS, classifying packet traffic according to the classification
information carried in the packet and ACLs.
Policing: Ingress action of QoS that lays down the policing policy and manages the classified
packets.
Remark: Ingress action of QoS, perform allowing, degrading or discarding operations to packets
according to the policing policies.
Scheduling: QoS egress action. Configure the weight for eight egress queues WRR (Weighted
Round Robin).
In-Profile: Traffic within the QoS policing policy range (bandwidth or burst value) is called
In-Profile.
Out-of-Profile: Traffic out the QoS policing policy range (bandwidth or burst value) is called
Out-of-Profile.
5-99
S4600_Configuration Guide Chapter 5 Security Function Configuration
detail.
Start
N tag packet
L2 COS value
L2 COS value of the
obtained by the
packet is its own L2
packet as the default
COS
COS(*1)
N
N
Trust COS Y
N
(*2)
N tag packet
Y
Set Int-Prio as the
DSCP-to-Int-Prio
default ingress Int-
COS -to-Int-Prio conversion according to
Prio
conversion according to DSCP value of the packet
L2 COS value of the
packet
Policing and remark: Each packet in classified ingress traffic is assigned an internal
priority value and a drop precedence value, and can be policed and remarked.
Policing can be performed based on the flow to configure different policies that allocate
bandwidth to classified traffic, the assigned bandwidth policy may be dual bucket dual color or
dual bucket three color. The traffic, will be assigned with different color, can be discarded or
passed, for the passed packets, add the remarking action. Remarking uses a new DSCP value of
lower priority to replace the original higher level DSCP value in the packet. The following
flowchart describes the operations.
5-102
S4600_Configuration Guide Chapter 5 Security Function Configuration
Start
No Whether configure
the policy
Yes
Pass
The specific
Drop
color action
Pass
Drop the
Enter scheduling
packets
5-103
S4600_Configuration Guide Chapter 5 Security Function Configuration
Start
buffer is
available No
Yes
Drop the
Finish packets
can also define a policy set that can be use in a policy map by several classes.
Apply QoS to the ports or the VLAN interfaces
Configure the trust mode for ports or bind policies to ports. A policy will only take effect on a
port when it is bound to that port.
Apply QoS to the ports or the VLAN interfaces
Configure the trust mode for ports or bind policies to ports. A policy will only take effect on a
port when it is bound to that port.
The policy may be bound to the specific VLAN.
It is not recommended to synchronously use policy map on VLAN and its port.
Configure queue management algorithm
Configure queue management algorithm, such as sp,wrr,sp+wrr , and so on.
Admin Mode
show mls qos maps [cos-intp | dscp-intp] Display the configuration of QoS
mapping.
show class-map [<class-map-name>] Display the classified map information of
QoS.
5-107
S4600_Configuration Guide Chapter 5 Security Function Configuration
Example 2:
In port ethernet1/0/2, set the bandwidth for packets from segment 192.168.1.0 to 10 Mb/s, with
a burst value of 4 MB, all packets exceed this bandwidth setting will be dropped.
Configuration result:
An ACL name 1 is set to matching segment 192.168.1.0. Enable QoS globally, create a class map
named c1, matching ACL1 in class map; create another policy map named p1 and refer to c1 in p1,
set appropriate policies to limit bandwidth and burst value. Apply this policy map on port
ethernet1/0/2. After the above settings done, bandwidth for packets from segment 192.168.1.0
through port ethernet 1/0/2 is set to 10 Mb/s, with a burst value of 4 MB, all packets exceed this
bandwidth setting in that segment will be dropped.
Example 3:
5-108
S4600_Configuration Guide Chapter 5 Security Function Configuration
Server
QoS area
Switch3
Switch2
Trunk
Switch1
5-109
S4600_Configuration Guide Chapter 5 Security Function Configuration
Command Explanation
Physical Interface Configuration Mode
Specify flow-based redirection
access-group <aclname> redirect to interface [ethernet for the port; the “no
<IFNAME>|<IFNAME>] access-group <aclname>
no access-group <aclname> redirect redirect” command is used to
delete flow-based redirection.
Modification of configuration:
1: Set an ACL, the condition to be matched is: source IP is 192.168.1.111;
2: Apply the redirection based on this flow to port 1.
5-111
S4600_Configuration Guide Chapter 5 Security Function Configuration
Permit.
The redirection port must be 1000Mb port in the flow-based redirection function.
The redirection port can not itself port in the flow-based redirection function.
5-112
S4600_Configuration Guide Chapter 5 Security Function Configuration
2. Create flexible QinQ policy-map to relate with the class-map and set the corresponding
operation
3. Bind flexible QinQ policy-map to port
Switch(config-classmap-c1)#exit
Switch(config)#class-map c2
Switch(config-classmap-c2)#match ip dscp 20
Switch(config-classmap-c2)#exit
Switch(config)#class-map c3
Switch(config-classmap-c3)#match ip dscp 30
Switch(config-classmap-c3)#exit
Switch(config)#policy-map p1
Switch(config-policymap-p1)#class c1
Switch(config-policymap-p1-class-c1)# set s-vid 1001
Switch(config-policymap-p1)#class c2
Switch(config-policymap-p1-class-c2)# set s-vid 2001
Switch(config-policymap-p1)#class c3
Switch(config-policymap-p1-class-c3)# set s-vid 3001
Switch(config-policymap-p1-class-c3)#exit
Switch(config-policymap-p1)#exit
Switch(config)#interface ethernet 1/0/1
Switch(config-if-ethernet1/0/1)#dot1q-tunnel enable
Switch(config-if-ethernet1/0/1)#service-policy p1 in
If the data flow of DSLAM2 enters the switch’s downlink port1, the configuration is as follows:
Switch(config)#class-map c1
Switch(config-classmap-c1)#match ip dscp 10
Switch(config-classmap-c1)#exit
Switch(config)#class-map c2
Switch(config-classmap-c2)#match ip dscp 20
Switch(config-classmap-c2)#exit
Switch(config)#class-map c3
Switch(config-classmap-c3)#match ip dscp 30
Switch(config-classmap-c3)#exit
Switch(config)#policy-map p1
Switch(config-policymap-p1)#class c1
Switch(config-policymap-p1-class-c1)# set s-vid 1002
Switch(config-policymap-p1)#class c2
Switch(config-policymap-p1-class-c2)# set s-vid 2002
Switch(config-policymap-p1)#class c3
Switch(config-policymap-p1-class-c3)# set s-vid 3002
Switch(config-policymap-p1-class-c3)#exit
Switch(config-policymap-p1)#exit
Switch(config)#interface ethernet 1/0/1
Switch(config-if-ethernet1/0/1)#dot1q-tunnel enable
Switch(config-if-ethernet1/0/1)# service-policy p1 in
If flexible QinQ policy can not be bound to the port, please check whether the problem is
caused by the following reasons:
Make sure flexible QinQ whether supports the configured class-map and policy-map
Make sure ACL includes permit rule if the class-map matches ACL rule
Make sure the switch exists enough TCAM resource to send the binding
Priority of flexible QinQ and vlan ingress filtering for processing packets is: flexible QinQ >
vlan ingress filtering
5-116
S4600_Configuration Guide Chapter 6 Reliability Configuration
6.1 MSTP
6-1
S4600_Configuration Guide Chapter 6 Reliability Configuration
Root A Root A
M E MST D
D REGION
F C
6-2
S4600_Configuration Guide Chapter 6 Reliability Configuration
<bridge-priority>
no spanning-tree mst <instance-id> priority
spanning-tree priority <bridge-priority> Configure the spanning-tree priority of the
no spanning-tree priority switch.
Port Mode
spanning-tree mst <instance-id> cost <cost>
Set port path cost for specified instance.
no spanning-tree mst <instance-id> cost
spanning-tree mst <instance-id>
port-priority <port-priority>
Set port priority for specified instance.
no spanning-tree mst <instance-id>
port-priority
spanning-tree mst <instance-id> rootguard Configure currently port whether running
no spanning-tree mst <instance-id> rootguard in specified instance, configure the
rootguard rootguard port can’t turn to root port.
Configure currently port whether running
spanning-tree rootguard
rootguard in instance 0, configure the
no spanning-tree rootguard
rootguard port can’t turn to root port.
spanning-tree [mst <instance-id>]
Enable loopguard function on specified
loopguard
instance, the no command disables this
no spanning-tree [mst <instance-id>]
function.
loopguard
6-4
S4600_Configuration Guide Chapter 6 Reliability Configuration
Command Explanation
Port Mode
Configure the format of port
spanning-tree format standard spanning-tree packet, standard format is
spanning-tree format privacy provided by IEEE, privacy is
spanning-tree format auto compatible with CISCO and auto means
no spanning-tree format the format is determined by checking
the received packet.
Command Explanation
Port Mode
spanning-tree cost
Set the port path cost.
no spanning-tree cost
spanning-tree port-priority
Set the port priority.
no spanning-tree port-priority
6-5
S4600_Configuration Guide Chapter 6 Reliability Configuration
spanning-tree rootguard
Set the port is root port.
no spanning-tree rootguard
Global Mode
spanning-tree transmit-hold-count
<tx-hold-count-value> Set the max transmit-hold-count of port.
no spanning-tree transmit-hold-count
Set port cost format with dot1d or
spanning-tree cost-format {dot1d | dot1t}
dot1t.
Command Explanation
Port Mode
Set the port to use the authentication
spanning-tree digest-snooping string of partner port. The no
no spanning-tree digest-snooping command restores to use the generated
string.
9. Configure the FLUSH mode once topology changes
Command Explanation
Global Mode
Enable: the spanning-tree flush once the
topology changes.
Disable: the spanning tree don’t flush
when the topology changes.
spanning-tree tcflush {enable| disable| protect}
Protect: the spanning-tree flush not
no spanning-tree tcflush
more than one time every ten seconds.
The no command restores to default
setting, enable flush once the topology
changes.
Port Mode
Configure the port flush mode.
spanning-tree tcflush {enable| disable| protect}
The no command restores to use the
no spanning-tree tcflush
global configured flush mode.
6-6
S4600_Configuration Guide Chapter 6 Reliability Configuration
SW1
1 2
1 1
2 2X
3 3X
SW2 4 6
5 7 SW3
4 6X
5X 7X
x
SW4
By default, the MSTP establishes a tree topology (in blue lines) rooted with SwitchA. The
ports marked with “x” are in the discarding status, and the other ports are in the forwarding
status.
6-7
S4600_Configuration Guide Chapter 6 Reliability Configuration
Configurations Steps:
Step 1: Configure port to VLAN mapping:
Create VLAN 20, 30, 40, 50 in Switch2, Switch3 and Switch4.
Set ports 1-7 as trunk ports in Switch2 Switch3 and Switch4.
Step 2: Set Switch2, Switch3 and Switch4 in the same MSTP:
Set Switch2, Switch3 and Switch4 to have the same region name as mstp.
Map VLAN 20 and VLAN 30 in Switch2, Switch3 and Switch4 to Instance 3; Map VLAN
40 and VLAN 50 in Switch2, Switch3 and Switch4 to Instance 4.
Step 3: Set Switch3 as the root bridge of Instance 3; Set Switch4 as the root bridge of Instance 4
Set the bridge priority of Instance 3 in Switch3 as 0.
Set the bridge priority of Instance 4 in Switch4 as 0.
Switch2:
Switch2(config)#vlan 20
Switch2(Config-Vlan20)#exit
Switch2(config)#vlan 30
Switch2(Config-Vlan30)#exit
Switch2(config)#vlan 40
Switch2(Config-Vlan40)#exit
Switch2(config)#vlan 50
Switch2(Config-Vlan50)#exit
Switch2(config)#spanning-tree mst configuration
Switch2(Config-Mstp-Region)#name mstp
Switch2(Config-Mstp-Region)#instance 3 vlan 20;30
Switch2(Config-Mstp-Region)#instance 4 vlan 40;50
Switch2(Config-Mstp-Region)#exit
Switch2(config)#interface e1/0/1-7
Switch2(Config-Port-Range)#switchport mode trunk
Switch2(Config-Port-Range)#exit
Switch2(config)#spanning-tree
Switch3:
Switch3(config)#vlan 20
Switch3(Config-Vlan20)#exit
Switch3(config)#vlan 30
Switch3(Config-Vlan30)#exit
Switch3(config)#vlan 40
Switch3(Config-Vlan40)#exit
Switch3(config)#vlan 50
Switch3(Config-Vlan50)#exit
6-8
S4600_Configuration Guide Chapter 6 Reliability Configuration
Switch4:
Switch4(config)#vlan 20
Switch4(Config-Vlan20)#exit
Switch4(config)#vlan 30
Switch4(Config-Vlan30)#exit
Switch4(config)#vlan 40
Switch4(Config-Vlan40)#exit
Switch4(config)#vlan 50
Switch4(Config-Vlan50)#exit
Switch4(config)#spanning-tree mst configuration
Switch4(Config-Mstp-Region)#name mstp
Switch4(Config-Mstp-Region)#instance 3 vlan 20;30
Switch4(Config-Mstp-Region)#instance 4 vlan 40;50
Switch4(Config-Mstp-Region)#exit
Switch4(config)#interface e1/0/1-7
Switch4(Config-Port-Range)#switchport mode trunk
Switch4(Config-Port-Range)#exit
Switch4(config)#spanning-tree
Switch4(config)#spanning-tree mst 4 priority 0
After the above configuration, Switch1 is the root bridge of the instance 0 of the entire
network. In the MSTP region which Switch2, Switch3 and Switch4 belong to, Switch2 is the region
root of the instance 0, Switch3 is the region root of the instance 3 and Switch4 is the region root
of the instance 4. The traffic of VLAN 20 and VLAN 30 is sent through the topology of the instance
3. The traffic of VLAN 40 and VLAN 50 is sent through the topology of the instance 4. And the
traffic of other VLANs is sent through the topology of the instance 0. The port 1 in Switch2 is the
master port of the instance 3 and the instance 4.
The MSTP calculation generates 3 topologies: the instance 0, the instance 3 and the instance
4 (marked with blue lines). The ports with the mark “x” are in the status of discarding. The other
ports are the status of forwarding. Because the instance 3 and the instance 4 are only valid in the
MSTP region, the following figure only shows the topology of the MSTP region.
6-9
S4600_Configuration Guide Chapter 6 Reliability Configuration
SW1
1 2
1 1X
2 2
3 3X
SW2 4 6
5 7 SW3
4 6X
5X 7X
x
SW4
Figure 6-3 The Topology Of the Instance 0 after the MSTP Calculation
2 2
3X 3
SW2 4 6
5 7 SW3
4X 6
5X 7X
x
SW4
Figure 6-4 The Topology Of the Instance 3 after the MSTP Calculation
2 2X
3 3X
SW2 4 6
5X 7X SW3
4 6
5 7
x
SW4
Figure 6-5 The Topology Of the Instance 4 after the MSTP Calculation
6-10
S4600_Configuration Guide Chapter 6 Reliability Configuration
6.2 ERPS
6-11
S4600_Configuration Guide Chapter 6 Reliability Configuration
configured as reversion.
RPL neighbor node:RPL neighbor node, it is the other node connected to RPL. When the ring
network is healthy, it will block the RPL.
Interconnection node:Cross node, when there are many rings are crossed, it is the node in the
cross position. On the cross nodes, there is one or more rings can be connected through two
ports. The ring connected through one port is the sub-ring, the ring connected through two ports
is the main ring.
R-APS virtual channel : It is the link which makes the sub-ring connect between two
interconnection nodes out of the sub-ring path. Its transmission characteristic is related to the
out ring network.
major-ring: It is the ring which connects the two ports on the interconnection node.
sub-ring:It is the ring which connects to other network through two interconnection nodes. it is
not a ring network, it will make up a ring network only when connect it through the
interconnection node.
ERP instance:It is a set protected by many vlan. The packet transmission of the vlan in this
instance pass the same ring network link, every vlan only belongs to one instance.
Revertive switch:After learning of the ring network fault restored, the RPL owner node will
restore the blockade status of RPL and make the network flow transmission path restore to the
link before the fault.
Non-revertive switch:After learning of the ring network fault restored, the RPL owner node will
not block the RPL, the network flow transmission path is same as before.
6-12
S4600_Configuration Guide Chapter 6 Reliability Configuration
a) The ring network status is normal; RPL owner node of G sends the R-APS (NR,
RB) packet periodically. This packet explains that RPL link is in blockade status
and the ring network is healthy.
b) There is fault on the link between node C and D.
c) The node C and D detected the fault, they block the port which connected to the
fault link respectively and run the flush FDB.
d) At the same time, the node C and D send the fault notification packet of R-APS
(SF) respectively through the port connected to the ring network.
e) All the nodes which received R-APS (SF) packet will run the flush FDB. At the
same time, RPL owner node of G and RPL neighbor node of A will configure the
RPL connection port as forward. The node G will stop sending R-APS (NR,RB)
packet.
f) Because RPL link has removed the blockade, all nodes can receive two R-APS
(SF) packets (sent by node C and D). after receiving the new R-APS (SF) packet,
it will run the flush FDB.
g) Link fault message of R-APS (SF) will transmitting always in the ring network.
The environments of the two methods are different. When the block RPL can make
the data flow transmission path be the best, use the Revertive switch; when the path
costs are similar, there is no difference no matter which path will be blocked, for
preventing the secondary interruption of data flow, use the Non-revertive switch.
1. Revertive switch
The following is the single-ring and single link fault.
6-14
S4600_Configuration Guide Chapter 6 Reliability Configuration
connected to RPL. Other, all nodes will run the flush FDB after received R-APS
(NR, RB) packets.
2. Non-revertive switch
The following example is about the single-ring and single link fault as shown in Fig 2-3.
ERPS protocol can support the protection and switching of the interconnection
ring. The interconnection ring includes two types: the interconnection ring model with
virtual channel and the interconnection ring model without virtual channel.
A D
B C
G F
H E
The R-APS virtual channel supported by ring 1 and ring 2 treats ring 3 protocol
packets as the data packets. The transmission method of the packets is same as the
method of data packets. The node B of ring 3 sends and receives the ring 3 erps protocol
packets sent by node G, at the same time, the node G sends and receives the ring 3 erps
protocol packets sent by node B. For distinguishing the erps packets of ring 3 and the
erps packets of this major ring in ring 1 and ring 2, different control vlan can be used to
the protocol packets transmission of every ring.
When the sub ring 3 is changing, it should notify ring 1 and ring 2. The node on the
major ring will run flush FDB. The topology changing of the major ring 1 and ring 2 will
not affect the sub ring 3. Other, the topology changing of the major ring 1 and ring 2 will
not affect each other either.
it will block the link between node C and D. ring 3 is another sub ring, it is made up with
the nodes B, C, F, G and the links of B-C, C-F and F-G. When ring 3 is health, it will block
the link of B-C. B-G links are the interconnection links of ring 1 and ring 3 and it belongs
to ring 1. C-F links are the interconnection links of ring 2 and ring 3 and it belongs to ring
3. Ring 1 is the close ring network; ring 2 and ring 3 are not the ring network.
A D
B C
G F
H E
Although ring 2 and ring 3 are not ring network neither, the erps packets of these two
sub ring need to be transmitted to all ring nodes. So, the block link should still transmit
erps protocol packets if the links of B-C and C-D are blocked, and the nodes B, C and C,
D of the block link should also receive and send the erps protocol packets.
When the sub ring 3 is changing, it should notify ring 1. The node on the major ring
will run flush FDB. The topology changing will not affect the sub ring 2. When the sub ring
2 is changing, it will affect the sub ring 3 and the major ring 1. The node on the major ring
should run flush FDB. But, the topology changing of the major ring 1 will not affect the
sub ring 2 and ring 3.
Command Explanation
Global Mode
spanning-tree mst configuration Enter into the MST configuration mode,
no spanning-tree mst configuration configure the parameters of MSTP
domain; the no command recovers to be
the default.
MST Mode
instance <instance value > vlan <vlan-list> Configure vlan which needs to be
no instance [instance-value] protected by the instance and mapping;
the no command deletes the appointed
instance.
2.Create ERPS ring and configure the member ports information
Command Explanation
Global Mode
erps ring <ring-name> Create ERPS ring and enter into the ERPS
no erps ring <ring-name> ring configuration mode; the no
command deletes the appointed erps
ring.
Port Mode
erps-ring <ring-name> port0 Configure the port0 or port1 which is the
erps-ring <ring-name> port1 ring node of port; the no command
erps-ring <ring-name> port0 deletes their property.
erps-ring <ring-name> port1
3.Configure ERPS ring instance
Command Explanation
Global Mode
erps ring <ring-name> Create ERPS ring and enter into the ERPS
no erps ring <ring-name> ring configuration mode; the no
command deletes the appointed erps
ring.
ERPS Ring Configuration Mode
eprs-instance <instance-id> Create ERPS ring instance and enter into
no eprs-instance <instance-id> the ERPS ring configuration mode; the no
command deletes the appointed ring
node instance.
description <instance-name> Configure the description string of ERPS
no description instance; the no command deletes the
appointed string.
rpl {port0 | port1} {owner | neighbour} Configure the member port of ERPS ring
no rpl {port0 | port1} instance as RPL owner or RPL neighbor;
the no command deletes the appointed
owner or neighbor node.
raps-mel <level-value> Configure the level of R-APS channel, the
6-18
S4600_Configuration Guide Chapter 6 Reliability Configuration
Case 1:
As shown in the picture above, it is the explanation of ERPS configuration and application.
S1~S4 make up the ring network and provide the layer2 redundancy protection transform
function. For preventing the packets in VLAN10 ~ VLAN20 come to be loop, deploy the ERPS
protocol on the devices which make up the ring network. The forwarding path of user data
inserted through CE1 is S2-S1 and it is S3-S4 for the data which is deserted through CE2. For
protecting the Ethernet loop switching, configure it as below:
1. Configuration thinking
Configure ERPS loop redundancy protection as below:
Create ERPS loop of maijor_ring1 and configure the loop member port;
Configure the instance 1 on ERPS loop of maijor_ring1 and configure the protection instance,
member port role, timer and controlling VLAN.
2. Configuration steps
Step1: Create instance 2, VLAN2 and VLAN10-20 on S1 ~ S4, VLAN2 is used to transmit the
protocol packets, VLAN10-20 are used to transmit the data packets.
Configuration of S1:
S1#config
6-20
S4600_Configuration Guide Chapter 6 Reliability Configuration
Step2: Create ERPS loop and configure the member port information. The default
configuration: support version V2, main loop closing type and monitor the physical status of port.
Configuration of S1:
S1(config)#erps-ring maijor_ring1
S1(config-erps-ring)#exit
S1(config)# interface e1/0/1
S1(config-if-ethernet1/0/1)erps-ring maijor_ring1 port 0
S1(config-if-ethernet1/0/1)interface e1/0/2
S1(config-if-ethernet1/0/2)erps-ring maijor_ring1 port 1
Step3: Configure ERPS loop instance and configure the protection instance, port role.
Configure the ERPS loop instance name, R-APS level, timer information. Configure the controlling
VLAN at last and configure the port e1/0/2 of S2 as RPL owner and RPL Neighbor is for e1/0/1 of
S3.
Configuration of S1:
S1(config)# erps-ring maijor_ring1
S1(config-erps-ring)#erps-instance 1
S1(config-erps-ring-inst-1)#description instance1
S1(config-erps-ring-inst-1)#raps-mel 3
S1(config-erps-ring-inst-1)#protected-instance 2
S1(config-erps-ring-inst-1)#wtr-timer 8
S1(config-erps-ring-inst-1)#guard-timer 100
S1(config-erps-ring-inst-1)#holdoff-timer 5
S1(config-erps-ring-inst-1)# control-vlan 2
The configuration of S4 is same as S1.
Configuration of S2:
S2(config)# erps-ring maijor_ring1
S2(config-erps-ring)#erps-instance 1
S2(config-erps-ring-inst-1)#description instance1
S2(config-erps-ring-inst-1)#rpl port 1 owner
S2(config-erps-ring-inst-1)#non-revertive
S2(config-erps-ring-inst-1)#raps-mel 3
S2(config-erps-ring-inst-1)#protected-instance 2
S2(config-erps-ring-inst-1)#wtr-timer 8
S2(config-erps-ring-inst-1)#guard-timer 100
S2(config-erps-ring-inst-1)#holdoff-timer 5
6-21
S4600_Configuration Guide Chapter 6 Reliability Configuration
S2(config-erps-ring-inst-1)# control-vlan 2
Configuration of S3:
S3(config)# erps-ring maijor_ring1
S3(config-erps-ring)#erps-instance 1
S3(config-erps-ring-inst-1)#description instance1
S3(config-erps-ring-inst-1)# rp0 port 1 neighbour
S3(config-erps-ring-inst-1)#raps-mel 3
S3(config-erps-ring-inst-1)#protected-instance 2
S3(config-erps-ring-inst-1)#wtr-timer 8
S3(config-erps-ring-inst-1)#guard-timer 100
S3(config-erps-ring-inst-1)#holdoff-timer 5
S3(config-erps-ring-inst-1)# control-vlan 2
Step 4: Check the configuration result. After the configuration above is successful, check the
configuration result and below is for S2.
S2# show erps ring brief
Ring-ID Description Ring-topo Port0 Port1 Version Inst-Count
--------------------------------------------------------------------------------------------------------
1 maijor_ring1 maijor-ring 1/0/1 1/0/2 V2 1
6-22
S4600_Configuration Guide Chapter 6 Reliability Configuration
S1(Config-If-Port-Range)#exit
S1(config)# interface e1/0/1
S1(config-if-ethernet1/0/1)erps-ring maijor_ring1 port 0
S1(config-if-ethernet1/0/1)interface e1/0/2
S1(config-if-ethernet1/0/2)erps-ring maijor_ring1 port 1
S1(config-if-ethernet1/0/2)exit
S1(config)#erps-ring maijor_ring1
S1(config-erps-ring)#erps-instance 1
S1(config-erps-ring-inst-1)#description instance1
S1(config-erps-ring-inst-1)#raps-mel 3
S1(config-erps-ring-inst-1)#protected-instance 2
S1(config-erps-ring-inst-1)#wtr-timer 8
S1(config-erps-ring-inst-1)#guard-timer 100
S1(config-erps-ring-inst-1)#holdoff-timer 5
S1(config-erps-ring-inst-1)# control-vlan 2
6-23
S4600_Configuration Guide Chapter 6 Reliability Configuration
S3(config)#erps-ring maijor_ring1
S3(config)#spanning-tree mst configuration
S3(Config-Mstp-Region) instance 2 vlan 2;10-20
S3(Config-Mstp-Region)#exit
S3(config)#interface e1/0/1-2
S3(Config-If-Port-Range)#switchport mode trunk
S3(Config-If-Port-Range)#exit
S3(config)# interface e1/0/1
S3(config-if-ethernet1/0/1)erps-ring maijor_ring1 port 0
S3(config-if-ethernet1/0/1)interface e1/0/2
S3(config-if-ethernet1/0/2)erps-ring maijor_ring1 port 1
S3(config-if-ethernet1/0/2)exit
S3(config)#erps-ring maijor_ring1
S3(config-erps-ring)#erps-instance 1
S3(config-erps-ring-inst-1)#description instance1
S3(config-erps-ring-inst-1)#rpl port1 neighbour
S3(config-erps-ring-inst-1)#raps-mel 3
S3(config-erps-ring-inst-1)#protected-instance 2
S3(config-erps-ring-inst-1)#wtr-timer 8
S3(config-erps-ring-inst-1)#guard-timer 100
S3(config-erps-ring-inst-1)#holdoff-timer 5
S3(config-erps-ring-inst-1)# control-vlan 2
6-24
S4600_Configuration Guide Chapter 6 Reliability Configuration
S4(config-erps-ring-inst-1)#holdoff-timer 5
S4(config-erps-ring-inst-1)# control-vlan 2
6.3 MRPP
<2> fast convergence, less than 1 s. ideally it can reach 100-50 ms.
SWITCH E SWITCH G
Master E2
Node Ring 1 Ring 2
Master Node
E1
E2
SWITCH C SWITCH D SWITCH H
1. Control VLAN
Control VLAN is a virtual VLAN, only used to identify MRPP protocol packet transferred in
the link. To avoid confusion with other configured VLAN, avoids configuring control VLAN ID to
be the same with other configured VLAN ID. The different MRPP ring should configure the
different control VLAN ID.
3. nodes
Each switch is named after a node on Ethernet. The node has some types:
Primary node: each ring has a primary node, it is main node to detect and defend.
Transfer node: except for primary node, other nodes are transfer nodes on each ring.
The node role is determined by user configuration. As shown Fig 3-1, Switch A is primary node of
Ring 1, Switch B. Switch C; Switch D and Switch E are transfer nodes of Ring 1.
in health state, the secondary port of primary node blocks other data in logical and only MRPP
packet can pass. When the Ethernet is in break state, the secondary port of primary node
releases block state, and forwards data packets.
There are no difference on function between Primary port and secondary port of transfer
node.
The role of port is determined by user configuration. As shown Fig 3-1, Switch A E1 is
primary port, E2 is secondary port.
5. Timer
The two timers are used when the primary node sends and receives MRPP protocol packet:
Hello timer and Fail Timer.
Hello timer: define timer of time interval of health examine packet sending by primary node
primary port.
Fail timer: define timer of overtime interval of health examine packet receiving by primary
node primary port. The value of Fail timer must be more than or equal to the 3 times of value of
Hello timer.
6-27
S4600_Configuration Guide Chapter 6 Reliability Configuration
2. Poll System
The primary port of primary node sends Hello packet to its neighbors timely according to
configured Hello-timer.
If the ring is health, the secondary port of primary node receives health detect packet, and
the primary node keeps secondary port.
If the ring is break, the secondary port of primary node can’t receive health detect packet
when timer is over time. The primary releases the secondary port block state, and sends
LINK-DOWN-FLUSH_FDB packet to inform all of transfer nodes, to refresh own MAC address
forward list.
3. Ring Restore
After the primary node occur ring fail, if the secondary port receives Hello packet sending
from primary node, the ring has been restored, at the same time the primary node block its
secondary port, and sends its neighbor LINK-UP-Flush-FDB packet.
After MRPP ring port refresh UP on transfer node, the primary node maybe find ring restore
after a while. For the normal data VLAN, the network maybe forms a temporary ring and creates
broadcast storm. To avoid temporary ring, transfer node finds it to connect to ring network port
to refresh UP, immediately block temporarily (only permit control VLAN packet pass), after only
receiving LINK-UP-FLUSH-FDB packet from primary node, and releases the port block state.
Port mode
mrpp ring <ring-id> primary-port {cos Specify primary port of MRPP ring and the
<cos>|} cos which is brought in the packet head tag
no mrpp ring <ring-id> primary-port of port sending packet.
mrpp ring <ring-id> secondary-port {cos Specify secondary port of MRPP ring and the
<cos>|} cos which is brought in the packet head tag
no mrpp ring <ring-id> secondary-port of port sending packet.
3) Configure the query time of MRPP
Command Explanation
Global Mode
mrpp poll-time <20-2000> Configure the query interval of MRPP.
4) Configure the compatible mode
Command Explanation
Global Mode
mrpp errp compatible Enable the compatible mode for ERRP, the
no mrpp errp compatible no command disables the compatible mode.
mrpp eaps compatible Enable the compatible mode for EAPS, the
no mrpp eaps compatible no command disables the compatible mode.
errp domain <domain-id> Create ERRP domain, the no command
no errp domain <domain-id> deletes the configured ERRP domain.
5) Display and debug MRPP relevant information
Command Explanation
Admin Mode
Disable MRPP module debug information,
debug mrpp
format “no” disable MRPP debug
no debug mrpp
information output.
Display MRPP ring configuration
show mrpp {<ring-id>}
information.
Display receiving data packet statistic
show mrpp statistics {<ring-id>}
information of MRPP ring.
Clear receiving data packet statistic
clear mrpp statistics {<ring-id>}
information of MRPP ring.
SWITCH A SWITCH B
E1 E2
Master Node E2 E1
E1 E2
E2 E1
SWITCH C SWITCH D
6-30
S4600_Configuration Guide Chapter 6 Reliability Configuration
Switch(mrpp-ring-4000)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port
Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port
Switch(config-If-Ethernet1/0/2)#exit
Switch(Config)#
6-31
S4600_Configuration Guide Chapter 6 Reliability Configuration
each switch MRPP ring configuration on the ring is correct or not; if correct, restores the ring,
and then observes the ring is normal or not.
The convergence time of MRPP ring net is relative to the response mode of up/down. If use
poll mode, the convergence time as hundreds of milliseconds in simple ring net, if use
interrupt mode, the convergence time within 50 milliseconds.
Generally, the port is configured as poll mode, interrupt mode is only applied to better
performance environment, but the security of poll mode is better than interrupt mode,
port-scan-mode {interrupt | poll} command can be consulted.
In normal configuration, it still forms ring broadcast storm or ring block, please open debug
function of primary node MRPP, and used show MRPP statistics command to observe states
of primary node and transfer node and statistics information is normal or not, and then
sends results to our Technology Service Center.
6.4 ULPP
6-32
S4600_Configuration Guide Chapter 6 Reliability Configuration
6-33
S4600_Configuration Guide Chapter 6 Reliability Configuration
For making use of the bandwidth resource enough, ULPP can implement VLAN load balance
through the configuration. As the picture illustrated, SwitchA configures two ULPP groups: portA1
is the master port and portA2 is the slave port in group1, portA2 is the master port and portA1 is
the slave port in group2, the VLANs are protected by group1 and group2, they are 1-100 and
101-200. Here both portA1 and portA2 at the forwarding state, the master port and the slave
port mutually backup, and respectively forward the packets of the different VLAN ranges. When
portA1 has the problem, the traffic of VLAN 1-200 are forwarded by portA2. After this, when
portA1 is recovering the normal state, portA2 forwards the data of VLAN 101-200 sequentially,
but the data of VLAN 1-100 is switched to portA1 to forward.
Command Expalnation
Global mode
ulpp group <integer> Configure and delete ULPP group
no ulpp group <integer> globally.
Command Explanation
ULPP group configuration mode
6-34
S4600_Configuration Guide Chapter 6 Reliability Configuration
6-35
S4600_Configuration Guide Chapter 6 Reliability Configuration
show ulpp flush counter interface {ethernet Show the statistic information of the flush
<IFNAME> | <IFNAME>} packets.
Show flush type and control VLAN received
show ulpp flush-receive-port
by the port.
Clear the statistic information of the flush
clear ulpp flush counter interface <name>
packets.
debug ulpp flush {send | receive} interface
Show the information of the receiving and
<name>
sending flush packets, the no operation
no debug ulpp flush {send | receive}
disables the shown information.
interface <name>
debug ulpp flush content interface <name> Show the contents of the received flush
no debug ulpp flush content interface packets, the no operation disables the
<name> showing.
debug ulpp error Show the error information of ULPP, the no
no debug ulpp error operation disables the showing.
debug ulpp event Show the event information of ULPP, the no
no debug ulpp event operation disables the showing.
SwitchD
E1/0/1 E1/0/2
SwitchA
port is down, the slave port will be set as forwarding state and switch to the uplink. SwitchB and
SwitchC can enable the command that receives the flush packets, it is used to associate with
ULPP protocol running of SwitchA to switch the uplink immediately and reduce the switch delay.
When configuring ULPP protocol of SwitchA, first, create a ULPP group and configure the
protection VLAN of this group as vlan10, then configure interface Ethernet 1/0/1 as the master
port, interface Ethernet 1/0/2 as the slave port, the control VLAN as 10. SwitchB and SwitchC
configure the flush packets that receive ULPP.
SwitchA configuration task list:
Switch(Config)#vlan 10
Switch(Config-vlan10)#switchport interface ethernet 1/0/1; 1/0/2
Switch(Config-vlan10)#exit
Switch(Config)#spanning-tree mst configuration
Switch(Config-Mstp-Region)#instance 1 vlan 10
Switch(Config-Mstp-Region)#exit
Switch(Config)#ulpp group 1
Switch(ulpp-group-1)#protect vlan-reference-instance 1
Switch(ulpp-group-1)#control vlan 10
Switch(ulpp-group-1)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)# ulpp group 1 master
Switch(config-If-Ethernet1/0/1)#exit
Switch(Config)#interface Ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)# ulpp group 1 slave
Switch(config-If-Ethernet1/0/2)#exit
6-37
S4600_Configuration Guide Chapter 6 Reliability Configuration
SwitchD
SwitchA
6.5 ULSM
ULSM associates with ULPP to enable the downstream device to apperceive the link problem
of the upstream device and process correctly. As the picture illustrated, SwitchA configures ULPP,
here the traffic is forwarded by port A1. If the link between SwitchB and Switch D has the
problem, SwitchA can not apperceive the problem of the upstream link and sequentially forward
the traffic from port A1, cause traffic losing.
Configuring ULSM on SwitchB can solve the above problems. The steps are: set port B5 as
the uplink port of ULSM group, port B6 as the downlink port. When the link between SwitchB and
SwitchD has the problem, both the downlink port B6 and the state of ULSM group are down. It
causes Switch A on which ULPP is configured to process uplink switchover and avoid the data
dropped.
6-40
S4600_Configuration Guide Chapter 6 Reliability Configuration
Command explanation
Port mode
ulsm group <group-id> {uplink | downlink} Configure the uplink/downlink port of ULSM
no ulsm group <group-id> {uplink | group, the no command deletes the
downlink} uplink/downlink port.
SwitchD
E1/0/3 E1/0/4
E1/0/1 E1/0/2
SwitchA
6-41
S4600_Configuration Guide Chapter 6 Reliability Configuration
Switch(Config-Mstp-Region)#exit
Switch(Config)#ulpp group 1
Switch(ulpp-group-1)#protect vlan-reference-instance 1
Switch(ulpp-group-1)#exit
Switch(Config)#interface ethernet 1/0/1
Switch(config-If-Ethernet1/0/1)# ulpp group 1 master
Switch(config-If-Ethernet1/0/1)#exit
Switch(Config)#interface Ethernet 1/0/2
Switch(config-If-Ethernet1/0/2)# ulpp group 1 slave
Switch(config-If-Ethernet1/0/2)#exit
6-42
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
When the users configures the switch, they will need to verify whether the configurations
are correct and the switch is operating as expected, and in network failure, the users will also
need to diagnostic the problem. Switch provides various debug commands including ping, telnet,
show and debug, etc. to help the users to check system configuration, operating status and locate
problem causes.
7.1.1 Ping
Ping command is mainly used for sending ICMP query packet from the switches to remote
devices, also for check the accessibility between the switch and the remote device. Refer to the
Ping command chapter in the Command Manual for explanations of various parameters and
options of the Ping command.
7.1.2 Ping6
Ping6 command is mainly used by the switch to send ICMPv6 query packet to the remote
equipment, verifying the accessibility between the switch and the remote equipment. Options
and explanations of the parameters of the Ping6 command please refer to Ping6 command
chapter in the command manual.
7.1.3 Traceroute
Traceroute command is for testing the gateways through which the data packets travel from
the source device to the destination device, so to check the network accessibility and locate the
network failure.
Execution procedure of the Traceroute command consists of: first a data packet with TTL at 1
is sent to the destination address, if the first hop returns an ICMP error message to inform this
packet can not be sent (due to TTL timeout), a data packet with TTL at 2 will be sent. Also the
send hop may be a TTL timeout return, but the procedure will carries on till the data packet is
sent to its destination. These procedures is for recording every source address which returned
ICMP TTL timeout message, so to describe a path the IP data packets traveled to reach the
destination.
Traceroute Options and explanations of the parameters of the Traceroute command please
refer to traceroute command chapter in the command manual.
7-1
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
7.1.4 Traceroute6
The Traceroute6 function is used on testing the gateways passed through by the data
packets from the source equipment to the destination equipment, to verify the accessibility and
locate the network failure. The principle of the Traceroute6 under IPv6 is the same as that under
IPv4, which adopts the hop limit field of the ICMPv6 and IPv6 header. First, Traceroute6 sends an
IPv6 datagram (including source address, destination address and packet sent time) whose
HOPLIMIT is set to 1. When first route on the path receives this datagram, it minus the HOPLIMIT
by 1 and the HOPLIMIT is now 0. So the router will discard this datagram and returns with a
「ICMPv6 time exceeded」 message (including the source address of the IPv6 packet, all content
in the IPv6 packet and the IPv6 address of the router). Upon receiving this message, the
Traceroute6 sends another datagram of which the HOPLIMIT is increased to 2 so to discover the
second router. Plus 1 to the HOPLIMIT every time to discover another router, the Traceroute6
repeat this action till certain datagram reaches the destination.
Traceroute6 Options and explanations of the parameters of the Traceroute6 command
please refer to traceroute6 command chapter in the command manual.
7.1.5 Show
show command is used to display information about the system, port and protocol
operation. This part introduces the show command that displays system information, other show
commands will be discussed in other chapters.
Command Explanation
Admin Mode
show debugging Display the debugging state.
show flash Display the files and the sizes saved in the flash.
show history Display the recent user input history command.
Show the recent command history of all users.
Use clear history all-users command to clear the
show history all-users [detail] command history of all users saved by the system,
the max history number can be set by history
all-users max-length command.
show memory Display content in specified memory area
Display the switch parameter configuration
show running-config
validating at current operation state.
show running-config current-mode Show the configuration under the current mode.
Display the switch parameter configuration
written in the Flash Memory at current operation
show startup-config
state, which is normally the configuration file
applied in next time the switch starts up.
7-2
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
7.1.6 Debug
All the protocols switch supports have their corresponding debug commands. The users can
use the information from debug commands for troubleshooting. Debug commands for their
corresponding protocols will be introduced in the later chapters.
7.2 Logging
Among above log channels, users rarely use the console monitor, but will commonly choose
the Telnet terminal to monitor the system operation status. However information outputted from
these channels are of low traffic capacity and can not be recorded for later view. The other two
channels---the log buffer zone and log host channel are two important channels
SDRAM (Synchronous Dynamic Random Access Memory) and NVRAM (Non Vulnerable
Random Access Memory) is provided inside the switch as two part of the log buffer zone, The two
buffer zone record the log information in a circuit working pattern, namely when log information
need to be recorded exceeds the buffer size, the oldest log information will be erased and
replaced by the new log information, information saved in NVRAM will stay permanently while
those in SDRAM will lost when the system restarts or encounter an power failure. Information in
the log buffer zone is critical for monitoring the system operation and detecting abnormal states.
Note: the NVRAM log buffer may not exist on some switches, which only have the SDRAM
log buffer zone.
It is recommended to use the system log server. By configuring the log host on the switch,
the log can be sent to the log server for future examination.
Right now the switch can generate information of following four levels
Restart the switch, mission abnormal are classified critical
Up/down interface, topology change, aggregate port state change of the interface are
notifications warnings
Outputted information from the CLI command is classified informational
Information from the debugging of CLI command is classified debugging
7-5
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Admin Mode
show logging buffered [ level {critical | warnings} | Show detailed log information in
range <begin-index> <end-index>] the log buffer channel.
clear logging sdram Clear log buffer zone information.
Command Description
Global mode
Enable or disable the logging
logging executed-commands {enable | disable}
executed-commands
Command Description
Admin and configuration mode
Show the log information source of
show logging source mstp
MSTP module.
Command Description
Admin mode
Show the state of logging
show logging executed-commands state
executed-commands
7-6
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Configuration procedure:
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)# ip address 100.100.100.1 255.255.255.0
Switch(Config-if-Vlan1)#exit
Switch(config)#logging 100.100.100.5 facility local1 level warnings
Example 2: When managing VLAN the IPv6 address of the switch is 3ffe:506::1, and the IPv4
address of the remote log server is 3ffe:506::4. It is required to send the log information with a
severity equal to or higher than critical to this log server and save the log in the record
equipment local7.
Configuration procedure
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ipv6 address 3ffe:506::1/64
Switch(Config-if-Vlan1)#exit
Switch(config)#logging 3ffe:506::4 facility local7 level critical
7-7
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Command Explanation
Global Mode
cpu-rx-ratelimit protocol Set the max rate of the CPU receiving packets of the protocol
<protocol-type> <packets> type, the no command set the max rate to default.
no cpu-rx-ratelimit protocol
[ <protocol- type> ]
clear cpu-rx-stat protocol Clear the statistics of the CPU received packets of the protocol
[ <protocol-type> ] type.
Admin Mode
show cpu-rx protocol Show the information of the CPU received packets of the
[ <protocol-type> ] protocol type.
debug driver {receive|send} Turn on the showing of the CPU receiving or sending packet
[interface {<interface-name> |all}] informations.
[protocol {<protocol-type>
|discard |all}] [detail]
7-8
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
no debug driver {receive | send} Turn off the showing of the CPU receiving or sending packet
informations.
Command Explanation
Admin Mode
protocol filter {protocol-type} Turn on/off the treatment of the named protocol packets, the
named protocol contains:
no Protocol filter {protocol-type} {arp|bgp|dhcp|dhcpv6|hsrp|http|igmp|ip|ldp|mpls|ospf|
pim|rip|snmp|telnet|vrrp}
7.5 Mirror
7-9
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Command Explanation
Global mode
monitor session <session> source {interface Specifies flow mirror source
<interface-list>} access-group <num> {rx|tx|both} port and apply rule; the no
no monitor session <session> source {interface command deletes flow mirror
<interface-list>} access-group <num> source port.
Command Explanation
Global mode
It means how many packets
that mirrors to the port of
monitor session <session> sample rate <num>
destination. The value range
no monitor session <session> sample rate
from 0 to 65535 and 0 means
unsample.
7-10
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Configuration guidelines:
1. Configure interface 1 to be a mirror destination interface.
2. Configure the interface 7 ingress and interface 9 egress to be mirrored source.
3. Configure the CPU as one of the source.
4. Configure access list 120.
5. Configure access 120 to binding interface 15 ingress.
7.6 RSPAN
Port mirroring refers to the duplication of data frames sent/received on a port to another
port. The duplicated port is referred to as mirror source port and the duplicating port is referred
to as mirror destination port. It is more convenience for network administrator to monitor and
manage the network and diagnostic after the mirroring function achieved. But it only used for
such instance that the mirror source port and the mirror destination ports are located in the
same switch.
RSPAN (remote switched port analyzer) refers to remote port mirroring. It eliminates the
limitation that the source port and the destination port must be located on the same switch. This
feature makes it possible for the source port and the destination port to be located on different
devices in the network, and facilitates the network administrator to manage remote switches. It
can’t forward traffic flows on remote mirror VLAN.
There are three types of switches with the RSPAN enabled:
1. Source switch: The switch to which the monitored port belongs. The source switch copies
the mirrored traffic flows to the Remote VLAN, and then through Layer 2 forwarding, the
mirrored flows are sent to an intermediate switch or destination switch.
2. Intermediate switch: Switches between the source switch and destination switch on the
network. Intermediate switch forwards mirrored flows to the next intermediate switch
or the destination switch. Circumstances can occur where no intermediate switch is
present, if a direct connection exists between the source and destination switches.
3. Destination switch: The switch to which the destination port for remote mirroring
belongs. It forwards mirrored flows it received from the Remote VLAN to the monitoring
device through the destination port.
When configuring the RSPAN mirroring of the source switch, reflector port mode or
destination mirror port mode can be selected. The destination switch will redirect all the data
frames in the RSPAN VLAN to the RSPAN destination port. For RSPAN mirroring, normal mode and
advanced mode can be chosen, normal is introduced by default and fit the normal user. The
advanced mode fit the advanced user.
1. Advanced mode: To redirect data frames in RSPAN VLAN to the RSPAN destination port,
the intermediary and destination devices should support the redirection of flow.
2. Normal mode: To configure the RSPAN destination port in the RSPAN VLAN. Thus,
datagrams in the RSPAN VLAN will be broadcasted to the destination port. In this mode,
the destination port should be in RSPAN VLAN, and the source port should not be
configured for broadcasting storm control. TRUNK ports should be configured carefully in
order not to forward RSPAN datagrams to external networks. The normal mode has the
benefit of easy configuration, and reduced system resources.
To be noticed: Normal mode is introduced by default. When using the normal mode,
datagrams with reserved MAC addresses cannot be broadcasted.
For chassis switches, at most 4 mirror destination ports are supported, and source or
destination port of one mirror session can be configured on each line card. For box switches, only
one mirror session can be configured.The number of the source mirror ports is not limited, and
can be one or more. Multiple source ports are not restricted to be in the same VLAN. The
destination port and the source ports can be in different VLAN.
For configuration of RSPAN, a dedicated RSPAN VLAN should be configured first for
carrying the RSPAN datagrams. The default VLAN, dynamic VLAN, private VLAN,
7-12
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
multicast VLAN, and the layer 3 interface enabled VLAN cannot be configured as the
RSPAN VLAN. The reflector port must belong to the RSPAN VLAN. The destination port
should be connected to the Monitor and the configured as access port or the TRUNK port.
The RSPAN reflector port will be working dedicatedly for mirroring, when a port is
configured as a reflector port, it will discards all the existing connections to the remote
peer, disable configurations related to loopback interfaces, and stop forwarding
datagram. Connectivity between the source and destination switch for Remote VLAN,
should be made sure by configuration.
To be noticed:
1. Layer 3 interfaces related to RSPAN VLAN should not be configured on the source,
intermediate, and the destination switches, or the mirrored datagrams may be discarded.
2. For the source and intermediate switches in the RSPAN connections, the native VLAN
of TRUNK port cannot be configured as the RSPAN VLAN, Otherwise the RSPAN tag will be
disposed before reaching the destination switches.
3. The source port, in access or trunk mode, should not be added to RSPAN VLAN if
advanced RSPAN mode is chosen. When the reflector port is used for a inter-card mirroring
of CPU TX data, it must be configured as TRUNK port and allows the RSPAN VLAN data
passing, the Native VLAN should not be configured as RSPAN VLAN.
4. When configuring the remote mirroring function, the network bandwidth should be
considered in order to carry the network flow and the mirrored flow.
Keywards:
RSPAN: Remote Switched Port Analyzer.
RSPAN VLAN: Dedicated VLAN for RSPAN.
RSPAN Tag: The VLAN tag which is attached to MTP of the RSPAN datagrams.
Reflector Port: The local mirroring port between the RSPAN source and destination ports,
which is not directly connected to the intermediate switches.
Command Explanation
VLAN Configuration Mode
7-13
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Command Explanation
Global Mode
monitor session <session> source {interface
<interface-list> | cpu [slot <slotnum>]} {rx|
tx| both} To configure mirror source port; The no
no monitor session <session> source command deletes the mirror source port.
{interface <interface-list> | cpu [slot
<slotnum>]}
Command Explanation
Global Mode
monitor session <session> reflector-port To configure the interface to reflector
<interface-number> port; The no command deletes the reflector
no monitor session <session> reflector-port port.
5. Configure remote VLAN of mirror group
Command Explanation
Global Mode
monitor session <session> To configure remote VLAN of mirror
remote vlan <vid> group, the no command deletes the remote
no monitor session <session> remote vlan VLAN of mirror group.
7-14
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Destination Switch
Source Switch Intermediate Switch
E9
E2 E7
E1 E6 E10
PC1 Monitor
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/2
Switch(Config-If-Ethernet1/0/2)#switchport mode trunk
Switch(Config-If-Ethernet1/0/2)#exit
Switch(config)#monitor session 1 source interface ethernet1/0/1 rx
Switch(config)#monitor session 1 destination interface ethernet1/0/2
Switch(config)#monitor session 1 remote vlan 5
Intermediate switch:
Interface ethernet1/0/6 is the source port which is connected to the source switch.
Interface ethernet1/0/7 is the destination port which is connected to the intermediate switch. The
native VLAN of this port cannot be configured as RSPAN VLAN, or the mirrored data may not be
carried by the destination switch.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
7-15
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/6-7
Switch(Config-If-Port-Range)#switchport mode trunk
Switch(Config-If-Port-Range)#exit
Destination switch:
Interface ethernet1/0/9 is the source port, which is connected to the source switch.
Interface ethernet1/0/10 is the destination port which is connected to the monitor. This port is
required to be configured as an access port, and belong to the RSPAN VLAN.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/9
Switch(Config-If-Ethernet1/0/9)#switchport mode trunk
Switch(Config-If-Ethernet1/0/9)#exit
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport access vlan 5
Switch(Config-If-Ethernet1/0/10)#exit
Solution 2:
Source switch:
Interface ethernet 1/0/1 is the source port.
Interface ethernet 1/0/2 is the TRUNK port, which is connected to the intermediate switch. The
native VLAN should not be a RSPAN VLAN.
Interface Ethernet 1/0/3 is a reflector port. The reflector port belongs the RSPAN VLAN, it is access
port or TRUNK port of the RSPAN VLAN.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet1/0/2
Switch(Config-If-Ethernet1/0/2)#switchport mode trunk
Switch(Config-If-Ethernet1/0/2)#exit
Switch(config)#interface ethernet 1/0/3
Switch(Config-If-Ethernet1/0/3)#switchport mode trunk
Switch(Config-If-Ethernet1/0/3)#exit
Switch(config)#monitor session 1 source interface ethernet1/0/1 rx
Switch(config)#monitor session 1 reflector-port ethernet1/0/3
Switch(config)#monitor session 1 remote vlan 5
Intermediate switch:
7-16
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
Interface ethernet1/0/6 is the source port which is connected to the source switch.
Interface ethernet1/0/7 is the destination port which is connected to the destination switch. The
native VLAN of the port should not be configured as RSPAN VLAN, or the mirrored data may not
be carried by the destination switch.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/6-7
Switch(Config-If-Port-Range)#switchport mode trunk
Switch(Config-If-Port-Range)#exit
Destination switch:
Interface ethernet1/0/9 is the source port which is connected to the source switch.
Interface ethernet1/0/10 is the destination port which is connected to the monitor. This port is
required to be configured as an access port, and belong to the RSPAN VLAN.
RSPAN VLAN is 5.
Switch(config)#vlan 5
Switch(Config-Vlan5)#remote-span
Switch(Config-Vlan5)#exit
Switch(config)#interface ethernet 1/0/9
Switch(Config-If-Ethernet1/0/9)#switchport mode trunk
Switch(Config-If-Ethernet1/0/9)#exit
Switch(config)#interface ethernet 1/0/10
Switch(Config-If-Ethernet1/0/10)#switchport access vlan 5
Switch(Config-If-Ethernet1/0/10)#exit
7-17
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
cause the abort error frame on the reflection port, so the default MTU value of the switch
should be modified.
7.7 sFlow
7-18
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
7-19
S4600_Configuration Guide Chapter 7 Debugging and Diagnosis Configuration
SWITCH PC
If the examination remains unsolved, please contact with the technical service center
of our company.
7-21
S4600_Configuration Guide Chapter 8 Network Time Management Configuration
8.1 NTP
8-1
S4600_Configuration Guide Chapter 8 Network Time Management Configuration
Global Mode
ntp server {<ip-address> | <ipv6-address>}
[version <version_no>] [key <key-id>] To enable the specified time server of time
no ntp server {<ip-address> | source.
<ipv6-address>}
3. To configure the max number of broadcast or multicast servers supported by the NTP client
Command Explication
Global Mode
Set the max number of broadcast or
ntp broadcast server count <number> multicast servers supported by the NTP
no ntp broadcast server count client. The no operation will cancel the
configuration and restore the default value.
8-2
S4600_Configuration Guide Chapter 8 Network Time Management Configuration
11. Debug
Command Explication
Admin Mode
debug ntp packets [send | receive] To enable debug switch of NTP packet
no debug ntp packets [send | receive] information.
8-3
S4600_Configuration Guide Chapter 8 Network Time Management Configuration
The configuration of Switch C is as follows: (Switch A and Switch B may have the different
command because of different companies, we not explain there, our switches are not support
NTP server at present)
Switch C:
Switch(config)#ntp enable
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 192.168.1.12 255.255.255.0
Switch(config)#interface vlan 2
Switch(Config-if-Vlan1)#ip address 192.168.2.12 255.255.255.0
Switch(config)#ntp server 192.168.1.11
Switch(config)#ntp server 192.168.2.11
also use show command to display the NTP running information, any questions please send the
recorded message to the technical service center.
8.2 SNTP
SNTP/NTP SNTP/NTP
SERVER SERVER
… …
8-6
S4600_Configuration Guide Chapter 8 Network Time Management Configuration
Compare with the standard time, usually set summer time 1 hour late, for example, when
summer time is implementing, 10:00 am of the standard time is considered 11:00 am of summer
time.
Example2:
The configuration requirement in the following: The summer time from 23:00 on the first
Saturday of April to 00:00 on the last Sunday of October year after year, clock offset as 2 hours,
and summer time is named as time_travel.
8-8
S4600_Configuration Guide Chapter 9 POE Configuration
9.1 PoE
Command Explanation
Global Mode
power inline enable
Enable/disable PoE globally.
no power inline enable
9-1
S4600_Configuration Guide Chapter 9 POE Configuration
Command Explanation
Global Mode
power inline max <max-wattage>
Globally set the max output power of PoE.
no power inline max
Command Explanation
Global Mode
power inline police enable Enable/disable the power priority
no power inline police enable management policy mode.
Command Explanation
Global Mode
power inline legacy enable
Modify the power-on mode of the port.
no power inline legacy enable
Command Explanation
Global Mode
Enable/disable the allowed high-inrush
power inline high-inrush enable
current when nonstandard PD is powered
no power inline high-inrush enable
instantaneously.
Globally enable or disable the allowed high-inrush current when nonstandard PD is powered
instantaneously
Command Explanation
Port Mode
power inline power-up mode(af| Enable/disable the allowed high-inrush
high-inrush|pre-at|at) current when nonstandard PD is powered
no power inline power-up mode instantaneously.
Command Explanation
Port Mode
power inline enable
Enable/ disable PoE.
no power inline enable
9-2
S4600_Configuration Guide Chapter 9 POE Configuration
Command Explanation
Port Mode
power inline max <max-wattage>
Set the max output power on specified ports.
no power inline max
Command Explanation
Port Mode
power inline priority {critical | high | low} Set the power priority on specified ports.
Topology of Network
9-3
S4600_Configuration Guide Chapter 9 POE Configuration
Configuration Steps:
Globally enable PoE:
Switch(Config)# power inline enable
Globally set the max power to 370W:
Switch(Config)# power inline max 370
Globally enable the priority policy of power management:
Switch(Config)# power inline police enable
Set the priority of Port 1/0/2 to critical:
Switch(Config-Ethernet1/0/2)# power inline priority critical
Set the max output power of Port 1/0/6 to 9000mW:
Switch(Config-Ethernet1/0/6)#power inline max 9000
9-4
S4600_Configuration Guide Chapter 9 POE Configuration
voltage)
The power loss set on the port: C, represents power loss of the internal Sensor ohmic
resistance, MosFet etc.
Then: B=A+C
If the power is set as A=500mW, according to the following table, the compensating
current will be I=2.44mA (500mW/50V=10mA assuming the current working voltage is 50V),
plus the compensating power C=50V×2.44mA=122mA
B=A+C=500+122=622mW. So, only when the displayed power reaches 622mW, the PD will
be disconnected
Table:
Max Working Current (mA) Compensating Current (mA)
50 2.44
100 4.88
150 9.76
200 17.08
250 24.41
350 31.73
9-5
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10.1 DHCPv6
Solicit (Muticast)
Advertise (Unicast)
Request (Muticast)
Reply (Unicast)
DHCPv6 SERVER
DHCPv6 CLIENT
When a DHCPv6 client tries to request an IPv6 address and other configurations from the
DHCPv6 server, the client has to find the location of the DHCP server, and then request
configurations from the DHCP server.
1. In the time of located server, the DHCP client tries to find a DHCPv6 server by
broadcasting a SOLICIT packet to all the DHCP delay delegation and server with
broadcast address as FF02::1:2.
10-1
S4600_Configuration Guide Chapter 10 IPv6 Configuration
2. Any DHCP server which receives the request, will reply the client with an ADVERTISE
message, which includes the identity of the server –DUID, and its priority.
3. It is possible that the client receives multiple ADVERTISE messages. The client should
select one and reply it with a REQUEST message to request the address which is
advertised in the ADVERTISE message.
4. The selected DHCPv6 server then confirms the client about the IPv6 address and any
other configuration with the REPLY message.
The above four steps finish a Dynamic host configuration assignment process. However, if
the DHCPv6 server and the DHCPv6 client are not in the same network, the server will not
receive the DHCPv6 broadcast packets sent by the client, therefore no DHCPv6 packets will be
sent to the client by the server. In this case, a DHCPv6 relay is required to forward such DHCPv6
packets so that the DHCPv6 packets exchange can be completed between the DHCPv6 client and
server.
At the time this manual is written, DHCPv6 server, relay and prefix delegation client have
been implemented on the switch. When the DHCPv6 relay receives any messages from the
DHCPv6 client, it will encapsulate the request in a Relay-forward packet and deliver it to the next
DHCPv6 relay or the DHCPv6 server. The DHCPv6 messages coming from the server will be
encapsulated as relay reply packets to the DHCPv6 relay. The relay then removes the
encapsulation and delivers it the DHCPv6 client or the next DHCPv6 relay in the network.
For DHCPv6 prefix delegation where DHCPv6 server is configured on the PE router and
DHCPv6 client it configured on the CPE router, the CPE router is able to send address prefix
allocation request to the PE router and get a pre-configured address prefix, but not set the
address prefix manually. The protocol negotiation between the client and the prefix delegation
client is quite similar to that when getting a DHCPv6 address. Then the CPE router divides the
allocated prefix – whose length should be less than 64 characters, into 64 subnets. The divided
address prefix will be advertised through routing advertisement messages (RA) to the host
directly connected to the client.
10-2
S4600_Configuration Guide Chapter 10 IPv6 Configuration
service dhcpv6
To enable DHCPv6 service.
no service dhcpv6
10-3
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Global Mode
service dhcpv6
To enableDHCPv6 service.
no service dhcpv6
10-5
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Global Mode
service dhcpv6
To enable DHCPv6 service.
no service dhcpv6
Usage guide:
10-6
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Switch3 configuration:
Switch3>enable
Switch3#config
Switch3(config)#service dhcpv6
Switch3(config)#ipv6 dhcp pool EastDormPool
Switch3(dhcpv6-EastDormPool-config)#network-address 2001:da8:100:1::1 2001:da8:100:1::100
Switch3(dhcpv6-EastDormPool-config)#excluded-address 2001:da8:100:1::1
Switch3(dhcpv6-EastDormPool-config)#dns-server 2001:da8::20
Switch3(dhcpv6-EastDormPool-config)#dns-server 2001:da8::21
Switch3(dhcpv6-EastDormPool-config)#domain-name dhcpv6.com
Switch3(dhcpv6-EastDormPool-config)#lifetime 1000 600
Switch3(dhcpv6-EastDormPool-config)#exit
Switch3(config)#interface vlan 1
Switch3(Config-if-Vlan1)#ipv6 address 2001:da8:1:1::1/64
Switch3(Config-if-Vlan1)#exit
Switch3(config)#interface vlan 10
Switch3(Config-if-Vlan10)#ipv6 address 2001:da8:10:1::1/64
Switch3(Config-if-Vlan10)#ipv6 dhcp server EastDormPool preference 80
Switch3(Config-if-Vlan10)#exit
Switch3(config)#
Switch2 configuration:
Switch2>enable
Switch2#config
Switch2(config)#service dhcpv6
Switch2(config)#interface vlan 1
Switch2(Config-if-Vlan1)#ipv6 address 2001:da8:1:1::2/64
Switch2(Config-if-Vlan1)#exit
Switch2(config)#interface vlan 10
Switch2(Config-if-Vlan10)#ipv6 address 2001:da8:10:1::2/64
Switch2(Config-if-Vlan10)#exit
Switch2(config)#interface vlan 100
Switch2(Config-if-Vlan100)#ipv6 address 2001:da8:100:1::1/64
Switch2(Config-if-Vlan100)#no ipv6 nd suppress-ra
Switch2(Config-if-Vlan100)#ipv6 nd managed-config-flag
Switch2(Config-if-Vlan100)#ipv6 nd other-config-flag
Switch2(Config-if-Vlan100)#exit
Switch2(config)#
Switch1 configuration:
Switch1(config)#service dhcpv6
Switch2(config)#interface vlan 1
Switch2(Config-if-Vlan1)#ipv6 address 2001:da8:100:1::2/64
Switch2(Config-if-Vlan1)#ipv6 dhcp relay destination 2001:da8:10:1::1
10-7
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10-8
S4600_Configuration Guide Chapter 10 IPv6 Configuration
There are some problems when using DHCPv6 relay agent, for example: How to assign IP
address in the fixed range to the specifiec users? How to avoid illegal DHCPv6 client to forge IP
address exhaust attack triggered by MAC address fields of DHCPv6 packets? How to avoid illegal
DHCPv6 client to trigger deny service attack through using MAC address of other legal clients?
Therefore, IETF set rfc4649 and rfc4580, i.e. DHCPv6 option 37 and option 38 to solve these
problems.
DHCPv6 option 37 and option 38 is similar to DHCP option 82. When DHCPv6 client sends
request packets to DHCPv6 server though DHCPv6 relay agent, if DHCPv6 relay agent supports
option 37 and option 38, they will be added to request packets. For the respond packets of server,
option 37 and option 38 are meaningless and are peeled from the respond packets. Therefore,
the application of option 37 and option 38 is transparent for client.
DHCPv6 server can authenticate identity of DHCPv6 client and DHCPv6 relay device by
option 37 and option 38, assign and manage client address neatly through configuring the assign
policy, prevent DHCPv6 attack availably according to the inclusive client information, such as
forging MAC address fields of DHCPv6 packets to trigger IP address exhaust attack. Since server
can identify multiple request packets from the same access port, it can assign the address
number through policy limit to avoid address exhaust. However, rfc4649 and rfc4580 do not set
how to use opton 37 and option 38 for DHCPv6 server, users can use it neatly according to their
own demand.
10-10
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10-13
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Switch B
Interface E1/0/1
Switch A
SwitchA(config)#
Switch B configuration:
SwitchB(config)#service dhcpv6
SwitchB(config)#ipv6 dhcp server remote-id option
SwitchB(config)#ipv6 dhcp server subscriber-id option
SwitchB(config)#ipv6 dhcp pool EastDormPool
SwitchB(dhcpv6-eastdormpool-config)#network-address 2001:da8:100:1::2
2001:da8:100:1::1000
SwitchB(dhcpv6-eastdormpool-config)#dns-server 2001::1
SwitchB(dhcpv6-eastdormpool-config)#domain-name dhcpv6.com
SwitchB(dhcpv6-eastdormpool-config)# excluded-address 2001:da8:100:1::2
SwitchB(dhcpv6-eastdormpool-config)#exit
SwitchB(config)#
SwitchB(config)#ipv6 dhcp class CLASS1
SwitchB(dhcpv6-class-class1-config)#remote-id 00-03-0f-00-00-01 subscriber-id
vlan1+Ethernet1/0/1
SwitchB(dhcpv6-class-class1-config)#exit
SwitchB(config)#ipv6 dhcp class CLASS2
SwitchB(dhcpv6-class-class2-config)#remote-id 00-03-0f-00-00-01 subscriber-id
vlan1+Ethernet1/0/2
SwitchB(dhcpv6-class-class2-config)#exit
SwitchB(config)#ipv6 dhcp class CLASS3
SwitchB(dhcpv6-class-class3-config)#remote-id 00-03-0f-00-00-01 subscriber-id
vlan1+Ethernet1/0/3
SwitchB(dhcpv6-class-class3-config)#exit
SwitchB(config)#ipv6 dhcp pool EastDormPool
SwitchB(dhcpv6-eastdormpool-config)#class CLASS1
SwitchB(dhcpv6-pool-eastdormpool-class-class1-config)#address range 2001:da8:100:1::3
2001:da8:100:1::30
SwitchB(dhcpv6-pool-eastdormpool-class-class1-config)#exit
SwitchB(dhcpv6-eastdormpool-config)#class CLASS2
SwitchB(dhcpv6-pool-eastdormpool-class-class2-config)#address range 2001:da8:100:1::31
2001:da8:100:1::60
SwitchB(dhcpv6-eastdormpool-config)#class CLASS3
SwitchB(dhcpv6-pool-eastdormpool-class-class3-config)#address range 2001:da8:100:1::61
2001:da8:100:1::100
SwitchB(dhcpv6-pool-eastdormpool-class-class3-config)#exit
SwitchB(dhcpv6-eastdormpool-config)#exit
SwitchB(config)#interface vlan 1
SwitchB(config-if-vlan1)#ipv6 address 2001:da8:100:1::2/64
SwitchB(config-if-vlan1)#ipv6 dhcp server EastDormPool
SwitchB(config-if-vlan1)#exit
SwitchB(config)#
10-15
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Example 1:
When deploying IPv6 campus network, DHCPv6 server function of routing device can be
used for IPv6 address allocation if special server is used for uniform allocation and management
for IPv6 address. DHCPv6 server supports both stateful and stateless DHCPv6.
Network topology:
In access layer, layer2 access device Switch1 connects users in dormitory; in first-level
aggregation layer, aggregation device Switch2 is used as DHCPv6 relay agent; in second-level
aggregation layer, aggregation device Switch3 is used as DHCPv6 server and connects with
backbone network or devices in higher aggregation layer; in user side, PCs are generally loaded
with Windows Vista system, thus having DHCPv6 client.
10-16
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Multicast Router
Mrouter Port
MLD Snooping
Switch
SwitchA
SwitchB
10-20
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10-22
S4600_Configuration Guide Chapter 10 IPv6 Configuration
其它 IPv6 网络
RA Ethernet1/0/1
X
Ethernet1/0/3 Ethernet1/0/2
RA
PC 用户 非法用户
10-23
S4600_Configuration Guide Chapter 10 IPv6 Configuration
provides the granularity level of the node source address. It gets the trust node information (such
as port, MAC address information), namely, anchor information by monitoring the interaction
process of the relative protocol packets (such as ND protocol, DHCPv6 protocol) and using CPS
(Control Packet Snooping) mechanism. After that, it binds the anchor information with the node
source address and sends the corresponding filter rules, allow the packets which match the filter
rules to pass only, so as to reach the aim that check the validity of node source address.
SAVI function includes ND Snooping function, DHCPv6 Snooping function and RA Snooping
according to the protocol packet type. ND Snooping function is used to detect ND protocol packet,
it sets IPv6 address binding obtained by nodes with the stateless address configuration. DHCPv6
Snooping function is used to detect DHCPv6 protocol packet, it sets IPv6 address binding
obtained by nodes with the stateful address configuration. RA Snooping function is used to avoid
the lawless node sending the spurious RA packet.
10-24
S4600_Configuration Guide Chapter 10 IPv6 Configuration
savi ipv6 {dhcp-only | slaac-only | Enable the application scene function for
dhcp-slaac} enable SAVI, no command disables the function.
no savi ipv6 {dhcp-only | slaac-only |
dhcp-slaac} enable
10-25
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10-26
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10-27
S4600_Configuration Guide Chapter 10 IPv6 Configuration
Switch3
Ethernet1/0/1 Ethernet1/0/2
Switch2 Switch1
Ethernet1/0/12 Ethernet1/0/13
Client_1 Client_2
Figure 10-7
Client_1 and Client_2 means two different user’s PC installed IPv6 protocol, respectively
connect with port Ethernet1/0/12 of Switch1 and port Ethernet1/0/13 of Switch2, and enable the
source address check function of SAVI. Ethernet1/0/1 and Ethernet1/0/2 are uplink ports of
Switch1 and Switch2 respectively, enable DHCP trust and ND trust functions. Aggregation Switch3
enables DHCPv6 server function and route advertisement function.
Configuration steps of SAVI DHCP-SLAAC scene:
Switch1>enable
Switch1#config
Switch1(config)#savi enable
Switch1(config)#savi ipv6 dhcp-slaac enable
Switch1(config)#savi check binding probe mode
Switch1(config)#interface ethernet1/0/1
Switch1(config-if-ethernet1/0/1)#ipv6 dhcp snooping trust
Switch1(config-if-ethernet1/0/1)#ipv6 nd snooping trust
Switch1(config-if-ethernet1/0/1)#exit
Switch1(config)#interface ethernet1/0/12-20
10-28
S4600_Configuration Guide Chapter 10 IPv6 Configuration
10-29