3Com E4500-24 Cli Configuration Manual

Manual is about: HP E4500-24: User Guide

Summary of E4500-24

  • Page 1

    I table of contents 1 cli configuration ······································································································································1-1 introduction to the cli···································································································...

  • Page 2: Cli Configuration

    1-1 1 cli configuration when configuring cli, go to these sections for information you are interested in: z introduction to the cli z command hierarchy z cli views z cli features introduction to the cli a command line interface (cli) is a user interface to interact with a switch. Through the cli on ...

  • Page 3

    1-2 z monitor level (level 1): commands at this level are mainly used to maintain the system and diagnose service faults, and they cannot be saved in configuration file. Such commands include debugging and terminal . Z system level (level 2): commands at this level are mainly used to configure servi...

  • Page 4

    1-3 to do… use the command… remarks configure the level of a command in a specific view command-privilege level level view view command required z you are recommended to use the default command level or modify the command level under the guidance of professional staff; otherwise, the change of comma...

  • Page 5

    1-4 can switch to a higher level temporarily; when the administrators need to leave for a while or ask someone else to manage the device temporarily, they can switch to a lower privilege level before they leave to restrict the operation by others. The high-to-low user level switching is unlimited. H...

  • Page 6

    1-5 when both the super password authentication and the hwtacacs authentication are specified, the device adopts the preferred authentication mode first. If the preferred authentication mode cannot be implemented (for example, the super password is not configured or the hwtacacs authentication serve...

  • Page 7

    1-6 to do… use the command… remarks enter system view system-view — enter isp domain view domain domain-name — set the hwtacacs authentication scheme for user level switching authenticationsuper hwtacacs-scheme hwtacacs-scheme-name required by default, the hwtacacs authentication scheme for user lev...

  • Page 8

    1-7 # set the password used by the current user to switch to level 3. [sysname] super password level 3 simple 123 z a vty 0 user switches its level to level 3 after logging in. # a vty 0 user telnets to the switch, and then uses the set password to switch to user level 3. Super 3 password: user priv...

  • Page 9

    1-8 table 1-1 lists the cli views provided by the 3com switch 4500, operations that can be performed in different cli views and the commands used to enter specific cli views. Table 1-1 cli views view available operation prompt example enter method quit method user view display operation status and s...

  • Page 10

    1-9 view available operation prompt example enter method quit method user interface view configure user interface parameters [sysname-ui-aux0] execute the user-interface command in system view. Ftp client view configure ftp client parameters [ftp] execute the ftp command in user view. Sftp client vi...

  • Page 11

    1-10 view available operation prompt example enter method quit method user-defined acl view define rules for a user-defined acl (with id ranging from 5000 to 5999) [sysname-acl-user -5000] execute the acl number command in system view. Qos profile view define qos profile [sysname-qos-pro file-a123] ...

  • Page 12

    1-11 cli features online help when configuring the switch, you can use the online help to get related help information. The cli provides two types of online help: complete and partial. Complete online help 1) enter a question mark (?) in any view on your terminal to display all the commands availabl...

  • Page 13

    1-12 2) enter a command, a space, a character/string and a question mark (?) next to it. All the keywords beginning with the character/string (if available) are displayed on your terminal. For example: display v? Version vlan voice 3) enter the first several characters of a keyword of a command and ...

  • Page 14

    1-13 z the windows 9x hyperterminal explains the up and down arrow keys in a different way, and therefore the two keys are invalid when you access history commands in such an environment. However, you can use and instead to achieve the same purpose. Z when you enter the same command multiple times c...

  • Page 15

    1-14 press… to… use the partial online help. That is, when you input an incomplete keyword and press , if the input parameter uniquely identifies a complete keyword, the system substitutes the complete keyword for the input parameter; if more than one keywords match the input parameter, you can disp...

  • Page 16: Table of Contents

    I table of contents 1 logging in to an ethernet switch ············································································································1-1 logging in to an ethernet switch ····································································································...

  • Page 17

    Ii modem connection establishment ·········································································································4-2 5 logging in through the web-based network management system····················································5-1 introduction ····························...

  • Page 18

    1-1 1 logging in to an ethernet switch go to these sections for information you are interested in: z logging in to an ethernet switch z introduction to the user interface z configuring source ip address for telnet service packets z user control logging in to an ethernet switch you can log in to an e...

  • Page 19

    1-2 user interface index two kinds of user interface index exist: absolute user interface index and relative user interface index. 1) the absolute user interface indexes are as follows: z the absolute aux user interfaces are numbered 0 through 7. Z vty user interface indexes follow aux user interfac...

  • Page 20

    1-3 to do… use the command… remarks enable copyright information displaying copyright-info enable optional by default, copyright displaying is enabled. That is, the copy right information is displayed on the terminal after a user logs in successfully. Enter user interface view user-interface [ type ...

  • Page 21

    2-1 2 logging in through the console port go to these sections for information you are interested in: z introduction z logging in through the console port z console port login configuration z console port login configuration with authentication mode being none z console port login configuration with...

  • Page 22

    2-2 2) if you use a pc to connect to the console port, launch a terminal emulation utility (such as terminal in windows 3.X or hyperterminal in windows 9x/windows 2000/windows xp. The following assumes that you are running windows xp) and perform the configuration shown in figure 2-2 through figure ...

  • Page 23

    2-3 figure 2-4 set port parameters 3) turn on the switch. You will be prompted to press the enter key if the switch successfully completes post (power-on self test). The prompt appears after you press the enter key. 4) you can then configure the switch or check the information about the switch by ex...

  • Page 24

    2-4 configuration remarks make terminal services available optional by default, terminal services are available in all user interfaces set the maximum number of lines the screen can contain optional by default, the screen can contain up to 24 lines. Set history command buffer size optional by defaul...

  • Page 25

    2-5 authentication mode console port login configuration remarks specify to perform local authentication or remote radius authentication aaa configuration specifies whether to perform local authentication or radius authentication optional local authentication is performed by default. Refer to the aa...

  • Page 27

    2-7 z commands of level 2 are available to the users logging in to the aux user interface. Z the baud rate of the console port is 19,200 bps. Z the screen can contain up to 30 lines. Z the history command buffer can contain up to 20 commands. Z the timeout time of the aux user interface is 6 minutes...

  • Page 28

    2-8 console port login configuration with authentication mode being password configuration procedure follow these steps to configure console port login with the authentication mode being password: to do… use the command… remarks enter system view system-view — enter aux user interface view user-inte...

  • Page 29

    2-9 to do… use the command… remarks set the timeout time for the user interface idle-timeout minutes [ seconds ] optional the default timeout time of a user interface is 10 minutes. With the timeout time being 10 minutes, the connection to a user interface is terminated if no operation is performed ...

  • Page 30

    2-10 # specify to authenticate users logging in through the console port using the local password. [sysname-ui-aux0] authentication-mode password # set the local password to 123456 (in plain text). [sysname-ui-aux0] set authentication password simple 123456 # specify commands of level 2 are availabl...

  • Page 32

    2-12 to do… use the command… remarks set the timeout time for the user interface idle-timeout minutes [ seconds ] optional the default timeout time of a user interface is 10 minutes. With the timeout time being 10 minutes, the connection to a user interface is terminated if no operation is performed...

  • Page 33

    2-13 configuration procedure # enter system view. System-view # create a local user named guest and enter local user view. [sysname] local-user guest # set the authentication password to 123456 (in plain text). [sysname-luser-guest] password simple 123456 # set the service type to terminal, specify ...

  • Page 34: Logging In Through Telnet

    3-1 3 logging in through telnet go to these sections for information you are interested in: z introduction z telnet configuration with authentication mode being none z telnet configuration with authentication mode being password introduction switch 4500 support telnet. You can manage and maintain a ...

  • Page 35

    3-2 configuration description configure the protocols the user interface supports optional by default, telnet and ssh protocol are supported. Set the commands to be executed automatically after a user log in to the user interface successfully optional by default, no command is executed automatically...

  • Page 36

    3-3 authentication mode telnet configuration description manage vty users set service type for vty users required perform common configuration perform common telnet configuration optional refer to table 3-2 . To improve security and prevent attacks to the unused sockets, tcp 23 and tcp 22, ports for...

  • Page 37

    3-4 to do… use the command… remarks make terminal services available shell optional by default, terminal services are available in all user interfaces. Set the maximum number of lines the screen can contain screen-length screen-length optional by default, the screen can contain up to 24 lines. You c...

  • Page 38

    3-5 configuration procedure # enter system view. System-view # enter vty 0 user interface view. [sysname] user-interface vty 0 # configure not to authenticate telnet users logging in to vty 0. [sysname-ui-vty0] authentication-mode none # specify commands of level 2 are available to users logging in ...

  • Page 39

    3-6 to do… use the command… remarks set the commands to be executed automatically after a user login to the user interface successfully auto-execute command text optional by default, no command is executed automatically after a user logs into the user interface. Make terminal services available shel...

  • Page 40

    3-7 network diagram figure 3-2 network diagram for telnet configuration (with the authentication mode being password) configuration procedure # enter system view. System-view # enter vty 0 user interface view. [sysname] user-interface vty 0 # configure to authenticate users logging in to vty 0 using...

  • Page 41

    3-8 to do… use the command… remarks quit to system view quit you need to perform the following configuration as well: perform aaa&radius configuration on the switch. (refer to the aaa part for more.) configure the user name and password accordingly on the aaa server. (refer to the user manual of aaa...

  • Page 42

    3-9 to do… use the command… remarks set the timeout time for the user interface idle-timeout minutes [ seconds ] optional the default timeout time of a user interface is 10 minutes. With the timeout time being 10 minutes, the connection to a user interface is terminated if no operation is performed ...

  • Page 43

    3-10 scenario authentication mode user type command command level the user privilege level level command is executed, and the service-type command specifies the available command level. The user privilege level level command is not executed, and the service-type command does not specify the availabl...

  • Page 44

    3-11 network diagram figure 3-3 network diagram for telnet configuration (with the authentication mode being scheme) configuration procedure # enter system view. System-view # create a local user named guest and enter local user view. [sysname] local-user guest # set the authentication password of t...

  • Page 45

    3-12 z launch a terminal emulation utility (such as terminal in windows 3.X or hyperterminal in windows 95/windows 98/windows nt/windows 2000/windows xp) on the pc terminal, with the baud rate set to 19,200 bps, data bits set to 8, parity check set to none, and flow control set to none. Z turn on th...

  • Page 46

    3-13 6) after successfully telnetting to the switch, you can configure the switch or display the information about the switch by executing corresponding commands. You can also type ? At any time for help. Refer to the relevant parts in this manual for the information about the commands. Z a telnet c...

  • Page 47: Logging In Using A Modem

    4-1 4 logging in using a modem go to these sections for information you are interested in: z introduction z configuration on the switch side z modem connection establishment introduction the administrator can log in to the console port of a remote switch using a modem through public switched telepho...

  • Page 48

    4-2 you can verify your configuration by executing the at&v command. The configuration commands and the output of different modems may differ. Refer to the user manual of the modem when performing the above configuration. Switch configuration after logging in to a switch through its console port by ...

  • Page 49

    4-3 figure 4-1 establish the connection by using modems console port pstn telephone line modem serial cable telephone number of the romote end: 82882285 modem modem 4) launch a terminal emulation utility on the pc and set the telephone number to call the modem directly connected to the switch, as sh...

  • Page 50

    4-4 figure 4-3 set the telephone number figure 4-4 call the modem 5) if the password authentication mode is specified, enter the password when prompted. If the password is correct, the prompt appears. You can then configure or manage the switch. You can also enter the character ? At anytime for help...

  • Page 51: Management System

    5-1 5 logging in through the web-based network management system go to these sections for information you are interested in: z introduction z establishing an http connection z configuring the login banner z enabling/disabling the web server introduction switch 4500 has a web server built in. It enab...

  • Page 52

    5-2 [sysname-luser-admin] service-type telnet level 3 [sysname-luser-admin] password simple admin 3) establish an http connection between your pc and the switch, as shown in figure 5-1 . Figure 5-1 establish an http connection between your pc and the switch 4) log in to the switch through ie. Launch...

  • Page 53

    5-3 configuration example network requirements z a user logs in to the switch through web. Z the banner page is desired when a user logs into the switch. Network diagram figure 5-3 network diagram for login banner configuration configuration procedure # enter system view. System-view # configure the...

  • Page 54

    5-4 to do… use the command… remarks enter system view system-view — enable the web server ip http shutdown required by default, the web server is enabled. Disable the web server undo ip http shutdown required to improve security and prevent attack to the unused sockets, tcp 80 port (which is for htt...

  • Page 55: Logging In Through Nms

    6-1 6 logging in through nms go to these sections for information you are interested in: z introduction z connection establishment using nms introduction you can also log in to a switch through a network management station (nms), and then configure and manage the switch through the agent module on t...

  • Page 56: Packets

    7-1 7 configuring source ip address for telnet service packets go to these sections for information you are interested in: z overview z configuring source ip address for telnet service packets z displaying source ip address configuration overview you can configure the source ip address for telnet se...

  • Page 58: User Control

    8-1 8 user control go to these sections for information you are interested in: z introduction z controlling telnet users z controlling network management users by source ip addresses z controlling web users by source ip address refer to the acl part for information about acl. Introduction you can co...

  • Page 59

    8-2 controlling telnet users prerequisites the controlling policy against telnet users is determined, including the source ip addresses, destination ip addresses and source mac addresses to be controlled and the controlling actions (permitting or denying). Controlling telnet users by source ip addre...

  • Page 61

    8-4 network diagram figure 8-1 network diagram for controlling telnet users using acls switch 10.110.100.46 host a ip network host b 10.110.100.52 configuration procedure # define a basic acl. System-view [sysname] acl number 2000 [sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0 [sysnam...

  • Page 63

    8-6 [sysname] acl number 2000 [sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0 [sysname-acl-basic-2000] quit # apply the acl to only permit snmp users sourced from the ip addresses of 10.110.100.52 to access the switch. [sysname] snmp-agent community read aaa acl 2000 [sysname] snmp-age...

  • Page 65: Table of Contents

    I table of contents 1 configuration file management···············································································································1-1 introduction to configuration file ···································································································...

  • Page 66

    1-1 1 configuration file management when configuring configuration file management, go to these sections for information you are interested in: z introduction to configuration file z configuration task list introduction to configuration file a configuration file records and stores user configuration...

  • Page 67

    1-2 z when saving the current configuration, you can specify the file to be a main or backup or normal configuration file. Z when removing a configuration file from a switch, you can specify to remove the main or backup configuration file. Or, if it is a file having both main and backup attribute, y...

  • Page 68

    1-3 modes in saving the configuration z fast saving mode. This is the mode when you use the save command without the safely keyword. The mode saves the file quicker but is likely to lose the original configuration file if the switch reboots or the power fails during the process. Z safe mode. This is...

  • Page 69

    1-4 z it is recommended to adopt the fast saving mode in the conditions of stable power and adopt the safe mode in the conditions of unstable power or remote maintenance. Z if you use the save command after a fabric is formed on the switch, the units in the fabric save their own startup configuratio...

  • Page 70

    1-5 you can specify a configuration file to be used for the next startup and configure the main/backup attribute for the configuration file. Assigning main attribute to the startup configuration file z if you save the current configuration to the main configuration file, the system will automaticall...

  • Page 71: Table of Contents

    I table of contents 1 vlan overview ··········································································································································1-1 vlan overview·············································································································...

  • Page 72: Vlan Overview

    1-1 1 vlan overview this chapter covers these topics: z vlan overview z port-based vlan vlan overview introduction to vlan the traditional ethernet is a broadcast network, where all hosts are in the same broadcast domain and connected with each other through hubs or switches. Hubs and switches, whic...

  • Page 73

    1-2 figure 1-1 a vlan implementation advantages of vlans compared with the traditional ethernet, vlan enjoys the following advantages. Z broadcasts are confined to vlans. This decreases bandwidth consumption and improves network performance. Z network security is improved. Because each vlan forms a ...

  • Page 74

    1-3 tag is encapsulated after the destination mac address and source mac address to show the information about vlan. Figure 1-3 format of vlan tag as shown in figure 1-3 , a vlan tag contains four fields, including the tag protocol identifier (tpid), priority, canonical format indicator (cfi), and v...

  • Page 75

    1-4 z independent vlan learning (ivl), where the switch maintains an independent mac address forwarding table for each vlan. The source mac address of a packet received in a vlan on a port is recorded to the mac address forwarding table of this vlan only, and packets received in a vlan are forwarded...

  • Page 76

    1-5 a hybrid port allows the packets of multiple vlans to be sent untagged, but a trunk port only allows the packets of the default vlan to be sent untagged. The three types of ports can coexist on the same device. Assigning an ethernet port to specified vlans you can assign an ethernet port to a vl...

  • Page 77

    1-6 table 1-2 packet processing of a trunk port processing of an incoming packet for an untagged packet for a tagged packet processing of an outgoing packet z if the port has already been added to its default vlan, tag the packet with the default vlan tag and then forward the packet. Z if the port h...

  • Page 78: Vlan Configuration

    2-1 2 vlan configuration when configuring vlan, go to these sections for information you are interested in: z vlan configuration z configuring a port-based vlan vlan configuration vlan configuration task list complete the following tasks to configure vlan: task remarks basic vlan configuration requi...

  • Page 79

    2-2 z vlan 1 is the system default vlan, which needs not to be created and cannot be removed, either. Z the vlan you created in the way described above is a static vlan. On the switch, there are dynamic vlans which are registered through gvrp. For details, refer to “gvrp” part of this manual. Z when...

  • Page 80

    2-3 the operation of enabling/disabling a vlan’s vlan interface does not influence the physical status of the ethernet ports belonging to this vlan. Displaying vlan configuration to do... Use the command... Remarks display the vlan interface information display interface vlan-interface [ vlan-id ] d...

  • Page 81

    2-4 assigning an ethernet port to a vlan you can assign an ethernet port to a vlan in ethernet port view or vlan view. Z you can assign an access port to a vlan in either ethernet port view or vlan view. Z you can assign a trunk port or hybrid port to a vlan only in ethernet port view. 1) in etherne...

  • Page 82

    2-5 configuring the default vlan for a port because an access port can belong to only one vlan, its default vlan is the vlan it resides in and cannot be configured. This section describes how to configure a default vlan for a trunk or hybrid port. Follow these steps to configure the default vlan for...

  • Page 83

    2-6 network diagram figure 2-1 network diagram for vlan configuration switcha switchb pc1 pc2 ge1/0/1 ge1/0/2 ge1/0/10 ge1/0/11 ge1/0/12 ge1/0/13 server2 server1 configuration procedure z configure switch a. # create vlan 100, specify its descriptive string as dept1 , and add gigabitethernet 1/0/1 t...

  • Page 84

    2-7 [switcha-gigabitethernet1/0/2] port trunk permit vlan 100 [switcha-gigabitethernet1/0/2] port trunk permit vlan 200 # configure gigabitethernet 1/0/10 of switch b. [switchb] interface gigabitethernet 1/0/10 [switchb-gigabitethernet1/0/10] port link-type trunk [switchb-gigabitethernet1/0/10] port...

  • Page 85: Table of Contents

    I table of contents 1 ip addressing configuration····················································································································1-1 ip addressing overview·············································································································...

  • Page 86: Ip Addressing Configuration

    1-1 1 ip addressing configuration when configuring ip addressing, go to these sections for information you are interested in: z ip addressing overview z configuring ip addresses z displaying ip addressing configuration z ip address configuration examples ip addressing overview ip address classes ip ...

  • Page 87

    1-2 table 1-1 ip address classes and ranges class address range description a 0.0.0.0 to 127.255.255.255 address 0.0.0.0 means this host no this network. This address is used by a host at bootstrap when it does not know its ip address. This address is never a valid destination address. Addresses sta...

  • Page 88

    1-3 while allowing you to create multiple logical networks within a single class a, b, or c network, subnetting is transparent to the rest of the internet. All these networks still appear as one. As subnetting adds an additional level, subnet id, to the two-level hierarchy with ip addressing, ip rou...

  • Page 89

    1-4 z you can assign at most five ip address to an interface, among which one is the primary ip address and the others are secondary ip addresses. A newly specified primary ip address overwrites the previous one if there is any. Z the primary and secondary ip addresses of an interface cannot reside ...

  • Page 90

    1-5 ip address configuration examples ip address configuration example i network requirement assign ip address 129.2.2.1 with mask 255.255.255.0 to vlan-interface 1 of the switch. Network diagram figure 1-3 network diagram for ip address configuration configuration procedure # configure an ip addres...

  • Page 91

    1-6 network diagram figure 1-4 network diagram for ip address configuration configuration procedure # assign a primary ip address and a secondary ip address to vlan-interface 1. System-view [switch] interface vlan-interface 1 [switch-vlan-interface1] ip address 172.16.1.1 255.255.255.0 [switch-vlan-...

  • Page 92

    1-7 reply from 172.16.2.2: bytes=56 sequence=2 ttl=255 time=26 ms reply from 172.16.2.2: bytes=56 sequence=3 ttl=255 time=26 ms reply from 172.16.2.2: bytes=56 sequence=4 ttl=255 time=26 ms reply from 172.16.2.2: bytes=56 sequence=5 ttl=255 time=26 ms --- 172.16.2.2 ping statistics --- 5 packet(s) t...

  • Page 93

    2-1 2 ip performance optimization configuration when configuring ip performance, go to these sections for information you are interested in: z ip performance overview z configuring ip performance z displaying and maintaining ip performance configuration ip performance overview introduction to ip per...

  • Page 94

    2-2 terminated. If fin packets are received, the tcp connection state changes to time_wait. If non-fin packets are received, the system restarts the timer from receiving the last non-fin packet. The connection is broken after the timer expires. Z size of tcp receive/send buffer follow these steps to...

  • Page 95

    2-3 displaying and maintaining ip performance configuration to do… use the command… remarks display tcp connection status display tcp status display tcp connection statistics display tcp statistics display udp traffic statistics display udp statistics display ip traffic statistics display ip statist...

  • Page 96: Table of Contents

    I table of contents 1 voice vlan configuration························································································································1-1 voice vlan overview···············································································································...

  • Page 97: Voice Vlan Configuration

    1-1 1 voice vlan configuration when configuring voice vlan, go to these sections for information you are interested in: z voice vlan overview z voice vlan configuration z displaying and maintaining voice vlan z voice vlan configuration example voice vlan overview voice vlans are allocated specially ...

  • Page 98

    1-2 following describes the way an ip phone acquires an ip address. Figure 1-1 network diagram for ip phones as shown in figure 1-1 , the ip phone needs to work in conjunction with the dhcp server and the ncp to establish a path for voice data transmission. An ip phone goes through the following thr...

  • Page 99

    1-3 tag to communicate with the voice gateway. In this case, the port connecting to the ip phone must be configured to allow the packets tagged with the voice vlan tag to pass. Z an untagged packet carries no vlan tag. Z a tagged packet carries the tag of a vlan. To set an ip address and a voice vla...

  • Page 100

    1-4 z set the dscp value to 46. Configuring voice vlan assignment mode of a port a port can work in automatic voice vlan assignment mode or manual voice vlan assignment mode. You can configure the voice vlan assignment mode for a port according to data traffic passing through the port. Processing mo...

  • Page 101

    1-5 table 1-2 matching relationship between port types and voice devices capable of acquiring ip address and voice vlan automatically voice vlan assignment mode voice traffic type port type supported or not access not supported trunk supported make sure the default vlan of the port exists and is not...

  • Page 102

    1-6 table 1-3 matching relationship between port types and voice devices acquiring voice vlan through manual configuration voice vlan assignment mode port type supported or not access not supported trunk supported make sure the default vlan of the port exists and is not a voice vlan, and the access ...

  • Page 103

    1-7 voice vlan mode packet type processing method packet carrying the voice vlan tag matches the oui list, the packet is transmitted in the voice vlan. Otherwise, the packet is dropped. Packet carrying any other vlan tag the packet is forwarded or dropped based on whether the receiving port is assig...

  • Page 104

    1-8 set the voice vlan aging timer voice vlan aging minutes optional the default aging timer is 1440 minutes. Enable the voice vlan function globally voice vlan vlan-id enable required enter ethernet port view interface interface-type interface-number required enable the voice vlan function on a por...

  • Page 105

    1-9 enable the voice vlan security mode voice vlan security enable optional by default, the voice vlan security mode is enabled. Set the voice vlan aging timer voice vlan aging minutes optional the default aging timer is 1,440 minutes. Enable the voice vlan function globally voice vlan vlan-id enabl...

  • Page 106

    1-10 z the voice vlan function can be enabled for only one vlan at one time. Z if the link aggregation control protocol (lacp) is enabled on a port, voice vlan feature cannot be enabled on it. Z voice vlan function can be enabled only for the static vlan. A dynamic vlan cannot be configured as a voi...

  • Page 107

    1-11 the mac address of ip phone a is 0011-1100-0001. The phone connects to a downstream device named pc a whose mac address is 0022-1100-0002 and to gigabitethernet 1/0/1 on an upstream device named device a. The mac address of ip phone b is 0011-2200-0001. The phone connects to a downstream device...

  • Page 108

    1-12 # configure gigabitethernet 1/0/1 to operate in automatic voice vlan assignment mode. (optional. By default, a port operates in automatic voice vlan assignment mode.) [devicea] interface gigabitethernet 1/0/1 [devicea-gigabitethernet1/0/1] voice vlan mode auto # configure gigabitethernet 1/0/1 ...

  • Page 109

    1-13 voice vlan configuration example (manual voice vlan assignment mode) network requirements create a voice vlan and configure it to operate in manual voice vlan assignment mode. Add the port to which an ip phone is connected to the voice vlan to enable voice traffic to be transmitted within the v...

  • Page 110

    1-14 [devicea-ethernet1/0/1] port hybrid pvid vlan 2 [devicea-ethernet1/0/1] port hybrid vlan 2 untagged # enable the voice vlan function on ethernet 1/0/1. [devicea-ethernet1/0/1] voice vlan enable verification # display the oui addresses, the corresponding oui address masks and the corresponding d...

  • Page 111: Table of Contents

    I table of contents 1 gvrp configuration ··································································································································1-1 introduction to gvrp ········································································································...

  • Page 112: Gvrp Configuration

    1-1 1 gvrp configuration when configuring gvrp, go to these sections for information you are interested in: z introduction to gvrp z gvrp configuration z displaying and maintaining gvrp z gvrp configuration example introduction to gvrp garp vlan registration protocol (gvrp) is an implementation of g...

  • Page 113

    1-2 2) garp timers timers determine the intervals of sending different types of garp messages. Garp defines four timers to control the period of sending garp messages. Z hold: when a garp entity receives a piece of registration information, it does not send out a join message immediately. Instead, t...

  • Page 114

    1-3 figure 1-1 format of garp packets the following table describes the fields of a garp packet. Table 1-1 description of garp packet fields field description value protocol id protocol id 1 message each message consists of two parts: attribute type and attribute list. — attribute type defined by th...

  • Page 115

    1-4 gvrp as an implementation of garp, garp vlan registration protocol (gvrp) maintains dynamic vlan registration information and propagates the information to the other switches through garp. With gvrp enabled on a device, the vlan registration information received by the device from other devices ...

  • Page 116

    1-5 to do ... Use the command ... Remarks enter system view system-view — enable gvrp globally gvrp required by default, gvrp is disabled globally. Enter ethernet port view interface interface-type interface-number — enable gvrp on the port gvrp required by default, gvrp is disabled on the port. Z a...

  • Page 117

    1-6 table 1-2 relations between the timers timer lower threshold upper threshold hold 10 centiseconds this upper threshold is less than or equal to one-half of the timeout time of the join timer. You can change the threshold by changing the timeout time of the join timer. Join this lower threshold i...

  • Page 118

    1-7 displaying and maintaining gvrp to do … use the command … remarks display garp statistics display garp statistics [ interface interface-list ] display the settings of the garp timers display garp timer [ interface interface-list ] display gvrp statistics display gvrp statistics [ interface inter...

  • Page 119

    1-8 [switcha-ethernet1/0/1] port link-type trunk [switcha-ethernet1/0/1] port trunk permit vlan all # enable gvrp on ethernet1/0/1. [switcha-ethernet1/0/1] gvrp [switcha-ethernet1/0/1] quit # configure ethernet1/0/2 to be a trunk port and to permit the packets of all the vlans. [switcha] interface e...

  • Page 120

    1-9 the following dynamic vlans exist: 5, 7, 8, # display the vlan information dynamically registered on switch b. [switchb] display vlan dynamic total 3 dynamic vlan exist(s). The following dynamic vlans exist: 5, 7, 8, # display the vlan information dynamically registered on switch e. [switche] di...

  • Page 121

    1-10 5, 8, # display the vlan information dynamically registered on switch e. [switche] display vlan dynamic no dynamic vlans exist!.

  • Page 122: Table of Contents

    I table of contents 1 port basic configuration ··························································································································1-1 ethernet port configuration ···································································································...

  • Page 123: Port Basic Configuration

    1-1 1 port basic configuration when performing basic port configuration, go to these sections for information you are interested in: z ethernet port configuration z ethernet port configuration example z troubleshooting ethernet port configuration ethernet port configuration combo port configuration ...

  • Page 124

    1-2 to do... Use the command... Remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — enable the ethernet port undo shutdown optional by default, the port is enabled. Use the shutdown command to disable the port. Set the description string for t...

  • Page 127

    1-5 reflector ports and fabric ports do not support the flow-control no-pauseframe-sending command. Duplicating the configuration of a port to other ports to make other ports have the same configuration as that of a specific port, you can duplicate the configuration of a port to specific ports. Spec...

  • Page 128

    1-6 z if you have not enabled the loopback port auto-shutdown function on the port, the port will automatically resume the normal forwarding state after the loop is removed. 2) if a loop is found on a trunk or hybrid port, the system merely sends log messages to the terminal but does not set the por...

  • Page 129

    1-7 to do… use the command… remarks enable loopback detection on the specified ports in bulk loopback-detection interface-list enable interface interface-type interface-number enable loopback detection on the ports enable loopback detection on a specified port loopback-detection enable use either co...

  • Page 130

    1-8 z external : performs external loop test. In the external loop test, self-loop headers must be used on the port of the switch ( for 100m port, the self-loop headers are made from four cores of the 8-core cables, for 1000m port, the self-loop header are made from eight cores of the 8-core cables,...

  • Page 131

    1-9 to do... Use the command... Remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — set the interval to perform statistical analysis on port traffic flow-interval interval optional by default, this interval is 300 seconds. Enabling giant-frame...

  • Page 132

    1-10 configuration examples # in the default conditions, where up/down log output is enabled, execute the shutdown command or the undo shutdown command on ethernet 1/0/1. The up/down log information for ethernet 1/0/1 is generated and displayed on the terminal. System-view system view: return to use...

  • Page 133

    1-11 to do … use the command … remarks set the port state change delay link-delay delay-time required defaults to 0, which indicates that no delay is introduced. The delay configured in this way does not take effect for ports in dldp down state. For information about the dldp down state, refer to dl...

  • Page 134

    1-12 network diagram figure 1-2 network diagram for ethernet port configuration configuration procedure z only the configuration for switch a is listed below. The configuration for switch b is similar to that of switch a. Z this example supposes that vlan 2, vlan 6 through vlan 50 and vlan 100 have ...

  • Page 135: Table of Contents

    I table of contents 1 link aggregation configuration ··············································································································1-1 overview ····························································································································...

  • Page 136

    1-1 1 link aggregation configuration when configuring link aggregation, go to these sections for information you are interested in: z overview z link aggregation classification z aggregation group categories z link aggregation configuration z displaying and maintaining link aggregation configuration...

  • Page 137

    1-2 table 1-1 consistency considerations for ports in an aggregation category considerations stp state of port-level stp (enabled or disabled) attribute of the link (point-to-point or otherwise) connected to the port port path cost stp priority stp packet format loop protection root protection port ...

  • Page 138

    1-3 lacp is disabled on the member ports of manual aggregation groups, and you cannot enable lacp on ports in a manual aggregation group. Port status in manual aggregation group a port in a manual aggregation group can be in one of the two states: selected or unselected. In a manual aggregation grou...

  • Page 139

    1-4 z the ports connected to a peer device different from the one the master port is connected to or those connected to the same peer device as the master port but to a peer port that is not in the same aggregation group as the peer port of the master port are unselected ports. Z the system sets the...

  • Page 140

    1-5 for an aggregation group: z when the rate or duplex mode of a port in the aggregation group changes, packet loss may occur on this port; z when the rate of a port decreases, if the port belongs to a manual or static lacp aggregation group, the port will be switched to the unselected state; if th...

  • Page 141

    1-6 z a load-sharing aggregation group contains at least two selected ports, but a non-load-sharing aggregation group can only have one selected port at most, while others are unselected ports. Z when more than eight load-sharing aggregation groups are configured on a single switch, fabric ports can...

  • Page 142

    1-7 for a manual aggregation group, a port can only be manually added/removed to/from the manual aggregation group. Follow these steps to configure a manual aggregation group: to do… use the command… remarks enter system view system-view — create a manual aggregation group link-aggregation group agg...

  • Page 143

    1-8 to do… use the command… remarks create a static aggregation group link-aggregation group agg-id mode static required enter ethernet port view interface interface-type interface-number — add the port to the aggregation group port link-aggregation group agg-id required note: for a static lacp aggr...

  • Page 144

    1-9 note: changing the system priority may affect the priority relationship between the aggregation peers, and thus affect the selected/unselected status of member ports in the dynamic aggregation group. Configuring a description for an aggregation group to do… use the command… remarks enter system ...

  • Page 145

    1-10 link aggregation configuration example ethernet port aggregation configuration example network requirements z switch a connects to switch b with three ports ethernet 1/0/1 to ethernet 1/0/3. It is required that load between the two switches can be shared among the three ports. Z adopt three dif...

  • Page 146

    1-11 # create static aggregation group 1. System-view [sysname] link-aggregation group 1 mode static # add ethernet 1/0/1 through ethernet 1/0/3 to aggregation group 1. [sysname] interface ethernet 1/0/1 [sysname-ethernet1/0/1] port link-aggregation group 1 [sysname-ethernet1/0/1] quit [sysname] int...

  • Page 147: Table of Contents

    I table of contents 1 port isolation configuration ·····················································································································1-1 port isolation overview ········································································································...

  • Page 148: Port Isolation Configuration

    1-1 1 port isolation configuration when configuring port isolation, go to these sections for information you are interested in: z port isolation overview z port isolation configuration z displaying and maintaining port isolation configuration z port isolation configuration example port isolation ove...

  • Page 149

    1-2 z when a member port of an aggregation group joins/leaves an isolation group, the other ports in the same aggregation group will join/leave the isolation group at the same time. Z for ports that belong to an aggregation group and an isolation group simultaneously, removing a port from the aggreg...

  • Page 150

    1-3 network diagram figure 1-1 network diagram for port isolation configuration configuration procedure # add ethernet1/0/2, ethernet1/0/3, and ethernet1/0/4 to the isolation group. System-view system view: return to user view with ctrl+z. [sysname] interface ethernet1/0/2 [sysname-ethernet1/0/2] po...

  • Page 151: Table of Contents

    I table of contents 1 port security configuration······················································································································1-1 port security overview···········································································································...

  • Page 152: Port Security Configuration

    1-1 1 port security configuration when configuring port security, go to these sections for information you are interested in: z port security overview z port security configuration task list z displaying and maintaining port security configuration z port security configuration examples port security...

  • Page 153

    1-2 table 1-1 description of port security modes security mode description feature norestriction in this mode, access to the port is not restricted. In this mode, neither the ntk nor the intrusion protection feature is triggered. Autolearn in this mode, a port can learn a specified number of mac add...

  • Page 154

    1-3 security mode description feature userlogin in this mode, port-based 802.1x authentication is performed for access users. In this mode, neither ntk nor intrusion protection will be triggered. Userloginsecure mac-based 802.1x authentication is performed on the access user. The port is enabled onl...

  • Page 155

    1-4 security mode description feature macaddresselseus erloginsecure in this mode, a port performs mac authentication of an access user first. If the authentication succeeds, the user is authenticated. Otherwise, the port performs 802.1x authentication of the user. In this mode, there can be only on...

  • Page 156

    1-5 task remarks configuring guest vlan for a port in macaddressoruserloginsecure mode optional ignoring the authorization information from the radius server optional configuring security mac addresses optional enabling port security configuration prerequisites before enabling port security, you nee...

  • Page 157

    1-6 z control the maximum number of users who are allowed to access the network through the port z control the number of security mac addresses that can be added with port security this configuration is different from that of the maximum number of mac addresses that can be leaned by a port in mac ad...

  • Page 158

    1-7 z before setting the port security mode to autolearn , you need to set the maximum number of mac addresses allowed on the port with the port-security max-mac-count command. Z when the port operates in the autolearn mode, you cannot change the maximum number of mac addresses allowed on the port. ...

  • Page 159

    1-8 to do... Use the command... Remarks set the timer during which the port remains disabled port-security timer disableport timer optional 20 seconds by default the port-security timer disableport command is used in conjunction with the port-security intrusion-mode disableport-temporarily command t...

  • Page 160

    1-9 z the users of the port can initiate 802.1x authentication. If a user passes authentication, the port leaves the guest vlan and is added to the original vlan, that is, the one the port belongs to before it is added to the guest vlan). The port then does not handle other users' authentication req...

  • Page 161

    1-10 ignoring the authorization information from the radius server after an 802.1x user or mac-authenticated user passes remote authentication dial-in user service (radius) authentication, the radius server delivers the authorization information to the device. You can configure a port to ignore the ...

  • Page 162

    1-11 to do... Use the command... Remarks enter system view system-view — in system view mac-address security mac-address interface interface-type interface-number vlan vlan-id interface interface-type interface-number add a security mac address entry in ethernet port view mac-address security mac-ad...

  • Page 163

    1-12 displaying and maintaining port security configuration to do... Use the command... Remarks display information about port security configuration display port-security [ interface interface-list ] display information about security mac address configuration display mac-address security [ interfa...

  • Page 164

    1-13 [switch-ethernet1/0/1] mac-address security 0001-0002-0003 vlan 1 # configure the port to be silent for 30 seconds after intrusion protection is triggered. [switch-ethernet1/0/1] port-security intrusion-mode disableport-temporarily [switch-ethernet1/0/1] quit [switch] port-security timer disabl...

  • Page 165

    1-14 # configure radius scheme 2000. System-view [switch] radius scheme 2000 [switch-radius-2000] primary authentication 10.11.1.1 1812 [switch-radius-2000] primary accouting 10.11.1.1 1813 [switch-radius-2000] key authentication abc [switch-radius-2000] key accouting abc [switch-radius-2000] user-n...

  • Page 166: Table of Contents

    I table of contents 1 dldp configuration ··································································································································1-1 overview ····················································································································...

  • Page 167: Dldp Configuration

    1-1 1 dldp configuration when configuring dldp, go to these sections for information you are interested in: z overview z dldp fundamentals z dldp configuration z dldp configuration example overview device link detection protocol (dldp) is an technology for dealing with unidirectional links that may ...

  • Page 168

    1-2 figure 1-2 fiber broken or not connected device a ge1/0/49 ge1/0/50 device b ge1/0/49 ge1/0/50 pc device link detection protocol (dldp) can detect the link status of an optical fiber cable or copper twisted pair (such as super category 5 twisted pair). If dldp finds a unidirectional link, it dis...

  • Page 169

    1-3 dldp packet type function rsy-advertisement packets (referred to as rsy packets hereafter) advertisement packet with the rsy flag set to 1. Rsy advertisement packets are sent to request synchronizing the neighbor information when neighbor information is not locally available or a neighbor inform...

  • Page 170

    1-4 dldp status a link can be in one of these dldp states: initial, inactive, active, advertisement, probe, disable, and delaydown. Table 1-2 dldp status status description initial initial status before dldp is enabled. Inactive dldp is enabled but the corresponding link is down active dldp is enabl...

  • Page 171

    1-5 timer description entry aging timer when a new neighbor joins, a neighbor entry is created and the corresponding entry aging timer is enabled when an advertisement packet is received from a neighbor, the neighbor entry is updated and the corresponding entry aging timer is updated in the normal m...

  • Page 172

    1-6 table 1-4 dldp operating mode and neighbor entry aging dldp operating mode detecting a neighbor after the corresponding neighbor entry ages out removing the neighbor entry immediately after the entry timer expires triggering the enhanced timer after an entry timer expires normal mode no yes no e...

  • Page 173

    1-7 table 1-5 dldp state and dldp packet type dldp state type of the dldp packets sent active advertisement packets, with the rsy flag set or not set. Advertisement advertisement packets probe probe packets 2) a dldp packet received is processed as follows: z in authentication mode, the dldp packet ...

  • Page 174

    1-8 table 1-7 processing procedure when no echo packet is received from the neighbor no echo packet received from the neighbor processing procedure in normal mode, no echo packet is received when the echo waiting timer expires. In enhanced mode, no echo packet is received when the enhanced timer exp...

  • Page 175

    1-9 dldp configuration performing basic dldp configuration follow these steps to perform basic dldp configuration: to do … use the command … remarks enter system view system-view — enable dldp on all optical ports of the switch dldp enable enter ethernet port view interface interface-type interface-...

  • Page 176

    1-10 z when connecting two dldp-enabled devices, make sure the software running on them is of the same version. Otherwise, dldp may operate improperly. Z when you use the dldp enable/dldp disable command in system view to enable/disable dldp on all optical ports of the switch, the configuration take...

  • Page 177

    1-11 dldp configuration example network requirements as shown in figure 1-4 , z switch a and switch b are connected through two pairs of fibers. Both of them support dldp. All the ports involved operate in mandatory full duplex mode, with their rates all being 1,000 mbps. Z suppose the fibers betwee...

  • Page 178

    1-12 # set the dldp handling mode for unidirectional links to auto . [switcha] dldp unidirectional-shutdown auto # display the dldp state [switcha] display dldp 1 when two switches are connected through fibers in a crossed way, two or three ports may be in the disable state, and the rest in the inac...

  • Page 179: Table of Contents

    I table of contents 1 mac address table management············································································································1-1 overview ·································································································································...

  • Page 180: Mac Address Table Management

    1-1 1 mac address table management when mac address table management functions, go to these sections for information you are interested in: z overview z mac address table management z displaying mac address table information z configuration example this chapter describes the management of static, dy...

  • Page 181

    1-2 generally, the majority of mac address entries are created and maintained through mac address learning. The following describes the mac address learning process of a switch: 1) as shown in figure 1-1 , user a and user b are both in vlan 1. When user a communicates with user b, the packet from us...

  • Page 182

    1-3 figure 1-4 mac address learning diagram (3) 4) at this time, the mac address table of the switch includes two forwarding entries shown in figure 1-5 . When forwarding the response packet from user b to user a, the switch sends the response to user a through gigabitethernet 1/0/1 (technically cal...

  • Page 183

    1-4 z the mac address aging timer only takes effect on dynamic mac address entries. Z with the “destination mac address triggered update function” enabled, when a switch finds a packet with a destination address matching one mac address entry within the aging time, it updates the entry and restarts ...

  • Page 184

    1-5 task remarks enabling destination mac address triggered update optional configuring a mac address entry you can add, modify, or remove a mac address entry, remove all mac address entries concerning a specific port, or remove specific type of mac address entries (dynamic or static mac address ent...

  • Page 185

    1-6 z when you add a mac address entry, the current port must belong to the vlan specified by the vlan argument in the command. Otherwise, the entry will not be added. Z if the vlan specified by the vlan argument is a dynamic vlan, after a static mac address is added, it will become a static vlan. S...

  • Page 186

    1-7 by setting the maximum number of mac addresses that can be learned from individual ports, the administrator can control the number of the mac address entries the mac address table can dynamically maintain. When the number of the mac address entries learnt from a port reaches the set value, the p...

  • Page 187

    1-8 to do… use the command… remarks display the aging time of the dynamic mac address entries in the mac address table display mac-address aging-time display the configured start port mac address display port-mac configuration examples adding a static mac address entry manually network requirements ...

  • Page 188: Table of Contents

    I table of contents 1 auto detect configuration························································································································1-1 introduction to the auto detect function·························································································...

  • Page 189: Auto Detect Configuration

    1-1 1 auto detect configuration when configuring the auto detect function, go to these sections for information you are interested in: z introduction to the auto detect function z auto detect configuration z auto detect configuration examples introduction to the auto detect function the auto detect ...

  • Page 190

    1-2 task remarks auto detect implementation in vlan interface backup optional auto detect basic configuration follow these steps to configure the auto detect function: to do… use the command… remarks enter system view system-view — create a detected group and enter detected group view detect-group g...

  • Page 191

    1-3 to avoid such problems, you can configure another route to back up the static route and use the auto detect function to judge the validity of the static route. If the static route is valid, packets are forwarded according to the static route, and the other route is standby. If the static route i...

  • Page 192

    1-4 figure 1-1 schematic diagram for vlan interface backup using auto detect can help implement vlan interfaces backup. When data can be transmitted through two vlan interfaces on the switch to the same destination, configure one of the vlan interface as the active interface and the other as the sta...

  • Page 193

    1-5 z on switch a, configure a static route to switch c. Z enable the static route when the detected group 8 is reachable . Z to ensure normal operating of the auto detect function, configure a static route to switch a on switch c. Network diagram figure 1-2 network diagram for implementing the auto...

  • Page 194

    1-6 network diagram figure 1-3 network diagram for vlan interface backup configuration procedure configure the ip addresses of all the interfaces as shown in figure 1-3 . The configuration procedure is omitted. # enter system view. System-view # create auto detected group 10. [switcha] detect-group ...

  • Page 195: Table of Contents

    I table of contents 1 mstp configuration ··································································································································1-1 overview ····················································································································...

  • Page 196

    Ii introduction····································································································································1-39 configuring digest snooping·········································································································1-40 configuring...

  • Page 197: Mstp Configuration

    1-1 1 mstp configuration go to these sections for information you are interested in: z overview z mstp configuration task list z configuring root bridge z configuring leaf nodes z performing mcheck operation z configuring guard functions z configuring digest snooping z configuring rapid transition z...

  • Page 198

    1-2 stp identifies the network topology by transmitting bpdus between stp compliant network devices, typically switches and routers. Bpdus contain sufficient information for the network devices to complete the spanning tree calculation. In stp, bpdus come in two types: z configuration bpdus, used to...

  • Page 199

    1-3 figure 1-1 a schematic diagram of designated bridges and designated ports all the ports on the root bridge are designated ports. 4) bridge id a bridge id consists of eight bytes, where the first two bytes represent the bridge priority of the device, and the latter six bytes represent the mac add...

  • Page 200

    1-4 6) port id a port id used on a 3com switch 4500 consists of two bytes, that is, 16 bits, where the first six bits represent the port priority, and the latter ten bits represent the port number. The default priority of all ethernet ports on 3com switches 4500 is 128. You can use commands to confi...

  • Page 201

    1-5 table 1-2 selection of the optimum configuration bpdu step description 1 upon receiving a configuration bpdu on a port, the device performs the following processing: z if the received configuration bpdu has a lower priority than that of the configuration bpdu generated by the port, the device wi...

  • Page 202

    1-6 step description 3 the device compares the calculated configuration bpdu with the configuration bpdu on the port whose role is to be determined, and acts as follows based on the comparison result: z if the calculated configuration bpdu is superior, this port will serve as the designated port, an...

  • Page 203

    1-7 device port name bpdu of port bp1 {1, 0, 1, bp1} device b bp2 {1, 0, 1, bp2} cp1 {2, 0, 2, cp1} device c cp2 {2, 0, 2, cp2} z comparison process and result on each device the following table shows the comparison process and result on each device. Table 1-5 comparison process and result on each d...

  • Page 204

    1-8 device comparison process bpdu of port after comparison z port cp1 receives the configuration bpdu of device a {0, 0, 0, ap2}. Device c finds that the received configuration bpdu is superior to the configuration bpdu of the local port {2, 0, 2, cp1}, and updates the configuration bpdu of cp1. Z ...

  • Page 205

    1-9 figure 1-3 the final calculated spanning tree to facilitate description, the spanning tree calculation process in this example is simplified, while the actual process is more complicated. 3) the bpdu forwarding mechanism in stp z upon network initiation, every switch regards itself as the root b...

  • Page 206

    1-10 for this reason, the protocol uses a state transition mechanism. Namely, a newly elected root port and the designated ports must go through a period, which is twice the forward delay time, before they transit to the forwarding state. The period allows the new configuration bpdus to be propagate...

  • Page 207

    1-11 z mstp supports mapping vlans to multiple spanning tree (mst) instances (mstis) by means of a vlan-to-instance mapping table. Mstp introduces instances (which integrates multiple vlans into a set) and can bind multiple vlans to an instance, thus saving communication overhead and improving resou...

  • Page 208

    1-12 2) msti a multiple spanning tree instance (msti) refers to a spanning tree in an mst region. Multiple spanning trees can be established in one mst region. These spanning trees are independent of each other. For example, each region in figure 1-4 contains multiple spanning trees known as mstis. ...

  • Page 209

    1-13 z a region boundary port is located on the boundary of an mst region and is used to connect one mst region to another mst region, an stp-enabled region or an rstp-enabled region. Z an alternate port is a secondary port of a root port or master port and is used for rapid transition. With the roo...

  • Page 210

    1-14 z forwarding state. Ports in this state can forward user packets and receive/send bpdu packets. Z learning state. Ports in this state can receive/send bpdu packets but do not forward user packets. Z discarding state. Ports in this state can only receive bpdu packets. Port roles and port states ...

  • Page 211

    1-15 in addition to the basic mstp functions, 3com switch 4500 also provides the following functions for users to manage their switches. Z root bridge hold z root bridge backup z root guard z bpdu guard z loop guard z tc-bpdu attack guard z bpdu packet drop protocols and standards mstp is documented...

  • Page 212

    1-16 task remarks configuring the timeout time factor optional configuring the maximum transmitting rate on the current port optional the default value is recommended. Configuring the current port as an edge port optional setting the link type of a port to p2p optional enabling mstp required to prev...

  • Page 213

    1-17 configuring root bridge configuring an mst region configuration procedure follow these steps to configure an mst region: to do... Use the command... Remarks enter system view system-view — enter mst region view stp region-configuration — configure the name of the mst region region-name name req...

  • Page 214

    1-18 z mstp-enabled switches are in the same region only when they have the same format selector (a 802.1s-defined protocol selector, which is 0 by default and cannot be configured), mst region name, vlan-to-instance mapping table, and revision level. Z the 3com switches 4500 support only the mst re...

  • Page 215

    1-19 specify the current switch as the secondary root bridge of a spanning tree follow these steps to specify the current switch as the secondary root bridge of a spanning tree: to do... Use the command... Remarks enter system view system-view — specify the current switch as the secondary root bridg...

  • Page 216

    1-20 configuring the bridge priority of the current switch root bridges are selected according to the bridge priorities of switches. You can make a specific switch be selected as a root bridge by setting a lower bridge priority for the switch. An mstp-enabled switch can have different bridge priorit...

  • Page 219

    1-23 configuring the network diameter of the switched network in a switched network, any two switches can communicate with each other through a specific path made up of multiple switches. The network diameter of a network is measured by the number of switches; it equals the number of the switches on...

  • Page 220

    1-24 to do... Use the command... Remarks configure the max age parameter stp timer max-age centiseconds required the max age parameter defaults to 2,000 centiseconds (namely, 20 seconds). All switches in a switched network adopt the three time-related parameters configured on the cist root bridge. Z...

  • Page 221

    1-25 configuring the timeout time factor when the network topology is stable, a non-root-bridge switch regularly forwards bpdus received from the root bridge to its neighboring devices at the interval specified by the hello time parameter to check for link failures. Normally, a switch regards its up...

  • Page 222

    1-26 to do... Use the command... Remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — configure the maximum transmitting rate stp transmit-limit packetnum required the maximum transmitting rate of all ethernet ports on a switch defaults to 10. ...

  • Page 223

    1-27 to do... Use the command... Remarks enter ethernet port view interface interface-type interface-number — configure the port as an edge port stp edged-port enable required by default, all the ethernet ports of a switch are non-edge ports. On a switch with bpdu guard disabled, an edge port become...

  • Page 224

    1-28 setting the link type of a port to p2p in ethernet port view follow these steps to specify whether the link connected to a port is point-to-point link in ethernet port view: to do... Use the command... Remarks enter system view system-view — enter ethernet port view interface interface-type int...

  • Page 225

    1-29 to do... Use the command... Remarks disable mstp on specified ports stp interface interface-list disable optional by default, mstp is enabled on all ports. To enable a switch to operate more flexibly, you can disable mstp on specific ports. As mstp-disabled ports do not participate in spanning ...

  • Page 226

    1-30 configuring the timeout time factor refer to configuring the timeout time factor . Configuring the maximum transmitting rate on the current port refer to configuring the maximum transmitting rate on the current port . Configuring a port as an edge port refer to configuring the current port as a...

  • Page 227

    1-31 rate operation mode (half-/full-duplex) 802.1d-1998 ieee 802.1t latency standard 1,000 mbps full-duplex aggregated link 2 ports aggregated link 3 ports aggregated link 4 ports 4 3 3 3 20,000 10,000 6,666 5,000 20 18 16 14 10 gbps full-duplex aggregated link 2 ports aggregated link 3 ports aggre...

  • Page 228

    1-32 1) perform this configuration in system view system-view [sysname] stp interface ethernet 1/0/1 instance 1 cost 2000 2) perform this configuration in ethernet port view system-view [sysname] interface ethernet 1/0/1 [sysname-ethernet1/0/1] stp instance 1 cost 2000 configuration example (b) # co...

  • Page 229

    1-33 to do... Use the command... Remarks enter ethernet port view interface interface-type interface-number — configure port priority for the port stp [ instance instance-id ] port priority priority required. The default port priority is 128. Changing port priority of a port may change the role of t...

  • Page 230

    1-34 configuration procedure you can perform the mcheck operation in the following two ways. Perform the mcheck operation in system view follow these steps to perform the mcheck operation in system view: to do... Use the command... Remarks enter system view system-view — perform the mcheck operation...

  • Page 231

    1-35 shuts down the edge ports that receive configuration bpdus and then reports these cases to the administrator. Ports shut down in this way can only be restored by the administrator. You are recommended to enable bpdu guard for devices with edge ports configured. Configuration prerequisites mstp ...

  • Page 232

    1-36 forwarding packets (as if it is disconnected from the link). It resumes the normal state if it does not receive any configuration bpdus with higher priorities for a specified period. Z you are recommended to enable root guard on the designated ports of a root bridge. Z loop guard, root guard, a...

  • Page 233

    1-37 configuring loop guard a switch maintains the states of the root port and other blocked ports by receiving and processing bpdus from the upstream switch. These bpdus may get lost because of network congestions or unidirectional link failures. If a switch does not receive bpdus from the upstream...

  • Page 234

    1-38 period, the switch may be busy in removing the mac address table and arp entries, which may affect spanning tree calculation, occupy large amount of bandwidth and increase switch cpu utilization. With the tc-bpdu attack guard function enabled, a switch performs a removing operation upon receivi...

  • Page 235

    1-39 as a result, stp calculation is performed repeatedly, which may occupy too much cpu of the switches or cause errors in the protocol state of the bpdu packets. In order to avoid this problem, you can enable bpdu dropping on ethernet ports. Once the function is enabled on a port, the port will no...

  • Page 236

    1-40 the digest snooping function is not applicable to edge ports. Configuring digest snooping configure the digest snooping feature on a switch to enable it to communicate with other switches adopting proprietary protocols to calculate configuration digests in the same mst region through mstis. Con...

  • Page 237

    1-41 z when the digest snooping feature is enabled on a port, the port state turns to the discarding state. That is, the port will not send bpdu packets. The port is not involved in the stp calculation until it receives bpdu packets from the peer port. Z the digest snooping feature is needed only wh...

  • Page 238

    1-42 figure 1-6 the rstp rapid transition mechanism root port blocks other non- edge ports, changes to forwarding state and sends agreement to upstream device downstream switch upstream switch proposal for rapid transition agree ment designated port changes to forwarding state root port designated p...

  • Page 239

    1-43 configuring rapid transition configuration prerequisites as shown in figure 1-8 , a 3com switch 4500 is connected to another manufacturer's switch. The former operates as the downstream switch, and the latter operates as the upstream switch. The network operates normally. The upstream switch is...

  • Page 240

    1-44 z the rapid transition feature can be enabled on only root ports or alternate ports. Z if you configure the rapid transition feature on a designated port, the feature does not take effect on the port. Configuring vlan-vpn tunnel introduction the vlan-vpn tunnel function enables stp packets to b...

  • Page 241

    1-45 to do... Use the command... Remarks enable the vlan-vpn tunnel function globally vlan-vpn tunnel required the vlan-vpn tunnel function is disabled by default. Enter ethernet port view interface interface-type interface-number make sure that you enter the ethernet port view of the port for which...

  • Page 242

    1-46 system-view [sysname] stp instance 1 portlog # enable log/trap output for the ports of all instances. System-view [sysname] stp portlog all enabling trap messages conforming to 802.1d standard a switch sends trap messages conforming to 802.1d standard to the network management device in the fol...

  • Page 243

    1-47 mstp configuration example network requirements implement mstp in the network shown in figure 1-10 to enable packets of different vlans to be forwarded along different mstis. The detailed configurations are as follows: z all switches in the network belong to the same mst region. Z packets of vl...

  • Page 244

    1-48 # specify switch a as the root bridge of msti 1. [sysname] stp instance 1 root primary 2) configure switch b # enter mst region view. System-view [sysname] stp region-configuration # configure the region name, vlan-to-instance mapping table, and revision level for the mst region. [sysname-mst-r...

  • Page 245

    1-49 vlan-vpn tunnel configuration example network requirements z switch c and switch d are the access devices for the service provider network. Z the 3com switches 4500 operate as the access devices of the customer networks, that is, switch a and switch b in the network diagram. Z switch c and swit...

  • Page 246

    1-50 [sysname] vlan-vpn tunnel # add gigabitethernet 1/0/1 to vlan 10. [sysname] vlan 10 [sysname-vlan10] port gigabitethernet 1/0/1 [sysname-vlan10] quit # enable the vlan vpn function on gigabitethernet 1/0/1. [sysname] interface gigabitethernet 1/0/1 [sysname-gigabitethernet1/0/1] port access vla...

  • Page 247: Table of Contents

    I table of contents 1 ip routing protocol overview ··················································································································1-1 introduction to ip route and routing table·························································································...

  • Page 248

    Ii filters ···············································································································································4-1 ip route policy configuration task list··································································································4-2 r...

  • Page 249: Ip Routing Protocol Overview

    1-1 1 ip routing protocol overview go to these sections for information you are interested in: z introduction to ip route and routing table z routing protocol overview z displaying and maintaining a routing table introduction to ip route and routing table ip route routers are used for route selectio...

  • Page 250

    1-2 z preference: there may be multiple routes with different next hops to the same destination. These routes may be discovered by different routing protocols, or be manually configured static routes. The one with the highest preference (the smallest numerical value) will be selected as the current ...

  • Page 251

    1-3 routing protocol overview static routing and dynamic routing static routing is easy to configure and requires less system resources. It works well in small, stable networks with simple topologies. It cannot adapt itself to any network topology change automatically so that you must perform routin...

  • Page 252

    1-4 each routing protocol (including static routes) is assigned a priority. The route found by the routing protocol with the highest priority is preferred. The following table lists some routing protocols and the default priorities for routes found by them: table 1-1 routing protocols and priorities...

  • Page 253

    1-5 routing information. Each routing protocol shares routing information discovered by other routing protocols through a route redistribution mechanism. Displaying and maintaining a routing table to do… use the command… remarks display brief information about a routing table display ip routing-tabl...

  • Page 254: Static Route Configuration

    2-1 2 static route configuration when configuring a static route, go to these sections for information you are interested in: z introduction to static route z static route configuration z displaying and maintaining static routes z static route configuration example z troubleshooting a static route t...

  • Page 255

    2-2 default route to avoid too large a routing table, you can configure a default route. When the destination address of a packet fails to match any entry in the routing table, z if there is default route in the routing table, the default route will be selected to forward the packet. Z if there is n...

  • Page 257

    2-4 1) perform the following configurations on the switch. # approach 1: configure static routes on switch a. System-view [switcha] ip route-static 1.1.3.0 255.255.255.0 1.1.2.2 [switcha] ip route-static 1.1.4.0 255.255.255.0 1.1.2.2 [switcha] ip route-static 1.1.5.0 255.255.255.0 1.1.2.2 # approach...

  • Page 258: Rip Configuration

    3-1 3 rip configuration when configuring rip, go to these sections for information you are interested in: z rip overview z rip configuration task list z rip configuration example z troubleshooting rip configuration the term router in this chapter refers to a router in a generic sense or an ethernet ...

  • Page 259

    3-2 z interface: outbound interface on this router, through which ip packets should be forwarded to reach the destination. Z metric: cost from the local router to the destination. Z route time: time elapsed since the routing entry was last updated. The time is reset to 0 every time the routing entry...

  • Page 260

    3-3 task remarks enabling rip on the interfaces attached to a specified network segment required setting the rip operating status on an interface optional configuring basic rip functions specifying the rip version on an interface optional setting the additional routing metrics of an interface option...

  • Page 261

    3-4 z related rip commands configured in interface view can take effect only after rip is enabled. Z rip operates on the interfaces attached to a specified network segment. When rip is disabled on an interface, it does not operate on the interface, that is, it neither receives/sends routes on the in...

  • Page 262

    3-5 z set the preference of rip to change the preference order of routing protocols. This order makes sense when more than one route to the same destination is discovered by multiple routing protocols. Z redistribute external routes in an environment with multiple routing protocols. Configuration pr...

  • Page 263

    3-6 follow these steps to configure rip route summarization: to do... Use the command... Remarks enter system view system-view — enter rip view rip — enable rip-2 automatic route summarization summary required enabled by default disabling the router from receiving host routes in some special cases, ...

  • Page 264

    3-7 z the filter-policy import command filters the rip routes received from neighbors, and the routes being filtered out will neither be added to the routing table nor be advertised to any neighbors. Z the filter-policy export command filters all the routes to be advertised, including the routes red...

  • Page 265

    3-8 rip network adjustment and optimization in some special network environments, some rip features need to be configured and rip network performance needs to be adjusted and optimized. By performing the configuration mentioned in this section, the following can be implemented: z changing the conver...

  • Page 266

    3-9 split horizon cannot be disabled on a point-to-point link. Configuring rip-1 packet zero field check follow these steps to configure rip-1 packet zero field check: to do... Use the command... Remarks enter system view system-view — enter rip view rip — enable the check of the must be zero field ...

  • Page 267

    3-10 configuring rip to unicast rip packets follow these steps to configure rip to unicast rip packets: to do... Use the command... Remarks enter system view system-view — enter rip view rip — configure rip to unicast rip packets peer ip-address required when rip runs on the link that does not suppo...

  • Page 268

    3-11 switch c vlan-int1 110.11.2.3/24 vlan-int4 117.102.0.1/16 configuration procedure only the configuration related to rip is listed below. Before the following configuration, make sure the ethernet link layer works normally and the ip addresses of vlan interfaces are configured correctly. 1) conf...

  • Page 269

    4-1 4 ip route policy configuration when configuring an ip route policy, go to these sections for information you are interested in: z ip route policy overview z ip route policy configuration task list z displaying ip route policy z ip route policy configuration example z troubleshooting ip route po...

  • Page 270

    4-2 for acl configuration, refer to the part discussing acl. Ip-prefix list ip-prefix list plays a role similar to acl. But it is more flexible than acl and easier to understand. When ip-prefix list is applied to filter routing information, its matching object is the destination address field in rou...

  • Page 271

    4-3 z if-match clause: defines matching rules; that is, the filtering conditions that the routing information should satisfy for passing the current route policy. The matching objects are some attributes of the routing information. Z apply clause: specifies actions, which are the configuration comma...

  • Page 273

    4-5 ip-prefix configuration ip-prefix plays a role similar to acl and but is more flexible and easier to understand. When ip-prefix is applied to filtering routing information, its matching object is the destination address information field of routing information. Configuration prerequisites before...

  • Page 274

    4-6 ip route policy configuration example controlling rip packet cost to implement dynamic route backup network requirements the required speed of convergence in the small network of a company is not high. The network provides two services. Main and backup links are provided for each service for the...

  • Page 275

    4-7 z for the oa server, the main link is between switch a and switch c, while the backup link is between switch b and switch c. Z for the service server, the main link is between switch b and switch c, while the backup link is between switch a and switch c. Z apply a route policy to control the cos...

  • Page 276

    4-8 [switchc-route-policy] if-match interface vlan-interface2 [switchc-route-policy] if-match ip-prefix 2 [switchc-route-policy] apply cost 6 [switchc-route-policy] quit # create node 30 with the matching mode being permit in the route policy. Define if-match clauses. Apply the cost 6 to routes matc...

  • Page 277

    4-9 2) display data forwarding paths when the main link of the oa server between switch a and switch c is down. Display ip routing-table routing table: public net destination/mask protocol pre cost nexthop interface 1.0.0.0/8 rip 100 6 6.6.6.5 vlan-interface2 3.0.0.0/8 rip 100 5 6.6.6.5 vlan-interfa...

  • Page 278: Table of Contents

    I table of contents 1 multicast overview ····································································································································1-1 multicast overview ········································································································...

  • Page 279

    Ii configuring igmp snooping··········································································································1-16 configuring multicast vlan ··········································································································1-18 troubleshooting igmp sn...

  • Page 280: Multicast Overview

    1-1 1 multicast overview in this manual, the term “router” refers to a router in the generic sense or a layer 3 ethernet switch running an ip multicast protocol. Multicast overview with the development of the internet, more and more interaction services such as data, voice, and video services are ru...

  • Page 281

    1-2 assume that hosts b, d and e need this information. The source server establishes transmission channels for the devices of these users respectively. As the transmitted traffic over the network is in direct proportion to the number of users that receive this information, when a large number of us...

  • Page 282

    1-3 information transmission in the multicast mode as described in the previous sections, unicast is suitable for networks with sparsely distributed users, whereas broadcast is suitable for networks with densely distributed users. When the number of users requiring information is not certain, unicas...

  • Page 283

    1-4 z all receivers interested in the same information form a multicast group. Multicast groups are not subject to geographic restrictions. Z a router that supports layer 3 multicast is called multicast router or layer 3 multicast device. In addition to providing multicast routing, a multicast route...

  • Page 284

    1-5 application of multicast the multicast technology effectively addresses the issue of point-to-multipoint data transmission. By enabling high-efficiency point-to-multipoint data transmission, over an ip network, multicast greatly saves network bandwidth and reduces network load. Multicast provide...

  • Page 285

    1-6 z host registration: what receivers reside on the network? Z technologies of discovering a multicast source: which multicast source should the receivers receive information from? Z multicast addressing mechanism: where should the multicast source transports information? Z multicast routing: how ...

  • Page 286

    1-7 note that: z the ip addresses of a permanent multicast group keep unchanged, while the members of the group can be changed. Z there can be any number of, or even zero, members in a permanent multicast group. Z those ip multicast addresses not assigned to permanent multicast groups can be used by...

  • Page 287

    1-8 class d address range description 224.0.0.16 the specified subnetwork bandwidth management (sbm) 224.0.0.17 all sbms 224.0.0.18 virtual router redundancy protocol (vrrp) 224.0.0.19 to 224.0.0.255 other protocols like having reserved the private network segment 10.0.0.0/8 for unicast, iana has al...

  • Page 288

    1-9 z generally, we refer to ip multicast working at the network layer as layer 3 multicast and the corresponding multicast protocols as layer 3 multicast protocols, which include igmp, pim, and msdp; we refer to ip multicast working at the data link layer as layer 2 multicast and the corresponding ...

  • Page 289

    1-10 z an inter-domain multicast routing protocol is used for delivery of multicast information between two ass. So far, mature solutions include multicast source discovery protocol (msdp). For the ssm model, multicast routes are not divided into inter-domain routes and intra-domain routes. Since re...

  • Page 290

    1-11 z to process the same multicast information from different peers received on different interfaces of the same device, every multicast packet is subject to a reverse path forwarding (rpf) check on the incoming interface. The result of the rpf check determines whether the packet will be forwarded...

  • Page 291

    1-12 assume that unicast routes exist in the network, as shown in figure 1-2 . Multicast packets travel along the spt from the multicast source to the receivers. Figure 1-2 rpf check process source 192.168.0.1/24 receiver receiver router a switch b switch c vlan-int2 vlan-int1 vlan-int1 vlan-int2 mu...

  • Page 292

    1-1 2 common multicast configuration in this manual, the term “router” refers to a router in the generic sense or a layer 3 ethernet switch running an ip multicast protocol. Common multicast configuration table 2-1 complete the following tasks to perform common multicast configurations: task remarks...

  • Page 293

    1-2 to do... Use the command... Remarks enter system view system - view — enter ethernet port view interface interface-type interface-number — configure multicast source port suppression multicast-source-deny optional multicast source port suppression is disabled by default. Configuring a multicast ...

  • Page 294

    1-3 z if the multicast mac address entry to be created already exists, the system gives you a prompt. Z if you want to add a port to a multicast mac address entry created through the mac-address multicast command, you need to remove the entry first, create this entry again, and then add the specifie...

  • Page 295: Igmp Snooping Configuration

    1-1 3 igmp snooping configuration when configuring igmp snooping, go to these sections for information you are interested in: z igmp snooping overview z configuring igmp snooping z displaying and maintaining igmp snooping z igmp snooping configuration examples z troubleshooting igmp snooping in this...

  • Page 296

    1-2 figure 3-1 before and after igmp snooping is enabled on layer 2 device multicast packet transmission without igmp snooping source multicast router host a receiver host b host c receiver multicast packets layer 2 switch multicast packet transmission when igmp snooping runs source multicast router...

  • Page 297

    1-3 member ports. The switch records all member ports on the local device in the igmp snooping forwarding table. Port aging timers in igmp snooping and related messages and actions table 3-1 port aging timers in igmp snooping and related messages and actions timer description message before expiry a...

  • Page 298

    1-4 a switch will not forward an igmp report through a non-router port for the following reason: due to the igmp report suppression mechanism, if member hosts of that multicast group still exist under non-router ports, the hosts will stop sending reports when they receive the message, and this preve...

  • Page 299

    1-5 configuring igmp snooping complete the following tasks to configure igmp snooping: task remarks enabling igmp snooping required configuring the version of igmp snooping optional configuring timers optional configuring fast leave processing optional configuring a multicast group filter optional c...

  • Page 300

    1-6 z although both layer 2 and layer 3 multicast protocols can run on the same switch simultaneously, they cannot run simultaneously on a vlan or its corresponding vlan interface. Z before enabling igmp snooping in a vlan, be sure to enable igmp snooping globally in system view; otherwise the igmp ...

  • Page 301

    1-7 to do... Use the command... Remarks configure the aging timer of the router port igmp-snooping router-aging-time seconds optional by default, the aging time of the router port is 105 seconds. Configure the general query response timer igmp-snooping max-response-time seconds optional by default, ...

  • Page 302

    1-8 z the fast leave processing function works for a port only if the host attached to the port runs igmpv2 or igmpv3. Z the configuration performed in system view takes effect on all ports of the switch if no vlan is specified; if one or more vlans are specified, the configuration takes effect on a...

  • Page 303

    1-9 z a port can belong to multiple vlans, you can configure only one acl rule per vlan on a port. Z if no acl rule is configured, all the multicast groups will be filtered. Z since most devices broadcast unknown multicast packets by default, this function is often used together with the function of...

  • Page 304

    1-10 configuring igmp snooping querier in an ip multicast network running igmp, one dedicated multicast device is responsible for sending igmp general queries, and this router or layer 3 switch is called the igmp querier. However, a layer 2 multicast switch does not support igmp, and therefore canno...

  • Page 305

    1-11 configuring the source address to be carried in igmp queries follow these steps to configure the source address to be carried in igmp queries: to do... Use the command... Remarks enter system view system-view — enter vlan view vlan vlan-id — configure the source ip address of igmp general queri...

  • Page 306

    1-12 in ethernet port view follow these steps to configure a static multicast group member port in ethernet port view: to do... Use the command... Remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — configure the current port as a static membe...

  • Page 307

    1-13 to do... Use the command... Remarks configure the current port as a static router port multicast static-router-port vlan vlan-id required by default, no static router port is configured. In vlan view follow these steps to configure a static router port in vlan view: to do... Use the command... ...

  • Page 308

    1-14 z before configuring a simulated host, enable igmp snooping in vlan view first. Z the port to be configured must belong to the specified vlan; otherwise the configuration does not take effect. Z you can use the source-ip source-address command to specify a multicast source address that the port...

  • Page 309

    1-15 to do... Use the command... Remarks enter system view system-view — create a multicast vlan and enter vlan view vlan vlan-id — return to system view quit — enter vlan interface view interface vlan-interface vlan-id — enable igmp igmp enable required by default, the igmp feature is disabled. Ret...

  • Page 311

    1-17 network diagram figure 3-3 network diagram for igmp snooping configuration multicast packets source router a switch a receiver receiver host b host a host c 1.1.1.1/24 eth1/0/4 eth1/0/2 eth1/0/3 igmp querier eth1/0/1 eth1/0/1 10.1.1.1/24 eth1/0/2 1.1.1.2/24 vlan100 configuration procedure 1) co...

  • Page 312

    1-18 # view the detailed information of the multicast group in vlan 100 on switch a. Display igmp-snooping group vlan100 total 1 ip group(s). Total 1 mac group(s). Vlan(id):100. Total 1 ip group(s). Total 1 mac group(s). Static router port(s): dynamic router port(s): ethernet1/0/1 ip group(s):the fo...

  • Page 313

    1-19 device device description networking description switch b layer 2 switch z vlan 2 contains ethernet 1/0/1 and vlan 3 contains ethernet 1/0/2. Z the default vlans of ethernet 1/0/1 and ethernet 1/0/2 are vlan 2 and vlan 3 respectively. Z vlan 10 contains ethernet 1/0/10, ethernet 1/0/1, and ethe...

  • Page 314

    1-20 [switcha-vlan-interface20] ip address 168.10.1.1 255.255.255.0 [switcha-vlan-interface20] pim dm [switcha-vlan-interface20] quit # configure vlan 10. [switcha] vlan 10 [switcha-vlan10] quit # define ethernet 1/0/10 as a hybrid port, add the port to vlan 10, and configure the port to forward tag...

  • Page 315

    1-21 [switchb] interface ethernet 1/0/2 [switchb-ethernet1/0/2] port link-type hybrid [switchb-ethernet1/0/2] port hybrid vlan 3 10 untagged [switchb-ethernet1/0/2] port hybrid pvid vlan 3 [switchb-ethernet1/0/2] quit troubleshooting igmp snooping symptom : multicast function does not work on the sw...

  • Page 316: Table of Contents

    I table of contents 1 802.1x configuration ·································································································································1-1 introduction to 802.1x······································································································...

  • Page 317

    Ii layer 3 error control ·······················································································································4-1 configuring system guard······················································································································4-1 config...

  • Page 318: 802.1X Configuration

    1-1 1 802.1x configuration when configuring 802.1x, go to these sections for information you are interested in: z introduction to 802.1x z introduction to 802.1x configuration z basic 802.1x configuration z advanced 802.1x configuration z displaying and maintaining 802.1x configuration z configurati...

  • Page 319

    1-2 figure 1-1 architecture of 802.1x authentication z the supplicant system is the entity seeking access to the lan. It resides at one end of a lan segment and is authenticated by the authenticator system at the other end of the lan segment. The supplicant system is usually a user terminal device. ...

  • Page 320

    1-3 z the controlled port can be used to pass service packets when it is in authorized state. It is blocked when not in authorized state. In this case, no packets can pass through it. Z controlled port and uncontrolled port are two properties of a port. Packets reaching a port are visible to both th...

  • Page 321

    1-4 figure 1-3 the format of an eapol packet in an eapol packet: z the pae ethernet type field holds the protocol identifier. The identifier for 802.1x is 0x888e. Z the protocol version field holds the version of the protocol supported by the sender of the eapol packet. Z the type field can be one o...

  • Page 322

    1-5 z the length field indicates the size of an eap packet, which includes the code, identifier, length, and data fields. Z the data field carries the eap packet, whose format differs with the code field. A success or failure packet does not contain the data field, so the length field of it is 4. Fi...

  • Page 323

    1-6 eap relay mode this mode is defined in 802.1x. In this mode, eap packets are encapsulated in higher level protocol (such as eapor) packets to enable them to successfully reach the authentication server. Normally, this mode requires that the radius server support the two newly-added fields: the e...

  • Page 324

    1-7 figure 1-8 802.1x authentication procedure (in eap relay mode) supplicant system pae raduis server eapol eapor eapol-start eap- request / identity eap- response / identity eap- request / md5 challenge eap-success eap- response / md5 challenge radius access - request (eap- response / identity) ra...

  • Page 325

    1-8 feedbacks (through a radius access-accept packet and an eap-success packet) to the switch to indicate that the supplicant system is authenticated. Z the switch changes the state of the corresponding port to accepted state to allow the supplicant system to access the network. Z the supplicant sys...

  • Page 326

    1-9 figure 1-9 802.1x authentication procedure (in eap terminating mode) supplicant system pae authenticator system pae radius server eapol radius eapol- start eap- request /identity eap- response/identity eap- request/ md5 challenge eap- success eap- response/md5 challenge radius access-request ( c...

  • Page 327

    1-10 z re-authentication timer ( reauth-period ). The switch initiates 802.1x re-authentication at the interval set by the re-authentication timer. Z radius server timer ( server-timeout ). This timer sets the server-timeout period. After sending an authentication request packet to the radius server...

  • Page 328

    1-11 z sends trap packets without disconnecting the supplicant system. This function needs the cooperation of 802.1x client and a cams server. Z the 802.1x client needs to be capable of detecting multiple network adapters, proxies, and ie proxies. Z the cams server is configured to disable the use o...

  • Page 329

    1-12 z users belonging to the guest vlan can access the resources of the guest vlan without being authenticated. But they need to be authenticated when accessing external resources. Normally, the guest vlan function is coupled with the dynamic vlan delivery function. Refer to aaa operation for detai...

  • Page 330

    1-13 note: 802.1x re-authentication will fail if a cams server is used and configured to perform authentication but not accounting. This is because a cams server establishes a user session after it begins to perform accounting. Therefore, to enable 802.1x re-authentication, do not configure the acco...

  • Page 331

    1-14 configuring basic 802.1x functions follow these steps to configure basic 802.1x functions: to do… use the command… remarks enter system view system-view — enable 802.1x globally dot1x required by default, 802.1x is disabled globally. In system view dot1x interface interface-list interface inter...

  • Page 332

    1-15 caution: z 802.1x configurations take effect only after you enable 802.1x both globally and for specified ports. Z the settings of 802.1x and mac address learning limit are mutually exclusive. Enabling 802.1x on a port will prevent you from setting the limit on mac address learning on the port ...

  • Page 335

    1-18 enabling dhcp-triggered authentication after performing the following configuration, 802.1x allows running dhcp on access users, and users are authenticated when they apply for dynamic ip addresses through dhcp. Follow these steps to enable dhcp-triggered authentication: to do... Use the comman...

  • Page 336

    1-19 to do... Use the command... Remarks enter system view system-view — in system view dot1x re-authenticate [ interface interface-list ] enable 802.1x re-authentication on port(s) in port view dot1x re-authenticate required by default, 802.1x re-authentication is disabled on a port. Note: z to ena...

  • Page 338

    1-21 network diagram figure 1-12 network diagram for aaa configuration with 802.1x and radius enabled configuration procedure note: following configuration covers the major aaa/radius configuration commands. Refer to aaa operation for the information about these commands. Configuration on the client...

  • Page 339

    1-22 [sysname-radius-radius1] key accounting money # set the interval and the number of the retries for the switch to send packets to the radius servers. [sysname-radius-radius1] timer 5 [sysname-radius-radius1] retry 5 # set the timer for the switch to send real-time accounting packets to the radiu...

  • Page 340

    2-1 2 quick ead deployment configuration when configuring quick ead deployment, go to these sections for information you are interested in: z introduction to quick ead deployment z configuring quick ead deployment z displaying and maintaining quick ead deployment z quick ead deployment configuration...

  • Page 341

    2-2 configuring quick ead deployment configuration prerequisites z enable 802.1x on the switch. Z set the port authorization mode to auto for 802.1x-enabled ports using the dot1x port-control command. Configuration procedure configuring a free ip range a free ip range is an ip range that users can a...

  • Page 342

    2-3 large number of users log in but cannot pass authentication, the switch may run out of acl resources, preventing other users from logging in. A timer called acl timer is designed to solve this problem. You can control the usage of acl resources by setting the acl timer. The acl timer starts once...

  • Page 343

    2-4 configuration procedure note: before enabling quick ead deployment, make sure sure that: z the web server is configured properly. Z the default gateway of the pc is configured as the ip address of the layer-3 virtual interface of the vlan to which the port that is directly connected with the pc ...

  • Page 344: Habp Configuration

    3-1 3 habp configuration when configuring habp, go to these sections for information you are interested in: z introduction to habp z habp server configuration z habp client configuration z displaying and maintaining habp configuration introduction to habp when a switch is configured with the 802.1x ...

  • Page 345

    3-2 configure the current switch to be an habp server habp server vlan vlan-id required by default, a switch operates as an habp client after you enable habp on the switch. If you want to use the switch as a management switch, you need to configure the switch to be an habp server. Configure the inte...

  • Page 346: System Guard Configuration

    4-1 4 system guard configuration when configuring system guard, go to these sections for information you are interested in: z system guard overview z configuring system guard z displaying and maintaining system guard configuration system guard overview guard against ip attacks system-guard operates ...

  • Page 347

    4-2 set the maximum number of infected hosts that can be concurrently monitored system-guard ip detect-maxnum number optional 30 by default set the maximum number of addresses that the system can learn, the maximum number of times an address can be hit before an action is taken and the address isola...

  • Page 348

    4-3 enabling layer 3 error control follow these steps to enable layer 3 error control: to do... Use the command... Remarks enter system view system-view — enable layer 3 error control system-guard l3err enable required enabled by default displaying and maintaining system guard configuration to do......

  • Page 349: Table of Contents

    I table of contents 1 aaa overview ············································································································································1-1 introduction to aaa ·····································································································...

  • Page 350

    Ii local authentication of ftp/telnet users·····················································································2-28 hwtacacs authentication and authorization of telnet users ···················································2-29 troubleshooting aaa ·································...

  • Page 351: Aaa Overview

    1-1 1 aaa overview introduction to aaa aaa is the acronym for the three security functions: authentication, authorization and accounting. It provides a uniform framework for you to configure these three functions to implement network security management. Z authentication: defines what users can acce...

  • Page 352

    1-2 z none accounting: no accounting is performed for users. Z remote accounting: user accounting is performed on a remote radius or tacacs server. Introduction to isp domain an internet service provider (isp) domain is a group of users who belong to the same isp. For a username in the format of use...

  • Page 353

    1-3 figure 1-1 databases in a radius server in addition, a radius server can act as a client of some other aaa server to provide authentication or accounting proxy service. Basic message exchange procedure in radius the messages exchanged between a radius client (a switch, for example) and a radius ...

  • Page 354

    1-4 4) the radius client accepts or denies the user depending on the received authentication result. If it accepts the user, the radius client sends a start-accounting request (accounting-request, with the status-type attribute value = start) to the radius server. 5) the radius server returns a star...

  • Page 355

    1-5 4 accounting-request direction: client->server. The client transmits this message to the server to request the server to start or end the accounting (whether to start or to end the accounting is determined by the acct-status-type attribute in the message). This message carries almost the same at...

  • Page 356

    1-6 11 filter-id 33 proxy-state 12 framed-mtu 34 login-lat-service 13 framed-compression 35 login-lat-node 14 login-ip-host 36 login-lat-group 15 login-service 37 framed-appletalk-link 16 login-tcp-port 38 framed-appletalk-network 17 (unassigned) 39 framed-appletalk-zone 18 reply-message 40-59 (rese...

  • Page 357

    1-7 table 1-3 differences between hwtacacs and radius hwtacacs radius adopts tcp, providing more reliable network transmission. Adopts udp. Encrypts the entire message except the hwtacacs header. Encrypts only the password field in authentication message. Separates authentication from authorization....

  • Page 358

    1-8 figure 1-6 aaa implementation procedure for a telnet user the basic message exchange procedure is as follows: 1) a user sends a login request to the switch acting as a tacacs client, which then sends an authentication start request to the tacacs server. 2) the tacacs server returns an authentica...

  • Page 359

    1-9 9) after receiving the response indicating an authorization success, the tacacs client pushes the configuration interface of the switch to the user. 10) the tacacs client sends an accounting start request to the tacacs server. 11) the tacacs server returns an accounting response, indicating that...

  • Page 360: Aaa Configuration

    2-1 2 aaa configuration aaa configuration task list you need to configure aaa to provide network access services for legal users while protecting network devices and preventing unauthorized access and repudiation behavior. Complete the following tasks to configure aaa (configuring a combined aaa sch...

  • Page 361

    2-2 task remarks creating an isp domain and configuring its attributes required configuring separate aaa schemes required configuring an aaa scheme for an isp domain required with separate aaa schemes, you can specify authentication, authorization and accounting schemes respectively. You need to con...

  • Page 365

    2-6 accounting. In this case, if the combined scheme uses radius or hwtacacs, the system never uses the secondary scheme for authorization and accounting. Z if you configure no separate scheme, the combined scheme is used for authentication, authorization, and accounting. In this case, if the system...

  • Page 366

    2-7 z in string mode, if the vlan id assigned by the radius server is a character string containing only digits (for example, 1024), the switch first regards it as an integer vlan id: the switch transforms the string to an integer value and judges if the value is in the valid vlan id range; if it is...

  • Page 368

    2-9 z the following characters are not allowed in the user-name string: /:*?. And you cannot input more than one “@” in the string. Z after the local-user password-display-mode cipher-force command is executed, any password will be displayed in cipher mode even though you specify to display a user p...

  • Page 369

    2-10 task remarks creating a radius scheme required configuring radius authentication/authorization servers required configuring radius accounting servers required configuring shared keys for radius messages optional configuring the maximum number of radius request transmission attempts optional con...

  • Page 370

    2-11 creating a new radius scheme, you should configure the ip address and udp port number of each radius server you want to use in this scheme. These radius servers fall into two types: authentication/authorization, and accounting. And for each type of server, you can configure two servers in a rad...

  • Page 371

    2-12 create a radius scheme and enter its view radius scheme radius-scheme-name required by default, a radius scheme named "system" has already been created in the system. Set the ip address and port number of the primary radius authentication/authorization server primary authentication ip-address [...

  • Page 372

    2-13 enable stop-accounting request buffering stop-accounting-buffer enable optional by default, stop-accounting request buffering is enabled. Set the maximum number of transmission attempts of a buffered stop-accounting request. Retry stop-accounting retry-times optional by default, the system trie...

  • Page 373

    2-14 set a shared key for radius authentication/authorization messages key authentication string required by default, no shared key is created. Set a shared key for radius accounting messages key accounting string required by default, no shared key is created. The authentication/authorization shared...

  • Page 374

    2-15 z if you change the radius server type, the units of data flows sent to radius servers will be restored to the defaults. Z when the third party radius server is used, you can select standard or extended as the server-type in a radius scheme; when the cams server is used, you can select extended...

  • Page 375

    2-16 to do… use the command… remarks enter system view system-view — create a radius scheme and enter its view radius scheme radius-scheme-name required by default, a radius scheme named "system" has already been created in the system. Set the format of the usernames to be sent to radius server user...

  • Page 376

    2-17 z generally, the access users are named in the userid@isp-name or userid.Isp-name format. Here, isp-name after the “ @” or “.” character represents the isp domain name, by which the device determines which isp domain a user belongs to. However, some old radius servers cannot accept the username...

  • Page 377

    2-18 z if you adopt the local radius server function, the udp port number of the authentication/authorization server must be 1645, the udp port number of the accounting server must be 1646, and the ip addresses of the servers must be set to the addresses of this switch. Z the message encryption key ...

  • Page 378

    2-19 set the response timeout time of radius servers timer response-timeout seconds optional by default, the response timeout time of radius servers is three seconds. Set the time that the switch waits before it try to re-communicate with primary server and restore the status of the primary server t...

  • Page 379

    2-20 user cannot get authenticated. In this case, the user can access the network again only when the cams administrator manually removes the user's online information. The user re-authentication at restart function is designed to resolve this problem. After this function is enabled, every time the ...

  • Page 380

    2-21 hwtacacs configuration task list complete the following tasks to configure hwtacacs: task remarks creating a hwtacacs scheme required configuring tacacs authentication servers required configuring tacacs authorization servers required configuring tacacs accounting servers optional configuring s...

  • Page 381

    2-22 set the ip address and port number of the primary tacacs authentication server primary authentication ip-address [ port ] required by default, the ip address of the primary authentication server is 0.0.0.0, and the port number is 0. Set the ip address and port number of the secondary tacacs aut...

  • Page 382

    2-23 configuring tacacs accounting servers follow these steps to configure tacacs accounting servers: to do… use the command… remarks enter system view system-view — create a hwtacacs scheme and enter its view hwtacacs scheme hwtacacs-scheme-name required by default, no hwtacacs scheme exists. Set t...

  • Page 384

    2-25 to do… use the command… remarks enter system view system-view — create a hwtacacs scheme and enter its view hwtacacs scheme hwtacacs-scheme-name required by default, no hwtacacs scheme exists. Set the response timeout time of tacacs servers timer response-timeout seconds optional by default, th...

  • Page 385

    2-26 displaying and maintaining radius protocol configuration to do… use the command… remarks display radius message statistics about local radius server display local-server statistics display configuration information about one specific or all radius schemes display radius scheme [ radius-scheme-n...

  • Page 386

    2-27 network requirements in the network environment shown in figure 2-1 , you are required to configure the switch so that the telnet users logging into the switch are authenticated by the radius server. Z a radius authentication server with ip address 10.110.91.164 is connected to the switch. Z on...

  • Page 387

    2-28 [sysname-radius-cams] server-type extended [sysname-radius-cams] user-name-format with-domain [sysname-radius-cams] quit # associate the isp domain with the radius scheme. [sysname] domain cams [sysname-isp-cams] scheme radius-scheme cams a telnet user logging into the switch by a name in the f...

  • Page 388

    2-29 # configure an authentication scheme for the default “system” domain. [sysname] domain system [sysname-isp-system] scheme local a telnet user logging into the switch with the name telnet@system belongs to the "system" domain and will be authenticated according to the configuration of the "syste...

  • Page 389

    2-30 [sysname-hwtacacs-hwtac] primary authentication 10.110.91.164 49 [sysname-hwtacacs-hwtac] primary authorization 10.110.91.164 49 [sysname-hwtacacs-hwtac] key authentication aabbcc [sysname-hwtacacs-hwtac] key authorization aabbcc [sysname-hwtacacs-hwtac] user-name-format without-domain [sysname...

  • Page 390

    2-31 troubleshooting hwtacacs configuration see the previous section if you encounter an hwtacacs fault..

  • Page 391: Ead Configuration

    3-1 3 ead configuration introduction to ead endpoint admission defense (ead) is an attack defense solution. Using this solution, you can enhance the active defense capability of network endpoints, prevents viruses and worms from spreading on the network, and protects the entire network by limiting t...

  • Page 392

    3-2 z configuring the ip address of the security policy server. Z associating the isp domain with the radius scheme. Ead is commonly used in radius authentication environment. This section mainly describes the configuration of security policy server ip address. For other related configuration, refer...

  • Page 393

    3-3 network diagram figure 3-2 ead configuration eth1/0/1 internet user security policy servers 10.110.91.166/16 virus patch servers 10.110.91.168/16 authentication servers 10.110.91.164/16 configuration procedure # configure 802.1x on the switch. Refer to “configuring 802.1x” in 802.1x and system g...

  • Page 394: Table of Contents

    I table of contents 1 mac address authentication configuration ··························································································1-1 mac address authentication overview ··································································································1-1 perfo...

  • Page 395

    1-1 1 mac address authentication configuration when configuring mac address authentication, go to these sections for information you are interested: z mac address authentication overview z related concepts z configuring basic mac address authentication functions z mac address authentication enhanced...

  • Page 396

    1-2 format configured with the mac-authentication authmode usernameasmacaddress usernameformat command; otherwise, the authentication will fail. Z in fixed mode, all users’ mac addresses are automatically mapped to the configured local passwords and usernames. Z the service type of a local user need...

  • Page 398

    1-4 task remarks configuring a guest vlan optional configuring the maximum number of mac address authentication users allowed to access a port optional configuring a guest vlan different from guest vlans described in the 802.1x and system-guard manual , guest vlans mentioned in this section refer to...

  • Page 399

    1-5 after a port is added to a guest vlan, the switch will re-authenticate the first access user of this port (namely, the first user whose unicast mac address is learned by the switch) periodically. If this user passes the re-authentication, this port will exit the guest vlan, and thus the user can...

  • Page 400

    1-6 z if more than one client are connected to a port, you cannot configure a guest vlan for this port. Z when a guest vlan is configured for a port, only one mac address authentication user can access the port. Even if you set the limit on the number of mac address authentication users to more than...

  • Page 401

    1-7 z if both the limit on the number of mac address authentication users and the limit on the number of users configured in the port security function are configured for a port, the smaller value of the two configured limits is adopted as the maximum number of mac address authentication users allow...

  • Page 402

    1-8 # set the user name in mac address mode for mac address authentication, requiring hyphened lowercase mac addresses as the usernames and passwords. [sysname] mac-authentication authmode usernameasmacaddress usernameformat with-hyphen lowercase # add a local user. Z specify the user name and passw...

  • Page 403: Table of Contents

    I table of contents 1 arp configuration·····································································································································1-1 introduction to arp ········································································································...

  • Page 404: Arp Configuration

    1-1 1 arp configuration when configuring arp, go to these sections for information you are interested in: z introduction to arp z configuring arp z configuring gratuitous arp z displaying and debugging arp z arp configuration examples introduction to arp arp function address resolution protocol (arp...

  • Page 405

    1-2 figure 1-1 arp message format hardware type (16 bits) protocol type (16 bits) length of hardware address length of protocol address operator (16 bits) hardware address of the sender ip address of the sender hardware address of the receiver ip address of the receiver hardware type (16 bits) hardw...

  • Page 406

    1-3 value description 5 chaos 6 ieee802.X 7 arc network arp table in an ethernet, the mac addresses of two hosts must be available for the two hosts to communicate with each other. Each host in an ethernet maintains an arp table, where the latest used ip address-to-mac address mapping entries are st...

  • Page 407

    1-4 mode, all hosts on this subnet can receive the request, but only the requested host (namely, host b) will process the request. 3) host b compares its own ip address with the destination ip address in the arp request. If they are the same, host b saves the source ip address and source mac address...

  • Page 408

    1-5 to do… use the command… remarks enable the arp entry checking function (that is, disable the switch from learning arp entries with multicast mac addresses) arp check enable optional enabled by default. Z static arp entries are valid as long as the ethernet switch operates normally. But some oper...

  • Page 410

    2-1 2 arp attack defense configuration arp attack defense configuration although arp is easy to implement, it provides no security mechanism and thus is prone to network attacks. Currently, arp attacks and viruses are threatening lan security. The device can provide multiple features to detect and p...

  • Page 411

    2-2 figure 2-1 network diagram for arp man-in-the-middle attack arp attack detection to guard against the man-in-the-middle attacks launched by hackers or attackers, s4500 series ethernet switches support the arp attack detection function. After you enable arp attack detection for a vlan, z when rec...

  • Page 412

    2-3 z for details about dhcp snooping and ip static binding, refer to dhcp operation . Z for details about 802.1x authentication, refer to 802.1x and system guard operation . Arp restricted forwarding with the arp restricted forwarding function enabled, arp request packets are forwarded through trus...

  • Page 413

    2-4 figure 2-2 gateway spoofing attack to prevent gateway spoofing attacks, an s4500 series ethernet switch can work as an access device (usually with the upstream port connected to the gateway and the downstream ports connected to hosts) and filter arp packets based on the gateway’s address. Z to f...

  • Page 414

    2-5 task remarks configuring the maximum number of dynamic arp entries that a vlan interface can learn optional the switch serves as a gateway. Configuring arp source mac address consistency check optional the switch serves as a gateway or an access device. Arp packet filtering based on gateway’s ad...

  • Page 415

    2-6 to do… use the command… remarks enter ethernet port view interface interface-type interface-number — configure arp packet filtering based on the gateway’s ip address arp filtersource ip-address required not configured by default. Follow these steps to configure arp packet filtering based on gate...

  • Page 416

    2-7 to do… use the command… remarks specify the current port as a trusted port dhcp-snooping trust optional after dhcp snooping is enabled, you need to configure the upstream port connected to the dhcp server as a trusted port. Configure the port as an arp trusted port arp detection trust optional b...

  • Page 417

    2-8 to do… use the command… remarks enter ethernet port view interface interface-type interface-number — enable the arp packet rate limit function arp rate-limit enable required by default, the arp packet rate limit function is disabled on a port. Configure the maximum arp packet rate allowed on the...

  • Page 418

    2-9 network diagram figure 2-3 arp attack detection and packet rate limit configuration configuration procedure # enable dhcp snooping on switch a. System-view [switcha] dhcp-snooping # specify ethernet 1/0/1 as the dhcp snooping trusted port and the arp trusted port. [switcha] interface ethernet 1/...

  • Page 419

    2-10 arp attack defense configuration example ii network requirements host a and host b are connected to gateway through an access switch (switch). The ip and mac addresses of gateway are 192.168.100.1/24 and 000d-88f8-528c. To prevent gateway spoofing attacks from host a and host b, configure arp p...

  • Page 420

    2-11 arp attack defense configuration example iii network requirements host a and host b are connected to gateway (switch a) through a layer 2 switch (switch b). To prevent arp attacks such as arp flooding: z enable arp packet source mac address consistency check on switch a to block arp packets wit...

  • Page 421

    2-12 z enable arp attack detection based on bindings of authenticated 802.1x clients on the switch to prevent arp attacks. Network diagram figure 2-6 network diagram for 802.1x based arp attack defense configuration procedures # enter system view. System-view # enable 802.1x authentication globally....

  • Page 422: Table of Contents

    I table of contents 1 dhcp overview··········································································································································1-1 introduction to dhcp ······································································································...

  • Page 423

    Ii enabling unauthorized dhcp server detection ···········································································2-24 configuring ip address detecting ·································································································2-24 configuring dhcp accounting functions ...

  • Page 424

    Iii 6 dhcp/bootp client configuration ·········································································································6-1 introduction to dhcp client ····················································································································6-1 intro...

  • Page 425: Dhcp Overview

    1-1 1 dhcp overview when configuring dhcp, go to these sections for information you are interested in: z introduction to dhcp z dhcp ip address assignment z dhcp packet format z protocol specification introduction to dhcp with networks getting larger in size and more complicated in structure, lack o...

  • Page 426

    1-2 z automatic assignment. The dhcp server assigns ip addresses to dhcp clients. The ip addresses will be occupied by the dhcp clients permanently. Z dynamic assignment. The dhcp server assigns ip addresses to dhcp clients for predetermined period of time. In this case, a dhcp client must apply for...

  • Page 427

    1-3 by default, a dhcp client updates its ip address lease automatically by unicasting a dhcp-request packet to the dhcp server when half of the lease time elapses. The dhcp server responds with a dhcp-ack packet to notify the dhcp client of a new ip lease if the server can assign the same ip addres...

  • Page 428

    1-4 z file: path and name of the boot configuration file that the dhcp server specifies for the dhcp client. Z option: optional variable-length fields, including packet type, valid lease time, ip address of a dns server, and ip address of the wins server. Protocol specification protocol specificatio...

  • Page 429: Dhcp Server Configuration

    2-1 2 dhcp server configuration when configuring the dhcp server, go to these sections for information you are interested in: z introduction to dhcp server z dhcp server configuration task list z enabling dhcp z configuring the global address pool based dhcp server z configuring the interface addres...

  • Page 430

    2-2 types of address pool the address pools of a dhcp server fall into two types: global address pool and interface address pool. Z a global address pool is created by executing the dhcp server ip-pool command in system view. It is valid on the current device. Z if an interface is configured with a ...

  • Page 431

    2-3 1) if there is an address pool where an ip address is statically bound to the mac address or id of the client, the dhcp server will select this address pool and assign the statically bound ip address to the client. 2) otherwise, the dhcp server observes the following principles to select a dynam...

  • Page 432

    2-4 z when you merge two or more xrn systems into one xrn system, a new master unit is elected, and the new xrn system adopts new configurations accordingly. This may result in the existing system configurations (including the address pools configured for the dhcp servers) being lost. As the new xrn...

  • Page 433

    2-5 to improve security and avoid malicious attacks to unused sockets, s4500 ethernet switches provide the following functions: z udp port 67 and udp port 68 ports used by dhcp are enabled only when dhcp is enabled. Z udp port 67 and udp port 68 ports are disabled when dhcp is disabled. The correspo...

  • Page 434

    2-6 to do… use the command… remarks enter system view system-view — interface interface-type interface-number dhcp select global configure the current interface quit configure the specified interface(s) or all the interfaces to operate in global address pool mode configure multiple interfaces simult...

  • Page 435

    2-7 currently, only one ip address in a global dhcp address pool can be statically bound to a mac address or a client id. Follow these steps to configure the static ip address allocation mode: to do… use the command… remarks enter system view system-view — enter dhcp address pool view dhcp server ip...

  • Page 436

    2-8 to improve security and avoid malicious attack to the unused sockets, s4500 ethernet switches provide the following functions: z udp 67 and udp 68 ports used by dhcp are enabled only when dhcp is enabled. Z udp 67 and udp 68 ports are disabled when dhcp is disabled. The corresponding implementat...

  • Page 437

    2-9 z in the same dhcp global address pool, the network command can be executed repeatedly. In this case, the new configuration overwrites the previous one. Z the dhcp server forbidden-ip command can be executed repeatedly. That is, you can configure multiple ip addresses that are not dynamically as...

  • Page 438

    2-10 configuring wins servers for the dhcp client for microsoft windows-based dhcp clients that communicate through netbios protocol, the host name-to-ip address translation is carried out by windows internet naming service (wins) servers. So you need to perform wins-related configuration for most w...

  • Page 439

    2-11 configuring gateways for the dhcp client gateways are necessary for dhcp clients to access servers/hosts outside the current network segment. After you configure gateway addresses on a dhcp server, the dhcp server provides the gateway addresses to dhcp clients as well while assigning ip address...

  • Page 440

    2-12 z sub-option 4: fail-over call routing. Meanings of the sub-options for option 184 table 2-1 meanings of the sub-options for option 184 sub-option feature function note ncp-ip (sub-option 1) the ncp-ip sub-option carries the ip address of the network call processor (ncp). The ip address of the ...

  • Page 441

    2-13 for the configurations specifying to add sub-option 2, sub-option 3, and sub-option 4 in the response packets to take effect, you need to configure the dhcp server to add sub-option 1. Mechanism of using option 184 on dhcp server the dhcp server encapsulates the information for option 184 to ca...

  • Page 442

    2-14 specify an ip address for the network calling processor before performing other configuration. Configuring the tftp server and bootfile name for the dhcp client this task is to specify the ip address and name of a tftp server and the bootfile name in the dhcp global address pool. The dhcp clien...

  • Page 444

    2-16 task remarks enabling the interface address pool mode on interface(s) required configuring the static ip address allocation mode configuring an address allocation mode for an interface address pool configuring the dynamic ip address allocation mode one of the two options is required. And these ...

  • Page 445

    2-17 to improve security and avoid malicious attack to the unused sockets, s4500 ethernet switches provide the following functions: z udp port 67 and udp port 68 ports used by dhcp are enabled only when dhcp is enabled. Z udp port 67 and udp port 68 ports are disabled when dhcp is disabled. The corr...

  • Page 446

    2-18 z the ip addresses statically bound in interface address pools and the interface ip addresses must be in the same network segment. Z there is no limit to the number of ip addresses statically bound in an interface address pool, but the ip addresses statically bound in interface address pools an...

  • Page 447

    2-19 to do… use the command… remarks specify the ip addresses that are not dynamically assigned dhcp server forbidden-ip low-ip-address [ high-ip-address ] optional by default, all ip addresses in a dhcp address pool are available for being dynamically assigned. Z the dhcp server forbidden-ip comman...

  • Page 448

    2-20 to do… use the command… remarks enter system view system-view — interface interface-type interface-number dhcp server dns-list ip-address & configure the current interface quit configure dns server addresses for dhcp clients configure multiple interfaces in system view dhcp server dns-list ip-a...

  • Page 449

    2-21 follow these steps to configure wins servers for the dhcp client: to do… use the command… remarks enter system view system-view — interface interface-type interface-number dhcp server nbns-list ip-address & configure the current interface quit configure wins server addresses for dhcp clients co...

  • Page 450

    2-22 follow these steps to configure option 184 parameters for the client with voice service: to do… use the command… remarks enter system view system-view — enter interface view interface interface-type interface-number — specify the primary network calling processor dhcp server voice-config ncp-ip...

  • Page 451

    2-23 follow these steps to configure the tftp server and bootfile name for the dhcp client: to do… use the command… remarks enter system view system-view — enter interface view interface interface-type interface-number — specify the tftp server dhcp server tftp-server ip-address ip-address specify t...

  • Page 452

    2-24 be cautious when configuring self-defined dhcp options because such configuration may affect the dhcp operation process. Configuring dhcp server security functions dhcp security configuration is needed to ensure the security of dhcp service. Prerequisites before configuring dhcp security, you s...

  • Page 453

    2-25 will assign the ip address to the requesting client (the dhcp client probes the ip address by sending gratuitous arp packets). Follow these steps to configure ip address detecting: to do… use the command… remarks enter system view system-view — specify the number of ping packets dhcp server pin...

  • Page 454

    2-26 dhcp accounting configuration prerequisites before configuring dhcp accounting, make sure that: z the dhcp server is configured and operates properly. Address pools and lease time are configured. Z dhcp clients are configured and dhcp service is enabled. Z the network operates properly. Configu...

  • Page 456

    2-28 z the ip addresses of vlan-interface 1 and vlan-interface 2 on switch a are 10.1.1.1/25 and 10.1.1.129/25 respectively. Z in the address pool 10.1.1.0/25, the address lease duration is ten days and twelve hours, domain name suffix aabbcc.Com, dns server address 10.1.1.2, gateway 10.1.1.126, and...

  • Page 457

    2-29 system-view [switcha] dhcp enable # configure the ip addresses that are not dynamically assigned. (that is, the ip addresses of the dns server, wins server, and gateways.) [switcha] dhcp server forbidden-ip 10.1.1.2 [switcha] dhcp server forbidden-ip 10.1.1.4 [switcha] dhcp server forbidden-ip ...

  • Page 458

    2-30 network diagram figure 2-2 network diagram for option 184 support configuration dhcp client dhcp client dhcp client 3com vcx dhcp server ip:10.1.1.1/24 configuration procedure 1) configure the dhcp client. Configure the 3com vcx device to operate as a dhcp client and to request for all sub-opti...

  • Page 459

    2-31 dhcp accounting configuration example network requirements z the dhcp server connects to a dhcp client and a radius server respectively through ethernet 1/0/1 and ethernet 1/0/2. Z ethernet 1/0/1 belongs to vlan 2; ethernet 1/0/2 belongs to vlan 3. Z the ip address of vlan-interface 1 is 10.1.1...

  • Page 460

    2-32 [sysname] interface vlan-interface 3 [sysname-vlan-interface3] ip address 10.1.2.1 24 [sysname-vlan-interface3] quit # create a domain and a radius scheme. Associate the domain with the radius scheme. [sysname] radius scheme 123 [sysname-radius-123] primary authentication 10.1.2.2 [sysname-radi...

  • Page 461

    3-1 3 dhcp relay agent configuration when configuring the dhcp relay agent, go to these sections for information you are interested in: z introduction to dhcp relay agent z configuring the dhcp relay agent z displaying and maintaining dhcp relay agent configuration z dhcp relay agent configuration e...

  • Page 462

    3-2 figure 3-1 typical dhcp relay agent application in the process of dynamic ip address assignment through the dhcp relay agent, the dhcp client and dhcp server interoperate with each other in a similar way as they do without the dhcp relay agent. The following sections only describe the forwarding...

  • Page 463

    3-3 figure 3-2 padding contents for sub-option 1 of option 82 figure 3-3 padding contents for sub-option 2 of option 82 mechanism of option 82 supported on dhcp relay agent the procedure for a dhcp client to obtain an ip address from a dhcp server through a dhcp relay agent is similar to that for th...

  • Page 464

    3-4 if a switch belongs to an xrn fabric, you need to enable the udp helper function on it before configuring it as a dhcp relay agent. Dhcp relay agent configuration task list complete the following tasks to configure the dhcp relay agent: task remarks enabling dhcp required correlating a dhcp serv...

  • Page 465

    3-5 to improve security and avoid malicious attack to the unused sockets, s4500 ethernet switches provide the following functions: z udp 67 and udp 68 ports used by dhcp are enabled only when dhcp is enabled. Z udp 67 and udp 68 ports are disabled when dhcp is disabled. The corresponding implementat...

  • Page 466

    3-6 to do… use the command… remarks create a static ip-to-mac binding dhcp-security static ip-address mac - address optional not created by default. Enter interface view interface interface-type interface-number — enable the address checking function address-check enable required disabled by default...

  • Page 467

    3-7 currently, the dhcp relay agent handshake function on an s4500 series switch can only interoperate with a windows 2000 dhcp server. Enabling unauthorized dhcp server detection if there is an unauthorized dhcp server in the network, when a client applies for an ip address, the unauthorized dhcp s...

  • Page 469

    3-9 network diagram figure 3-4 network diagram for dhcp relay agent switch b dhcp server switch a dhcp relay dhcp client dhcp client dhcp client dhcp client vlan-int2 10.1.1.2/24 vlan-int1 10.10.1.1/24 vlan-int2 10.1.1.1/24 configuration procedure # create dhcp server group 1 and configure an ip add...

  • Page 470

    3-10 solution z check if dhcp is enabled on the dhcp server and the dhcp relay agent. Z check if an address pool that is on the same network segment with the dhcp clients is configured on the dhcp server. Z check if a reachable route is configured between the dhcp relay agent and the dhcp server. Z ...

  • Page 471: Dhcp Snooping Configuration

    4-1 4 dhcp snooping configuration when configuring dhcp snooping, go to these sections for information you are interested in: z dhcp snooping overview z configuring dhcp snooping z displaying and maintaining dhcp snooping configuration z dhcp snooping configuration examples dhcp snooping overview in...

  • Page 472

    4-2 figure 4-1 typical network diagram for dhcp snooping application dhcp snooping listens the following two types of packets to retrieve the ip addresses the dhcp clients obtain from dhcp servers and the mac addresses of the dhcp clients: z dhcp-request packet z dhcp-ack packet introduction to dhcp...

  • Page 473

    4-3 figure 4-3 extended format of the remote id sub-option in practice, some network devices do not support the type and length identifiers of the circuit id and remote id sub-options. To interwork with these devices, s4500 series ethernet switches support option 82 in the standard format. Refer to ...

  • Page 474

    4-4 when receiving a dhcp client’s request without option 82, the dhcp snooping device will add the option field with the configured sub-option and then forward the packet. For details, see table 4-2 . Table 4-2 ways of handling a dhcp packet without option 82 sub-option configuration the dhcp-snoop...

  • Page 475

    4-5 client cannot be recorded in the dhcp-snooping table. Consequently, this client cannot pass the ip filtering of the dhcp-snooping table, thus it cannot access external networks. To solve this problem, the switch supports the configuration of static binding table entries, that is, the binding rel...

  • Page 476

    4-6 z if an s4500 ethernet switch is enabled with dhcp snooping, the clients connected to it cannot dynamically obtain ip addresses through bootp. Z you need to specify the ports connected to the valid dhcp servers as trusted to ensure that dhcp clients can obtain valid ip addresses. The trusted por...

  • Page 477

    4-7 configuring a handling policy for dhcp packets with option 82 follow these steps to configure a handling policy for dhcp packets with option 82: to do… use the command… remarks enter system view system-view — configure a global handling policy for requests that contain option 82 dhcp-snooping in...

  • Page 478

    4-8 configuring the circuit id sub-option follow these steps to configure the circuit id sub-option: to do… use the command… remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — configure the circuit id sub-option in option 82 dhcp-snooping inf...

  • Page 479

    4-9 to do… use the command… remarks configure the remote id sub-option in ethernet port view dhcp-snooping information [ vlan vlan-id ] remote-id string string optional by default, the remote id sub-option is the mac address of the dhcp snooping device that received the client’s request. Z if you co...

  • Page 480

    4-10 to do… use the command… remarks enable ip filtering based on the dhcp-snooping table and the ip static binding table ip check source ip-address [ mac-address ] enable ip filtering enable ip filtering based on authenticated 802.1x clients ip check dot1x enable either command is required by defau...

  • Page 482

    4-12 # enable dhcp-snooping option 82 support. [switch] dhcp-snooping information enable # set the remote id sub-option in option 82 to the system name (sysname) of the dhcp snooping device. [switch] dhcp-snooping information remote-id sysname # set the circuit id sub-option in dhcp packets from vla...

  • Page 483

    4-13 # specify ethernet 1/0/1 as the trusted port. [switch] interface ethernet 1/0/1 [switch-ethernet1/0/1] dhcp-snooping trust [switch-ethernet1/0/1] quit # enable ip filtering on ethernet 1/0/2, ethernet 1/0/3, and ethernet 1/0/4 to filter packets based on the source ip addresses/mac addresses. [s...

  • Page 484

    5-1 5 dhcp packet rate limit configuration when configuring the dhcp packet rate limit function, go to these sections for information you are interested in: z introduction to dhcp packet rate limit z configuring dhcp packet rate limit z rate limit configuration example introduction to dhcp packet ra...

  • Page 485

    5-2 configuring dhcp packet rate limit configuring dhcp packet rate limit follow these steps to configure rate limit of dhcp packets: to do… use the command… remarks enter system view system-view — enter port view interface interface-type interface-number — enable the dhcp packet rate limit function...

  • Page 486

    5-3 rate limit configuration example network requirements as shown in figure 5-1 , ethernet 1/0/1 of the s4500 switch is connected to the dhcp server. Ethernet 1/0/2 is connected to client b and ethernet 1/0/11 is connected to client a. Z enable dhcp snooping on the switch, and specify ethernet 1/0/...

  • Page 487

    5-4 [sysname-ethernet1/0/11] dhcp rate-limit 100

  • Page 488

    6-1 6 dhcp/bootp client configuration when configuring the dhcp/bootp client, go to these sections for information you are interested in: z introduction to dhcp client z introduction to bootp client z configuring a dhcp/bootp client z displaying dhcp/bootp client configuration introduction to dhcp c...

  • Page 489

    6-2 configuring a dhcp/bootp client follow these steps to configure a dhcp/bootp client: to do… use the command… remarks enter system view system-view — enter vlan interface view interface vlan-interface vlan-id — configure the vlan interface to obtain ip address through dhcp or bootp ip address { b...

  • Page 490

    6-3 dhcp client configuration example network requirements using dhcp, vlan-interface 1 of switch b is connected to the lan to obtain an ip address from the dhcp server. Network diagram see figure 2-1 . Configuration procedure the following describes only the configuration on switch b serving as a d...

  • Page 491: Table of Contents

    I table of contents 1 acl configuration·····································································································································1-1 acl overview ···············································································································...

  • Page 492: Acl Configuration

    1-1 1 acl configuration when configuring acl, go to these sections for information you are interested in: z acl overview z acl configuration task list z displaying and maintaining acl configuration z examples for upper-layer software referencing acls z examples for applying acls to hardware acl over...

  • Page 493

    1-2 depth-first match order for rules of a basic acl 1) range of source ip address: the smaller the source ip address range (that is, the more the number of zeros in the wildcard mask), the higher the match priority. 2) fragment keyword: a rule with the fragment keyword is prior to others. 3) if the...

  • Page 494

    1-3 z referenced by routing policies z used to control telnet, snmp and web login users z when an acl is directly applied to hardware for packet filtering, the switch will permit packets if the packets do not match the acl. Z when an acl is referenced by upper-layer software to control telnet, snmp ...

  • Page 495

    1-4 an absolute time range on switch 4500 series can be within the range 1970/1/1 00:00 to 2100/12/31 24:00. Configuration procedure follow these steps to configure a time range: to do... Use the command... Remarks enter system view system-view — create a time range time-range time-name { start-time...

  • Page 496

    1-5 system-view [sysname] time-range test from 15:00 1/28/2006 to 15:00 1/28/2008 [sysname] display time-range test current time is 13:30:32 apr/16/2005 saturday time-range : test ( inactive ) from 15:00 jan/28/2006 to 15:00 jan/28/2008 configuring basic acl a basic acl filters packets based on thei...

  • Page 497

    1-6 configuration example # configure acl 2000 to deny packets whose source ip addresses are 192.168.0.1. System-view [sysname] acl number 2000 [sysname-acl-basic-2000] rule deny source 192.168.0.1 0 # display the configuration information of acl 2000. [sysname-acl-basic-2000] display acl 2000 basic...

  • Page 498

    1-7 note that: z with the config match order specified for the advanced acl, you can modify any existent rule. The unmodified part of the rule remains. With the auto match order specified for the acl, you cannot modify any existent rule; otherwise the system prompts error information. Z if you do no...

  • Page 501

    1-10 acl's step is 1 rule 0 deny 06 ff 27 applying acl rules on ports by applying acl rules on ports, you can filter packets on the corresponding ports. Configuration prerequisites you need to define an acl before applying it on a port. For information about defining an acl, refer to configuring bas...

  • Page 503

    1-12 configuration procedure # define acl 2000. System-view [sysname] acl number 2000 [sysname-acl-basic-2000] rule 1 permit source 10.110.100.52 0 [sysname-acl-basic-2000] quit # reference acl 2000 on vty user interface to control telnet login users. [sysname] user-interface vty 0 4 [sysname-ui-vty...

  • Page 504

    1-13 network diagram figure 1-3 network diagram for basic acl configuration configuration procedure # define a periodic time range that is active from 8:00 to 18:00 everyday. System-view [sysname] time-range test 8:00 to 18:00 daily # define acl 2000 to filter packets with the source ip address of 1...

  • Page 505

    1-14 configuration procedure # define a periodic time range that is active from 8:00 to 18:00 everyday. System-view [sysname] time-range test 8:00 to 18:00 working-day # define acl 3000 to filter packets destined for wage query server. [sysname] acl number 3000 [sysname-acl-adv-3000] rule 1 deny ip ...

  • Page 506

    1-15 user-defined acl configuration example network requirements as shown in figure 1-6 , pc 1 and pc 2 are connected to the switch through ethernet 1/0/1 and ethernet 1/0/2 respectively. They belong to vlan 1 and access the internet through the same gateway, which has an ip address of 192.168.0.1 (...

  • Page 507

    1-16 network diagram figure 1-7 network diagram for applying an acl to a vlan eth1/0/1 pc 1 pc 3 database server pc 2 vlan 10 eth1/0/2 eth1/0/3 192.168.1.2 configuration procedure # define a periodic time range that is active from 8:00 to 18:00 in working days. System-view [sysname] time-range test ...

  • Page 508: Table of Contents

    I table of contents 1 qos configuration·····································································································································1-1 overview ···················································································································...

  • Page 509: Qos Configuration

    1-1 1 qos configuration when configuring qos, go to these sections for information you are interested in: z overview z qos supported by switch 4500 series z qos configuration z displaying and maintaining qos z qos configuration examples overview introduction to qos quality of service (qos) is a conc...

  • Page 510

    1-2 and vod. As for other applications, such as transaction processing and telnet, although bandwidth is not as critical, a too long delay may cause unexpected results. That is, they need to get serviced in time even if congestion occurs. Newly emerging applications demand higher service performance...

  • Page 511

    1-3 qos supported by switch 4500 series the switch 4500 series support the qos features listed in table 1-1 : table 1-1 qos features supported by switch 4500 series qos feature description refer to … traffic classification classify incoming traffic based on acls. The switch 4500 series support the f...

  • Page 512

    1-4 protocol or the port number of an application. Normally, traffic classification is done by checking the information carried in packet header. Packet payload is rarely adopted for traffic classification. The identifying rule is unlimited in range. It can be a quintuplet consisting of source addre...

  • Page 513

    1-5 z assured forwarding (af) class: this class is further divided into four subclasses (af1/2/3/4) and a subclass is further divided into three drop priorities, so the af service level can be segmented. The qos rank of the af class is lower than that of the ef class; z class selector (cs) class: th...

  • Page 514

    1-6 2) 802.1p priority 802.1p priority lies in layer 2 packet headers and is applicable to occasions where the layer 3 packet header does not need analysis but qos must be assured at layer 2. Figure 1-3 an ethernet frame with an 802.1q tag header as shown in the figure above, the 4-byte 802.1q tag h...

  • Page 515

    1-7 priority trust mode after a packet enters a switch, the switch sets the 802.1p priority and local precedence for the packet according to its own capability and the corresponding rules. 1) for a packet carrying no 802.1q tag when a packet carrying no 802.1q tag reaches the port of a switch, the s...

  • Page 516

    1-8 priority marking the priority marking function is to reassign priority for the traffic matching an acl referenced for traffic classification. Z if 802.1p priority marking is configured, the traffic will be mapped to the local precedence corresponding to the re-marked 802.1p priority and assigned...

  • Page 517

    1-9 enough to forward the packets, the traffic is conforming to the specification; otherwise, the traffic is nonconforming or excess. Parameters concerning token bucket include: z average rate: the rate at which tokens are put into the bucket, namely, the permitted average rate of the traffic. It is...

  • Page 518

    1-10 the switch 4500 series support three queue scheduling algorithms: strict priority (sp) queuing, weighted fair queuing (wfq), and weighted round robin (wrr) queuing. 1) sp queuing figure 1-6 diagram for sp queuing sp queue-scheduling algorithm is specially designed for critical service applicati...

  • Page 519

    1-11 figure 1-7 diagram for wfq queuing before wfq is introduced, you must understand fair queuing (fq) first. Fq is designed for the purpose of sharing network resources fairly and optimizing the delays and delay jitters of all the flows. It takes the interests of all parties into account, such as:...

  • Page 520

    1-12 figure 1-8 diagram for wrr queuing wrr queue-scheduling algorithm schedules all the queues in turn and every queue can be assured of a certain service time. In a typical 3com switch there are eight output queues on each port. Wrr configures a weight value for each queue, for example: w7, w6, w5...

  • Page 521

    1-13 in wred algorithm, an upper limit and a lower limit are set for each queue, and the packets in a queue are processed as follows. Z when the current queue length is smaller than the lower limit, no packet is dropped; z when the queue length exceeds the upper limit, all the newly received packets...

  • Page 522

    1-14 configuration procedure follow these steps to configure to trust port priority: to do… use the command… remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — configure to trust port priority and configure the port priority priority priority...

  • Page 523

    1-15 configuration procedure follow these steps to configure the mapping between 802.1p priority and local precedence: to do… use the command… remarks enter system view system-view — configure the mapping between 802.1p priority and local precedence qos cos-local-precedence-map cos0-map-local-prec c...

  • Page 524

    1-16 configuration example z set the ip precedence of icmp packets to 3. Z display the configuration. Configuration procedure: system-view [sysname] protocol-priority protocol-type icmp ip-precedence 3 [sysname] display protocol-priority protocol: icmp ip-precedence: flash(3) marking packet priority...

  • Page 526

    1-18 to do… use the command… remarks configure traffic policing traffic-limit inbound acl-rule [ union-effect ] target-rate [ burst-bucket burst-bucket-size ] [ exceed action ] required specify a committed information rate (cir) for the target-rate argument, and specify a committed bust size (cbs) f...

  • Page 529

    1-21 z the queue scheduling algorithm specified by using the queue-scheduler command in system view takes effect on all the ports. The queue scheduling algorithm configured in port view must be the same as that configured in system view. Otherwise, the system prompts configuration errors. Z if the w...

  • Page 530

    1-22 to do… use the command… remarks enter system view system-view — enter ethernet port view interface interface-type interface-number — configure wred wred queue-index qstart probability required by default, wred is not configured. Configuration example configure wred for queue 2 of ethernet 1/0/1...

  • Page 531

    1-23 for information about the mirroring-groupmonitor-port command and the monitor-port command, refer to the part talking about mirroring. Configuration example network requirements: z ethernet 1/0/1 is connected to the 10.1.1.0/24 network segment. Z duplicate the packets from network segment 10.1....

  • Page 532

    1-24 qos configuration examples configuration example of traffic policing and line rate network requirement an enterprise network connects all the departments through an ethernet switch. Pc 1, with the ip address 192.168.0.1 belongs to the r&d department and is connected to ethernet 1/0/1 of the swi...

  • Page 533

    1-25 configuration example of priority marking and queue scheduling network requirements as shown in figure 1-10 , an enterprise network connects all the departments through an ethernet switch. Clients pc 1 through pc 3 are connected to ethernet 1/0/1 of the switch; clients pc 4 through pc 6 are con...

  • Page 534

    1-26 [sysname-ethernet1/0/2] traffic-priority inbound ip-group 3000 rule 1 local-precedence 3 [sysname-ethernet1/0/2] traffic-priority inbound ip-group 3000 rule 2 local-precedence 2 [sysname-ethernet1/0/2] quit 3) configure queue scheduling # apply sp queue scheduling algorithm. [sysname] queue-sch...

  • Page 535

    1-27 configuration procedure # create customer vlans vlan 100 and vlan 200 and service vlans vlan 500 and vlan 600 on switch a. System-view [switcha] vlan 100 [switcha-vlan100] quit [switcha] vlan 200 [switcha-vlan200] quit [switcha] vlan 500 [switcha-vlan500] quit [switcha] vlan 600 [switcha-vlan60...

  • Page 536

    1-28 # configure vlan mapping on ethernet 1/0/11 to replace vlan tag 100 with vlan tag 500. [switcha] interface ethernet 1/0/11 [switcha-ethernet1/0/11] traffic-remark-vlanid inbound link-group 4000 remark-vlan 500 [switcha-ethernet1/0/11] quit # configure vlan mapping on ethernet 1/0/12 to replace ...

  • Page 537: Table of Contents

    I table of contents 1 mirroring configuration ····························································································································1-1 mirroring overview ···········································································································...

  • Page 538: Mirroring Configuration

    1-1 1 mirroring configuration when configuring mirroring, go to these sections for information you are interested in: z mirroring overview z mirroring configuration z displaying and maintaining port mirroring z mirroring configuration examples mirroring overview mirroring is to duplicate packets fro...

  • Page 539

    1-2 remote port mirroring remote port mirroring does not require the source and destination ports to be on the same device. The source and destination ports can be located on multiple devices across the network. This allows an administrator to monitor traffic on remote devices conveniently. To imple...

  • Page 540

    1-3 intermediate switch trunk port sends mirrored packets to the destination switch. Two trunk ports are necessary for the intermediate switch to connect the devices at the source switch side and the destination switch side. Trunk port receives remote mirrored packets. Destination switch destination...

  • Page 541

    1-4 configuring local port mirroring configuration prerequisites z the source port is determined and the direction in which the packets are to be mirrored is determined. Z the destination port is determined. Configuration procedure follow these steps to configure port mirroring on switch 4500 series...

  • Page 542

    1-5 configuration on a switch acting as a source switch 1) configuration prerequisites z the source port, the reflector port, and the remote-probe vlan are determined. Z layer 2 connectivity is ensured between the source and destination switches over the remote-probe vlan. Z the direction of the pac...

  • Page 543

    1-6 cannot be configured with functions like vlan-vpn, port loopback detection, packet filtering, qos, port security, and so on. Z you cannot modify the duplex mode, port rate, and mdi attribute of a reflector port. Z only an existing static vlan can be configured as the remote-probe vlan. To remove...

  • Page 544

    1-7 to do… use the command… remarks enter system view system-view — create a vlan and enter vlan view vlan vlan-id v lan-id is the id of the remote-probe vlan. Configure the current vlan as a remote-probe vlan remote-probe vlan enable required return to system view quit — enter the view of the ether...

  • Page 545

    1-8 mirroring configuration examples local port mirroring configuration example network requirements the departments of a company connect to each other through switch 4500 series: z research and development (r&d) department is connected to switch c through ethernet 1/0/1. Z marketing department is c...

  • Page 546

    1-9 ethernet1/0/1 both ethernet1/0/2 both monitor port: ethernet1/0/3 after the configurations, you can monitor all packets received on and sent from the r&d department and the marketing department on the data detection device. Remote port mirroring configuration example network requirements the dep...

  • Page 547

    1-10 configuration procedure 1) configure the source switch (switch a) # create remote source mirroring group 1. System-view [sysname] mirroring-group 1 remote-source # configure vlan 10 as the remote-probe vlan. [sysname] vlan 10 [sysname-vlan10] remote-probe vlan enable [sysname-vlan10] quit # con...

  • Page 548

    1-11 [sysname-ethernet1/0/2] port trunk permit vlan 10 3) configure the destination switch (switch c) # create remote destination mirroring group 1. System-view [sysname] mirroring-group 1 remote-destination # configure vlan 10 as the remote-probe vlan. [sysname] vlan 10 [sysname-vlan10] remote-prob...

  • Page 549: Table of Contents

    I table of contents 1 xrn fabric configuration·························································································································1-1 introduction to xrn··············································································································...

  • Page 550: Xrn Fabric Configuration

    1-1 1 xrn fabric configuration when configuring xrn fabric, go to these sections for information you are interested in: z introduction to xrn z xrn fabric configuration z displaying and maintaining xrn fabric z xrn fabric configuration example introduction to xrn expandable resilient networking (xrn...

  • Page 551

    1-2 figure 1-2 port connection mode for switch 4500 series bus topology xrn fabric mode green=speed yellow=duplex rps pwr console unit 1000 base - x 1 speed : green=100mbps , yellow=10mbps 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 duplx : green=full duplx , yellow=half...

  • Page 552

    1-3 z the number of the existing devices in the fabric does not reach the maximum number of devices allowed by the fabric (up to eight devices can form a fabric). Z the fabric name of the device and the existing devices in the fabric are the same. Z the software version of the device is the same as ...

  • Page 553

    1-4 status analysis solution of the fabric are not the same, or the password configured does not match. Passwords for the local device and the fabric as the same. How xrn works when a fabric is established, the devices determine their respective roles in the fabric by comparing their cpu mac address...

  • Page 554

    1-5 task remarks fabric setting a unit id for a switch optional assigning a unit name to a switch optional assigning an xrn fabric name to a switch optional setting the xrn fabric authentication mode optional specifying the fabric port of a switch you can specify the fabric port of a switch in eithe...

  • Page 555

    1-6 z establishing an xrn system requires a high consistency of the configuration of each device. Hence, before you enable the fabric port, do not perform any configuration for the port, and do not configure some functions that affect the xrn for other ports or globally. Otherwise, you cannot enable...

  • Page 556

    1-7 setting a unit id for a switch on the switches that support automatic numbering, ftm will automatically number the switches to constitute an xrn fabric by default, so that each switch has a unique unit id in the fabric. You can use the command in the following table to set unit ids for switches....

  • Page 557

    1-8 z if auto-numbering is selected, the system sets the unit priority to 10. You can use the fabric save-unit-id command to save the modified unit id into the unit flash memory and clear the information about the existing one. Priority is the reference for ftm program to perform automatic numbering...

  • Page 559

    1-10 network diagram figure 1-3 network diagram for forming an xrn fabric configuration procedure 1) configure switch a. # configure fabric ports. System-view [sysname] fabric-port gigabitethernet1/0/25 enable # configure the unit name as unit 1 . [sysname] set unit 1 name unit1 # configure the fabr...

  • Page 560

    1-11 # configure the unit name as unit 3 . [sysname] set unit 1 name unit3 # configure the fabric name as hello . [sysname] sysname hello # configure the fabric authentication mode as simple and the password as welcome . [hello] xrn-fabric authentication-mode simple welcome 4) configure switch d. # ...

  • Page 561: Table of Contents

    I table of contents 1 cluster ························································································································································1-1 cluster overview··································································································...

  • Page 562: Cluster

    1-1 1 cluster when configuring cluster, go to these sections for information you are interested in: z cluster overview z cluster configuration task list z displaying and maintaining cluster configuration z cluster configuration examples cluster overview introduction to hgmp a cluster contains a grou...

  • Page 563

    1-2 figure 1-1 a cluster implementation hgmp v2 has the following advantages: z it eases the configuration and management of multiple switches: you just need to configure a public ip address for the management device instead of for all the devices in the cluster; and then you can configure and manag...

  • Page 564

    1-3 table 1-1 description on cluster roles role configuration function management device configured with a external ip address z provides an interface for managing all the switches in a cluster z manages member devices through command redirection, that is, it forwards the commands intended for speci...

  • Page 565

    1-4 z a candidate device becomes a member device after being added to a cluster. Z a member device becomes a candidate device after it is removed from the cluster. Z a management device becomes a candidate device only after the cluster is removed. After you create a cluster on a switch 4500 switch, ...

  • Page 566

    1-5 packet data. The receiving devices store the information carried in the ndp packet into the ndp table but do not forward the ndp packet. When they receive another ndp packet, if the information carried in the packet is different from the stored one, the corresponding entry in the ndp table is up...

  • Page 567

    1-6 z to implement ntdp, you need to enable ntdp both globally and on specific ports on the management device, and configure ntdp parameters. Z on member/candidate devices, you only need to enable ntdp globally and on specific ports. Z member and candidate devices adopt the ntdp settings of the mana...

  • Page 568

    1-7 figure 1-3 state machine of the connection between the management device and a member device receives the handshake or management packets fails to receive handshake packets in three consecutive intervals state holdtime exceeds the specified value disconnect state is recovered active connect disc...

  • Page 569

    1-8 z enabling the management packets (including ndp packets, ntdp packets, and handshake packets) to be transmitted in the management vlan only, through which the management packets are isolated from other packets and network security is improved. Z enabling the management device and the member dev...

  • Page 570

    1-9 downstream switch compares its own mac address with the destination mac address carried in the multicast packet: z if the two mac addresses are the same, the downstream switch sends a response to the switch sending the tracemac command, indicating the success of the tracemac command. Z if the tw...

  • Page 571

    1-10 task remarks enabling ntdp globally and on a specific port required configuring ntdp-related parameters optional enabling the cluster function required configuring cluster parameters required configuring inside-outside interaction for a cluster optional configuring the network management interf...

  • Page 572

    1-11 to do… use the command… remarks enter system view system-view — configure the holdtime of ndp information ndp timer aging aging-in-seconds optional by default, the holdtime of ndp information is 180 seconds. Configure the interval to send ndp packets ndp timer hello seconds optional by default,...

  • Page 573

    1-12 enabling the cluster function follow these steps to enable the cluster function: to do… use the command… remarks enter system view system-view — enable the cluster function globally cluster enable required by default, the cluster function is enabled. Configuring cluster parameters the establish...

  • Page 575

    1-14 follow these steps to configure the network management interface for a cluster: to do… use the command… remarks enter system view system-view — enter cluster view cluster required configure the network management (nm) interface for the cluster nm - interface vlan - interface vlan-id required by...

  • Page 576

    1-15 to reduce the risk of being attacked by malicious users against opened socket and enhance switch security, the switch 4500 series ethernet switches provide the following functions, so that a cluster socket is opened only when it is needed: z opening udp port 40000 (used for cluster) only when t...

  • Page 577

    1-16 to do… use the command… remarks enter ethernet port view interface interface-type interface-number — enable ntdp on the port ntdp enable required enabling the cluster function follow these steps to enable the cluster function: to do… use the command… remarks enter system view system-view — enab...

  • Page 579

    1-18 configuring the enhanced cluster features complete the following tasks to configure the enhanced cluster feature: task remarks configuring cluster topology management function required configuring cluster device blacklist required configuring cluster topology management function 1) configuratio...

  • Page 580

    1-19 if the management device of a cluster is a slave device in an xrn fabric, the standard topology information is saved only to the local flash of the master device in the xrn fabric. Configuring cluster device blacklist follow these steps to configure the cluster device blacklist on a management ...

  • Page 582

    1-21 network diagram figure 1-4 network diagram for hgmp cluster configuration internet eth 1/0/1 eth 1/0/3 eth 1/0/2 eth 1/0/1 eth 1/0/1 69.172.55.4 snmp/logging host(nms) ftp/tftp server 63.172 .55.1 163.172 .55.1 vlan-interface 2 management device cluster member device mac: 000f .E201. 0011 mac: ...

  • Page 583

    1-22 [sysname] ndp enable [sysname] undo ndp enable interface ethernet 1/0/1 [sysname] interface ethernet 1/0/1 [sysname-ethernet1/0/1] undo ntdp enable [sysname-ethernet1/0/1] quit # enable ndp on ethernet 1/0/2 and ethernet 1/0/3. [sysname] interface ethernet 1/0/2 [sysname-ethernet1/0/2] ndp enab...

  • Page 584

    1-23 [sysname-cluster] build aaa [aaa_0.Sysname-cluster] # add the attached two switches to the cluster. [aaa_0.Sysname-cluster] add-member 1 mac-address 000f-e201-0011 [aaa_0.Sysname-cluster] add-member 17 mac-address 000f-e201-0012 # set the holdtime of member device information to 100 seconds. [a...

  • Page 585

    1-24 network management interface configuration example network requirements z configure vlan-interface 2 as the network management interface of the switch; z configure vlan 3 as the management vlan; z the ip address of the ftp server is 192.168.4.3; z switch a operates as the management switch; z s...

  • Page 586

    1-25 # set the ip address of vlan-interface 2 to 192.168.4.22. [sysname] interface vlan-interface 2 [sysname-vlan-interface2] ip address 192.168.4.22 255.255.255.0 [sysname-vlan-interface2] quit # enable the cluster function. [sysname] cluster enable # enter cluster view. [sysname] cluster [sysname-...

  • Page 587

    1-26 network diagram figure 1-6 network diagram for the enhanced cluster feature configuration ftp server 192. 168.0.4 2 4 3 192. 168.0.1 0001- 2034-a0e5 management device member device member device member device 1 configuration procedure # enter cluster view. System-view [aaa_0.Sysname] cluster # ...

  • Page 588: Table of Contents

    I table of contents 1 poe configuration ·····································································································································1-1 poe overview ··············································································································...

  • Page 589: Poe Configuration

    1-1 1 poe configuration when configuring poe, go to these sections for information you are interested in: z poe overview z poe configuration z poe configuration example poe overview introduction to poe power over ethernet (poe)-enabled devices use twisted pairs through electrical ports to supply pow...

  • Page 590

    1-2 z through the fixed 24/48 ethernet electrical ports, it can supply power to up to 24/48 remote ethernet switches with a maximum distance of 100 m (328 feet). Z each ethernet electrical port can supply at most a power of 15,400 mw to a pd. Z when ac power input is adopted for the switch, the maxi...

  • Page 591

    1-3 task remarks configuring poe over-temperature protection on the switch upgrading the pse processing software of fabric switches online optional displaying poe configuration optional enabling the poe feature on a port follow these steps to enable the poe feature on a port: to do… use the command…...

  • Page 592

    1-4 z auto : when the switch is close to its full load in supplying power, it will first supply power to the pds that are connected to the ports with critical priority, and then supply power to the pds that are connected to the ports with high priority. For example: port a has the priority of critic...

  • Page 593

    1-5 configuring the pd compatibility detection function after the pd compatibility detection function is enabled, the switch can detect the pds that do not conform to the 802.3af standard and supply power to them. After the poe feature is enabled, perform the following configuration to enable the pd...

  • Page 594

    1-6 z when the internal temperature of the switch decreases from x (x>65°c, or x>149°f) to y (60°c ≤ y ≤ y ports. Z when the internal temperature of the switch increases from x (x (60°c ≤ 65°c, or 140°f ≤ 149°f), the switch still keeps the poe function enabled on all the ports. Upgrading the pse pro...

  • Page 596

    1-8 network diagram figure 1-1 network diagram for poe configuration procedure # upgrade the pse processing software online. System-view [switcha] poe update refresh 0290_021.S19 # enable the poe feature on ethernet 1/0/1, and set the poe maximum output power of ethernet 1/0/1 to 12,000 mw. [switcha...

  • Page 597: Poe Profile Configuration

    2-1 2 poe profile configuration when configuring poe profile, go to these sections for information you are interested in: z introduction to poe profile z poe profile configuration z displaying poe profile configuration z poe profile configuration example introduction to poe profile on a large-sized ...

  • Page 600

    2-4 network diagram figure 2-1 poe profile application network ip phone switch a ap ip phone ip phone ip phone ap ap ap eth1/0/1~eth1/0/5 eth1/0/6~eth1/0/10 configuration procedure # create profile 1, and enter poe profile view. System-view [switcha] poe-profile profile1 # in profile 1, add the poe ...

  • Page 601

    2-5 [switcha-poe-profile-profile2] poe mode signal [switcha-poe-profile-profile2] poe priority high [switcha-poe-profile-profile2] poe max-power 15400 [switcha-poe-profile-profile2] quit # display detailed configuration information for profile2. [switcha] display poe-profile name profile2 poe-profil...

  • Page 602: Table of Contents

    I table of contents 1 udp helper configuration ························································································································1-1 introduction to udp helper ······································································································...

  • Page 603: Udp Helper Configuration

    1-1 1 udp helper configuration when configuring udp helper, go to these sections for information you are interested in: z introduction to udp helper z configuring udp helper z displaying and maintaining udp helper z udp helper configuration example introduction to udp helper sometimes, a host needs ...

  • Page 605

    1-3 to do… use the command… remarks clear statistics about packets forwarded by udp helper reset udp-helper packet available in user view udp helper configuration example cross-network computer search through udp helper network requirements pc a resides on network segment 192.168.1.0/24 and pc b on ...

  • Page 606: Table of Contents

    I table of contents 1 snmp configuration··································································································································1-1 snmp overview·················································································································...

  • Page 607: Snmp Configuration

    1-1 1 snmp configuration when configuring snmp, go to these sections for information you are interested in: z snmp overview z configuring basic snmp functions z configuring trap-related functions z enabling logging for network management z displaying snmp z snmp configuration example snmp overview t...

  • Page 608

    1-2 z set the permission for a community to access an mib object to be read-only or read-write. Communities with read-only permissions can only query the switch information, while those with read-write permission can configure the switch as well. Z set the basic acl specified by the community name. ...

  • Page 613

    1-7 z perform the following configuration on switch a: setting the community name and access permission, administrator id, contact and switch location, and enabling the switch to sent traps. Thus, the nms is able to access switch a and receive the traps sent by switch a. Network diagram figure 1-2 n...

  • Page 614

    1-8 [sysname] snmp-agent trap enable standard linkdown [sysname] snmp-agent target-host trap address udp-domain 10.10.10.1 udp-port 5000 params securityname public configuring the nms authentication-related configuration on an nms must be consistent with that of the devices for the nms to manage the...

  • Page 615: Rmon Configuration

    2-1 2 rmon configuration when configuring rmon, go to these sections for information you are interested in: z introduction to rmon z rmon configuration z displaying rmon z rmon configuration example introduction to rmon remote monitoring (rmon) is a kind of mib defined by internet engineering task f...

  • Page 616

    2-2 statistics and performance statistics of the network segments to which the ports of the managed network devices are connected. Thus, the nms can further manage the networks. Commonly used rmon groups event group event group is used to define the indexes of events and the processing methods of th...

  • Page 617

    2-3 statistics group statistics group contains the statistics of each monitored port on a switch. An entry in a statistics group is an accumulated value counting from the time when the statistics group is created. The statistics include the number of the following items: collisions, packets with cyc...

  • Page 618

    2-4 z the rmon alarm and rmon prialarm commands take effect on existing nodes only. Z for each port, only one rmon statistics entry can be created. That is, if an rmon statistics entry is already created for a given port, you will fail to create another statistics entry with a different index for th...

  • Page 619

    2-5 [sysname-ethernet1/0/1] quit # add the event entries numbered 1 and 2 to the event table, which will be triggered by the following extended alarm. [sysname] rmon event 1 log [sysname] rmon event 2 trap 10.21.30.55 # add an entry numbered 2 to the extended alarm table to allow the system to calcu...

  • Page 620: Table of Contents

    I table of contents 1 ntp configuration ·····································································································································1-1 introduction to ntp ·······································································································...

  • Page 621: Ntp Configuration

    1-1 1 ntp configuration when configuring ntp, go to these sections for information you are interested in: z introduction to ntp z ntp configuration task list z configuring ntp implementation modes z configuring access control right z configuring ntp authentication z configuring optional ntp paramete...

  • Page 622

    1-2 z defining the accuracy of clocks by stratum to synchronize the clocks of all devices in a network quickly z supporting access control (see section configuring access control right ) and md5 encrypted authentication (see section configuring ntp authentication ) z sending protocol packets in unic...

  • Page 623

    1-3 figure 1-1 implementation principle of ntp ip network ip network ip network ip network device b device a device b device a device b device a device b device a 10:00:00 am 11:00:01 am 10:00:00 am ntp message 10:00:00 am 11:00:01 am 11:00:02 am ntp message ntp message ntp message received at 10:00...

  • Page 624

    1-4 server/client mode figure 1-2 server/client mode symmetric peer mode figure 1-3 symmetric peer mode passive peer clock synchronization request packet synchronize network active peer works in passive peer mode automatically in peer mode, both sides can be synchronized to each other response packe...

  • Page 625

    1-5 multicast mode figure 1-5 multicast mode table 1-1 describes how the above mentioned ntp modes are implemented on 3com s4500 series ethernet switches. Table 1-1 ntp implementation modes on 3com s4500 series ethernet switches ntp implementation mode configuration on s4500 series switches server/c...

  • Page 626

    1-6 z when a 3com s4500 ethernet switch works in server mode or symmetric passive mode, you need not to perform related configurations on this switch but do that on the client or the symmetric-active peer. Z the ntp server mode, ntp broadcast mode, or ntp multicast mode takes effect only after the l...

  • Page 627

    1-7 z execution of one of the ntp-service unicast-server , ntp-service unicast-peer , ntp-service broadcast-client , ntp-service broadcast-server , ntp-service multicast-client , and ntp-service multicast-server commands enables the ntp feature and opens udp port 123 at the same time. Z execution of...

  • Page 630

    1-10 to do… use the command… remarks enter system view system-view — enter vlan interface view interface vlan-interface vlan-id — configure the switch to work in the ntp multicast client mode ntp-service multicast-client [ ip-address ] required not configured by default. Configuring access control r...

  • Page 631

    1-11 the access-control right mechanism provides only a minimum degree of security protection for the local switch. A more secure method is identity authentication. Configuring ntp authentication in networks with higher security requirements, the ntp authentication function must be enabled to run nt...

  • Page 632

    1-12 configuration procedure configuring ntp authentication on the client follow these steps to configure ntp authentication on the client: to do… use the command… remarks enter system view system-view — enable the ntp authentication function ntp-service authentication enable required disabled by de...

  • Page 633

    1-13 to do… use the command… remarks configure the specified key as a trusted key ntp-service reliable authentication-keyid key-id required by default, no trusted authentication key is configured. Enter vlan interface view interface vlan-interface vlan-id — configure on the ntp broadcast server ntp-...

  • Page 634

    1-14 if you have specified an interface in the ntp-service unicast-server or ntp-service unicast-peer command, this interface will be used for sending ntp messages. Configuring the number of dynamic sessions allowed on the local switch a single device can have a maximum of 128 associations at the sa...

  • Page 635

    1-15 to do… use the command… remarks display the information about the sessions maintained by ntp display ntp-service sessions [ verbose ] display the brief information about ntp servers along the path from the local device to the reference clock source display ntp-service trace configuration exampl...

  • Page 636

    1-16 [deviceb] display ntp-service status clock status: synchronized clock stratum: 3 reference clock id: 1.0.1.11 nominal frequency: 100.0000 hz actual frequency: 100.0000 hz clock precision: 2^18 clock offset: 0.66 ms root delay: 27.47 ms root dispersion: 208.39 ms peer dispersion: 9.63 ms referen...

  • Page 637

    1-17 configuration procedure z configure device c. # set device a as the ntp server. System-view [devicec] ntp-service unicast-server 3.0.1.31 z configure device b (after the device c is synchronized to device a). # enter system view. System-view # set device c as the peer of device b. [deviceb] ntp...

  • Page 638

    1-18 configuring ntp broadcast mode network requirements z the local clock of device c is set as the ntp master clock, with a stratum level of 2. Configure device c to work in the ntp broadcast server mode and send ntp broadcast messages through vlan-interface 2. Z device a and device d are two s450...

  • Page 639

    1-19 view the ntp status of device d after the clock synchronization. [deviced] display ntp-service status clock status: synchronized clock stratum: 3 reference clock id: 3.0.1.31 nominal frequency: 100.0000 hz actual frequency: 100.0000 hz clock precision: 2^18 clock offset: 198.7425 ms root delay:...

  • Page 640

    1-20 network diagram figure 1-9 network diagram for ntp multicast mode configuration configuration procedure z configure device c. # enter system view. System-view # set device c as a multicast server to send multicast messages through vlan-interface 2. [devicec] interface vlan-interface 2 [devicec-...

  • Page 641

    1-21 root dispersion: 208.39 ms peer dispersion: 9.63 ms reference time: 17:03:32.022 utc apr 2 2007 (bf422ae4.05aea86c) the output information indicates that device d is synchronized to device c, with a clock stratum level of 3, one stratum level lower than that device c. # view the information abo...

  • Page 642

    1-22 z to synchronize device b, you need to perform the following configurations on device a. # enable the ntp authentication function. System-view [devicea] ntp-service authentication enable # configure an md5 authentication key, with the key id being 42 and the key being anicekey. [devicea] ntp-se...

  • Page 643: Table of Contents

    I table of contents 1 ssh configuration·····································································································································1-1 ssh overview················································································································...

  • Page 644: Ssh Configuration

    1-1 1 ssh configuration when configuring ssh, go to these sections for information you are interested: z ssh overview z ssh server and client z displaying and maintaining ssh configuration z comparison of ssh commands with the same functions z ssh configuration examples ssh overview introduction to ...

  • Page 645

    1-2 the same key is used for both encryption and decryption. Supported symmetric key algorithms include des, 3des, and aes, which can effectively prevent data eavesdropping. Z asymmetric key algorithm asymmetric key algorithm is also called public key algorithm. Both ends have their own key pair, co...

  • Page 646

    1-3 currently, the switch supports only ssh2 version. Version negotiation z the server opens port 22 to listen to connection requests from clients. Z the client sends a tcp connection request to the server. After the tcp connection is established, the server sends the first packet to the client, whi...

  • Page 647

    1-4 z the server starts to authenticate the user. If authentication fails, the server sends an authentication failure message to the client, which contains the list of methods used for a new authentication process. Z the client selects an authentication type from the method list to perform authentic...

  • Page 648

    1-5 figure 1-2 network diagram for ssh connections configure the devices accordingly this document describes two cases: z the 3com switch acts as the ssh server to cooperate with software that supports the ssh client functions. Z the 3com switch acts as the ssh server to cooperate with another 3com ...

  • Page 649

    1-6 complete the following tasks to configure the ssh server: task remarks configuring the user interfaces for ssh clients required preparation configuring the ssh management functions optional key configuring key pairs required authentication creating an ssh user and specifying an authentication ty...

  • Page 651

    1-8 z you can configure a login header only when the service type is stelnet . For configuration of service types, refer to specifying a service type for an ssh user . Z for details of the header command, refer to the corresponding section in login command . Configuring key pairs the ssh server’s ke...

  • Page 652

    1-9 to do… use the command… remarks destroy the rsa key pair public-key local destroy rsa optional creating an ssh user and specifying an authentication type this task is to create an ssh user and specify an authentication type. Specifying an authentication type for a new user is a must to get the u...

  • Page 654

    1-11 if the ssh user service-type command is executed with a username that does not exist, the system will automatically create the ssh user. However, the user cannot log in unless you specify an authentication type for it. Configuring the public key of a client on the server this configuration is n...

  • Page 655

    1-12 to do... Use the command... Remarks enter system view system-view — import the public key from a public key file public-key peer keyname import sshkey filename required assigning a public key to an ssh user this configuration task is unnecessary if the ssh user’s authentication mode is password...

  • Page 656

    1-13 with the filename argument specified, you can export the rsa host public key to a file so that you can configure the key at a remote end by importing the file. If the filename argument is not specified, this command displays the host public key information on the screen in a specified format. C...

  • Page 657

    1-14 task remarks opening an ssh connection with publickey authentication required for publickey authentication; unnecessary for password authentication z for putty, it is recommended to use putty release 0.53; putty release 0.58 is also supported. For openssh, it is recommended to use openssh_3.1p1...

  • Page 658

    1-15 note that while generating the key pair, you must move the mouse continuously and keep the mouse off the green process bar in the blue box of shown in figure 1-4 . Otherwise, the process bar stops moving and the key pair generating process is stopped. Figure 1-4 generate the client keys (2) aft...

  • Page 659

    1-16 likewise, to save the private key, click save private key . A warning window pops up to prompt you whether to save the private key without any precaution. Click yes and enter the name of the file for saving the private key (“private” in this case) to save the private key. Figure 1-6 generate th...

  • Page 660

    1-17 figure 1-8 ssh client configuration interface 1 in the host name (or ip address) text box, enter the ip address of the server. Note that there must be a route available between the ip address of the server and the client. Selecting a protocol for remote connection as shown in figure 1-8 , selec...

  • Page 661

    1-18 figure 1-9 ssh client configuration interface 2 under protocol options , select 2 from preferred ssh protocol version . Some ssh client software, for example, tectia client software, supports the des algorithm only when the ssh1 version is selected. The putty client software supports des algori...

  • Page 662

    1-19 figure 1-10 ssh client configuration interface 3 click browse… to bring up the file selection window, navigate to the private key file and click open . If the connection is normal, a user will be prompted for a username. Once passing the authentication, the user can log in to the server. Config...

  • Page 663

    1-20 configuring whether first-time authentication is supported when the device connects to the ssh server as an ssh client, you can configure whether the device supports first-time authentication. Z with first-time authentication enabled, an ssh client that is not configured with the server host pu...

  • Page 664

    1-21 follow these steps to specify a source ip address/interface for the ssh client: to do... Use the command... Remarks enter system view system-view — specify a source ip address for the ssh client ssh2 source-ip ip-address optional by default, no source ip address is configured. Specify a source ...

  • Page 665

    1-22 to do... Use the command... Remarks display information about all ssh users display ssh user-information [ username ] display the current source ip address or the ip address of the source interface specified for the ssh server. Display ssh-server source-ip display the mappings between host publ...

  • Page 666

    1-23 the results of the display rsa local-key-pair public command or the public key converted with the sshkey tool contains no information such as the authentication type, so they cannot be directly used as parameters in the public-key peer command. For the same reason, neither can the results of th...

  • Page 667

    1-24 [switch-ui-vty0-4] authentication-mode scheme # enable the user interfaces to support ssh. [switch-ui-vty0-4] protocol inbound ssh [switch-ui-vty0-4] quit # create local client client001 , and set the authentication password to abc , protocol type to ssh, and command privilege level to 3 for th...

  • Page 668

    1-25 figure 1-13 ssh client configuration interface (2) under protocol options , select 2 from preferred ssh protocol version . 3) as shown in figure 1-13 , click open . If the connection is normal, you will be prompted to enter the user name client001 and password abc . Once authentication succeeds...

  • Page 669

    1-26 network diagram figure 1-14 switch acts as server for password and radius authentication configuration procedure 1) configure the radius server this document takes cams version 2.10 as an example to show the basic radius server configurations required. # add an access device. Log in to the cams...

  • Page 670

    1-27 figure 1-15 add an access device # add a user account for device management. From the navigation tree, select user management > user for device management , and then in the right pane, click add to enter the add account page and perform the following configurations: z add a user named hello , a...

  • Page 671

    1-28 generating the rsa key pair on the server is prerequisite to ssh login. # generate rsa key pairs. [switch] public-key local create rsa # set the authentication mode for the user interfaces to aaa. [switch] user-interface vty 0 4 [switch-ui-vty0-4] authentication-mode scheme # enable the user in...

  • Page 672

    1-29 figure 1-17 ssh client configuration interface (1) in the host name (or ip address) text box, enter the ip address of the ssh server. Z from the category on the left pane of the window, select connection > ssh . The window as shown in figure 1-18 appears. Figure 1-18 ssh client configuration in...

  • Page 673

    1-30 under protocol options , select 2 from preferred ssh protocol version . Then, click open . If the connection is normal, you will be prompted to enter the user name hello and the password. Once authentication succeeds, you will log in to the server. The level of commands that you can access afte...

  • Page 674

    1-31 [switch] user-interface vty 0 4 [switch-ui-vty0-4] authentication-mode scheme # enable the user interfaces to support ssh. [switch-ui-vty0-4] protocol inbound ssh [switch-ui-vty0-4] quit # configure the hwtacacs scheme. [switch] hwtacacs scheme hwtac [switch-hwtacacs-hwtac] primary authenticati...

  • Page 675

    1-32 in the host name (or ip address) text box, enter the ip address of the ssh server. 2) from the category on the left pane of the window, select connection > ssh . The window as shown in figure 1-21 appears. Figure 1-21 ssh client configuration interface (2) under protocol options , select 2 from...

  • Page 676

    1-33 configuration procedure z configure the ssh server # create a vlan interface on the switch and assign an ip address, which the ssh client will use as the destination for ssh connection. System-view [switch] interface vlan-interface 1 [switch-vlan-interface1] ip address 192.168.0.1 255.255.255.0...

  • Page 677

    1-34 figure 1-23 generate a client key pair (1) while generating the key pair, you must move the mouse continuously and keep the mouse off the green process bar shown in figure 1-24 . Otherwise, the process bar stops moving and the key pair generating process is stopped..

  • Page 678

    1-35 figure 1-24 generate a client key pair (2) after the key pair is generated, click save public key and enter the name of the file for saving the public key ( public in this case). Figure 1-25 generate a client key pair (3) likewise, to save the private key, click save private key . A warning win...

  • Page 679

    1-36 figure 1-26 generate a client key pair (4) after a public key pair is generated, you need to upload the pubic key file to the server through ftp or tftp, and complete the server end configuration before you continue to configure the client. # establish a connection with the ssh server 2) launch...

  • Page 680

    1-37 figure 1-28 ssh client configuration interface (2) under protocol options , select 2 from preferred ssh protocol version . 4) select connection / ssh / auth . The following window appears. Figure 1-29 ssh client configuration interface (3).

  • Page 681

    1-38 click browse to bring up the file selection window, navigate to the private key file and click ok . 5) from the window shown in figure 1-29 , click open . If the connection is normal, you will be prompted to enter the username. When switch acts as client for password authentication network requ...

  • Page 682

    1-39 [switchb-luser-client001] password simple abc [switchb-luser-client001] service-type ssh level 3 [switchb-luser-client001] quit # configure the authentication type of user client001 as password. [switchb] ssh user client001 authentication-type password z configure switch a # create a vlan inter...

  • Page 683

    1-40 configuration procedure z configure switch b # create a vlan interface on the switch and assign an ip address, which the ssh client will use as the destination for ssh connection. System-view [switchb] interface vlan-interface 1 [switchb-vlan-interface1] ip address 10.165.87.136 255.255.255.0 [...

  • Page 684

    1-41 system-view [switcha] interface vlan-interface 1 [switcha-vlan-interface1] ip address 10.165.87.137 255.255.255.0 [switcha-vlan-interface1] quit # generate a rsa key pair [switcha] public-key local create rsa # export the generated rsa key pair to a file named switch001. [switcha] public-key lo...

  • Page 685

    1-42 network diagram figure 1-32 switch acts as client and first-time authentication is not supported configuration procedure z configure switch b # create a vlan interface on the switch and assign an ip address for it to serve as the destination of the client. System-view [switchb] interface vlan-i...

  • Page 686

    1-43 # import the client’s public key file switch001 and name the public key as switch001. [switchb] public-key peer switch001 import sshkey switch001 # assign public key switch001 to user client001 [switchb] ssh user client001 assign publickey switch001 # export the generated rsa host public key pa...

  • Page 687

    1-44 # import the public key pair named switch002 from the file switch002. [switcha] public-key peer switch002 import sshkey switch002 # specify the host public key pair name of the server. [switcha] ssh client 10.165.87.136 assign publickey switch002 # establish the ssh connection to server 10.165....

  • Page 688: Table of Contents

    I table of contents 1 file system management configuration ·································································································1-1 file system configuration ··················································································································...

  • Page 689

    1-1 1 file system management configuration when configuring file system management, go to these sections for information you are interested in: z file system configuration z file attribute configuration z configuration file backup and restoration file system configuration introduction to file system...

  • Page 690

    1-2 directory operations the file system provides directory-related functions, such as: z creating/deleting a directory z displaying the current work directory, or contents in a specified directory follow these steps to perform directory-related operations: to do… use the command… remarks create a d...

  • Page 691

    1-3 to do… use the command… remarks rename a file rename fileurl - source fileurl - dest optional available in user view copy a file copy fileurl - source fileurl - dest optional available in user view move a file move fileurl - source fileurl - dest optional available in user view display the conte...

  • Page 692

    1-4 the format operation leads to the loss of all files, including the configuration files, on the flash memory and is irretrievable. Prompt mode configuration you can set the prompt mode of the current file system to alert or quiet . In alert mode, the file system will give a prompt for confirmatio...

  • Page 693

    1-5 directory of unit1>flash:/ 1 (*) -rw- 5822215 jan 01 1970 00:07:03 test.Bin 2 -rwh 4 apr 01 2000 23:55:49 snmpboots 3 -rwh 428 apr 02 2000 00:47:30 hostkey 4 -rwh 572 apr 02 2000 00:47:38 serverkey 5 -rw- 1220 apr 02 2000 00:06:57 song.Cfg 6 -rw- 26103 jan 01 1970 00:04:34 testv1r1.Bin 7 -rwh 88...

  • Page 694

    1-6 attribute name description feature identifier backup identifies backup startup files. The backup startup file is used after a switch fails to start up using the main startup file. In the flash memory, there can be only one app file, one configuration file and one web file with the backup attribu...

  • Page 695

    1-7 configuring file attributes you can configure and view the main attribute or backup attribute of the file used for the next startup of a switch, and change the main or backup attribute of the file. Follow these steps to configure file attributes: to do… use the command… remarks configure the app...

  • Page 696

    1-8 configuration file backup and restoration introduction to configuration file backup and restoration formerly, you can only back up and restore the configuration file of the units one by one in a fabric system. By using the configuration file backup and restoration feature, you can easily back up...

  • Page 697: Table of Contents

    I table of contents 1 ftp and sftp configuration····················································································································1-1 introduction to ftp and sftp ·······································································································...

  • Page 698: Ftp and Sftp Configuration

    1-1 1 ftp and sftp configuration when configuring ftp and sftp, go to these sections for information you are interested in: z introduction to ftp and sftp z ftp configuration z sftp configuration introduction to ftp and sftp introduction to ftp file transfer protocol (ftp) is commonly used in ip-bas...

  • Page 699

    1-2 files from an ftp server, and stops rotating when the file downloading is finished, as shown in figure 1-1 . Figure 1-1 clockwise rotating of the seven-segment digital led introduction to sftp secure ftp (sftp) is established based on an ssh2 connection. It allows a remote user to log in to a sw...

  • Page 701

    1-4 follow these steps to configure connection idle time: to do… use the command… remarks enter system view system-view — configure the connection idle time for the ftp server ftp timeout minutes optional 30 minutes by default specifying the source interface and source ip address for an ftp server y...

  • Page 702

    1-5 disconnecting a specified user on the ftp server, you can disconnect a specified user from the ftp server to secure the network. Follow these steps to disconnect a specified user: to do… use the command… remarks enter system view system-view — on the ftp server, disconnect a specified user from ...

  • Page 703

    1-6 figure 1-3 process of displaying a shell banner follow these steps to configure the banner display for an ftp server: to do… use the command… remarks enter system view system-view — configure a login banner header login text configure a shell banner header shell text required use either command ...

  • Page 705

    1-8 to do… use the command… remarks download a remote file from the ftp server get remotefile [ localfile ] upload a local file to the remote ftp server put localfile [ remotefile ] rename a file on the remote server rename remote - source remote-dest log in with the specified user name and password...

  • Page 706

    1-9 z the specified interface must be an existing one. Otherwise a prompt appears to show that the configuration fails. Z the value of the ip-address argument must be the ip address of the device where the configuration is performed. Otherwise a prompt appears to show that the configuration fails. Z...

  • Page 707

    1-10 [sysname] local-user switch [sysname-luser-switch] password simple hello [sysname-luser-switch] service-type ftp 2) configure the pc (ftp client) run an ftp client application on the pc to connect to the ftp server. Upload the application named switch.Bin to the root directory of the flash memo...

  • Page 708

    1-11 z if available space on the flash memory of the switch is not enough to hold the file to be uploaded, you need to delete files not in use from the flash memory to make room for the file, and then upload the file again. The files in use cannot be deleted. If you have to delete the files in use t...

  • Page 709

    1-12 configuration procedure 1) configure the switch (ftp server) # configure the login banner of the switch as “login banner appears” and the shell banner as “shell banner appears”. For detailed configuration of other network requirements, see section configuration example: a switch operating as an...

  • Page 710

    1-13 configuration procedure 1) configure the pc (ftp server) perform ftp server–related configurations on the pc, that is, create a user account on the ftp server with username switch and password hello . (for detailed configuration, refer to the configuration instruction relevant to the ftp server...

  • Page 711

    1-14 boot boot-loader switch.Bin reboot for information about the boot boot-loader command and how to specify the startup file for a switch, refer to the system maintenance and debugging module of this manual. Sftp configuration complete the following tasks to configure sftp: task remarks enabling a...

  • Page 712

    1-15 to do… use the command… remarks enter system view system-view — configure the connection idle time for the sftp server ftp timeout time-out-value optional 10 minutes by default. Supported sftp client software a 3com switch 4500 operating as an sftp server can interoperate with sftp client softw...

  • Page 714

    1-17 if you specify to authenticate a client through public key on the server, the client needs to read the local private key when logging in to the sftp server. Since both rsa and dsa are available for public key authentication, you need to use the identity-key key word to specify the algorithms to...

  • Page 715

    1-18 [sysname] public-key local create dsa # create a vlan interface on the switch and assign to it an ip address, which is used as the destination address for the client to connect to the sftp server. [sysname] interface vlan-interface 1 [sysname-vlan-interface1] ip address 192.168.0.1 255.255.255....

  • Page 716

    1-19 sftp-client> # display the current directory of the server. Delete the file z and verify the result. Sftp-client> dir -rwxrwxrwx 1 noone nogroup 1759 aug 23 06:52 config.Cfg -rwxrwxrwx 1 noone nogroup 225 aug 24 08:01 pubkey2 -rwxrwxrwx 1 noone nogroup 283 aug 24 07:39 pubkey1 drwxrwxrwx 1 noon...

  • Page 717

    1-20 -rwxrwxrwx 1 noone nogroup 283 aug 24 07:39 pubkey1 drwxrwxrwx 1 noone nogroup 0 sep 01 06:22 new -rwxrwxrwx 1 noone nogroup 225 sep 01 06:55 pub drwxrwxrwx 1 noone nogroup 0 sep 02 06:33 new2 received status: end of file received status: success # download the file pubkey2 from the server and ...

  • Page 718: Tftp Configuration

    2-1 2 tftp configuration when configuring tftp, go to these sections for information you are interested in: z introduction to tftp z tftp configuration introduction to tftp compared with ftp, trivial file transfer protocol (tftp) features simple interactive access interface and no authentication con...

  • Page 719

    2-2 tftp configuration complete the following tasks to configure tftp: task remarks basic configurations on a tftp client — tftp configuration: a switch operating as a tftp client specifying the source interface or source ip address for an ftp client optional tftp server configuration for details, s...

  • Page 721

    2-4 network diagram figure 2-1 network diagram for tftp configurations configuration procedure 1) configure the tftp server (pc) start the tftp server and configure the working directory on the pc. 2) configure the tftp client (switch). # log in to the switch. (you can log in to a switch through the...

  • Page 722

    2-5 for information about the boot boot-loader command and how to specify the startup file for a switch, refer to the system maintenance and debugging module of this manual..

  • Page 723: Table of Contents

    I table of contents 1 information center·····································································································································1-1 information center overview ·······························································································...

  • Page 724: Information Center

    1-1 1 information center when configuring information center, go to these sections for information you are interested in: z information center overview z information center configuration z displaying and maintaining information center z information center configuration examples information center ov...

  • Page 725

    1-2 information filtering by severity works this way: information with the severity value greater than the configured threshold is not output during the filtering. Z if the threshold is set to 1, only information with the severity being emergencies will be output; z if the threshold is set to 8, inf...

  • Page 726

    1-3 outputting system information by source module the system information can be classified by source module and then filtered. Some module names and description are shown in table 1-3 . Table 1-3 source module name list module name description 8021x 802.1x module acl access control list module adbm...

  • Page 727

    1-4 module name description sysmib system mib module tac hwtacacs module telnet telnet module tftpc tftp client module vlan virtual local area network module vty virtual type terminal module xm xmodem module default default settings for all the modules to sum up, the major task of the information ce...

  • Page 728

    1-5 z if the address of the log host is specified in the information center of the switch, when logs are generated, the switch sends the logs to the log host in the above format. For detailed information, refer to setting to output system information to a log host . Z there is the syslog process on ...

  • Page 729

    1-6 locate and solve problems globally. In this case, you can configure the information center to add utc time zone to the time stamp of the output information, so that you can know the standard time when the information center processing each piece of information. That is, you can know the greenwic...

  • Page 730

    1-7 source this field indicates the source of the information, such as the source ip address of the log sender. This field is optional and is displayed only when the output destination is the log host. Context this field provides the content of the system information. Information center configuratio...

  • Page 731

    1-8 z if the system information is output before you input any information following the current command line prompt, the system does not echo any command line prompt after the system information output. Z in the interaction mode, you are prompted for some information input. If the input is interrup...

  • Page 733

    1-10 follow these steps to enable the system information display on the console: to do… use the command… remarks enable the debugging/log/trap information terminal display function terminal monitor optional enabled by default. Enable debugging information terminal display function terminal debugging...

  • Page 734

    1-11 z when there are multiple telnet users or dumb terminal users, they share some configuration parameters including module filter, language and severity level threshold. In this case, change to any such parameter made by one user will also be reflected on all other user terminals. Z to view debug...

  • Page 738

    1-15 information center configuration examples log output to a unix log host network requirements the switch sends the following log information to the unix log host whose ip address is 202.38.1.10: the log information of the two modules arp and ip, with severity higher than “informational”. Network...

  • Page 739

    1-16 when you edit the file “/etc/syslog.Conf”, note that: z a note must start in a new line, starting with a “#” sign. Z in each pair, a tab should be used as a separator instead of a space. Z no space is allowed at the end of a file name. Z the device name (facility) and received log information s...

  • Page 740

    1-17 system-view [switch] info-center enable # configure the host whose ip address is 202.38.1.10 as the log host. Permit all modules to output log information with severity level higher than error to the log host. [switch] info-center loghost 202.38.1.10 facility local7 [switch] info-center source ...

  • Page 741

    1-18 log output to the console network requirements the switch sends the following information to the console: the log information of the two modules arp and ip, with severity higher than “informational”. Network diagram figure 1-3 network diagram for log output to the console configuration procedur...

  • Page 742

    1-19 network diagram figure 1-4 network diagram configuration procedure # name the local time zone z8 and configure it to be eight hours ahead of utc time. Clock timezone z8 add 08:00:00 # set the time stamp format of the log information to be output to the log host to date. System-view system view:...

  • Page 743: Table of Contents

    I table of contents 1 boot rom and host software loading ···································································································1-1 introduction to loading approaches ·······································································································1-...

  • Page 744

    1-1 1 boot rom and host software loading traditionally, switch software is loaded through a serial port. This approach is slow, time-consuming and cannot be used for remote loading. To resolve these problems, the tftp and ftp modules are introduced into the switch. With these modules, you can load/d...

  • Page 745

    1-2 the loading process of the boot rom software is the same as that of the host software, except that during the former process, you should press “6” or and after entering the boot menu and the system gives different prompts. The following text mainly describes the boot rom loading process. Boot me...

  • Page 746

    1-3 1. Download application file to flash 2. Select application file to boot 3. Display all files in flash 4. Delete file from flash 5. Modify bootrom password 6. Enter bootrom upgrade menu 7. Skip current configuration file 8. Set bootrom password recovery 9. Set switch startup mode 0. Reboot enter...

  • Page 747

    1-4 0. Return enter your choice (0-5): step 3: choose an appropriate baudrate for downloading. For example, if you press 5, the baudrate 115200 bps is chosen and the system displays the following information: download baudrate is 115200 bit/s please change the terminal's baudrate to 115200 bit/s and...

  • Page 748

    1-5 figure 1-2 console port configuration dialog box step 5: click the button to disconnect the hyperterminal from the switch and then click the button to reconnect the hyperterminal to the switch, as shown in figure 1-3 . Figure 1-3 connect and disconnect buttons the new baudrate takes effect after...

  • Page 749

    1-6 figure 1-4 send file dialog box step 8: click . The system displays the page, as shown in figure 1-5 . Figure 1-5 sending file page step 9: after the sending process completes, the system displays the following information: loading ...Cccccccccc done! Step 10: reset hyperterminal’s baudrate to 9...

  • Page 750

    1-7 loading host software follow these steps to load the host software: step 1: select in boot menu and press . The system displays the following information: 1. Set tftp protocol parameter 2. Set ftp protocol parameter 3. Set xmodem protocol parameter 0. Return to boot menu enter your choice(0-3): ...

  • Page 751

    1-8 you can use one pc as both the configuration device and the tftp server. Step 2: run the tftp server program on the tftp server, and specify the path of the program to be downloaded. Tftp server program is not provided with the 3com series ethernet switches. Step 3: run the hyperterminal program...

  • Page 752

    1-9 0. Return to boot menu enter your choice(0-3): step 2: enter 1 in the above menu to download the host software using tftp. The subsequent steps are the same as those for loading the boot rom, except that the system gives the prompt for host software loading instead of boot rom loading. When load...

  • Page 753

    1-10 bootrom update menu: 1. Set tftp protocol parameter 2. Set ftp protocol parameter 3. Set xmodem protocol parameter 0. Return to boot menu enter your choice(0-3): step 4: enter 2 in the above menu to download the boot rom using ftp. Then set the following ftp-related parameters as required: load...

  • Page 754

    1-11 remote boot rom and software loading if your terminal is not directly connected to the switch, you can telnet to the switch, and use ftp or tftp to load the boot rom and host software remotely. Remote loading using ftp loading procedure using ftp client 1) loading the boot rom as shown in figur...

  • Page 755

    1-12 before restarting the switch, make sure you have saved all other configurations that you want, so as to avoid losing configuration information. 2) loading host software loading the host software is the same as loading the boot rom program, except that the file to be downloaded is the host softw...

  • Page 756

    1-13 system view: return to user view with ctrl+z. [sysname] interface vlan-interface 1 [sysname-vlan-interface1] ip address 192.168.0.28 255.255.255.0 step 3: enable ftp service on the switch, and configure the ftp user name to test and password to pass. [sysname-vlan-interface1] quit [sysname] ftp...

  • Page 757

    1-14 figure 1-11 enter boot rom directory step 6: enter ftp 192.168.0.28 and enter the user name test , password pass , as shown in figure 1-12 , to log on to the ftp server. Figure 1-12 log on to the ftp server step 7: use the put command to upload the file switch.Btm to the switch, as shown in fig...

  • Page 758

    1-15 figure 1-13 upload file switch.Btm to the switch step 8: configure switch.Btm to be the boot rom at next startup, and then restart the switch. Boot bootrom switch.Btm this will update bootrom on unit 1. Continue? [y/n] y upgrading bootrom, please wait... Upgrade bootrom succeeded! Reboot after ...

  • Page 759

    2-1 2 basic system configuration and debugging when configuring basic system configuration and debugging, go to these sections for information you are interested in: z basic system configuration z displaying the system status z debugging the system basic system configuration perform the following ba...

  • Page 760

    2-2 displaying the system status to do… use the command… remarks display the current date and time of the system display clock display the version of the system display version display the information about users logging onto the switch display users [ all ] available in any view debugging the syste...

  • Page 761

    2-3 you can use the following commands to enable the two switches. Follow these steps to enable debugging and terminal display for a specific module: to do… use the command… remarks enable system debugging for specific module debugging module-name [ debugging - option ] required disabled for all mod...

  • Page 762: Network Connectivity Test

    3-1 3 network connectivity test when configuring network connectivity test, go to these sections for information you are interested in: z ping z tracert network connectivity test ping you can use the ping command to check the network connectivity and the reachability of a host. To do… use the comman...

  • Page 763: Device Management

    4-1 4 device management when configuring device management, go to these sections for information you are interested in: z introduction to device management z device management configuration z displaying the device management configuration z remote switch app upgrade configuration example introductio...

  • Page 764

    4-2 before rebooting, the system checks whether there is any configuration change. If yes, it prompts whether or not to proceed. This prevents the system from losing the configurations in case of shutting down the system without saving the configurations use the following command to reboot the ether...

  • Page 765

    4-3 enabling of this function consumes some amounts of cpu resources. Therefore, if your network has a high cpu usage requirement, you can disable this function to release your cpu resources. Specifying the app to be used at reboot app is the host software of the switch. If multiple apps exist in th...

  • Page 766

    4-4 currently, in the s4500 series ethernet switches, the auto power down configuration does not take effect on 1000base-x sfp ports . Upgrading the host software in the fabric you can execute the following command on any device in a fabric to use specified host software to upgrade all devices in a ...

  • Page 767

    4-5 to do… use the command… remarks display main parameters of the pluggable transceiver(s) display transceiver interface [ interface-type interface-number ] available for all pluggable transceivers display part of the electrical label information of the anti-spoofing transceiver(s) customized by h3...

  • Page 768

    4-6 to do… use the command… remarks display system diagnostic information or save system diagnostic information to a file with the extension .Diag into the flash memory display diagnostic-information display enabled debugging on a specified switch or all switches in the fabric display debugging { fa...

  • Page 769

    4-7 refer to the login operation part of this manual for configuration commands and steps about telnet user. 3) execute the telnet command on the pc to log into the switch. The following prompt appears: if the flash memory of the switch is not sufficient, delete the original applications before down...

  • Page 770

    4-8 unit 1: the current boot app is: switch.Bin the main boot app is: switch.Bin the backup boot app is: # reboot the switch to upgrade the boot rom and host software of the switch. Reboot start to check configuration with next startup configuration file, please wait...... This command will reboot t...

  • Page 771: Table of Contents

    I table of contents 1 vlan-vpn configuration··························································································································1-1 vlan-vpn overview ················································································································...

  • Page 772: Vlan-Vpn Configuration

    1-1 1 vlan-vpn configuration when configuring vlan-vpn, go to these sections for information you are interested in: z vlan-vpn overview z vlan-vpn configuration z displaying and maintaining vlan-vpn configuration z vlan-vpn configuration example vlan-vpn overview introduction to vlan-vpn virtual pri...

  • Page 773

    1-2 figure 1-2 structure of packets with double-layer vlan tags destination mac address 0 31 data source mac address 15 inner vlan tag outer vlan tag compared with mpls-based layer 2 vpn, vlan-vpn has the following features: z it provides layer 2 vpn tunnels that are simpler. Z vlan-vpn can be imple...

  • Page 774

    1-3 frame as needed. When doing that, you should set the same tpid on both the customer-side port and the service provider-side port. The tpid in an ethernet frame has the same position with the protocol type field in a frame without a vlan tag. To avoid problems in packet forwarding and handling, y...

  • Page 775

    1-4 task remarks enabling the vlan-vpn feature for a port required configuring the tpid value for vlan-vpn packets on a port optional configuring the inner-to-outer tag priority replicating and mapping feature optional as xrn fabric is mutually exclusive with vlan-vpn, make sure that xrn fabric is d...

  • Page 776

    1-5 z besides the default tpid 0x8100, you can configure only one tpid value on a switch 4500 switch. Z for the switch 4500 series to exchange packets with the public network device properly, you should configure the tpid value used by the public network device on both the customer-side port and the...

  • Page 777

    1-6 vlan-vpn configuration example transmitting user packets through a tunnel in the public network by using vlan-vpn network requirements as shown in figure 1-4 , switch a and switch b are both switch 4500 series switches. They connect the users to the servers through the public network. Z pc users...

  • Page 778

    1-7 [switcha-ethernet1/0/11] vlan-vpn enable [switcha-ethernet1/0/11] quit # set the tpid value of ethernet 1/0/12 to 0x9200 (for intercommunication with the devices in the public network) and configure the port as a trunk port permitting packets of vlan 1040. [switcha] interface ethernet 1/0/12 [sw...

  • Page 779

    1-8 2) the tpid value of the outer vlan tag is set to 0x9200 before the packet is forwarded to the public network through ethernet1/0/12 of switch a. 3) the outer vlan tag of the packet remains unchanged while the packet travels in the public network, till it reaches ethernet1/0/22 of switch b. 4) a...

  • Page 780: Selective Qinq Configuration

    2-1 2 selective qinq configuration when configuring selective qinq, go to these sections for information you are interested in: z selective qinq overview z selective qinq configuration z selective qinq configuration example selective qinq overview selective qinq overview selective qinq is an enhance...

  • Page 781

    2-2 telephone users (in vlan 201 to vlan 300). Packets of all these users are forwarded by switch a to the public network. After the selective qinq feature and the inner-to-outer tag mapping feature are enabled on the port connecting switch a to these users, the port will add different outer vlan ta...

  • Page 782

    2-3 device receives a packet from the service provider network, this device will find the path for the packet by searching the mac address table of the vlan corresponding to the outer tag and unicast the packet. Thus, packet broadcast is reduced in selective qinq applications. Likewise, the entries ...

  • Page 783

    2-4 do not enable both the selective qinq function and the dhcp snooping function on a switch. Otherwise, the dhcp snooping function may operate improperly. Enabling the inter-vlan mac address replicating feature follow these steps to enable the inter-vlan mac address replicating feature: to do... U...

  • Page 784

    2-5 z the public network permits packets of vlan 1000 and vlan 1200. Apply qos policies for these packets to reserve bandwidth for packets of vlan 1200. That is, packets of vlan 1200 have higher transmission priority over packets of vlan 1000. Z employ the selective qinq feature on switch a and swit...

  • Page 785

    2-6 [switcha-ethernet1/0/5] port hybrid vlan 5 1000 1200 tagged [switcha-ethernet1/0/5] quit # configure ethernet 1/0/3 as a hybrid port and configure vlan 5 as its default vlan. Configure ethernet 1/0/3 to remove vlan tags when forwarding packets of vlan 5, vlan 1000, and vlan 1200. [switcha] inter...

  • Page 786

    2-7 [switchb] interface ethernet 1/0/11 [switchb-ethernet1/0/11] port link-type hybrid [switchb-ethernet1/0/11] port hybrid vlan 12 13 1000 1200 tagged # configure ethernet1/0/12 as a hybrid port and configure vlan 12 as its default vlan . Configure ethernet 1/0/12 to remove vlan tags when forwardin...

  • Page 787: Table of Contents

    I table of contents 1 remote-ping configuration ······················································································································1-1 introduction to remote-ping ······································································································...

  • Page 788: Remote-Ping Configuration

    1-1 1 remote-ping configuration introduction to remote-ping remote-ping is a network diagnostic tool used to test the performance of protocols (only icmp by far) running on network. It is an enhanced alternative to the ping command. Remote-ping test group is a set of remote-ping test parameters. A t...

  • Page 789

    1-2 this parameter is used to enable the system to automatically perform the same test at regular intervals. 5) test timeout time test timeout time is the duration while the system waits for an echo-response packet after it sends out an echo-request packet. If no echo-response packet is received wit...

  • Page 790

    1-3 table 1-2 display remote-ping configuration operation command description display the information of remote-ping test history display remote-ping history [ administrator-name operation-tag ] display the latest remote-ping test results display remote-ping results [ administrator-name operation-ta...

  • Page 791

    1-4 packet lost in test: 0% disconnect operation number: 0 operation timeout number: 0 system busy operation number: 0 connection fail number: 0 operation sequence errors: 0 drop operation number: 0 other operation errors: 0 [sysname-remote-ping-administrator-icmp] display remote-ping history admini...

  • Page 792: Table of Contents

    I table of contents 1 ipv6 configuration·····································································································································1-1 ipv6 overview ·············································································································...

  • Page 793: Ipv6 Configuration

    1-1 1 ipv6 configuration when configuring ipv6, go to these sections for information you are interested in: z ipv6 overview z ipv6 configuration task list z ipv6 configuration example z the term “router” in this document refers to a router in a generic sense or an ethernet switch running a routing p...

  • Page 794

    1-2 figure 1-1 comparison between ipv4 header format and ipv6 header format adequate address space the source ipv6 address and the destination ipv6 address are both 128 bits (16 bytes) long. Ipv6 can provide 3.4 x 10 38 addresses to completely meet the requirements of hierarchical address division a...

  • Page 795

    1-3 enhanced neighbor discovery mechanism the ipv6 neighbor discovery protocol is implemented by a group of internet control message protocol version 6 (icmpv6) messages. The ipv6 neighbor discovery protocol manages message exchange between neighbor nodes (nodes on the same link). The group of icmpv...

  • Page 796

    1-4 z multicast address: an identifier for a set of interfaces (typically belonging to different nodes), similar to an ipv4 multicast address. A packet sent to a multicast address is delivered to all interfaces identified by that address. Z anycast address: an identifier for a set of interfaces (typ...

  • Page 797

    1-5 z unassigned address: the unicast address :: is called the unassigned address and may not be assigned to any node. Before acquiring a valid ipv6 address, a node may fill this address in the source address field of an ipv6 packet, but may not use it as a destination ipv6 address. Multicast addres...

  • Page 798

    1-6 introduction to ipv6 neighbor discovery protocol the ipv6 neighbor discovery protocol (ndp) uses five types of icmpv6 messages to implement the following functions: z address resolution z neighbor unreachability detection z duplicate address detection z router/prefix discovery z address autoconf...

  • Page 799

    1-7 address resolution similar to the arp function in ipv4, a node acquires the link-layer address of neighbor nodes on the same link through ns and na messages. Figure 1-3 shows how node a acquires the link-layer address of node b. Figure 1-3 address resolution the address resolution procedure is a...

  • Page 800

    1-8 figure 1-4 duplicate address detection the duplicate address detection procedure is as follows: 1) node a sends an ns message whose source address is the unassigned address :: and the destination address is the corresponding solicited-node multicast address of the ipv6 address to be detected. Th...

  • Page 801

    1-9 task remarks configuring the hop limit of icmpv6 reply packets optional displaying and maintaining ipv6 optional configuring an ipv6 unicast address z an ipv6 address is required for a host to access an ipv6 network. A host can be assigned a global unicast address, a site-local address, or a lin...

  • Page 802

    1-10 to do... Use the command... Remarks automatically generate a link-local address ipv6 address auto link-local configure an ipv6 link-local address manually assign a link-local address for an interface. Ipv6 address ipv6-address link-local optional by default, after an ipv6 site-local address or ...

  • Page 804

    1-12 configuring the ns interval after a device sends an ns message, if it does not receive a response within a specific period, the device will send another ns message. You can configure the interval for sending ns messages. Follow these steps to configure the ns interval: to do… use the command… r...

  • Page 805

    1-13 fin packets are received, the ipv6 tcp connection status becomes time_wait. If other packets are received, the finwait timer is reset from the last packet and the connection is terminated after the finwait timer expires. Z size of ipv6 tcp receiving/sending buffer. Follow these steps to configu...

  • Page 806

    1-14 to do… use the command… remarks enter system view system-view — configure the hop limit of icmpv6 reply packets ipv6 nd hop-limit value optional 64 by default. Displaying and maintaining ipv6 to do… use the command… remarks display the fib entries display ipv6 fib display the mapping between ho...

  • Page 807

    1-15 ipv6 configuration example ipv6 unicast address configuration network requirements two switches are directly connected through two ethernet ports. The ethernet ports belong to vlan 2. Different types of ipv6 addresses are configured for the interface vlan-interface 2 on each switch to verify th...

  • Page 808

    1-16 global unicast address(es): 2001::20f:e2ff:fe49:8048, subnet is 2001::/64 3001::1, subnet is 3001::/64 joined group address(es): ff02::1:ff00:1 ff02::1:ff49:8048 ff02::1 mtu is 1500 bytes nd dad is enabled, number of dad attempts: 1 nd reachable time is 30000 milliseconds nd retransmit interval...

  • Page 809

    1-17 bytes=56 sequence=3 hop limit=255 time = 60 ms reply from fe80::20f:e2ff:fe00:1 bytes=56 sequence=4 hop limit=255 time = 70 ms reply from fe80::20f:e2ff:fe00:1 bytes=56 sequence=5 hop limit=255 time = 60 ms --- fe80::20f:e2ff:fe00:1 ping statistics --- 5 packet(s) transmitted 5 packet(s) receiv...

  • Page 810

    2-1 2 ipv6 application configuration when configuring ipv6 application, go to these sections for information you are interested in: z introduction to ipv6 application z configuring ipv6 application z ipv6 application configuration example z troubleshooting ipv6 application introduction to ipv6 appli...

  • Page 811

    2-2 ipv6 traceroute the traceroute ipv6 command is used to record the route of ipv6 packets from source to destination, so as to check whether the link is available and determine the point of failure. Figure 2-1 traceroute process as figure 2-1 shows, the traceroute process is as follows: z the sour...

  • Page 813

    2-4 displaying and maintaining ipv6 telnet to do… use the command… remarks display the use information of the users who have logged in display users [ all ] available in any view ipv6 application configuration example ipv6 applications network requirements in figure 2-3 , swa, swb, and swc are three...

  • Page 814

    2-5 bytes=56 sequence=2 hop limit=64 time = 31 ms reply from 3003::1 bytes=56 sequence=3 hop limit=64 time = 31 ms reply from 3003::1 bytes=56 sequence=4 hop limit=64 time = 31 ms reply from 3003::1 bytes=56 sequence=5 hop limit=64 time = 31 ms --- 3003::1 ping statistics --- 5 packet(s) transmitted...

  • Page 815

    2-6 z use the display ipv6 interface command to determine the interfaces of the source and the destination and the link-layer protocol between them are up. Z use the display ipv6 route-table command to verify that the destination is reachable. Z use the ping ipv6 -t timeout { destination-ipv6-addres...

  • Page 816: Table of Contents

    I table of contents 1 password control configuration operations ·························································································1-1 introduction to password control configuration ·····················································································1-1 passwor...

  • Page 817

    1-1 1 password control configuration operations introduction to password control configuration the password control feature is designed to manage the following passwords: z telnet passwords: passwords for logging into the switch through telnet. Z ssh passwords: passwords for logging into the switch ...

  • Page 818

    1-2 function description application encrypted display: the switch protects the displayed password. The password is always displayed as a string containing only asterisks (*) in the configuration file or on user terminal. Password protection and encryption saving passwords in ciphertext: the switch ...

  • Page 819

    1-3 password control configuration configuration prerequisites a user pc is connected to the switch to be configured; both devices are operating normally. Configuration tasks the following sections describe the configuration tasks for password control: z configuring password aging z configuring the ...

  • Page 820

    1-4 operation command description create a local user or enter local user view local-user user-name — configure a password aging time for the local user password-control aging aging-time optional by default, the aging time is 90 days. In this section, you must note the effective range of the same co...

  • Page 821

    1-5 z you can configure the password aging time when password aging is not yet enabled, but these configured parameters will not take effect. Z after the user changes the password successfully, the switch saves the old password in a readable file in the flash memory. Z the switch does not provide th...

  • Page 822

    1-6 in this section, you must note the effective range of the same commands when executed in different views or to different types of passwords: z global settings in system view apply to all local user passwords and super passwords. Z settings in the local user view apply to the local user password ...

  • Page 823

    1-7 table 1-5 manually remove history password records operation command description remove history password records of one or all users reset password-control history-record [ user-name user-name ] executing this command without the user-name user-name option removes the history password records of...

  • Page 824

    1-8 z lock-time : in this mode, the system inhibits the user from re-logging in within a certain time period. After the period, the user is allowed to log into the switch again. By default, this time is 120 minutes. Z lock : in this mode, the system inhibits the user from re-logging in forever. The ...

  • Page 825

    1-9 table 1-9 configure the timeout time for users to be authenticated operation command description enter system view system-view — configure the timeout time for users to be authenticated password-control authentication-timeout authentication-timeout optional by default, it is 60 seconds. Configur...

  • Page 826

    1-10 operation command description configure the password composition policy for the local user password-control composition type-number policy-type [ type-length type-length ] optional by default, the minimum number of types a password should contain is 1 and the minimum number of characters of eac...

  • Page 827

    1-11 z for the super password, the minimum number of password composition types is 3 and the minimum number of characters in each composition type is 3. Z for a local user named test, the minimum password length is 6 characters, the minimum number of password composition types is 2, the minimum numb...

  • Page 828: Table of Contents

    I table of contents 1 access management configuration ·············································································· 1-1 access management overview ···················································································· 1-1 configuring access management ·················...

  • Page 829

    1-1 1 access management configuration when configuring access management, go to these sections for information you are interested in: z access management overview z configuring access management z access management configuration examples access management overview normally, client pcs in a network a...

  • Page 830

    1-2 z a port without an access management ip address pool configured allows the hosts to access external networks only if their ip addresses are not in the access management ip address pools of other ports of the switch. Note that the ip addresses in the access management ip address pool configured ...

  • Page 831

    1-3 access management configuration examples access management configuration example network requirements client pcs are connected to the external network through switch a (an ethernet switch). The ip addresses of the pcs of organization 1 are in the range 202.10.20.1/24 to 202.10.20.20/24. The ip a...

  • Page 832

    1-4 [sysname-ethernet1/0/1] am ip-pool 202.10.20.1 20 combining access management with port isolation network requirements client pcs are connected to the external network through switch a (an ethernet switch). The ip addresses of the pcs of organization 1 are in the range 202.10.20.1/24 to 202.10.2...

  • Page 833

    1-5 # set the ip address of vlan-interface 1 to 202.10.20.200/24. [sysname] interface vlan-interface 1 [sysname-vlan-interface1] ip address 202.10.20.200 24 [sysname-vlan-interface1] quit # configure the access management ip address pool on ethernet 1/0/1. [sysname] interface ethernet 1/0/1 [sysname...

  • Page 834: Table of Contents

    I table of contents 1 lldp configuration···································································································································1-1 introduction to lldp ········································································································...

  • Page 835: Lldp Configuration

    1-1 1 lldp configuration when configuring lldp, go to these sections for information you are interested in: z introduction to lldp z lldp configuration task list z performing basic lldp configuration z configuring the encapsulation format for lldpdus z configuring cdp compatibility z configuring lld...

  • Page 836

    1-2 to enable the neighboring devices to be informed of the existence of a device or an lldp operating mode change (from the disable mode to txrx mode, or from the rx mode to tx mode) timely, a device can invoke the fast sending mechanism. In this case, the interval to send lldpdus changes to one se...

  • Page 837

    1-3 type description remarks management address tlv carries the management address, the corresponding port number, and oid (object identifier). If the management address is not configured, it is the ip address of the interface of the vlan with the least vlan id among those permitted on the port. If ...

  • Page 838

    1-4 z firmware revision tlv, which carries the firmware version of an med device . Z software revision tlv, which carries the software version of an med device . Z serial number tlv, which carries the serial number of an med device. Z manufacturer name tlv, which carries the manufacturer name of an ...

  • Page 839

    1-5 to do… use the command… remarks enable lldp globally lldp enable required by default, lldp is disabled globally. Enter ethernet interface view interface interface-type interface-number required enable lldp lldp enable optional, the configuration applies to the current port only. By default, lldp...

  • Page 841

    1-7 to do… use the command… remarks enter system view system-view — enter ethernet interface view interface interface-type interface-number required enable lldp polling and set the polling interval lldp check-change-interval value optional, the configuration applies to the current port only. Disable...

  • Page 842

    1-8 z with snap encapsulation configured, an lldp port sends lldpdus in snap frames and processes only snap encapsulated incoming lldpdus. By default, lldpdus are encapsulated in ethernet ii frames. If the neighbor devices encapsulate lldpdus in snap frames, you can configure the encapsulation forma...

  • Page 843

    1-9 configuration prerequisites before configuring cdp compatibility, make sure that: z lldp is enabled globally. Z lldp is enabled on the port connected to an ip phone and is configured to operate in txrx mode on the port. Configuring cdp compatibility follow these steps to enable lldp to be compat...

  • Page 844

    1-10 to do… use the command… remarks enable lldp trap sending lldp notification remote-change enable required , the configuration applies to the current port only. Disabled by default quit to system view quit — set the interval to send lldp traps lldp timer notification-interval value optional 5 sec...

  • Page 845

    1-11 figure 1-1 network diagram for lldp configuration nms switch a switch b med device ge1/0/1 ge1/0/2 ge1/0/1 configuration procedure 1) configure switch a. # enable lldp globally. System-view [switcha] lldp enable # enable lldp on gigabitethernet 1/0/1 and gigabitethernet 1/0/2, setting the lldp ...

  • Page 846

    1-12 transmit interval : 30s hold multiplier : 4 reinit delay : 2s transmit delay : 2s trap interval : 5s fast start times : 3 port 1 [gigabitethernet1/0/1] : port status of lldp : enable admin status : rx_only trap flag : no roll time : 0s number of neighbors : 1 number of med neighbors : 1 number ...

  • Page 847

    1-13 trap flag : no roll time : 0s number of neighbors : 1 number of med neighbors : 1 number of cdp neighbors : 0 number of sent optional tlv : 0 number of received unknown tlv : 5 port 2 [gigabitethernet1/0/2] : port status of lldp : enable admin status : rx_only trap flag : no roll time : 0s numb...

  • Page 848

    1-14 # enable the voice vlan feature on gigabitethernet 1/0/1 and gigabitethernet 1/0/2. [switcha] interface gigabitethernet 1/0/1 [switcha-gigabitethernet1/0/1] voice vlan 2 enable [switcha-gigabitethernet1/0/1] quit [switcha] interface gigabitethernet 1/0/2 [switcha-gigabitethernet1/0/2] voice vla...