Page 7
Content 18.3 T ..........173 YPICAL ONFIGURATION XAMPLES 18.4 MAC T ............174 ABLE ROUBLESHOOTING 18.5 MAC A ..........174 DDRESS UNCTION XTENSION 18.5.1 MAC Address Binding ................. 174 18.6 MAC N ..........177 OTIFICATION ONFIGURATION 18.6.1 Introduction to MAC Notification ............177 18.6.2 MAC Notification Configuration ............
Page 8
Content 22.1 I Q ............ 209 NTRODUCTION TO LEXIBLE 22.1.1 QinQ Technique ..................209 22.1.2 Basic QinQ .................... 209 22.1.3 Flexible QinQ ..................209 22.2 F ........209 LEXIBLE ONFIGURATION 22.3 F ..............212 LEXIBLE XAMPLE 22.4 F ..........214 LEXIBLE ROUBLESHOOTING EGRESS QOS CONFIGURATION .............
Page 9
Content 24.5.2 ARP Configuration Task List ............... 238 24.5.3 ARP Troubleshooting ................239 24.6 ..............239 STATION MOVEMENT 24.6.1 Introduction to l3 station movement ..........239 24.6.2 l3 station movement Configuration Task List ........239 ARP SCANNING PREVENTION FUNCTION CONFIGURATION ..241 25.1 I ARP S ....
Page 10
Content KEEPALIVE GATEWAY CONFIGURATION........258 30.1 I ..........258 NTRODUCTION TO EEPALIVE ATEWAY 30.2 K ......258 EEPALIVE ATEWAY ONFIGURATION 30.3 K ............259 EEPALIVE ATEWAY XAMPLE 30.4 K ..........260 EPALIVE TEWAY ROUBLESHOOTING DHCP CONFIGURATION ..............261 31.1 I DHCP ..............
Page 11
Content 34.3 DHCP 37, 38 E ........... 296 OPTION XAMPLES 34.3.1 DHCPv6 Snooping option37, 38 Example ......... 296 34.3.2 DHCPv6 Relay option37, 38 Example ..........299 34.4 DHCP 37, 38 T ........300 OPTION ROUBLESHOOTING DHCP SNOOPING CONFIGURATION ..........301 35.1 I DHCP S ..........
Page 12
Content 39.2 RIP C ............327 ONFIGURATION 39.3 RIP E ................334 XAMPLES 39.3.1 Typical RIP Examples ................334 39.3.2 Typical Examples of RIP aggregation function ........ 335 39.4 RIP T ..............336 ROUBLESHOOTING RIPNG ....................338 40.1 I ..............338 NTRODUCTION TO 40.2 RIP ............
Page 13
Content 43.1.3 IP Multicast Packet Transmission ............361 43.1.4 IP Multicast Application ............... 362 43.2 DCSCM ..................362 43.2.1 Introduction to DCSCM ............... 362 43.2.2 DCSCM Configuration Task List ............363 43.2.3 DCSCM Configuration Examples ............366 43.2.4 DCSCM Troubleshooting ..............367 43.3 IGMP S ................
Page 14
Content 46.3 ACL E ................. 407 XAMPLE 46.4 ACL T ..............411 ROUBLESHOOTING 802.1X CONFIGURATION ..............412 47.1 I 802.1 ..............412 NTRODUCTION TO 47.1.1 The Authentication Structure of 802.1x ..........412 47.1.2 The Work Mechanism of 802.1x ............414 47.1.3 The Encapsulation of EAPOL Messages ...........
Page 15
Content TACACS+ CONFIGURATION ............445 50.1 I TACACS+ ............445 NTRODUCTION TO 50.2 TACACS+ C ..........445 ONFIGURATION 50.3 TACACS+ S ........446 CENARIOS YPICAL XAMPLES 50.4 TACACS+ T ............447 ROUBLESHOOTING RADIUS CONFIGURATION ............... 448 51.1 I RADIUS .............. 448 NTRODUCTION TO 51.1.1 AAA and RADIUS Introduction ............
Page 16
Content 54.4 VLAN-ACL T ............465 ROUBLESHOOTING MAB CONFIGURATION ..............466 55.1 I MAB ..............466 NTRODUCTION TO 55.2 MAB C ............466 ONFIGURATION 55.3 MAB E ................468 XAMPLE 55.4 MAB T ..............471 ROUBLESHOOTING PPPOE INTERMEDIATE AGENT CONFIGURATION ......472 56.1 I .......
Page 17
Content 60.1 I VRRP 3 .............. 496 NTRODUCTION TO 60.1.1 The Format of VRRPv3 Message ............497 60.1.2 VRRPv3 Working Mechanism ............. 498 60.2 VRRP ..............499 ONFIGURATION 60.2.1 Configuration Task Sequence ............499 60.3 VRRP ............501 YPICAL XAMPLES 60.4 VRRP ............
Page 18
Content 64.3 M ................525 IRROR XAMPLES 64.4 D ..........526 EVICE IRROR ROUBLESHOOTING RSPAN CONFIGURATION ..............527 65.1 I RSPAN ............... 527 NTRODUCTION TO 65.2 RSPAN C ..........529 ONFIGURATION 65.3 T RSPAN ............530 YPICAL XAMPLES OF 65.4 RSPAN T .............
Page 19
Content 70.4 S ............ 553 UMMER ROUBLESHOOTING MONITOR AND DEBUG..............554 71.1 P ....................554 71.2 P 6 ..................... 554 71.3 T ................... 554 RACEROUTE 71.4 T 6 ................. 555 RACEROUTE 71.5 S ..................... 555 71.6 D .................... 556 EBUG 71.7 S ..................
Switch Management 1. Switch Management 1.1 Management Options After purchasing the switch, the user needs to configure the switch for network management. Switch provides two management options: in-band management and out-of-band management. 1.1.1 Out-Of-Band Management Out-of-band management is the management through Console interface. Generally, the user will use out-of-band management for the initial switch configuration, or when in-band management is not available.
Page 21
Switch Management Serial port cable One end attach to the RS-232 serial port, the other end to the Console port. Switch Functional Console port required. Step 2: Entering the HyperTerminal Open the HyperTerminal included in Windows after the connection established. The example below is based on the HyperTerminal included in Windows XP.
Page 22
Switch Management Fig 1-4 Opening HyperTerminal 4) COM1 property appears, select ―9600‖ for ―Baud rate‖, ―8‖ for ―Data bits‖, ―none‖ for ―Parity checksum‖, ―1‖ for stop bit and ―none‖ for traffic control; or, you can also click ―Restore default‖ and click ―OK‖. Fig 1-5 Opening HyperTerminal Step 3: Entering switch CLI interface Power on the switch, the following appears in the HyperTerminal windows, that is the...
Switch Management Loading nos.img ... done. Booting..Starting at 0x10000... Attaching to file system ... …… --- Performing Power-On Self Tests (POST) --- DRAM Test....PASS! PCI Device 1 Test....PASS! FLASH Test....PASS! FAN Test.....PASS! Done All Pass. ------------------ DONE --------------------- Current time is SUN JAN 01 00:00:00 2006 ……...
Page 24
Switch Management assumes the shipment status of the switch where only VLAN1 exists in the system. The following describes the steps for a Telnet client to connect to the switch‘s VLAN1 interface by Telnet(IPV4 address example): Connected with cable Fig 1-6 Manage the switch by Telnet Step 1: Configure the IP addresses for the switch and start the Telnet Server function on the switch.
Page 25
Switch Management Step 2: Run Telnet Client program. Run Telnet client program included in Windows with the specified Telnet target. Fig 1-7 Run telnet client program included in Windows Step 3: Login to the switch. Login to the Telnet configuration interface. Valid login name and password are required, otherwise the switch will reject Telnet access.
Switch Management Fig 1-8 Telnet Configuration Interface 1.1.2.2 Management via HTTP To manage the switch via HTTP, the following conditions should be met: Switch has an IPv4/IPv6 address configured; The host IPv4/IPv6 address (HTTP client) and the switch‘s VLAN interface IPv4/IPv6 address are in the same network segment;...
Page 27
Switch Management Switch(config)#ip http server Step 2: Run HTTP protocol on the host. Open the Web browser on the host and type the IP address of the switch, or run directly the HTTP protocol on the Windows. For example, the IP address of the switch is ―192.168.200.1‖;...
Page 28
Switch Management Fig 1-10 Web Login Interface Input the right username and password, and then the main Web configuration interface is shown as below. Fig 1-11 Main Web Configuration Interface Notice: When configure the switch, the name of the switch is composed with English letters.
Switch Management 1.1.2.3 Manage the Switch via SNMP Network Management Software The necessities required by SNMP network management software to manage switches: 1) IP addresses are configured on the switch; 2) The IP address of the client host and that of the VLAN interface on the switch it subordinates to should be in the same segment;...
Switch Management 1.2.1 Configuration Modes Fig 1-12 Shell Configuration Modes 1.2.1.1 User Mode On entering the CLI interface, entering user entry system first. If as common user, it is defaulted to User Mode. The prompt shown is ―Switch>―, the symbol ―>― is the prompt for User Mode.
Page 31
Switch Management connection status and traffic statistics of all ports; and the user can further enter the Global Mode from Admin Mode to modify all configurations of the switch. For this reason, a password must be set for entering Admin mode to prevent unauthorized access and malicious modification to the switch.
Switch Management DHCP Address Pool Mode Type the ip dhcp pool <name> command under Global Mode will enter the DHCP Address Pool Mode prompt ―Switch(Config-<name>-dhcp)#‖. DHCP address pool properties can be configured under DHCP Address Pool Mode. Run the exit command to exit the DHCP Address Pool Mode to Global Mode.
Switch Management ―< >―, ―{ }‖ and ―[ ]‖ in the command line, such as [<variable>], {enum1 <variable>| enum2}, [option1 [option2]], etc. Here are examples for some actual configuration commands: show version, no parameters required. This is a command with only a keyword and no parameter, just type in the command to run.
Switch Management When a string for a command or keyword is entered, the Tab can be used to complete the command or keyword if there is no conflict. 1.2.4 Help Function There are two ways in Switch for the user to access help information: the ―help‖ command and the ―?‖.
Switch Management parameter record is found. This command is not exist in current The command is recognized, but this command mode can not be used under current mode. Please configure precursor command recognized, command "*" at first! prerequisite command has not been configured. syntax error : missing '"' before the Quotation marks are not used in pairs.
Basic Switch Configuration 2. Basic Switch Configuration 2.1 Basic Configuration Basic switch configuration includes commands for entering and exiting the admin mode, commands for entering and exiting interface mode, for configuring and displaying the switch clock, for displaying the version information of the switch system, etc. Command Explanation Normal User Mode/ Admin Mode...
Basic Switch Configuration Global Mode Configure the information displayed when the banner motd <LINE> login authentication of a telnet or console user no banner motd is successful. 2.2 Telnet Management 2.2.1 Telnet 2.2.1.1 Introduction to Telnet Telnet is a simple remote terminal protocol for remote login. Using Telnet, the user can login to a remote host with its IP address of hostname from his own workstation.
Page 38
Basic Switch Configuration username <user-name> [privilege Configure user name and password of <privilege>] [password the telnet. The no form command <password>] deletes the telnet user authorization. no username <username> Configure the secure IP address to authentication securityip <ip-addr> login to the switch through Telnet: the no authentication securityip <ip-addr>...
Basic Switch Configuration information. 2. Telnet to a remote host from the switch Command Explanation Admin Mode telnet [vrf <vrf-name>] {<ip-addr> Login to a remote host with the Telnet <ipv6-addr> | host <hostname>} [<port>] client included in the switch. 2.2.2 SSH 2.2.2.1 Introduction to SSH SSH (Secure Shell) is a protocol which ensures a secure remote access connection to network devices.
Basic Switch Configuration Configure timeout value ssh-server timeout <timeout> authentication; the no command restores no ssh-server timeout the default timeout value for SSH authentication. Configure the number of times for retrying ssh-server authentication-retires SSH authentication; the no command <authentication-retires> restores the default number of times for no ssh-server authentication-retries retrying SSH authentication.
Basic Switch Configuration an IP address, which is also the IP address of the switch. All VLAN interface related configuration commands can be configured under VLAN Mode. Switch provides three IP address configuration methods: Manual BOOTP DHCP Manual configuration of IP address is assign an IP address manually for the switch.
Basic Switch Configuration prefix-length> command deletes IPv6 address. 3. BOOTP configuration Command Explanation VLAN Interface Mode Enable the switch to be a BootP client and obtain IP address and gateway address ip bootp-client enable through BootP negotiation; no ip bootp-client enable command disables BootP...
Basic Switch Configuration NMS (Network Management Station) and Agent. NMS is the workstation on which SNMP client program is running. It is the core on the SNMP network management. Agent is the server software runs on the devices which need to be managed. NMS manages all the managed objects through Agents.
Basic Switch Configuration information with this tree structure. And each node on this tree contains an OID (Object Identifier) and a brief description about the node. OID is a set of integers divided by periods. It identifies the node and can be used to locate the node in a MID tree structure, shown in the figure below: Fig 2-1 ASN.1 Tree Instance In this figure, the OID of the object A is 1.2.1.1.
Basic Switch Configuration communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets. MID of RMON consists of 10 groups. The switch supports the most frequently used group 1, 2, 3 and 9: Statistics: Maintain basic usage and error statistics for each subnet monitored by the Agent.
Page 46
Basic Switch Configuration no snmp-server enabled switch; the no command disables the SNMP Agent function on the switch. 2. Configure SNMP community string Command Explanation Global Mode snmp-server community {ro | rw} {0 | 7} Configure the community string for the <string>...
Page 47
Basic Switch Configuration {<num-std>|<name>}] [ipv6-access {<ipv6-num-std>|<ipv6-name>}] snmp-server user <user-string> [access {<num-std>|<name>}] [ipv6-access {<ipv6-num-std>|<ipv6-name>}] 6. Configure group Command Explanation Global Mode snmp-server group <group-string> {noauthnopriv|authnopriv|authpriv} [[read <read-string>] [write <write-string>] [notify <notify-string>]] [access {<num-std>|<name>}] Set the group information on the switch. [ipv6-access This command is used to configure VACM {<ipv6-num-std>|<ipv6-name>}] for SNMP v3.
Basic Switch Configuration | <host-ipv6-address> } {v1 | v2c | {v3 used to receive SNMP Trap information. {noauthnopriv | authnopriv | authpriv}}} For SNMP v1/v2, this command also <user-string> configures Trap community string; for snmp-server host SNMP v3, this command also configures <host-ipv4-address>...
Basic Switch Configuration Switch(config)#snmp-server host 1.1.1.5 v1 usertrap Switch(config)#snmp-server enable traps Scenario 3: NMS uses SNMP v3 to obtain information from the switch. The configuration on the switch is listed below: Switch(config)#snmp-server Switch(config)#snmp-server user tester UserGroup authPriv auth md5 hellotst Switch(config)#snmp-server group UserGroup AuthPriv read max write max notify max Switch(config)#snmp-server view max 1 include Scenario 4: NMS wants to receive the v3Trap messages sent by the switch.
Basic Switch Configuration problems by following the guide below: Good condition of the physical connection. Interface and datalink layer protocol is Up (use the ―show interface‖ command), and the connection between the switch and host can be verified by ping (use ―ping‖ command).
Basic Switch Configuration be flash:/boot.rom and flash:/config.rom. The update method of the system image file and the boot file is the same. The switch supplies the user with two modes of updating: 1. BootROM mode; 2. TFTP and FTP update at Shell mode. This two update method will be explained in details in following two sections.
Page 52
Basic Switch Configuration the switch address is 192.168.1.2, and PC address is 192.168.1.66, and select TFTP upgrade, the configuration should like: [Boot]: setconfig Host IP Address: [10.1.1.1] 192.168.1.2 Server IP Address: [10.1.1.2] 192.168.1.66 FTP(1) or TFTP(2): [1] 2 Network interface configure OK. [Boot] Step 4: Enable FTP/TFTP server in the PC.
Page 53
Basic Switch Configuration Step 7: Execute write boot.rom in BootROM mode. The following saves the update file. [Boot]: write boot.rom File boot.rom exists, overwrite? (Y/N)?[N] y Writing boot.rom……………………………………… Write boot.rom OK. [Boot]: Step 8: The following update file config.rom, the basic environment is the same as Step 4. [Boot]: load config.rom Loading...
Basic Switch Configuration boot.conf 256 1980-01-01 00:00:00 ---- nos.img 8,071,910 1980-01-01 00:00:00 ---- startup.cfg 1,590 1980-01-01 00:00:00 ---- 2.5.3 FTP/TFTP Upgrade 2.5.3.1 Introduction to FTP/TFTP FTP(File Transfer Protocol)/TFTP(Trivial File Transfer Protocol) are both file transfer protocols that belonging to fourth layer(application layer) of the TCP/IP protocol stack, used for transferring files between hosts, hosts and switches.
Page 55
Basic Switch Configuration authentication or permission-based file access authorization. It ensures correct data transmission by sending and acknowledging mechanism and retransmission of time-out packets. The advantage of TFTP over FTP is that it is a simple and low overhead file transfer service.
Page 56
Basic Switch Configuration Running configuration file: refers to the running configuration sequence use in the switch. In switch, the running configuration file stores in the RAM. In the current version, the running configuration sequence running-config can be saved from the RAM to FLASH by write command or copy running-config startup-config command, so that the running configuration sequence becomes the start up configuration file, which is called configuration save.
Page 57
Basic Switch Configuration (2)For FTP client, server file list can be checked. Admin Mode For FTP client, server file list can be ftp-dir <ftpServerUrl> checked. FtpServerUrl format looks like: ftp: //user: password@IPv4|IPv6 Address. 2. FTP server configuration (1)Start FTP server Command Explanation Global Mode...
Page 58
Basic Switch Configuration (3)Modify TFTP server connection retransmission time Command Explanation Global Mode tftp-server retransmission-number Set the retransmission time for TFTP server. <number> 2.5.3.3 FTP/TFTP Configuration Examples The configuration is same for IPv4 address or IPv6 address. The example only for IPv4 address.
Page 59
Basic Switch Configuration Switch(config)#exit Switch#copy ftp: //Switch:switch@10.1.1.1/12_30_nos.img nos.img With the above commands, the switch will have the ―nos.img‖ file in the computer downloaded to the FLASH. TFTP Configuration Computer side configuration: Start TFTP server software on the computer and place the ―12_30_nos.img‖ file to the appropriate TFTP server directory on the computer.
Page 60
Basic Switch Configuration Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#tftp-server enable Computer side configuration: Login to the switch with any TFTP client software, use the ―tftp‖ command to download ―nos.img‖ file from the switch to the computer. Scenario 4: Switch acts as FTP client to view file list on the FTP server. Synchronization conditions: The switch connects to a computer by an Ethernet port, the computer is a FTP server with an IP address of 10.1.1.1;...
Page 61
Basic Switch Configuration 226 Transfer complete. 2.5.3.4 FTP/TFTP Troubleshooting 2.5.3.4.1 FTP Troubleshooting When upload/download system file with FTP protocol, the connectivity of the link must be ensured, i.e., use the ―Ping‖ command to verify the connectivity between the FTP client and server before running the FTP program. If ping fails, you will need to check for appropriate troubleshooting information to recover the link connectivity.
Page 62
Basic Switch Configuration 2.5.3.4.2 TFTP Troubleshooting When upload/download system file with TFTP protocol, the connectivity of the link must be ensured, i.e., use the ―Ping‖ command to verify the connectivity between the TFTP client and server before running the TFTP program. If ping fails, you will need to check for appropriate troubleshooting information to recover the link connectivity.
File System Operations 3. File System Operations 3.1 Introduction to File Storage Devices File storage devices used in switches mainly include FLASH cards. As the most common storage device, FLASH is usually used to store system image files (IMG files), system boot files (ROM files) and system configuration files (CFG files).
Page 64
File System Operations 3. The deletion of sub-directory Command Explanation Admin Configuration Mode rmdir <directory> Delete a sub-directory in a designated directory on a certain device. 4. Changing the current working directory of the storage device Command Explanation Admin Configuration Mode cd <directory>...
File System Operations 3.3 Typical Applications Copy an IMG file flash:/nos.img stored in the FLASH on the boardcard, to cf:/nos-6.1.11.0.img. The configuration of the switch is as follows: Switch#copy flash:/nos.img flash:/nos-6.1.11.0.img Copy flash:/nos.img to flash:/nos-6.1.11.0.img? [Y:N] y Copyed file flash:/nos.img to flash:/nos-6.1.11.0.img. 3.4 Troubleshooting If errors occur when users try to implement file system operations, please check whether they are caused by the following reasons...
Cluster Configuration 4. Cluster Configuration 4.1 Introduction to cluster network management Cluster network management is an in-band configuration management. Unlike CLI, SNMP and Web Config which implement a direct management of the target switches through a management workstation, cluster network management implements a direct management of the target switches (member switches) through an intermediate switch (commander switch).
Page 67
Cluster Configuration 1. Enable or disable cluster function 2. Create cluster 1) Configure private IP address pool for member switches of the cluster 2) Create or delete cluster 3) Add or remove a member switch 3. Configure attributes of the cluster in the commander switch 1) Enable or disable automatically adding cluster members 2) Set automatically added members to manually added ones 3) Set or modify the time interval of keep-alive messages on switches in the cluster.
Page 68
Cluster Configuration cluster member {candidate-sn <candidate-sn> | mac-address <mac-addr> [id <member-id> ]} Add or remove a member switch. no cluster member {id <member-id> | mac-address <mac-addr>} 3. Configure attributes of the cluster in the commander switch Command Explanation Global Mode Enable or disable adding newly cluster auto-add discovered candidate switch to the...
Page 69
Cluster Configuration 5. Remote cluster network management Command Explanation Admin Mode In the commander switch, this rcommand member <member-id> command is used to configure and manage member switches. member switch, this rcommand commander command is used to configure the commander switch. In the commander switch, this cluster reset member [id <member-id>...
Cluster Configuration 7. Manage cluster network with snmp Command Explanation Global Mode Enable snmp server function in commander switch and member switch. Notice: must insure the snmp server function be enabled in member switch when commander snmp-server enable switch visiting member switch by snmp.
Cluster Configuration 2. Configure the member switch Configuration of SW2-SW4 Switch(config)#cluster run 4.4 Cluster Administration Troubleshooting When encountering problems in applying the cluster admin, please check the following possible causes: If the command switch is correctly configured and the auto adding function (cluster auto-add) is enabled.
Port Configuration 5. Port Configuration 5.1 Introduction to Port Switch contains Cable ports and Combo ports. The Combo ports can be configured as either 1000GX-TX ports or SFP Gigabit fiber ports. If the user needs to configure some network ports, he/she can use the interface ethernet <interface-list>...
Page 73
Port Configuration 1. Enter the Ethernet port configuration mode Command Explanation Global Mode Enters the network port configuration interface ethernet <interface-list> mode. 2. Configure the properties for the Ethernet ports Command Explanation Port Mode Sets the combo port mode (combo ports media-type {copper | fiber} only).
Page 74
Port Configuration loopback Enables/Disables loopback test function for no loopback specified ports. Enables the storm control function for broadcasts, multicasts and unicasts with unknown destinations (short storm-control {unicast | broadcast | broadcast), and sets the allowed broadcast multicast} <packets> packet number; the no format of this command disables the broadcast storm control function.
Port Configuration 5.3 Port Configuration Example Switch 1 1/0/7 1/0/9 1/0/10 1/0/12 1/0/8 Switch 2 Switch 3 Fig 5-1 Port Configuration Example No VLAN has been configured in the switches, default VLAN1 is used. Switch Port Property Switch1 1/0/7 Ingress bandwidth limit: 50 M Switch2 1/0/8 Mirror source port...
Port Configuration Switch3(Config-If-Ethernet1/0/12)#exit 5.4 Port Troubleshooting Here are some situations that frequently occurs in port configuration and the advised solutions: Two connected fiber interfaces won‘t link up if one interface is set to auto-negotiation but the other to forced speed/duplex. This is determined by IEEE 802.3. ...
Port Isolation Function Configuration 6. Port Isolation Function Configuration 6.1 Introduction to Port Isolation Function Port isolation is an independent port-based function working in an inter-port way, which isolates flows of different ports from each other. With the help of port isolation, users can isolate ports within a VLAN to save VLAN resources and enhance network security.
Port Isolation Function Configuration 3. Specify the flow to be isolated Command Explanation Global Mode Apply the port isolation configuration to isolate-port apply [<l2|l3|all>] isolate layer-2 flows, layer-3 flows or all flows. 4. Display the configuration of port isolation Command Explanation Admin Mode and global Mode Display the configuration of port isolation,...
Page 79
Port Isolation Function Configuration isolation is enabled on switch S1, e1/0/1 and e1/0/10 on switch S1 can not communicate with each other, while both of them can communicate with the uplink port e1/0/15. That is, the communication between any pair of downlink ports is disabled while that between any downlink port and a specified uplink port is normal.
Port Loopback Detection Function Configuration 7. Port Loopback Detection Function Configuration 7.1 Introduction to Port Loopback Detection Function With the development of switches, more and more users begin to access the network through Ethernet switches. In enterprise network, users access the network through layer-2 switches, which means urgent demands for both internet and the internal layer 2 Interworking.
Port Loopback Detection Function Configuration 7.2 Port Loopback Detection Function Configuration Task List 1. Configure the time interval of loopback detection 2. Enable the function of port loopback detection 3. Configure the control method of port loopback detection 4. Display and debug the relevant information of port loopback detection 5....
Port Loopback Detection Function Configuration Enable the debug information of the function module port loopback debug loopback-detection detection. The no operation of this no debug loopback-detection command will disable debug information. Display the state and result of the loopback detection of all ports, if no show loopback-detection [interface...
Port Loopback Detection Function Configuration connecting the switch with the outside network, the switch will notify the connected network about the existence of a loopback, and control the port on the switch to guarantee the normal operation of the whole network. The configuration task sequence of SWITCH: Switch(config)#loopback-detection interval-time 35 15 Switch(config)#interface ethernet 1/0/1...
ULDP Function Configuration 8. ULDP Function Configuration 8.1 Introduction to ULDP Function Unidirectional link is a common error state of link in networks, especially in fiber links. Unidirectional link means that only one port of the link can receive messages from the other port, while the latter one can not receive messages from the former one.
ULDP Function Configuration Interface Converter) or interfaces have problems, software problems, hardware becomes unavailable or operates abnormally. Unidirectional link will cause a series of problems, such as spinning tree topological loop, broadcast black hole. ULDP (Unidirectional Link Detection Protocol) can help avoid disasters that could happen in the situations mentioned above.
Page 86
ULDP Function Configuration uldp enable Globally enable disable ULDP uldp disable function. 2. Enable ULDP function on a port Command Explanation Port configuration mode uldp enable Enable or disable ULDP function on a uldp disable port. 3. Configure aggressive mode globally Command Explanation Global configuration mode...
Page 87
ULDP Function Configuration Configure the interval of Recovery reset, uldp recovery-time <integer> ranging from 30 to 86400 seconds. The no uldp recovery-time <integer> value is 0 second by default. 8. Reset the port shut down by ULDP Command Explanation Global configuration mode port...
ULDP Function Configuration 8.3 ULDP Function Typical Examples Switch A g1/0/1 g1/0/2 g1/0/3 g1/0/4 Switch B Fig 8-2 Fiber Cross Connection In the network topology in Graph, port g1/0/1 and port g1/0/2 of SWITCH A as well as port g1/0/3 and port g1/0/4 of SWITCH B are all fiber ports. And the connection is cross connection.
ULDP Function Configuration notification information on the CRT terminal of PC1. %Oct 29 11:09:50 2007 A unidirectional link is detected! Port Ethernet1/0/1 need to be shutted down! %Oct 29 11:09:50 2007 Unidirectional port Ethernet1/0/1 shut down! %Oct 29 11:09:50 2007 A unidirectional link is detected! Port Ethernet1/0/2 need to be shutted down! %Oct 29 11:09:50 2007 Unidirectional port Ethernet1/0/2 shutted down! Port g1/0/3, and port g1/0/4 of SWITCH B are all shut down by ULDP, and there is...
Page 90
ULDP Function Configuration ULDP does not compact with similar protocols of other vendors, which means users can not use ULDP on one end and use other similar protocols on the other end. ULDP function is disabled by default. After globally enabling ULDP function, the debug switch can be enabled simultaneously to check the debug information.
LLDP Function Operation Configuration 9. LLDP Function Operation Configuration 9.1 Introduction to LLDP Function Link Layer Discovery Protocol (LLDP) is a new protocol defined in 802.1ab. It enables neighbor devices to send notices of their own state to other devices, and enables all ports of every device to store information about them.
LLDP Function Operation Configuration trace the change and condition of topology, but most of them can reach layer-three and classify the devices into all IP subnets at best. This kind of data are very primitive, only referring to basic events like the adding and removing of relative devices instead of details about where and how these devices operate with the network.
Page 93
LLDP Function Operation Configuration Port Mode Configure operating state lldp mode (send|receive|both|disable) port LLDP. 4. Configure the intervals of LLDP updating messages Command Explanation Global Mode Configure intervals LLDP lldp tx-interval <integer> updating messages as the specified no lldp tx-interval value or default value.
Page 94
LLDP Function Operation Configuration Configure optional lldp transmit optional tlv [portDesc] information-sending attribute of the [sysName] [sysDesc] [sysCap] port as the option value of default no lldp transmit optional tlv values. 10. Configure the size of space to store Remote Table of the port Command Explanation Port Configuration Mode...
LLDP Function Operation Configuration Port configuration mode clear lldp remote-table Clear Remote-table of the port. 9.3 LLDP Function Typical Example Fig 9-1 LLDP Function Typical Configuration Example In the network topology graph above, the port 1,3 of SWITCH B are connected to port 2,4 of SWITCH A.
Page 96
LLDP Function Operation Configuration Using ―show‖ function of LLDP function can display the configuration information in global or port configuration mode.
Port Channel Configuration 10. Port Channel Configuration 10.1 Introduction to Port Channel To understand Port Channel, Port Group should be introduced first. Port Group is a group of physical ports in the configuration level; only physical ports in the Port Group can take part in link aggregation and become a member port of a Port Channel.
Port Channel Configuration Port aggregation can only be performed on ports in full-duplex mode. For Port Channel to work properly, member ports of the Port Channel must have the same properties as follows: All ports are in full-duplex mode. ...
Port Channel Configuration For the dynamic aggregation group, the members of the same group have the same operation Key, for the static aggregation group, the ports of Active have the same operation Key. The port aggregation is that multi-ports are aggregated to form an aggregation group, so as to implement the out/in load balance in each member port of the aggregation group and provides the better reliability.
Port Channel Configuration state will be the master port, the other ports at the selected state will be the member port. 10.3 Port Channel Configuration Task List 1. Create a port group in Global Mode 2. Add ports to the specified group from the Port Mode of respective ports 3.
Port Channel Configuration function at the same time. 5. Set the system priority of LACP protocol Command Explanation Global mode Set the system priority of LACP lacp system-priority <system-priority> protocol, the no command restores no lacp system-priority the default value. 6.
Page 102
Port Channel Configuration Fig 10-2 Configure Port Channel in LACP The switches in the description below are all switch and as shown in the figure, ports 1, 2, 3, 4 of S1 are access ports and add them to group1 with active mode. Ports 6, 8, 9, 10 of S2 are access ports and add them to group2 with passive mode.
Page 103
Port Channel Configuration form an aggregated port named ―Port-Channel1‖, ports 6, 8, 9, 10 of S2 form an aggregated port named ―Port-Channel2‖; can be configured in their respective aggregated port mode. Scenario 2: Configuring Port Channel in ON mode. Fig 10-3 Configure Port Channel in ON mode As shown in the figure, ports 1, 2, 3, 4 of S1 are access ports and add them to group1 with ―on‖...
Port Channel Configuration Switch2 (Config-If-Ethernet1/0/6)#port-group 2 mode on Switch2 (Config-If-Ethernet1/0/6)#exit Switch2 (config)#interface ethernet 1/0/8-10 Switch2(Config-If-Port-Range)#port-group 2 mode on Switch2(Config-If-Port-Range)#exit Configuration result: Add ports 1, 2, 3, 4 of S1 to port-group1 in order, and we can see a group in ―on‖ mode is completely joined forcedly, switch in other ends won‘t exchange LACP PDU to complete aggregation.
MTU Configuration 11. MTU Configuration 11.1 Introduction to MTU So far the Jumbo (Jumbo Frame) has not reach a determined standard in the industry (including the format and length of the frame). Normally frames sized within 1519-9000 should be considered jumbo frame. Networks with jumbo frames will increase the speed of the whole network by 2% to 5%.
EFM OAM Configuration 12. EFM OAM Configuration 12.1 Introduction to EFM OAM Ethernet is designed for Local Area Network at the beginning, but link length and network scope is extended rapidly while Ethernet is also applied to Metropolitan Area Network and Wide Area Network along with development. Due to lack the effectively management mechanism, it affects Ethernet application to Metropolitan Area Network and Wide Area Network, implementing OAM on Ethernet becomes a necessary development trend.
Page 107
EFM OAM Configuration 01-80-c2-00-00-02 of protocol, the max transmission rate is 10Pkt/s. EFM OAM is established on the basis of OAM connection, it provides a link operation management mechanism such as link monitoring, remote fault detection and remote loopback testing, the simple introduction for EFM OAM in the following: 1.
Page 108
EFM OAM Configuration errored frame at least in a second.) 3. Remote Fault Detection In a network where traffic is interrupted due to device failures or unavailability, the flag field defined in Ethernet OAMPDUs allows an Ethernet OAM entity to send fault information to its peer.
EFM OAM Configuration Customer Service Provider Customer 802.3ah Ethernet in the First Mile 802.1ah OAMPDU Fig 12-2 Typical OAM application topology 12.2 EFM OAM Configuration EFM OAM configuration task list 1. Enable EFM OAM function of port 2. Configure link monitor 3.
Page 110
EFM OAM Configuration Configure timeout of EFM OAM ethernet-oam timeout <seconds> connection, no command restores no ethernet-oam timeout the default value. 2. Configure link monitor Command Explanation Port mode ethernet-oam link-monitor Enable link monitor of EFM OAM, no ethernet-oam link-monitor no command disables link monitor.
EFM OAM Configuration ethernet-oam errored-symbol-period Configure the high threshold of threshold high {high-symbols | none} errored symbol period event, no ethernet-oam errored-symbol-period command restores the default threshold high value. (optional) ethernet-oam errored-frame-period Configure the high threshold of threshold high {high-frames | none} errored frame period event, no ethernet-oam errored-frame-period...
EFM OAM Configuration instance Ethernet Ethernet 1/0/1 1/0/1 802.1ah OAMPDU Fig 12-3 Typical OAM application topology Configuration procedure: (Omitting SNMP and Log configuration in the following) Configuration on CE: CE(config)#interface ethernet1/0/1 CE (config-if-ethernet1/0/1)#ethernet-oam mode passive CE (config-if-ethernet1/0/1)#ethernet-oam CE (config-if-ethernet1/0/1)#ethernet-oam remote-loopback supported Other parameters use the default configuration.
Page 113
EFM OAM Configuration Ensuring the used board supports remote loopback function. Port should not configure STP, MRPP, ULPP, Flow Control, loopback detection functions after it enables OAM loopback function, because OAM remote loopback function and these functions are mutually exclusive. When enabling OAM, the negotiation of the port will be disabled automatically.
bpdu-tunnel Configuration 13. bpdu-tunnel Configuration 13.1 Introduction to bpdu-tunnel BPDU Tunnel is a Layer 2 tunnel technology. It allows Layer 2 protocol packets of geographically dispersed private network users to be transparently transmitted over specific tunnels across a service provider network. 13.1.1 bpdu-tunnel function In MAN application, multi-branches of a corporation may connect with each other by the service provider network.
bpdu-tunnel Configuration Fig 13-1 BPDU Tunnel application 13.2 bpdu-tunnel Configuration Task List bpdu-tunnel configuration task list: 1. Configure tunnel MAC address globally 2. Configure the port to support the tunnel 1. Configure tunnel MAC address globally Command Explanation Global mode bpdu-tunnel dmac <mac>...
Page 116
bpdu-tunnel Configuration network 2, which are connected by the service provider network. When Layer 2 protocol packets cannot implement the passthrough across the service provider network, the user‘s network cannot process independent Layer 2 protocol calculation (for example, spanning tree calculation), so they affect each other. Fig 13-2 BPDU Tunnel application environment With BPDU Tunnel, Layer 2 protocol packets from user‘s networks can be passed through over the service provider network in the following work flow:...
bpdu-tunnel Configuration PE2(config-if-ethernet1/0/1)# bpdu-tunnel dot1x 13.4 bpdu-tunnel Troubleshooting After port disables stp, gvrp, uldp, lacp and dot1x functions, it is able to configure bpdu-tunnel function.
LLDP-MED 14. LLDP-MED 14.1 Introduction to LLDP-MED LLDP-MED (Link Layer Discovery Protocol-Media Endpoint Discovery) based on 802.1AB LLDP (Link Layer Discovery Protocol) of IEEE. LLDP provides a standard link layer discovery mode, it sends local device information (including its major capability, management IP address, device ID and port ID) as TLV (type/length/value) triplets in LLDPDU (Link Layer Discovery Protocol Data Unit) to the direct connection neighbors.
Page 119
LLDP-MED no lldp transmit med tlv extendPoe send LLDP-MED Extended Power-Via-MDI TLV. command disables the capability. Configure the port to send LLDP-MED Inventory lldp transmit med tlv inventory Management TLVs. The no no lldp transmit med tlv inventory command disables capability.
Page 120
LLDP-MED room | postal | otherInfo} <address> Address LCI address mode no {description-language | province-state | city | of the port. county | street | locationNum | location | floor | room | postal | otherInfo} Global mode When the fast LLDP-MED startup mechanism enabled, it needs to fast send...
LLDP-MED IEEE 802.3 Information : auto-negotiation support: Supported auto-negotiation support: Not Enabled PMD auto-negotiation advertised capability: 1 operational MAU type: 1 SwitchA# show lldp neighbors interface ethernet 1/0/2 Port name : interface ethernet 1/0/2 Port Remote Counter:1 Neighbor Index: 1 Port name : Ethernet1/0/2 Port Remote Counter : 1 TimeMark :20...
Page 124
LLDP-MED Only network connection device received LLDP packets with LLDP-MED TLV from the near MED device, it sends LLDP-MED TLV. If network connection device configured the command for sending LLDP-MED TLV, the packets also without LLDP-MED TLV sent by the port, that means no MED information is received and the port does not enable the function for sending LLDP-MED information.
PORT SECURITY 15. PORT SECURITY 15.1 Introduction to PORT SECURITY Port security is a MAC address-based security mechanism for network access controlling. It is an extension to the existing 802.1x authentication and MAC authentication. It controls the access of unauthorized devices to the network by checking the source MAC address of the received frame and the access to unauthorized devices by checking the destination MAC address of the sent frame.
PORT SECURITY table or a MAC address is configured several interfaces in same VLAN, both of them will violate the security of the MAC address. switchport port-security aging {static | time Enable port-security aging <value> | type {absolute | inactivity}} entry of the interface, specify no switchport port-security violation aging {static aging time or aging type.
PORT SECURITY Switch(config-if-ethernet1/0/1)#switchport port-security Switch(config-if- ethernet1/0/1)#switchport port-security maximum 10 Switch(config-if- ethernet1/0/1)#exit Switch(config)# 15.4 PORT SECURITY Troubleshooting If problems occur when configuring PORT SECURITY, please check whether the problem is caused by the following reasons: Check whether PORT SECURITY is enabled normally ...
DDM Configuration 16. DDM Configuration 16.1 Introduction to DDM 16.1.1 Brief Introduction to DDM DDM (Digital Diagnostic Monitor) makes the detailed digital diagnostic function standard in SFF-8472 MSA. It set that the parameter signal is monitored and make it to digitize on the circuit board of the inner module.
DDM Configuration function. Besides, the state of Tx Fault and Rx LOS is important for analyzing the fault. 3. Compatibility verification Compatibility verification is used to analyze whether the environment of the module accords the data manual or it is compatible with the corresponding standard, because the module capability is able to be ensured only in the compatible environment.
DDM Configuration Besides checking the real-time working state of the transceiver, the user needs to monitor the detailed status, such as the former abnormity time and the abnormity type. Transceiver monitoring helps the user to find the former abnormity status through checking the log and query the last abnormity status through executing the commands.
Page 131
DDM Configuration Set the interval of the transceiver transceiver-monitoring interval <minutes> monitor. The no command sets the no transceiver-monitoring interval interval to be the default interval of 15 minutes. (2)Configure the enable state of the transceiver monitoring Command Explanation Port mode whether transceiver monitoring is enabled.
DDM Configuration 16.3 Examples of DDM Example1: Ethernet 21 and Ethernet 23 are inserted the fiber module with DDM, Ethernet 24 is inserted the fiber module without DDM, Ethernet 22 does not insert any fiber module, show the DDM information of the fiber module. a、Show the information of all interfaces which can read the real-time parameters normally,(No fiber module is inserted or the fiber module is not supported, the information will not be shown), for example:...
Page 133
DDM Configuration Temperature(℃) Voltage(V) 7.31(A+) 5.00 0.00 5.00 0.00 Bias current(mA) 6.11(W+) 10.30 0.00 5.00 0.00 RX Power ( dBM) -30.54(A-) 9.00 -25.00 9.00 -25.00 TX Power ( dBM) -6.01 9.00 -25.00 9.00 -25.00 Ethernet 1/0/22 transceiver detail information: N/A Ethernet 1/0/24 transceiver detail information: Base information: SFP found in this port, manufactured by company, on Sep 29 2010.
Page 134
DDM Configuration Step2: Configure the tx-power threshold of the fiber module, the low-warning threshold is -12, the low-alarm threshold is -10.00. Switch#config Switch(config)#interface ethernet 1/0/21 Switch(config-if-ethernet1/0/21)#transceiver threshold tx-power low-warning -12 Switch(config-if-ethernet1/0/21)#transceiver threshold tx-power low-alarm -10.00 Step3: Show the detailed DDM information of the fiber module. The alarm uses the threshold configured by the user, the threshold configured by the manufacturer is labeled with the bracket.
Page 135
DDM Configuration The last threshold-violation doesn‘t exist. Ethernet 1/0/22 transceiver threshold-violation information: Transceiver monitor is disabled. Monitor interval is set to 30 minutes. The last threshold-violation doesn‘t exist. Step2: Enable the transceiver monitoring of ethernet 21. Switch(config)#interface ethernet 1/0/21 Switch(config-if-ethernet1/0/21)#transceiver-monitoring enable Step3: Show the transceiver monitoring of the fiber module.
DDM Configuration 16.4 DDM Troubleshooting If problems occur when configuring DDM, please check whether the problem is caused by the following reasons: Ensure that the transceiver of the fiber module has been inserted fast on the port, or else DDM configuration will not be shown. ...
VLAN Configuration 17. VLAN Configuration 17.1 VLAN Configuration 17.1.1 Introduction to VLAN VLAN (Virtual Local Area Network) is a technology that divides the logical addresses of devices within the network to separate network segments basing on functions, applications or management requirements. By this way, virtual workgroups can be formed regardless of the physical location of the devices.
VLAN Configuration Improving network performance Saving network resources Simplifying network management Lowering network cost Enhancing network security Switch Ethernet Ports can works in three kinds of modes: Access, Hybrid and Trunk, each mode has a different processing method in forwarding the packets with tagged or untagged.
Page 139
VLAN Configuration 1. Create or delete VLAN Command Explanation Global Mode vlan WORD Create/delete VLAN or enter VLAN no vlan WORD Mode 2. Set or delete VLAN name Command Explanation VLAN Mode name <vlan-name> Set or delete VLAN name. no name 3.
Page 140
VLAN Configuration 7. Set Hybrid port Command Explanation Port Mode switchport hybrid allowed vlan {WORD | all | add WORD | except WORD | remove Set/delete the VLAN which is allowed WORD} {tag | untag} by Hybrid port with tag or untag mode. no switchport hybrid allowed vlan switchport hybrid native vlan <vlan-id>...
VLAN Configuration 17.1.3 Typical VLAN Application Scenario: VLAN100 VLAN2 VLAN200 Workstation Workstation Switch A Trunk Link Switch B VLAN2 VLAN200 Workstation VLAN100 Workstation Fig 17-2 Typical VLAN Application Topology The existing LAN is required to be partitioned to 3 VLANs due to security and application requirements.
Page 143
VLAN Configuration internet Switch A Switch B Fig 17-3 Typical Application of Hybrid Port PC1 connects to the interface Ethernet 1/0/7 of SwitchB, PC2 connects to the interface Ethernet 1/0/9 of SwitchB, Ethernet 1/0/10 of SwitchA connect to Ethernet 1/0/10 of SwitchB.
VLAN Configuration Fig 17-4 a typical application scene A and G switches are not directly connected in layer 2 network; BCDEF are intermediate switches connecting A and G. Switch A and G configure VLAN100-1000 manually while BCDEF switches do not. When GVRP is not enabled, A and G cannot communicate with each other, because intermediate switches without relevant VLANs.
VLAN Configuration 1. Configure GVRP timer Command Explanation Global mode garp timer join <200-500> garp timer leave <500-1200> Configure leaveall, join and leave garp timer leaveall <5000-60000> timer for GVRP. no garp timer (join | leave | leaveAll) 2. Configure port type Command Explanation Port mode...
Page 147
VLAN Configuration Switch A Switch B Switch C Fig 17-5 Typical GVRP Application Topology To enable dynamic VLAN information register and update among switches, GVRP protocol is to be configured in the switch. Configure GVRP in Switch A, B and C, enable Switch B to learn VLAN100 dynamically so that two workstations connected to VLAN100 in Switch A and C can communicate with each other through Switch B without static VLAN100 entries.
VLAN Configuration 17.3 Dot1q-tunnel Configuration 17.3.1 Introduction to Dot1q-tunnel Dot1q-tunnel is also called QinQ (802.1Q-in-802.1Q), which is an expansion of 802.1Q. Its dominating idea is encapsulating the customer VLAN tag (CVLAN tag) to the service provider VLAN tag (SPVLAN tag). Carrying the two VLAN tags the packet is transmitted through the backbone network of the ISP internet, so to provide a simple layer-2 tunnel for the users.
VLAN Configuration The technology of Dot1q-tuunel provides the ISP internet the ability of supporting many client VLANs by only one VLAN of theirselves. Both the ISP internet and the clients can configure their own VLAN independently. It is obvious that, the dot1q-tunnel function has got following characteristics: ...
VLAN Configuration 17.3.3 Typical Applications of the Dot1q-tunnel Scenario: Edge switch PE1 and PE2 of the ISP internet forward the VLAN200~300 data between CE1 and CE2 of the client network with VLAN3. The port1 of PE1 is connected to CE1, port10 is connected to public network, the TPID of the connected equipment is 9100; port1 of PE2 is connected to CE2, port10 is connected to public network.
VLAN Configuration Switch(Config)# 17.3.4 Dot1q-tunnel Troubleshooting Enabling dot1q-tunnel on Trunk port will make the tag of the data packet unpredictable which is not required in the application. So it is not recommended to enable dot1q-tunnel on Trunk port. Enabled with STP/MSTP is not supported. Enabled with PVLAN is not supported.
VLAN Configuration Port mode vlan-translation <old-vlan-id> <new-vlan-id> in Add/delete a VLAN-translation relation. no vlan-translation old-vlan-id in 3. Configure whether the packet is dropped when checking VLAN-translation is failing Command Explanation Port mode vlan-translation miss drop in Configure the VLAN-translation packet no vlan-translation miss drop in dropped on port if there is any failure.
VLAN Configuration On the customer port Trunk VLAN 200-300 ingress port Trunk connection translates VLAN20 to VLAN3, the egress translates VLAN3 to SP networks VLAN20 on PE Customer Trunk connection networks1 Trunk connection ingress port translates VLAN20 to VLAN3, the egress translates VLAN3 to Trunk VLAN20 on PE Customer...
VLAN Configuration Priority of vlan translation and vlan ingress filtering for processing packets is: vlan translation > vlan ingress filtering 17.5 Dynamic VLAN Configuration 17.5.1 Introduction to Dynamic VLAN The dynamic VLAN is named corresponding to the static VLAN (namely the port based VLAN).
Page 156
VLAN Configuration 3. Configure the correspondence between the MAC address and the VLAN 4. Configure the IP-subnet-based VLAN function on the port 5. Configure the correspondence between the IP subnet and the VLAN 6. Configure the correspondence between the Protocols and the VLAN 7.
VLAN Configuration mask <subnet-mask> vlan <vlan-id> between the IP subnet and the VLAN, priority <priority-id> namely specified subnet subnet-vlan {ip-address joins/leaves specified VLAN. <ipv4-addrss> mask <subnet-mask>|all} 6. Configure the correspondence between the Protocols and the VLAN Command Explanation Global Mode protocol-vlan mode {ethernetii etype <etype-id>|llc {dsap <dsap-id>...
VLAN Configuration SwitchA SwitchB SwitchC VLAN100 VLAN200 VLAN300 Fig 17-8 Typical topology application of dynamic VLAN Configuration Configuration Explanation Items MAC-based Global configuration on Switch A, Switch B, Switch C. VLAN For example, M at E1/0/1 of SwitchA, then the configuration procedures are as follows: Switch A, Switch B, Switch C: SwitchA (Config)#mac-vlan mac 00-03 -0f-11-22-33 vlan 100 priority 0 SwitchA (Config)#interface ethernet 1/0/1...
VLAN Configuration PC) are both belongs to the same dynamic VLAN, first communication between the two equipments may not go through. The solution will be letting the two equipments positively send data packet to the switch (such as ping), to let the switch learn their source MAC, then the two equipments will be able to communicate freely within the dynamic VLAN.
VLAN Configuration VLAN according to its voice traffic which will be transmitted at specified priority. Meanwhile, when voice equipment is physically relocated, it still belongs to the Voice VLAN without any further configuration modification, which is because it is based on voice equipment other than switch port.
VLAN Configuration 17.6.3 Typical Applications of the Voice VLAN Scenario: A company realizes voice communication through configuring Voice VLAN. IP-phone1 and IP-phone2 can be connected to any port of the switch, namely normal communication and interconnected with other switches through the uplink port. IP-phone1 MAC address is 00-03-0f-11-22-33, connect port 1/0/1 of the switch, IP-phone2 MAC address is 00-03-0f-11-22-55, connect port 1/0/2 of the switch.
VLAN Configuration switch(Config-If-Ethernet1/0/1)#switchport hybrid allowed vlan 100 untag switch(Config-If-Ethernet1/0/1)#exit switch(Config)#interface ethernet 1/0/2 switch(Config-If-Ethernet1/0/2)#switchport mode hybrid switch(Config-If-Ethernet1/0/2)#switchport hybrid allowed vlan 100 untag switch(Config-If-Ethernet1/0/2)#exit 17.6.4 Voice VLAN Troubleshooting Voice VLAN can not be applied concurrently with MAC-base VLAN. The Voice VLAN on the port is enabled by default. If the configured data can no longer enter the Voice VLAN during operation, please check if the Voice VLAN function has been disabled on the port.
VLAN Configuration 2. Show the related configuration of Multi-to-One VLAN translation Command Explanation Admin mode Show the related configuration of show vlan-translation n-to-1 Multi-to-One VLAN translation. 17.7.3 Typical application of Multi-to-One VLAN Translation Scenario: UserA, userB and userC belong to VLAN1, VLAN2, VLAN3 respectively. Before entering the network layer, data traffic of userA, userB and userC is translated into VLAN 100 by Ethernet1/0/1 of edge switch1.
VLAN Configuration Configuration Item Configuration Explanation Switch1、Switch2 VLAN Trunk Port Downlink port 1/0/1 and uplink port 1/0/5 of Switch1 and Switch Multi-to-One Downlink port 1/0/1 of Switch1 and Switch2 VLAN-translation Configuration procedure is as follows: Switch1、Switch2: switch(Config)# vlan 1-3;100 switch(Config-Ethernet1/0/1)#switchport mode trunk switch(Config-Ethernet1/0/1)# vlan-translation n-to-1 1-3 to 100 switch(Config)#interface ethernet 1/0/5 switch(Config-Ethernet1/0/5)#switchport mode trunk...
Page 165
VLAN Configuration control of broadcast domain and deploy convenience). However, in generic layer-3 switch, it implements communication between broadcast domains through a method that a VLAN correspond to a layer-3 interface, it results in IP address waste. For example, VLAN division of device is shown in the figure. Fig 17-12 generic VLAN network Gateway Usable...
Page 166
VLAN Configuration 10 hosts, and a subnet with mask of 28 bits is assigned to VLAN 21 before, here, the redundant addresses are wasted because they can not be used by other VLAN. The above division is difficult to network update. If client of VLAN23 needs to add 2 hosts and client does not want to change the assigned IP address, but the addresses after 1.1.1.24 are assigned to others, so we should assign a subnet with mask of 29 bits and a new VLAN to this client.
VLAN Configuration 17.8.2 Super VLAN Configuration 1. Create or delete supervlan 2. Specify or delete subvlan 3. Enable or disable arp-proxy function of subvlan 4. Specify or delete ip-addr-range of interface 5. Specify or delete ip-addr-range of subvlan 1. Create or delete supervlan Command Explanation VLAN configuration mode...
VLAN Configuration ip-addr-range subvlan <vlan-id> <ipv4-addrss> Specify delete address to <ipv4-addrss> range of subvlan. no ip-addr-range subvlan <vlan-id> 17.8.3 Typical Application of Super VLAN Switch A VLAN VLAN Fig 17-14 typical of super vlan topology Terminals of two VLANs needs to configure their addresses in the same network segment due to requirement of LAN application.
VLAN Configuration switch(Config-Vlan2)#exit switch(Config)#interface vlan 2 switch(config-if-vlan2)#ip address 1.1.1.254 255.255.255.0 switch(config-if-vlan2)#arp-proxy subvlan all switch(config-if-vlan2)#ip-addr-range subvlan 3 1.1.1.1 to 1.1.1.10 switch(config-if-vlan2)#ip-addr-range subvlan 4 1.1.1.20 to 1.1.1.30 switch(config-if-vlan2)#exit 17.8.4 Super VLAN Troubleshooting Supervlan and these functions (VRRP, dynamic VLAN, private VLAN, multicast VLAN, etc.) are mutually exclusive, so they should not be used at the same time.
MAC Table Configuration 18. MAC Table Configuration 18.1 Introduction to MAC Table MAC table is a table identifies the mapping relationship between destination MAC addresses and switch ports. MAC addresses can be categorized as static MAC addresses and dynamic MAC addresses. Static MAC addresses are manually configured by the user, have the highest priority and are permanently effective (will not be overwritten by dynamic MAC addresses);...
Page 171
MAC Table Configuration Fig 18-1 MAC Table dynamic learning The topology of the figure above: 4 PCs connected to switch, where PC1 and PC2 belongs to a same physical segment (same collision domain), the physical segment connects to port 1/0/5 of switch; PC3 and PC4 belongs to the same physical segment that connects to port 1/0/12 of switch.
MAC Table Configuration seconds here is the default aging time for MAC address entry in switch. Aging time can be modified in switch. 18.1.2 Forward or Filter The switch will forward or filter received data frames according to the MAC table. Take the above figure as an example, assuming switch have learnt the MAC address of PC1 and PC3, and the user manually configured the mapping relationship for PC2 and PC4 to ports.
MAC Table Configuration are in the switch MAC table, the switch will directly forward the frames to the associated ports; when the destination MAC address in a unicast frame is not found in the MAC table, the switch will broadcast the unicast frame. When VLANs are configured, the switch will forward unicast frame within the same VLAN.
MAC Table Configuration Clear dynamic address table Command Explanation Admin Mode clear mac-address-table dynamic Clear the dynamic address table. [address <mac-addr>] [vlan <vlan-id>] [interface [ethernet portchannel] <interface-name>] Configure MAC learning through CPU control Command Explanation Global Mode mac-address-learning cpu-control Enable MAC learning through CPU no mac-address-learning cpu-control control, the no command restores that the chip automatically learn MAC...
MAC Table Configuration The configuration steps are listed below: 1. Set the MAC address 00-01-11-11-11-11 of PC1 as a filter address. Switch(config)#mac-address-table static 00-01-11-11-11-11 discard vlan 1. 2.Set the static mapping relationship for PC2 and PC3 to port 1/0/7 and port 1/0/9, respectively.
Page 176
MAC Table Configuration stream destined for the other MAC addresses that not bound to the port will not be allowed to pass through the port. 18.5.1.2 MAC Address Binding Configuration Task List 1. Enable MAC address binding function for the ports 2.
Page 177
MAC Table Configuration Admin Mode clear port-security dynamic [address Clear dynamic MAC addresses learned <mac-addr> | interface <interface-id>] by the specified port. 3. MAC address binding property configuration Command Explanation Port Mode switchport port-security maximum Set the maximum number of secure MAC addresses for a port;...
MAC Table Configuration 18.6 MAC Notification Configuration 18.6.1 Introduction to MAC Notification MAC Notification function depends on the notification. Add or remove the MAC address, namely, when the device is added or removed, it will notify administrator about the changing by the trap function of snmp. 18.6.2 MAC Notification Configuration Mac notification configuration task list: 1.
MAC Table Configuration 4. Configure the size of history table Command Explanation Global mode mac-address-table notification history-size Configure the history table size, the <0-500> no command restores the default mac-address-table notification value. history-size 5. Configure the trap type of MAC notification supported by the port Command Explanation Port mode...
MAC Table Configuration Switch(config)# mac-address-table notification history-size 100 Switch(Config-If-Ethernet1/0/4)# mac-notification both 18.6.4 MAC Notification Troubleshooting Check whether trap message is sent successfully by show command and debug command of snmp.
MSTP Configuration 19. MSTP Configuration 19.1 Introduction to MSTP The MSTP (Multiple STP) is a new spanning-tree protocol which is based on the STP and the RSTP. It runs on all the bridges of a bridged-LAN. It calculates a common and internal spanning tree (CIST) for the bridge-LAN which consists of the bridges running the MSTP, the RSTP and the STP.
Page 182
MSTP Configuration Root Root REGION Fig 19-1 Example of CIST and MST Region In the above network, if the bridges are running the STP or the RSTP, one port between Bridge M and Bridge B should be blocked. But if the bridges in the yellow range run the MSTP and are configured in the same MST region, MSTP will treat this region as a bridge.
MSTP Configuration 19.1.1.2 Operations between MST Regions If there are multiple regions or legacy 802.1D bridges within the network, MSTP establishes and maintains the CST, which includes all MST regions and all legacy STP bridges in the network. The MST instances combine with the IST at the boundary of the region to become the CST.
Page 184
MSTP Configuration 1. Enable MSTP and set the running mode Command Explanation Global Mode and Port Mode spanning-tree Enable/Disable MSTP. no spanning-tree Global Mode spanning-tree mode {mstp|stp|rstp} Set MSTP running mode. no spanning-tree mode Port Mode spanning-tree mcheck Force port migrate to run under MSTP. 2.
Page 185
MSTP Configuration rootguard port can‘t turn to root port. spanning-tree [mst <instance-id>] Enable loopguard function on specified loopguard instance, the no command disables this no spanning-tree [mst <instance-id>] function. loopguard 3. Configure MSTP region parameters Command Explanation Global Mode Enter MSTP region mode. The no spanning-tree mst configuration command restores...
Page 186
MSTP Configuration 4. Configure MSTP time parameters Command Explanation Global Mode spanning-tree forward-time <time> Set the value for switch forward delay no spanning-tree forward-time time. spanning-tree hello-time <time> Set the Hello time for sending BPDU no spanning-tree hello-time messages. spanning-tree maxage <time> Set Aging time for BPDU messages.
Page 187
MSTP Configuration 7. Configure the spanning-tree attribute of port Command Explanation Port Mode spanning-tree cost Set the port path cost. no spanning-tree cost spanning-tree port-priority Set the port priority. no spanning-tree port-priority spanning-tree rootguard Set the port is root port. no spanning-tree rootguard Global Mode spanning-tree...
MSTP Configuration Port Mode spanning-tree tcflush {enable| disable| Configure the port flush mode. protect} The no command restores to use the no spanning-tree tcflush global configured flush mode. 19.3 MSTP Example The following is a typical MSTP application example: Fig 19-2 Typical MSTP Application Scenario The connections among the switches are shown in the above figure.
Page 189
MSTP Configuration port 2 200000 200000 200000 port 3 200000 200000 port 4 200000 200000 port 5 200000 200000 port 6 200000 200000 port 7 200000 200000 By default, the MSTP establishes a tree topology (in blue lines) rooted with SwitchA. The ports marked with ―x‖...
Page 191
MSTP Configuration Switch4(Config-Mstp-Region)#instance 3 vlan 20;30 Switch4(Config-Mstp-Region)#instance 4 vlan 40;50 Switch4(Config-Mstp-Region)#exit Switch4(config)#interface e1/0/1-7 Switch4(Config-Port-Range)#switchport mode trunk Switch4(Config-Port-Range)#exit Switch4(config)#spanning-tree Switch4(config)#spanning-tree mst 4 priority 0 After the above configuration, Switch1 is the root bridge of the instance 0 of the entire network. In the MSTP region which Switch2, Switch3 and Switch4 belong to, Switch2 is the region root of the instance 0, Switch3 is the region root of the instance 3 and Switch4 is the region root of the instance 4.
MSTP Configuration Fig 19-4 The Topology Of the Instance 3 after the MSTP Calculation Fig 19-5 The Topology Of the Instance 4 after the MSTP Calculation 19.4 MSTP Troubleshooting In order to run the MSTP on the switch port, the MSTP has to be enabled globally. If the MSTP is not enabled globally, it can‘t be enabled on the port.
QoS Configuration 20. QoS Configuration 20.1 Introduction to QoS QoS (Quality of Service) is a set of capabilities that allow you to create differentiated services for network traffic, thereby providing better service for selected network traffic. QoS is a guarantee for service quality of consistent and predictable data transfer service to fulfill program requirements.
QoS Configuration Fig 20-2 ToS priority IP Precedence: IP priority. Classification information carried in Layer 3 IP packet header, occupying 3 bits, in the range of 0 to 7. DSCP: Differentiated Services Code Point, classification information carried in Layer 3 IP packet header, occupying 6 bits, in the range of 0 to 63, and is downward compatible with IP Precedence.
QoS Configuration bandwidth and low-lag requirement. Based on differentiated service, QoS specifies a priority for each packet at the ingress. The classification information is carried in Layer 3 IP packet header or Layer 2 802.1Q frame header. QoS provides same service to packets of the same priority, while offers different operations for packets of different priority.
Page 196
QoS Configuration Start tag packet L2 COS value L2 COS value of the obtained by the packet is its own L2 packet as the default COS(*1) Trust DSCP IP packet (*2) Trust COS (*2) tag packet Set Int-Prio as the DSCP-to-Int-Prio default ingress Int- conversion according to...
Page 197
QoS Configuration Note 2: Allow Trust DSCP and Trust COS to be configured at the same time, the priority is as follows: DSCP>COS. Policing and remark: Each packet in classified ingress traffic is assigned an internal priority value, and can be policed and remarked. Policing can be performed based on the flow to configure different policies that allocate bandwidth to classified traffic, the assigned bandwidth policy may be single bucket dual color or dual bucket three color.
Page 198
QoS Configuration Start Whether configure the policy Unrelated action Drop with the color Pass The option is as follows: Set Int-Prio: Set the internal priority of the packets Decide the packet color and action according to the policing policy The specific Drop color action Pass...
Page 199
QoS Configuration Queuing and scheduling: There are the internal priority for the egress packets, the scheduling operation assigns the packets to different priority queues according to the internal priority, and then forward the packets according to the priority queue weight and the drop precedence.
QoS Configuration 20.2 QoS Configuration Task List Configure class map Set up a classification rule according to ACL, CoS, VLAN ID, IPv4 Precedent, DSCP, IPV6 FL to classify the data stream. Different classes of data streams will be processed with different policies. Configure a policy map After data steam classification, a policy map can be created to associate with the class map created earlier and enter class mode.
Page 201
QoS Configuration no match {access-group | ip dscp | ip precedence | ipv6 access-group | ipv6 dscp | ipv6 flowlabel | vlan | cos} 2. Configure a policy map Command Explanation Global Mode Create a policy map and enter policy policy-map <policy-map-name>...
Page 202
QoS Configuration the policy class map mode, add statistic function to the traffic of the policy class map. In single bucket mode, the messages can only red or green when passing policy. In the print information, there colors(green and red) of the packets. In dual bucket mode, there are three colors(green, red and yellow) of the packets.
Page 203
QoS Configuration pass-through-dscp Forbid the packet to rewrite dscp no pass-through-dscp value at the egress, the no command allows the packet to rewrite dscp value. Global Mode service-policy input <policy-map-name> Apply a policy map to the specified vlan <vlan-list> VLAN interface; the no command service-policy input deletes the specified policy map...
QoS Configuration If there are no parameters, clear accounting data of all policy map. 7. Show configuration of QoS Command Explanation Admin Mode show mls qos maps [cos-intp | dscp-intp Display configuration | intp-intp | intp-cos | intp-dscp | intp-dp | mapping.
Page 205
QoS Configuration ethernet1/0/1, it will be map to the internal priority according to the CoS value, CoS value 0 to 7 correspond to queue out 1, 2, 3, 4, 5, 6, 7, 8 respectively. If the incoming packet has no CoS value, it is default to 5 and will be put in queue6. All passing packets would not have their DSCP values changed Example 2: In port ethernet1/0/2, set the bandwidth for packets from segment 192.168.1.0 to 10 Mb/s,...
Page 206
QoS Configuration Example 3: Server QoS area Switch3 Switch2 Trunk Switch1 Fig 20-7 Typical QoS topology As shown in the figure, inside the block is a QoS domain, Switch1 classifies different traffics and assigns different IP precedences. For example, set CoS precedence for packets from segment 192.168.1.0 to 5 on port ethernet1/0/1(set the internal priority to 40, set the default intp-dscp mapping to 40-40, the corresponding IP precedence to 5).
QoS Configuration QoS configuration in Switch2: Switch#config Switch(config)#interface ethernet 1/0/1 Switch(Config-If-Ethernet1/0/1)#mls qos trust dscp 20.4 QoS Troubleshooting trust cos and EXP can be used with other trust or Policy Map. trust dscp can be used with other trust or Policy Map. This configuration takes effect to IPv4 and IPv6 packets.
Flow-based Redirection 21. Flow-based Redirection 21.1 Introduction to Flow-based Redirection Flow-based redirection function enables the switch to transmit the data frames meeting some special condition (specified by ACL) to another specified port. The fames meeting a same special condition are called a class of flow, the ingress port of the data frame is called the source port of redirection, and the specified egress port is called the destination port of redirection.
Flow-based Redirection 2. Check the current flow-based redirection configuration Command Explanation Global Mode/Admin Mode Display the information of show flow-based-redirect {interface [ethernet current flow-based <IFNAME> |<IFNAME>]} redirection system/port. 21.3 Flow-based Redirection Examples Example: User‘s request of configuration is listed as follows: redirecting the frames whose source IP is 192.168.1.111 received from port 1 to port 6, that is sending the frames whose source IP is 192.168.1.111 received from port 1 through port6.
Flexible QinQ Configuration 22. Flexible QinQ Configuration 22.1 Introduction to Flexible QinQ 22.1.1 QinQ Technique Dot1q-tunnel is also called QinQ (802.1Q-in-802.1Q), which is an expansion of 802.1Q. Its dominating idea is encapsulating the customer VLAN tag (CVLAN tag) to the service provider VLAN tag (SPVLAN tag).
Page 211
Flexible QinQ Configuration 2. Create flexible QinQ policy-map to relate with the class-map and set the corresponding operation 3. Bind flexible QinQ policy-map to port 1. Configure class map Command Explanation Global mode class-map <class-map-name> Create class-map enter no class-map <class-map-name> class-map mode, the no command deletes the specified class-map.
Page 212
Flexible QinQ Configuration cancels the operation. 3. Bind flexible QinQ policy-map to port Command Explanation Port mode service-policy input<policy-map-name> Apply a policy-map to a port, the no no service-policy input<policy-map-name> command deletes specified policy-map applied to the port. Global mode service-policy input<policy-map-name>...
Flexible QinQ Configuration 22.3 Flexible QinQ Example Fig 22-1 Flexible QinQ application topology As shown in the figure, the first user is assigned three VLANs that the tag values are 1001, 2001, 3001 respectively in DSLAM1. VLAN1001 corresponds to Broad Band Network, VLAN2001 corresponds to VOIP, VLAN3001 corresponds to VOD.
Page 214
Flexible QinQ Configuration Switch(config-classmap-c2)#exit Switch(config)#class-map c3 Switch(config-classmap-c3)#match vlan 3001 Switch(config-classmap-c3)#exit Switch(config)#policy-map p1 Switch(config-policymap-p1)#class c1 Switch(config-policymap-p1-class-c1)# set s-vid 1001 Switch(config-policymap-p1)#class c2 Switch(config-policymap-p1-class-c2)# set s-vid 2001 Switch(config-policymap-p1)#class c3 Switch(config-policymap-p1-class-c3)# set s-vid 3001 Switch(config-policymap-p1-class-c3)#exit Switch(config-policymap-p1)#exit Switch(config)#interface ethernet 1/0/1 Switch(config-if-ethernet1/0/1)#service-policy input p1 If the data flow of DSLAM2 enters the switch‘s downlink port1, the configuration is as follows: Switch(config)#class-map c1 Switch(config-classmap-c1)#match vlan 1001...
Flexible QinQ Configuration 22.4 Flexible QinQ Troubleshooting If flexible QinQ policy can not be bound to the port, please check whether the problem is caused by the following reasons: Make sure flexible QinQ whether supports the configured class-map and policy-map ...
Egress QoS Configuration 23. Egress QoS Configuration 23.1 Introduction to Egress QoS In traditional IP networks, all packets are treated in the same way. All network equipments treat them by the first-in-first-out policy and try best effort to send them to the destination.
Egress QoS Configuration 23.1.2 Basic Egress QoS Model Ingress Egress Generate internal Policing and priority color Classification Policing Remark scheduling remark of Egress Sort packet traffic Decide whether traffic Place packets into priority Set the color of packet according to the color is single bucket Degrade or discard queues according to...
Egress QoS Configuration Description of action that modify QoS attribute according to egress remark table: cos-cos:for cos value of packets, modify cos value of packets according to cos table of QoS remarking cos-dscp:for cos value of packets, modify dscp value of packets according to cos table of QoS remarking dscp-cos:for dscp value of packets, modify cos value of packets according to dscp table of QoS remarking...
Page 219
Egress QoS Configuration IPV6 DSCP to classify the data stream. Different classes of data streams will be processed with different policies. Configure policy map After data steam classification, a policy map can be created to associate with a class map created earlier and enter policy class mode. Then different policies (such as bandwidth limit, assigning new DSCP value) can be applied to different data streams.
Page 220
Egress QoS Configuration class <class-map-name> Create a policy map to associate with a [insert-before <class-map-name>] class map and enter policy class map no class <class-map-name> mode, then different data streams can apply different policies and be assigned a new DSCP value. No command deletes the specified policy class map.
Page 221
Egress QoS Configuration the print information, in-profile means green and out-profile means red. In dual bucket mode, there are three colors of packets in-profile means green and out-profile means red and yellow. 3. Apply policy to port or VLAN Command Explanation Interface Mode service-policy...
Egress QoS Configuration If there are no parameters, clear accounting data of all policy map. 6. Show QoS configuration Command Explanation Admin Mode show mls qos {interface [<interface-id>] Show QoS configuration of the port. [policy | queuing] | vlan <vlan-id>} Show the class map information of QoS.
Page 223
Egress QoS Configuration Example2: On the egress of vlan10, change cos value as 4 for the packet with ipv6 dscp value of Create a class map: switch(config)#class-map 1 switch(config-classmap-1)#match ipv6 dscp 7 switch(config-classmap-1)#exit Create a policy map: switch(config)#policy-map 1 switch(config-policymap-1)#class 1 switch(config-policymap-1-class-1)#set cos 4 switch(config-policymap-1-class-1)#exit switch(config-policymap-1)#exit...
Egress QoS Configuration Set trust dscp mode on ingress switch(config-if-port-range)#mls qos trust dscp Bind policy to egress of port1 switch(config-if-ethernet1/0/1)#service-policy output p1 23.4 Egress QoS Troubleshooting Help Not all equipments support Egress QoS presently, so please make sure the current device supports this function.
Layer 3 Forward Configuration 24. Layer 3 Forward Configuration Switch supports Layer 3 forwarding which forwards Layer 3 protocol packets (IP packets) across VLANs. Such forwarding uses IP addresses, when a interface receives an IP packet, it will perform a lookup in its own routing table and decide the operation according to the lookup result.
Page 226
Layer 3 Forward Configuration 1. Create Layer 3 Interface Command Explanation Global Mode Creates a VLAN interface (VLAN interface is a Layer 3 interface vlan <vlan-id> interface); the no command deletes the VLAN interface no interface vlan <vlan-id> (Layer 3 interface) created in the switch. interface loopback Creates a Loopback interface then enter the loopback...
Layer 3 Forward Configuration 24.2 Layer 3 function 24.2.1 Layer 3 function introduction The switch disable L3 function default, enable it can use the command below, and can configure the L3 list number. 24.2.2 Layer 3 function configuration Layer 3 function configuration task list: 1.
Layer 3 Forward Configuration 24.3 IP Configuration 24.3.1 Introduction to IPv4, IPv6 IPv4 is the current version of global universal Internet protocol. The practice has proved that IPv4 is simple, flexible, open, stable, strong and easy to implement while collaborating well with various protocols of upper and lower layers. Although IPv4 almost has not been changed since it was established in 1980‘s, it has kept growing to the current global scale with the promotion of Internet.
Page 229
Layer 3 Forward Configuration essential designs of IPv4. Hierarchical addressing scheme facilitates Route Aggregation, effectively reduces route table entries and enhances the efficiency and expansibility of routing and data packet processing. The header design of IPv6 is more efficient compared with IPv4. It has less data fields and takes out header checksum, thus expedites the processing speed of basic IPv6 header.
Layer 3 Forward Configuration Protocols (EGP for short). For example, IPv6 Routing Protocol such as RIPng, OSPFv3, IS-ISv6 and MBGP4+, etc. Multicast addresses increased and the support for multicast has enhanced. By dealing with IPv4 broadcast functions such as Router Discovery and Router Query, IPv6 multicast has completely replaced IPv4 broadcast in the sense of function.
Page 231
Layer 3 Forward Configuration (7) Configure prefix advertisement parameters (8) Configure static IPv6 neighbor entries (9) Delete all entries in IPv6 neighbor table (10) Set the hoplimit of sending router advertisement (11) Set the mtu of sending router advertisement (12) Set the reachable-time of sending router advertisement (13) Set the retrans-timer of sending router advertisement (14) Set the flag representing whether information other than the address information will be obtained via DHCPv6...
Page 232
Layer 3 Forward Configuration 2. IPv6 Neighbor Discovery Configuration (1) Configure DAD Neighbor solicitation Message number Command Explanation Interface Configuration Mode Set the neighbor query message number sent ipv6 nd dad attempts <value> in sequence when the interface makes no ipv6 nd dad attempts duplicate address detection.
Page 233
Layer 3 Forward Configuration Interface Configuration Mode ipv6 max-ra-interval Configure the maximum interval for router <seconds> advertisement. The NO command resumes no ipv6 nd max-ra-interval default value (600 seconds). (7) Configure prefix advertisement parameters Command Explanation Interface Configuration Mode ipv6 nd prefix <ipv6-address/prefix-length>...
Page 234
Layer 3 Forward Configuration (11) Set the mtu of sending router advertisement Command Explanation Interface Configuration Mode ipv6 nd ra-mtu <value> Set the mtu of sending router advertisement. (12) Set the reachable-time of sending router advertisement Command Explanation Interface Configuration Mode ipv6 reachable-time Set the reachable-time of sending router...
Layer 3 Forward Configuration 24.3.3 IP Configuration Examples 24.3.3.1 Configuration Examples of IPv4 Switch2 Switch1 Fig 24-1 IPv4 configuration example The user‘s configuration requirements are: Configure IP address of different network segments on Switch1 and Switch2, configure static routing and validate accessibility using ping function.
Page 236
Layer 3 Forward Configuration Switch2(config)#interface vlan 2 Switch2(Config-if-Vlan2)#ip address 192.168.2.2 255.255.255.0 Switch2(config)#interface vlan 3 Switch2(Config-if-Vlan3)#ip address 192.168.3.1 255.255.255.0 Switch2(Config-if-Vlan3)#exit Switch2(config)#ip route 192.168.1.0 255.255.255.0 192.168.2.1 24.3.3.2 Configuration Examples of IPv6 Example 1: Switch2 Switch1 Fig 24-2 IPv6 configuration example The user‘s configuration requirements are: Configure IPv6 address of different network segments on Switch1 and Switch2, configure static routing and validate reachability using ping6 function.
Layer 3 Forward Configuration interface Loopback mtu 3924 ipv6 route 2001::/64 2002::1 no login 24.3.4 IPv6 Troubleshooting The router lifespan configured should not be smaller than the Send Router advertisement Interval. If the connected PC has not obtained IPv6 address, you should check RA announcement switch (the default is turned off).
Layer 3 Forward Configuration 24.5 ARP 24.5.1 Introduction to ARP ARP (Address Resolution Protocol) is mainly used to resolve IP address to Ethernet address. Switch supports both dynamic static configuration.Furthermore, switch supports the configuration of proxy ARP for some applications. For instance, when an ARP request is received on the port, requesting an IP address in the same IP segment of the port but not the same physical network, if the port has enabled proxy ARP, the port would reply to the ARP with its own MAC address and forward the actual packets received.
Layer 3 Forward Configuration 3. Clear dynamic ARP Command Explanation Admin mode Clear the dynamic ARP learnt by the clear arp-cache switch. 4. Clear the statistic information of ARP message Command Explanation Admin mode Clear the statistic information of ARP clear arp traffic messages of the switch.
Page 241
Layer 3 Forward Configuration Command Explanation Global Mode l3-station-move Enable or disable l3 station move. no l3-station-move...
ARP Scanning Prevention Function Configuration 25. ARP Scanning Prevention Function Configuration 25.1 Introduction to ARP Scanning Prevention Function ARP scanning is a common method of network attack. In order to detect all the active hosts in a network segment, the attack source will broadcast lots of ARP messages in the segment, which will take up a large part of the bandwidth of the network.
Page 243
ARP Scanning Prevention Function Configuration 2. Configure the threshold of the port-based and IP-based ARP Scanning Prevention 3. Configure trusted ports 4. Configure trusted IP 5. Configure automatic recovery time 6. Display relative information of debug information and ARP scanning 1.
Page 244
ARP Scanning Prevention Function Configuration anti-arpscan trust ip <ip-address> [<netmask>] Set the trust attributes of IP. no anti-arpscan trust ip <ip-address> [<netmask>] 5. Configure automatic recovery time Command Explanation Global configuration mode anti-arpscan recovery enable Enable disable automatic no anti-arpscan recovery enable recovery function.
ARP Scanning Prevention Function Configuration 25.3 ARP Scanning Prevention Typical Examples SWITCH B E1/0/1 E1/0/19 SWITCH A E1/0/2 Server 192.168.1.100/24 Fig 25-1 ARP scanning prevention typical configuration example In the network topology above, port E1/0/1 of SWITCH B is connected to port E1/0/19 of SWITCH A, the port E1/0/2 of SWITCH A is connected to file server (IP address is 192.168.1.100/24), and all the other ports of SWITCH A are connected to common PC.
ARP Scanning Prevention Function Configuration 25.4 ARP Scanning Prevention Troubleshooting Help ARP scanning prevention is disabled by default. After enabling ARP scanning prevention, users can enable the debug switch, ―debug anti-arpscan‖, to view debug information.
Prevent ARP, ND Spoofing Configuration 26. Prevent ARP, ND Spoofing Configuration 26.1 Overview 26.1.1 ARP (Address Resolution Protocol) Generally speaking, ARP (RFC-826) protocol is mainly responsible of mapping IP address to relevant 48-bit physical address, that is MAC address, for instance, IP address is 192.168.0.1, network card Mac address is 00-03-0F-FD-1D-2B.
Prevent ARP, ND Spoofing Configuration counterfeiting legal IP address firstly, and sends a great deal of counterfeited ARP application packets to switches, after switches learn these packets, they will cover previously corrected IP, mapping of MAC address, and then some corrected IP, MAC address mapping are modified to correspondence relationship configured by attack packets so that the switch makes mistake on transfer packets, and takes an effect on the whole network.
ARP GUARD Configuration 27. ARP GUARD Configuration 27.1 Introduction to ARP GUARD There is serious security vulnerability in the design of ARP protocol, which is any network device, can send ARP messages to advertise the mapping relationship between IP address and MAC address. This provides a chance for ARP cheating. Attackers can send ARP REQUEST messages or ARP REPLY messages to advertise a wrong mapping relationship between IP address and MAC address, causing problems in network communication.
ARP GUARD Configuration scheme. Please refer to relative documents for details. 27.2 ARP GUARD Configuration Task List 1. Configure the protected IP address Command Explanation Port configuration mode arp-guard ip <addr> Configure/delete ARP GUARD address no arp-guard ip <addr>...
ARP Local Proxy Configuration 28. ARP Local Proxy Configuration 28.1 Introduction to ARP Local Proxy function In a real application environment, the switches in the aggregation layer are required to implement local ARP proxy function to avoid ARP cheating. This function will restrict the forwarding of ARP messages in the same vlan and thus direct the L3 forwarding of the data flow through the switch.
ARP Local Proxy Configuration local ARP proxy on an aggregation switch while configuring interface isolation function on the layer-2 switch connected to it, all ip flow will be forwarded on layer 3 via the aggregation switch. And due to the interface isolation, ARP messages will not be forwarded within the vlan, which means other PCs will not receive it.
ARP Local Proxy Configuration We can configure as follows: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 192.168.1.1 255.255.255.0 Switch(Config-if-Vlan1)#ip local proxy-arp Switch(Config-if-Vlan1)#exit 28.4 ARP Local Proxy Function Troubleshooting ARP local proxy function is disabled by default. Users can view the current configuration with display command. With correct configuration, by enabling debug of ARP, users can check whether the ARP proxy is normal and send proxy ARP messages.
Gratuitous ARP Configuration 29. Gratuitous ARP Configuration 29.1 Introduction to Gratuitous ARP Gratuitous ARP is a kind of ARP request that is sent by the host with its IP address as the destination of the ARP request. The basic working mode for the switch is as below: The Layer 3 interfaces of the switch can be configured to advertise gratuitous ARP packets period or the switch can be configured to enable to send gratuitous ARP packets in all the interfaces globally.
Gratuitous ARP Configuration 29.4 Gratuitous ARP Troubleshooting Gratuitous ARP is disabled by default. And when gratuitous ARP is enabled, the debugging information about ARP packets can be retrieved through the command debug ARP send. If gratuitous ARP is enabled in global configuration mode, it can be disabled only in global configuration mode.
Keepalive Gateway Configuration 30. Keepalive Gateway Configuration 30.1 Introduction to Keepalive Gateway Ethernet port is used to process backup or load balance, for the reason that it is a broadcast channel, it may not detect the change of physical signal and fails to get to down when the gateway is down.
Keepalive Gateway Configuration [interface-name] specified interface, if there is no interface is specified, show keepalive running status of all interfaces. Show IPv4 running status of the specified show ip interface [interface-name] interface, if there is no interface is specified, show IPv4 running status of all interfaces. 30.3 Keepalive Gateway Example Fig 30-1 keepalive gateway typical example In above network topology, interface address of interface vlan10 is 1.1.1.1...
Keepalive Gateway Configuration Send ARP detection once 3 seconds to detect whether gateway A is reachable, after 3 times detection is failing, gateway A is considered to be unreachable. 30.4 Kepalive Gteway Troubleshooting If there is any problem happens when using keepalive gateway function, please check whether the problem is caused by the following reasons: ...
DHCP Configuration 31. DHCP Configuration 31.1 Introduction to DHCP DHCP [RFC2131] is the acronym for Dynamic Host Configuration Protocol. It is a protocol that assigns IP address dynamically from the address pool as well as other network configuration parameters such as default gateway, DNS server, and default route and host image file position within the network.
DHCP Configuration However, if the DHCP server and the DHCP client are not in the same network, the server will not receive the DHCP broadcast packets sent by the client, therefore no DHCP packets will be sent to the client by the server. In this case, a DHCP relay is required to forward such DHCP packets so that the DHCP packets exchange can be completed between the DHCP client and server.
Page 264
DHCP Configuration Configure DHCP Address pool. The no ip dhcp pool <name> operation cancels the DHCP Address no ip dhcp pool <name> pool. (2) Configure DHCP address pool parameters Command Explanation DHCP Address Pool Mode Configure the address scope that can be network-address <network-number>...
Page 265
DHCP Configuration Configure network parameter option <code> {ascii <string> | hex specified by the option code. The no <hex> | ipaddress <ipaddress>} command deletes the network parameter no option <code> specified by the option code. Configure the lease period allocated to lease days [hours][minutes]...
DHCP Configuration 31.3 DHCP Relay Configuration When the DHCP client and server are in different segments, DHCP relay is required to transfer DHCP packets. Adding a DHCP relay makes it unnecessary to configure a DHCP server for each segment, one DHCP server can provide the network configuration parameter for clients from multiple segments, which is not only cost-effective but also management-effective.
DHCP Configuration 2. Configure DHCP relay to forward DHCP broadcast packet. Command Explanation Global Mode ip forward-protocol udp bootps The UDP port 67 is used for DHCP broadcast forward-protocol packet forwarding. bootps Interface Configuration Mode Set the destination IP address for DHCP relay ip helper-address <ipaddress>...
Page 268
DHCP Configuration Switch(dhcp-A-config)#netbios-node-type H-node Switch(dhcp-A-config)#exit Switch(config)#ip dhcp excluded-address 10.16.1.200 10.16.1.201 Switch(config)#ip dhcp pool B Switch(dhcp-B-config)#network 10.16.2.0 24 Switch(dhcp-B-config)#lease 1 Switch(dhcp-B-config)#default-route 10.16.2.200 10.16.2.201 Switch(dhcp-B-config)#dns-server 10.16.2.202 Switch(dhcp-B-config)#option 72 ip 10.16.2.209 Switch(dhcp-config)#exit Switch(config)#ip dhcp excluded-address 10.16.2.200 10.16.2.201 Switch(config)#ip dhcp pool A1 Switch(dhcp-A1-config)#host 10.16.1.210 Switch(dhcp-A1-config)#hardware-address 00-03-22-23-dc-ab Switch(dhcp-A1-config)#exit Usage Guide: When a DHCP/BOOTP client is connected to a VLAN1 port of the switch,...
Page 269
DHCP Configuration E1/0/1 E1/0/2 DHCP Client 192.168.1.1 10.1.1.1 DHCP Relay DHCP Client DHCP Server 10.1.1.10 DHCP Client Fig 31-3 DHCP Relay Configuration As shown in the above figure, route switch is configured as a DHCP relay. The DHCP server address is 10.1.1.10, the configuration steps is as follows: Switch(config)#service dhcp Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 192.168.1.1 255.255.255.0...
DHCP Configuration 31.5 DHCP Troubleshooting If the DHCP clients cannot obtain IP addresses and other network parameters, the following procedures can be followed when DHCP client hardware and cables have been verified ok. Verify the DHCP server is running, start the related DHCP server if not running. If the DHCP clients and servers are not in the same physical network, verify the router responsible for DHCP packet forwarding has DHCP relay function.
DHCPv6 Configuration 32. DHCPv6 Configuration 32.1 Introduction to DHCPv6 DHCPv6 [RFC3315] is the IPv6 version for Dynamic Host Configuration Protocol (DHCP). It is a protocol that assigns IPv6 address as well as other network configuration parameters such as DNS address, and domain name to DHCPv6 client, DHCPv6 is a conditional auto address configuration protocol relative to IPv6.
DHCPv6 Configuration request configurations from the DHCP server. In the time of located server, the DHCP client tries to find a DHCPv6 server by broadcasting a SOLICIT packet to all the DHCP delay delegation and server with broadcast address as FF02::1:2. Any DHCP server which receives the request, will reply the client with an ADVERTISE message, which includes the identity of the server –DUID, and its priority.
Page 273
DHCPv6 Configuration To configure DHCPv6 address pool (1) To achieve/delete DHCPv6 address pool (2) To configure parameter of DHCPv6 address pool To enable DHCPv6 server function on port 1. To enable/disable DHCPv6 service Command Explanation Global Mode service dhcpv6 To enable DHCPv6 service. no service dhcpv6 2.
DHCPv6 Configuration 3. To enable DHCPv6 server function on port. Command Explanation Interface Configuration Mode ipv6 dhcp server <poolname> To enable DHCPv6 server function on [preference <value>] [rapid-commit] specified port, and binding the used [allow-hint] DHCPv6 address pool. no ipv6 dhcp server <poolname> 32.3 DHCPv6 Relay Delegation Configuration DHCPv6 relay delegation configuration task list as below: 1....
Page 275
DHCPv6 Configuration (2) To configure prefix delegation pool used by DHCPv6 address pool (3) To configure static prefix delegation binding (4) To configure other parameters of DHCPv6 address pool To enable DHCPv6 prefix delegation server function on port 1. To enable/delete DHCPv6 service Command Explanation Global Mode...
DHCPv6 Configuration 2. To enable DHCPv6 prefix delegation client function on port Command Explanation Interface Configuration Mode To enable client prefix delegation request ipv6 dhcp client pd <prefix-name> function on specified port, and the prefix [rapid-commit] obtained associate with universal prefix no ipv6 dhcp client pd configured.
Page 279
DHCPv6 Configuration Switch2(Config-if-Vlan100)#ipv6 dhcp relay destination 2001:da8:10:1::1 Switch2(Config-if-Vlan100)#exit Switch2(config)# Example2: When the network operator is deploying IPv6 networks, network automatically configuration can be achieved through the prefix delegation allocation of IPv6 addresses, in stead of configuring manually for each switch: To configure the switching or routing device which is connected to the client switch as DHCPv6 prefix delegation server, that is to setup a local database for the relationship between the allocated prefix and the DUID of the client switch.
Page 280
DHCPv6 Configuration Usage guide: Switch2 configuration Switch2>enable Switch2#config Switch2(config)#interface vlan 2 Switch2(Config-if-Vlan2)#ipv6 address 2001:da8:1100::1/64 Switch2(Config-if-Vlan2)#exit Switch2(config)#service dhcpv6 Switch2(config)#ipv6 local pool client-prefix-pool 2001:da8:1800::/40 48 Switch2(config)#ipv6 dhcp pool dhcp-pool Switch2(dhcpv6-dhcp-pool-config)#prefix-delegation pool client-prefix-pool 1800 600 Switch2(dhcpv6-dhcp-pool-config)#exit Switch2(config)#interface vlan 2 Switch2(Config-if-Vlan2)#ipv6 dhcp server dhcp-pool Switch2(Config-if-Vlan2)#exit Switch1 configuration Switch1>enable...
DHCPv6 Configuration Switch1(Config-if-Vlan3)#ipv6 address prefix-from-provider 0:0:0:1::1/64 Switch1(Config-if-Vlan3)#exit Switch1(config)#ipv6 dhcp pool foo Switch1(dhcpv6-foo-config)#dns-server 2001:4::1 Switch1(dhcpv6-foo-config)#domain-name www.ipv6.org Switch1(dhcpv6-foo-config)#exit Switch1(config)#interface vlan 3 Switch1(Config-if-Vlan3)#ipv6 dhcp server foo Switch1(Config-if-Vlan3)#ipv6 nd other-config-flag Switch1(Config-if-Vlan3)#no ipv6 nd suppress-ra Switch1(Config-if-Vlan3)#exit 32.7 DHCPv6 Troubleshooting If the DHCPv6 clients cannot obtain IPv6 addresses and other network parameters, the following procedures can be followed when DHCPv6 client hardware and cables have been verified ok: ...
DHCP option 82 Configuration 33. DHCP option 82 Configuration 33.1 Introduction to DHCP option 82 DHCP option 82 is the Relay Agent Information Option, its option code is 82. DHCP option 82 is aimed at strengthening the security of DHCP servers and improving the IP address configuration policy.
DHCP option 82 Configuration SubOpt: the sequence number of sub-option, the sequence number of Circuit ID sub-option is 1, the sequence number of Remote ID sub-option is 2. Len: the number of bytes in Sub-option Value, not including the two bytes in SubOpt segment and Len segment.
DHCP option 82 Configuration in the option segment of the message. Then it will forward the reply message with DHCP configuration information and option 82 information to DHCP Relay Agent. 4)DHCP Relay Agent will peel the option 82 information from the replay message sent by DHCP server, and then forward the message with DHCP configuration information to the DHCP client.
Page 285
DHCP option 82 Configuration This command is used to set the retransmitting policy of the system for the received DHCP request message which contains option 82. The drop mode means that if the message has option82, then the system will drop it without processing;...
Page 286
DHCP option 82 Configuration Set the suboption2 (remote ID option) ip dhcp relay information option content of option 82 added by DHCP remote-id {standard | <remote-id>} request packets (They are received by no ip dhcp relay information option the interface). The no command sets the remote-id additive suboption2 (remote ID option) format of option 82 as standard.
DHCP option 82 Configuration ip dhcp relay information option Set self-defined format of remote-id for self-defined remote-id format [ascii | relay option82. hex] ip dhcp relay information option self-defined subscriber-id {vlan | port | Set creation method for option82, users (switch-id (mac hostname)|...
Page 288
DHCP option 82 Configuration In the above example, layer 2 switches Switch1 and Switch2 are both connected to layer 3 switch Switch3, Switch 3 will transmit the request message from DHCP client to DHCP serer as DHCP Relay Agent. It will also transmit the reply message from the server to DHCP client to finish the DHCP protocol procedure.
DHCP option 82 Configuration option domain-name "example.com.cn"; option domain-name-servers 192.168.10.3; authoritative; pool { range 192.168.102.21 192.168.102.50; default-lease-time 86400; #24 Hours max-lease-time 172800; #48 Hours allow members of "Switch3Vlan2Class1"; pool { range 192.168.102.51 192.168.102.80; default-lease-time 43200; #12 Hours max-lease-time 86400; #24 Hours allow members of "Switch3Vlan2Class2";...
Page 290
DHCP option 82 Configuration troubleshooting. To implement the option 82 function of DHCP server, the ―debug ip dhcp server packet‖ command can be used during the operating procedure to display the procedure of data packets processing of the server, including displaying the identified option 82 information of the request message and the option 82 information returned by the reply message.
DHCPv6 option37, 38 34. DHCPv6 option37, 38 34.1 Introduction to DHCPv6 option37, 38 DHCPv6 (Dynamic Host Configuration Protocol for IPv6) is designed for IPv6 address scheme and is used for assigning IPv6 prefixes, IPv6 addresses and other configuration parameters to hosts. When DHCPv6 client wants to request address and configure parameter of DHCPv6 server from different link, it needs to communicate with server through DHCPv6 relay agent.
Page 293
DHCPv6 option37, 38 no ipv6 dhcp snooping subscriber-id policy system when receiving DHCPv6 packets with option 38, which can be: drop, the system simply discards it with option 38; keep, system keeps option 38 unchanged and forwards the packet to the server;...
Page 294
DHCPv6 option37, 38 option 37 and it is a string with a length of less than 128. operation restores remote-id in option enterprise-number together with vlan address. This command is used to set the form of adding option 38 in received DHCPv6 request packets, which <subscriber-id>...
Page 295
DHCPv6 option37, 38 number together with vlan MAC. Configures user configuration options generate ipv6 dhcp relay subscriber-id select (sp | sv | pv | subscriber-id. spv) delimiter WORD (delimiter WORD |) command restores to its no ipv6 dhcp relay subscriber-id select delimiter original default configuration, i.e.
DHCPv6 option37, 38 3. Dhcpv6 server option basic functions configuration Command Description Global mode This command enables DHCPv6 server to support ipv6 dhcp server remote-id option the identification of option 37, no ipv6 dhcp server remote-id option the no form of this command disables it.
DHCPv6 option37, 38 selecting option option 38 of the original packets. IPv6 DHCP Class configuration mode {remote-id [*] <remote-id> [*] | subscriber-id [*] This command configures <subscriber-id> [*]} option 37 and option 38 that no {remote-id [*] <remote-id> [*] | subscriber-id [*] match the class in ipv6 dhcp <subscriber-id>...
Page 298
DHCPv6 option37, 38 Switch B Interface E1/0/1 Switch A Interface Interface E1/0/3 Interface E1/0/4 E1/0/2 MAC-AA MAC-BB MAC-CC Fig 34-1 DHCPv6 Snooping option schematic As is shown in the figure above, Mac-AA, Mac-BB and Mac-CC are normal users, connected to untrusted interface 1/0/2, 1/0/3 and 1/0/4 respectively, and they get IP 2010:2, 2010:3 and 2010:4 through DHCPv6 Client;...
Page 299
DHCPv6 option37, 38 SwitchA(config-if-port-range)#exit SwitchA(config)# Switch B configuration: SwitchB(config)#service dhcpv6 SwitchB(config)#ipv6 dhcp server remote-id option SwitchB(config)#ipv6 dhcp server subscriber-id option SwitchB(config)#ipv6 dhcp pool EastDormPool SwitchB(dhcpv6-eastdormpool-config)#network-address 2001:da8:100:1::2 2001:da8:100:1::1000 SwitchB(dhcpv6-eastdormpool-config)#dns-server 2001::1 SwitchB(dhcpv6-eastdormpool-config)#domain-name dhcpv6.com SwitchB(dhcpv6-eastdormpool-config)# excluded-address 2001:da8:100:1::2 SwitchB(dhcpv6-eastdormpool-config)#exit SwitchB(config)# SwitchB(config)#ipv6 dhcp class CLASS1 SwitchB(dhcpv6-class-class1-config)#remote-id 00-03-0f-00-00-01 subscriber-id vlan1+Ethernet1/0/1 SwitchB(dhcpv6-class-class1-config)#exit...
DHCPv6 option37, 38 SwitchB(dhcpv6-pool-eastdormpool-class-class3-config)#exit SwitchB(dhcpv6-eastdormpool-config)#exit SwitchB(config)#interface vlan 1 SwitchB(config-if-vlan1)#ipv6 address 2001:da8:100:1::2/64 SwitchB(config-if-vlan1)#ipv6 dhcp server EastDormPool SwitchB(config-if-vlan1)#exit SwitchB(config)# 34.3.2 DHCPv6 Relay option37, 38 Example Example 1: When deploying IPv6 campus network, DHCPv6 server function of routing device can be used for IPv6 address allocation if special server is used for uniform allocation and management for IPv6 address.
Page 301
DHCPv6 option37, 38 Switch2 configuration: S2(config)#service dhcpv6 S2(config)#ipv6 dhcp relay remote-id option S2(config)#ipv6 dhcp relay subscriber-id option S2(config)#vlan 10 S2(config-vlan10)#int vlan 10 S2(config-if-vlan10)#ipv6 address 2001:da8:1:::2/64 S2(config-if-vlan10)#ipv6 dhcp relay destination 2001:da8:10:1::1 S2(config-if-vlan10)#exit S2(config)# 34.4 DHCPv6 option37, 38 Troubleshooting Request packets sent by DHCPv6 client are multicast packets received by the device within its VLAN, if DHCPv6 server wants to receive the packets from client, DHCPv6 client and DHCPv6 server must be in the same VLAN, otherwise it needs to use DHCPv6 relay.
DHCP Snooping Configuration 35. DHCP Snooping Configuration 35.1 Introduction to DHCP Snooping DHCP Snooping means that the switch monitors the IP-getting process of DHCP CLIENT via DHCP protocol. It prevents DHCP attacks and illegal DHCP SERVER by setting trust ports and untrust ports. And the DHCP messages from trust ports can be forwarded without being verified.
DHCP Snooping Configuration information to Log Server via syslog. LOG Function: When the switch discovers abnormal received packets or automatically recovers, it should send syslog information to Log Server. The Encryption of Private Messages: The communication between the switch and the inner network security management system TrustView uses private messages.
Page 304
DHCP Snooping Configuration 2. Enable DHCP Snooping binding Command Explanation Globe mode ip dhcp snooping binding enable Enable or disable the DHCP snooping binding no ip dhcp snooping binding function. enable 3. Enable DHCP Snooping binding ARP function Command Explanation Globe mode ip dhcp snooping binding arp Enable or disable the dhcp snooping binding...
Page 305
DHCP Snooping Configuration 7. Set helper server address Command Explanation Globe mode ip user helper-address A.B.C.D [port <udpport>] source <ipAddr> (secondary|) Set or delete helper server address. user helper-address (secondary|) 8. Set trusted ports Command Explanation Port mode ip dhcp snooping trust Set or delete the DHCP snooping trust no ip dhcp snooping trust attributes of ports.
Page 306
DHCP Snooping Configuration 12. Set defense actions Command Explanation Port mode dhcp snooping action {shutdown|blackhole} [recovery Set or delete the DHCP snooping automatic <second>] defense actions of ports. no ip dhcp snooping action 13. Set rate limitation of data transmission Command Explanation Globe mode...
Page 307
DHCP Snooping Configuration This command is used to set that allow ip dhcp snooping information untrusted ports of DHCP snooping to receive option allow-untrusted DHCP packets with option82 option. When no ip dhcp snooping information disabling this command, all untrusted ports option allow-untrusted will drop DHCP packets with option82 option.
DHCP Snooping Configuration 35.3 DHCP Snooping Typical Application Fig 35-1 Sketch Map of TRUNK As showed in the above chart, Mac-AA device is the normal user, connected to the non-trusted port 1/0/1 of the switch. It operates via DHCP Client, IP 1.1.1.5; DHCP Server and GateWay are connected to the trusted ports 1/0/11 and 1/0/12 of the switch;...
DHCP Snooping Configuration 35.4 DHCP Snooping Troubleshooting Help 35.4.1 Monitor and Debug Information The ―debug ip dhcp snooping‖ command can be used to monitor the debug information. 35.4.2 DHCP Snooping Troubleshooting Help If there is any problem happens when using DHCP Snooping function, please check if the problem is caused by the following reasons: ...
DHCP option 60 and option 43 36. DHCP option 60 and option 43 36.1 Introduction to DHCP option 60 and option 43 DHCP server analyzes DHCP packets from DHCP client. If packets with option 60, it will decide whether option 43 is returned to DHCP client according to option 60 of packets and configuration of option 60 and option 43 in DHCP server address pool.
DHCP option 60 and option 43 Configure option option 60 ip A.B.C.D character string with format in ip dhcp pool mode. Configure option option 43 ip A.B.C.D character string with format in ip dhcp pool mode. Delete the configured option no option 60 60 in the address pool mode.
Page 312
DHCP option 60 and option 43 Check whether service dhcp function is enabled If the address pool configured option 60, check whether it matches with the option 60 of the packets...
Routing Protocol Overview 37. Routing Protocol Overview To communicate with a remote host over the Internet, a host must choose a proper route via a set of routers or Layer3 switches. Both routers and layer3 switches calculate the route using CPU, the difference is that layer3 switch adds the calculated route to the switch chip and forward by the chip at wire speed, while the router always store the calculated route in the route table or route buffer, and data forwarding is performed by the CPU.
Routing Protocol Overview 37.1 Routing Table As mentioned before, layer3 switch is mainly used to establish the route from the current layer3 switch to a network or a host, and to forward packets according to the route. Each layer3 switch has its own route table containing all routes used by that switch. Each route entry in the route table specifies the physical port should be used for forwarding packet to reach a destination host or the next hop layer3 switch to the host.
Routing Protocol Overview EBGP Unknown route 37.2 IP Routing Policy 37.2.1 Introduction to Routing Policy Some policies have to be applied when the router publishing and receiving routing messages so to filter routing messages, such as only receiving or publishing routing messages meets the specified conditions.
Routing Protocol Overview node of the route-map in turn and once certain node test is passed the route-map test will be passed without taking the next node test. 2. access control list(acl) ACL (Access Control Lists) is a data packet filter mechanism in the switch. The switch controls the network access and secure the network service by permitting or denying certain data packet transmtting out from or into the network.
Page 317
Routing Protocol Overview 3. Define the set clause in route-map 4. Define address prefix list 1. Define route-map Command Explanation Global mode Configure route-map; the route-map route-map <map_name> {deny permit} <map_name> [{deny | <sequence_num> permit} route-map <map_name> [{deny | permit} <sequence_num>] <sequence_num>] command...
Page 318
Routing Protocol Overview Match address next-hop; The no match match ip <address | next-hop> <ip-acl-name | ip <address | next-hop> ip-acl-num | prefix-list list-name> [<ip-acl-name no match ip <address | next-hop> [<ip-acl-name | ip-acl-num | prefix-list ip-acl-num | prefix-list [list-name]>] [list-name]>] command deletes match condition.
Page 319
Routing Protocol Overview set as-path prepend <as-num> Add a specified AS No. no set as-path prepend [ <as-num> ] before the BGP routing messages as-path series; The no command deletes the configuration set atomic-aggregate Configure the BGP atomic no set atomic-aggregate aggregate property;...
Routing Protocol Overview set originator-id <ip_addr> Set routing originator ID; no set originator-id [ <ip_addr> ] The no command deletes the configuration set tag <tag_val> Set OSPF routing tag no set tag [ <tag_val> ] value; The no command deletes the configuration set vpnv4 next-hop <ip_addr>...
Routing Protocol Overview the other one is AS-PATH 2 by EBGP (going through SwitchB). BGP selects the shortest path, so AS-PATH 1 is the preferred path. If the path 2 is wished, which is through EBGP path, we can add two extra AS path numbers into the AS-PATH messages from SwitchA to SwitchD so as to change the determination SwitchC take to 192.68.11.0/24.
Page 322
Routing Protocol Overview considered not pass the routing messages filtering if certain routing messages does not pass the filtering of any nodes. When all nodes are set to deny mode, all routing messages will not pass the filtering in this route-map. ...
Static Route 38. Static Route 38.1 Introduction to Static Route As mentioned earlier, the static route is the manually specified path to a network or a host. Static route is simple and consistent, and can prevent illegal route modification, and is convenient for load balance and route backup.
Static Route 1. Static route configuration Command Explanation Global mode Set static routing; the no ip route {<ip-prefix> <mask> route {<ip-prefix> <mask> | <ip-prefix>/<prefix-length>} {<gateway-address> <ip-prefix>/<prefix-length>} | <gateway-interface>} [<distance>] [<gateway-address> route {<ip-prefix> <mask> <gateway-interface>] <ip-prefix>/<prefix-length>} [<gateway-address> [<distance>] command | <gateway-interface>] [<distance>] deletes a static route entry 38.4 Static Route Configuration Examples The figure shown below is a simple network consisting of three layer3 switches, the...
Page 325
Static Route Switch#config Next hop use the partner IP address Switch(config)#ip route 10.1.1.0 255.255.255.0 10.1.2.1 Next hop use the partner IP address Switch(config)#ip route 10.1.4.0 255.255.255.0 10.1.3.1 Configuration of layer3 SwitchB Switch#config Switch(config)#ip route 0.0.0.0 0.0.0.0 10.1.3.2 In this way, ping connectivity can be established between PC-A and PC-C, and PC-B and PC-C.
39. RIP 39.1 Introduction to RIP RIP is first introduced in ARPANET, this is a protocol dedicated to small, simple networks. RIP is a distance vector routing protocol based on the Bellman-Ford algorithm. Network devices running vector routing protocol send two kind of information to the neighboring devices regularly: •...
Page 327
route to be sent to the neighbor gateways the routes learnt from the neighbor gateways; poison reverse split horizon not only deletes the abovementioned routes, but set the costs of those routes to infinite. ―Triggering update‖ mechanism defines whenever route metric changed by the gateway, the gateway advertise the update packets immediately, regardless of the 30 second update timer status.
neighbor devices, so that the updated routes are globally valid. Moreover, RIP uses a timeout mechanism for outdated route, that is, if a switch does not receive regular update packets from a neighbor within a certain interval (invalid timer interval), it considers the route from that neighbor invalid, after holding the route fro a certain interval (holddown timer interval), it will delete that route.
Page 329
(1) Enable Redistribution of OSPF routing to RIP (2) Display and debug the information about configuration of redistribution of OSPF routing to RIP 1. Enable RIP protocol Applying RIP route protocol with basic configuration in switch is simple. Normally you only have to open the RIP switch and configure the segments running RIP, namely send and receive the RIP data packet by default RIP configuration.
Page 330
(2)Configure RIP route parameters 1 )Configure route introduction (default route metric, configure routes of the other protocols to be introduced in RIP) Command Explanation Router Configuration Mode Sets the default route metric for route to be default-metric <value> introduced; the no default-metric command no default-metric restores the default setting.
Page 331
Global mode Enter keychain mode, and configure a key key chain <name-of-chain> chain, the no key chain < name-of-chain > no key chain < name-of-chain > command deletes the key chain. Keychain mode Enter the keychain-key mode and configure a key <keyid>...
Page 332
4)Configure and apply the route filtering Command Explanation Router configuration mode distribute-list {< access-list-number Configure and apply the access table and |access-list-name >|prefix<prefix-list- prefix table to filter the routes. The no name>}{in|out} [<ifname>] distribute-list {< access-list-number distribute-list {< |access-list-name>|prefix<prefix-list-name access-list-number >}{in|out} [<ifname>] command means do |access-list-name >|prefix<prefix-list- not use the access table and prefix table.
Page 333
The command configures the UDP receiving recv-buffer-size <size> buffer size of the RIP; the no recv-buffer-size no recv-buffer-size command restores the system default values. 3. Configure RIP-I/RIP-II toggling (1)Configure the RIP version to be used in all ports Command Explanation RIP configuration mode Configure the versions of all the RIP data packets transmitted/received by the Layer 3...
Page 334
5. Configure the RIP routing aggregation (1) Configure IPv4 aggregation route globally Command Explanation Router Configuration Mode ip rip aggregate-address A.B.C.D/M To configure or delete IPv4 aggregation route aggregate-address globally. A.B.C.D/M (2) Configure IPv4 aggregation route on interface Command Explanation Interface Configuration Mode ip rip aggregate-address A.B.C.D/M To configure or delete IPv4 aggregation...
39.3 RIP Examples 39.3.1 Typical RIP Examples Interface Interface SWITCHB vlan1:10.1.1.1/24 vlan1:10.1.1.2/24 SWITCHC SWITCHA Interface Interface vlan2:20.1.1.1/24 vlan1:20.1.1.2/24 Fig 39-1 RIP example In the figure shown above, a network consists of three Layer 3 switches, in which SwitchA connected with SwitchB and SwitchC, and RIP routing protocol is running in all of the three switches.
Configure that the interface vlan 2 do not transmit RIP messages to SwitchC SwitchA(config)#router rip SwitchA(config-router)#passive-interface vlan 2 SwitchA(config-router)#exit SwitchA(config) # Layer 3 SwitchB Configure the IP address of interface vlan 1 SwitchB#config SwitchB(config)# interface vlan 1 SwitchB(Config-if-Vlan1)# ip address 10.1.1.2 255.255.255.0 SwitchB(Config-if-Vlan1)exit Initiate RIP protocol and configure the RIP segments SwitchB(config)#router rip...
vlan1:192.168.10.1 192.168.20.0/22 192.168.21.0/24 vlan1:192.168.10.2 192.168.22.0/24 192.168.23.0/24 192.168.24.0/24 Fig 39-2 Typical application of RIP aggregation As the above network topology, S2 is connected to S1 through interface vlan1, there are other 4 subnet routers of S2, which are 192.168.21.0/24, 192.168.22.0/24, 192.168.23.0/24, 192.168.24.0/24. S2 supports route aggregation, and to configure aggregation route 192.168.20.0/22 in interface vlan1 of S2, after that, sending router messages to S1 through vlan1, and put the four subnet routers aggregated to one router as 192.168.20.0/22, and send to S1, and not send subnet to neighbor.
Page 338
Then initiate the RIP protocol (use router rip command) and configure the segment (use network command) and set RIP protocol parameter on corresponding interfaces, such as the option between RIP-I and RIP-II After that, one feature of RIP protocol should be noticed ---the Layer 3 switch running RIP protocol sending route updating messages to all neighboring Layer 3 switches every 30 seconds.
RIPng 40. RIPng 40.1 Introduction to RIPng RIPng is first introduced in ARPANET, this is a protocol dedicated to small, simple networks. RIPng is a distance vector routing protocol based on the Bellman-Ford algorithm. Network devices running vector routing protocol send 2 kind of information to the neighboring devices regularly: •...
Page 340
RIPng route to be sent to the neighbor gateways the routes learnt from the neighbor gateways; poison reverse split horizon not only deletes the abovementioned routes, but set the costs of those routes to infinite. ―Triggering update‖ mechanism defines whenever route metric changed by the gateway, the gateway advertise the update packets immediately other than wait for the 30 sec timer.
Page 342
RIPng Configure the interface to run RIPng protocol; [no] IPv6 router rip the no IPv6 router rip command set the interface not run RIPng protocol. 2. Configure RIPng protocol parameters (1)Configure RIPng sending mechanism 1)Configure the RIPng data packets point-transmitting Command Explanation Router configuration mode...
Page 343
RIPng 2)Configure the route offset Command Explanation Router configuration mode Configure that provide a deviation value to the [no] offset-list route metric value when the port sends or <access-list-number receives RIPng data packet; the no offset-list |access-list-name> {in|out} <access-list-number |access-list-name> <number >...
Page 344
RIPng 4. Delete the specified route in RIPng route table Command Explanation Admin Mode clear IPv6 route The command deletes a specified route from {<IPv6-address>|kernel|static|con the RIP route table. nected|rip|ospf|isis|bgp|all} 5. Configure RIPng route aggregation (1) Configure IPv6 aggregation route globally Command Explanation Router Configuration Mode...
RIPng (2) Display and debug the information about configuration of redistribution of OSPFv3 routing to RIPng Command Explanation Admin Configuration Mode display RIPng routing which show ipv6 rip redistribute redistributed from other routing protocols. Admin Mode debug ipv6 rip redistribute message send To enable or disable debugging messages debug...
Page 346
RIPng SwitchA(config)#router IPv6 rip SwitchA(config-router)#exit Configure the IPv6 address in vlan1 and configure vlan1 to run RIPng SwitchA#config SwitchA(config)# interface Vlan1 SwitchA(config-if-Vlan1)# IPv6 address 2000:1:1::1/64 SwitchA(config-if-Vlan1)#IPv6 router rip SwitchA(config-if-Vlan1)#exit Configure the IPv6 address in vlan2 and configure vlan2 to run RIPng SwitchA(config)# interface Vlan2 SwitchA(config-if-Vlan2)#IPv6 address 2001:1:1::1/64 SwitchA(config-if-Vlan2)#IPv6 router rip...
RIPng SwitchC(config-if)exit 40.3.2 RIPng Aggregation Route Function Typical Examples The application topology as follows: VLAN1 2001:1::1:1 2001:1::20:0/110 VLAN1 2001:1::20:0/112 2001:1::1:2 2001:1::21:0/112 2001:1::22:0/112 2001:1::23:0/112 Fig 40-2 Typical application of RIPng aggregation As the above network topology, S2 is connected to S1 through interface vlan1, there are other 4 subnet routers of S2, which are 2001:1::20:0/112, 2001:1::21:0/112, 2001:1::22:0/112, 2001:1::23:0/112.
RIPng 40.4 RIPng Troubleshooting The RIPng protocol may not be working properly due to errors such as physic connection, configuration error when configuring and using the RIPng protocol. So users should pay attention to the following: First ensure the physic connection is correct and the IP Forwarding command is open ...
Black Hole Routing Manual 41. Black Hole Routing Manual 41.1 Introduction to Black Hole Routing Black Hole Routing is a special kind of static routing which drops all the datagrams that match the routing rule. 41.2 IPv4 Black Hole Routing Configuration Task Configure IPv4 Black Hole Routing 1.
Black Hole Routing Manual [<precedence>] specified configuration. ipv6 route <ipv6-prefix/prefix-length> null0 41.4 Black Hole Routing Configuration Exmaples Example 1: IPv4 Black Hole Routing function. 192.168.0.1/21 SWITCH1 192.168.0.2/21 SWITCH2 ……… 192.168.1.0/24 192.168.7.0/24 Fig 41-1 IPv4 Black Hole Routing Configuration Example As it is shown in the figure, in Switch 2, eight in all interfaces are configured as Layer 3 VLAN interfaces for access interfaces.
Black Hole Routing Manual Switch(config)#ip route 192.168.0.0/21 null0 50 Example 2: IPv6 Black Hole Routing function. 2004:1:2:3::1/64 SWITCH1 2004:1:2:3::2/64 SWITCH2 ……… 2004:1:2:3:1::/80 2004:1:2:3:7::/80 Fig 41-2 IPv6 Black Hole Routing Configuration Example As it is shown in the figure, in Switch 2, eight in all interfaces are configured as Layer VLAN interfaces access...
Page 352
Black Hole Routing Manual due to some reasons such as incorrect network address mask, and incorrect management distance. Attention should be paid to the following items: IPv6 should be enabled before IPv6 Black Hole Routing can work. It is suggested that the length of the network address mask should be longer than that of normal routing configuration, in order to prevent the Black Hole Routing from intervening other routing configuration.
42. BFD 42.1 Introduction to BFD BFD (Bidirectional Forwarding Detection) provides a detection mechanism to quickly detect and monitor the connectivity of links in networks. To improve network performance, between protocol neighbors must quickly detect communication failures to restore communication through backup paths as soon as possible. provides general-purpose, standard,...
Page 354
string encrypted with text for BFD, no command deletes the configured key. Configure authentication character bfd authentication key <1-255> md5 <WORD> string encrypted with md5 for no bfd authentication key BFD, no command deletes the configured key. Interface Mode Configure minimum transmission interval and the bfd interval <value1>...
Page 355
disables BFD authentication. 2. Configure BFD for RIP (ng) Command Explanation Interface Mode Configure protocol specific rip bfd enable interface, command no rip bfd enable disables protocol. Configure BFD for RIPng ipv6 rip bfd enable protocol specific no ipv6 rip bfd enable interface, command cancels the configuration.
42.3 Examples of BFD 42.3.1 Example for Linkage of BFD and Static Route Example: Configure a static route to 14.1.1.0/24 on Switch A and configure a static route to 15.1.1.0/24 on Switch B. Both switches enable BFD detection. When the link between Switch A and Switch B is failing, BFD can detect it immediately.
Page 358
switchover is slow. To solve this problem, VRRP uses BFD to probe the state of the master. Once the master fails, the backup can become the new master within 100 ms. Configuration procedure: # Configure Switch A Switch#config Switch(config)#bfd mode active Switch(config)#interface vlan 2 Switch(config-ip-vlan2)#ip address 192.16.0.101 255.255.255.0 Switch(config)#router vrrp 1...
Switch(config-router)#interface vlan 1 Switch(config-router)#enable Switch(config-router)#bfd enable 42.4 BFD Troubleshooting When the problem of BFD function happens, please check whether the problem is resulted by the following reasons: Check whether the route protocol neighbor is established successfully. If no route protocol neighbor is established successfully, here BFD can not process the detection.
IPv4 Multicast Protocol 43. IPv4 Multicast Protocol 43.1 IPv4 Multicast Protocol Overview This chapter will give an introduction to the configuration of IPv4 Multicast Protocol. 43.1.1 Introduction to Multicast Various transmission modes can be adopted when the destination of packet (including data, sound and video) transmission is the minority users in the network.
IPv4 Multicast Protocol Optimize performance: reduce redundant traffic Distributed application: Enable Multipoint Application 43.1.2 Multicast Address The destination address of Multicast message uses class D IP address with range from 224.0.0.0 to 239.255.255.255. D class address can not appear in the source IP address field of an IP message.
IPv4 Multicast Protocol 224.0.0.12 DHCP Server/Relay Agent 224.0.0.13 All PIM Routers 224.0.0.14 RSVP Encapsulation 224.0.0.15 All CBT Routers 224.0.0.16 Specified SBM 224.0.0.17 All SBMS 224.0.0.18 VRRP 224.0.0.22 IGMP When Ethernet transmits Unicast IP messages, the destination MAC address it uses is the receiver‘s MAC address.
IPv4 Multicast Protocol 43.1.4 IP Multicast Application IP Multicast technology has effectively solved the problem of sending in single point and receiving in multipoint. It has achieved the effective data transmission from a point to multiple points, saved a great deal of network bandwidth and reduced network load. Making use of the Multicast property of network, some new value-added operations can be supplied conveniently.
IPv4 Multicast Protocol The Service-Oriented Priority Strategy Multicast of Security Controllable technology adopts the following mode: for multicast data in limit range, set the priority specified by the user at the join-in end so that data can be sent in a higher priority on TRUNK port, consequently guarantee the transmission is processed in user-specified priority in the entire network.
Page 365
IPv4 Multicast Protocol [no] access-list <5000-5099> {deny|permit} {{<source> <source-wildcard>}|{host-source The rule used to configure source control. <source-host-ip>}|any-source} This rule does not take effect until it is applied {{<destination> to specified port. Using the NO form of it can <destination-wildcard>}|{host-de delete specified rule. stination <destination-host-ip>}|any-destin ation}...
Page 366
IPv4 Multicast Protocol Next is to configure destination control rule. It is similar to source control, except to use ACL No. of 6000-7999. Command Explanation Global Configuration Mode [no] access-list <6000-7999> {deny|permit} rule used configure {{<source> destination control. This rule does <source-wildcard>}|{host-source not take effect until it is applied to <source-host-ip>}|any-source}...
IPv4 Multicast Protocol Command Explanation Global Configuration Mode Configure multicast strategy, specify [no] ip multicast policy <IPADDRESS/M> priority for sources and groups in <IPADDRESS/M> cos <priority> specific range, and the range is <0-7>. 43.2.3 DCSCM Configuration Examples 1. Source Control In order to prevent an Edge Switch from putting out multicast data ad asbitsium, we configure Edge Switch so that only the switch at port Ethernet1/0/5 is allowed to transmit multicast, and the data group must be 225.1.2.3.
IPv4 Multicast Protocol configure on its join-in switch as follows: Switch(config)#ip multicast policy 210.1.1.1/32 239.1.2.3/32 cos 4 In this way, the multicast stream will have a priority of value 4 (Usually this is pretty higher, the higher possible one is protocol data; if higher priority is set, when there is too many multicast data, it might cause abnormal behavior of the switch protocol) when it gets to other switches through this switch.
IPv4 Multicast Protocol 43.3.2 IGMP Snooping Configuration Task List 1. Enable IGMP Snooping 2. Configure IGMP Snooping 1. Enable IGMP Snooping Command Explanation Global Mode ip igmp snooping Enables IGMP Snooping. The no operation no ip igmp snooping disables IGMP Snooping function. 2.
Page 370
IPv4 Multicast Protocol igmp snooping vlan <vlan-id> mrouter-port interface <interface – Configure static mrouter port of vlan. The name> no form of the command cancels this no ip igmp snooping vlan <vlan-id> configuration. mrouter-port interface <interface – name> igmp snooping vlan <vlan-id>...
IPv4 Multicast Protocol igmp snooping vlan <vlan-id> static-group <A.B.C.D> [source <A.B.C.D>] interface [ethernet Configure static-group on specified port of port-channel] <IFNAME> the VLAN. The no form of the command no ip igmp snooping vlan <vlan-id> cancels this configuration. static-group <A.B.C.D> [source <A.B.C.D>] interface...
Page 372
IPv4 Multicast Protocol includes ports 1, 2, 6, 10 and 12. Four hosts are connected to port 2, 6, 10 and 12 respectively and the multicast router is connected to port 1. As IGMP Snooping is disabled by default either in the switch or in the VLANs, If IGMP Snooping should be enabled in VLAN 100, the IGMP Snooping should be first enabled for the switch in Global Mode and in VLAN 100 and set port 1 of VLAN 100 to be the mrouter port.
Page 373
IPv4 Multicast Protocol The configuration of Switch2 is the same as the switch in scenario 1, SwitchA takes the place of Multicast Router in scenario 1. Let‘s assume VLAN 60 is configured in SwitchA, including ports 1, 2, 10 and 12. Port 1 connects to the multicast server, and port 2 connects to Switch2.
IPv4 Multicast Protocol When layer 3 IGMP is disabled, re-enable distributing layer 2 multicast entries. By looking up the layer 3 IPMC entries, it can be found that ports can be indicated by the layer 3 multicast entries. This ensures the IGMP snooping can work in cooperation with the layer 3 multicast protocols.
IPv6 Multicast Protocol 44. IPv6 Multicast Protocol 44.1 IPv6 DCSCM 44.1.1 Introduction to IPv6 DCSCM The technology of IPv6 DCSCM (Destination Control and Source Control Multicast) includes three aspects: the multicast source control, the multicast user control and the service-priority-oriented policy multicast. IPv6 DCSCM Controllable Multicast technology proceeds as the following way: 1.
Page 376
IPv6 Multicast Protocol 1. The source control configuration The source control configuration has three steps, first is globally enabling the source control, the following is the command of globally enabling the source control: Command Explanation Global Configuration Mode Globally enable the source control, the no operation of this command will globally disable the source control.
Page 377
IPv6 Multicast Protocol Command Explanation Port Configuration Mode Used to configure the source control rule to a [no] ipv6 multicast source-control port, he no operation will cancel this access-group <8000-8099> configuration. 2. The configuration of destination control The configuration of destination control is similar to that of source control, and also has three steps: First, globally enable the destination control, since destination control needs to avoid the unauthorized users from receiving multicast data, once it is enabled globally, the...
IPv6 Multicast Protocol Command Explanation Port Mode Used to configure the destination [no] ipv6 multicast destination-control control rule to a port, the no operation access-group <9000-10099> of this command will cancel the configuration. Global Configuration Mode Used to configure the destination [no] ipv6 multicast destination-control control rules...
IPv6 Multicast Protocol Switch(config)#ipv6 access-list 8000 permit any-source ff1e::1 Switch(config)#ipv6 access-list 8001 permit any any Switch(config)#ipv6 multicast source-control Switch(config)#interface Ethernet1/0/4 Switch(Config-If-Ethernet1/0/4)#ipv6 multicast source-control access-group 8000 Switch(config)#interface Ethernet1/0/25 Switch(Config-If-Ethernet1/0/25)#ipv6 multicast source-control access-group 8001 2. Destination control We want to confine that the users of the segment whose address is fe80::203:fff:fe01:228a/64 can not join the ff1e::1/64 group, so we can configure as follows: First, enable MLD Snooping in the VLAN where it locates (in this example, it is...
IPv6 Multicast Protocol 44.2 MLD Snooping 44.2.1 Introduction to MLD Snooping MLD, the Multicast Listener Discovery Protocol, is used to realize multicasting in the IPv6. MLD is used by the network equipments such as routers which supports multicast for multicast listener discovery, also used by listeners looking forward to join certain multicast group informing the router to receive data packets from certain multicast address, all of which are done through MLD message exchange.
Page 381
IPv6 Multicast Protocol Configure the number of the groups in ipv6 mld snooping vlan <vlan-id> limit which the MLD Snooping can join, and the {group <g_limit> | source <s_limit>} maximum number of sources in each group. The ―no‖ form of this command no ipv6 mld snooping vlan <vlan-id>...
IPv6 Multicast Protocol no ipv6 mld snooping vlan <vlan-id> default suppression-query-time Ipv6 snooping vlan <vlan-id> static-group <X:X::X:X> [source <X:X::X:X>] interface [ethernet Configure static-group on specified port of port-channel] <IFNAME> the VLAN. The no form of the command no ipv6 mld snooping vlan <vlan-id> cancels this configuration.
Page 383
IPv6 Multicast Protocol Assume there are two multicast servers: the Multicast Server 1 and the Multicast Server 2, amongst program 1 and 2 are supplied on the Multicast Server 1 while program 3 on the Multicast server 2, using group addresses respectively the Group 1, Group 2 and Group 3.
Page 384
IPv6 Multicast Protocol Configuration of switch B is the same as the switches in case 1, and here the switch 1 replaces the Multicast Router in case 1. Assume the vlan 60 configured on it contains port 1, 2, 10 and 12, amongst port 1 is connected to multicast server, port 2 to switch2. To send Query periodically, global MLD Snooping has to be enabled while executing the mld snooping vlan 60 l2-general-querier, setting the vlan 60 to a Level 2 General Querier.
IPv6 Multicast Protocol layer 3 multicast protocols. 44.2.4 MLD Snooping Troubleshooting In configuring and using MLD Snooping, the MLD Snooping server may fail to run properly due to physical connection failure, wrong configuration, etc. The user should ensure the following: ...
Multicast VLAN 45. Multicast VLAN 45.1 Introductions to Multicast VLAN Based on current multicast order method, when orders from users in different VLAN, each VLAN will copy a multicast traffic in this VLAN, which is a great waste of the bandwidth.
Multicast VLAN 2. Configure the IGMP Snooping Command Explanation Global Mode ip igmp snooping vlan <vlan-id> Enable the IGMP Snooping function on the no ip igmp snooping vlan <vlan-id> multicast VLAN. The no form of this command disables the IGMP Snooping on the multicast VLAN.
ACL Configuration 46. ACL Configuration 46.1 Introduction to ACL ACL (Access Control List) is an IP packet filtering mechanism employed in switches, providing network traffic control by granting or denying access the switches, effectively safeguarding the security of networks. The user can lay down a set of rules according to some information specific to packets, each rule describes the action for a packet with certain information matched: ―permit‖...
ACL Configuration The current firmware only supports ingress ACL configuration. 46.1.3 Access-list Action and Global Default Action There are two access-list actions and default actions: ―permit‖ or ―deny‖. The following rules apply: An access-list can consist of several rules. Filtering of packets compares packet conditions to the rules, from the first rule to the first matched rule;...
Page 391
ACL Configuration (10) Configuring a numbered standard IPv6 access-list (11) Configuring a numbered extended IPv6 access-list (12) Configuring a standard IPv6 access-list based on nomenclature a) Create a standard IPv6 access-list based on nomenclature b) Specify multiple permit or deny rule entries c) Exit ACL Configuration Mode (13) Configuring an extended IPv6 access-list based on nomenclature.
Page 392
ACL Configuration (2) Configuring a numbered extensive IP access-list Command Explanation Global Mode access-list <num> {deny permit} icmp Creates a numbered ICMP {{<sIpAddr> <sMask>} | any-source | {host-source extended IP access rule; if the <sIpAddr>}} {{<dIpAddr> <dMask>} numbered extended access-list any-destination | {host-destination <dIpAddr>}} of specified number does not [<icmp-type>...
Page 393
ACL Configuration Creates numbered access-list <num> {deny | permit} {eigrp | gre | extended IP access rule for igrp | ipinip | ip | ospf | <protocol-num>} other specific IP protocol or all {{<sIpAddr> <sMask>} | any-source | {host-source IP protocols; if the numbered <sIpAddr>}} {{<dIpAddr>...
Page 394
ACL Configuration (4) Configuring an name-based extended IP access-list a. Create an extended IP access-list basing on nomenclature Command Explanation Global Mode Creates an extended IP access-list basing nomenclature; the ―no ip ip access-list extended <name> access-list extended no ip access-list extended <name> <name>...
Page 395
ACL Configuration [no] {deny | permit} udp {{<sIpAddr> <sMask>} | any-source | {host-source <sIpAddr>}} [s-port Creates extended {<sPort> range <sPortMin> <sPortMax>}] name-based UDP IP access {{<dIpAddr> <dMask>} any-destination rule; the no form command {host-destination <dIpAddr>}} [d-port {<dPort> | deletes this name-based range <dPortMin>...
Page 396
ACL Configuration ac<host_dmac>}|{<dmac><dmac-mask>}}[{untag then a rule will add to the current access-list; the ―no ged-eth2 tagged-eth2 untagged-802-3 tagged-802-3} [ <offset1> <length1> <value1> access-list <num>― command deletes a [ <offset2> <length2> <value2> [ <offset3> <length3> <value3> <offset4> <length4> numbered MAC extended <value4>...
Page 397
ACL Configuration [no]{deny|permit}{any-source-mac|{host-source- mac<host_smac>}|{<smac><smac-mask>}} {any-destination-mac|{host-destination-mac <host_dmac>} |{<dmac> <dmac-mask>}} [cos <cos-val> [<cos-bitmask>] [vlanId <vid-value> [<vid-mask>][ethertype<protocol>[<protocol-mas k>]]]] [no]{deny|permit} {any-source-mac Creates extended |{host-source-mac<host_smac>}|{<smac><smac- name-based MAC access mask>}} rule matching MAC frame; {any-destination-mac|{host-destination-mac<host form command _dmac>}|{<dmac><dmac-mask>}} [ethertype deletes this name-based <protocol> [<protocol-mask>]] extended MAC access rule. [no]{deny|permit} {any-source-mac|{host-source-mac<host_smac>} |{<smac><smac-mask>}}...
Page 398
ACL Configuration [no]{deny|permit}{any-source-mac|{host-source- Creates name-based mac<host_smac>}|{<smac><smac-mask>}}{any-d extended MAC access rule estination-mac|{host-destination-mac<host_dmac matching tagged ethernet 2 >}|{<dmac><dmac-mask>}}[tagged-eth2 [cos frame; form <cos-val> [<cos-bitmask>]] [vlanId <vid-value> command deletes this [<vid-mask>]] [ethertype<protocol> name-based extended MAC [<protocol-mask>]]] access rule. Creates name-based [no]{deny|permit}{any-source-mac|{host-source- extended MAC access rule <host_smac>}|{<smac><smac-mask>}} matching tagged...
Page 399
ACL Configuration {host-source-mac<host_smac>}|{<smac><smac- mac-igmp extended mac-ip mask>}} access rule; if the numbered {any-destination-mac|{host-destination-mac extended access-list <host_dmac>}|{<dmac><dmac-mask>}}igmp specified number does not {{<source><source-wildcard>}|any-source| exist, then an access-list will {host-source<source-host-ip>}} created using this {{<destination><destination-wildcard>}|any-desti number. nation| {host-destination<destination-host-ip>}} [<igmp-type>] [precedence <precedence>] [tos <tos>][time-range<time-range-name>] access-list<num>{deny|permit}{any-source-mac| {host-source-mac<host_smac>}|{<smac><smac- mask>}}{any-destination-mac|{host-destination-m Creates a numbered mac-ip...
Page 400
ACL Configuration {any-destination-mac|{host-destination-mac protocol mac-ip <host_dmac>}|{<dmac><dmac-mask>}} protocols; if the numbered {eigrp|gre|igrp|ip|ipinip|ospf|{<protocol-num>}} extended access-list {{<source><source-wildcard>}|any-source| specified number does not {host-source<source-host-ip>}} exist, then an access-list will {{<destination><destination-wildcard>}|any-desti created using this nation| {host-destination<destination-host-ip>}} number. [precedence <precedence>] [tos <tos>][time-range<time-range-name>] Deletes this numbered no access-list <num> extended MAC-IP access rule.
Page 404
ACL Configuration b. Specify multiple permit or deny rules Command Explanation Standard IPv6 ACL Mode [no] {deny | permit} {{<sIPv6Prefix/sPrefixlen>} | Creates standard any-source | {host-source <sIPv6Addr> }} name-based IPv6 access rule; the no form command deletes name-based standard IPv6 access rule. c.
ACL Configuration 46.3 ACL Example Scenario 1: The user has the following configuration requirement: port 10 of the switch connects to 10.0.0.0/24 segment, ftp is not desired for the user. Configuration description: 1. Create a proper ACL 2. Configuring packet filtering function 3....
ACL Configuration Ethernet1/0/5: IP Ingress access-list used is 1, traffic-statistics Disable. Ethernet1/0/7: IP Ingress access-list used is 1, traffic-statistics Disable. 46.4 ACL Troubleshooting Checking for entries in the ACL is done in a top-down order and ends whenever an entry is matched.
802.1x Configuration 47. 802.1x Configuration 47.1 Introduction to 802.1x The 802.1x protocol originates from 802.11 protocol, the wireless LAN protocol of IEEE, which is designed to provide a solution to doing authentication when users access a wireless LAN. The LAN defined in IEEE 802 LAN protocol does not provide access authentication, which means as long as the users can access a LAN controlling device (such as a LAN Switch), they will be able to get all the devices or resources in the LAN.
Page 414
802.1x Configuration Fig 47-1 The Authentication Structure of 802.1x The supplicant system is an entity on one end of the LAN segment, should be authenticated by the access controlling unit on the other end of the link. A Supplicant system usually is a user terminal device. Users start 802.1x authentication by starting supplicant system software.
802.1x Configuration access the LAN via the authentication server system, and deal with the authenticated/unauthenticated state of the controlled port according to the result of the authentication. The authenticated state means the user is allowed to access the network resources, the unauthenticated state means only the EAPOL messages are allowed to be received and sent while the user is forbidden to access network resources.
802.1x Configuration EAP messages adopt EAPOL encapsulation format between the PAE of the supplicant system and the PAE of the authenticator system in the environment of LAN. Between the PAE of the authenticator system and the RADIUS server, there are two methods to exchange information: one method is that EAP messages adopt EAPOR (EAP over RADIUS) encapsulation format in RADIUS protocol;...
Page 417
802.1x Configuration carry EAP messages. This kind of frame can pass through the authenticator system to transmit EAP messages between the supplicant system and the authentication server system. EAPOL-Start (whose value is 0x01): the frame to start authentication. EAPOL-Logoff (whose value is 0x02): the frame requesting to quit. ...
802.1x Configuration Fig 47-5 the Format of Data Domain in Request and Response Packets Identifier: to assist matching the Request and Response messages. Length: the length of the EAP packet, covering the domains of Code, Identifier, Length and Data, in byte. Data: the content of the EAP packet, depending on the Code type.
802.1x Configuration 47.1.5 The Authentication Methods of 802.1x The authentication can either be started by supplicant system initiatively or by devices. When the device detects unauthenticated users to access the network, it will send supplicant system EAP-Request/Identity messages to start authentication. On the other hand, the supplicant system can send EAPOL-Start message to the device via supplicant software.
Page 420
802.1x Configuration follows: EAP-MD5 EAP-TLS(Transport Layer Security) EAP-TTLS(Tunneled Transport Layer Security) PEAP(Protected Extensible Authentication Protocol) They will be described in detail in the following part. Attention: The switch, as the access controlling unit of Pass-through, will not check the content of a particular EAP method, so can support all the EAP methods above and all the EAP authentication methods that may be extended in the future.
Page 421
802.1x Configuration Fig 47-9 the Authentication Flow of 802.1x EAP-MD5 2. EAP-TLS Authentication Method EAP-TLS is brought up by Microsoft based on EAP and TLS protocols. It uses PKI to protect the id authentication between the supplicant system and the RADIUS server and the dynamically generated session keys, requiring both the supplicant system and the Radius authentication server to possess digital certificate to implement bidirectional authentication.
Page 422
802.1x Configuration Fig 47-10 the Authentication Flow of 802.1x EAP-TLS 3. EAP-TTLS Authentication Method EAP-TTLS is a product of the cooperation of Funk Software and Certicom. It can provide an authentication as strong as that provided by EAP-TLS, but without requiring users to have their own digital certificate.
Page 423
802.1x Configuration open standard. It has long been utilized in products and provides very good security. Its design of protocol and security is similar to that of EAP-TTLS, using a server‘s PKI certificate to establish a safe TLS tunnel in order to protect user authentication. The following figure illustrates the basic operation flow of PEAP authentication method.
802.1x Configuration Fig 47-12 the Authentication Flow of 802.1x EAP Termination Mode 47.1.6 The Extension and Optimization of 802.1x Besides supporting the port- based access authentication method specified by the protocol, devices also extend and optimize it when implementing the EAP relay mode and EAP termination mode of 802.1x.
802.1x Configuration network, while the others can not. When one user becomes offline, the other users will not be affected. When the user-based (IP address+ MAC address+ port) method is used, all users can access limited resources before being authenticated. There are two kinds of control in this method: standard control and advanced control.
802.1x Configuration become offline. Notes: At present, Auto VLAN can only be used in the port-based access control mode, and on the ports whose link type is Access. 2. Guest VLAN Guest VLAN feature is used to allow the unauthenticated user to access some specified resources.
Page 427
802.1x Configuration 1. Enable 802.1x function Command Explanation Global Mode dot1x enable Enables the 802.1x function in the switch and ports; the no dot1x enable no command disables the 802.1x function. dot1x privateclient enable Enables the switch force client software using private dot1x privateclient 802.1x authentication packet format.
Page 428
802.1x Configuration Command Explanation Port Mode dot1x port-method {macbased Sets port access management portbased | userbased {standard | method; command restores advanced}} MAC-based access management. no dot1x port-method Sets the maximum number of access dot1x max-user macbased <number> users for the specified port; the no no dot1x max-user macbased command restores the default setting of allowing 1 user.
Page 429
802.1x Configuration 3. Supplicant related property configuration Command Explanation Global Mode Sets the number of EAP request/MD5 frame to be sent dot1x max-req <count> before the switch re-initials authentication on no no dot1x max-req supplicant response, the no command restores the default setting.
802.1x Configuration 47.3 802.1x Application Example 47.3.1 Examples of Guest Vlan Applications Update server Authenticator server Ethernet1/0/3 VLAN2 VLAN10 Ethernet1/0/6 SWITCH Ethernet1/0/2 VLAN5 VLAN100 Internet User Fig 47-13 The Network Topology of Guest VLAN Notes: in the figures in this session, E2 means Ethernet 1/0/2, E3 means Ethernet 1/0/3 and E6 means Ethernet 1/0/6.
Page 431
802.1x Configuration Fig 47-14 User Joining Guest VLAN As illustrated in the up figure, on the switch port Ethernet1/0/2, the 802.1x feature is enabled, and the VLAN10 is set as the port‘s Guest VLAN. Before the user gets authenticated or when the user fails to do so, port Ethernet1/0/2 is added into VLAN10, allowing the user to access the Update Server.
802.1x Configuration Switch(config)#interface ethernet1/0/2 Switch(Config-If-Ethernet1/0/2)#dot1x enable # Set the link type of the port as access mode. Switch(Config-If-Ethernet1/0/2)#switch-port mode access # Set the access control mode on the port as portbased. Switch(Config-If-Ethernet1/0/2)#dot1x port-method portbased # Set the access control mode on the port as auto. Switch(Config-If-Ethernet1/0/2)#dot1x port-control auto # Set the port‘s Guest VLAN as 100.
802.1x Configuration The PC is connecting to port 1/0/2 of the switch; IEEE 802.1x authentication is enabled on port1/0/2; the access mode is the default MAC-based authentication. The switch IP address is 10.1.1.2. Any port other than port 1/0/2 is used to connect to RADIUS authentication server, which has an IP address of 10.1.1.3, and use the default port 1812 for authentication and port 1813 for accounting.
802.1x Configuration 2004:1:2:3::2, and connect the switch with any interface except interface 1/0/2 to the RADIUS authentication server. Configure the IP address of the RADIUS server to be 2004:1:2:3::3. Use the default ports 1812 and 1813 for authentication and accounting respectively.
Page 435
802.1x Configuration such login user, the user login ID and password may be wrong and should be verified and input again.
The Number Limitation Function of MAC and IP in Port, VLAN Configuration 48. The Number Limitation Function of MAC and IP in Port, VLAN Configuration 48.1 Introduction to the Number Limitation Function of MAC and IP in Port, VLAN MAC address list is used to identify the mapping relationship between the destination MAC addresses and the ports of switch.
The Number Limitation Function of MAC and IP in Port, VLAN Configuration extent. When malicious users frequently do MAC or ARP cheating, it will be easy for them to fill the MAC and ARP list entries of the switch, causing successful DOS attacks. To summer up, it is very meaningful to develop the number limitation function of MAC and IP in port, VLAN.
Page 438
The Number Limitation Function of MAC and IP in Port, VLAN Configuration 1. Enable the number limitation function of MAC and IP on ports Command Explanation Port configuration mode switchport mac-address dynamic maxi mum <value> Enable disable number no switchport mac-address dynamic limitation function of MAC on the ports.
Page 439
The Number Limitation Function of MAC and IP in Port, VLAN Configuration 5. Display and debug the relative information of number limitation of MAC and IP on ports Command Explanation Admin mode show mac-address dynamic count Display the number of dynamic MAC in {vlan <vlan-id>...
The Number Limitation Function of MAC and IP in Port, VLAN Configuration 48.3 The Number Limitation Function of MAC and IP in Port, VLAN Typical Examples SWITCH A SWITCH B ……… Fig 48-1 The Number Limitation of MAC and IP in Port, VLAN Typical Configuration Example In the network topology above, SWITCH B connects to many PC users, before enabling the number limitation function of MAC and IP in Port, VLAN, if the system...
The Number Limitation Function of MAC and IP in Port, VLAN Configuration 48.4 The Number Limitation Function of MAC and IP in Port, VLAN Troubleshooting Help The number limitation function of MAC and IP in Port, VLAN is disabled by default, if users need to limit the number of user accessing the network, they can enable it.
Operational Configuration of AM Function 49. Operational Configuration of AM Function 49.1 Introduction to AM Function AM (Access Management) means that when a switch receives an IP or ARP message, it will compare the information extracted from the message (such as source IP address or source MAC-IP address) with the configured hardware address pool.
Page 443
Operational Configuration of AM Function 2. Enable AM function on an interface Command Explanation Port Mode Enable/disable AM function on the port. am port When the AM function is enabled on no am port the port, no IP or ARP message will be forwarded by default.
Operational Configuration of AM Function 49.3 AM Function Example Internet SWITCH Port1 Port2 HUB1 HUB2 ……… PC30 Fig 49-1 a typical configuration example of AM function In the topology above, 30 PCs, after converged by HUB1, connect with interface1 on the switch.
Page 445
Operational Configuration of AM Function...
TACACS+ Configuration 50. TACACS+ Configuration 50.1 Introduction to TACACS+ TACACS+ terminal access controller access control protocol is a protocol similar to the radius protocol for control the terminal access to the network. Three independent functions of Authentication, Authorization, Accounting are also available in this protocol. Compared with RADIUS, the transmission layer of TACACS+ protocol is adopted with TCP protocol, further with the packet head ( except for standard packet head) encryption, this protocol is of a more reliable transmission and encryption characteristics, and is more...
TACACS+ Configuration tacacs-server authentication host Configure the IP address, listening port <ip-address> [port <port-number>] number, the value of timeout timer and [timeout <seconds>] [key {0 | 7} the key string of the TACACS+ server; <string>] [primary] the no form of this command deletes the no tacacs-server authentication host TACACS+ authentication server.
TACACS+ Configuration authentication. Switch(config)#interface vlan 1 Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-vlan1)#exit Switch(config)#tacacs-server authentication host 10.1.1.3 Switch(config)#tacacs-server key test Switch(config)#authentication line vty login tacacs 50.4 TACACS+ Troubleshooting In configuring and using TACACS+, the TACACS+ may fail to authentication due to reasons such as physical connection failure or wrong configurations. The user should ensure the following: ...
RADIUS Configuration 51. RADIUS Configuration 51.1 Introduction to RADIUS 51.1.1 AAA and RADIUS Introduction AAA is short for Authentication, Authorization and Accounting, it provide a consistency framework for the network management safely. According to the three functions of Authentication, Authorization, Accounting, the framework can meet the access control for the security network: which one can visit the network device, which access-level the user can have and the accounting for the network resource.
Page 450
RADIUS Configuration show as below: Access-Request Access-Accept Access-Reject Accounting-Request Accounting-Response 11 Access-Challenge Identifier field (1 octet): Identifier for the request and answer packets. Length field (2 octets): The length of the overall RADIUS packet, including Code, Identifier, Length, Authenticator and Attributes Authenticator field (16 octets): used for validation of the packets received from the RADIUS server.
RADIUS Configuration (unassigned) Framed-AppleTalk-Zone Reply-Message 40-59 (reserved for accounting) Callback-Number CHAP-Challenge Callback-Id NAS-Port-Type (unassigned) Port-Limit Framed-Route Login-LAT-Port Length field (1 octet), the length in octets of the attribute including Type, Length and Value fields. Value field, value of the attribute whose content and format is determined by the type and length of the attribute.
Page 452
RADIUS Configuration To configure the encryption key for the radius-server key {0 | 7} <string> RADIUS server. The no form of this no radius-server key command will remove the configured key. 3. Configure the RADIUS server Command Explanation Global Mode radius-server authentication host...
RADIUS Configuration radius-server To configure the update interval for accounting-interim-update timeout accounting. form this <seconds> command will restore default radius-server configuration. accounting-interim-update timeout 5. Configure the IP address of the RADIUS NAS Command Explanation Global Mode radius nas-ipv4 <ip-address> To configure the source IP address for no radius nas-ipv4 the RADIUS packets for the switch.
RADIUS Configuration Configure steps as below: Switch(config)#interface vlan 1 Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-vlan1)#exit Switch(config)#radius-server authentication host 10.1.1.3 Switch(config)#radius-server accounting host 10.1.1.3 Switch(config)#radius-server key test Switch(config)#aaa enable Switch(config)#aaa-accounting enable 51.3.2 IPv6 RadiusExample 2004:1:2:3::2 2004:1:2:3::1 Radius Server 2004:1:2:3::3 Fig 51-3 The Topology of IPv6 Radius configuration A computer connects to a switch, of which the IP address is 2004:1:2:3::2 and connected with a RADIUS authentication server without Ethernet1/0/2;...
RADIUS Configuration Switch(config)#aaa-accounting enable 51.4 RADIUS Troubleshooting In configuring and using RADIUS, the RADIUS may fail to authentication due to reasons such as physical connection failure or wrong configurations. The user should ensure the following: First make sure good condition of the RADIUS server physical connection ...
SSL Configuration 52. SSL Configuration 52.1 Introduction to SSL As the computer networking technology spreads, the security of the network has been taking more and more important impact on the availability and the usability of the networking application. The network security has become one of the greatest barriers of modern networking applications.
Page 457
SSL Configuration TCP. If the mechanism of the data forwarding in the lower layer is reliable, the data read-in the network will be forwarded to the other program in sequence, lose packet and re-forwarding will not appear. A lot of transmission protocols can provide such kind of service in theory, but in actual application, SSL is almost running on TCP, and not running on UDP and IP directly.
SSL Configuration 52.2 SSL Configuration Task List 1. Enable/disable SSL function 2. Configure/delete port number by SSL used 3. Configure/delete secure cipher suite by SSL used 4. Maintenance and diagnose for the SSL function 1. Enable/disable SSL function Command Explanation Global Mode ip http secure-server Enable/disable SSL function.
SSL Configuration Firstly, SSL should be enabled on the switch. When the client tries to access the switch through https method, a SSL session will be set up between the switch and the client. When the SSL session has been set up, all the data transmission in the application layer will be encrypted.
IPv6 Security RA Configuration 53. IPv6 Security RA Configuration 53.1 Introduction to IPv6 Security RA In IPv6 networks, the network topology is generally compromised of routers, layer-two switches and IPv6 hosts. Routers usually advertise RA, including link prefix, link MTU and other information, when the IPv6 hosts receive RA, they will create link address, and set the default router as the one sending RA in order to implement IPv6 network communication.
IPv6 Security RA Configuration Enable the debug information of IPv6 debug ipv6 security-ra security RA module, the no operation of no debug ipv6 security-ra this command will disable the output of debug information of IPv6 security RA. show ipv6 security-ra [interface Display the distrust port and whether <interface-list>]...
Page 462
IPv6 Security RA Configuration expectation after configuring IPv6 security RA: Check if the switch is correctly configured. Check if there are rules conflicting with security RA function configured on the switch, this kind of rules will cause RA messages to be forwarded.
VLAN-ACL Configuration 54. VLAN-ACL Configuration 54.1 Introduction to VLAN-ACL The user can configure ACL policy to VLAN to implement the accessing control of all ports in VLAN, and VLAN-ACL enables the user to expediently manage the network. The user only needs to configure ACL policy in VLAN, the corresponding ACL action can takes effect on all member ports of VLAN, but it does not need to solely configure on each member port.
Page 464
VLAN-ACL Configuration vacl ip access-group {<1-299> | WORD} {in | out} [traffic-statistic] vlan WORD Configure or delete IP VLAN-ACL. no vacl ip access-group {<1-299> | WORD} {in | out} vlan WORD 2. Configure VLAN-ACL of MAC type Command Explanation Global mode vacl mac access-group {<700-1199>...
VLAN-ACL Configuration 6. Clear statistic information of VLAN-ACL Command Explanation Admin mode clear vacl [in | out] statistic vlan Clear the statistic information of VACL. [<vlan-id>] 54.3 VLAN-ACL Configuration Example A company‘s network configuration is as follows, all departments are divided by different VLANs, technique department is Vlan1, finance department is Vlan2.
VLAN-ACL Configuration Fig 54-1 VLAN-ACL configuration example Configuration example: 1) First, configure a timerange, the valid time is the working hours of working day: Switch(config)#time-range t1 Switch(config-time-range-t1)#periodic weekdays 9:00:00 to 12:00:00 Switch(config-time-range-t1)#periodic weekdays 13:00:00 to 18:00:00 2) Configure the extended acl_a of IP, at working hours it only allows to access the resource within the internal network (such as 192.168.0.255).
MAB Configuration 55. MAB Configuration 55.1 Introduction to MAB In actual network existing the device which can not install the authentication client, such as printer, PDA devices, they can not process 802.1x authentication. However, to access the network resources, they need to use MAB authentication to replace 802.1x authentication.
Page 468
MAB Configuration 1. Enable MAB function Command Explanation Global Mode mac-authentication-bypass enable Enable the global MAB authentication mac-authentication-bypass function. enable Port Mode mac-authentication-bypass enable Enable the port MAB authentication mac-authentication-bypass function. enable 2. Configure MAB authentication username and password Command Explanation Global Mode mac-authentication-bypass...
MAB Configuration mac-authentication-bypass timeout offline-detect (0|<60-7200>) Set offline detection interval. no mac-authentication-bypass timeout offline-detect mac-authentication-bypass timeout quiet-period <1-60> Set quiet-period of MAB authentication. mac-authentication-bypass timeout quiet-period mac-authentication-bypass timeout stale-period <0-60> Set the time that delete the binding after no mac-authentication-bypass timeout the port is down.
Page 470
MAB Configuration Update Server Radius Server Internet Eth1/0/1 Eth1/0/2 Eth1/0/3 Switch2 Ethernet1/0/4 Ethernet1/0/4 Switch1 Eth1/0/1 Eth1/0/2 Eth1/0/3 Printer Fig 55-1 MAB application Switch1 is a layer 2 accessing switch, Switch2 is a layer 3 aggregation switch. Ethernet 1/0/1 is an access port of Switch1, connects to PC1, it enables 802.1x port-based function and configures guest vlan as vlan8.
Page 471
MAB Configuration resources. To implement this application, the configuration is as follows: Switch1 configuration: (1) Enable 802.1x and MAB authentication function globally, configure username and password of MAB authentication and radius-server address Switch(config)# dot1x enable Switch(config)# mac-authentication-bypass enable Switch(config)#mac-authentication-bypass username-format fixed username mabuser password mabpwd Switch(config)#vlan 8-10 Switch(config)#interface vlan 9...
MAB Configuration Switch(config-if-ethernet1/0/3)#exit Switch(config)#interface ethernet 1/0/4 Switch(config-if-ethernet1/0/4)# switchport mode trunk 55.4 MAB Troubleshooting If there is any problem happens when using MAB function, please check whether the problem is caused by the following reasons: Make sure global and port MAB function are enabled; ...
PPPoE Intermediate Agent Configuration 56. PPPoE Intermediate Agent Configuration 56.1 Introduction to PPPoE Intermediate Agent 56.1.1 Brief Introduction to PPPoE PPPoE (Point to Point Protocol over Ethernet) is a protocol that apply PPP protocol to Ethernet. PPP protocol is a link layer protocol and supply a communication method of point-to-point, it is usually selected by host dial-up link, for example the link is line dial-up.
Page 474
PPPoE Intermediate Agent Configuration may be sent to many access collector of the network. Broadband Access Server responds PADO packet: The second step, server responds PADO (PPPoE Active Discovery Offer) packet to client according to the received source MAC address of PADI packet, the packet will take sever name and service name.
Page 475
PPPoE Intermediate Agent Configuration Fig 56-1 PPPoE IA protocol exchange process 56.1.2.2 PPPoE Packet Format PPPoE packet format is as follows: Ethernet II frame Destination MAC Source MAC Type Field PPPoE Data CRC Check Sum PPPoE data …… Version Type Code Session ID Length Field...
Page 476
PPPoE Intermediate Agent Configuration PPPoE length field (2 bytes): Specify the sum of all TLV length. TLV type field (2 bytes): A TLV frame means a TAG, type field means TAG type, the table is as follows. TLV length field (2 bytes): Specify the length of TAG data field. TLV data field (the length is not specified): Specify the transmitted data of TAG.
Page 477
PPPoE Intermediate Agent Configuration Fig 56-2 PPPoE IA - vendor tag (4 bytes in each row) Add TLV tag as 0x0105 for PPPoE IA, TAG_LENGTH is length field of vendor tag; 0x00000DE9 is ―ADSL Forum‖ IANA entry of the fixed 4 bytes; 0x01 is type field of Agent Circuit ID, length is length field and Agent Circuit ID value field;...
PPPoE Intermediate Agent Configuration can receive only PADI, PADR and PADT packets which are sent to server. To ensure client operation is correct, it must set the port connected server as trust port, each access device has a trust port at least. PPPoE IA vendor tag can not exist in PPPoE packets sent by server to client, so we can strip and forward these vendor tags if they exist in PPPoE packets.
PPPoE Intermediate Agent Configuration pppoe intermediate-agent type self-defined remote-id {mac | hostname| string WORD} Configure the self-defined remote-id. pppoe intermediate-agent type self-defined remote-id pppoe intermediate-agent delimiter Configure the delimiter among the <WORD> fields in circuit-id and remote-id no pppoe intermediate-agent delimiter pppoe intermediate-agent format...
Page 480
PPPoE Intermediate Agent Configuration Fig 56-4 PPPoE IA typical application Both host and BAS server run PPPoE protocol, they are connected by layer 2 ethernet, switch enables PPPoE Intermediate Agent function. Typical configuration (1) in the following: Step1: Switch enables global PPPoE IA function, MAC as 0a0b0c0d0e0f. Switch(config)# pppoe intermediate-agent Step2: Configure port ethernet1/0/1 which connect server as trust port, and configure vendor tag strip function.
PPPoE Intermediate Agent Configuration Step5: Configure pppoe intermediate-agent identifier-string as ―efgh‖, combo mode as spv, delimiter of Slot ID and Port ID as ―#‖, delimiter of Port ID and Vlan ID as ―/‖. Switch(config)#pppoe intermediate-agent type tr-101 circuit-id identifier-string efgh option spv delimiter # delimiter / Step6: Configure circuit-id value as bbbb on port ethernet1/0/2.
SAVI Configuration 57. SAVI Configuration 57.1 Introduction to SAVI SAVI (Source Address Validation Improvement) is a security authentication method that provides the granularity level of the node source address. It gets the trust node information (such as port, MAC address information), namely, anchor information by monitoring the interaction process of the relative protocol packets (such as ND protocol, DHCPv6 protocol) and using CPS (Control Packet Snooping) mechanism.
Page 483
SAVI Configuration 14. Enable or disable ND trust of port 15. Configure the binding number Enable or disable SAVI function Command Explanation Global mode savi enable Enable the global SAVI function, no no savi enable command disables the function. Enable or disable application scene function for SAVI Command Explanation Global mode...
Page 484
SAVI Configuration Configure the global max-slaac-life for SAVI Command Explanation Global mode savi max-slaac-life <max-slaac-life> Configure the lifetime period of the no savi max-slaac-life dynamic slaac binding at BOUND state, no command restores the default value. Configure the lifetime period for SAVI bind-protect Command Explanation Global mode...
Page 485
SAVI Configuration but does not limit the static binding number. 11. Configure the check mode for SAVI conflict binding Command Explanation Global mode savi check binding <simple | probe> Configure the check mode for the mode conflict binding, no command deletes no savi check binding mode the check mode.
SAVI Configuration 57.3 SAVI Typical Application In actual application, SAVI function is usually applied in access layer switch to check the validity of node source address on direct-link. There are four typical application scenes for SAVI function: DHCP-Only, Slaac-Only, DHCP-Slaac and Static binding. In network environment, users can select the corresponding scene according to the actual requirement;...
Web Portal Configuration 58. Web Portal Configuration 58.1 Introduction to Web Portal Authentication 802.1x authentication uses the special client to authenticate, the device uses the special layer 2 switch, the authentication server uses RADIUS server, the format of authentication message uses EAP protocol. Use EAPOL encapsulation technique (encapsulate EAP packets within Ethernet frame) to process the communication between client and authentication proxy switch, but authentication proxy switch and authentication server use EAPOR encapsulation format (runn EAP packets on Radius protocol) to...
Page 489
Web Portal Configuration 1. Enable/disable web portal authentication globally Command Explanation Global Mode webportal enable Enable/disable web portal authentication no webportal enable globally. 2. Enable/disable web portal authentication of the port Command Explanation Port Mode webportal enable Enable/disable web portal authentication no webportal enable of the port.
Web Portal Configuration 7. Delete the binding information of web portal authentication Command Explanation Admin Mode clear webportal binding {mac WORD | Delete the binding information of web interface <ethernet IFNAME portal authentication. IFNAME> |} 58.3 Web Portal Authentication Typical Example Internet RADIUS Portal...
Web Portal Configuration as RADIUS server‘s IP and port, and enable the accounting function. Ethernet 1/0/2 connects to pc1, the port enables web portal authentication, and configure the redirection address and port as portal server‘s IP and port, so ethernet 1/0/2 forbids all flows except dhcp/dns/arp packets.
VRRP Configuration 59. VRRP Configuration 59.1 Introduction to VRRP VRRP (Virtual Router Redundancy Protocol) is a fault tolerant protocol designed to enhance connection reliability between routers (or L3 Ethernet switches) and external devices. It is developed by the IETF for local area networks (LAN) with multicast/broadcast capability (Ethernet is a Configuration Example) and has wide applications.
VRRP Configuration is brief and smooth, hosts within the segment can use the Virtual Router as normal and uninterrupted communication can be achieved. 59.2 VRRP Configuration Task List Configuration Task List: Create/Remove the Virtual Router (required) Configure VRRP dummy IP and interface (required) Activate/Deactivate Virtual Router (required) Configure VRRP sub-parameters (optional) (1)...
Page 496
VRRP Configuration Verify the dummy IP address is in the same network segment of the interface‘s actual IP address. If the examination remains unsolved, please use debug vrrp and other debugging command and copy the DEBUG message within 3 minutes, send the recorded message to the technical server center of our company.
IPv6 VRRPv3 Configuration 60. IPv6 VRRPv3 Configuration 60.1 Introduction to VRRPv3 VRRPv3 is a virtual router redundancy protocol for IPv6. It is designed based on VRRP (VRRPv2) in IPv4 environment. The following is a brief introduction to it. In a network based on TCP/IP protocol, in order to guarantee the communication between the devices which are not physically connected, routers should be specified.
IPv6 VRRPv3 Configuration systems. In IPv6 environment, the hosts in a LAN usually learn the default gateway via neighbor discovery protocol (NDP), which is implemented based on regularly receiving advertisement messages from routers. The NDP of IPv6 has a mechanism called Neighbor Unreachability Detection, which checks whether a neighbor node is failed by sending unicast neighbor request messages to it.
IPv6 VRRPv3 Configuration number of which is the same with ‖Count IPv6 Addr‖, and the first one of which should be the virtual IPv6 address of the virtual router. Fig 60-1 VRRPv3 message 60.1.2 VRRPv3 Working Mechanism The working mechanism of VRRPv3 is the same with that of VRRPv2, which is mainly implemented via the interaction of VRRP advertisement messages.
IPv6 VRRPv3 Configuration of the virtual router interface, then the virtual router will be called the IP address owner in the VRRP group; the IP address owner automatically has the highest priority: 255. The priority of 0 is usually used when the IP address owner gives up the role of master. The range of priority can be configured is 1-254.
Page 501
IPv6 VRRPv3 Configuration Configure the virtual IPv6 address and virtual-ipv6 <ipv6-address> Interface interface of VRRPv3, the no operation of {Vlan <ID> | IFNAME } this command will delete the virtual IPv6 no virtual-ipv6 interface address and interface. 3. Enable/disable the virtual router Command Explanation VRRPv3 Protocol Mode...
IPv6 VRRPv3 Configuration 60.3 VRRPv3 Typical Examples Fig 60-2 VRRPv3 Typical Network Topology As shown in graph, switch A and switch B are backups to each other, switch A is the master of backup group 1 and a backup of backup group 2. Switch B is the master of backup group 2 and a Backup of backup group 1.
MRPP Configuration 61. MRPP Configuration 61.1 Introduction to MRPP MRPP (Multi-layer Ring Protection Protocol), is a link layer protocol applied on Ethernet loop protection. It can avoid broadcast storm caused by data loop on Ethernet ring, and restore communication among every node on ring network when the Ethernet ring has a break link.
Page 505
MRPP Configuration Each MRPP ring has two states. Health state: The whole ring net work physical link is connected. Break state: one or a few physical link break in ring network 3. nodes Each switch is named after a node on Ethernet. The node has some types: Primary node: each ring has a primary node, it is main node to detect and defend.
MRPP Configuration 61.1.2 MRPP Protocol Packet Types Packet Type Explanation Hello packet (Health examine The primary port of primary node evokes to detect packet) Hello ring, if the secondary port of primary node can receive Hello packet in configured overtime, so the ring is normal.
MRPP Configuration MAC address forward list. 3. Ring Restore After the primary node occur ring fail, if the secondary port receives Hello packet sending from primary node, the ring has been restored, at the same time the primary node block its secondary port, and sends its neighbor LINK-UP-Flush-FDB packet. After MRPP ring port refresh UP on transfer node, the primary node maybe find ring restore after a while.
Page 508
MRPP Configuration Configure Hello packet timer sending hello-timer < timer> from primary node of MRPP ring, format no hello-timer ―no‖ restores default timer value. Configure Hello packet overtime timer fail-timer <timer> sending from primary node of MRPP ring, format ―no‖ restores default timer no fail-timer value.
MRPP Configuration Display receiving data packet statistic show mrpp statistics {<ring-id>} information of MRPP ring. Clear receiving data packet statistic clear mrpp statistics {<ring-id>} information of MRPP ring. 61.3 MRPP Typical Scenario SWITCH A SWITCH B Master Node MRPP Ring 4000 SWITCH C SWITCH D Fig 61-2 MRPP typical configuration scenario...
Page 510
MRPP Configuration Switch(Config)#interface ethernet 1/0/1 Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2 Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port Switch(config-If-Ethernet1/0/2)#exit Switch(Config)# SWITCH B configuration Task Sequence: Switch(Config)#mrpp enable Switch(Config)#mrpp ring 4000 Switch(mrpp-ring-4000)#control-vlan 4000 Switch(mrpp-ring-4000)#enable Switch(mrpp-ring-4000)#exit Switch(Config)#interface ethernet 1/0/1 Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2 Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port Switch(config-If-Ethernet1/0/2)#exit Switch(Config)#...
MRPP Configuration Switch(mrpp-ring-4000)#exit Switch(Config)#interface ethernet 1/0/1 Switch(config-If-Ethernet1/0/1)#mrpp ring 4000 primary-port Switch(config-If-Ethernet1/0/1)#interface ethernet 1/0/2 Switch(config-If-Ethernet1/0/2)#mrpp ring 4000 secondary-port Switch(config-If-Ethernet1/0/2)#exit Switch(Config)# 61.4 MRPP Troubleshooting The normal operation of MRPP protocol depends on normal configuration of each switch on MRPP ring, otherwise it is very possible to form ring and broadcast storm: ...
ULPP Configuration 62. ULPP Configuration 62.1 Introduction to ULPP Each ULPP group has two uplink ports, they are master port and slave port. The port may be a physical port or a port channel. The member ports of ULPP group have three states: Forwarding, Standby, Down.
Page 513
ULPP Configuration wait for some times before the master port preempt the slave port. For keeping the continuance of the flows, the master port does not process to preempt by default, but turns into the Standby state. When configuring ULPP, it needs to specify the VLAN which is protected by this ULPP group through the method of MSTP instances, and ULPP does not provide the protection to other VLANs.
ULPP Configuration Fig 62-2 VLAN load balance 62.2 ULPP Configuration Task List 1. Create ULPP group globally 2. Configure ULPP group 3. Show and debug the relating information of ULPP 1. Create ULPP group globally Command Expalnation Global mode ulpp group <integer> Configure and delete ULPP group no ulpp group <integer>...
Page 515
ULPP Configuration Configure the preemption delay, preemption delay <integer> the no operation restores the no preemption delay default value 30s. Configure sending control control vlan <integer> VLAN, no operation restores the no control vlan default value 1. protect vlan-reference-instance Configure the protection VLANs, <instance-list>...
ULPP Configuration Show flush type and control VLAN show ulpp flush-receive-port received by the port. clear ulpp flush counter interface Clear the statistic information of the flush <name> packets. debug ulpp flush {send | receive} Show the information of the receiving interface <name>...
Page 517
ULPP Configuration enabled, this topology forms a ring. For avoiding the loopback, SwitchA can configure ULPP protocol, the master port and the slave port of ULPP group. When both master port and slave port are up, the slave port will be set as standby state and will not forward the data packets.
ULSM Configuration 63. ULSM Configuration 63.1 Introduction to ULSM ULSM (Uplink State Monitor) is used to process the port state synchronization. Each ULSM group is made up of the uplink port and the downlink port, both the uplink port and the downlink port may be multiple.
ULSM Configuration Fig 63-1 ULSM using scene 63.2 ULSM Configuration Task List 1. Create ULSM group globally 2. Configure ULSM group 3. Show and debug the relating information of ULSM 1. Create ULSM group globally Command explanation Global mode ulsm group <group-id> Configure and delete ULSM group no ulsm group <group-id>...
ULSM Configuration 3. Show and debug the relating information of ULSM Command Explanation Admin mode Show the configuration information of show ulsm group [group-id] ULSM group. Show the event information of ULSM, the debug ulsm event operation disables shown no debug ulsm event information.
Mirror Configuration 64. Mirror Configuration 64.1 Introduction to Mirror Mirror functions include port mirror function, flow mirror function. Port mirror refers to the duplication of data frames sent/received on a port to another port. The duplicated port is referred to as mirror source port and the duplicating port is referred to as mirror destination port.
Mirror Configuration Switch(config)#monitor session 4 source interface ethernet 1/0/15 access-list 120 rx 64.4 Device Mirror Troubleshooting If problems occur on configuring port mirroring, please check the following first for causes: Whether the mirror destination port is a member of a TRUNK group or not, if yes, modify the TRUNK group.
RSPAN Configuration 65. RSPAN Configuration 65.1 Introduction to RSPAN Port mirroring refers to the duplication of data frames sent/received on a port to another port. The duplicated port is referred to as mirror source port and the duplicating port is referred to as mirror destination port. It is more convenience for network administrator to monitor and manage the network and diagnostic after the mirroring function achieved.
Page 529
RSPAN Configuration 2. Normal mode: To configure the RSPAN destination port in the RSPAN VLAN. Thus, datagrams in the RSPAN VLAN will be broadcasted to the destination port. In this mode, the destination port should be in RSPAN VLAN, and the source port should not be configured for broadcasting storm control.
RSPAN Configuration Reflector Port: The local mirroring port between the RSPAN source and destination ports, which is not directly connected to the intermediate switches. 65.2 RSPAN Configuration Task List Configure RSPAN VLAN Configure mirror source port Configure mirror destination port Configure reflector port Configure remote VLAN of mirror group 1.
RSPAN Configuration monitor session <session> To configure the interface to reflector reflector-port <interface-number> port; The no command deletes the monitor session <session> reflector port. reflector-port 5. Configure remote VLAN of mirror group Command Explanation Global Mode monitor session <session> To configure remote VLAN of mirror remote vlan <vid>...
Page 532
RSPAN Configuration intermediate switch is not fixed. Datagrams can be broadcasted in the RSPAN VLAN through the loopback, which is much more flexible. The normal mode configuration is show as below: Solution 1: Source switch: Interface ethernet 1/0/1 is the source port for mirroring. Interface ethernet 1/0/2 is the destination port which is connected to the intermediate switch.
Page 533
RSPAN Configuration RSPAN VLAN is 5. Switch(config)#vlan 5 Switch(Config-Vlan5)#remote-span Switch(Config-Vlan5)#exit Switch(config)#interface ethernet 1/0/9 Switch(Config-If-Ethernet1/0/9)#switchport mode trunk Switch(Config-If-Ethernet1/0/9)#exit Switch(config)#interface ethernet 1/0/10 Switch(Config-If-Ethernet1/0/10)#switchport access vlan 5 Switch(Config-If-Ethernet1/0/10)#exit Solution 2: Source switch: Interface ethernet 1/0/1 is the source port. Interface ethernet 1/0/2 is the TRUNK port, which is connected to the intermediate switch. The native VLAN should not be a RSPAN VLAN.
RSPAN Configuration data may not be carried by the destination switch. RSPAN VLAN is 5. Switch(config)#vlan 5 Switch(Config-Vlan5)#remote-span Switch(Config-Vlan5)#exit Switch(config)#interface ethernet 1/0/6-7 Switch(Config-If-Port-Range)#switchport mode trunk Switch(Config-If-Port-Range)#exit Destination switch: Interface ethernet1/0/9 is the source port which is connected to the source switch. Interface ethernet1/0/10 is the destination port which is connected to the monitor.
Page 535
RSPAN Configuration VLAN for the TRUNK ports.
sFlow Configuration 66. sFlow Configuration 66.1 Introduction to sFlow The sFlow (RFC 3176) is a protocol based on standard network export and used on monitoring the network traffic information developed by the InMon Company. The monitored switch or router sends date to the client analyzer through its main operations such as sampling and statistic, then the analyzer will analyze according to the user requirements so to monitor the network.
Page 537
sFlow Configuration applied the global configuration. The ―no sflow destination‖ command restores to the default port value and deletes the IP address. 2. Configure the sFlow proxy address Command Explanation Global Mode sflow agent-address Configure the source IP address applied by the sFlow proxy;...
sFlow Configuration sflow counter-interval <interval-vlaue> Configure the max interval when sFlow performing statistic sampling. The ―no‖ form no sflow counter-interval of this command deletes 8. Configure the analyzer used by sFlow Command Explanation Global Mode sflow analyzer sflowtrend Configure the analyzer used by sFlow, the no sflow analyzer sflowtrend no command deletes the analyzer.
sFlow Configuration 66.4 sFlow Troubleshooting In configuring and using sFlow, the sFlow server may fail to run properly due to physical connection failure, wrong configuration, etc. The user should ensure the following: Ensure the physical connection is correct Guarantee the address of the sFlow analyzer configured under global or port mode is accessible.
SNTP Configuration 67. SNTP Configuration 67.1 Introduction to SNTP The Network Time Protocol (NTP) is widely used for clock synchronization for global computers connected to the Internet. NTP can assess packet sending/receiving delay in the network, and estimate the computer‘s clock deviation independently, so as to achieve high accuracy in network computer clocking.
SNTP Configuration RFC2030; SNTP client multicast and unicast are not supported, nor is the SNTP server function. 67.2 Typical Examples of SNTP Configuration SNTP/NTP SNTP/NTP SERVER SERVER … … SWITCH SWITCH SWITCH Fig 67-2 Typical SNTP Configuration All switches in the autonomous zone are required to perform time synchronization, which is done through two redundant SNTP/NTP servers.
NTP Function Configuration 68. NTP Function Configuration 68.1 Introduction to NTP Function The NTP (Network Time Protocol) synchronizes timekeeping spans WAN and LAN among distributed time servers and clients, it can get millisecond precision. The introduction of event, state, transmit function and action are defined in RFC-1305. The purpose of using NTP is to keep consistent timekeeping among all clock-dependent devices within the network so that the devices can provide diverse applications based on the consistent time.
Page 543
NTP Function Configuration 2. To configure NTP server function Command Explication Global Mode server {<ip-address> <ipv6-address>} [version To enable the specified time server of <version_no>] [key <key-id>] time source. server {<ip-address> <ipv6-address>} 3. To configure the max number of broadcast or multicast servers supported by the NTP client Command Explication...
Page 544
NTP Function Configuration ntp authentication-key <key-id> md5 To configure authentication key for NTP <value> authentication. no ntp authentication-key <key-id> ntp trusted-key <key-id> To configure trusted key. no ntp trusted-key <key-id> 7. To specified some interface as NTP broadcast/multicast client interface Command Explication vlan Configuration Mode...
NTP Function Configuration Switch(config)#ntp server 192.168.1.11 Switch(config)#ntp server 192.168.2.11 68.4 NTP Function Troubleshooting In configuration procedures, if there is error occurred, the system can give out the debug information. The NTP function disables by default, the show command can be used to display current configuration.
DNSv4/v6 Configuration 69. DNSv4/v6 Configuration 69.1 Introduction to DNS DNS (Domain Name System) is a distributed database used by TCP/IP applications to translate domain names into corresponding IPv4/IPv6 addresses. With DNS, you can use easy-to-remember and signification domain names in some applications and let the DNS server translate them into correct IPv4/IPv6 addresses.
DNSv4/v6 Configuration without having to know how the machine will actually locate them. The Domain Name System distributes the responsibility for assigning domain names and mapping them to Internet Protocol (IP) networks by designating authoritative name servers for each domain to keep track of their own changes, avoiding the need for a central register to be continually consulted and updated.
Page 549
DNSv4/v6 Configuration 3. To configure/delete domain name suffix Command Explanation Global Mode ip domain-list <WORD> To configure/delete domain name suffix. no ip domain-list <WORD> 4. To delete the domain entry of specified address in dynamic cache Command Explanation Admin Mode clear dynamic-host {<ip-address>...
DNSv4/v6 Configuration 9. Monitor and diagnosis of DNS function Command Explanation Admin Mode and Configuration Mode To show the configured DNS server show dns name-server information. To show the configured DNS domain show dns domain-list name suffix information. To show the dynamic domain name show dns hosts information of resolved by switch.
Page 551
DNSv4/v6 Configuration configurations are as below: first to enable DNS dynamic domain name resolution function on switch, and configure DNS server address, then with some kinds of tools such as PING, the switch can get corresponding IPv4/IPv6 address with dynamic domain name resolution function.
DNSv4/v6 Configuration 69.4 DNS Troubleshooting In configuring and using DNS, the DNS may fail due to reasons such as physical connection failure or wrong configurations. The user should ensure the following: First make sure good condition of the TACACS+ server physical connection; ...
Summer Time Configuration 70. Summer Time Configuration 70.1 Introduction to Summer Time Summer time is also called daylight saving time, it is a time system for saving energy sources. In summer the time is advanced 1 hour to keep early hours, reduce the lighting, so as to save electrolighting.
Summer Time Configuration 70.3 Examples of Summer Time Example1: The configuration requirement in the following: The summer time from 23:00 on April 1th, 2012 to 00:00 on October 1th, 2012, clock offset as 1 hour, and summer time is named as 2012. Configuration procedure is as follows: Switch(config)# clock summer-time 2012 absolute 23:00 2012.4.1 00:00 2012.10.1 Example2:...
Monitor and Debug 71. Monitor and Debug When the users configures the switch, they will need to verify whether the configurations are correct and the switch is operating as expected, and in network failure, the users will also need to diagnostic the problem. Switch provides various debug commands including ping, telnet, show and debug, etc.
Monitor and Debug please refer to traceroute command chapter in the command manual. 71.4 Traceroute6 The Traceroute6 function is used on testing the gateways passed through by the data packets from the source equipment to the destination equipment, to verify the accessibility and locate the network failure.
Monitor and Debug Show the recent command history of all users. Use clear history all-users command to clear the command history of all users saved show history all-users [detail] by the system, the max history number can be history all-users max-length command.
Monitor and Debug 71.7 System log 71.7.1 System Log Introduction The system log takes all information output under it control, while making detailed catalogue, so to select the information effectively. Combining with Debug programs, it will provide a powerful support to the network administrator and developer in monitoring the network operation state and locating the network failures.
Page 559
Monitor and Debug encounter an power failure. Information in the log buffer zone is critical for monitoring the system operation and detecting abnormal states. Note: the NVRAM log buffer may not exist on some switches, which only have the SDRAM log buffer zone. It is recommended to use the system log server.
Monitor and Debug Up/down interface, topology change, aggregate port state change of the interface are notifications warnings Outputted information from the CLI command is classified informational Information from the debugging of CLI command is classified debugging Log information can be automatically sent to corresponding channels with regard to respective severity levels.
Monitor and Debug Configure the log host output channel Command Description Global Mode Enable the output channel of the logging {<ipv4-addr> | <ipv6-addr>} [ facility log host. The ―no‖ form of this <local-number> ] [level <severity>] command will disable the output logging {<ipv4-addr>...
Page 562
Monitor and Debug information with a severity equal to or higher than warnings to this log server and save in the log record equipment local1. Configuration procedure: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)# ip address 100.100.100.1 255.255.255.0 Switch(Config-if-Vlan1)#exit Switch(config)#logging 100.100.100.5 facility local1 level warnings Example 2: When managing VLAN the IPv6 address of the switch is 3ffe:506::1, and the IPv4 address of the remote log server is 3ffe:506::4.
Reload Switch after Specified Time 72. Reload Switch after Specified Time 72.1 Introduce to Reload Switch after Specifid Time Reload switch after specified time is to reboot the switch without shutdown its power after a specified period of time, usually when updating the switch version. The switch can be rebooted after a period of time instead of immediately after its version being updated successfully.
Debugging and Diagnosis for Packets Received and Sent by CPU 73. Debugging and Diagnosis for Packets Received and Sent by CPU 73.1 Introduction to Debugging and Diagnosis for Packets Received and Sent by CPU The following commands are used to debug and diagnose the packets received and sent by CPU, and are supposed to be used with the help of the technical support.
Debugging and Diagnosis for Packets Received and Sent by CPU no debug driver {receive | send} Turn off the showing of the CPU receiving sending packet informations.
Need help?
Do you have a question about the S95 SERIES and is the answer not in the manual?
Questions and answers