Dasan V5808 User Manual

Dasan V5808 User Manual

Gpon olt system
Table of Contents

Advertisement

Quick Links

V5808
GPON OLT system
User Manual

Advertisement

Table of Contents
loading

Summary of Contents for Dasan V5808

  • Page 1 V5808 GPON OLT system User Manual...
  • Page 2 UMN:CLI User Manual V5808 ※ Copyright 2017 ⓒ DASAN Network Solutions, Inc. Issued by Technical Documentation Team Korea Technical modifications possible. Technical specifications and features are binding only insofar as they are specifically and expressly agreed upon in a written contract.
  • Page 3 UMN:CLI User Manual V5808 Issue History Issue Date Update Number 05/2017 Initial release (NOS version 1.01 #0006) Contents of update Initial contents...
  • Page 4 UMN:CLI User Manual V5808 Contents 1 Introduction ..................32 Audience ..................... 32 Document Structure................32 Document Convention ................. 33 Document Notation ................33 Virus Protection ................... 34 GPL/LGPL Warranty and Liability Exclusion ........34 2 System Overview ................36 System Features ................. 37 3 Command Line Interface (CLI) ............
  • Page 5 UMN:CLI User Manual V5808 4.1.7 Limiting the Number of login attemps ............64 4.1.8 Auto Log-out....................64 4.1.9 Telnet Access ....................65 4.1.10 IP Login Delay ..................... 66 4.1.11 System Rebooting ..................66 4.1.11.1 Manual System Rebooting ................66 4.1.11.2 System Rebooting Scheduler ................. 67 4.1.12 Auto Reset Configuration ................
  • Page 6 UMN:CLI User Manual V5808 4.5.2.1 Login to SSH Server ..................89 4.5.2.2 Secured File Copy ..................89 4.5.2.3 Authentication Key ..................89 802.1x Authentication ................90 4.6.1 802.1x Authentication ................. 92 4.6.1.1 Enabling 802.1x ..................... 92 4.6.1.2 RADIUS Server ....................92 4.6.1.3...
  • Page 7 UMN:CLI User Manual V5808 6.1.5 Simple Network Time Protocol (SNTP) ............. 112 6.1.6 Terminal Configuration ................113 6.1.7 Login Banner ..................... 113 6.1.8 DNS Server ....................114 6.1.9 Fan Operation ................... 115 6.1.10 Enabling FTP/TFTP Connection ............... 115 6.1.11 Disabling Daemon Operation ..............116 6.1.12 FTP Bind Address ..................
  • Page 8 UMN:CLI User Manual V5808 7.1.3 SNMP Agent Administrator ............... 141 7.1.4 Assigning IP Address of SNMP Agent ............. 142 7.1.5 SNMP Com2sec ..................142 7.1.6 SNMP Group .................... 143 7.1.7 SNMP View Record.................. 143 7.1.8 Permission to Access SNMP View Record ..........144 7.1.9...
  • Page 9 UMN:CLI User Manual V5808 7.3.2.7 Interval of Sample Inquiry................145 7.3.2.8 Activating RMON Alarm ................145 7.3.2.9 Deleting Configuration of RMON Alarm ............145 7.3.3 RMON Event ..................... 145 7.3.3.1 Event Community ..................145 7.3.3.2 Event Description ..................145 7.3.3.3 Subject of RMON Event ................
  • Page 10 UMN:CLI User Manual V5808 7.5.8 Displaying Admin Rule ................145 7.5.9 Scheduling ....................145 7.5.9.1 Scheduling mode ..................145 7.5.9.2 Weight and Quantum ................... 145 7.5.9.3 Maximum and Minimum Bandwidth ............. 145 7.5.9.4 DSCP-to-CoS Mapping ................145 7.5.9.5 The Traffic of Queue ..................145 7.5.9.6...
  • Page 11 UMN:CLI User Manual V5808 7.16.13 IPv6 Neighbor Discovery (ND) Inspection ..........145 7.16.13.1 ND Access List ..................... 145 7.16.13.2 Enabling ND Inspection Filtering ..............145 7.16.13.3 ND Inspection on Trust Port ................. 145 7.16.13.4 ND Inspection Log-buffer ................145 7.16.13.6 Displaying ND Inspection ................145 7.16.14 Gratuitous ND ...................
  • Page 12 UMN:CLI User Manual V5808 8.1.9.5 Two-to-Two VLAN Mapping between S-VID and C-VID ......145 8.1.9.6 Double Tagging Operation ................145 8.1.9.7 Double Tagging Configuration ..............145 8.1.9.8 Inner Tag Configuration ................145 8.1.9.9 Displaying VLAN Mapping and Translation ..........145 8.1.10 Layer 2 Isolation ..................
  • Page 13 UMN:CLI User Manual V5808 8.3.6.4 Path-cost ...................... 145 8.3.6.5 Port Priority ....................145 8.3.6.6 Displaying Configuration ................145 8.3.7 Configuring PVSTP ................... 145 8.3.7.1 Enabling PVSTP ..................145 8.3.7.2 Root Switch ....................145 8.3.7.3 Path-cost ...................... 145 8.3.7.4 Port Priority ....................145 8.3.7.5...
  • Page 14 UMN:CLI User Manual V5808 8.5.3.2 Displaying DHCP Lease Status ..............145 8.5.3.3 Deleting DHCP Lease Database..............145 8.5.4 DHCP Relay Agent ................... 145 8.5.4.1 DHCP Helper Address ................. 145 8.5.4.2 Smart Relay Agent Forwarding ..............145 8.5.4.3 DHCP Server ID Option ................145 8.5.4.4...
  • Page 15 UMN:CLI User Manual V5808 8.6.1.4 Range of IPv6 Address ................145 8.6.1.5 DHCPv6 Options ..................145 8.6.1.6 Enabling DHCPv6 Server on Interface ............145 8.6.1.7 Displaying DHCPv6 Information ..............145 8.6.2 DHCPv6 Snooping ..................145 8.6.2.1 Enabling DHCPv6 Snooping ................ 145 8.6.2.2...
  • Page 16 UMN:CLI User Manual V5808 8.13.2.2 Configuring PPPoE Vendor Tag Filtering ............. 145 8.13.3 PPPoE Debug ..................145 8.14 Bandwidth ..................145 8.15 Maximum Transmission Unit (MTU) ..........145 8.16 Blocking Packet Forwarding .............. 145 9 IP Multicast ..................145 Multicast Group Membership ............. 145 9.1.1...
  • Page 17 UMN:CLI User Manual V5808 9.2.8 IGMP Proxy ....................145 9.2.8.1 Designating Downstream Interface .............. 145 9.2.8.2 Designating Upstream Interface ..............145 9.2.8.3 Configuring Upstream Interface Mode............145 9.2.8.4 IGMP-Proxy IF Flap Discredit ............... 145 9.2.8.5 Disabling Verification of Source IP of IGMP Packets ........145 Specifying IGMP Report/Leave’s Source IP Address ........
  • Page 18 UMN:CLI User Manual V5808 10.1.6.2 MLD Query Response Time ................. 145 10.1.6.3 MLD Querier Timeout .................. 145 10.1.6.4 MLD Last Member Query Count and Interval ..........145 10.1.6.5 MLD Immediate Leave ................. 145 10.1.6.6 MLD Static Join .................... 145 10.1.7 Displaying MLD Information ..............145 10.2 IPv6 Multicast Functions ..............
  • Page 19 UMN:CLI User Manual V5808 10.3.5 Source Registration .................. 145 10.3.5.1 Registration Rate Limit ................. 145 10.3.5.2 Registration Suppression Time ..............145 10.3.5.3 Register Message Filtering................145 10.3.5.4 RP Reachability Validation ................145 10.3.5.5 Source Address of Register Message ............145 10.3.6 IPv6 SPT Switchover ................
  • Page 20 UMN:CLI User Manual V5808 11.1.9 Route Flap Dampening ................145 11.1.10 BGP Session Reset ................. 145 11.1.10.1 Session Reset of All Peers................145 11.1.10.2 Session Reset of Peers within Particular AS..........145 11.1.10.3 Session Reset of Specific Route ..............145 11.1.10.4 Session Reset of External Peer ..............
  • Page 21 UMN:CLI User Manual V5808 11.2.16 Passive Interface ..................145 11.2.17 Blocking Routing Information ..............145 11.2.18 Summary Routing Information ..............145 11.2.19 OSPF Monitoring and Management ............145 11.2.19.1 Displaying OSPF Protocol Information ............145 11.2.19.2 Sending SNMP Trap..................145 11.2.19.3 Logging Neighbor Changes................
  • Page 22 UMN:CLI User Manual V5808 11.4.14 Restarting RIP ..................145 11.4.15 UDP Buffer Size of RIP ................145 11.4.16 Monitoring and Managing RIP ..............145 11.4.16.1 Displaying RIP Protocol Information ............145 11.4.16.2 Displaying Debugging Information ............... 145 11.5 Routing Information Protocol Next Generation (RIPng) ..... 145 11.5.1 Enabling RIPng ..................
  • Page 23 UMN:CLI User Manual V5808 12.1.1 Opening OLT Mode ................... 145 12.1.1.1 OLT Description.................... 145 12.1.1.2 Activating OLT ....................145 12.1.2 Downstream Encryption ................145 12.1.3 OLT Bandwidth ..................145 12.1.3.1 Upstream Bandwidth ..................145 12.1.3.2 Bandwidth Scheduler ................... 145 12.1.4 Auto ONU Fault Detection ................ 145 12.1.5 Maximal Distance between OLT and ONU (ONT) ........
  • Page 24 UMN:CLI User Manual V5808 12.2.11 ONU Port Configuration ................145 12.2.11.1 UNI Ethernet Port Configuration ..............145 12.2.11.2 ANI RF Video Port Configuration ..............145 12.2.12 ONU Loop Detect Configuration .............. 145 12.2.13 ONU Inactive Aging-time ................145 12.2.14 ONU Reset ....................145 12.2.15 ONU Password Type Configuration ............
  • Page 25 UMN:CLI User Manual V5808 12.3.5 Applying ONU Profile ................145 12.3.6 Checking ONU Profile Configuration ............145 12.3.7 Assigning IP Host of SNMP Agent ............145 12.3.8 Displaying ONU profile ................145 12.4 Traffic Profile ..................145 12.4.1 Creating Traffic Profile ................145 12.4.2 Creating a Mapper ..................
  • Page 26 UMN:CLI User Manual V5808 12.4.14 Displaying Traffic Profile Information ............145 12.4.15 Sample Configuration ................145 12.5 DBA Profile ..................145 12.5.1 Creating DBA Profile ................145 12.5.2 Configuring DBA Profile ................145 12.5.3 Saving DBA Profile ................... 145 12.5.4 Displaying DBA Profile ................145 12.6 Extended VLAN Tagging Operation Profile ........
  • Page 27 UMN:CLI User Manual V5808 12.8.9 Saving TDM Pseudowire Profile ............... 145 12.8.10 Displaying TDM Pseudowire Information ..........145 12.9 Pseudowire Maintenance Profile ............145 12.9.1 Creating Pseudowire Maintenance Profile ..........145 12.9.2 Jitter Buffer Maximum Depth ..............145 12.9.3 Jitter Buffer Desired Depth ................ 145 12.9.4 Fill Policy ....................
  • Page 28 UMN:CLI User Manual V5808 14.4.2 Auto Upgrade ................... 145 14.4.3 Upgrade Time-out Configuration .............. 145 15 Abbreviations .................. 145...
  • Page 29 UMN:CLI User Manual V5808 Illustrations Fig. 2.1 Front View of the V5808 ................. 36 Fig. 3.1 Overview of Configuration Mode ..............49 Fig. 4.1 Structure of IPv6 Header ................80 Fig. 4.2 Process of 802.1x Authentication ..............91 Fig. 4.3 Multiple Authentication Servers ..............
  • Page 30 VRRP Track ....................381 Fig. 8.38 Rate Limit and Flood Guard ................ 386 Fig. 9.1 The V5808 with IGMP Snooping ..............400 Fig. 9.2 The V5808 with PIM-SM ................401 Fig. 9.3 The Switch with IGMP Snooping and PIM-SM ..........401 Fig.
  • Page 31 UMN:CLI User Manual V5808 Tables Tab. 1.1 Overview of Chapters ..................32 Tab. 1.2 Command Notation of Guide Book ..............33 Tab. 3.1 Main Command of Privileged EXEC View Mode ........... 40 Tab. 3.2 Main Command of Privileged EXEC Enable Mode ........41 Tab.
  • Page 32: Document Structure

    V5808 1 Introduction Audience This manual is intended for V5808 multi-platform GPON OLT system operators and maintenance personnel for providers of Gigabit passive optical network (GPON) and Ethernet services. This manual assumes that you are familiar with the following: •...
  • Page 33: Document Convention

    UMN:CLI User Manual V5808 Document Convention This guide uses the following conventions to convey instructions and information. Information This information symbol provides useful information when using commands to configure and means reader take note. Notes contain helpful suggestions or references.
  • Page 34: Virus Protection

    (including the related copyright notices) by sending your request to the following e-mail address: opensrc@dasannetworks.com. You will, however, be required to reimburse DASAN Network Solutions for its costs of postage and copying. Any source code request made by you must be sent within 3 years of your purchase of the product.
  • Page 35 V5808 consult the GPL and LGPL. You have no warranty claims against DASAN Network Solutions when a defect in the product is or could have been caused by changes made by you in any part of the software or its configuration. In addition, you have no warranty claims against DASAN Network Solutions when the Open Source Software infringes the intellectual property rights of a third party.
  • Page 36: System Overview

    The V5808 has two Power Supply Unit (PSU) mounting slots on the front panel. Each PSU is comprised of single power input. For power redundancy, user can equip dual PSUs into 2-slot.
  • Page 37: System Features

    Network operator can use MIB also to monitor and manage the V5808. IP Routing The V5808 is Layer 3 switch, which has routing table and IP address as router. Therefore, it supports static routing, RIPv1/v2, OSPFv2 and BGPv4 for unicast routing.
  • Page 38 Outband Management Interface The V5808 can connect to equipments at remote place by assigning IP address to MGMT interface. Since MGMT interface is operated regardless of status of service port, it is still possible to configure and manage equipment at remote place even though problem such...
  • Page 39 User Manual V5808 RADIUS and TACACS+ The V5808 supports client authentication protocol, that is RADIUS (Remote Authentication Dial-In User Service) and TACACS+ (Terminal Access Controller Access Control System Plus). Not only user IP and password registered in switch but also authentication through RADIUS server and TACACS+ server are required to access.
  • Page 40: Configuration Mode

    V5808 connects inband to the cascading switch, and then from the cascading switch to the management network through the outband interface. The V5808 also provides the RS232 console interface to simply access the system with a provided RJ45-to-DB9 cable.
  • Page 41: Privileged Exec Enable Mode

    UMN:CLI User Manual V5808 3.1.2 Privileged EXEC Enable Mode To configure the switch, you need to open Privileged EXEC Enable mode with the enable command, then the system prompt will changes from SWITCH> to SWITCH#. Command Mode Description enable View Opens Privileged EXEC Enable mode.
  • Page 42: Bridge Configuration Mode

    UMN:CLI User Manual V5808 Command Description access-list Configures an access list. bridge Opens Bridge Configuration mode. Sets a DNS server. dot1x Configures 802.1X authentication. exec-timeout Sets an auto log-out timer. help Shows a description of the interactive help system. hostname Sets a host name of the system.
  • Page 43: Dhcp Option 82 Configuration Mode

    DHCP Pool Configuration Mode In DHCP Pool Configuration mode, you can configure general functions of DHCP per each DHCP pool. The V5808 supports multiple DHCP environments with this pool-based DHCP configuration. To open DHCP Pool Configuration mode, enter the ip dhcp pool command, then the system prompt will be changed from SWITCH(config)# to SWITCH(config-dhcp[POOL])#.
  • Page 44: Interface Configuration Mode

    UMN:CLI User Manual V5808 To open DHCP Option 82 Configuration mode, enter the ip dhcp option82 command, then the system prompt will be changed from SWITCH(config)# to SWITCH(config- opt82)#. Command Mode Description Opens DHCP Option 82 Configuration mode to ip dhcp option82 Global configure DHCP option 82.
  • Page 45: Rule Configuration Mode

    Main Command of Rule Configuration Mode 3.1.11 RMON Configuration Mode In RMON Configuration mode, you can configure RMON alarm, RMON event and RMON history. The V5808 provides three different configuration modes to configure each type of RMON. Command Mode Description rmon-alarm <1-65535>...
  • Page 46: Router Configuration Mode

    In Router Configuration mode, you can configure IP routing protocols and VRRP. The V5808 provides three IP routing protocols such as RIP v2, BGP v4 and OSPF v2. To open Rule Configuration mode, enter the router command, then the system prompt will be changed from SWITCH(config)# to SWITCH(config-router)#.
  • Page 47 UMN:CLI User Manual V5808 match Classifies routing information to permit or deny. Configures routing information options. Tab. 3.12 Main Command of Route-map Configuration Mode 3.1.14 GPON Configuration Mode In PON Configuration mode, you can configure GPON-related functions. To open GPON Configuration mode, enter the gpon command, then the system prompt will be changed from SWITCH(config)# to SWITCH(gpon)#.
  • Page 48 UMN:CLI User Manual V5808 Command Description rate-limit Comfigures a rate-limit of a traffic flow between OLT and ONU(ONT). vlan-filter Configures an VLAN filtering. Tab. 3.14 Main Command of ONU Profile Configuration Mode...
  • Page 49 UMN:CLI User Manual V5808 Configuration Mode Overview Fig. 3.1 shows the overview of the configuration mode for the V5808. Privileged EXEC View SWITCH> exit Back to previous mode enable Privileged EXEC Enable SWITCH# configure terminal Global Configuration mode SWITCH(config)# interface INTERFACE...
  • Page 50: Useful Tips

    To list available commands, input question mark <?> in the current mode. When you input the question mark <?>, you can see available commands used in this mode and variables following after the commands. The following is the available commands on Privileged EXEC Enable mode of the V5808. SWITCH# ? Exec commands:...
  • Page 51 Press the <ENTER> key to skip to the next list. In case that the V5808 installed command shell, you can find out commands starting with a specific alphabet. Input the first letter and question mark without space. The following is an example of finding out the commands starting “s”...
  • Page 52: Calling Command History

    The following is the actual output of the help command. SWITCH# help Dasan CLI provides advanced help feature. When you need help, anytime at the command line please press '?'. If nothing matches, the help list will be empty and you must backup until entering a '?' shows the available options.
  • Page 53 UMN:CLI User Manual V5808 Command Mode Description Saves the command history. history non-volatile [<10-2000>] Global 10-2000: history recording max. count (default:2000) To delete the non-volatile command history, use the following command. Command Mode Description clear history non-volatile Deletes the command history.
  • Page 54: Using Abbreviation

    UMN:CLI User Manual V5808 set: logs that SNMP set request. To display the configured status of command history logging, use the following command. Command Mode Description show command-history-log Enable Shows the command history logging status. status Global To back up a command history log file using FTP or TFTP, use the following command.
  • Page 55 UMN:CLI User Manual V5808 Exits to Privileged EXEC Enable mode. If you use the exit command in Privileged EXEC Enable mode or Privileged EXEC View mode, you will be logged out! 3.3.6 The Command Execution Limit If you try to have more than ‘1000’ processes executed by a command, you meet a limit block with “Too many to process”...
  • Page 56: System Connection And Ip Address

    4 System Connection and IP Address System Connection After installing the system, the V5808 is supposed to examine that each port is correctly connected to network and management PC. You can connect to the system to configure and manage the V5808. This section provides instructions how to change password for system connection and how to connect to the system through telnet.
  • Page 57: Changing Login Password

    UMN:CLI User Manual V5808 To encrypt the password which will be shown at running-config, you should use the service password-encryption command. And to represent the string (password) is encrypted, input 8 before the encrypted string. When you use the password enable command with 8 and “the string”, you will make into Privileged EXEC Enable mode with the encrypted string.
  • Page 58 To recovery login password to default, perform the following step-by-step instruction: Step 1 After the V5808 is manually restarted, the booting messages are shown up. Keep on pressing [Space Bar] key right after “ ” is shown up on the [Loading OS1 image ...]...
  • Page 59: Management For System Account

    4.1.5.2 Security Level For the V5808, it is possible to configure the security level from 0 to 15 for a system account. The level 15, as the highest level, has a read-write authority. The administrator can configure from level 0 to level 14. The administrator decides which level user uses which commands in which level.
  • Page 60 UMN:CLI User Manual V5808 access to Privileged EXEC Enable mode. To define the security level and its authority, use the following command. Command Mode Description privilege view level <0-15> Uses the specific command of Privileged EXEC View {COMMAND | all} mode in the level.
  • Page 61 UMN:CLI User Manual V5808 <0-15> {COMMAND | all} Configuration mode in the level. privilege gpon level Uses the specific command of GPON Configuration <0-15> {COMMAND | all} mode in the level. privilege gpon-olt level Uses specific command GPON-OLT <0-15> {COMMAND | all} Configuration mode in the level.
  • Page 62 UMN:CLI User Manual V5808 no privilege policer level <0-15> {COMMAND | all} no privilege policy level <0-15> {COMMAND | all} no privilege rip level <0-15> {COMMAND | all} no privilege bgp level <0-15> {COMMAND | all} no privilege ospf level <0-15> {COMMAND | all} no privilege bridge level <0-15>...
  • Page 63 4.1.6 Limiting the Number of Users For the V5808, you can limit the number of users accessing the switch through telnet. In case of using the system authentication with RADIUS or TACACS+, a configured number includes the number of users accessing the switch via the authentication server.
  • Page 64 Bridge 4.1.8 Auto Log-out For security reasons of the V5808, if no command is entered within the configured inactivity time, the user is automatically logged out of the system. Administrator can configure the inactive session timeout. To enable auto log-out function, use the following command.
  • Page 65 User Manual V5808 The V5808 uses the global auto log-out function to determine how long to manage state information for a session and to determine when to drop sessions that do not become fully established. These global auto log-out timeouts apply globally to all sessions.
  • Page 66: System Rebooting

    UMN:CLI User Manual V5808 SWITCH# where admin at ttys0 from console for 4 days 22 hours 15 minutes 24.88 seconds admin at ttyp0 from 10.0.1.4:1670 for 4 days 17 hours 53 minutes 28.76 seconds admin at ttyp1 from 147.54.140.133:49538 for 6 minutes 34.12 seconds...
  • Page 67 UMN:CLI User Manual V5808 Command Mode Description reload [os1 | os2] Enable Restarts the system. System rebooting wipes all the existing configurations. To save the configurations before the rebooting, answer “y” to the question Do you want to save the system configuration? [y/n].
  • Page 68 4.1.12 Auto Reset Configuration The V5808 reboots the system according to user’s configuration. There are two basises for system rebooting. These are CPU and memory. CPU is rebooted in case CPU Load or Interrupt Load continues for the configured time. Memory is automatically rebooted in case memory low occurs as the configured times.
  • Page 69 UMN:CLI User Manual V5808 Command Mode Description Enable Shows a current configured auto system rebooting by show auto-reset memory Global system memory. Bridge...
  • Page 70: System Authentication

    Deletes a configured system authentication method. no login 4.2.2 Authentication Interface If more than 2 interfaces exist in the V5808, you can set one interface to access RADIUS or TACACS server. To set an authentication interface, use the following command. Command...
  • Page 71: Primary Authentication Method

    UMN:CLI User Manual V5808 4.2.3 Primary Authentication Method You can set the order of the authentication method by giving the priority to each authentication method. To set the primary authentication method, use the following command Command Mode Description Sets a system authentication method.
  • Page 72 Deletes a specified timeout value. 4.2.4.4 Frequency of Retransmit In case of no response from a RADIUS server, the V5808 is supposed to retransmit an authentication request. To set the frequency of retransmitting an authentication request, use the following command.
  • Page 73 UMN:CLI User Manual V5808 4.2.5.3 Timeout of Authentication Request After the authentication request, the V5808 waits for the response from the TACACS+ server for specified time. To specify a timeout value, use the following command. Command Mode Description Specifies a timeout value.
  • Page 74: Accounting Mode

    4.2.6 Accounting Mode The V5808 provides the accounting function of AAA (Authentication, Authorization, and Accounting). Accounting is the process of measuring the resources a user has consumed. Typically, accounting measures the amount of system time a user has used or the amount of data a user has sent and received.
  • Page 75 The Layer 2 switches do not need IP addresses to transmit packets. However, if you want to access to the V5808 from a remote place with TCP/IP through SNMP or telnet, it requires an IP address.
  • Page 76 UMN:CLI User Manual V5808 ip address A.B.C.D/M secondary Assigns a secondary IP address to an interface. ip address dhcp Assigns an IP address from a DHCP server. no ip address [A.B.C.D/M] Clears an IP address assigned to an interface. address A.B.C.D/M...
  • Page 77: Interface Description

    UMN:CLI User Manual V5808 ip route default {GATEWAY | Global Configures a default gateway. null} [<1-255>] To delete a configure default gateway, use the following command. Command Mode Description no ip route default {GATEWAY | Global Deletes a default gateway.
  • Page 78 UMN:CLI User Manual V5808 inet 10.27.41.91/24 broadcast 10.27.41.255 input packets 3208070, bytes 198412141, dropped 203750, multicast packets 0 input errors 12, length 0, overrun 0, CRC 0, frame 0, fifo 12, missed 0 output packets 11444, bytes 4192789, dropped 0...
  • Page 79 UMN:CLI User Manual V5808 Enables IP address overlapping. The IP addresses ip overlap-interface should have a different netmask Global no overlap-interface Disables IP address overlapping.
  • Page 80 UMN:CLI User Manual V5808 Assigning an IPv6 Address IPv6 is designed as an evolutionary step from IPv4. IPv6 runs well on high performance networks like Gigabit Ethernet, ATM, and others, as well as low bandwidth networks. The main changes from IPv4 to IPv6 are summarized as follows: •...
  • Page 81 UMN:CLI User Manual V5808 Tab.4.1 provides an overview of the IPv6 header fields. Field Description Version Version of the protocol (4 Bits) This field replaces the Type of Service field in IPv4. This field is used by sending Priority nodes and forwarding routers to identify and distinguish between different classes or priorities of IPv6 packets.
  • Page 82 UMN:CLI User Manual V5808 IPv6 Address Types IPv6 uses multicast addresses instead of the broadcast address. An IPv6 address can be classified into one of three categories, which Unicast, Multicast and Anycast address. The Anicast address, a new type of address introduced with RFC 1546, is now used with IPv6.
  • Page 83 UMN:CLI User Manual V5808 no shutdown Enables an interface. Interface shutdown Disables an interface. 4.4.2 Assigning IPv6 Address to Network Interface After enabling an interface, assign an IPv6 global address. To assign an IPv6 address to a network interface, use the following command.
  • Page 84 UMN:CLI User Manual V5808 Command Mode Description Configures IPv6 address which dynamically changeable according to the prefix name. ipv6 address PREFIX X:X::X:X/M PREFIX: prefix name Interface X:X::X:X/M : IPv6 prefix of sub host. ipv6 address PREFIX Disables a dynamic IPv6 address allocation using the X:X::X:X/M prefix name and sub-host address.
  • Page 85 UMN:CLI User Manual V5808 Packets are transmitted to destination through static route. Static route includes destination address, neighbor router to receive packet, number of routes that packets have to go through. To configure a static route, use the following command.
  • Page 86 UMN:CLI User Manual V5808 4.4.5 Enabling IPv6 Processing To enable/disable the IPv6 processing on an interface, use the following command. Command Mode Description ipv6 enable Enables the IPv6 processing on an interface. Interface no ipv6 enable Disables the IPv6 processing on an interface.
  • Page 87 UMN:CLI User Manual V5808 4.4.7 Displaying Interface To display an assigned IPv6 address, use the following command. Command Mode Description show ipv6 Interface Shows the IPv6 addresses assigned to an interface. To display an interface status and configuration, use the following command.
  • Page 88: Ssh Server

    4.5.1 SSH Server The V5808 can be operated as SSH server. You can configure the switch as SSH server. 4.5.1.1 Enabling SSH Server To enable/disable SSH server, use the following command.
  • Page 89: Ssh Client

    SSH server up to now. Bridge 4.5.2 SSH Client 4.5.2.1 Login to SSH Server To login to SSH server after configuring the V5808 as SSH client, use the following command. Command Mode Description Logins to SSH server. login...
  • Page 90 Enter passphrase (empty for no passphrase):networks Enter same passphrase again:networks Your identification has been saved in /etc/.ssh/id_dsa. Your public key has been saved in /etc/.ssh/id_dsa.pub. The key fingerprint is: d9:26:8e:3d:fa:06:31:95:f8:fe:f6:59:24:42:47:7e root@V5808 SWITCH_A(config)# Step 2 Copy the generated authentication key to SSH server. Step 3 Connect to SSH server with the authentication key.
  • Page 91 UMN:CLI User Manual V5808 EAP-SRP (Secure Remote Password), EAP-TTLS (Tunneled TLS) and the V5808 supports EAP-MD5 and EAP-TLS. Accessing with user’s ID and password, EAP-MD5 is 1-way Authentication based on the password. EAP-TLS accesses through the mutual authentication system of server authentication and personal authentication and it is possible to guarantee high security because of mutual authentication system.
  • Page 92 UMN:CLI User Manual V5808 4.6.1 802.1x Authentication 4.6.1.1 Enabling 802.1x To configure 802.1x, the user should enable 802.1x daemon first. To enable 802.1x daemon, use the following command. Command Mode Description dot1x system-auth-control Enables 802.1x daemon. Global no dot1x system-auth-control Disables 802.1x daemon.
  • Page 93 UMN:CLI User Manual V5808 After default server is designated, all requests start from the RADIUS server. If there’s no response from default server again, the authentication request is tried for RADIUS server designated as next one. To configure IP address of RADIUS server and key value, use the following command.
  • Page 94 4.6.1.6 Interval for Retransmitting Request/Identity Packet In the V5808, it is possible to specify how long the device waits for a client to send back a response/identity packet after the device has sent a request/identity packet. If the client does not send back a response/identity packet during this time, the device retransmits the request/identity packet.
  • Page 95 4.6.1.9 Interval of Request to RADIUS Server For the V5808, it is possible to set the time for the retransmission of packets to check RADIUS server. If there is a response from other packets, the switch waits for a response from RADIUS server during the configured time before resending the request.
  • Page 96 In the V5808, you can set the number of seconds that the authenticator should wait for a response to request/identity packet from the suppliant before retransmitting the request.
  • Page 97: Initializing Authentication Status

    UMN:CLI User Manual V5808 time interval. 4.6.3 Initializing Authentication Status The user can initialize the entire configuration on the port. Once the port is initialized, the supplicants accessing to the port should be re-authenticated. Command Mode Description dot1x initialize PORTS Global Initializes the authentication status on the port.
  • Page 98 UMN:CLI User Manual V5808 4.6.7 Sample Configuration The following is the example of configuring the port 6 with the port-based authentication specifying the information of RADIUS server. SWTICH(config)# dot1x system-auth-control SWTICH(config)# dot1x nas-port 6 SWTICH(config)# dot1x port-control force-authorized 6 SWTICH(config)# dot1x radius-server host 10.1.1.1 auth-port 1812 key test SWTICH(config)# show dot1x 802.1x authentication is enabled.
  • Page 99: Port Configuration

    Gigabit Ethernet components. In this chapter, you can find the instructions for the basic port configuration such as auto-negotiation, flow control, transmit rate, etc. Please read the following instructions carefully before you configure a port in the V5808. Ethernet Port Configuration 5.1.1...
  • Page 100: Transmit Rate

    UMN:CLI User Manual V5808 PORTS: port number You cannot enable this function on 1000Base-X optical interface. 5.1.3 Transmit Rate To set the transmit rate of an Ethernet port, use the following command. Command Mode Description Sets the transmit rate of a specified port to...
  • Page 101: Port Description

    UMN:CLI User Manual V5808 5.1.6 Port Description To specify a description of an Ethernet port, use the following command. Command Mode Description Specifies a description of an Ethernet port. (maximum port description PORTS number of characters is 100) DESCRIPTION Bridge...
  • Page 102: Traffic Statistics

    UMN:CLI User Manual V5808 5.1.9 Port Crossover MDI/MDIX is a type of Ethernet port connection according to the IEEE 802.3 standard using twisted pair cabling. Uplink ports on hubs and switches use the same pin assignments that use pins 1 and 2 for transmit and 3 and 6 for receive. These ports are called Medium Dependent Interface (MDI) ports.
  • Page 103 [PORTS] Bridge CPU. The V5808 can be configured to generate a syslog message when the number of the packets handled by CPU exceeds a specified value. This function allows system administrators to monitor the switch and network status more effectively.
  • Page 104: Protocol Statistics

    UMN:CLI User Manual V5808 Disables the switch to generate a syslog message statistics-limit according to the number of the packets handled by {PORTS | all} CPU for all packet types. To display a configured value to generate a syslog message according to the number of the packets handled by CPU, use the following command.
  • Page 105 Uninstalled. 5.1.12 Port Debounce Timer The V5808 can be configured to enable the debounce timer for Ethernet ports by specifying a debounce time (in milliseconds) or disable the timer by specifying a debounce time of 0.
  • Page 106: Port Mirroring

    UMN:CLI User Manual V5808 Port Mirroring Port mirroring is the function of monitoring a designated port. Here, one port to monitor is called monitor port and a port to be monitored is called mirrored port. Traffic transmitted from mirrored port are copied and sent to monitor port so that user can monitor network traffic.
  • Page 107 Mode Description Designates the mirrored VLAN. mirror add vlan VLANS Bridge VLANS: VLAN ID The V5808 supports the VLAN mirroring function for the ingress traffic only. Step 3 Activate the port mirroring, using the following command. Command Mode Description mirror enable Bridge Activates port mirroring.
  • Page 108 UMN:CLI User Manual V5808 |123456789012345678 ----------------------------------------- Ingress Mirrored Ports|..oo..Egress Mirrored Ports |..oo..- Mirrored VLANs ---------------- ---------------- SWITCH(bridge)#...
  • Page 109: System Environment

    Shows system time and date. Bridge The V5808 can be configured to observe the daylight saving time in specified area. It means that whenever the system time is updated using a time server located in a different time area, it will be automatically corrected with the local daylight saving time offset.
  • Page 110: Time Zone

    6.1.3 Time Zone The V5808 provides three kinds of time zone, GMT, UCT and UTC. The time zone of the switch is predefined as GMT (Greenwich Mean Time). You can also set the time zone where the network element belongs.
  • Page 111 UMN:CLI User Manual V5808 Tab. 6.1 shows the world time zone. Time Zone Country/City Time Zone Country/City Time Zone Country/City GMT-12 Eniwetok GMT-3 Rio De Janeiro GMT+6 Rangoon GMT-11 Samoa GMT-2 Maryland GMT+7 Singapore GMT-10 Hawaii, Honolulu GMT-1 Azores GMT+8...
  • Page 112 UMN:CLI User Manual V5808 SWITCH(config)# show ntp ========================== Ntpd is running. ========================== Time Servers -------------------------- 1st : 203.255.112.96 -------------------------- Authentication is disabled. ========================== SWITCH(config)# To synchronize the system clock, the system periodically sends the NTP message to the NTP server. You can configure the system to bind the IP address to the message which allows the NTP server to recognize your system.
  • Page 113: Terminal Configuration

    6.1.6 Terminal Configuration By default, the V5808 is configured to display 24 lines composed by 80 characters on console terminal. You can change the number of displaying lines by using the terminal length command. The maximum line displaying is 512 lines.
  • Page 114 UMN:CLI User Manual V5808 Command Mode Description banner Sets a banner before login the system. banner login Global Sets a banner when successfully log in the system. banner login-fail Sets a banner when failing to login the system. To restore a default banner, use the following command.
  • Page 115 Global Deletes DNS server and domain name. 6.1.9 Fan Operation For the V5808, it is possible to control fan operation. To control fan operation, use the following command. Command Mode Description fan operation {on | off | auto} Global Configures fan operation.
  • Page 116: Disabling Daemon Operation

    IP address. However, an interface of the V5808 may have multiple IP addresses. In such a multiple-IP environment, a primary IP address is normally used. You can configure the V5808 to use one of the secondary IP addresses as a source IP of an FTP client.
  • Page 117: System Threshold

    6.1.13 System Threshold You can configure the system with various kinds of the system threshold such as CPU load, traffic, temperature, etc. Using this threshold, the V5808 generates syslog messages, sends SNMP traps, or performs a relevant procedure. 6.1.13.1 CPU Load To set the threshold of CPU load, use the following command.
  • Page 118: System Temperature

    UMN:CLI User Manual V5808 You can also set the blocking timer. When incoming traffic via a given port exceeds a configured threshold, the port will discard that traffic during a specified time. To set the blocking timer, use the following command.
  • Page 119: System Memory

    UMN:CLI User Manual V5808 LOW_VALUE: underload system temperature (-40 to 100°C, default: -20°C) no threshold temp Deletes a configured threshold of system temperature. To display the configured threshold of system temperature, use the following command. Command Mode Description Enable Shows the status and configured threshold of system...
  • Page 120 This module DMI command is enabled by default. Thus, if you don’t want to get DMI information, configure this setting as disable. If disabled, the V5808 does not show DMI information of the SFP ports when using the show port module-info command.
  • Page 121 15-120: time (seconds) To display the watchdog information, use the following command. Command Mode Description Enable show watchdog Global Shows the configured watchdog function. Bridge To know at what time the V5808 watchdog is restarted, use the show boot-info command.
  • Page 122: Configuration Management

    UMN:CLI User Manual V5808 Configuration Management You can verify if the system configurations are correct and save them in the system. 6.2.1 Displaying System Configuration To display the current running configuration of the system, use the following command. Command Mode...
  • Page 123: System Configuration File

    6.2.3 Auto-Saving The V5808 supports the auto-saving feature, allowing the system to save the system configuration automatically. This feature prevents the loss of unsaved system configuration by unexpected system failure. To allow the system to save the system configuration automatically, use the following command.
  • Page 124: Restoring Default Configuration

    Enable Shows a current startup configuration. Global show config-list Shows a list of configuration files. Bridge The following is an example of displaying a list of configuration files. SWITCH(config)# copy running-config V5808 SWITCH(config)# show config-list ========================= CONFIG-LIST ========================= l3_default V5808 SWITCH(config)# 6.2.5...
  • Page 125 The V5808 can be configured to generate core dumps and save them in ramdisk for useful debugging aids in several situations such as accesses to non-existent memory, segmentation errors.
  • Page 126: System Management

    UMN:CLI User Manual V5808 System Management When there is any problem in the system, you must find what the problem is and its solution. Therefore, you should not only be aware of a status of the system but also verify if the system is correctly configured.
  • Page 127 UMN:CLI User Manual V5808 rtt min/avg/max/mdev = 0.058/0.581/1.632/0.542 ms SWITCH# When multiple IP addresses are assigned to the switch, sometimes you need to verify the connection status between the specific IP address and network status. In this case, use the same process as ping test and then input the followings after extended commands.
  • Page 128 Ping Test for Network Status Fig. 6.1, if you perform ping test from PC to C, it goes through the route of A→B→C. This is the general case. But, the V5808 can enable to perform ping test from PC as the route of A→E→D→C.
  • Page 129 To perform ping test as the route which the manager designated, use the following steps. Step 1 Enable IP source-routing function from the equipment connected to PC which the PING test is going to be performed. To enable/disable IP source-routing in the V5808, use the following command. Command Mode Description ip icmp source-route Enable IP source-routing function.
  • Page 130: Displaying User Connecting To System

    UMN:CLI User Manual V5808 The followings are the configurable options to trace the routes. Items Description Protocol [ip] Supports ping test. Default is IP. Sends ICMP echo message by inputting IP address or host name of Target IP address destination in order to check network status with relative.
  • Page 131 UMN:CLI User Manual V5808 6.3.5 MAC Table To display MAC table recorded in specific port, use the following command. Command Mode Description show mac [BRIDGE] Enable Shows MAC table. Global BRIDGE: bridge name show mac BRIDGE PORTS Bridge The following is an example of displaying a current MAC table.
  • Page 132: System Memory Information

    UMN:CLI User Manual V5808 6.3.8 System Memory Information To display a system memory status, use the following command. Command Mode Description show memory Shows system memory information. Enable show memory {bgp | dhcp | Global gpon-olt | imi | lib | nsm | ospf |...
  • Page 133 6.3.9.2 CPU Packet Filtering The V5808 provides a packet filtering feature for incoming/outgoing traffic management to/from CPU. You have to create a CPU packet filter first and set the packet classification criteria and the policy. You can use physical port ID, 802.1p priority (CoS), VLAN ID, 802.1q tag, and so on to classify the CPU packets.
  • Page 134 UMN:CLI User Manual V5808 To configure one or more CPU packet filter match pattern(s), use the following command. Command Mode Description match vid <1-4094> [tag-position Classifies a VLAN ID. <1-8>] VLAN: VLAN ID Classifies a queue of CPU RX/TX packets.
  • Page 135 UMN:CLI User Manual V5808 match patterns, use the following command. Command Mode Description Specifies a drop or permit statement of the CPU packet filter with the configured match pattern. action {permit | drop} permit: permits the traffic of entries drop: discards the traffic of entries...
  • Page 136: Running Process

    6.3.10 Running Process The V5808 provides a function that shows information of the running processes. The information with this command can be very useful to manage the switch. To display information of the running processes, use the following command.
  • Page 137: Displaying Installed Os

    6.3.13 Default OS The V5808 supports the dual OS feature. You can verify the running OS in the flash memory with the show flash command. When two system OSs are installed, you can set one of those as the default OS. To set the default OS of the system, use the following command.
  • Page 138: Tech Support Information

    To reduce the effort to acquire the detail informtation of the system for a technical suppport, the V5808 provides the function that generates all the system information reflecting the current state. Using this function, you can verify all the details on a console screen or even in the remote place via FTP/TFTP.
  • Page 139 UMN:CLI User Manual V5808 Enable show boot-info Global Shows the information of the last system boot. Bridge 6.3.18 Network Service Module (NSM) Daemon Debugging To enable NSM daemon debugging, use the following command. Command Mode Description Enables NSM debugging. debug nsm [all]...
  • Page 140: Network Management

    SNMP agent sends a trap to administrator for specific cases. Trap is a warning message to alert network status to SNMP administrator. The V5808 enhances access management of SNMP agent and limits the range of OID opened to agents. 7.1.1 SNMP Service To enable/disable SNMP service, use the following command.
  • Page 141 Deletes the specified basic information for each item. no snmp location The following is an example of specifying basic information of SNMP agent. SWITCH(config)# snmp contact dasan<02.3484.6500> SWITCH(config)# show snmp contact contact dasan<02.3484.6500> SWITCH(config)# snmp location Seoul,Korea...
  • Page 142: Snmp Com2Sec

    UMN:CLI User Manual V5808 Bridge 7.1.4 Assigning IP Address of SNMP Agent If SNMP agent has several IP addresses, SNMP carries the information through the best suited path (IP address) when SNMP administrator requests for information. It means that SNMP administrator can be received the information from a different IP address which was not actually a given IP address before.
  • Page 143: Snmp Group

    UMN:CLI User Manual V5808 TEST 10.1.1.1 PUBLIC SWITCH(config)# 7.1.6 SNMP Group You can create an SNMP group that can access SNMP agent and its community that belongs to a group. To create an SNMP group, use the following command. Command...
  • Page 144: Permission To Access Snmp View Record

    UMN:CLI User Manual V5808 View List ViewName Type SubTree / Mask ------------------------------------------- TEST included 410 SWITCH(config)# 7.1.8 Permission to Access SNMP View Record To grant an SNMP group to access to a specific SNMP view record, use the following command.
  • Page 145: Snmp Engine Id

    UMN:CLI User Manual V5808 7.1.10 SNMP Engine ID SNMP Engine ID is an administratively unique identifier of a participant in SNMP communication within a single management domain. The SNMP manager and SNMP agent must be configured by an administrator to have unique SNMP Engine IDs.
  • Page 146 UMN:CLI User Manual V5808 TAG: a tag name in the tag list snmp targetaddr Deletes the notification target address. TARGETADDR The SNMP target parameters define the message processing and security parameters that are used in sending notifications to a particular management target. To configure the SNMP parameters with a security model, use the following command.
  • Page 147 UMN:CLI User Manual V5808 no snmp notify NOTIFY Deletes the defined notification. To display information for the notify type, use the following command. Command Mode Description Enable show snmp notify Shows information for the notify type. Global The following is an example of configuring SNMPv3 trap notification.
  • Page 148: Snmp Trap

    UMN:CLI User Manual V5808 taddr1 param1 10.70.1.163 1500 tag1 tag3 SWITCH(config)# show snmp notify Notify Table NotifyName Type ------------------------------------------ tag5 SWITCH(config)# 7.1.12 SNMP Trap SNMP trap is an alert message that SNMP agent notifies SNMP manager about certain problems. If you configure the SNMP trap, the system transmits pertinent information to network management program.
  • Page 149 UMN:CLI User Manual V5808 {A.B.C.D | X:X::X:X } You can set maximum 16 SNMP trap hosts with inputting one by one. The following is an example of setting an SNMP trap host. SWITCH(config)# snmp trap-host 10.1.1.3 SWITCH(config)# snmp trap-host 20.1.1.5 SWITCH(config)# snmp trap-host 30.1.1.2...
  • Page 150 UMN:CLI User Manual V5808 To enable SNMP trap, use the following command. Command Mode Description Generates SNMP trap when SNMP authentication is snmp trap admin-access-login failed. Generates SNMP trap when SNMP authentication is snmp trap auth-fail failed. snmp trap cold-start Generates SNMP trap when SNMP agent is restarted.
  • Page 151: Displaying Snmp Trap

    UMN:CLI User Manual V5808 no snmp trap login-failed no snmp trap dhcp-lease no snmp trap system-restart no snmp trap trap-log no snmp trap-log non-volatile no snmp trap-log threshold no snmp trap-source-interface 7.1.12.4 Displaying SNMP Trap To display the configuration of the SNMP trap, use the following command.
  • Page 152: Snmp Alarm

    7.1.13 SNMP Alarm The V5808 provides an alarm notification function. The alarm will be sent to a SNMP trap host whenever a specific event in the system occurs through CLI. You can also set the alarm severity on each alarm and make the alarm be shown only in case of selected severity or higher.
  • Page 153: Alarm Severity Criterion

    UMN:CLI User Manual V5808 To enable/disable the alarm notify activity, use the following command. Command Mode Description snmp notify-activity {enable | Enables/disables the alarm notify activity. Global disable} (default: disable) 7.1.13.2 Alarm Severity Criterion You can set an alarm severity criterion to make an alarm be shown only in case of selected severity or higher.
  • Page 154 UMN:CLI User Manual V5808 Command Mode Description minor | warning | intermediate} address left in the DHCP pool. snmp alarm-severity dhcp-illegal {critical | major | Sets severity of an alarm for illegal minor | warning | intermediate} DHCP entry. snmp alarm-severity dying-gasp {critical | major |...
  • Page 155 UMN:CLI User Manual V5808 no snmp alarm-severity rmon-alarm-falling no snmp alarm-severity system-restart 7.1.13.5 Displaying SNMP Alarm To display a collected alarm, use the following command. Command Mode Description show snmp alarm-severity Shows a configured alarm severity. Enable show snmp alarm-history Global Shows a collected alarm history.
  • Page 156: Disabling Snmp

    UMN:CLI User Manual V5808 [<1-2000>] volatile memory. 1-100: SNMP logs line number to be displayed show snmp log non-volatile tail Shows currently recorded SNMP message logs in the <1-2000> non-volatile memory. 7.1.15 Disabling SNMP To disable SNMP, use the following command.
  • Page 157: Lldp Operation

    LAN according to IEEE 802.1ab standard. 7.2.1 LLDP Operation The V5808 supporting LLDP transmits the management information between near switches. The information carries the management information that can recognize the network elements and the function. This information is saved in internal Management Information Base (MIB).
  • Page 158: Lldp Message

    Deletes the specified TLV location ID. 7.2.5 LLDP Message For the V5808, it is possible to configure the interval time and times of sending LLDP message. To configure the interval time and times of LLDP message, use the following command.
  • Page 159: Displaying Lldp Configuration

    UMN:CLI User Manual V5808 To configure delay time of transmitting LLDP frame, use the following command. Command Mode Description Configures delay time of transmitting LLDP frame. lldp txdelay <1-8192> Bridge (default: 2) 7.2.7 Displaying LLDP Configuration To display LLDP configuration, use the following command.
  • Page 160: Rmon History

    RMON. There are nine RMON MIB groups defined in RFC 1757: Statistics, History, Alarm, Host, Host Top N, Matrix, Filter, Packet Capture and Event. The V5808 supports two MIB groups of them, most basic ones: Statistics (only for uplink ports) and History.
  • Page 161 UMN:CLI User Manual V5808 write Write running configuration to memory or terminal SWITCH(config-rmonhistory[5])# 7.3.1.1 Source Port of Statistical Data To specify a source port of statistical data, use the following command. Command Mode Description Specifies a data object ID: data-source NAME RMON NAME: enters a data object ID.
  • Page 162: Rmon Alarm

    UMN:CLI User Manual V5808 Before activating RMON history, check if your configuration is correct. After RMON history is activated, you cannot change its configuration. If you need to change configuration, you need to delete the RMON history and configure it again.
  • Page 163 UMN:CLI User Manual V5808 7.3.2.1 Subject of RMON Alarm You need to configure RMON alarm and identify subject using many kinds of data from alarm. To identify subject of alarm, use the following command. Command Mode Description Identifies subject using relevant data, enter the name...
  • Page 164 UMN:CLI User Manual V5808 After configuring upper bound of threshold, configure to generate RMON event when object is more than configured threshold. Use the following command. Command Mode Description Configures to generate RMON event when object is rising-event <1-65535> RMON more than configured threshold.
  • Page 165: Rmon Event

    UMN:CLI User Manual V5808 To configure the first alarm to occur when object is firstly more than threshold or less than threshold, use the following command. Command Mode Description Configures the first Alarm to occur when object is firstly startup-type rising-and-falling RMON more than threshold or less than threshold.
  • Page 166 UMN:CLI User Manual V5808 7.3.3.1 Event Community When RMON event occurs, you need to input community to transmit SNMP trap message to host. Community means a password to give message transmission right. To configure community for trap message transmission, use the following command.
  • Page 167: Activating Rmon Event

    UMN:CLI User Manual V5808 7.3.3.5 Activating RMON Event After finishing all configurations, you should activate RMON event. To activate RMON event, use the following command. Command Mode Description active RMON Activates RMON event. 7.3.3.6 Deleting Configuration of RMON Event Before changing the configuration of RMON event, you should delete RMON event of the number and configure it again.
  • Page 168 UMN:CLI User Manual V5808 monitored variable is smaller than or equal to the falling threshold, a falling event is triggered. (1-2147483647) RISING_THRESHOLD: When value monitored variable is greater than or equal to the rising threshold, a rising event is triggered. (1-2147483647)
  • Page 169: Syslog Output Level

    UMN:CLI User Manual V5808 Syslog The syslog is a function that allows the network element to generate the event notification and forward it to the event message collector like a syslog server. This function is enabled as default, so even though you disable this function manually, the syslog will be enabled again.
  • Page 170 UMN:CLI User Manual V5808 notice | info} console syslog output priority {auth | authpriv | Generates a user-defined syslog message kern | local0 | local1 | local2 | local3 | with a priority in the system memory. local4 | local5 | local6 | local7 | syslog |...
  • Page 171: Facility Code

    UMN:CLI User Manual V5808 physical-entity | dhcp | filter | level with a priority. gpon | loop-detect | snmp} INDEX To display the configuration of the syslog index, use the following command. Command Mode Description show syslog index Shows the information of syslog message index...
  • Page 172: Syslog Bind Address

    UMN:CLI User Manual V5808 SWITCH(config)# syslog output err remote 10.1.1.1 SWITCH(config)# syslog local-code 0 SWITCH(config)# show syslog System logger on running! info local volatile info local non-volatile remote 10.1.1.1 local_code SWITCH(config)# 7.4.3 Syslog Bind Address You can specify an IP address to attach to the syslog message for its identity. To specify the IP address to bind to a syslog message, use the following command.
  • Page 173 UMN:CLI User Manual V5808 Configures the volatile size of syslog message. syslog local volatile size <1- Enable volatile: removes the syslog messages after restart. 128> Global 1-128: buffer size to save (kbytes) Bridge no syslog local volatile Removes the local volatile size.
  • Page 174: Rule And Qos

    V5808 Rule and QoS The V5808 provides a rule and QoS feature for traffic management. The rule classifies incoming traffic, and then processes the traffic according to user-defined policies. You can use the physical port, 802.1p priority (CoS), VLAN ID, DSCP, and so on to classify incoming packets.
  • Page 175 UMN:CLI User Manual V5808 7.5.1 How to Operate QoS QoS operation is briefly described as below. Incoming packets are classified by configured conditions, and then processed by packet counter and rate-limiting on specific policer. After marking and remarking action, the switch transmits those classified and processed packets via a given scheduling algorithm.
  • Page 176: Packet Classification

    • Scheduling Algorithm To handle traffic, you need to configure differently processing orders of traffic by using scheduling algorithms. The V5808 provides: – Strict Priority Queuing (SP) – Deficit Round Robin (DRR) – Weighted Round Robin (WRR) An already applied rule cannot be modified. It needs to be deleted and then created again with changed values.
  • Page 177 UMN:CLI User Manual V5808 via flow, which is with unique name. If you specify the value of parameters, the V5808 classifies the packets corresponding to the parameters. 7.5.2.1 Flow Creation The packet classification involves a traffic descriptor to categorize a packet within a specific flow for QoS handling in the network.
  • Page 178 UMN:CLI User Manual V5808 Command Mode Description Classifies an IP protocol (ICMP). ip {A.B.C.D | A.B.C.D/M | any} A.B.C.D: source/destination IP address {A.B.C.D | A.B.C.D/M | any} icmp A.B.C.D/M: source/destination IP address with mask any: any source/destination IP address Classifies an IP protocol ip {A.B.C.D | A.B.C.D/M | any}...
  • Page 179 UMN:CLI User Manual V5808 To specify a packet-classifying pattern with IPv6 address, use the following command. Command Mode Description Classifies an IPv6 address. X:X::X:X : source/destination IPv6 address ipv6 { X:X::X:X | X:X::X:X/M | any} X:X::X:X/M: source/destination IPv6 address with {X:X::X:X |X:X::X:X/M | any} [<0-...
  • Page 180 UMN:CLI User Manual V5808 any: any ToS value (ignore) Classifies IP precedence. ip-precedence {<0-7> | any} 0-7: IP precedence value any: any IP precedence value (ignore) Classifies a packet length. length {<21-65535> | any} 21-65535: IP packet length any: any IP packet length (ignore) Classifies the Ethernet type.
  • Page 181 UMN:CLI User Manual V5808 7.5.2.3 Applying and modifying Flow After configuring a flow using the above commands, apply it to the system with the following command. If you do not apply the flow to the system, all specified configurations on Flow Configuration mode will be lost.
  • Page 182 UMN:CLI User Manual V5808 7.5.3.1 Policer Creation To configure how to handle the classified packets according to the policer settings, you need to create a policer and open Policer Configuration mode. To open Policer Configuration mode, use the following command.
  • Page 183: Rule Action

    UMN:CLI User Manual V5808 Global Bridge To display the number of packets on each rule, use the following command. Command Mode Description show flow statistics Shows a collected flow counter. show class statistics Shows a collected class counter. Enable Global show policer statistics Shows a collected policer counter.
  • Page 184 UMN:CLI User Manual V5808 Command Mode Description Creates a policy and opens Policy Configuration mode. policy NAME create Global NAME: policy name. After opening Policy Configuration mode, the prompt changes from SWITCH(config)# to SWITCH(config-policy[NAME])#. To delete configured policy or all policies, use the following command.
  • Page 185 The V5808 provides Token Bucket (srTCM and trTCM) meters. Token Bucket The token bucket is a control mechanism that transmits traffic by tokens in the bucket.
  • Page 186 UMN:CLI User Manual V5808 Single Rate Three Color Marker (srTCM) The srTCM meters an IP packet stream and marks its packet the one among green, yellow, and red using Committed Information Rate (CIR) and two associated burst sizes, Committed Burst Size (CBS) and Excess Burst Size (EBS). A packet is marked green if it does not exceed the CBS, yellow if it exceeds the CBS, but not the EBS, and red otherwise.
  • Page 187 UMN:CLI User Manual V5808 Tokens are regenerated Tokens are regenerated based on CIR based on CIR Bucket C Bucket E Token Empty If the bucket C is empty, the tokens in the bucket E are decremented by the size of the packet...
  • Page 188 UMN:CLI User Manual V5808 PIR and CIR are the regenerating rate of tokens for PBS and CBS respectively, which is measured in bytes of IP packets per second. PIR must be equal to or greater than CIR. PBS and CBS are the maximum size for each token bucket, P and C, measured in bytes.
  • Page 189 UMN:CLI User Manual V5808 Tokens are regenerated Tokens are regenerated based on PIR faster than CIR based on CIR Bucket P Bucket C Empty Token If the bucket C is empty, the tokens in the bucket P are decremented by the...
  • Page 190 UMN:CLI User Manual V5808 color-aware mode the meter assumes that some preceding entity has pre-colored the incoming packet stream so that each packet is the one among green, yellow, and red. To specify the value for metering parameters, use the following command.
  • Page 191 UMN:CLI User Manual V5808 Command Mode Description priority {low | medium | high | Policy Sets a priority for a policy. (default: low) highest} 7.5.4.4 Policy Action To specify the rule action for the packets matching configured classifying patterns, use the following command.
  • Page 192 UMN:CLI User Manual V5808 overwrite overwrite: changes 802.1p class of service value with the one you set action match cos same-as-tos Changes the 802.1p CoS field in the packet with an IP overwrite ToS precedence value Configures the CPU rx class of service value.
  • Page 193: Displaying Rule

    Shows all configurations of each rule policer | policy } 7.5.6 Admin Rule For the V5808, it is possible to block a specific service connection like telnet, FTP, ICMP, etc with an admin rule function. 7.5.6.1 Creating Admin Flow for packet classification To classify packets by a specific admin flow for the V5808, you need to open Admin-Flow Configuration mode first.
  • Page 194 UMN:CLI User Manual V5808 Command Mode Description Creates an admin flow and opens Admin-Flow flow admin NAME create Global Configuration mode. NAME: admin-flow name. After opening Admin-Flow Configuration mode, prompt changes from SWITCH(config)# to SWITCH(config-admin-flow[NAME])#. To delete configured admin flow or all admin flows, use the following command.
  • Page 195 UMN:CLI User Manual V5808 Command Mode Description udp} A.B.C.D/M: source/destination IP address with mask any: any source/destination IP address Classifies an IP protocol (TCP/UDP): ip {A.B.C.D | A.B.C.D/M | any} A.B.C.D: source/destination IP address {A.B.C.D | A.B.C.D/M | any} {tcp | A.B.C.D/M: source/destination IP address with mask...
  • Page 196 UMN:CLI User Manual V5808 Command Mode Description any: any source/destination IPv6 address ipv6 { X:X::X:X | X:X::X:X/M | any} 0-65535: TCP/UDP port range {X:X::X:X |X:X::X:X/M | any} udp {<1- any: any TCP/UDP port 65535> | any} {<1-65535> | any} TCP_FLAG: TCP flag vlaue To delete a specified packet-classifying pattern, use the following command.
  • Page 197 FLOW: admin flow name 7.5.7 Admin Rule Action 7.5.7.1 Admin Policy Creation For the V5808, you need to open Admin-Policy Configuration mode first. To open Policy Configuration mode, use the following command. Command Mode Description Creates an admin policy and opens Admin-Policy...
  • Page 198 UMN:CLI User Manual V5808 Policy NAME:admin-flow name Includes an admin class in a specified policy. include-class NAME NAME:admin-class name One admin policy cannot include both flow and class at the same time. Either admin flow or admin class can belong to one policy.
  • Page 199 UMN:CLI User Manual V5808 To delete a specified rule action(no-action match), use the following command. Command Mode Description no no-action match deny Admin- Deletes a specified rule action. Policy no no-action match permit 7.5.7.4 Applying and Modifying Admin Policy After configuring an admin policy using the above commands, apply it to the system with the following command.
  • Page 200 User Manual V5808 7.5.9 Scheduling To process incoming packets by the queue scheduler, the V5808 provides the scheduling algorithm as Strict Priority Queuing (SP), Weighted Round Robin (WRR) and Deficit Round Robin (DRR). Strict Priority Queuing (SP) SPQ processes first more important data than the others. Since all data are processed by their priority, data with high priority can be processed fast but data without low priority might be delayed and piled up.
  • Page 201 UMN:CLI User Manual V5808 Deficit Round Robin Queing Queue1 (50% b/w, Quantum [1] = 1000 Scheduler Queue2 (25% b/w, Quantum [2] = 500 Queue3 (25% b/w, Quantum [3] = 500 Fig. 7.11 Deficit Round Robin Weighted Round Robin (WRR) WRR processes packets as much as weight. Processing the packets that have higher priority is the same way as strict priority queuing.
  • Page 202 UMN:CLI User Manual V5808 7.5.9.1 Scheduling mode To select a packet scheduling mode, use the following command. Command Mode Description Selects a packet scheduling mode for a ports: sp: strict priority queuing qos scheduling-mode {sp | wrr | wrr: weighted round robin...
  • Page 203 UMN:CLI User Manual V5808 7.5.9.3 Maximum and Minimum Bandwidth To set a maximum bandwidth, use the following command. Command Mode Description Sets a maximum bandwidth for each port and queue: PORTS: port numbers qos max-bandwidth PORTS <0- Global 0-7: queue number 7>...
  • Page 204 Shows the configuration of QoS for CPU packets. 7.5.9.7 Random Early Detection (WRED) The V5808 supports Weighted Random Early Detection (WRED) which can selectively discard lower priority traffic when an interface gets congested. WRED provides differentiated performance characteristics for different classes of service. It minimizes the impact of dropping high priority traffic.
  • Page 205 UMN:CLI User Manual V5808 number of packets, and is easy to drop high priority of packets. Unlike RED, WRED is not as random when dropping packets. WRED combines the capabilities of the RED algorithm with the IP precedence feature to provide for preferential traffic handling of high-priority packets.
  • Page 206 UMN:CLI User Manual V5808 1-15: queue weight (default:1) no qos random-detect <0-7> Deletes the configured WRED parameter value. To enable/disable WRED function, use the following command. Command Mode Description qos random-detect enable Enables WRED function. Global qos random-detect disable Disables WRED function.
  • Page 207 UMN:CLI User Manual V5808 EFM OAM EFM OAM capabilities are a need for Ethernet subscriber access link monitoring in L2, remote loopback and remote failure indication. EFM OAM uses a slow protocol frame which is called OAM Protocol Data Units (OAMPDUs). Using OAMPDUs, local DTE manages the remote DTE.
  • Page 208: Efm Oam Mode

    UMN:CLI User Manual V5808 To specify an errored window size and threshold according to the event type, use the following command. Command Mode Description Specifies the window size and threshold in case of link-monitor frame frame event. window <10-600> threshold <0- 10-600: window size (unit: 100msec, default:1 second) 65535>...
  • Page 209: Oam Loopback

    UMN:CLI User Manual V5808 PORTS PORTS: port number Both request and loopback can be available in the EFM OAM active mode. However, request or loopback is not available in the OAM passive mode. 7.6.4 OAM Loopback For OAM loopback function, both the switch and the host should support OAM function.
  • Page 210 UMN:CLI User Manual V5808 7.6.6 Displaying EFM OAM Configuration To display OAM configuration, use the following command. Command Mode Description show oam efm Shows EFM OAM configuration. Shows the link monitoring status and remote statistics show link-monitor on the port.
  • Page 211: Netbios Filtering

    However, the more computers are used recently, the more strong security is required. To secure individual customer’s information and prevent information leakages in the LAN environ-men, the V5808 provides NetBIOS filtering function. Without NetBIOS filtering, customer’s data may be opened to each other even though the data should be kept.
  • Page 212: Martian Filtering

    UMN:CLI User Manual V5808 Martian Filtering It is possible to block packets, which trying to bring different source IP out from same network. If packet brings different IP address, not its source IP address, then it is impossible to know it makes a trouble. Therefore, you would better prevent this kind of packet outgoing from your network.
  • Page 213 UMN:CLI User Manual V5808 Max Host You can limit the number of users by configuring the maximum number of users also named as max hosts for each port. In this case, you need to consider not only the number of PCs in network but also devices such as switches in network.
  • Page 214: Port Security

    UMN:CLI User Manual V5808 7.10 Port Security You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the PCs that are allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses.
  • Page 215: Port Security Aging

    UMN:CLI User Manual V5808 To disable the configuration of port secure, use the following command. Command Mode Description no port security PORTS Disables port security on the port. no port security PORTS mac- Deletes a secure MAC address for the port.
  • Page 216: Displaying Port Security

    PCs in the network but also devices such as switches in the network. For the V5808, you have to block the port like MAC filtering before configuring max hosts. In case of ISPs, it is possible to arrange a billing plan for each user by using this configuration.
  • Page 217 UMN:CLI User Manual V5808 particular interface to the default value of unlimited hosts. To display the configured maximum number of hosts for interfaces, use the following command. Command Mode Description Bridge/ Shows the configured maximum number of hosts for show max-hosts the interfaces.
  • Page 218 UMN:CLI User Manual V5808 To remove the static MAC addresses manually registered by user from the MAC table, use the following command. Command Mode Description no mac Deletes static MAC addresses. no mac NAME Deletes static MAC addresses, enter the bridge name.
  • Page 219: Mac Filtering

    UMN:CLI User Manual V5808 7.14 MAC Filtering It is possible to forward frame to MAC address of destination. Without specific performance degradation, maximum 4096 MAC addresses can be registered. 7.14.1 Default MAC Filter Policy The basic policy of filtering based on system is set to allow all packets for each port.
  • Page 220: Displaying Mac Filter Policy

    UMN:CLI User Manual V5808 To delete MAC filtering policy, use the following command. Command Mode Description mac-filter del SRC-MAC-ADDR Bridge Deletes filtering policy for specified MAC address. [<1-4094>] To delete MAC filtering function, use the following command. Command Mode Description...
  • Page 221: Arp Table

    (VLAN ID) where packets are forwarded. The V5808 ARP saves IP/MAC addresses mappings in ARP table for quick search. Referring to the information in ARP table, packets attached IP address is transmitted to network.
  • Page 222: Arp Alias

    ARP Alias Although clients are joined in the same client switch, it may be impossible to communicate between them for security reasons. When you need to make them communicate each other, the V5808 supports ARP alias, which responses the ARP...
  • Page 223: Arp Inspection

    UMN:CLI User Manual V5808 request from client net through the concentrating switch. To register the address of client net range in ARP alias, use the following command. Command Mode Description Registers the IP address range and MAC address in arp alias A.B.C.D A.B.C.D...
  • Page 224 UMN:CLI User Manual V5808 To activate/deactivate the ARP inspection function in the system, use the following command. Command Mode Description Activates ARP inspection on a specified VLAN. ip arp inspection vlan VLANS VLANS: VLAN ID (1-4094) Global no ip arp inspection vlan VLANS Deactivates ARP inspection on a specified VLAN.
  • Page 225 UMN:CLI User Manual V5808 To delete the configured range of IP address for discarding ARP packets, use the following command. Command Mode Description no deny ip any mac {any | host Deletes a configured range of IP address to discard MACADDR} ARP packets.
  • Page 226 VLAN using the ip arp inspection filter command. 7.15.4.3 ARP Address Validation The V5808 also provides the ARP validation feature. Regardless of a static ARP table, the ARP validation will discard ARP packets in the following cases: • In case a sender MAC address of ARP packet does not match a source MAC address of Ethernet header.
  • Page 227 This function saves the information of users who are discarded by ARP inspection and generates periodic syslog messages. Log-buffer function is automatically enabled with ARP inspection. If V5808 receives invalid or denied ARP packets by ARP inspection, it creates the table of entries that include the information of port number, VLAN ID, source IP address, source MAC address and time.
  • Page 228 UMN:CLI User Manual V5808 After one of entries is displayed as a syslog message, it is removed in the order in which the entries appear in the list. To configure the options of log-buffer function, use the following command. Command...
  • Page 229: Gratuitous Arp

    7.15.6 Proxy ARP The V5808 supports the proxy ARP. Proxy ARP is the technique in which one host, usually a router, answers ARP requests intended for another machine. By “faking” its identity, the router accepts responsibility for routing packets to the “real” destination.
  • Page 230 D, it will reply with its own MAC address to the host A. The proxy ARP replies that the V5808 sends to the host A. The proxy ARP reply packet is encapsulated in an Ethernet frame with its MAC address as the source address and the host A’s MAC address as the destination address.
  • Page 231 UMN:CLI User Manual V5808 7.16 IPv6 Neighbor Discovery(ND) Neighbor discovery (ND) is specified in RFC 2464. ND combines Address Resolution Protocol (ARP) and ICMP router discovery and Redirect. With IPv4, we have no means to detect whether or not a neighbor is reachable. With ND protocol, a neighbor unreachability detection mechanism has been defined.
  • Page 232 UMN:CLI User Manual V5808 To set the other stateful configuration flag in RA message, use the following command. Command Mode Description ipv6 nd other-config-flag Sets the other stateful configuration flag in RA. Interface Clears the other stateful configuration flag from RA.
  • Page 233 UMN:CLI User Manual V5808 no ipv6 nd ra-interval Deletes a configured interval between IPv6 RA messages The interval value should be less than or equal to the IPv6 Router Lifetime if this is a default router. 7.16.4 RA Destination Configuration...
  • Page 234 UMN:CLI User Manual V5808 3600000> value of 0 indicates that the configured time is unspecified by this switch.) Deletes a configured reachable time and restores the no ipv6 nd reachable-time default time. If the switch is configured with shorter reachable times, it enables detecting unavailable neighbors more quickly, however, shorter times consume more IPv6 network bandwidth and processing resources in all IPv6 network devices.
  • Page 235 UMN:CLI User Manual V5808 0-4294967295: IPv6 NS retransmission time in milliseconds Deletes a configured interval between IPv6 neighbor no ipv6 nd retrans-time solicitation retransmissions. 7.16.10 ND Duplicate Address Detection (DAD) To set the number of consecutive neighbor solicitation messages that are sent on an interface while duplicate address detection (DAD) is performed on the unicast IPv6 addresses of the interface, use the following command.
  • Page 236 UMN:CLI User Manual V5808 ipv6 neighbor X:X::X:X table INTERFACE 7.16.12 Setting the Stale Timer Reachability of the IPv6 neighbors is confirmed only after the stale timer has expired. For example, by setting the stale timer to 80000 seconds, users can specify that IPv6 neighbor reachability be confirmed every 80000 seconds.
  • Page 237 UMN:CLI User Manual V5808 After opening ND Access List Configuration mode, the prompt changes from SWITCH(config)# SWITCH(config-nd-acl[NAME])#. After opening Configuration mode, a range of IPv6 addresses can be configured to apply ND inspection. By default, ND Access List discards the Neighbor Discovery protocol packets, of all IPv6 addresses and MAC addresses.
  • Page 238 UMN:CLI User Manual V5808 X:X::X:X: sender IPv6 address X:X::X:X/M: sender IPv6 network address MACADDR: sender MAC address Discards ND packets based on their IPv6 address and MAC pattern, which have not learned before on ND inspection table. deny ipv6 {host...
  • Page 239 UMN:CLI User Manual V5808 Command Mode Description show ipv6 access-list Global Displays the existing ND access lists. [NAME] 7.16.13.2 Enabling ND Inspection Filtering To enable/disable the ND inspection filtering of a certain range of IPv6 addresses from the ND access list, use the following command.
  • Page 240 User Manual V5808 Log-buffer function is automatically enabled with ND inspection. If V5808 receives invalid or denied ND packets by ND inspection, it creates the table of entries that include the information of port number, VLAN ID, source IP address, source MAC address and time.
  • Page 241 DHCP packets back and forth the V5808, would be lost. Thus, ND inspection should be delayed to start during some time so that DHCP snooping table can build entries. If no time is given, ND inspection sees empty snooping table and drop every ND packet.
  • Page 242 Although clients are joined in the same client switch, it may be impossible to communicate between them for security reasons. When you need to make them communicate each other, the V5808 supports ND alias, which responses the ARP request from client net through the concentrating switch.
  • Page 243 UMN:CLI User Manual V5808 show ipv6 neighbors [{X:X::X:X | Enable Shows IPv6 neighbors discovery cache X:X::X:X/M}] Global information. Bridge show ipv6 neighbors INTERFACE To clear IPv6 neighbor discovery cache information table, use the following command. Command Mode Description clear ipv6 neighbors [{X:X::X:X |...
  • Page 244: Icmp Message Control

    UMN:CLI User Manual V5808 7.17 ICMP Message Control ICMP stands for Internet Control Message Protocol. When it is impossible to transmit data or configure route for data, ICMP sends error message about it to host. The first 4 bytes of all ICMP messages are same, but the other parts are different according to type field value and code field value.
  • Page 245: Interval For Transmit Icmp Message

    UMN:CLI User Manual V5808 To release the blocked echo reply message, use the following command. Command Mode Description Releases blocked echo reply message to all partners no ip icmp ignore echo all who are taking ping test to device. Global...
  • Page 246 UMN:CLI User Manual V5808 RPROB (12) ICMP_TIMESTAMP (13) ICMP_TIMESTAMPREPLY (14) ICMP_INFO_REQUEST (15) ICMP_INFO_REPLY (16) ICMP_ADDRESS (17) ICMP_ADDRESSREPLY (18) Tab. 7.2 Mask Calculation of Default Value To configure the limited ICMP transmission time, use the following command. Command Mode Description icmp...
  • Page 247 UMN:CLI User Manual V5808 7.17.3 ICMP Destination Unreachable Message If the switch receives a packet that has an unknown protocol or no route to the destination address, the switch sends an ICMP unreachable message to its source address. What if too many ICMP unreachable messages should be sent from the switch, it might cause slow down the system operation.
  • Page 248: Rst Configuration

    V5808 7.18 TCP Flag Control Transmission Control Protocol (TCP) header includes six kinds of flags that are URG, ACK, PSH, RST, SYN, and FIN. For the V5808, you can configure RST and SYN as the below. 7.18.1 RST Configuration RST sends a message when TCP connection cannot be done to a person who tries to make it.
  • Page 249: Packet Dump

    The debug commands produce a large amount of processor overhead. The V5808 also provides debug command for Layer 3 routing protocols (BGP, OSPF, RIP and PIM). If you want to debug about them, refer to the each configuration chapter.
  • Page 250: Debug Packet Dump

    (Real-time Transport Protocol) -T TYPE rtcp (Real-time Transport Control Protocol) vat (Visual Audio Tool) wb (distributed White Board) EXPRESSION Conditional expression Tab. 7.5 Options for Packet Dump 7.20.3 Debug Packet Dump The V5808 provides network debugging function to prevent system overhead for...
  • Page 251: Dump File

    UMN:CLI User Manual V5808 unknown packet inflow. Monitoring process checks CPU load per 5 seconds. If there is more traffic than threshold, user can capture packets using tcpdump and save it to file. You can download the dump file with the name of file-number.dump after FP connection to the system.
  • Page 252: Access List

    An IP access list (ACL) is a filter that enables you to restrict specific IP traffic. If you create an ACL entry to filter multicast packets based on their destination IP address, the V5808 can deny the packets matching to the destination IP address, a multicast address. There are three types of IP ACLs you can configure: •...
  • Page 253 UMN:CLI User Manual V5808 IP Address Wildcard Bits Addresses that ACL controls 10.55.10.1 – 10.55.10.255 10.55.10.2 0.0.0.255 10.55.10.2 0.0.0.0 10.55.10.2 Tab. 7.3 Examples of Wildcard Masking If you put 10.55.10.2 and 0.0.0.255 for an IP address and wildcard mask to permit, all traffic that begins with 10.55.10.1 to 10.55.10.255 (10.55.10.0/24) are accepted.
  • Page 254 UMN:CLI User Manual V5808 [WILDCARD-BITS] no access-list {<1-99> | <1300- 1999>} {deny | permit} any no access-list {<1-99> | <1300- 1999>} {deny | permit} host A.B.C.D no access-list {<1-99> | <1300- 1999>} remark LINE Sample Configuration This is an example of creating the standard ACL entries.
  • Page 255 UMN:CLI User Manual V5808 Command Mode Description any: destination host Specifies a deny or permit statement of the extended access-list {<100-199> | <2000- ACL with a single source host and other variables. 2699>} {deny | permit} ip host host: single source/destination host A.B.C.D host A.B.C.D...
  • Page 256 UMN:CLI User Manual V5808 Command Mode Description host A.B.C.D host A.B.C.D access-list {<100-199> <2000-2699>} {deny | permit} ip any A.B.C.D A.B.C.D WILDCARD- BITS access-list {<100-199> <2000-2699>} {deny | permit} ip any any access-list {<100-199> <2000-2699>} {deny | permit} ip any host A.B.C.D access-list {<100-199>...
  • Page 257 UMN:CLI User Manual V5808 To delete an entry of the named ACL, use the following command. Command Mode Description no access-list WORD {deny | permit} A.B.C.D/M [exact-match] no access-list WORD {deny | Global Deletes an entry of the named ACL.
  • Page 258 UMN:CLI User Manual V5808 Command Mode Description Writes comments for the specified ACL range. access-list-range {<1-1024> 1-1024: IP standard access list range WORD} remark LINE WORD: IP access-list-range name Global LINE: access list entry comments up to 100 characters no access-list-range {<1-1024> | Deletes the comments for the specific ACL range.
  • Page 259 UMN:CLI User Manual V5808 7.21.6 Displaying Access List Entries To display the existing ACL entries, use the following command. Command Mode Description show access-list Shows the existing ACL entries. show ip access-list show access-list-range Shows the existing IP access range lists.
  • Page 260: System Main Functions

    UMN:CLI User Manual V5808 8 System Main Functions Virtual Local Area Network (VLAN) The first step in setting up your bridging network is to define VLAN on your switch. VLAN is a bridged network that is logically segmented by customer or function. Each VLAN contains a group of ports called VLAN members.
  • Page 261 UMN:CLI User Manual V5808 8.1.1 Port-based VLAN The simplest implicit mapping rule is known as port-based VLAN. A frame is assigned to a VLAN based solely on the switch port on which the frame arrives. In the example depicted in Fig.
  • Page 262 UMN:CLI User Manual V5808 8.1.1.1 Creating VLAN To configure VLAN on user’s network, use the following command. Command Mode Description Creates new VLAN by assigning VLAN ID: vlan create VLANS Bridge VLANS: VLAN ID (1-4094, multiple entries possible) The variable VLANS is a particular set of bridged interfaces. Frames are bridged only among interfaces in the same VLAN.
  • Page 263 UMN:CLI User Manual V5808 SWITCH(bridge)# 8.1.1.4 Deleting VLAN To delete VLAN, use the following command. Command Mode Description no vlan VLANS Bridge Deletes VLAN, enter the VLAN ID to be deleted. When you delete a VLAN, all ports must be removed from the VLAN; the VLAN must be empty.
  • Page 264 8.1.3 MAC-based VLAN The V5808 can assign a frame to a VLAN based on the source MAC address in the received frames. Using this, all frames emitted by a given end station will be assigned to the same VLAN, regardless of the port on which the frame arrives. This is useful for mobility application.
  • Page 265: Tagged Vlan

    UMN:CLI User Manual V5808 To configure subnet-based VLAN, use the following command. Command Mode Description vlan subnet A.B.C.D/M VLANS Configures subnet based VLAN. Bridge ipv6 vlan subnet X:X::X:X/M VLANS: VLAN ID (1-4094) VLANS To clear subnet-based VLAN configuration, use the following command.
  • Page 266: Vlan Description

    UMN:CLI User Manual V5808 VLAN-aware end stations can further reduce the Tag insertion may increase the length of a frame performance load of edge switches. beyond the maximum allowed by legacy equipment. Tab. 8.1 Advantages and Disadvantages of Tagged VLAN...
  • Page 267: Displaying Vlan Information

    Fig. 8.3 Example of QinQ Configuration If QinQ is configured on the V5808, it transmits packets adding another Tag to original Tag. Customer A group and customer B group can guarantee security because telecommunication is done between each VLANs at Double Tagging part.
  • Page 268 UMN:CLI User Manual V5808 Preamble Destination Source 802.1Q VLAN Tag Type/Length Data TPID 8100 Priority Canonical 12-bit identifier VLAN Ethernet Frame Preamble Destination Source VLAN Tag 802.1Q VLAN Tag Type/Length Data TPID 8100/9100 Priority Canonical 12-bit identifier TPID 8100 Priority...
  • Page 269 UMN:CLI User Manual V5808 8.1.9.1 TPID Configuration TPID (Tag Protocol Identifier) is a kind of Tag protocol, and it indicates the currently used tag information. User can change the TPID. By default the port which is configured as 802.1q (0x8100) cannot work as VLAN member.
  • Page 270 UMN:CLI User Manual V5808 To delete the configured one-to-one VLAN mapping and translation, use the following command. Command Mode Description no vlan dot1q-tunnel ingress mapping PORTS c-vid <1-4094> trans-s-vid no vlan dot1q-tunnel egress mapping PORTS s-vid <1-4094> trans-c-vid no vlan dot1q-tunnel ingress range-mapping...
  • Page 271 UMN:CLI User Manual V5808 trans-s-vid trans-c-vid no vlan dot1q-tunnel ingress range-mapping PORTS s-vid <1- 4094> trans-s-vid trans-c-vid 8.1.9.4 Two-to-One VLAN Mapping between S-VID and C-VID To configure two-to-one VLAN mapping and translation, use the following command. Command Mode Description vlan...
  • Page 272 If Egress port is Access port (Access port is configured as Untagged), remove SPVLAN. If egress port is uplink port, transmit as it is. Step 4 The V5808 switch has 0x8100 TPID value as default and other values are used as hexadecimal number. 8.1.9.7...
  • Page 273 Bridge PORTS PORTS: qinq port to be disabled When you configure Double tagging on the V5808, consider the below attention list. • DT and HTLS cannot be configured at the same time. (If switch should operate as DT, HTSL has to be disabled.) •...
  • Page 274 The V5808 provides Private VLAN function like Private VLAN edge of Cisco product. Because it does not create any sub-VLAN, port security is provided by port isolation. If you want to configure Private VLAN on the V5808 switch, refer to Port Isolation configuration.
  • Page 275 8.1.10.2 Shared VLAN This chapter is only for Layer 2 switch operation. The V5808 is Layer 3 switch, but it can be used for Layer 2 also. Because there is no routing information in Layer 2 switch, each VLAN cannot communicate. Especially, the uplink port should receive packets from all VLANs.
  • Page 276 Incoming Packets under Layer 2 Shared VLAN Environment (2) In conclusion, to use the V5808 as Layer 2 switch, user should add the uplink port to all VLANs and create new VLAN including all ports. If the communication between each VLAN is needed, FID should be same.
  • Page 277 UMN:CLI User Manual V5808 SWITCH(bridge)# vlan pvid 5/2,6/2 51 SWITCH(bridge)# vlan pvid t/1-t/16 1 SWITCH(bridge)# show vlan Sample Configuration 2: Deleting Port-based VLAN The following is deleting br3 among configured VLAN. SWITCH(bridge)# vlan del br3 3 SWITCH(bridge)# exit SWITCH(config)# interface br3...
  • Page 278 ..d....... SWITCH(bridge)# Sample Configuration 5: Configuring Shared VLAN with FID Configure br2, br3, br4 in the V5808 configured Layer 2 environment and port 24 as Uplink port is configured. To transmit untagged packet through Uplink port rightly, follow below configuration.
  • Page 279 UMN:CLI User Manual V5808 default( 5) |uu..uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu br2( 5) |..uu....u....br3( 5) |..uu....u....br4( 5) |..uu....u....br5( 5) |uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu SWITCH(bridge)#...
  • Page 280: Port Trunk

    Fig. 8.8 Link Aggregation The V5808 supports two kinds of link aggregation as port trunk and LACP. There is a little difference in these two ways. In case of port trunking, it is quite troublesome to set the configuration manually and the rate to adjust to the network environment changes when connecting to the switch using logical port.
  • Page 281 | srcmac} aggregation group. (default: srcdstmac) It is possible to input 0 to 7 to the trunk group ID because the V5808 supports 8 logical aggregated ports, and the group ID of port trunk and the aggregator number of LACP cannot coexist.
  • Page 282 UMN:CLI User Manual V5808 8.2.2 Link Aggregation Control Protocol (LACP) Link aggregation control protocol (LACP) is the function of using wider bandwidth by aggregating more than two ports as a logical port as previously stated port trunk function. If the aggregated port by port trunk is in different VLAN from the VLAN where the existing member port originally belongs to, it should be moved to VLAN where the existing member port belongs to.
  • Page 283 Therefore, the V5808 is configured to decide the way of packet route in order to distribute (or forward) packets to the member port effectively when packets enter. It is decided with Source IP address, destination IP address, source MAC address, destination MAC address and the user could get information of packets to decided packet route.
  • Page 284 UMN:CLI User Manual V5808 To configure the operation mode of the member port, use the following command. Command Mode Description lacp port activity PORTS {active Configures the operation mode of the member port. Bridge | passive} (default: active) To delete the configured operation mode of the member port, use the following command.
  • Page 285: Bpdu Transmission Rate

    UMN:CLI User Manual V5808 8.2.2.6 BPDU Transmission Rate Member port transmits BPDU with its information. For the V5808, it is possible to configure the BPDU transmission rate, use the following command. Command Mode Description Configures BPDU transmission rate: lacp port timeout PORTS {short | PORTS: select the port number.
  • Page 286: Displaying Lacp Configuration

    UMN:CLI User Manual V5808 member port, select the member port number. 8.2.2.9 Displaying LACP Configuration To display a configured LACP, use the following command. Command Mode Description show lacp Shows the information of lacp configuration. show lacp aggregator Shows the information of aggregated port.
  • Page 287 UMN:CLI User Manual V5808 Spanning Tree Protocol (STP) The local area network (LAN), which is composed of double paths like token ring, has the advantage that it is possible to access in case of disconnection with one path. However there is another problem called a loop when you always use the double paths.
  • Page 288: Stp Operation

    UMN:CLI User Manual V5808 Meanwhile, the rapid spanning tree protocol (RSTP) defined in IEEE 802.1w dramatically reduces the time of network convergence on the spanning tree protocol (STP). It is easy and fast to configure new protocol. The IEEE 802.1w also supports backward compatibility with IEEE 802.1d.
  • Page 289 UMN:CLI User Manual V5808 A compares the exchanged BPDU to decide the path to link. The critical information to decide path is the path-cost. The path-cost depends on the transmit rate of the LAN interface, and the path with the lower path-cost is selected.
  • Page 290 UMN:CLI User Manual V5808 8.3.1.4 Port Priority If the path-costs of two paths are same, decisions are based on port-priorities. In the figure below, suppose that two switches are connected. Since the path-costs of two paths are both 100, their port priorities are compared and the port with smaller port priority is selected to transmit the packet.
  • Page 291 UMN:CLI User Manual V5808 • Blocking A port that is enabled, however neither a Designated port nor a Root port, will be in the blocking state. A blocking port will not receive or forward data frames, nor will it transmit BPDUs, but instead it will listen to other’s BPDUs to determine if and when the port should consider becoming active in the spanning tree.
  • Page 292: Rstp Operation

    UMN:CLI User Manual V5808 8.3.2 RSTP Operation STP or RSTP is configured on network where Loop can be created. However, RSTP is more rapidly progressed than STP at the stage of reaching to the last topology. This section describes how the RSTP more improved than STP works. It contains the below sections.
  • Page 293 UMN:CLI User Manual V5808 If low BPDU is received from the root switch or the designated switch, it is immediately accepted. For example, suppose that the root switch is disconnected from the switch B in the figure below. Then, the switch B is considered to be the root due to the disconnection, and it forwards BPDU.
  • Page 294 UMN:CLI User Manual V5808 Fig. 8.17 Convergence of 802.1d Network This is a very epochal way of preventing a loop. The matter is that communication is SWITCH D and SWITCH C is blocked. Then, right after the connection, it is possible to transmit BPDU although packets can not be transmitted and received between SWITCH A and the root.
  • Page 295 UMN:CLI User Manual V5808 Fig. 8.19 Network Convergence of 802.1w (2) SWITCH B has only edge-designated port. Edge-designated does not cause loop, so it is defined in 802.1w to be changed to forwarding state. Therefore, SWITCH B does not need to block specific port to the forwarding state of SWITCH A. However since SWITCH C has a port connected to SWITCH D, the port should be in the blocking state.
  • Page 296: Mstp Operation

    8.3.3 MSTP Operation To operate the network more effectively, the V5808 uses MSTP (Multiple Spanning-Tree Protocol). It constitutes the network with VLAN subdividing logically the existing LAN domain and configures the route by VLAN or VLAN group instead of existing routing protocol.
  • Page 297 UMN:CLI User Manual V5808 While existing STP is a protocol to prevent Loop in a LAN, domain establishes STP per VLAN in order to realize the routing suitable to the VLAN environment. It does not need to calculate all STPs for several VLANs so that traffic overload could be reduced.
  • Page 298 UMN:CLI User Manual V5808 CST root in IST is IST root. Fig. 8.24 CST and IST of MSTP (2) In the above situation, if B operates with MSTP, B will send its BPDU to CST root and IST root in order to request itself to be CST root. However, if any BPDU with higher priority...
  • Page 299: Stp Mode

    8.3.4 STP Mode First of all, you need to enable STP function. You cannot configure any parameters related to Spanning Tree Protocol without this command. To enable STP function on the V5808, use the following command. Command Mode Description spanning-tree Bridge Enables STP function.
  • Page 300 UMN:CLI User Manual V5808 Transmit Rate (bps) Path-cost 100M Tab. 8.2 STP Path-cost (short) Transmit Rate (bps) Path-cost 20000000 2000000 100M 200000 20000 2000 Tab. 8.3 RSTP Path-cost (long) To decide the path-cost calculation method, use the following command. Command...
  • Page 301: Edge Ports

    UMN:CLI User Manual V5808 Command Mode Description Configures path-cost to configure route: spanning-tree port PORTS cost PORTS: port number. <1-200000000> 1-200000000: the path cost value. Bridge no spanning-tree port PORTS Deletes the configured path-cost, enter the port cost number. 8.3.5.2 Edge Ports Edge ports are defined that the ports are connected to a nonbridging device.
  • Page 302 UMN:CLI User Manual V5808 priority. It is also possible to configure port priority so that user can configure route manually. To configure the port-priority, use the following command. Command Mode Description Configures port priority. spanning-tree port PORTS port- PORTS: port number priority <0-240>...
  • Page 303 UMN:CLI User Manual V5808 8.3.5.7 Displaying Configuration To display the configurations of STP, use the following command. Command Mode Description Enable show spanning-tree Global Shows all configurations of STP Bridge Shows STP information on active interface: show spanning-tree active [detail] detail: detailed STP information (as option).
  • Page 304 If MSTP is established in the V5808, decide a MSTP region the switch is going to belong to by configuring the MST configuration ID. Configuration ID contains a region name, revision, and a VLAN map.
  • Page 305 Deletes the configured revision number. After configuring the configuration ID in the V5808, you should apply the configuration to the switch. After changing or deleting the configuration, you must apply it to the switch. If not, it does not being reflected into the switch.
  • Page 306 4096 (default: 32768) Clears the Priority of the switch, enter the no spanning-tree mst <0-64> priority instance number. If you configure a priority of STP or RSTP in the V5808, you should configure MSTP instance ID number as 0. 8.3.6.4 Path-cost After deciding a root swich, you need to decide to which route you will forward the packet.
  • Page 307 UMN:CLI User Manual V5808 8.3.6.6 Displaying Configuration To display the configuration of MSTP, use the following command. Command Mode Description Enable Shows all configurations of a specific MSTP instance: show spanning-tree mst <1-64> Global 1-64: MSTP instance ID number Bridge Shows information of a specific MSTP instance on show spanning-tree mst <1-64>...
  • Page 308 UMN:CLI User Manual V5808 8.3.7 Configuring PVSTP STP and RSPT are designed with one VLAN in the network. If a port becomes blocking state, the physical port itself is blocked. But PVSTP (Per VLAN Spanning Tree Protocol) and PVRSTP (Per VLAN Rapid Spanning Tree Protocol) maintains spanning tree instance for each VLAN in the network.
  • Page 309 UMN:CLI User Manual V5808 PVSTP is activated after selecting PVSTP mode using spanning-tree mode rapid-pvst command. In PVSTP, you can configure the current VLAN only. If you input VLAN that does not exist, error message is displayed. For the switches in LAN where dual path does not exist, Loop does not generate even though STP function is not configured.
  • Page 310 UMN:CLI User Manual V5808 8.3.7.4 Port Priority When all conditions of two routes of switch are same, the last standard to decide a route is port-priority. You can configure port priority and select a route manually. To configure a port priority for specified VLAN, use the following command.
  • Page 311: Root Guard

    UMN:CLI User Manual V5808 8.3.8 Root Guard The standard STP does not allow the administrator to enforce the position of the root bridge, as any bridge in the network with lower bridge ID will take the role of the root bridge.
  • Page 312: Loop Guard

    UMN:CLI User Manual V5808 8.3.9 Loop Guard An STP loop is created when an STP blocking port in an redundant topology erroneously transitions to the forwarding state. This usually happens because one of the ports in a physically redundant topology no longer receives BPDUs. In this case, the designated port transmits BPDUs, and the non-designated port receives BPDUs.
  • Page 313: Restarting Protocol Migration

    If administrator wants to change network topology to MSTP mode, administrator has to clear the previously detected detected protocol manually. To prevent this, the V5808 provides the clear spanning-tree detected-protocols command. If you enable this command, the switch checks STP protocol packet once again.
  • Page 314 UMN:CLI User Manual V5808 command. Command Mode Description errdisable recovery interval Sets the interval of error-disable recovery: <30-86400> 30-86400: the recovery interval (default: 300 sec) Bridge errdisable recovery Deleted the con figured time for error-disable recovery interval and returns to the default setting.
  • Page 315: Hello Time

    UMN:CLI User Manual V5808 8.3.13.1 Hello Time Hello time decides an interval time when a switch transmits BPDU. To configure hello time, use the following command. Command Mode Description Configures hello time to transmit the message in spanning-tree mst hello-time <1- MSTP.
  • Page 316: Max Age

    UMN:CLI User Manual V5808 time no spanning-tree vlan VLANS Returns to the default value of PVSTP per VLAN. forward-time 8.3.13.3 Max Age Maximum aging time is the number of seconds a switch waits without receiving spanning- tree configuration messages before attempting a reconfiguration.
  • Page 317 UMN:CLI User Manual V5808 8.3.13.5 BPDU Filtering BPDU filtering allows you to avoid transmitting on the ports that are connected to an end system. If the BPDU Filter feature is enabled on the port, then incoming BPDUs will be filtered and BPDUs will not be sent out of the port.
  • Page 318 To prevent this problem, the V5808 provides error-disable recovery function for BPDU guard cause. When an edge port is down for BPDU packet which came from other switch, the port is recovered automatically after configured time.
  • Page 319 UMN:CLI User Manual V5808 8.3.14 Sample Configuration Backup Route When you design layer 2 network, you must consider backup route for stable STP network. This is to prevent network corruption when just one additional path exits. Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment In ordinary case, data packets go to Root switch A through the blue path.
  • Page 320 UMN:CLI User Manual V5808 MSTP Configuration Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment The following is an example of configuring MSTP in the switch. SWITCH(bridge)# spanning-tree SWITCH(bridge)# spanning-tree mode mst SWITCH(bridge)# spanning-tree mst configuration SWITCH(config-mst)# instance 2 vlan 1-50...
  • Page 321: Loop Detection

    LAN like loop topology. That superfluous traffic eventually can result in network fault. It causes superfluous data transmission and network fault. To prevent this, the V5808 provides the loop detecting function. The loop detecting mechanism is as follows:...
  • Page 322 UMN:CLI User Manual V5808 You can also configure the source MAC address of the loop-detecting packet. Normally the system’s MAC address will be the source MAC address of the loop-detecting packet, but if needed, Locally Administered Address (LAA) can be the address as well.
  • Page 323 UMN:CLI User Manual V5808 Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) is a TCP/IP standard for simplifying the administrative management of IP address configuration by automating address configuration for network clients. The DHCP standard provides for the use of DHCP servers as a way to manage dynamic allocation of IP addresses and other relevant configuration details to DHCP-enabled clients on the network.
  • Page 324: Dhcp Server

    UMN:CLI User Manual V5808 The V5808 flexibly provides the functions as the DHCP server or DHCP relay agent according to your DHCP configuration. This chapter contains the following sections: • DHCP Server • DHCP Address Allocation with Option 82 •...
  • Page 325 UMN:CLI User Manual V5808 8.5.1.1 DHCP Pool Creation The DHCP pool is a group of IP addresses that will be assigned to DHCP clients by DHCP server. You can create various DHCP pools that can be configured with a different network, default gateway and range of IP addresses.
  • Page 326 UMN:CLI User Manual V5808 The following is an example for specifying the range of IP addresses. SWITCH(config)# service dhcp SWITCH(config)# ip dhcp pool sample SWITCH(config-dhcp[sample])# network 100.1.1.0/24 SWITCH(config-dhcp[sample])# default-router 100.1.1.254 SWITCH(config-dhcp[sample])# range 100.1.1.1 100.1.1.100 SWITCH(config-dhcp[sample])# You can also specify several inconsecutive ranges of IP addresses in a single DHCP pool, e.g.
  • Page 327 UMN:CLI User Manual V5808 The following is an example of setting default and maximum IP lease time. SWITCH(config)# service dhcp SWITCH(config)# ip dhcp pool sample SWITCH(config-dhcp[sample])# network 100.1.1.0/24 SWITCH(config-dhcp[sample])# default-router 100.1.1.254 SWITCH(config-dhcp[sample])# range 100.1.1.1 100.1.1.100 SWITCH(config-dhcp[sample])# lease-time default 5000 SWITCH(config-dhcp[sample])# lease-time max 10000 SWITCH(config-dhcp[sample])# 8.5.1.6...
  • Page 328 8.5.1.10 Static Mapping The V5808 provides a static mapping function that enables to assign a static IP address without manually specifying static IP assignment by using a DHCP lease database in the DHCP database agent. To perform a static mapping, use the following command.
  • Page 329 UMN:CLI User Manual V5808 For more information of the file naming of a DHCP lease database, see Section 8.5.3.1. 8.5.1.11 Recognition of DHCP Client Normally, a DHCP server is supposed to prohibit assigning an IP address when DHCP packets have no client ID (CID). However, some Linux clients may send DHCP discover messages without CID.
  • Page 330 Some network devices may need plural IP addresses, but most DHCP clients like personal computers need only a single IP address. In this case, you can configure the V5808 to prohibit assigning plural IP addresses to a single DHCP client.
  • Page 331: Ignoring Bootp Request

    UMN:CLI User Manual V5808 To prohibit assigning plural IP addresses to a DHCP client, use the following command. Command Mode Description ip dhcp check client-hardware- Prohibits assigning plural IP addresses. address Global dhcp check client- Permits assigning plural IP addresses.
  • Page 332 8.5.2 DHCP Address Allocation with Option 82 The DHCP server provided by the V5808 can assign dynamic IP addresses based on DHCP option 82 information sent by the DHCP relay agent. The information sent via DHCP option 82 will be used to identify which port the DHCP_REQUEST came in on.
  • Page 333: Dhcp Class Capability

    UMN:CLI User Manual V5808 8.5.2.1 DHCP Class Capability To enable the DHCP server to use a DHCP class to assign IP addresses, use the following command. Command Mode Description Enables the DHCP server to use a DHCP class to ip dhcp use class assign IP addresses.
  • Page 334: Dhcp Lease Database

    8.5.3.1 DHCP Database Agent The V5808 provides a feature that allows to a DHCP server automatically saves a DHCP lease database on a DHCP database agent. The DHCP database agent should be a TFTP server, which stores a DHCP lease data- base as numerous files in the form of leasedb.MAC-ADDRESS, e.g.
  • Page 335: Displaying Dhcp Lease Status

    UMN:CLI User Manual V5808 To specify a DHCP database agent and enable an automatic DHCP lease database back- up, use the following command. Command Mode Description Specifies a DHCP database agent and back-up dhcp database A.B.C.D interval. INTERVAL A.B.C.D: DHCP database agent address...
  • Page 336 UMN:CLI User Manual V5808 and servers when they are not on the same physical subnet. The DHCP relay agent forwarding is distinct from the normal forwarding of an IP router, where IP datagrams are switched between networks somewhat transparently. By contrast, DHCP relay agents receive DHCP messages and then generate a new DHCP message to send out on another interface.
  • Page 337 Deletes a specified packet forwarding address. {A.B.C.D | all} If a DHCP helper address is specified on an interface, the V5808 will enable a DHCP relay agent. You can also specify an organizationally unique identifier (OUI) when configuring a DHCP helper address.
  • Page 338 UMN:CLI User Manual V5808 message. The relay agent, however, will forward only one DHCP_OFFER message of the responses from the servers to the DHCP client. The DHCP client will try to respond to the server which sent the DHCP_OFFER with DHCP_REQUEST message, but the relay agent broadcasts it to all the DHCP servers again.
  • Page 339 UMN:CLI User Manual V5808 8.5.5 DHCP Option This function enables administrators to define DHCP options that are carried in the DHCP communication between DHCP server and client or relay agent. The following indicates the format of the DHCP options field.
  • Page 340 UMN:CLI User Manual V5808 8.5.5.2 Configuring DHCP Option Format To configure a DHCP option format, use the following command. Command Mode Description attr <1-32> type <0-255> length Sets the type, length, and value of an attribute for a {<1-64> | variable} value {hex | DHCP option.
  • Page 341 UMN:CLI User Manual V5808 - The total length of an option format cannot exceed 254 bytes. 8.5.5.3 Deleting DHCP Option Format To delete a specified DHCP option format, use the following command. Command Mode Description no ip dhcp option format NAME Global Deletes the given DHCP option format.
  • Page 342 UMN:CLI User Manual V5808 The DHCP option 82 field’s circuit-ID/remote-ID can be mapped to the option format defined by variable values with special character (%). The following is an example of configuring the switch running DHCP snooping with option 82.
  • Page 343 UMN:CLI User Manual V5808 SWITCH(config-traffic-pf[TEST]-bridge[2])# uni eth 2 SWITCH(config-traffic-pf[TEST]-bridge[2]-uni[eth:2])# multicast-profile V3510_tag SWITCH(config-traffic-pf[TEST]-bridge[2]-uni[eth:2])# extended-vlan-tagging- operation HSI_1 SWITCH(config-traffic-pf[TEST]-bridge[2]-uni[eth:2])# write memory 8.5.6 DHCP Option 82 In some networks, it is necessary to use additional information to further determine which IP addresses to allocate. By using the DHCP option 82, a DHCP relay agent can include additional information about itself when forwarding client-originated DHCP packets to a DHCP server.
  • Page 344 UMN:CLI User Manual V5808 By using the agent-supplied remote ID option, the untrusted and as-yet unstandardized client identifier field need not be used by the DHCP server. Fig. 8.31 shows how the DHCP relay agent with the DHCP option 82 operates.
  • Page 345: Option 82 Reforwarding Policy

    UMN:CLI User Manual V5808 Command Mode Description system-remote-id hex HEXSTRING system-remote-id ip A.B.C.D Specifies a remote ID. Option 82 (default: system MAC address) system-remote-id text STRING system-remote-id option format NAME Because the remote-id option is applied to the system, the option format of variable values with GPON-related attributes (%ONU_PORT_NUM, %ONU_ID, %ONU_PORT_DESCRIPTION, etc.) SHOULD not be used for the remote-id in DHCP...
  • Page 346: Dhcp Snooping

    {normal | option82 | all} 8.5.7 DHCP Snooping For enhanced security, the V5808 provides the DHCP snooping feature. The DHCP snooping filters untrusted DHCP messages and builds/maintains a DHCP snooping binding table. The untrusted DHCP message is a message received from outside the...
  • Page 347 UMN:CLI User Manual V5808 from outside the network. The DHCP snooping basically permits all the trusted messages received from within the network and filters untrusted messages. In case of untrusted messages, all the binding entries are recorded in a DHCP snooping binding table. This table contains a hardware address, IP address, lease time, VLAN ID, interface, etc.
  • Page 348: Dhcp Rate Limit

    UMN:CLI User Manual V5808 8.5.7.3 DHCP Filter on Trust Port To filter broadcast request packets outgoing from the specified trust port, use the following command. Command Mode Description ip dhcp snooping trust PORTS Filters egress broadcast request packets on the trust filter egress bcast-req port.
  • Page 349 8.5.7.6 Source MAC Address Verification The V5808 can verify that the source MAC address in a DHCP packet that is received on untrusted ports matches the client hardware address in the packet. To enable the source MAC address verification, use the following command.
  • Page 350 UMN:CLI User Manual V5808 8.5.7.7 Static DHCP Snooping Binding The DHCP snooping binding table contains a hardware address, IP address, lease time, VLAN ID, and port information that correspond to the untrusted interfaces of the system. To manually specify a DHCP snooping binding entry, use the following command.
  • Page 351 DHCP packets back and forth the V5808, would be lost. Thus, ARP inspection should be delayed to start during some time so that DHCP snooping table can build entries. If no time given, ARP inspection sees empty snooping table and drop every ARP packet.
  • Page 352 UMN:CLI User Manual V5808 To enable/disable the switch which is enabled by DHCP snooping to insert or remove DHCP option82 field, use the following command. Command Mode Description ip dhcp snooping information Enables the switch to insert DHCP option 82 field in option forwarded DHCP packets to the DHCP server.
  • Page 353: Displaying Dhcp Snooping Configuration

    UMN:CLI User Manual V5808 To specify a DHCP server default option, use the following command. Command Mode Description ip dhcp snooping default-option Specifies a snooping default option format for a switch. code <1-254> format NAME NAME: DHCP option format name...
  • Page 354 UMN:CLI User Manual V5808 the network by claiming a neighbor host's IP address. IP source guard supports the Layer 2 port only, including both access and trunk. For each untrusted Layer 2 port, there are two levels of IP traffic security filtering: •...
  • Page 355: Dhcp Client

    8.5.9 DHCP Client An interface of the V5808 can be configured as a DHCP client, which can obtain an IP address from a DHCP server. The configurable DHCP client functionality allows a DHCP client to use a user-specified client ID, class ID or suggested lease time when requesting an IP address from a DHCP server.
  • Page 356: Dhcp Class Id

    UMN:CLI User Manual V5808 Command Mode Description ip dhcp client client-id hex HEXSTRING Specifies a client ID. ip dhcp client client-id text STRING Interface no ip dhcp client client-id Deletes a specified client ID. 8.5.9.3 DHCP Class ID To specify a class ID, use the following command.
  • Page 357: Dhcp Filtering

    8.5.10.1 DHCP Packet Filtering For the V5808, it is possible to block the specific client with MAC address. If the MAC address blocked by administrator requests an IP address, the server does not assign IP. This function is to strength the security of DHCP server.
  • Page 358 UMN:CLI User Manual V5808 8.5.10.2 DHCP Server Packet Filtering Dynamic Host Configuration Protocol (DHCP) makes DHCP server assign IP address to DHCP clients automatically and manage the IP address. Most ISP operators provide the service as such a way. At this time, if a DHCP client connects with the equipment that can be the other DHCP server such as Internet access gateway router, communication failure might be occurred.
  • Page 359: Debugging Dhcp

    UMN:CLI User Manual V5808 To display a status of the DHCP server packet filtering, use the following command. Command Mode Description Enable show dhcp-server-filter Global Show a status of the DHCP server packet filtering. Bridge 8.5.11 Debugging DHCP To enable/disable a DHCP debugging, use the following command.
  • Page 360 UMN:CLI User Manual V5808 Dynamic Host Configuration Protocol (DHCP) for IPv6 Dynamic Host Configuration Protocol (DHCP) for IPv6 provides a device with addresses assigned by a DHCP server and other configuration information, which are carried in options. DHCPv6 offers the capability of automatic allocation of reusable network addresses.
  • Page 361 UMN:CLI User Manual V5808 DHCPv6 Address Assignment Mechanism DHCP for IPv6 can provide stateful address configuration or stateless configuration settings to IPv6 hosts. IPv6 hosts use several methods to configure addresses: Stateful Mechanism It obtains interface address and configuration information from DHCP server. A site requires tighter control over exact address assignment.
  • Page 362 UMN:CLI User Manual V5808  Message types from client to server - Solicit, Request, Confirm, Renew, Rebind, Release, Decline, Information-request  Message types from server to client - Advertise, Replay, Reconfigure  Message type from relay to relay/server - Relay-forward ...
  • Page 363 UMN:CLI User Manual V5808 The following figure shows the structure of these kinds of messages. Fig. 8.34 General Shared Relay Message Format The Hop Count field (1-byte) indicates the number of relay agents that have received the message. A receiving relay agent can discard the message if it exceeds a configured maximum hop count.
  • Page 364 UMN:CLI User Manual V5808 The delegating router acts as a DHCP server, and is responding to the prefix request. It is configured with a set of prefixes to be used for assignment to customers at the time of each customer's first connection to the ISP service. The prefix delegation process begins when the requesting router requests configuration information through DHCPv6.
  • Page 365 UMN:CLI User Manual V5808 There is the four-message exchange handshake for a single interface with one IA_NA and one address for this IA_NA. To obtain an IP address, the DHCP client daemon (dhcpcd6) sends a Solicit message to the link-scoped address (FF02::1:2), which is received by the server and processed. If a free address is available for that client, an Advertise message is created and sent back to the client.
  • Page 366: Domain Name

    UMN:CLI User Manual V5808 To display a DHCPv6 pool configuration, use the following command. Command Mode Description Enable Shows the DHCPv6 address pool information show ipv6 dhcp pool [POOL] Global POOL: DHCPv6 pool name Bridge 8.6.1.2 Domain Name To set a domain name, use the following command.
  • Page 367 UMN:CLI User Manual V5808 8.6.1.5 DHCPv6 Options DHCPv6 can be used in two ways. The first way of using DHCPv6 is to grant clients addresses from a pool while also using DHCPv6 to push configuration options. This is called stateful configuration. The other option is to use DHCPv6 combined with SLAAC for addressing, while using DHCPv6 for configuration options.
  • Page 368 UMN:CLI User Manual V5808 8.6.1.6 Enabling DHCPv6 Server on Interface After a DHCPv6 address pool is created, you need to apply/enable the specified pool to an interface. To configure DHCPv6 server functionality on an interface, use the following command. Command...
  • Page 369 8.6.2 DHCPv6 Snooping For enhanced security, the V5808 provides the DHCP snooping feature. The DHCP snooping filters untrusted DHCP messages and maintains a DHCP snooping binding table. An untrusted message is a message received from outside the network, and an untrusted interface is an interface configured to receive DHCP messages from outside the network.
  • Page 370 UMN:CLI User Manual V5808 You must enable DHCPv6 snooping on the system before enabling DHCPv6 snooping on a VLAN. 8.6.2.2 DHCPv6 Snooping Port State To define a state of a port as trusted or untrusted, use the following command. Command...
  • Page 371 UMN:CLI User Manual V5808 untrusted interfaces. 8.6.2.5 Specifying DHCPv6 Snooping Binding Entry The DHCPv6 snooping binding table contains a hardware address, IPv6 address, lease time, VLAN ID, and port information that correspond to the valid interfaces of the system. To manually add DHCPv6 snooping binding entry, use the following command.
  • Page 372 UMN:CLI User Manual V5808 To set a DHCP snooping option for a specific port, use the following command. Command Mode Description Specifies a snooping option format on a port. ipv6 dhcp snooping port PORTS opt-code: DHCPv6 option code opt-code <1-254> format NAME...
  • Page 373 UMN:CLI User Manual V5808 8.6.3 DHCPv6 Relay Agent 8.6.3.1 DHCPv6 Relay Agent Destination To specify a destination address to which client messages are forwarded and enable DHCP for IPv6 relay service on the interface, use the following command. Command Mode Description Specifies relay destination address on an interface.
  • Page 374 UMN:CLI User Manual V5808 specific) A length can be variable according to value or can be fixed. A value contains actual information such an IPv6 address, string, or index, which is inserted into the DHCP packet. Administrators can configure a DHCPv6 option format in DHCPv6 Option mode, which is globally used over the DHCP functions.
  • Page 375 UMN:CLI User Manual V5808 %FIRMWARE-VERSION: firmware version %PORT-NUM: input port number %IN_IF_IPv6: input interface IPv6 address %ONT-SERIAL: ONT serial number 8.6.4.3 Deleting DHCPv6 Option Format To delete a specified DHCPv6 option format, use the following command. Command Mode Description no ipv6 dhcp option format Global Deletes the given DHCPv6 option format.
  • Page 376 VRRP routers to prevent network failure caused by one dedicated router. You can configure maximum 255 VRRP routers in VRRP group of V5808. First of all, decide which router plays a roll as Master Virtual Router. The other routers will be Backup Virtual Routers.
  • Page 377: Configuring Vrrp

    UMN:CLI User Manual V5808 8.7.1 Configuring VRRP To configure the V5808 as device in Virtual Router, use the following command on Global Configuration mode. Then you can configure VRRP by opening VRRP Configuration mode. Command Mode Description router vrrp INTERFACE GROUP- Configures Virtual Router (VRRP Group).
  • Page 378 UMN:CLI User Manual V5808 higher precedence. If a problem occurs on Master Router and there are more than two routers, one of them is selected as new Master Router according to their precedence. To configure Priority of Virtual Router or delete the configuration, use the following commands.
  • Page 379 3.620 sec [1] associate address : 10.0.0.5 By default, Priority of the V5808 is configured as “100”. Therefore, unless you configure specific Priority, this switch becomes Master Router because a device, which has lower IP address, has higher precedence.
  • Page 380 Master Router cannot be recognized, the communication would be impossible. For the V5808, you can configure Master Router to be changed by giving lower Priority to Master Router when the link of Master Router is disconnected. This function is VRRP...
  • Page 381 UMN:CLI User Manual V5808 Fig. 8.37 VRRP Track To configure VRRP Track, use the following command. Command Mode Description track interface INTERFACE Enables the interface tracking and decreases the VRRP priority <1-254> VRRP priority as the track results. To release VRRP Track configuration, use the following command.
  • Page 382 UMN:CLI User Manual V5808 8.7.1.5 Authentication Password If anyone knows Group ID and Associated IP address, he can configure another device as a Virtual Router. To prevent this, user needs to configure a password, named authentication password that can be used only in Virtual Router user configured.
  • Page 383 UMN:CLI User Manual V5808 8.7.2 VRRP Monitoring and Management You can view all kinds of statistics and database recorded in IP routing table. The information can be used to enhance system utility and solve problem in case of trouble. You can check network connection and data routes through the transmission.
  • Page 384 UMN:CLI User Manual V5808 8.7.2.3 VRRP Debug To enable VRRP debugging, use the following command. Command Mode Description Enables VRRP debugging. debug vrrp [all] all: all VRRP debugging Enables VRRP debugging. nsm: NSM notifications debugging debug vrrp nsm [interface | bfd]...
  • Page 385 Egress and ingress can be configured both to be same and to be different. The V5808 can apply the rate limit with 64 Kbps unit for GE port, and support ingress policing and egress shaping. To set a rate limit for ports, use the following command.
  • Page 386: Flood Guard

    UMN:CLI User Manual V5808 Flood Guard Flood guard limits number of packets, how many packets can be transmitted, in configured bandwidth, whereas Rate limit controls packets through configuring width of bandwidth, which packets pass through. This function prevents receiving packets more than configured amount without enlarging bandwidth.
  • Page 387 UMN:CLI User Manual V5808 To disable the flooding of multicast and unicast packets to an interface, use the following command. Command Mode Description port flood-block PORTS bcast Blocks Broadcast forwarding to the port. Bridge port flood-block PORTS dlf Blocks DLF forwarding to the port.
  • Page 388 A packet flooding occurs unexpectedly when a large number of broadcast or multicast packets are received on a port, which may cause unnecessary network congestion. V5808 provides the system flood guard function that controls traffic for a port by given threshold. If the number of incoming packets exceeds the threshold, the system generates a syslog message/SNMP trap or discards those packets.
  • Page 389 A packet storm may occur unexpectly if a large number of invalid packets are received on a port. It can cause the network to slow down or to time out. The V5808 provides the traffic guard function that controls the port’s traffic by threshold value. The threshold (%) rate is based on the number of packets per second (pps).
  • Page 390 Disable the attack guard function. multicast | unicast} [PORTS] If the high threshold is set to 85% for 1G Ethernet port, the V5808 monitors the number of configured packet type. The number of those packets exceeds 1,264,880 pps (=14,880,95 * 0.85), the shutdown/trap action will be performed.
  • Page 391 The threshold (%) rate of Error Guard is based on 64-byte frame size calculation. If the high threshold is set to 5% for 10G Ethernet port, the V5808 monitors the error packet count. The number of those packets exceeds 744,048 pps (=14,880,952 * 0.05), the shutdown/trap action will be performed.
  • Page 392 The V5808 provides the PPS control function that controls traffic for a port by given threshold. If the number of incoming packets exceeds the threshold, the system generates a syslog message and SNMP trap.
  • Page 393: Storm Control

    Displays a configuration of the storm control. 8.12 Jumbo Frame Capacity The packet range that can be capable to accept is from 64 bytes to 1518 bytes. Therefore, packets not between these ranges will not be taken. However, the V5808 can accept...
  • Page 394 UMN:CLI User Manual V5808 jumbo frame larger than 1518 bytes through user’s configuration. To enable/disable the jumbo frame capacity, use the following command. Command Mode Description jumbo-frame PORTS <1518- Configures to accept jumbo frame between specified 12288> ranges. (default: 1518)
  • Page 395 UMN:CLI User Manual V5808 8.13 Configuring PPPoE Tag Option Format PPP over Ethernet (PPPoE) provides the ability to connect a network of hosts over a simple bridging access device to a remote Access Concentrator (AC). By using PPPoE with vendor tag, switch in the host network can include the additional information about itself before sending PPPoE packets to the AC.
  • Page 396 UMN:CLI User Manual V5808 with special character (%). %FRAME: frame (chassis) number for receiving PPPoE packets %SLOT: slot number for receiving PPPoE packets %PORT: port number for receiving PPPoE packets %VID: VLAN ID tagged on packets %IN VID: inner VLAN ID %BANDWIDTH: bandwidth %MGMT IP: MGMT interface’s IP address...
  • Page 397 UMN:CLI User Manual V5808 8.13.2.2 Configuring PPPoE Vendor Tag Filtering The PPPoE filter will decide the way that PPPoE packet is forwarded. Each filter has a unique filter ID. This ID is also used as a priority. The filter having the highest priority will be chosen.
  • Page 398 Blocking Packet Forwarding RFC 2644 recommends that system blocks broadcast packet of same network bandwidth with interface of equipment, namely direct broadcast packet. Hereby, V5808 is supposed to block direct broadcast packet by default setting. However, you can enable or disable it in V5808.
  • Page 399 UMN:CLI User Manual V5808 Command Mode Description no ip forward dlf Enables blocking DLF packets. (default) Global ip forward dlf Disables blocking DLF packets.
  • Page 400 2 multicast forwarding, and Layer 3 multicast routing, which allow network administrators to successfully achieve the effective and flexible multicast deployment. Fig. 9.1 shows an example of the IP multicast network. In this case, the V5808 is configured only with IGMP snooping (L2 multicast forwarding feature) in the Layer 2 network.
  • Page 401 Fig. 9.2 The V5808 with PIM-SM If more than one port are on the same Layer 2 interface and the V5808 is a border router of the Layer 3 network, you should configure the V5808 with both IGMP snooping and PIM-SM together.
  • Page 402 UMN:CLI User Manual V5808 IP Multicast to Ethernet/FDDI MAC Address Mapping All IP multicast frames use MAC layer addresses beginning with the 24-bit prefix of 0x0100.5Exx.xxxx. With only half of these MAC addresses available for use by IP Multicast, 23 bits of MAC address space are available for mapping L3 IP multicast addresses into L2 MAC addresses.
  • Page 403: Multicast Group Membership

    Using IGMP, hosts express an interest in a certain multicast group, and routers maintain the multicast group membership database by collecting the interests from the hosts. The V5808 supports IGMP version 1, 2, and 3 each defined in RFC 1112, 2236, and 3376. 9.1.1 IGMP Basic Internet Group Management Protocol (IGMP) manages the host membership in multicast groups.
  • Page 404 UMN:CLI User Manual V5808 9.1.1.1 IGMP Version By default, the V5808 runs IGMP version 3. To change the IGMP protocol version on a current interface, use the following command. Command Mode Description Sets an IGMP version on a current interface.
  • Page 405 UMN:CLI User Manual V5808 9.1.1.4 IGMP Debug To enable debugging of all IGMP or a specific feature of IGMP, use the following command. Command Mode Description Enables IGMP debugging. all: all IGMP decode: IGMP decoding debug igmp {all | decode |...
  • Page 406 UMN:CLI User Manual V5808 • Version 2 membership report This is used by hosts to join a group (unsolicited) or to respond to membership que- ries (solicited). • Leave group This is used to explicitly leave a group. IGMPv2 Operation An IGMP querier is the only router that sends membership query messages for a network segment.
  • Page 407 UMN:CLI User Manual V5808 To configure the IGMP static join, use the following command. Command Mode Description Configures the IGMP static join. ip igmp static-group A.B.C.D vlan VLAN port A.B.C.D: IGMP group address PORT [reporter A.B.C.D] VLANS: VLAN ID (1-4094)
  • Page 408 UMN:CLI User Manual V5808 To display the IGMP static join group list, use the following command. Command Mode Description show ip igmp static-group Shows the IGMP static join group list. show ip igmp static-group list Enable 1-99: IP standard access list...
  • Page 409 V5808 IGMP Startup Query Interval The V5808 needs to acquire information of its multicast members for the updated membership when it becomes the querier on the specified IGMP interface. For the updated membership, V5808 sends general query messages as a querier. You can specify the interval to send this query messages as many as the configured QRV value.
  • Page 410 UMN:CLI User Manual V5808 Upon receiving a leave message, a querier then sends out a group-specific (IGMPv2) or group-source-specific query (IGMPv3) message to determine if there is still any host interested in receiving the traffic. If there is no reply, the querier stops forwarding the multicast traffic.
  • Page 411 Each record specifies the information of the filter mode and source list. The report can contain multiple group records, allowing reporting of full current state using fewer packets. The V5808 runs IGMPv3 by default, and there are no additional IGMPv3 parameters you need to configure. IGMPv3 snooping features are provided. IGMPv3 Messages...
  • Page 412 UMN:CLI User Manual V5808 port may also contain multiple group records. Each group record has one of the fol- lowing information: – Current-state: This indicates the current filter mode including/excluding the speci- fied multicast address. – Filter-mode-change: This indicates a change from the current filter mode to the other mode.
  • Page 413 9.2.1 Multicast Forwarding Database Internally, the V5808 forwards the multicast traffic referred to the multicast forwarding database (McFDB). The McFDB maintains multicast forwarding entries collected from multicast protocols and features, such as PIM, IGMP, etc.
  • Page 414 UMN:CLI User Manual V5808 no ip mcfdb aging-time Deletes the specified aging time for forwarding entries. To specify the maximum number of forwarding entries on the McFDB, use the following command. Command Mode Description Specifies the maximum number of forwarding entries ip mcfdb aging-limit on the McFDB.
  • Page 415 By maintaining this multicast forwarding table, the V5808 dynamically forward multicast traffic only to those interfaces that want to receive it as nominal unicast forwarding does.
  • Page 416 UMN:CLI User Manual V5808 9.2.2.2 IGMP Snooping Version The membership reports sent to the multicast router are sent based on the IGMP snooping version of the interface. If you statically specify the version on a certain interface, the reports are always sent out only with the specified version. If you do not statically specify the version, and a version 1 query is received on the interface, the interface dynamically sends out a version 1 report.
  • Page 417 UMN:CLI User Manual V5808 robustness-variable igmp snooping vlan VLANS robustness-variable 9.2.3 IGMPv2 Snooping 9.2.3.1 IGMP Snooping Querier Configuration IGMP snooping querier should be used to support IGMP snooping in a VLAN where PIM and IGMP are not configured. When the IGMP snooping querier is enabled, the IGMP snooping querier sends out periodic general queries that trigger membership report messages from a host that wants to receive multicast traffic.
  • Page 418 UMN:CLI User Manual V5808 Specifies an IGMP snooping query interval in the unit ip igmp snooping querier query- of second. interval <1-1800> 1-1800: query interval (default: 125) Global ip igmp snooping vlan VLANS Specifies an IGMP snooping query interval on a VLAN.
  • Page 419 UMN:CLI User Manual V5808 Command Mode Description Enable show ip igmp snooping [vlan Shows IGMP querier information and configured Global VLANS] querier [detail] parameters. Bridge 9.2.3.2 IGMP Snooping Last Member Query Interval Upon receiving a leave message, a switch with IGMP snooping then sends out a group- specific (IGMPv2) or group-source-specific query (IGMPv3) message to determine if there is still any host interested in receiving the traffic.
  • Page 420 UMN:CLI User Manual V5808 immediate-leave PORTS: port number Enables the IGMP snooping immediate leave on a ip igmp snooping vlan VLANS VLAN. immediate-leave VLANS: VLAN ID (1-4094) To disable the IGMP snooping immediate leave, use the following command. Command Mode...
  • Page 421 The hosts received the group- specific queries send the report messages according to their IGMP membership status. However, V5808 is enabled as IGMP snooping S-Query report agency, the group-specific queries are not sent downstream. When the switch receives a group-specific query, the switch terminates the query and sends an IGMP report if there is a receiver for the group.
  • Page 422 UMN:CLI User Manual V5808 Command Mode Description no ip igmp snooping explicit- Disables explicit host tracking globally. tracking Global igmp snooping vlan Disables explicit host tracking on a VLAN. VLANS explicit-tracking VLANS: VLAN ID (1-4094) You can also restrict the number of hosts on a port for the switch performance and enhanced security.
  • Page 423 UMN:CLI User Manual V5808 tracking group A.B.C.D A.B.C.D: multicast group address Explicit host tracking is enabled by default. 9.2.3.7 Multicast Router Port Configuration The multicast router port is the port which is directly connected to a multicast router. A switch adds multicast router ports to the forwarding table to forward membership reports only to those ports.
  • Page 424 UMN:CLI User Manual V5808 Enables to learn multicast router ports through PIM ip igmp snooping vlan VLANS hello packets on a VLAN. mrouter learn pim VLANS: VLAN ID (1-4094) To disable the switch to learn multicast router ports through PIM hello packets, use the following command.
  • Page 425 UMN:CLI User Manual V5808 packet loss. Thus, a period of multicast flooding needs to be controlled to solve such a problem. Enabling TCN Multicast Flooding To enable the switch to flood multicast traffic when TCN is received, use the following command.
  • Page 426 UMN:CLI User Manual V5808 TCN Flooding Query Solicitation Typically, if a network topology change occurs, the spanning tree root switch issues a query solicitation which is actually a global leave message with the group address 0.0.0.0. When a multicast router receives this solicitation, it immediately sends out IGMP general queries to hosts, allowing the fast convergence.
  • Page 427: Displaying Igmp Snooping Information

    UMN:CLI User Manual V5808 ip igmp snooping immediate- Enables immediate block globally. block Global ip igmp snooping vlan VLANS Enables immediate block on a VLAN. immediate-block VLANS: VLAN ID (1-4094) To disable IGMPv3 immediate block, use the following command. Command...
  • Page 428 UMN:CLI User Manual V5808 port {PORTS | cpu} [mac-based] PORTS: port number show ip igmp snooping groups Shows the IGMP snooping table per VLAN. vlan VLANS [mac-based] VLANS: VLAN ID (1-4094) show ip igmp snooping groups Show summary IGMP snooping...
  • Page 429 MVR also provides the fast convergence for topology changes in the Ethernet ring-based service provider network with STP and IGMP snooping TCN, guaranteeing stable multicast services. MVR implemented for the V5808 has the following restrictions, so you must keep in mind those, before configuring MVR. •...
  • Page 430 UMN:CLI User Manual V5808 9.2.6.3 Source/Receiver Port You need to specify the source and receiver ports for MVR. The followings are the definitions for the ports. • Source Port This is connected to multicast routers or sources as an uplink port, which receives and sends the multicast traffic.
  • Page 431: Igmp Filtering And Throttling

    UMN:CLI User Manual V5808 9.2.7 IGMP Filtering and Throttling IGMP filtering and throttling control the distribution of multicast services on each port. IGMP filtering controls which multicast groups a host on a port can join by associating an IGMP profile that contains one or more IGMP groups and specifies whether an access to the group is permitted or denied with a port.
  • Page 432 • IGMP filtering only supports IGMPv2. By the following command, V5808 can permit or deny the IGMP packets by referring to its DHCP snooping binding table. This reference enables the system to permit IGMP messages only when the source IP address and MAC address of host have identified from the DHCP snooping binding table.
  • Page 433 UMN:CLI User Manual V5808 9.2.7.2 IGMP Throttling You can configure the maximum number of multicast groups that a host on a port can join. To specify the maximum number of IGMP groups per port, use the following command. Command Mode...
  • Page 434: Igmp Proxy

    IGMP Proxy enables this L3 switch to issue IGMP host messages on behalf of hosts that the switch discovered through standard IGMP interfaces. The switch acts as a proxy for its hosts. The V5808 supports IGMPv2. IGMP Proxy can only work in a simple tree topology; where traffic is distributed to explicit upstream and downstream.
  • Page 435 9.2.8.3 Configuring Upstream Interface Mode When a single downstream interface is specified with multiple upstream interfaces, V5808 supports two methods of IGMP proxy operation that are priority mode and load balancing mode. You can choose the way how to handle multicast traffic going to upstream interfaces.
  • Page 436 IF flapping, which can increase the stability and quality for multicast service. Using this function, the V5808 gives a discredit to a IGMP IF for every flapping time, and then the IF is not selected as a forwarding path until its credit is regenerated.
  • Page 437 UMN:CLI User Manual V5808 To set the current IGMP IF credit as the default (100), use the following command. Command Mode Description clear ip igmp if flap discredit Enable Restores the current credit to a default value (100). [NAME] Global NAME: IGMP interface name 9.2.8.5...
  • Page 438 UMN:CLI User Manual V5808 9.2.8.7 Querying with Real Querirer’s Source IP Address To send hosts queries with the actual source IP addresses, not with mroute-proxy interface’s IP address, use the following command. Command Mode Description ip igmp mroute-proxy querier Sets IGMP queries with original query’s source IP...
  • Page 439 Disables a configured IGMP state limit per interface. 9.2.10 Multicast-Source Trust Port Any port of V5808 can be specified as a multicast-source trust port which is registered in the multicast forwarding table. Only multicast-source trust ports can be received the multicast traffic.
  • Page 440 Multicast Routing 9.3.1.1 Enabling Multicast Routing By default, multicast routing is disabled. To configure the V5808 to forward multicast traffic via Layer 3 network, you need to enable multicast routing. To enable Layer 3 multicast routing, use the following command.
  • Page 441 UMN:CLI User Manual V5808 9.3.1.2 TTL Threshold You can specify a TTL threshold for multicast packets on an interface. This configuration is used on a border router which limits a multicast domain, since only the multicast packets with a TTL value greater than a TTL specified on an interface are forwarded to outgoing interfaces.
  • Page 442 UMN:CLI User Manual V5808 ECMP load splitting has two options for next hop decision: • srcip selects next hop based on source address. • srcgrpip selects next hop based on both source and group address. To enable ECMP load splitting, use the following command.
  • Page 443 UMN:CLI User Manual V5808 9.3.1.5 Displaying MRIB Entry To display the multicast routing entries in the MRIB, use the following command. Command Mode Description Shows all multicast routing entries. show ip mroute [summary] summary: abbreviated display Shows the multicast routing entries for a given PIM show ip mroute {dense | sparse} mode.
  • Page 444 UMN:CLI User Manual V5808 9.3.1.6 Displaying MRIB Statistics To display the multicast routing statistics entries in the MRIB, use the following command. Command Mode Description show ip mroute count Shows all multicast routing statistics entries. Shows the multicast routing statistics entries for a show ip mroute {dense | sparse} given PIM mode.
  • Page 445 Prune messages are then used to prevent from propagating to routers with no group members. Both PIM protocols use the same message formats. The V5808 currently support PIM-SM only. PIM Messages The followings are simple descriptions of PIM control messages: •...
  • Page 446 UMN:CLI User Manual V5808 • Join/prune Join/prune messages are sent by routers towards upstream sources or RPs. Join messages are sent to receive the multicast traffic by building shared trees (RPT) or source trees (SPT). Prune messages are sent to prune established distribution trees when there are no more interests in the traffic.
  • Page 447 UMN:CLI User Manual V5808 IGMP querier election process. To specify the DR priority on an interface, use the following command. Command Mode Description ip pim dr-priority Specifies the DR priority on an interface. <0-4294967294> 0-4294967294: priority value (default: 1) no ip pim dr-priority Interface <0-4294967294>...
  • Page 448 UMN:CLI User Manual V5808 Enables PIM group filtering to block PIM join/prune ip pim group-filter range {<1- messages using a specified range of access lists. 1024> | WORD} 1-1024: IP standard access list range WORD: IP access-list-range name no ip pim group-filter [range] Disables PIM group filtering.
  • Page 449 VIF flapping, which can increase the stability and quality for multicast service. Using this function, the V5808 gives a discredit to a VIF for every flapping time, and then the VIF is not selected as a forwarding path until its credit is regenerated.
  • Page 450 UMN:CLI User Manual V5808 9.3.2.8 PIM Static Join The IGMP static join feature supports an IGMPv2 host only. PIM static join has been also developed to reduce the zapping time by statically creating a virtual host that behaves like a real on a port. However, IGMP static join feature can not be used by Layer 3 device (Core switch) that is incapable of IGMP feature with no group member (host).
  • Page 451 UMN:CLI User Manual V5808 9.3.3 PIM-SM Rendezvous Point Tree (RPT) PIM-SM mainly uses a shared tree to deliver multicast traffic, called the RP tree (RPT). As its name implies, it relies on a core router called the Rendezvous Point (RP) that receives all multicast traffic from the sources and forwards that traffic to the receivers.
  • Page 452 UMN:CLI User Manual V5808 and multicast traffic is sent via that distribution tree, the DR sends the prune message with (*, G) state toward the RP to prune the existing shared tree to receive the traffic. SPT is established based on the existing unicast routing table by performing the RPF check.
  • Page 453 Static RP To elect the RP among candidate RPs in the shared tree, the V5808 supports the BSR mechanism (see Section 9.3.3.2) and static RP, and also supports the simultaneous use of those.
  • Page 454 UMN:CLI User Manual V5808 To configure an interface to send the candidate RP advertisement to the BSR, use the following command. Command Mode Description Configures an interface to send the candidate RP advertisement. ip pim rp-candidate INTERFACE INTERFACE: interface name [group-list <1-99>] [interval <1-...
  • Page 455 UMN:CLI User Manual V5808 9.3.3.2 Bootstrap Router The bootstrap router (BSR) mechanism is one way that a multicast router can learn the set of group-to-RP mappings required in order to function. All multicast routers in PIM-SM domain can be potentially the bootstrap router (BSR);...
  • Page 456 UMN:CLI User Manual V5808 9.3.3.3 Source Registration Multicast sources do not need any join process to send multicast traffic, since the DR of the multicast sources just receives the traffic from the sources without any information. Even in the RPT, RPs must receive multicast traffic from the sources via the shortest path while receivers receive multicast traffic via the shared tree.
  • Page 457 UMN:CLI User Manual V5808 no ip pim register-suppression Deletes the specified the registration suppression time. Register Message Filtering You can enable the router to filter multicast sources specified in access lists at the RP. This filtering will permit/deny the PIM register messages for the specified sources. If unauthorized sources try to register with the RP, the RP then drops the PIM register messages from those sources.
  • Page 458 The Cisco’s routers, however, validate the checksum for the whole register message including the data portion, resulting in incompatibility with the standard-based routers. To guarantee compatibility with the Cisco’s routers, the V5808 provides the checksum option, which expands the range of the checksum calculation.
  • Page 459 The rebooted router then is able to quickly recover from the reboot. Some older Cisco’s routers cannot recognize the GenID option in the hello messages, so the V5808 provides the exclude-GenID option for the compatibility with the Cisco’s routers.
  • Page 460: Pim Debug

    UMN:CLI User Manual V5808 9.3.3.6 PIM Debug To enable PIM-SM debugging, use the following command. Command Mode Description Enables PIM-SM debugging. all: all PIM-SM debugging events: events debugging debug pim {all | events | nexthop nexthop: nexthop communications debugging | mib | mfc | nsm | state | packet...
  • Page 461 If V5808 receives IGMPv1 or IGMPv2 report message from the host when static SSM mapping is enabled, it handles as if it receives IGMPv3 report...
  • Page 462 User Manual V5808 Static SSM mapping implemented for the V5808 has the following restriction, so you must keep it in mind, before configuring static SSM mapping. IGMP proxy and static SSM mapping cannot be enabled together. It means that SSM mapping cannot be enabled when the system is already configured with upstream or downstream interface with IGMP proxy feature.
  • Page 463 UMN:CLI User Manual V5808 10 IPv6 Multicast Multicast is the communication for a single or many source hosts to a specific group of destination hosts, which is interested in the information from the sources. This type of packet transmission can be deployed for a number of applications with more efficient utilization of the network infrastructure.
  • Page 464 UMN:CLI User Manual V5808 10.1 Multicast Listener Discovery (MLD) The Multicast Listener Discovery (MLD) protocol is the multicast group management protocol for IPv6 and is used to exchange group information between multicast hosts and routers. Multicast Listener Discovery (MLD) enables the IPv6 router to discover the presence of...
  • Page 465 UMN:CLI User Manual V5808 MLD has two versions that are supported by hosts and routers. MLD messages for each version are Query and Report types. Additionally, Done message is added to the version1. The followings are the simple definitions of each version: •...
  • Page 466 UMN:CLI User Manual V5808 • MLD Version 2 MLDv2 is based on IGMP3. MLD v2 message consists of two messages as Listener Query and Listener Report. In addition, Query messages are classified into three types as General, Multicast-address-specific, Multicast-address-source-specific Query.
  • Page 467: Mld Version

    UMN:CLI User Manual V5808 10.1.1 MLD Version By default, this system runs MLDv2. To change the MLD protocol version on a current interface, use the following command. Command Mode Description Sets MLD version on a current interface. ipv6 mld version <1-2>...
  • Page 468 UMN:CLI User Manual V5808 decode: MLD decoding encode: MLD encoding events: MLD events fsm: MLD Finite State Machine (FSM) tib: MLD Tree Information Base (TIB) no debug mld {all | decode | Disables MLD debugging. encode | events | fsm | tib} Tree Information Base (TIB) is the collection of state at a router that has been created by receiving MLD messages from local hosts.
  • Page 469 UMN:CLI User Manual V5808 Command Mode Description ipv6 mld query-interval Specifies a general query interval. <1-18000> 1-18000: query interval (default: 125 seconds) Interface no ipv6 mld query-interval Deletes a specified general query interval. 10.1.6.2 MLD Query Response Time In MLD version 1 and 2, membership query messages include the maximum query response time field.
  • Page 470 UMN:CLI User Manual V5808 stops forwarding the multicast traffic. However, MLD messages may get lost for various reasons, so you can specify the number of sending query messages and its interval. To specify the number of sending Multicast-address-specific or Multicast-address-source- specific query messages, use the following command.
  • Page 471 UMN:CLI User Manual V5808 10.1.6.6 MLD Static Join The MLD static join feature has been developed to reduce the zapping time by statically creating a virtual host that behaves like a real on a port, even if there is no group member in the group where the port belongs.
  • Page 472 UMN:CLI User Manual V5808 10.2 IPv6 Multicast Functions This system provides various multicast functions including Layer 2 multicast forwarding, which allow you to achieve the fully effective and flexible multicast deployment. 10.2.1 Multicast Forwarding Database Internally, this system forwards the multicast traffic referred to the multicast forwarding database (McFDB).
  • Page 473 UMN:CLI User Manual V5808 To specify the maximum number of forwarding entries on the McFDB, use the following command. Command Mode Description Specifies the maximum number of forwarding entries ipv6 mcfdb aging-limit on the McFDB. <256-65535> 256-65535: number of entries (default: 5000)
  • Page 474 UMN:CLI User Manual V5808 10.2.2 MLD Snooping Basic Layer 2 switches normally flood multicast traffic within the broadcast domain, since it has no entry in the Layer 2 forwarding table for the destination address. Multicast addresses never appear as source addresses, therefore the switch cannot dynamically learn multicast addresses.
  • Page 475: Mld Snooping

    UMN:CLI User Manual V5808 Command Mode Description ipv6 mld snooping version <1- Configures the MLD snooping version globally. Interface 2> 1-2: MLD snooping version (default: 2) To delete the specified static MLD snooping version, use the following command. Command Mode...
  • Page 476 UMN:CLI User Manual V5808 Command Mode Description ipv6 mld snooping querier Interface Enables the MLD snooping querier. To disable the MLD snooping querier, use the following command. Command Mode Description no ipv6 mld snooping querier Interface Disables the MLD snooping querier.
  • Page 477 UMN:CLI User Manual V5808 The MLD snooping fast-leave function is available only in the MLDv1 host. In fast-leave processing, when there is more than one MLD host belonging to a group, and a certain host sends a done message, the MLD snooping querier will remove all host entries from the forwarding table.
  • Page 478 UMN:CLI User Manual V5808 group is enough. When the MLD snooping report suppression is enabled, a switch suppresses membership reports from hosts other than the first one, allowing the switch to forward only one membership report in response to a general query from a multicast router.
  • Page 479 UMN:CLI User Manual V5808 mrouter IFNAME Global globally. IFNAME: VLAN interface name 10.2.4 MLD State Limit You can use MLD State Limit feature to limit the number of MLD states that can be joined to a router on a per-interface or global level. The MLD group limits feature provides protection against DoS (denial of service) attacks caused by MLD packets.
  • Page 480 IF flapping, which can increase the stability and quality for multicast service. Using this function, the V5808 gives a discredit to a MLD IF for every flapping time, and then the IF is not selected as a forwarding path until its credit is regenerated.
  • Page 481 UMN:CLI User Manual V5808 no ipv6 mld if flap discredit Disables the MLD IF flap discredit. To specify the discredit value in case of MLD IF flapping, use the following command. Command Mode Description Specifies the discredit value for the IF flapping and ipv6 mld if flap discredit-unit <1-...
  • Page 482 UMN:CLI User Manual V5808 10.3 IPv6 Multicast Routing When receivers join a certain group, multicast routers must deliver the multicast traffic corresponding to the group to those receivers. To determine the appropriate forwarding path and to replicate the multicast traffic to multiple destinations, multicast routing protocols are needed.
  • Page 483 UMN:CLI User Manual V5808 The purpose of this feature is load splitting for forwarding multicast traffic over ECMP, allowing more efficient use of network resources and preventing traffic congestion. With this feature, multicast traffic is split across the equal cost multipath based on either its source address or its source and group address.
  • Page 484 UMN:CLI User Manual V5808 [THRESHOLD] routing entries. LIMIT: number of routing entries (1-214783647) THRESHOLD: warning threshold (1-214783647) no ipv6 multicast route-limit Deletes a specified limit. The warning threshold must not exceed the maximum number of multicast routing entries. 10.3.1.4 Displaying MRIB Entry To display the multicast routing entries in the MRIB, use the following command.
  • Page 485 UMN:CLI User Manual V5808 clear ipv6 mroute * [pim sparse- Deletes all MFC and TIB entries in the PIM-SM mode] protocol. Enable Global Deletes a specified MFC and TIB entry in the PIM-SM clear ipv6 mroute X:X::X:X protocol. [X:X::X:X] [pim sparse-mode]...
  • Page 486 UMN:CLI User Manual V5808 Enable Shows the multicast forwarding entries in the MFIB. show ipv6 mfib [vlan VID | group Global VID: VLAN ID (1-4094) X:X::X:X] [detail] Bridge X:X::X:X: IPv6 multicast group address 10.3.1.8 MRIB Debug To debug events in the MRIB, use the following command.
  • Page 487 UMN:CLI User Manual V5808 If the RP has receivers interested in the group, the RP must receive the multicast traffic from the source of that group via the SPT to deliver the traffic to those receiver. The DR of the source encapsulates the multicast packets in the PIM register messages, and starts to unicast them to the RP.
  • Page 488 UMN:CLI User Manual V5808 Shortest Path Tree (SPT) When the number of receivers increases, a shared tree may not be entirely efficient, so PIM-SM also provides the option to switch to receive multicast traffic on a shortest path tree (SPT). When this option is enabled, on receiving the first multicast packet from the RP in response to the PIM join message, the switchover to the SPT then occurs.
  • Page 489 UMN:CLI User Manual V5808 • Register Register messages are sent by the DR to the RP when a multicast packet needs to be transmitted on the RPT. These messages may contain the encapsulated multicast traffic. Both register and register-stop messages are unicast.
  • Page 490 UMN:CLI User Manual V5808 as the DR. To elect the DR, each PIM router examines PIM hello messages received from other neighbor PIM routers and compares its DR priority in those from neighbors. The router with the highest priority then is elected as the DR. In case of more than one router with the same highest priority value, the one with the higher IPv6 address is elected.
  • Page 491 UMN:CLI User Manual V5808 65535> 1-65535: hello message interval (unit: second) Deletes a specified interval to send PIM hello no ipv6 pim hello-interval messages. PIM hello messages may contain the hold time value in the option fields, which specifies how long the information is valid. The default hold time is 3.5 times of the interval of the PIM hello messages.
  • Page 492 UMN:CLI User Manual V5808 show ipv6 pim local-members Shows PIMv6 local membership information. [IFNAME] IFNAME: interface name show ipv6 pim mroute X:X::X:X Shows the multicast routing table. [X:X::X:X] X:X::X:X: multicast group or source address show ipv6 mroute Shows the summary of multicast routing table entry [summary] information.
  • Page 493 UMN:CLI User Manual V5808 10.3.3 PIMv6 Rendezvous Point (RP) In a shared tree, Rendezvous Point (RP) is a means for receivers to discover the sources that send to a particular multicast group. It is responsible to receive all multicast traffic from the sources and to forward that traffic to the receivers.
  • Page 494: Ignoring Rp Priority

    UMN:CLI User Manual V5808 Command Mode Description 16383>] [priority <0-255>] IFNAME: interface name WORD: IPv6 access list name 1-16383: advertising interval (unit: second) 0-255: priority value Deletes specified multicast groups which an interface no ipv6 pim rp-candidate can service. IFNAME group-list WORD...
  • Page 495: Bootstrap Router

    UMN:CLI User Manual V5808 10.3.4 Bootstrap Router The bootstrap router (BSR) mechanism is one way that a multicast router can learn the set of group-to-RP mappings required in order to function. All multicast routers in PIM-SM domain can be potentially the bootstrap router (BSR);...
  • Page 496 UMN:CLI User Manual V5808 10.3.5 Source Registration Multicast sources do not need any join process to send multicast traffic, since the DR of the multicast sources just receives the traffic from the sources without any information. Even in the RPT, RPs must receive multicast traffic from the sources via the shortest path while receivers receive multicast traffic via the shared tree.
  • Page 497 UMN:CLI User Manual V5808 Command Mode Description ipv6 pim register-suppression Specifies the registration suppression time. <1-65535> 1-65535: null-register message interval (unit: second) Global ipv6 register- Deletes the specified the registration suppression time. suppression 10.3.5.3 Register Message Filtering You can enable the router to filter multicast sources specified in access lists at the RP.
  • Page 498 UMN:CLI User Manual V5808 Command Mode Description X:X::X:X: source IP address IFNAME: interface name Deletes a specified source IPv6 address of register no ipv6 pim register-source messages.
  • Page 499 UMN:CLI User Manual V5808 10.3.6 IPv6 SPT Switchover PIM-SM provides the switching option to deliver multicast traffic on the SPT. Multicasting over the SPT may be more efficient than multicasting over the RPT, since it can substantially reduce the network latency.
  • Page 500 UMN:CLI User Manual V5808 10.3.7 IPv6 Cisco’s Router Interoperability 10.3.7.1 Register Message Checksum When a multicast source registers with the RP, the DR encapsulates the multicast traffic from the source in the PIM register message, and unicasts it to the RP. The standard PIM...
  • Page 501 UMN:CLI User Manual V5808 10.3.7.3 Excluding GenID Option PIM hello messages may contain the generation ID (GenID) in the option fields, which is a random value for the interface on which the hello message is sent. The GenID is regenerated whenever PIM forwarding is started or restarted on the interface. It enables neighbors to quickly detect a router’s reboot and thus to synchronize RP-set information...
  • Page 502 UMN:CLI User Manual V5808 10.3.8 IPv6 PIM Debug To enable IPv6 PIM-SM debugging, use the following command. Command Mode Description Enables PIM-SM debugging. all: all PIM-SM debugging events: events debugging debug ipv6 pim sparse-mode nexthop: nexthop communications debugging {all | events | nexthop | mib | mfc...
  • Page 503 UMN:CLI User Manual V5808 Command Mode Description timer assert [at] no debug ipv6 pim sparse-mode timer bsr [bst | crp] no debug ipv6 pim sparse-mode timer hello [ht | nlt | tht] no debug ipv6 pim sparse-mode timer joinprune [jt | et | ppt | kat |...
  • Page 504 If this system receives MLDv1 report message from the host when static SSM mapping is enabled, it handles as if it receives MLDv2 report messages. Static SSM mapping implemented for the V5808 has the following restriction, so you must keep it in mind, before configuring static SSM mapping.
  • Page 505 UMN:CLI User Manual V5808 follow. • Allows all network information if there is no defined policy in prefix list. • Rejects specified network information unless policy applied to network in defined in prefix list. • Distinguishes each policy with the assigned number and applies policy which has the lowest number when there is more than one policy applied to one network.
  • Page 506 UMN:CLI User Manual V5808 Command Mode Description no ipv6 prefix-list WORD {deny | 3ffe::/16 <network/length>) any: any IPv6 prefix to match. (same as “::0/0 permit} { X:X::X:X/M | any} le 128”) ge: minimum prefix length to be matched no ipv6 prefix-list WORD description...
  • Page 507 UMN:CLI User Manual V5808 With sequenced prefix lists, each prefix list entry is associated with a sequence number. Sequence numbers can be used to insert a prefix list into the middle of an existing list or to delete an existing statement in the list.
  • Page 508: Ip Routing Protocol

    UMN:CLI User Manual V5808 11 IP Routing Protocol 11.1 Border Gateway Protocol (BGP) The Border Gateway Protocol (BGP) is an exterior gateway protocol (EGP) that is used to exchange routing information among routers in different autonomous systems (AS). BGP routing information includes the complete route to each destination. BGP uses the routing information to maintain a database of network reachability information, which it exchanges with other BGP systems.
  • Page 509: Basic Configuration

    The ZebOS type requires no specific configuration for sending out BGP community and extended community attributes. ZebOS type is the default for the V5808. To select configuration type of the BGP router, use the following command.
  • Page 510 UMN:CLI User Manual V5808 11.1.1.2 Enabling BGP Routing Step 1 To define an AS number and open Router Configuration mode, use the following command. Command Mode Description Assigns AS number to configure BGP routing and router bgp <1-65535> Global opens Router Configuration mode.
  • Page 511 UMN:CLI User Manual V5808 A.B.C.D: router ID address no bgp router-id [A.B.C.D] Deletes a configured router ID. To display Router ID, use the following command. Command Mode Description show router-id Enable Shows Router-ID 11.1.1.5 Registering BGP Neighbor To assign IP address or peer group name for BGP Neighboring router within specified AS number, use the following command.
  • Page 512: Advanced Configuration

    Deletes the configured strict RFC1771 setting. 11.1.2 Advanced Configuration The V5808 is possibly configured for the additional configurations related BGP. 11.1.2.1 Summary of Path Aggregation combines the characteristics of several different routes and advertises a single route. In the example of 2 routes information of 172.16.0.0/24 and 172.16.1.0/24, the as-set parameter creates an aggregate entry advertising the path for a single route of 172.16.0.0/23, consisting of all elements contained in all paths being summarized.
  • Page 513 UMN:CLI User Manual V5808 Command Mode Description aggregate-address A.B.C.D/M Summarizes the information of routes and transmits it as-set [summary-only] to the other routers. Router A.B.C.D/M: network address aggregate-address A.B.C.D/M summary-only: transmits IP prefix only. summary-only [as-set] as-set: transmits one AS-path information.
  • Page 514 BGP routers. Then, the MED is considered when selecting the best path among many alternative paths. The V5808, MED comparison is configured only among all paths from the autonomous system. You can configure the comparison of MEDs among all BGP routers within autonomous system.
  • Page 515 When comparing similar routes from more than 2 peers the BGP router does not consider router ID of the routes. It selects the first received route. The V5808 uses router ID in the selection process; similar routes are compared and the route with lowest router ID is selected as the best route.
  • Page 516 V5808 routerid The V5808 is basically configured not to compare MED values of the path information that exchanges between the Confederation Peers. But just in case, it can be configured to compare MED values of the path information that exchanges between Confederation Peers.
  • Page 517 UMN:CLI User Manual V5808 To configure graceful restart specifically for BGP, use the following command. Command Mode Description bgp graceful-restart Sets to use graceful restart in BGP protocol. Router no bgp graceful-restart Disables the restart time value setting. Therefore, 2 options of the time can be used to speed up routing convergence by its peer in case that BGP doesn’t come back after a restart.
  • Page 518: Ip Address Family

    11.1.4 IP Address Family The V5808 recently supports both unicast and multicast as address-family. Use the following command in choosing either unicast or multicast to enter the Address-Family Configuration mode allowing configuration of address-family specific parameters. Use the following command in order to enable address family routing process, which open you in Address-Family Configuration mode.
  • Page 519 11.1.5.1 Default Route The V5808 can be configured that particular neighboring BGP routers or peer group is assigned by default route as 0.0.0.0. Then, neighboring router or member of peer group is able to receive the information of default route from the designated routers.
  • Page 520 11.1.5.4 Force Shutdown The V5808 supports the feature to force to shutdown any active session for the specified BGP router or peer group and to delete the routing data between them. It shutdowns all connections and deletes the received path information from neighboring router or peer group.
  • Page 521: Neighbor Password

    UMN:CLI User Manual V5808 Command Mode Description Shutdowns any active session for the specified router neighbor {NEIGHBOR-IP | or peer group and delete all related routing data. WORD} shutdown NEIGHBOR-IP: neighbor IP address Router WORD: peer group name or neighbor tag...
  • Page 522 11.1.5.9 Updates for Inbound Soft Reconfiguration Soft-reconfiguration may be used in lieu of BGP route refresh capability. The V5808 can store updates for inbound soft reconfiguration. When a soft reset (inbound) is done on this neighbor, the locally stored routes are reprocessed according to the inbound policy.
  • Page 523 UMN:CLI User Manual V5808 IPv6 AF A.B.C.D: neighbor IPv4 address X:X::X:X: neighbor IPv6 address WORD: peer group name or neighbor tag no neighbor {A.B.C.D | X:X::X:X | Disables the exchange of information with a BGP WORD} activate neighboring router or peer group.
  • Page 524 UMN:CLI User Manual V5808 ip community-list standard WORD {deny | permit} [LINE] [LINE] [LINE] Creates a standard community list. [LINE] community-list expanded Creates a expanded community list. WORD {deny | permit} LINE Add entries to the list by repeating the command for different IP addresses.
  • Page 525 UMN:CLI User Manual V5808 WORD {deny | permit} [LINE] WORD: extended community list name extcommunity-list expanded Creates a expanded extcommunity-list. WORD {deny | permit} LINE WORD: extended community list name To delete an entry in the extended community list, use the following command.
  • Page 526 UMN:CLI User Manual V5808 community show [ip] {unicast multicast} community {AA:NN | internet | local-AS | no- advertise | no-export} [exact-match] Shows the list of all bgp communities’ show ip bgp community-info information 11.1.7 BGP Timers BGP keepalive timer indicates that the frequency with which the keepalive messages are sent to the neighbors.
  • Page 527: Route Flap Dampening

    UMN:CLI User Manual V5808 11.1.9 Route Flap Dampening The route dampening minimizes the instability caused by route flapping. A penalty is added for every flap in a flapping route. As soon as the total penalty reaches the “suppress” limit the advertisement of the route is suppressed. This penalty is decayed according to the configured “half time”...
  • Page 528: Bgp Session Reset

    Because the internal connections are re-established newly after resetting, the route information of the connected routers is restored by default. You can reset the session in specified condition. The V5808 is available with several parameters to reset the BGP connections.
  • Page 529: Session Reset Of Peers Within Particular As

    UMN:CLI User Manual V5808 following command. Command Mode Description clear bgp * in [prefix-filter] Resets the session of specific group under * condition. in: clears incoming advertised routes. clear bgp * in [prefix-filter] prefix-filter: pushes out prefix-list ORF and does clear bgp view WORD * in inbound soft reconfiguration.
  • Page 530: Session Reset Of Specific Route

    UMN:CLI User Manual V5808 clear ipv6 bgp <1-4294967295> inbound soft reconfiguration. in [prefix-filter] 1-65535: AS number clear ip bgp <1-4294967295> {unicast | multicast} in [prefix- filter] clear bgp <1-4294967295> out Resets the session of BGP neighboring routers which clear ip bgp <1-4294967295> out are configured a particular AC number.
  • Page 531: Session Reset Of External Peer

    UMN:CLI User Manual V5808 multicast} in [prefix-filter] clear bgp {A.B.C.D | X:X::X:X } Resets the session of BGP neighboring router with specified IP address. clear ip bgp A.B.C.D out A.B.C.D: route IP address clear ipv6 bgp X:X::X:X out out: clears outgoing advertised routes.
  • Page 532: Session Reset Of Peer Group

    UMN:CLI User Manual V5808 clear ipv6 bgp external WORD external: clears all external peers. out: clears outgoing advertised routes. unicast | multicast : address family modifier clear ip bgp external {unicast | multicast} out clear bgp external soft [in | out]...
  • Page 533 UMN:CLI User Manual V5808 11.1.11 BGP AS-path Access List Autonomous System (AS) is one of the essential element of BGP. AS framework provides distance vector metric and loop detection to BGP. An AS path access list can be spcified on both inbound and outbound BGP routes.
  • Page 534 UMN:CLI User Manual V5808 11.1.12 BGP Filtering through Prefix Lists Prefix lists were introduced in BGP because they are efficient forms of filtering. Because they search on the prefix of the address as defined by the administrator, the lookup is very fast.
  • Page 535 UMN:CLI User Manual V5808 ip prefix-list WORD description Writes comments for the prefix list. LINE LINE: prefix list description up to 80 characters By default, the sequence numbers are automatically generated in increments of 5. To delete the entries in the prefix list, use the following command.
  • Page 536 UMN:CLI User Manual V5808 To delete the configured policy of prefix list, use the following command. Command Mode Description no ip prefix-list WORD seq <1-4294967295> {deny | permit} {A.B.C.D/M | any} Deletes the entry in an IPv4 prefix list no ip prefix-list WORD seq <1-4294967295>...
  • Page 537 UMN:CLI User Manual V5808 clear prefix-list WORD Global prefix with a specified name and prefix. A.B.C.D/M 11.1.13 BGP Debug To enable BGP debugging, use the following command. Command Mode Description debug bgp Enables BGP debugging. Enables BGP debugging. all: all BGP debugging...
  • Page 538 To enable/disable logging of status change messages without turning on BGP debugging, use the following command. Command Mode Description bgp log-neighbor-changes Enables logging of BGP neighbor status changes Router no bgp log-neighbor-changes Disables logging of BGP neighbor status changes The V5808 logs the following events using the above command.
  • Page 539 UMN:CLI User Manual V5808 • BGP notification received • Erroneous BGP update received • User reset request • Peer time-out / Peer closing down the session / Member added to peer group • Interface flap • Router ID changed •...
  • Page 540: Enabling Ospf

    UMN:CLI User Manual V5808 11.2 Open Shortest Path First (OSPF) Open shortest path first (OSPF) is an interior gateway protocol developed by the OSPF working group of Internet Engineering Task Force (IETF). OSPF designed for IP network supports IP subnetting and marks on information from exterior network. Moreover, it supports packet authorization and transmits/receives routing information through IP multicast.
  • Page 541 11.2.2 ABR Type Configuration The V5808 supports 4 types of OSPF ABR which are Cisco type ABR (RFC 3509), IBM type ABR (RFC 3509), IETF Draft type and RFC 2328 type. To configure ABR type of OSPF, use the following command.
  • Page 542: Compatibility Support

    11.2.3 Compatibility Support OSPF protocol in the V5808 uses RFC 2328 which is finding shorten path. However, Compatibility configuration enables the switch to be compatible with a variety of RFCs that deal with OSPF. Perform the following task to support many different features within the OSPF protocol.
  • Page 543 UMN:CLI User Manual V5808 11.2.4.2 Authentication Key If authentication enables on OSPF router interface, the password is needed for authentication. The authentication key works as a password. The authentication key must be consistent across all routers in an attached network.
  • Page 544 UMN:CLI User Manual V5808 no ip ospf message-digest-key <1-255> no ip ospf A.B.C.D message- digest-key <1-255> 11.2.4.3 Interface Cost OSPF protocol assigns suitable cost according to the bandwidth on the each interface to find the shortest route. Cost is used for packet routing, and routers are using the Cost to communicate.
  • Page 545 UMN:CLI User Manual V5808 time interval can be configured in several ways The following lists are sort of time interval which can be configured by user: • Hello Interval OSPF router sends Hello packet to notify existence of itself. Hello interval is that packet transmission interval.
  • Page 546 UMN:CLI User Manual V5808 Command Mode Description ip ospf dead-interval <1-65535> Configures a dead interval in the unit of second. ip ospf A.B.C.D dead-interval <1- 1-65535: interval value (default: 40) 65535> Interface no ip ospf dead-interval Sets a dead interval to the default value.
  • Page 547 UMN:CLI User Manual V5808 Configuration as above makes MTU consistently on same OSPF network; actual MTU value on interface itself will not be changed. On the other hands, if there are two routers which have different MTU, it can be participated with OSPF network through the configuration that skips the verification of MTU value when there is DD exchanging.
  • Page 548 UMN:CLI User Manual V5808 type. For example, if the network does not support multicasing it can be configured Non- broadcast type from Broadcast type, and NBMA network as a Frame relay can be broadcast network type. NBMA type network need virtual circuit to connect routers. But Point-to-multipoint type uses virtual circuit on part of network to save the management expenses.
  • Page 549: Ospf Area

    UMN:CLI User Manual V5808 To delete a configured router communicated by non-broadcast type, use the following command. Command Mode Description no neighbor A.B.C.D no neighbor A.B.C.D cost [<1-65535>] no neighbor A.B.C.D priority [<0-255>] Deletes a configured neighbor router of no neighbor A.B.C.D priority poll-interval [<1- Router NBMA type.
  • Page 550 Blocking the Transmission of Routing Information Between Area ABR transmits routing information between Areas. In case of not to transmit router information to other area, the V5808 can configure it as a blocking. First of all, use the access-list or prefix-list command to assign LIST-NAME. And use the following command to block the routing information on LIST-NAME.
  • Page 551 UMN:CLI User Manual V5808 A.B.C.D} filter-list prefix LIST- NAME {in | out} This command is only available for ABR. 11.2.6.4 Not So Stubby Area (NSSA) NSSA (Not So Stubby Area) is stub Area which can transmit the routing information to Area by ASBR.
  • Page 552 UMN:CLI User Manual V5808 • no-redistribution • no-summary • translator-role {candidate | never | always} To configure NSSA with one option, use the following command. Command Mode Description area {<0-4294967295> | A.B.C.D} nssa default- information-originate area {<0-4294967295> | A.B.C.D} nssa default- information-originate metric <0-16777214>...
  • Page 553 UMN:CLI User Manual V5808 • area <0-4294967295> nssa no-summary no-redistribution • area <0-4294967295> nssa translator-role {candidate | never | always} default- information-originate metric-type <1-2> no-redistribution To delete configured NSSA, use the following command. Command Mode Description no area {<0-4294967295> | A.B.C.D} nssa no area {<0-4294967295>...
  • Page 554 UMN:CLI User Manual V5808 no area {<0-4294967295> | A.B.C.D} nssa no-summary translator-role no-redistribution no area {<0-4294967295> | A.B.C.D} nssa translator-role [default-information-originate] no area {<0-4294967295> | A.B.C.D} nssa translator-role default-information-originate [no-redistribution] [no- summary] no area {<0-4294967295> | A.B.C.D} nssa translator-role no- redistribution [default-information-originate] [no-summary] no area {<0-4294967295>...
  • Page 555 UMN:CLI User Manual V5808 shortcut {default | disable | enable} To releases the configured shortcut option, use the following command. Command Mode Description area {<0-4294967295> A.B.C.D} shortcut {default Router Releases the configured shortcut option. disable | enable} 11.2.6.7 Stub Area Stub Area is that ABR is connected to Backbone Area.
  • Page 556 UMN:CLI User Manual V5808 11.2.6.9 Virtual Link In OSPF, all areas must be connected to a backbone area. If there is a break in backbone continuity, or the backbone is purposefully portioned, you can establish a virtual link. The virtual link must be configured in both routers.
  • Page 557 UMN:CLI User Manual V5808 To configure a virtual link with one option, use the following command. Command Mode Description area {<0-4294967295> | A.B.C.D} virtual-link A.B.C.D authentication [message-digest | null] area {<0-4294967295> | A.B.C.D} virtual-link A.B.C.D authentication-key KEY area {<0-4294967295> | A.B.C.D} virtual-link A.B.C.D message-digest-key KEY md5 KEY...
  • Page 558 UMN:CLI User Manual V5808 11.2.7 Default Metric OSPF finds metric based on interface bandwidth. For example, default metric of T1 link is 64, but default metric of 64K line is 1562. If there are plural lines in the bandwidth, you can view costs to use line by assigning metric to each line.
  • Page 559 <1- 1800> 11.2.9 Opaque-LSA Support Opaque-LSA is LSA Type-9, Type-10, Type-11. The V5808 enables Opaque-LSA as a default but it can be released by user. To release the enabled Opaque-LSA management, use the following command. Command...
  • Page 560 UMN:CLI User Manual V5808 route to OSPF network. Autonomous System Boundary router transmits route created externally to OSPF network. However, it does not create system default route. To have autonomous System Boundary router create system default route, use the following command.
  • Page 561 UMN:CLI User Manual V5808 • default-information originate metric-type <1-2> always • default-information originate route-map MAP-NAME metric <0-16777214> To delete the configuration, use the following command. Command Mode Description no default-information originate no default-information originate metric <0-16777214> no default-information originate metric-type <1-2>...
  • Page 562: External Routes To Ospf Network

    UMN:CLI User Manual V5808 To release the configuration, use the following command. Command Mode Description no timers spf Router Release the configuration. 11.2.13 External Routes to OSPF Network If other routing protocol redistribute into OSPF network, these routes become OSPF external routes.
  • Page 563: Ospf Distance

    UMN:CLI User Manual V5808 The following example shows how to configure it with more than 2 options: • redistribute {bgp | connected | kernel | rip | static | ospf <0-65535>} tag <0- 4294967295> [metric- type <1-2>] [route-map MAP-NAME] [metric <0-16777214>]...
  • Page 564: Host Route

    UMN:CLI User Manual V5808 The following example shows how to configure the distance with more than 2 options: • distance ospf external <1-255> inter-area <1-255> • distance ospf inter-area <1-255> intra-area <1-255> To make it as a default, use the following command.
  • Page 565: Blocking Routing Information

    V5808 11.2.17 Blocking Routing Information The V5808 can classify and restrict the routing information. To configure this function, sort the specific routing information in access-list first, and block the routing information in access-list. To block the routing information in access-list, use the following command.
  • Page 566: Ospf Monitoring And Management

    UMN:CLI User Manual V5808 tag [<0-4294967295>] specific tag 11.2.19 OSPF Monitoring and Management You can view all kinds of statistics and database recorded in IP routing table. These information can be used to enhance system utility and solve problem in case of trouble.
  • Page 567 UMN:CLI User Manual V5808 show ip ospf [<0-65535>] database {asbr- summary | external | network | router | summary | nssa-external | opaque-link | opaque-area opaque-as} A.B.C.D self- originate show ip ospf [<0-65535>] database {asbr- summary | external | network | router | summary nssa-externalㅣopaque-link...
  • Page 568 11.2.19.4 Limiting Number of Database The V5808 can limit the Number of Database to process in OSPF. For example, if a router connected with many of routers, it carries overload to process the database. Therefore, Limiting the Number of Database reduces the overload on system.
  • Page 569 UMN:CLI User Manual V5808 overflow database Assigns the number of LSA for internal route. <1-4294967294> [hard | soft] Router overflow database external Assigns the number of LSA for external route. <0-2147483647> <0-65535> When there is an overflow, hard configuration will stop the process, and soft configuration will send a caution message.
  • Page 570 UMN:CLI User Manual V5808 no debug ospf [all] no debug ospf events [abr | asbr | lsa | nssa | os | router | vlink] no debug ospf ifsm [events | status | timers] no debug ospf lsa [flooding |...
  • Page 571 UMN:CLI User Manual V5808 11.3 Open Shortest Path First Version 3 (OSPFv3) OSPF for IPv6 modifies the existing OSPF for IPv4 to support IPv6. The fundamentals of OSPF for IPv4 remain unchanged. Some changes have been necessary to accommodate the increased address size of IPv6 and the changes in protocol semantics between IPv4 and IPv6.
  • Page 572 UMN:CLI User Manual V5808 OSPFv3. no router ipv6 ospf [WORD] Disables OSPFv3 routing protocol. In case that more than two OSPFv3 processes are operated, a process number should be assigned. Normally, there is one OSPFv3 which is operating in one router.
  • Page 573 V5808 11.3.2 ABR Type Configuration The V5808 supports 3 types of OSPFv3 ABR which are Cisco type ABR (RFC 3509), IBM type ABR (RFC 3509), and standard RFC 2328 type. To configure ABR type of OSPFv3, use the following command.
  • Page 574 UMN:CLI User Manual V5808 • Retransmit Interval When router transmits LSA, it is waiting for approval information come from receiver. In this time, if there is no answer from receiver for configured time, the router trans- mits LSA again. Retransmit-interval is configuration of the time interval between transmission and retransmission.
  • Page 575 UMN:CLI User Manual V5808 ipv6 ospf transmit-delay Sets a transmit delay to the default value. [instance-id <0-255>] 11.3.3.3 OSPFv3 Priority Routers have each role to exchange the information on OSPFv3 network. DR (Designated Router) is one of essential role to get and transmit the route information in the same area.
  • Page 576 UMN:CLI User Manual V5808 id <0-255>] no ipv6 ospf network {broadcast | non- Deletes a selected network type for broadcast | point-to-multipoint | point-to-point} OSPFv3. [instance-id <0-255>] 11.3.4 Reference Bandwidth You can change the reference bandwidth value for the cost on OSPFv3 interfaces. Each interface on which OSPFv3 is enabled has a cost associated with it.
  • Page 577: Ospfv3 Area

    UMN:CLI User Manual V5808 255>] type. X:X::X:X: neighbor IPv6 address To delete a configured router communicated by non-broadcast type, use the following command. Command Mode Description no ipv6 ospf neighbor X:X::X:X [instance-id <0- Deletes a configured neighbor router of Interface 255>]...
  • Page 578 UMN:CLI User Manual V5808 11.3.6.2 Area Range In case of OSPF belongs to several Areas, Area routing information can be shown in one routing path. Like as above, various routing information of Area can be combined and summarized to transmit to outside.
  • Page 579 UMN:CLI User Manual V5808 11.3.6.4 Virtual Link In OSPFv3, all areas must be connected to a backbone area. If there is a break in backbone continuity, or the backbone is purposefully portioned, you can establish a virtual link. The virtual link must be configured in both routers.
  • Page 580 UMN:CLI User Manual V5808 To delete a configured virtual link, use the following command. Command Mode Description no area {A.B.C.D | <0-4294967295>} virtual-link A.B.C.D [instance-id] Router Deletes a configured virtual link. no area {A.B.C.D | <0-4294967295>} virtual-link A.B.C.D {hello-interval | retransmit-interval | dead-interval | transmit-delay} 11.3.7...
  • Page 581 UMN:CLI User Manual V5808 cost as a cost, metric type 2 always uses external cost value only. • always Transmits the default route to outside. • route-map Transmits specific routing information to assigned route which has MAP-NAME. The detail options for default route configuration are classified in 4 as above, and those configurations can be selected more than 2 options without order.
  • Page 582 UMN:CLI User Manual V5808 capability restart graceful Configures the Graceful Restart. Router no capability restart Releases the configuration. The following items are additional options for the Graceful Restart: • grace-period When OSPFv3 restarts, process is keeping status in graceful for the time configured as grace-period.
  • Page 583 UMN:CLI User Manual V5808 {A.B.C.D | all} no ipv6 ospf restart helper only-upgrade no ipv6 ospf restart helper only-reload no ipv6 ospf restart helper max-grace-period <1-1800> You can restart configured graceful for OSPFv3 in Privileged EXEC Enable mode, use the following command.
  • Page 584 UMN:CLI User Manual V5808 NAME To delete the configured external route transmission, use the following command. Command Mode Description redistribute kernel Router Deletes the configured external route transmission. connected | static | bgp } For efficient transmission of routing information, and to avoid non-matching between metric and OSPF routing protocol, use the default-matric command to assign metric about redistribute route.
  • Page 585 UMN:CLI User Manual V5808 Command Mode Description summary-address X:X::X:X/M Creates the aggregate addresses for OSPFv3. summary-address X:X::X:X/M Blocks routes that match the specified prefix/length not-advertise Router pair. summary-address X:X::X:X/M Configures the summary routing information with a tag <0-4294967295> specific tag To delete the specified aggregate addresses for the OSPFv3, use the following command.
  • Page 586 UMN:CLI User Manual V5808 Global Shows the information about a specific process ID in show ipv6 ospf WORD Router OSPFv3 protocol. To display the OSPFv3 database, use the following command. Command Mode Description show ipv6 ospf [WORD] database show ipv6 ospf [WORD] database {external |...
  • Page 587 11.3.14.4 Limiting Number of Database The V5808 can limit the Number of Database to process in OSPF. For example, if a router connected with many of routers, it carries overload to process the database. Therefore, Limiting the Number of Database reduces the overload on system.
  • Page 588 V5808 no max-concurrent-dd Router Deletes the configuration. <1-65535> 11.3.14.5 Displaying Debugging Information The V5808 uses debug command to find the reason of problem. Use the following command. Command Mode Description debug ipv6 ospf all Shows all the debugging information. Shows information about OSPF operation of OSPF...
  • Page 589 UMN:CLI User Manual V5808 Command Mode Description Enable show debugging ipv6 ospf Global Shows the debugging information of OSPFv3. Bridge 11.3.14.6 Displaying OSPFv3 Protocol Information To display OSPFv3 information, use the following command. Command Mode Description Enable Shows a current status of OSPFv3 protocol and its...
  • Page 590: Enabling Rip

    RIP v2 uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. The V5808 sends routing information and updates it every 30 seconds. This process is termed advertised. If a router does not receive an update from another router for 180 seconds or more, it marks the routes served by the non-updating router as being unusable.
  • Page 591 11.4.3 RIP Version Basically, the V5808 supports RIP version 1 and 2. However, you can configure to receive either RIP v1 type packets only or RIP v2 type packets only. To configure RIP version, use the following command. Command...
  • Page 592 UMN:CLI User Manual V5808 The preceding task controls default RIP version settings. You can override the routers RIP version by configuring a particular interface to behave differently. To control which RIP version an interface sends, perform one of the following tasks after opening Interface Configuration mode.
  • Page 593: Creating Available Static Route Only For Rip

    11.4.5 Redistributing Routing Information The V5808 can redistribute the routing information from a source route entry into the RIP tables. For example, you can instruct the router to re-advertise connected, kernel, or static routes as well as other routes established by routing protocol. This capability applies to all the IP-based routing protocols.
  • Page 594 UMN:CLI User Manual V5808 To delete the configuration for redistributing routing information in another router’s RIP table, use the following command. Command Mode Description redistribute {kernel connected | static | ospf | bgp} redistribute {kernel connected | static | ospf | bgp }...
  • Page 595 11.4.9.1 Filtering Access List and Prefix List The V5808 switch is able to permit and deny conditions that you can use to filter inbound or outbound routes by access-list or prefix-list. Use the distribute-list command to apply the access list to routes received from or forwarded to a neighbor.
  • Page 596: Disabling The Transmission To Interface

    UMN:CLI User Manual V5808 To block the route information based on matching access list or prefix list, use the following command. Command Mode Description distribute-list ACCESS-LIST {in | Apply a specific access list or prefix list to incoming or out} [INTERFACE] outgoing RIP route updates on interface in order to block the route.
  • Page 597 UMN:CLI User Manual V5808 out} <0-16> [INTERFACE] 11.4.10 Maximum Number of RIP Routes You can set the maximum number of RIP routes for using on RIP protocol. To set the maximum number of routes, use the following command. Command Mode Description Sets the maximum number of routes of RIP.
  • Page 598 If a key chain is not configured, plain text authentication can be performed using string command. The V5808 supports two modes of authentication on an interface for which RIP authentication is enabled: plain text authentication and MD5 authentication. The default authentication in every RIP v2 packet is plain text authentication.
  • Page 599: Restarting Rip

    Removes a configured period. [<1-65535>] 11.4.15 UDP Buffer Size of RIP RIP protocol exchanges the routing information between routers using UDP packets. The V5808 can be configured theses UDP packets buffer size, use the following command. Command Mode Description recv-buffer size <8196- Sets the UDP Buffer size value for using RIP.
  • Page 600 UMN:CLI User Manual V5808 databases. Information provided can be used to determine resource utilization and solve network problems. You can also discover the routing path your router’s packets are taking through the network. 11.4.16.1 Displaying RIP Protocol Information To display RIP information, use the following command.
  • Page 601 UMN:CLI User Manual V5808 no debug rip packet [recv | send] Disables a debugging of RIP packets. no debug rip packet [recv | send] detail To display the debugging information, use the following command. Command Mode Description Enable show debugging rip Global Shows the debugging information of RIP.
  • Page 602: Enabling Ripng

    UMN:CLI User Manual V5808 11.5 Routing Information Protocol Next Generation (RIPng) RIP (Routing Information Protocol) is the first routing protocol for IP. Because of the technical problems, new RIP, known as RIPv2 was developed. RIPng (Routing Information Protocol Next Generation), defined in RFC 2080, is an extension of RIPv2 for support of IPv6, the next generation Internet Protocol.
  • Page 603 UMN:CLI User Manual V5808 Command Mode Description Enables this interface to send the RIP route ipv6 rip send-packet information. Interface Disables this interface to send the RIP route no ipv6 rip send-packet information. To enable/disable receiving RIP route information through the specified interface, use the following command.
  • Page 604 11.5.5 Redistributing Routing Information The V5808 can redistribute the routing information from a source route entry into the RIP tables. For example, you can instruct the router to re-advertise connected, kernel, or static routes as well as other routes established by routing protocol. This capability applies to all the IP-based routing protocols.
  • Page 605 UMN:CLI User Manual V5808 As the needs of the case demand, you may also conditionally restrict the routing information between the two networks using route-map command. For more information, refer to 11.7 Configuring Route Map. 11.5.6 Metrics for Redistributed Routes The metrics of one routing protocol do not necessarily translate into the metrics of another.
  • Page 606 11.5.9.1 Filtering Access List and Prefix List The V5808 is able to permit and deny conditions that you can use to filter inbound or outbound routes by access-list or prefix-list. Use the distribute-list command to apply the access list to routes received from or forwarded to a neighbor.
  • Page 607 UMN:CLI User Manual V5808 To remove the filtering access list or prefix-list to incoming or outgoing RIP route Command Mode Description no distribute-list WORD {in | out} Removes the application of a specific access list or [INTERFACE] Router prefix list to incoming or outgoing RIP route updates on no distribute-list prefix PREFIX- interface in order to block the route.
  • Page 608 UMN:CLI User Manual V5808 Command Mode Description Forwards packets over multiple paths. maximum-paths <1-8> <1-8>: the numbers of multipath supported (defualt:1) Router no maximum-paths Deletes the configured number of parallel paths. 11.5.9.5 Offset List An offset list is the mechanism for increasing incoming and outgoing metrics to routes learned via RIP.
  • Page 609 Disables the split horizon mechanism. [poisoned] 11.5.13 UDP Buffer Size of RIP RIP protocol exchanges the routing information between routers using UDP packets. The V5808 can be configured theses UDP packets buffer size, use the following command. Command Mode Description recv-buffer-size <32768-...
  • Page 610 UMN:CLI User Manual V5808 no recv-buffer-size Restore the default value of UDP buffer size. 11.5.14 Metric Calculation Method RIPng uses hop count as its metric value. Hop count is the number of routers (number of hops) from the source router through which data must pass to reach the destination network.
  • Page 611 UMN:CLI User Manual V5808 11.5.15.2 Displaying Debugging Information To quickly diagnose problems, the debug command is useful for customers. To enable debugging of RIP routing transactions, use the following command. Command Mode Description Turns on all debugging options of changed RIP debug ipv6 rip [all] information.
  • Page 612 UMN:CLI User Manual V5808 11.6 Virtual Routing and Forwarding (VRF) Virtual Routing and Forwarding (VRF) is a feature that enables multiple instances of routing table within the single router at the same time. Since the routing tables are independent, the private IP address can be used without the confliction. In general it is utilized for VPN service to provide separate routing table for each customer’s network.
  • Page 613 UMN:CLI User Manual V5808 To create a VRF table, use the following command. Command Mode Description Creates a VRF table. ip vrf WORD Global WORD: VPN routing/forwarding instance name To delete the specified VRF table, use the following command. Command...
  • Page 614 UMN:CLI User Manual V5808 11.6.3.2 Router ID To create a router id, use the following command. Command Mode Description Creates a router ID. router-id A.B.C.D A.B.C.D: router identifier in IP address format no router-id [A.B.C.D] Removes a router ID. 11.6.3.3 VRF Designated Port To specify a designated port of a virtual router, use the following command.
  • Page 615 UMN:CLI User Manual V5808 information between the CE and the PE. The OSPF process sends the routing information that was advertised into the NSM. This is sent to the NSM server by the NSM-Protocol messaging protocol. Because the NSM message that is sent to the NSM server includes VRF-ID value, the routing information that is sent from the dynamic routing protocol to the NSM daemon makes an appropriate VRF routing table updated.
  • Page 616 UMN:CLI User Manual V5808 INTERFACE GATEWAY: IP gateway address INTERFACE: IP gateway interface name ip route vrf WORD A.B.C.D/M 1-255: distance value for this route null [<1-255>] A.B.C.D: source IP address ip route vrf WORD A.B.C.D/M { GATEWAY | null } src A.B.C.D ipv6 route vrf WORD X:X::X:X/M {X:X::X:X | INTERFACE} [<1-255>]...
  • Page 617 UMN:CLI User Manual V5808 connected routes kernel: display selected kernel routes ospf: display selected OSPF routes static: display selected static routes show ip route vrf WORD { A.B.C.D | Shows the specified IPv4/IPv6 address A.B.C.D/M } and IPv4/IPv6 prefix entries in the VRF show ipv6 route vrf WORD { X:X::X:X | routing table.
  • Page 618 UMN:CLI User Manual V5808 11.6.10 VRF Network Connection (PING) To check if your system is correctly connected to the network, use the ping command. For IP network, this command transmits a message to internet control message protocol (ICMP). ICMP is an internet protocol that notifies fault situation and provides information on the location where IP packet is received.
  • Page 619 UMN:CLI User Manual V5808 11.7 Configuring Route Map Route maps are used to redistribute routes between processes or for route health injection. To define a route map for use with supported feature, perform the following steps: Step1 Open Route-Map Configuration mode from Global Configuration mode to create a route map entry.
  • Page 620 UMN:CLI User Manual V5808 igp: local IGP incomplete: the origin of the path information is unknown or learned through other means match route-type external {type- Matches the route type. 1 | type-2} To delete the specified match criteria, use the following command.
  • Page 621 UMN:CLI User Manual V5808 additive: adds existing communities Deletes the matched communities from set comm-list {<1-99> | <100-199> | WORD } community attribute delete inbound/outbound update when applying route-map. set dampening [<1-45>] Sets route-flap dampening set dampening <1-45> <1-20000> <1-20000>...
  • Page 622 UMN:CLI User Manual V5808 no set dampening [<1-45>] no set dampening <1-45> <1-20000> <1-20000> <1-255> [<1-45>] no set extcommunity rt [AA:NN] no set extcommunity soo [AA:NN] no set ip next-hop [A.B.C.D] no set ipv6 next-hop [ X:X::X:X] no set ipv6 next-hop local [X:X::X:X ] no set local-preference [<0-4294967295>]...
  • Page 623: Configuring Ip Tunnels

    UMN:CLI User Manual V5808 11.8 Configuring IP Tunnels Your tunnel source IP address and destination IP address should be in the same VRF. You can also configure what VRF to use to look up the tunnel destination. This VRF should match the VRF of the tunnel source IP address.
  • Page 624 UMN:CLI User Manual V5808 Command Mode Description Removes the configured tunnel interface and all no interface tunnel Tunnel associated configurations. To enable debugging of tunnel, use the following command. Command Mode Description debug tunnel Enables tunnel debugging. Enable Tunnel no debug tunnel Disables tunnel debugging.
  • Page 625 UMN:CLI User Manual V5808 12 GPON Configuration Gigabit Passive Optical (GPON) technology has the active network elements OLT (Optical Line Termination) at the central office and ONU/ONT (Optical Network Unit / Termination) at the subscriber site. Typical GPON configuration consists of a single PON port at the OLT and a number of ONUs connected to it over a single fiber feeder.
  • Page 626 UMN:CLI User Manual V5808 Specifying OLT and ONU ID When specifying an OLT ID in the CLI, you can simply put the number in the form of PORT number such as 1, 2, 3, 4…7, 8. Multiple input is also possible, e.g. 1, 2, 3 or 3-4.
  • Page 627 UMN:CLI User Manual V5808 The following shows the main commands of GPON Configuration mode. SWITCH(config)# gpon SWITCH(gpon)# ? GPON configuration commands: clear Reset functions dba-profile Configure GPON DBA Profile debug Debugging functions To run exec commands in config mode exit...
  • Page 628 UMN:CLI User Manual V5808 12.1.1.1 OLT Description To specify or modify a description of an OLT, use the following command. Command Mode Description olt description DESCRIPTION Registers the OLT’s description. GPON-OLT no olt description Deletes the description of OLT. To display a description of an OLT, use the following command.
  • Page 629 UMN:CLI User Manual V5808 olt key-exchange stop Stops periodic process of encryption key exchange. To display the status of encryption mode or information of the encryption key exchange process, use the following command. Command Mode Description Enable Shows the status of encryption mode.
  • Page 630 (ONT) fault occurs by detecting the specific error signal. The auto ONU fault detecting mechanism is as follows: When detecting an error signal (an ONU fault) in a certain OLT, the V5808 generates a corresponding syslog message, and then disables the laser of each ONU currently connected to the OLT one by one for 60 seconds.
  • Page 631 UMN:CLI User Manual V5808 ONU’s laser permanently.) To display a current configuration of the auto ONU fault detection, use the following command. Command Mode Description Enable show olt signal-check OLT-ID Global Shows a current configuration of the auto ONU (ONT) GPON fault detection.
  • Page 632 If the power of ONU is turned off by user, this ONU is supposed to send the alarm message of dying-gasp to OLT. When the last ONU is deregistered from the V5808 after it generates an alarm by ONU dying-gasp event, we can regard that the link of this GPON port is down and it’s not the cable connection problem.
  • Page 633 12.1.10 OLT Anti-Spoofing When the V5808 learns the same MAC address from the two (or more) different ONUs on the same GPON, the system regards the latest ONU(s) as the fault operation, and make the ONU(s) block the inflow of sub-level MAC by MAC filtering. Through this anti-spoofing, the V5808 can prevent the malicious spoofing attack.
  • Page 634 UMN:CLI User Manual V5808 VID: VID To display the user configuration of the OLT anti-spoofing, use the following command. Command Mode Description Enable show olt anti-spoofing [OLT-ID] Global Shows the user configuration of the OLT anti-spoofing. GPON show olt anti-spoofing GPON-OLT To display the current OLT anti-spoofing status, use the following command.
  • Page 635 12.1.13 Downstream Traffic Control The V5808 provides the function to control the downstream traffic based on MAC address and VLAN ID by each OLT. Basically, the OLT system creates MAC table through MAC learning with the incoming traffic from ONU, and transmits the downstream traffic to GEM port with the MAC table information.
  • Page 636 [vid RANGE] per flow. If the V5808 is configured in the downstream GEM mapping mode per flow, you can configure downstream QoS mapping mode based on MAC address / VLAN ID and the mapping between queue and CoS value. To configure the downstream traffic control by QoS mapping, use the following command.
  • Page 637 UMN:CLI User Manual V5808 table. The traffic is not transmitted while the GEM port mapping mode is being changed due to user configuration. To display the configuration of downstream traffic control, use the following command. Command Mode Description Enable show olt ds-gem-mapping [OLT-...
  • Page 638 12.1.14 Multicast/Broadcast GEM Port Separation All the downstream multicast and broadcast flows from the V5808 are transmitted through a single GEM port ID. The multicast and broadcast flows need to be separated from each other to properly forward all broadcast/multicast traffic for multiple ONTs.
  • Page 639 UMN:CLI User Manual V5808 12.1.15 Configuring Port/TCONT Threshold When one GPON port is connected to a lot of ONTs with T-CONTs and GEM ports, you can specify the maximum numbers (threshold) of T-CONTs and GEM port count. So that an alarm is generated if a given threshold is exceeded.
  • Page 640 UMN:CLI User Manual V5808 disable} function. To configure ONU deactivation monitoring, use the following command. Command Mode Description olt deactive-monitor alarm-raise Sets the deactive ONU-raise percent. <1-99> 1-99: (default: 30%) Sets the deactive ONU-clear percent. If the current deactive-monitor alarm- percent becomes higher than this value, the alarm clear<1-99>...
  • Page 641 UMN:CLI User Manual V5808 olt ber ds-interval <1000-10000> Specifies the monitor direction and interval of the bit [olt ber sd-threshold <4-9>] [olt error ratio. ber sf-threshold <3-8>] [olt ber ds-interval: Downstream BER interval from OLT to us-interval <1000-10000>] us-interval: Upstream BER interval from ONU to OLT olt ber us-interval <1000-10000>...
  • Page 642 UMN:CLI User Manual V5808 Sends the specific (ONT reset) PLOAM when OLT olt omcc-recovery mode reset detects the OMCC problem. Disables the OMCC recovery monitoring function with olt omcc-recovery disable ONU deactivation process. Disabling OMCC recovery monitoring with olt omcc-recovery disable command provides the data transmission service between OLT and ONU without ONU deactivation process even if an error occurs on the OMCC.
  • Page 643 Shows the information of active/inactive GPON OLT show olt status [OLT-ID] GPON IDs. GPON-OLT The following is an example of displaying active/inactive OLT IDs of the V5808. SWITCH(gpon)# show olt status ------------------------------------------------------------ OLT_ID | Status | Protect | Distance | FEC mode(DS/US)
  • Page 644 UMN:CLI User Manual V5808 The Received Signal Strength Indication (RSSI) is a measurement of the power present in a received radio signal. The RSSI functionality in a newly released GPON OLT transceiver helps the operators monitor the received optical signal strength from each ONU (ONT).
  • Page 645: Mac Address

    UMN:CLI User Manual V5808 OLT : 1 Downstream Upstream ------------------------------------------------------------------------------ (Pon counter) Pon valid eth packets 1829234499 Pon CPU packets 136329 Pon ploams 108609 19201764 Pon invalid packets (perfomance monitoring counter) Rx valid packets 1830563926 Rx error packets CPU valid packets...
  • Page 646 UMN:CLI User Manual V5808 Command Mode Description Adds the static MAC addresses of ONU. olt add-mac ONU-ID MACADDR GPON-OLT ONU-ID: ONU ID (1-128) or serial number VLAN GEM-PORT GEM-PORT: GEM port ID To display a MAC address of the ONUs (ONTs) connected to a current OLT, use the following command.
  • Page 647 This section describes how to manage an ONU (ONT). The V5808 provides the centralized remote ONU (ONT) management concept, so you can manage every remote ONU (ONT) connected to the V5808 without any local configuration for the ONUs (ONTs). 12.2.1...
  • Page 648 (ONTs) periodically. OLT registers a specific ONU which replies to OLT with its serial number. The V5808 can allocate ONU-ID to an ONU which sends a valid serial number to OLT. When ONU with the specific serial number is activated, it is assigned the allocated ONU-ID.
  • Page 649 UMN:CLI User Manual V5808 because it allows up to 24 characters to store information. Similarly, ONU is registered first in the OLT with a specific and uniquelogical ID and this one must be also locally configured to ONU via ONT’s Web UI. The logical ID includes two parts: an LOID (Logical ONU ID) and a Password.
  • Page 650 UMN:CLI User Manual V5808 Shows the ONU information registered in manual mode in case of configured as LOID mode. ONU-ID: ONU ID (1 to 128) or ONU serial number Shows the ONU information registered in manual and show onu active all auto mode in case of configured as LOID mode.
  • Page 651 UMN:CLI User Manual V5808 Active | manual | DSNW68149d98 | 30303030303030310000 | 0:00:01:02 SWITCH(config-gpon-olt[1])# show onu active 7-11 ---------------------------------------------------------------------------------- OLT | ONU | STATUS | MODE | Serial No. | Password(R-ID) | Link uptime ---------------------------------------------------------------------------------- Active | manual | DSNW68149d98 | 30303030303030310000 |...
  • Page 652 UMN:CLI User Manual V5808 Upon registering an ONU automatically, the registration mode of the ONU will be changed to the manual mode. Note that when you use this command, the registration mode of the ONUs that are already registered in the auto mode will be changed to the manual mode as well.
  • Page 653: Assigning Ip Address

    UMN:CLI User Manual V5808 sfu} ONU-ID: ONU ID (1 to 128) or ONU serial number hgu: home gateway unit sfu: single family unit no onu service-mode [ONU-ID] Deletes the configure network service mode of ONU. To display the configured ONU service mode, use the following command.
  • Page 654 UMN:CLI User Manual V5808 Configures the IP host service ID, IP address and gateway address for an ONU. onu static-ip ONU-ID ip-host ONU-ID: ONU ID (1 to 128) or ONU serial number SERVICE-ID A.B.C.D/M SERVICE-ID: IP host service ID A.B.C.D GPON-OLT A.B.C.D/M: IP address...
  • Page 655 UMN:CLI User Manual V5808 video | wifi} UNI-PORTs {enable | ONU-ID: ONU ID (1 to 128) or ONU serial number disable} eth/pots/ces/virtual-eth/Video: Ethernet / POTS / CES / virtual Ethernet/Video/Wi-Fi UNI-PORT: UNI port number To see the admin status of the ONU (ONT) UNI, use show onu uni-status command.
  • Page 656 12.2.7 Source MAC address Monitoring The V5808 can monitor its source MAC table to find a defective ONUs (ONTs). Auto ONU (ONT) blocking function can be used to manage and troubleshoot the defective ONU- related problems. To enable/disable OLT for source MAC address monitoring, use the following command.
  • Page 657 UMN:CLI User Manual V5808 60-65535: expire time (second) olt srcmac-monitor disable Disables the source MAC address monitoring. To force the state of a blocked ONU ID to change to unblocked state, use the following command. Command Mode Description Forces the state of a blocked ONU ID to change to...
  • Page 658 POTS-NUMBER: POTS port number GPON-OLT NUMBER: phone number DISPLAY: display information no onu voip-sip ONU-ID phone- Deletes the configured data parameters of VoIP user. number pots POTS-NUMBER For the enhanced system security, the V5808 can use authentication for a VoIP user to...
  • Page 659 UMN:CLI User Manual V5808 have access to the softswitch. To configure the authentication user name and password for VoIP user to have access to softswitch, use the following command. Command Mode Description Configures an user ID and password for a specified VoIP device connected to an ONU to have access to softswitch.
  • Page 660 UMN:CLI User Manual V5808 For the details of how to create and configure the VoIP service, see 12.4.6 VoIP Service Configuration (POTS UNI). 12.2.10.2 ONT Termination ID Configuration The attribute specifies the base string for the MGC (H.248) physical termination ID(s) for the ONT.
  • Page 661 UMN:CLI User Manual V5808 {enable | disable} onu uni-description ONU-ID eth Adds the description on the specified ONU UNI UNI-PORT DESCRIPTION Ethernet port. no onu uni-description ONU-ID Deletes the description of the specified ONU UNI eth UNI-PORT Ethernet port. To display the status of ONU UNI Ethernet port, use the following command.
  • Page 662 UMN:CLI User Manual V5808 show onu video-status update GPON Shows the ONU’s RF video update status. GPON- show onu video status OLT_ID Shows the ONU’s RF video status. ONU_IDs 12.2.12 ONU Loop Detect Configuration A loop may occur when double paths are used for the link redundancy between switches and one sends unknown unicast or multicast packet that causes endless packet floating on the LAN.
  • Page 663 UMN:CLI User Manual V5808 1-30: aging time measured in days onu inactive aging-time disable Sets the ONU aging time to be unlimited (default) To display the configured aging time for the inactive ONUs, use the following command. Command Mode Description...
  • Page 664 UMN:CLI User Manual V5808 Enable show onu ani optic-module-info Global OLT-ID ONU-ID [test-action] GPON Shows the operating parameters of the GPON module, GPON-OLT including the optical characteristics. show onu ani optic-module-info GPON-OLT ONU_ID Enable show onu uni optic-module-info Global OLT-ID ONU-ID PORT...
  • Page 665 UMN:CLI User Manual V5808 {netmask <1-48> | cos <0-7>} dst-ip: Destination IP dst-mac: Destination MAC onu cos-remarking ONU_ID src-ip: Source IP {src-ip dst-ip} A.B.C.D src-mac: Source MAC {netmask <1-32> | cos <0-7>} cos-remarking ONU_ID cos-remarking ONU_ID {src-mac | dst-mac} XX:XX:XX:XX:XX:XX Deletes the configured CoS remarking.
  • Page 666 UMN:CLI User Manual V5808 NAME single-tagged-frame profile to ONU ID and configures the inner tag TABLE treat inner vid {<0-4094> | treatment for filtered single-tagged frames. copy-inner } cos {<0-7> | copy- inner | dscp-to-pbit} extended-vlan ONU-ID Associates the extended VLAN tagging operation...
  • Page 667 Shows the information of rate-limit configured for ONU GPON show onu rate-limit [ONU_ID] GPON-OLT The following is an example of NAT mode synchronized with GPON OLT. V5808(config-gpon-olt[8])# show running-config gpon-olt 8 gpon-olt 8 discover-serial-number start 5 onu add 1 DSNW6308f340 auto-learning onu nat-mode 1 enable...
  • Page 668 UMN:CLI User Manual V5808 onu-profile 1 H660_HSI onu rate-limit 1 mapper 1 gemport 1-2 upstream 64 onu rate-limit 1 mapper 1 gemport 2 downstream 256 128 V5824G(config-gpon-olt[8])# V5824G# show onu rate-limit 8 1 ---------------------------------------------------------------------- OLT | ONU | MAPPER | GEM | DIRECTION | SIR | PIR...
  • Page 669 UMN:CLI User Manual V5808 12.2.21 ONU Authentication from RADIUS Server You can use the RADIUS authentication process when an ONU (ONT) is activated and it attempts to access an OLT. The RADIUS Access-Request message is sent from the OLT to the RADIUS server. If the ONU is valid, the RADIUS server consults a database of ONUs to find the ONU which matches the authentication attributes in the connection request.
  • Page 670 UMN:CLI User Manual V5808 (c) Vendor-Specific Vendor ID: IANA registered DASAN (6296) (d) Vendor-Specific Attribute: OLT_ID, ONT_ID, Model Name, Serial Number, Firmware Version info. (e) Message-Authenticator: KEY and MD5 (a) Dasan-Gpon-Onu-Profile (b) Dasan-Gpon-Onu-Static-Ip (c) Dasan-Gpon-Onu-Voip-Sip-Number (d) Dasan-Gpon-Onu-Voip-Sip-Auth (e) Dasan-Gpon-Onu-Uni-Port-Admin (f) Dasan-Gpon-Onu-VoIP-Mgc-Msg-Id...
  • Page 671 UMN:CLI User Manual V5808 Specifies an IP address with key value and UDP port of onu auth radius-server host RADIUS server. A.B.C.D key WORD [auth-port A.B.C.D: RADIUS server IP address <0-65535>] WORD: RADIUS authorization key value 0-65535: UDP port (default: 1812) Sends the ONU’s serial number-based or its model...
  • Page 672 UMN:CLI User Manual V5808 12.2.22 CFM OAM for ONU Management CFM OAM is now standardized as IEEE 802.1ag. CFM contains the concepts of maintenance domains and supports autonomy for customers, providers, operators, etc. It enables end-to-end management of connectivity and services, each domain can run its own OAM.
  • Page 673 UMN:CLI User Manual V5808 CFM OAM Features The important features provided by 802.1ag CFM OAM are: • Supports Connectivity Check Message (CCM), LinkTrace (LTM) and LoopBack messages (LBM) • Helps service providers assign selected subscribers restricted access to manage all functions for their own domains •...
  • Page 674 UMN:CLI User Manual V5808 Command Mode Description Specifies a MIP and its level on the VLAN ID. ONU_ID: ONU ID (1 to128) or ONU serial onu cfm ONU_ID mip level LEVEL vlan number VLANS GPON-OLT LEVEL: MIP’s level (0 to 7)
  • Page 675 UMN:CLI User Manual V5808 PORT } mep-id MEP_ID {rmep-id <1- MEP_ID: MEP ID 8191> | rmac MACADDR} [ttl <1-64>] 1-8191: destination MEP ID MACADDR: destination MAC address to send LBMs/LTMs NUMBER: the number of attempts for sending LBMs (default:1) 1-64: LBM/LTM’s TTL value (default: 64) To display the information of CFM OAM, use the following command.
  • Page 676 UMN:CLI User Manual V5808 12.2.24 ONU Firmware Upgrade The provides the remote ONU (ONT) upgradeability. This feature allows the system administrators not to offer the local service for a single ONU (ONT) upgrade at the customer premise. To upgrade an ONU (ONT) successfully, you need to download a new ONU (ONT) firmware in the system.
  • Page 677 UMN:CLI User Manual V5808 (2) Downloading Firmware to ONU (Upgrading) To download the specified ONU (ONT) firmware in the ONU (ONT), use the following command. Command Mode Description Downloads ONU (ONT) firmware in the ONU (ONT). onu firmware download ONU-ID...
  • Page 678 UMN:CLI User Manual V5808 To display the status of ONU firmware, use the following command. Command Mode Description Enable Shows the status of ONU firmware. show onu firmware version OLT- Global OLT-ID: GPON port number ID [ONU-IDs] GPON ONU-ID: ONU ID (1-128) or ONU serial number...
  • Page 679 UMN:CLI User Manual V5808 To display the list of the downloaded ONU (ONT) firmware in OLT, use the following command. Command Mode Description Enable Global Shows the downloaded ONU (ONT) firmware list in show onu firmware-list GPON OLT. GPON-OLT (2) Upgrading Firmware To upgrade an ONU (ONT) with the downloaded ONU (ONT) firmware, use the following command.
  • Page 680 UMN:CLI User Manual V5808 [ONU-IDs] Enable show onu bootloader version Global Shows the ONU bootloader version information. OLT-ID [ONU-IDs] GPON OLT-ID: GPON port number ONU-ID: ONU ID (1-128) or ONU serial number show onu bootloader version GPON-OLT [ONU-IDs] • Changing Active Firmware If an ONU supports the dual OS, you can change the active firmware using the following command.
  • Page 681 UMN:CLI User Manual V5808 To display the list of the downloaded ONU (ONT) firmware in OLT, use the following command. Command Mode Description Enable Global Shows the downloaded ONU (ONT) firmware list in show onu firmware-list GPON OLT. GPON-OLT (2) Auto Upgrade Configuration (on GPON Configuration mode) To configure the auto upgrade for ONU, use the following command.
  • Page 682 UMN:CLI User Manual V5808 --------------------------------------------------------------------------------- G_ONU_DALLAS_22_0_8_33.bin | TFTP | 10.55.2.4 | XXX | XXXX To specify the execution condition of ONU auto upgrade configuration above, you should specify a target version of ONU firmware with (or without) exclude option. Through the target version and the option, auto upgrade execution condition is determined.
  • Page 683 UMN:CLI User Manual V5808 To see the ONU model name, use show onu model-name command. (See 12.2.25 Displaying ONU Information) • Retry Count for Auto Upgrade The retry count argument specifies how many times to retry the auto upgrading of ONU if the first attempt fails.
  • Page 684 UMN:CLI User Manual V5808 (6) Displaying Auto-upgrade Configuration To display the ONU auto upgrade configuration, use the following command. Command Mode Description show onu auto-upgrade info Shows a progress of ONU auto-upgrade. Enable Global Shows a list of ONU model names configured to be...
  • Page 685 UMN:CLI User Manual V5808 SWITCH(gpon)# show onu auto-upgrade firmware --------------------------------------------------------------------------------- Model Firmware Name Version Status --------------------------------------------------------------------------------- H645 | G_ONU_DALLAS_22_0_8_33.bin | 22.1.8.33 | Download Complete To display the status of ONU firmware, use the following command. Command Mode Description Enable Shows the status of ONU firmware.
  • Page 686 UMN:CLI User Manual V5808 GPON Shows the number of active ONUs connected to a show onu active count [OLT-ID] specified GPON port. Shows the registered ONU (ONT) information. show onu active [ONU-ID] ONU-ID: ONU ID (1 to 128) or ONU serial number...
  • Page 687 UMN:CLI User Manual V5808 To display the IGMP group list of ONU (ONT), use the following command. Command Mode Description Enable show onu igmp-group-list OLT- Global ID ONU-ID Shows the current IGMP group list of the ONU. GPON ONU-ID: ONU ID (1 to 128) or ONU serial number...
  • Page 688 UMN:CLI User Manual V5808 GPON show onu system-status ONU-ID GPON-OLT Enable show onu video status OLT-ID Global ONU-ID Shows the ONU’s RF video status. GPON show onu video status ONU-ID GPON-OLT To display the status of ONU supporting Power over Ethernet (PoE) feature, use the following command.
  • Page 689 OLT. The following basic configurations are available for the H640 series ONTs only. If you use other ONTs from the different vendors, not DASAN Network Solutions, the IOP (Interoperability) test should be performed. 12.2.26.1...
  • Page 690 UMN:CLI User Manual V5808  Download ONT OS file to OLT  Upgrade ONT with the downloaded OS  Check out the upgrade result  Reboot the ONT. The ONT will be restarted with "Default-OS (NewVersion)". 12.2.26.2 Pre-settings for Traffic Profile (Step1)
  • Page 691 UMN:CLI User Manual V5808 sla maximum 4096 apply create  multicast-profile V501 igmp tag-control add vid 501 cos 0 igmp access-list vid 501 dst-ip start 224.0.0.1 end 239.255.255.255 gem 4094 apply create  extended-vlan-tagging-operation V200 downstream-mode enable untagged-frame 1 treat inner vid 200 cos 0 tpid 0x8100 apply create ...
  • Page 692 UMN:CLI User Manual V5808 12.2.26.3 Traffic Profile Configuration (Step2) The following command lines show a sample config of traffic profile corresponding to the sample scheme. You can find out which configurations are required for ONT's VoIP and data service through each annotation.
  • Page 693 (ip-host-config ip address static, it is required to configure DNS. Otherwise, it is set In case of to the DASAN-specified value, by default, which may cause to limit any service.  1) to be associated to IP host Create a VoIP service (voip-service 1).
  • Page 694 UMN:CLI User Manual V5808 12.2.26.4 ONU Profile & IP Host Configuration (Step3) The following command lines show a sample config for OLT port corresponding to the sample scheme above. OLT(gpon)# show running-config create  onu-profile traffic-profile TRAFFIC apply OLT(config-gpon-olt[2])# show running-config gpon-olt 2...
  • Page 695 UMN:CLI User Manual V5808 MAC Address : 00:d0:cb:d6:8b:38 10.45.33.11  Config IP Config Mask : 255.255.0.0 10.45.1.254  Config Gateway Config Primary DNS : 168.126.63.1 Config Secondary DNS : 0.0.0.0 Host name --------------------------------------------------------------- OLT : 2, ONU : 2, Host :...
  • Page 696 UMN:CLI User Manual V5808 associated with this generic status portal. The generic status portal ME uses two attributes which are status and config to convey status and configuration from a non-OMCI managed domain to the OMCI. Each of these attributes uses an XML document to present this information.
  • Page 697 UMN:CLI User Manual V5808 NAME: ONU profile name Step 5 To update GSP information, use the following command. Command Mode Description Updates GSP. onu gsp update {status | GPON- ONU_ID: ONU ID (1 to128) or ONU serial config} ONU_ID number In case of enable status, whenever the information in the table changes, GSP will be automatically updated according to Step 2 avc-report rate settings.
  • Page 698 UMN:CLI User Manual V5808 <PONTrafficStatus PONMode="GPON">up</PONTrafficStatus> <DeviceInfo> <ModelName>H660GW</ModelName> <SystemMacAddress>00:d0:cb:00:38:88</SystemMacAddress> <LANMacAddress>00:d0:cb:00:38:8f</LANMacAddress> <SystemUpTime>4 hour/5 min/56 sec</SystemUpTime> </DeviceInfo>...
  • Page 699 UMN:CLI User Manual V5808 12.3 ONU Profile Fig. 12.4 ONU Profile provides the easy and efficient management solution for various service environments with the ONU profile. The ONU profile is a collection of configurations for the operation of an ONU (ONT). You can manage all ONUs connected to an OLT by simply applying the configured profile to ONUs without any local configuration.
  • Page 700 UMN:CLI User Manual V5808 To modify an existing ONU profile, use the following command. Command Mode Description Modifies an ONU profile. onu-profile NAME modify GPON NAME: ONU profile name To delete a created ONU profile, use the following command. Command...
  • Page 701 UMN:CLI User Manual V5808 To configure a polling interval and count for rogue ONT, use the following command. Command Mode Description Specifies a polling interval and count for rogue ONT. rogue onu polling [<10-60000> 10-60000: polling interval value (unit: millisecond) <1-250>]...
  • Page 702 UMN:CLI User Manual V5808 The ONU periodically sends the loop-detecting packet to all the ports with a certain interval, and then if the loop-detecting packet is received, the switch performs a pre- defined behavior. To enable/disable the loop detection, use the following command.
  • Page 703: Igmp Configuration

    UMN:CLI User Manual V5808 To set the threshold of ONU memory in use, use the following command. Command Mode Description Sets the threshold of ONU memory in the unit of memory-usage threshold <0- percent (%). 100> ONU-Profile 0-100: ONU memory in use no memory-usage threshold Deletes the configured threshold of ONU memory.
  • Page 704 UMN:CLI User Manual V5808 IGMP rate limiting restricts the number of IGMP messages from ONUs within this ONU- profile. To configure the upstream IGMP rate limit of ONUs, use the following command. Command Mode Description Sets the maximum number of upstream IGMP messages.
  • Page 705: Cpu Packet Limit

    UMN:CLI User Manual V5808 VALUE: tx-bias threshold value (0∼ 131 mA) Configures the voltage threshold and sends the configured threshold value to ONUs. The ONUs ani-voltage threshold {low monitors the change of values and sends voltage VALUE [high VALUE] | high...
  • Page 706 UMN:CLI User Manual V5808 To block/forward new source MAC address frame when MAC table is full, use the following command. Command Mode Description Forwards new source MAC address frame when ONU mac-full policy forward MAC table is full. ONU-Profile Blocks new source MAC address frame when ONU mac-full policy drop MAC table is full.
  • Page 707 UMN:CLI User Manual V5808 “Remote failure”, “Local failure”) from ONT. IP-Path Management To configure the ONT provisioning feature in GPON-OLT Configuration mode and specify a FTP server and GPON provisioning file, use the following command. Command Mode Description Sets an user name and password to access FTP server...
  • Page 708 UMN:CLI User Manual V5808 You can configure ONT provisioning in both ONU-Profile and GPON-OLT Configuration modes. The configuration in GPON-OLT mode has higher priority in the system. To display the GPON provisioning configuration for each ONT, use the following command.
  • Page 709 UMN:CLI User Manual V5808 12.3.2.14 Applying Traffic & PM Profile To add/delete the user-defined Traffic profile to a specified ONU profile, use the following command. Command Mode Description Adds the existing Traffic profile to ONU profile. traffic-profile NAME NAME: Traffic profile name...
  • Page 710 UMN:CLI User Manual V5808 to a specified VID with tag. 1-4094: VLAN ID 0-7: CoS value Sets the policy of VLAN tagging for downstream frame. UNI-PORT vlan- keep: keeps forwarding the incoming tagged frame operation ds-oper {keep from OLT to UNI.
  • Page 711 UMN:CLI User Manual V5808 12.3.3.5 Activating Administration for Ethernet UNI To enable/disable the administration of the Ethernet UNI port, use the following command. Command Mode Description uni eth UNI-PORT port-admin Enables/disables the administration of Ethernet UNI ONU-Profile {enable | disable} port on the specified ONU.
  • Page 712 UMN:CLI User Manual V5808 Command Mode Description Applies an ONU profile to specified ONUs. onu-profile ONU-IDs NAME ONU-IDs: ONU ID (1 to 128) or ONU serial number NAME: ONU profile name GPON-OLT Releases an ONU profile from connected ONUs. no onu-profile ONU-IDs ONU-ID: ONU ID (1 to 128) or ONU serial number 12.3.6...
  • Page 713 UMN:CLI User Manual V5808 snmp trap-host A.B.C.D [port <1-65535>] Specifies an SNMP trap v1 host. ONU-Profile no snmp trap-host Deletes a SNMP trap v1 host. 12.3.9 Displaying ONU profile To display a configured ONU profile, use the following command. Command...
  • Page 714 UMN:CLI User Manual V5808 12.4 Traffic Profile Fig. 12.5 Traffic Profile The provides the easy and efficient management solution for various service models that are comprised of MAC bridging and 802.1p mapping functionality using the traffic profile. There are two major layer 2 functions available: MAC bridging and 802.1p mapping. MAC bridging is described in IEEE 802.1D.
  • Page 715 UMN:CLI User Manual V5808 To modify an existing traffic profile, use the following command. Command Mode Description Modifies the existing traffic profile. traffic-profile NAME modify GPON NAME: traffic profile name The OMCI and service model of MAC bridging and 802.1p mapping functionality must be supported by the ONUs (ONTs).
  • Page 716 UMN:CLI User Manual V5808 PIR_VALUE: PIR bandwidth range of 0 to 2147483584 no gemport GEM-PORT-RANGE rate-limit upstream Deletes the configured rate limit of GEM port ID. downstream } You should configure GEM port count for mapper before setting the rate limit for GEM port.
  • Page 717 UMN:CLI User Manual V5808 12.4.3.1 Max Host To configure the max host for a MAC bridge service profile, use the following command. Command Mode Description Traffic- Sets the maximum number of hosts. max-hosts <0-255> Bridge 0-255: maximum MAC number (0: unlimited)
  • Page 718 UMN:CLI User Manual V5808 Command Mode Description Connects a MAC bridge service profile with a mapper ani mapper MAPPER_ID Traffic- MAPPER_ID: 1 to 32, IEEE802.1p mapper ID Bridge Disconnects a mapper ID from the MAC bridge service no ani mapper MAPPER_ID profile.
  • Page 719 UMN:CLI User Manual V5808 mac-filter {ip4-mcast | ip6-mcast| ip4-bcast | rarp | ipx | net-beui | Enables the MAC filtering function according to the apple-talk | bridge-manage | arp | protocol type for ANI-side bridge port. pppoe} Traffic Bridge-ANI no mac-filter {ip4-mcast | ip6-...
  • Page 720 UMN:CLI User Manual V5808 command. Command Mode Description Enables a VLAN tagging filtering function of UNI-side port. vlan-filter [vid <1-4094>] allow: forwards the untagged frames to UNI-side port untagged {allow | discard} Traffic discard: blocks the untagged frames to UNI-side port...
  • Page 721 UMN:CLI User Manual V5808 Command Mode Description Applies the configured Rate-limit profile to specified rate-limit profile NAME UNI port. Traffic NAME: Rate-limit profile name Bridge-UNI Removes the Rate-limit profile from connected UNI no rate-limit profile port. For the details of how to create and configure the Rate-limit profile, see 12.12 Rate-limit...
  • Page 722 UMN:CLI User Manual V5808 Activating Administration for UNI To enable/disable the administration of the ONU (ONT) UNI port, use the following command. Command Mode Description Traffic port-admin {enable | disable} Enables/disables the administration of UNI port. Bridge-UNI To see the admin status of the ONU (ONT) UNI, use show onu uni-status command.
  • Page 723 UMN:CLI User Manual V5808 12.4.3.7 IP-host Service Link To link an IP-host service to MAC bridge service profile, use the following command. Command Mode Description Links an IP-host service to MAC bridge service profile. link ip-host-config SERVICE-ID SERVICE-ID: IP-host service ID (1 to 32)
  • Page 724 UMN:CLI User Manual V5808 12.4.4 T-CONT Mode Transmission containers (T-CONTs) are used for the management of upstream bandwidth in PON section of the TC layer. T-CONTs dynamically receive grants, identified by Alloc- ID, from the OLT. A single T-CONT can carry GEM traffic with various service classes. It...
  • Page 725 UMN:CLI User Manual V5808 To delete the T-CONT ID, use the following command. Command Mode Description Traffic- no tcont TCONT_ID Deletes the configured T-CONT ID. Profile 12.4.4.1 GEM Port Configuration To specify the GEM ports (priority queue) per T-CONT by mapping between T-CONT and GEM port, use the following command.
  • Page 726 UMN:CLI User Manual V5808 12.4.4.4 Displaying T-CONT Information To display the information of T-CONT, use the following command. Command Mode Description Enable show tcont-id OLT-ID [ONU-ID] Global Shows the information of T-CONT ID of OLT. show onu tcont OLT-ID GPON show tcont [ONU-ID] Shows the information of T-CONT allocation for ONU.
  • Page 727 UMN:CLI User Manual V5808 ipv6 primary X:X::X:X Specifies the primary/secondary DNS IPv6 address on [secondary X:X::X:X] the host. no dns Deletes the configured DNS IP address. no ipv6 dns Deletes the configured DNS IPv6 address. 12.4.5.3 VLAN Tagging Operating To configure a VLAN tagging operation on the host, use the following command.
  • Page 728 UMN:CLI User Manual V5808 12.4.5.5 IPv6 Configuration To configure the IPv6 DHCP client mode, use the following command. Command Mode Description Sets the DHCPv6 client mode using non-temporary ipv6 dhcp client na Traffic- address. IP-host Sets the DHCPv6 client mode using the stateless ipv6 dhcp client stateless address.
  • Page 729 UMN:CLI User Manual V5808 12.4.5.8 TDM Service Link To link the TDM service to the host, use the following command. Command Mode Description Links the TDM service to the host. link tdm-service SERVICE_ID Traffic- SERVICE_ID: TDM service ID (1 to 8)
  • Page 730 UMN:CLI User Manual V5808 Fig. 12.7 VoIP Service Architecture The supports the VoIP service management with two modes based on the managed models above. To configure VoIP service management mode, use the following command. Command Mode Description Sets VoIP service management mode.
  • Page 731 UMN:CLI User Manual V5808 Whenever an ONU is deployed with the IP-path managed VoIP service, the OLT should assign the URL of a VoIP configuration file to communicate with the ONU VoIP client. The provides an authentication method for ONUs to have access to the VoIP configuration server.
  • Page 732 UMN:CLI User Manual V5808 To specify the impedance for the POTS UNI, use the following command. Command Mode Description Specifies the impedance for the specified POTS UNI. 600: 600 Ohm (default) 900: 900 Ohm 750: C1=150 nF, R1=750 Ohm, R2=270 Ohm...
  • Page 733 UMN:CLI User Manual V5808 12.4.6.5 Protocol Type Configuration To perform the configuration for protocol type-based service that is offered from an IP host, use the following command. Command Mode Description Specifies port number that offers UDP/TCP/TLSP/protocol-type service and the value of udp port PORT tos TOS the TOS field of the IPv4 header.
  • Page 734 UMN:CLI User Manual V5808 12.4.7.2 Framing Structure To specify the framing structure, use the following command. Command Mode Description framing { extend-superframe | superframe | Specifies framing structure. unframed | g-704 | jt-g-704 | basic-g-704 | Traffic-CES (mandatory for DS1 interfaces) basic-crc4 | basic-ts16 | basic-crc4-ts16 } 12.4.7.3...
  • Page 735: Line Type

    UMN:CLI User Manual V5808 12.4.7.5 DS1 Mode To specify the mode of DS1, use the following command. Command Mode Description Specifies the mode of DS1. ds1-mode connect ds1-cpe line- ds1-cpe: DS1 CPE (loopback: smart jack) length { short | long }...
  • Page 736 UMN:CLI User Manual V5808 Applying TDM Pseudowire Profile In order to configure the TDM service, you need to connect TDM pseudowire profile. To connect TDM pseudowire profile to the current TDM service, use the following command. Command Mode Description Connects TDM pseudowire profile.
  • Page 737: Management Mode

    UMN:CLI User Manual V5808 To display the list information of source MAC addresses for TDM pseudowire of ONU, use the following command. Command Mode Description show onu tdm-pw source- Enable/Global/GPON mac OLT-ID ONU-ID Shows the list of source MAC addresses for TDM pseudowire of the specified ONU.
  • Page 738 UMN:CLI User Manual V5808 | bcast}] 12.4.10 Video Return Path Mode RF return path technology enables the pay-per-view and video-on-demand services that are simply offered over traditional MSO (Multiservice Operator) infrastructure. In order to configure video RF return path service, you need to create a Video return service ID.
  • Page 739 UMN:CLI User Manual V5808 stage-13: Randomizer stage 13 preload (Bit 0) 12.4.11 Creating a GEM Port Network CTP The GEM port Network CTP profile manages the upstream traffic identified by the GEM Port-ID. Each GEM port is identified by a port ID uniquely. The port ID ranges from 0 to 32.
  • Page 740 UMN:CLI User Manual V5808 12.4.13 Adding/Applying Traffic Profile If you want to apply a created traffic profile to an ONU profile, open ONU Profile Configuration mode, where you can add the traffic profile. SWITCH(config-traffic-pf[AAA])# apply SWITCH(config-traffic-pf[AAA])# exit SWITCH(gpon)# onu-profile BB create...
  • Page 741 UMN:CLI User Manual V5808 To display the VLAN filter configured on the specific Traffic profile, use the following command. Command Mode Description Enable Shows the VLAN filter configured on the specified show traffic-profile NAME vlan- Global Traffic profile. filter GPON...
  • Page 742 UMN:CLI User Manual V5808 12.5 DBA Profile You need to open DBA Profile Configuration mode to set the bandwidth allocation and ONU status reporting mode. 12.5.1 Creating DBA Profile To create/delete/modify a DBA profile, use the following command. Command Mode Description Creates a DBA profile.
  • Page 743 UMN:CLI User Manual V5808 If there are a “non-assured” T-CONT and “best-effort” T-CONT, the “non-assured” T- CONT takes precedence over the other one to be allocated the remained bandwidth by OLT. To delete the configured bandwidth allocation policy of DBA profile, use the following command.
  • Page 744 UMN:CLI User Manual V5808 12.6 Extended VLAN Tagging Operation Profile You can configure the ONU’s extended VLAN tagging operation. In order to configure the operation, you need to create an extended VLAN tagging operation profile. To create the profile, use the following command.
  • Page 745 UMN:CLI User Manual V5808 considered as a last resort for frames that do not match any other applicable rule. Best practice dictates that these entries not be deleted; however, they can be modified to produce the desired default behaviour. 15, x, x, 15, x, x, x, (0, 15, x, x, 15, x, x)
  • Page 746 UMN:CLI User Manual V5808 To configure the filtering for single-tagged frames, use the following command. Command Mode Description Configures the received single-tagged frames to be filtered by the provided values concerning inner tag. vid any: do not filter on the inner VID.
  • Page 747 UMN:CLI User Manual V5808 12.6.1.2 Configuration for Double-tagged Frame Treatment To create the mapping table to configure the double-tagged frame treatment, use the following command. Command Mode Description Creates the mapping table to configure the double- double-tagged-frame TABLE tagged frame treatment.
  • Page 748 UMN:CLI User Manual V5808 To configure the treatment of filtered double-tagged frames, use the following command. Command Mode Description Configures the treatment of filtered double-tagged frames. treat {remove {single | double} | remove single: removes one tag (the outer tag is discard-frame} stripped from double-tagged frames.)
  • Page 749 UMN:CLI User Manual V5808 To configure the filtering for untagged frames, use the following command. Command Mode Description filter ether-type {ipoe | pppoe | Configures the received untagged frames to be filtered Untagged- arp | ipv6-ipoe} by the provided option.
  • Page 750 UMN:CLI User Manual V5808 12.6.2 TPID Configuration To configure the specific TPID value for operations on the input (filtering) side and output (tagging) side of the table, use the following command. Command Mode Description Configures the specific TPID value for operations on...
  • Page 751 UMN:CLI User Manual V5808 12.6.5 Displaying Extended VLAN Tagging Operation Profile To display a configured Extended VLAN tagging operation profile, use the following command. Command Mode Description Shows the configured extended vlan tagging operation show running-config extended- profile. vlan-tagging-operation [NAME] NAME: Extended VLAN tagging operation profile name To display the information of current profile, use the following command.
  • Page 752 UMN:CLI User Manual V5808 12.7 VoIP Profile 12.7.1 OMCI Management Configuration The GPON system enables multi-vendor interoperability between OLT and ONT. The OMCI specification addresses the ONT configuration management, fault management and performance management for GPON system operation and for several services including voice services.
  • Page 753 UMN:CLI User Manual V5808 12.7.1.2 VoIP Media Configuration To specify fax mode, use the following command. Command Mode Description fax-mode {passthru | t-38} VoIP-Profile Specifies fax mode. To configure codec negotiation with codec type, packet period and silence suppression, use the following command.
  • Page 754 UMN:CLI User Manual V5808 To configure the maximum depth of the jitter buffer, use the following command. Command Mode Description Specifies the maximum depth of the jitter buffer associated with this service. jitter-buffer-max VALUE VALUE: 0-65535, maximum depth of jitter buffer (unit:...
  • Page 755 UMN:CLI User Manual V5808 To enable/disable RTP piggyback events, use the following command. Command Mode Description rtp-piggyback-event {enable Enables/disables RTP piggyback events. (default: VoIP-Profile disable} disable) To enable/disable handling of tones via RTP tone events, use the following command. Command...
  • Page 756 UMN:CLI User Manual V5808 12.7.1.6 DTMF Digit Configuration To configure DTMF digit power levels, use the following command. Command Mode Description Specifies the power level of DTMF digits that may be generated by the ONT toward the subscriber set. It is a...
  • Page 757 UMN:CLI User Manual V5808 When a three-way call is established, the audio mixing can be perfomed by media server or client (ONT). With the media server, audio mixing is performed for all active calls at the server and it sends the audio stream using one audio channel to the client. In case of client, it mixes audio locally and thus achieves three-way calling without assistance from the media server.
  • Page 758 UMN:CLI User Manual V5808 ADDRESS: SIP proxy server IP address or URI no proxy-server Deletes the configured address of SIP proxy server. To specify an outbound SIP proxy server, use the following command. Command Mode Description Configures IP address or URI of outbound SIP proxy server outbound-proxy-server for SIP signalling messages.
  • Page 759 UMN:CLI User Manual V5808 0-65535: SIP registration expiration time (unit: second, default: 3600) To configure the SIP re-registration head start time, use the following command. Command Mode Description Specifies the time prior to timeout that causes the SIP rereg-head-start-time <0-65535>...
  • Page 760 UMN:CLI User Manual V5808 expired time of DNS cache. permanent: SIP Stack DNS Cache is updated when VoIP configurations are changed SIP timers define the transaction expiration timers, retransmission intervals when UDP is used as a transport, and the lifetime of dynamic TCP connection. The retransmission and expiration timers correspond to the timers defined in RFC 3261.
  • Page 761 UMN:CLI User Manual V5808 show onu voip sip-detail-oper GPON-OLT ONU-ID 12.7.2.3 VoIP Application Service The configuration of VoIP application service defines the attributes of calling features used in conjunction with a VoIP line service, such as CID, call waiting, call transfer, call presentation, direct connect, and etc.
  • Page 762 UMN:CLI User Manual V5808 no call-progress-transfer Disables all the features for call processing. To configure the call presentation features, use the following command. Command Mode Description Enables each feature for call presentation. (default: disabled) call-present {splash-ring | dial- splash-ring: message waiting indication splash ring...
  • Page 763 UMN:CLI User Manual V5808 12.7.2.4 VoIP Feature Access Codes The configuration of VoIP feature access codes defines administrable feature access codes for the VoIP subscriber. To configure VoIP feature access codes, use the following command. Command Mode Description feature cancel-call-wait VALUE...
  • Page 764 UMN:CLI User Manual V5808 To configure a release timer, use the following command. Command Mode Description Configures a release timer. The value 0 specifies that release-timer <0-255> VoIP-SIP the ONT is to use its internal default. (unit: second, default: 10) To configure a ROH timer, use the following command.
  • Page 765 UMN:CLI User Manual V5808 TABLE_TOKEN: the token used by the VoIP service to process dial plans (This ASCII string is typically delimited by ":".) no dial-plan table TABLE_ID Deletes the created dial plan table. The dial plan created by dial-plan table command can be applied only if you configure the dial plan format as H.248 by using dial-plan format h248 command.
  • Page 766 UMN:CLI User Manual V5808 To specify the maximum retry time for MGC transactions, use the following command. Command Mode Description Configures maximum retry time mgc max-retry-time <0-65534> transactions. VoIP-MGC 0-65534: maximum retry time (unit: second) no mgc max-retry-time Deletes the configured maximum retry time.
  • Page 767 UMN:CLI User Manual V5808 12.7.5 Displaying VoIP Information To display the information of VoIP profiles, use the following command. Command Mode Description Global GPON Shows the information of VoIP profiles. show voip-profile [NAME] GPON-OLT NAME: VoIP profile name VoIP-profile To display VoIP service and VoIP line status information, use the following command.
  • Page 768 UMN:CLI User Manual V5808 12.8 TDM Pseudowire Profile Pseudowire emulation is a method for transmitting any Layer 2 protocol over PSNs (Packet Switched Networks). It allows a seamless connection between two network elements by creating logical links, or virtual tunnels, across the packet network. In TDM...
  • Page 769 UMN:CLI User Manual V5808 12.8.2 Basic Service Type To specify the basic service type, use the following command. Command Mode Description Specifies the basic service type, either a transparent bit pipe or an encapsulation that recognizes the underlying structure of the payload.
  • Page 770 UMN:CLI User Manual V5808 12.8.5 Payload Encapsulation Delay To configure the payload encapsulation delay (only for structured service), use the following command. Command Mode Description Defines the delay time (which corresponds to number of 125 microsecond frames) to be encapsulated in each pseudowire packet.
  • Page 771 UMN:CLI User Manual V5808 12.8.7.1 Clock Reference To specify the frequency of the common timing reference, use the following command. Command Mode Description Specifies the frequency of the common timing TDM-PW- reference. rtp-clock-reference VALUE Profile VALUE: in multiples of 8 kHz (for example, input 1 means 8 kHz) (default: 1) 12.8.7.2...
  • Page 772 UMN:CLI User Manual V5808 12.8.7.4 RTP Synchronization Source To configure the RTP synchronization source, use the following command. Command Mode Description Specifies the RTP synchronization source in the TDM to PSN direction. rtp-sync-source payload VALUE payload VALUE: for the payload channel...
  • Page 773 UMN:CLI User Manual V5808 12.8.10 Displaying TDM Pseudowire Information To display the information of TDM pseudowire profiles, use the following command. Command Mode Description Global GPON Shows the information of TDM pseudowire profiles. show tdm-pw-profile [NAME] GPON-OLT NAME: TDM pseudowire profile name...
  • Page 774 UMN:CLI User Manual V5808 12.9 Pseudowire Maintenance Profile The pseudowire maintenance profile permits the configuration of pseudowire service exception handling. The pseudowire maintenance profile primarily affects the alarms declared by the subscribing pseudowire termination. And also, the settings of a pseudowire maintenance profile affect the pseudowire performance monitoring history.
  • Page 775 UMN:CLI User Manual V5808 12.9.3 Jitter Buffer Desired Depth To specify the desired nominal fill depth of the playout buffer in the PSN to TDM direction, use the following command. Command Mode Description Specifies the desired nominal fill depth of the playout jitter-buffer-desired-depth buffer in the PSN to TDM direction.
  • Page 776 UMN:CLI User Manual V5808 malformed-packet: malformed packet misconnect-packet-declaration- misconnect-packet: misconnect packet policy <1-100> 1-100: anomaly rate (unit: integer percentage) buffer-over-underrun-clear- Defines anomaly rate that causes policy <0-99> corresponding alarm to be cleared. If no more than this density of anomalies occurs during the alarm clear loss-packet-clear-policy <0-99>...
  • Page 777 UMN:CLI User Manual V5808 To configure the R-bit transmit set policy, use the following command. Command Mode Description Defines the number of consecutive lost packets that causes the transmitted R-bit to be set in the TDM to r-bit-transmit-set-policy VALUE PSN direction, indicating lost packets to the far end.
  • Page 778 UMN:CLI User Manual V5808 12.9.9 Displaying Pseudowire Maintenance Information To display the information of pseudowire maintenance profiles, use the following command. Command Mode Description Global GPON Shows the information of pseudowire maintenance show pw-maintenance-profile GPON-OLT profiles. [NAME] NAME: pseudowire maintenance profile name...
  • Page 779 UMN:CLI User Manual V5808 12.10 Performance Monitoring (PM) Profile Performance Monitoring (PM) profile is used for the traffic statistics of all ONUs (ONTs) collected by an OLT. The ONT conceptually has only two storage bins: a current accumulator and a history bin. The current accumulator is used to store data collected for the current 15-minute interval.
  • Page 780 UMN:CLI User Manual V5808 To enable/disable the performance monitoring (PM) function to collect the traffic statistics of the configured ANI port, use the following command. Command Mode Description Enables PM function to collect the data of ANI port’s pm aniport counters that are FCS error and the downstream GEM frame discarded due to buffer overflow or etc.
  • Page 781 UMN:CLI User Manual V5808 To enable/disable the performance monitoring (PM) function to collect the traffic statistics of the configured GEM NCTP ports, use the following command. Command Mode Description Enables the PM function to collect the counters of the pm gem-nctp configured GEM port network CTP for a specified traffic profile.
  • Page 782 UMN:CLI User Manual V5808 12.10.5 Displaying ONU Traffic Statistics To display the traffic statistics of an ONU applied by PM profile, use the following command. Command Mode Description Enable show statistics OLT-ID Global Shows the information of ONU counters collected via...
  • Page 783 UMN:CLI User Manual V5808 12.10.6 Sample Configuration For the sample configuration, see “Configuration Example 2” in 12.15 Sample Configuration.
  • Page 784: Igmp Configurations

    UMN:CLI User Manual V5808 12.11 Multicast Profile The multicast profile is used for ONU (ONT) to handle the multicast traffic using a IGMP- related commands. Multicast profile managed entity organizes data associated with multicast management at subscriber ports of 802.1 bridges, including 802.1p mappers when the provisioning model is mapper-based rather than bridge-based.
  • Page 785 UMN:CLI User Manual V5808 Specifies a querier address. igmp querier address A.B.C.D A.B.C.D: querier address igmp querier query-interval <0- Specifies a general query interval. 3600> 0-3600: query interval (default: 125 seconds) igmp querier max-response-time Specifies a maximum query response time.
  • Page 786 UMN:CLI User Manual V5808 Command Mode Description igmp immediate-leave disable no igmp robustness-variable no igmp querier address no igmp querier query-interval no igmp querier max-response-time no igmp {access-list | static-access-list} all no igmp access-list vid {untagged | VLANS} Multicast- Deletes a specified IGMP configuration dst-ip start A.B.C.D end A.B.C.D [bw VALUE |...
  • Page 787 UMN:CLI User Manual V5808 Command Mode Description Applies the configured Multicast profile to a specified multicast-profile NAME UNI port. Traffic NAME: Multicast profile name Bridge-UNI Deletes the connections between a multicast profile no multicast-profile and this UNI port. 12.11.5 Displaying Multicast Information To display the information of Multicast profiles, use the following command.
  • Page 788 UMN:CLI User Manual V5808 To modify an existing multicast access list, use the following command. Command Mode Description multicast-access-list NAME Modifies the existing multicast access list. GPON modify NAME: multicast access list name 12.11.6.2 IGMP Access List Configuration To configure the multicast access list, use the following command.
  • Page 789 UMN:CLI User Manual V5808 12.11.6.4 Applying Multicast Access List To apply the configured multicast access list to a specified ONU ID, use the following command. Command Mode Description Applies the dynamic/static multicast access control list table to ONU ID. It discards the IGMP join message from ONTs based on the access list.
  • Page 790 UMN:CLI User Manual V5808 12.12 Rate-limit Profile Basically the rate-limit configuration can be set in ‘Traffic Profile’. And the ‘Traffic Profile’ is assigned to ONT through 'ONU Profile'. When the service rate should be changed, you don’t need to modify all the 'Traffic Profiles' in the OLT. If an OLT has so many 'Traffic Profiles', you can create 'Rate-limit profile' and all Traffic Profiles can share this 'Rate-limit profile'.
  • Page 791 UMN:CLI User Manual V5808 12.12.3 Saving Rate-limit Profile After configuring an Rate-limit profile, you need to save the profile with the following command. Command Mode Description Rate-limit apply Saves an Rate-limit profile configuration. Profile Whenever you modify an rate-limit profile, you should apply the changes again using the apply command.
  • Page 792 UMN:CLI User Manual V5808 12.12.5 Displaying Rate-limit Profile To display the information of Rate-limit profile, use the following command. Command Mode Description Enable Global show rate-limit-profile GPON Shows the information of Rate-limit profile. [NAME] GPON-OLT NAME: Rate-limit profile name Rate-limit-...
  • Page 793 UMN:CLI User Manual V5808 12.13 ONU Service Profile provides numerous functions to customize a GPON network with many CLI commands and parameters. Each ONU profile can be designed with several profiles such as T-CONT, DBA and VoIP to meet the requirement of data bandwidth, VoIP access and the advanced security issues.
  • Page 794 UMN:CLI User Manual V5808 12.14 GPON Debug To enable debugging of all GPON or a specific feature of GPON, use the following command. Command Mode Description Enables GPON debugging. all: all GPON features func: GPON function db: GPON database debug gpon { all | func | db | comm.: GPON communication...
  • Page 795 UMN:CLI User Manual V5808 12.15 Sample Configuration Configuration Example 1 SWITCH(config)# gpon SWITCH(gpon)# voip-profile voip create SWITCH(config-voip-profile[voip])# codec-nego 1 codec pcma packet-period 10 silence-suppression 1 SWITCH(config-voip-profile[voip])# codec-nego 2 codec pcmu packet-period 10 silence-suppression 1 SWITCH(config-voip-profile[voip])# codec-nego 3 codec g729 packet-period 10...
  • Page 796 UMN:CLI User Manual V5808 SWITCH(gpon)# traffic-profile g-60a create SWITCH(config-traffic-pf[g-60a])# tcont 1 SWITCH(config-traffic-pf[g-60a]-tcont[1])# gemport 1/1-1/4 SWITCH(config-traffic-pf[g-60a]-tcont[1])# dba-profile sr_100m SWITCH(config-traffic-pf[g-60a]-tcont[1])# exit SWITCH(config-traffic-pf[g-60a])# tcont 2 SWITCH(config-traffic-pf[g-60a]-tcont[2])# gemport 2/1-2/4 SWITCH(config-traffic-pf[g-60a]-tcont[2])# dba-profile sr_100m SWITCH(config-traffic-pf[g-60a]-tcont[2])# exit SWITCH(config-traffic-pf[g-60a])# tcont 3 SWITCH(config-traffic-pf[g-60a]-tcont[3])# gemport 4/1-4/4 SWITCH(config-traffic-pf[g-60a]-tcont[3])# dba-profile sr_100m SWITCH(config-traffic-pf[g-60a]-tcont[3])# exit...
  • Page 797 UMN:CLI User Manual V5808 SWITCH(config-traffic-pf[g-60a])# ip-host-config 1 SWITCH(config-traffic-pf[g-60a]-iphost[1])# ip address dhcp SWITCH(config-traffic-pf[g-60a]-iphost[1])# vlan-operation us-oper overwrite 100 0 SWITCH(config-traffic-pf[g-60a]-iphost[1])# vlan-operation ds-oper remove SWITCH(config-traffic-pf[g-60a]-iphost[1])# link voip-service 1 SWITCH(config-traffic-pf[g-60a]-iphost[1])# exit SWITCH(config-traffic-pf[g-60a])# ip-host-config 2 SWITCH(config-traffic-pf[g-60a]-iphost[2])# ip address static SWITCH(config-traffic-pf[g-60a]-iphost[2])# dns primary 168.123.0.1 secondary 168.123.0.2...
  • Page 798 UMN:CLI User Manual V5808 SWTICH(config-pm-profile[PM_PROFILE])# apply SWTICH(config-pm-profile[PM_PROFILE])# exit SWITCH(gpon)# onu-profile ONU_PROFILE create SWITCH(config-onu-profile[ONU_PROFILE])# traffic-profile TRAFFIC_PROFILE SWITCH(config-onu-profile[ONU_PROFILE])# pm-profile PM_PROFILE SWITCH(config-onu-profile[ONU_PROFILE])# apply SWITCH(config-onu-profile[ONU_PROFILE])# exit SWITCH(gpon)# SWITCH(gpon)# gpon-olt 2 SWITCH(config-gpon-olt[2])# show onu statistics ------------------------------------------------------------------------------ OLT : 2 ONU : 1 ------------------------------------------------------------------------------ Enabled PM : gemport aniport...
  • Page 799 UMN:CLI User Manual V5808 13 Web-based Management The provides a web-based Graphical User Interface (GUI), but it is disabled to ensure maximum security. The system maintenance and L2/L3/GPON management operation that can be performed through the CLI can also be performed through the GUI. To enable...
  • Page 800 UMN:CLI User Manual V5808  System Management - Base Information, System Conf, Timer Setting, Login Information, DNS, Process, SSH Remote, Hardware Information, SFP, DMI, Slot, Upgrade  Management - Fault, SNMP, Syslog, RMON  Bridge - Filter, LAG, Port Security, Network, Port Control, QinQ, STP Manager, VLAN ...
  • Page 801: System Software Upgrade

    UMN:CLI User Manual V5808 14 System Software Upgrade For the system enhancement and stability, new system software may be released. Using this software, the can be upgraded without any hardware change. You can simply upgrade your system software with the provided upgrade functionality via the CLI.
  • Page 802: Boot Mode Upgrade

    UMN:CLI User Manual V5808 SWITCH# default-os os1 SWITCH# write memory SWITCH# reload Do you want to save the system configuration? [y/n]y Do you want to reload the system? [y/n]y Broadcast message from admin (ttyp0) (Fri Aug 18 15:15:41 2006 +0000):...
  • Page 803 UMN:CLI User Manual V5808 To configure an IP address, use the following command. Command Mode Description ip A.B.C.D Configures an IP address. Boot Shows a currently configured IP address. To configure a subnet mask, use the following command. Command Mode Description netmask A.B.C.D...
  • Page 804 UMN:CLI User Manual V5808 Step 3 Download the new system software via TFTP using the following command. Command Mode Description Downloads the system software. load {os1 os2} A.B.C.D os1 | os2: the area where the system software is stored Boot FILENAME A.B.C.D: TFTP server address...
  • Page 805: Ftp Upgrade

    UMN:CLI User Manual V5808 Step 4 Reboot the system with the new system software using the following command. Command Mode Description Reboots the system with specified system software. reboot [os1 | os2] Boot os1 | os2: the area where the system software is stored If the new system software is a current standby OS, just exit the boot mode, then the interrupted system boot will be continued again with the new system software.
  • Page 806 UMN:CLI User Manual V5808 Step 5 Exit the FTP client using the following command. Command Mode Description Exits the FTP client. To reflect the downloaded system software, the system must restart using the reload command! The following is an example of upgrading the system software of the using the FTP provided by Microsoft Windows XP in the remote place.
  • Page 807: Manual Upgrade

    UMN:CLI User Manual V5808 14.4 ONU Upgrade The provides the remote ONU (ONT) upgradeability. This feature allows the system administrators not to offer the local service for a single ONU (ONT) at the customer premise. To upgrade an ONU successfully, you need to download a new ONU firmware in the system.
  • Page 808: Auto Upgrade

    UMN:CLI User Manual V5808 Step 5 Verify the upgraded ONU firmware’s information using the following command. Command Mode Description Enable Global show onu firmware-list Shows the ONU firmware list in the system. GPON GPON-OLT show firmware version GPON-OLT Shows an ONU firmware version.
  • Page 809 UMN:CLI User Manual V5808 Step 4 To perform the auto upgrade of OLT firmware when the version of two firmware is different, regardless of the lastest firmware version, use the following command. Command Mode Description auto-upgrade version- Enables/disables the ONU auto upgrade function match all { enable | disable} without verification of the firmware version.
  • Page 810 UMN:CLI User Manual V5808 To display the configured upgrade timeout and related information, use the following command. Command Mode Description Enable Shows the configured total time for ONU firmware show onu upgrade timeout Global download. GPON...
  • Page 811 UMN:CLI User Manual V5808 15 Abbreviations Access Control List Advanced Encryption Standard Address Resolution Protocol Any Source Multicast Border Gateway Protocol Bootstrap Router Communauté Européenne CIDR Classless Inter Domain Routing Command Line Interface CLNS Connectionless Network Service Class of Service...
  • Page 812 UMN:CLI User Manual V5808 Identifier International Electrotechnical Commission IEEE 802 Standards for Local and Metropolitan Area Networks IEEE 802.1 Glossary, Network Management, MAC Bridges, and Internetworking IEEE Institute of Electrical and Electronic Engineers IETF Internet Engineering Task Force IFSM Interface Finite State Machine...
  • Page 813 UMN:CLI User Manual V5808 NBMA Non-Broadcast Multi-Access Network Element Network Entity Title NFSM Neighbor Finite State Machine Network Time Protocol Outgoing Interface Optical Line Termination Optical Network Terminal Operating System OSPF Open Shortest Path First Personal Computer Protocol Data Unit...
  • Page 814 UMN:CLI User Manual V5808 SNTP Simple Network Time Protocol Shortest Path Tree Secure Shell Source-Specific Multicast Spanning Tree Protocol Software Topology Change Notification Transmission Control Protocol Tree Information Base TFTP Trivial FTP Type of Service Time-To-Live User Datagram Protocol User Manual...

Table of Contents