Raisecom ISCOM2600G-HI (A) Series Configuration Manual page 225

Table of Contents

Advertisement

Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Step
2
3
4
Command
Raisecom(config)#ethernet
ring-id
ring-protection
{
interface-type interface-
number
| port-channel
channel-number
} west
interface-type interface-
{
number
| port-channel
channel-number
} [ node-type
rpl-owner rpl { east |
west } ] [ not-revertive ]
vlan-id
[ protocol-vlan
vlan-list
[ block-vlanlist
Raisecom(config)#ethernet
ring-id
ring-protection
interface-type interface-
{
number
| port-channel
channel-number
} west
{
interface-type interface-
number
| port-channel
channel-number
} node-type
rpl-neighbour rpl { east|
west } [ not-revertive ]
vlan-id
[ protocol-vlan
vlan-list
[ block-vlanlist
Raisecom(config)#ethernet
ring-id
ring-protection
interface-type interface-
{
number
| port-channel
channel-number
} west
interface-type interface-
{
number
| port-channel
channel-number
} [ not-
revertive ] [ protocol-vlan
vlan-id
] [ block-vlanlist
vlan-list
]
Raisecom(config)#ethernet
ring-protection
ring-id
string
Raisecom(config)#ethernet
ring-protection
ring-id
version { 1 | 2 }
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
Create a protection ring and configure the
east
node as the RPL Owner.
port-
The east and west interfaces
port-
cannot be the same one.
]
]
Create a protection ring, and configure
east
the node as the RPL Neighbour.
port-
port-
]
]
Create a protection line, and configure
east
the node as the protection forwarding
node.
port-
port-
(Optional) configure a name for the
name
protection ring. Up to 32 bytes are
available.
(Optional) configure the protocol
version. The protocol version of all nodes
on a protection ring should be identical.
In protocol version 1, protection rings are
distinguished based on the protocol
VLAN. Therefore, you need to configure
different protocol VLANs for protection
rings.
We recommend configuring different
protocol VLANs for protection rings
even if protocol version 2 is used.
4 Ring network protection
Description
194

Advertisement

Table of Contents
loading

Table of Contents