Zte ZXR10 2918E Configuration Manual

Zte ZXR10 2918E Configuration Manual

Zxr10 2900e series easy-maintenance secure switch
Hide thumbs Also See for ZXR10 2918E:
Table of Contents

Advertisement

ZXR10 2900E Series
Easy-maintenance Secure Switch

Configuration Guide

Version: 2.05.10
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZXR10 2918E and is the answer not in the manual?

Questions and answers

Summarization of Contents

About This Manual
Purpose
Explains the manual's suitability for ZXR10 2900E series switches and their models.
What Is in This Manual
Lists the chapters included in the ZXR10 2900E series switch user manual.
Chapter 1 System Overview
Switching Capability
Details the layer-2 line-speed switching, throughput, packet discarding, and delay characteristics.
Reliability
Discusses redundancy backup, STP/RSTP/MSTP, LACP, and ZESR for fast protection switching.
Service Characteristics
Covers VLAN classification, VPN, port location technology, and L2 multicast for IPTV.
Security Control
Details user-level and equipment-level security functions like 802.1x, MAC/IP/VLAN/PORT combination, port isolation, DHCP monitoring, CPU security, SSH/SNMPv3.
Chapter 1 System Overview (Continued)
QoS Guarantee
Explains QoS applications, classification, and queue scheduling algorithms like SP and WRR.
Management Modes
Lists management modes including SNMP, ZXNM01, CLI, and Web.
Chapter 1 System Overview (Continued)
VLAN complying with 802.1q
Details VLAN support, stacking (QINQ/SQinQ), GVRP, MAC table capability, port security, STP, ZESR, LACP, multicast, 802.1x, VBAS, DHCP, DAI, ACL, QoS, and SFLOW.
Chapter 2 Usage and Operation
2.1 Configuration Modes
Explains various configuration modes available for the ZXR10 2900E based on network connection.
2.2 Command Modes
Details the different command modes (User, Global, SNMP, Layer 3, File System, NAS, etc.) and their hierarchy.
2.3 Common Command Parameters
Lists and describes common command parameters used in the ZXR10 2900E, such as port lists and VLAN IDs.
2.4 Usage of Command Line
Explains how to use the command line, including online help, command abbreviations, and functional keys.
Chapter 3 System Management
3.1 File System Operation
Covers directory operations like creation, deletion, renaming, and listing files in the FLASH memory.
3.2 Configuring the TFTP Server
Details steps to configure a TFTP server for backing up and restoring switch version and configuration files.
3.3 Configuring the FTP Server
Explains configuring an FTP server, like FileZilla, for version file backup and restoration.
3.4 Importing and Exporting Configuration
Describes commands to export the current system configuration to a file and import it later.
Chapter 3 System Management (Continued)
3.5 Backing Up and Recovering Files
Explains how to back up the running configuration to FLASH memory and recover it after a restart.
3.6 Downloading Software Version Automatically
Details the automatic software version download function for undeployed devices using DHCP and TFTP servers.
3.7 Configuring Automatic Saving of a Configuration File
Explains how to configure automatic saving of configuration files to a TFTP server at specified intervals.
3.8 Software Version Upgrade
Provides procedures for upgrading switch software versions, including steps for normal and abnormal system states.
Chapter 4 Service Configuration
4.1 Management Configuration
Covers mode switching, console attributes, global information, and switch user access configuration.
4.2 Port Configuration
Details configuring port parameters like auto-negotiation, duplex mode, rate, line detection, and basic port settings.
4.3 PoE Configuration
Explains Power over Ethernet (PoE) features, including supported standards and configuration of power supply.
4.4 Port Mirroring
Describes port mirroring to monitor data packets on specific ports for maintenance and analysis.
Chapter 4 Service Configuration (Continued)
4.5 VLAN Configuration
Covers Virtual Local Area Network (VLAN) configuration, including tagged/untagged ports, trunks, and protocol VLANs.
4.6 MAC Table Operation
Details MAC table operations like addition/deletion, aging time, filtering, learning control, and alarm control.
4.7 LACP Configuration
Explains Link Aggregation Control Protocol (LACP) for binding physical links to increase bandwidth and provide redundancy.
4.8 IGMP Snooping Configuration
Covers IGMP Snooping to efficiently manage multicast traffic, restricting it to interested ports within a VLAN.
Chapter 4 Service Configuration (Continued)
4.9 MLD Snooping Configuration
Details MLD Snooping for managing multicast traffic in IPv6 environments, similar to IGMP Snooping.
4.10 IPTV Configuration
Explains configuration for IPTV services, including channel, package, and preview attributes.
4.12 ACL Configuration
Details Access Control List (ACL) configuration, including types like basic, extended, L2, hybrid, and global ACLs.
4.13 QoS Configuration
Explains Quality of Service (QoS) configuration, covering rate limiting, shaping, queue scheduling, and priority mapping.
Chapter 4 Service Configuration (Continued)
4.14 PVLAN Configuration
Describes Private VLAN (PVLAN) technology for port isolation within VLANs, supporting isolated, promiscuous, and community ports.
4.15 Layer 2 Protocol Transparent Transmission Configuration
Covers Layer 2 protocol transparent transmission for protocols like 802.1x, STP, LACP, and GVRP.
4.16 IPv4 Layer 3 Configuration
Details IPv4 Layer 3 functions including interface configuration, static routing, ARP table management, and connectivity testing.
4.17 IPv6 Layer 3 Configuration
Explains IPv6 Layer 3 functions for remote management, interface configuration, and ping v6 connectivity testing.
Chapter 4 Service Configuration (Continued)
4.18 DAI Configuration
Covers Dynamic ARP Inspection (DAI) to prevent ARP spoofing and illegal IP/MAC binding by validating ARP packets.
4.19 Access Service Configuration
Explains Network Access Service (NAS) using 802.1x and RADIUS for user authentication and management.
4.20 MAC Authentication Configuration
Details MAC authentication for devices that do not support 802.1x clients, using MAC addresses for authentication.
4.21 QinQ Configuration
Covers QinQ (VLAN stacking) technology for adding an outer VLAN tag to original 802.1Q tags, enabling Layer 2 VPNs.
Chapter 4 Service Configuration (Continued)
4.22 Syslog Configuration
Explains Syslog configuration for managing and classifying system log information from various modules and severity levels.
4.23 NTP Configuration
Details NTP configuration for synchronizing clocks between network devices and the switch acting as a client.
4.24 GARP/GVRP Configuration
Covers GARP and GVRP for dynamic VLAN distribution and management based on the GARP protocol mechanism.
4.25 DHCP Configuration
Explains DHCP functions like snooping, Option82, IP source guard, and client configuration for dynamic IP address assignment.
Chapter 4 Service Configuration (Continued)
4.26 DHCPv6 Configuration
Details DHCPv6 functions including snooping, Option82, and IP source guard for IPv6 address assignment and security.
4.27 VBAS Configuration
Explains VBAS for wide-band user identifier, implementing layer-2 communication for information query and response.
4.28 PPPoE-PLUS Configuration
Covers PPPoE-PLUS technology for inserting user location information in PADI/PADR messages, supporting various formats.
4.29 ZESR Configuration
Details ZTE Ethernet Smart Ring (ZESR) for network reliability, fast fault convergence, and preventing broadcast storms.
Chapter 4 Service Configuration (Continued)
4.30 OAM Configuration
Covers Operation, Administration, and Maintenance (OAM) functions for Ethernet links, including discovery, fault detection, and loopback.
4.31 SQinQ Configuration
Explains SQinQ VLAN tunnel technology for multi-point to multi-point VLAN transport, adding SPVLAN tags based on traffic.
4.32 VLAN Mapping Configuration
Details VLAN mapping (N to One) for converging VLANs by replacing outer VLAN tags, enabling customer services per operator planning.
4.33 sFlow Configuration
Covers sFlow configuration for monitoring high-speed data transmission networks by sampling packets and sending them to collectors.
Chapter 4 Service Configuration (Continued)
4.34 PP Configuration
Explains Protocol Protect (PP) for monitoring packet rates to the CPU, preventing attacks, and ensuring network security.
4.35 LLDP Configuration
Details Link Layer Discovery Protocol (LLDP) for neighboring device discovery, updating physical topology, and establishing MIBs.
4.36 Single Port Loop Detection Configuration
Explains single port loop detection to check for loops, prevent broadcast storms, and automatically disable affected ports.
4.37 UDLD Configuration
Covers UniDirectional Link Detection (UDLD) for detecting logical connectivity and physical connectivity of Ethernet links, including normal and aggressive modes.
Chapter 4 Service Configuration (Continued)
4.38 TACACS+ Configuration
Details Terminal Access Controller Access-Control System Plus (TACACS+) for authentication, authorization, and accounting services.
4.39 Time Range Configuration
Explains how to configure time ranges for specific conditions, including daily, weekly, or date ranges for applying rules.
4.40 Voice VLAN Configuration
Covers Voice VLAN configuration to allocate a separate VLAN for voice data, prioritizing it for call quality.
4.41 802.1AG Configuration
Details Connectivity Fault Management (CFM) using IEEE 802.1ag for checking, separating, and reporting connectivity faults in virtual bridge LANs.
Chapter 4 Service Configuration (Continued)
4.42 Y.1731 Configuration
Explains Y.1731 protocol for measuring network link status and performance, complementing 802.1ag.
4.43 MAC-based VLAN Command Configuration
Covers MAC-based VLAN to decide VLAN for untagged frames based on source MAC address, providing different services.
4.44 DHCP Relay Configuration
Details DHCP Relay configuration for forwarding IP address requests between DHCP clients and servers across different network segments.
Chapter 5 Management
5.1 REMOTE-ACCESS
Explains the restrictive mechanism for network management users to log in via Telnet, SSH, SNMP, and Web, enhancing system security.
5.2 SSH
Covers Secure Shell (SSH) protocol for secure remote access and network services, encrypting data for enhanced security.
5.3 PRIVILEGE
Details the command level function and privilege system for granting different permissions to users, protecting switch configuration.
5.4 SNMP Overview
Explains Simple Network Management Protocol (SNMP) for collecting network management information, monitoring device status, and reporting errors.
Chapter 5 Management (Continued)
5.5 RMON Overview
Covers Remote Monitoring (RMON) for standard network monitoring, subnet behavior analysis, and collecting statistics.
5.6 ZGMP
Explains ZTE Group Manage Protocol (ZGMP) for managing clusters of switches, providing a unified management domain and interface.
5.8 WEB
Details the embedded Web server for remote switch management using a web browser, allowing configuration and system information checks.
Chapter 6 Maintenance
6.1 Routine Maintenance
Covers daily and monthly maintenance items for checking switch running state, equipment environment, and telecommunication.
6.2 Virtual Line Detection
Explains Virtual Line Detection (VCT) using TDR for diagnosing line faults, including open, short, and impedance mismatch.
6.3 Common Fault Handling
Provides methods for handling common hardware and software faults, including analysis and troubleshooting steps.

Table of Contents

Save PDF