Ring Protection; Zess Smart Switching - Zte ZXR10 5250-28TC Product Description

Zxr10 5250 series
Hide thumbs Also See for ZXR10 5250-28TC:
Table of Contents

Advertisement

ZXR10 5250 Product Description
1)
2)
3
Authentication server is usually RADIUS server. It can store the user-related
information, e.g., user VLAN, CAR parameters, priority, and user access control
list. When the user passes the authentication, authentication server passes the
user-related information to authenticator system which creates the dynamic
access control list, and subsequent user traffic will be under the supervision of
the above parameters. Device communicates with RADIUS server through
RADIUS protocol.
3.2.13

Ring protection

ZTE Ethernet Smart Ring (ZESR) based upon EAPS principle of rfc3619 protocol makes
some progresses. It makes sure if the ring works smoothly. Also it confirms there's only
one logic smooth path between two nodes. The port status can be changed between
block and forward status according to the situation of the ring (through-break,
break-through), which enables fast switchover of the logical path.
ZESR supports multiple such as network topologies as tangent ring and intersectant ring
as well as multi-domain configuration. ZXR10 5250 ZESR supports to work with PVLAN
to comply with MEF networking model.
3.2.14

ZESS smart switching

ZTE Ethernet Smart Switch (ZESS), providing an Ethernet intelligent switchover
technology introduced by ZTE, describes a highly efficient link switchover mechanism.
When the active link breaks down, traffic can be switched over to the standby link, which
makes sure normal data transmission.
As shown in Figure 3, node 1 supports ZESS. Port 1 is master port and port 2 is slave
port. When node 1 finds that master port and slave port are UP, the protection service
VLAN forwarding of slave port will be blocked. When node 1 finds that master port is
DOWN, the protection service VLAN forwarding of master port will be blocked, and the
protection service VLAN forwarding of slave port will be opened. When node 1 finds that
master port restores to UP, inversion and non-inversion modes are available. In inversion
mode, master port is opened and slave port is blocked again. In non-inversion mode,
14
2013 ZTE CORPORATION. All rights reserved
Uncontrolled port is always in bidirectional connection status and transmits
EAPOL protocol frame to ensure that the supplicant can always send or
receive the authentication.
Only when the authentication is passed, can controlled port be opened to
transmit network resource and service. Controlled port can be configured to
bidirectional control or input control for different applications. If the user
does not pass the authentication, controlled port will be in authentication
status, and the user will not access the service provided by authenticator
system
ZTE Confidential Proprietary

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zxr10 5250-52tcZxr10 5250-52pmZxr105250-28sm

Table of Contents