Sign In
Upload
Manuals
Brands
Quanta Cloud Technology Manuals
Network Router
QuantaMesh QNOS5
Quanta Cloud Technology QuantaMesh QNOS5 Manuals
Manuals and User Guides for Quanta Cloud Technology QuantaMesh QNOS5. We have
1
Quanta Cloud Technology QuantaMesh QNOS5 manual available for free PDF download: Configuration Manual
Quanta Cloud Technology QuantaMesh QNOS5 Configuration Manual (256 pages)
NOS Platform
Brand:
Quanta Cloud Technology
| Category:
Network Router
| Size: 5.13 MB
Table of Contents
Quantamesh Ethernet Switch Configuration Guide
1
Table of Contents
3
1 Quantamesh QNOS5 Features
19
Switching Features Introduction
19
VLAN Support
19
Double Vlans
19
Switching Modes
19
Spanning Tree Protocols (STP)
19
Rapid Spanning Tree
19
Multiple Spanning Tree
19
Bridge Protocol Data Unit (BPDU) Guard
20
BPDU Filtering
20
Port-Channel
20
Link Aggregate Control Protocol (LACP)
20
Multi Chass Link Aggregation Group (MLAG)
20
Flow Control Support (IEEE 802.3X)
20
Asymmetric Flow Control
21
Alternate Store and Forward (ASF)
21
Jumbo Frames Support
21
Auto-MDI/MDIX Support
21
Unidirectional Link Detection (UDLD)
21
Expandable Port Configuration
21
VLAN-Aware MAC-Based Switching
22
Back Pressure Support
22
Auto Negotiation
22
Storm Control
22
Port Mirroring
22
Sflow
23
Static and Dynamic MAC Address Tables
23
Link Layer Discovery Protocol (LLDP)
23
Link Layer Discovery Protocol (LLDP) for Media Endpoint Device
23
DHCP Layer 2 Relay
23
MAC Multicast Support
24
IGMP Snooping
24
Source Specific Multicasting (SSM)
24
Control Packet Flooding
24
Flooding to Mrouter Ports
24
IGMP Snooping Querier
24
Management and Control Plane Acls
25
Remote Switched Port Analyzer (RSPAN)
25
Link Dependency
25
Ipv6 Router Advertisement Guard
25
FIP Snooping
26
ECN Support
26
Security Features
26
Configurable Access and Authentication Profiles
26
AAA Command Authorization
27
Password-Protected Management Access
27
Strong Password Enforcement
27
MAC-Based Port Security
27
RADIUS Client
27
TACACS+ Client
27
Dot1X Authentication (IEEE 802.1X)
27
MAC Authentication Bypass
28
DHCP Snooping
28
Dynamic ARP Inspection
28
IP Source Address Guard
28
Service Prohibit Access
28
Quality of Service Features
28
Access Control Lists (ACL)
29
ACL Remarks
29
ACL Rule Priority
29
Differentiated Service (Diffserv)
29
Class of Service (Cos)
29
Management Features
29
Management Options
29
Management of Basic Network Information
30
Dual Software Images
30
File Management
30
FTP File Management
30
Malicious Code Detection
30
Automatic Installation of Firmware and Configuration
30
Warm Reboot
31
SNMP Alarms and Trap Logs
31
Remote Monitoring (RMON)
31
Statistics Application
31
Log Messages
31
System Time Management
32
Source IP Address Configuration
32
Multiple Linux Routing Tables
32
Core Dump
32
Core Dump File Handling
32
Open Network Install Environment Support
32
Interface Error Disable and Auto Recovery
33
Routing Features
33
IP Unnumbered
33
Open Shortest Path First (OSPF)
33
Border Gateway Partol (BGP)
33
VLAN Routing
34
IP Configuration
34
Address Resolution Protocol (ARP) Table Management
34
BOOTP/DHCP Relay Agent
35
IP Helper and UDP Relay
35
Routing Table
35
Virtual Router Redundancy Protocol (VRRP)
35
Algorithmic Longest Prefex Match (ALPM)
35
Bidirectional Forwarding Detection
35
VRF Lite Operation and Configuration
36
Layer 3 Multicast Features
36
Internet Group Management Protocol
36
Protocol Independent Multicast
36
Dense Mode ((PIM-DM)
36
Spare Mode (PIM-SM)
36
Source Specific Multicast (PIM-SSM)
36
PIM Ipv6 Support
37
Mld/Mldv2 (RFC2710/RFC3810)
37
Data Center Features
37
Priority-Based Flow Control
37
Data Center Bridging Exchange Protocol
37
Cos Queuing and Enhanced Transmission Selection
37
VXLAN Gateway
38
2 Getting Started
39
Accessing the Switch Command-Line Interface
39
Connecting to the Switch Console
39
Accessing the Switch CLI through the Network
40
Using the Service Port or Management VLAN Interface for Remote Management
40
Configuring Service Port Information
41
Configuring the In-Band Management Interface
41
DHCP Option 61
42
Configuring DHCP Option 61
42
Booting the Switch
43
Utility Menu Functions
44
Start QNOS5 Application
45
Update Image
45
Load Configuration
47
Select Serial Speed
48
Retrieve Error Log
48
Erase Current Configuration
49
Erase Permanent Storage
49
Select Boot Method
49
Activate Backup Image
50
Start Diagnostic Application
50
Reboot
50
Erase All Configuration Files
50
Understanding the User Interfaces
50
Using the Command-Line Interface
51
Using SNMP
51
Snmpv3
52
SNMP Configuration Example
52
Figure 2-1: SNMP Configuration Topology
52
3 Configuring L2 Switching Features
57
Vlans
57
Double-VLAN Tagging
58
Figure 3-1: Simple VLAN Topology
58
Figure 3-2: Double VLAN Tagging Network Example
59
VLAN Configuration Example
60
VLAN Tagging
58
Default VLAN Behavior
59
Table 3-2: Example VLAN
60
Table 3-1: VLAN Default and Maximum Values
60
Figure 3-3: Network Topology for VLAN Configuration
61
Table 3-4: Switchport Mode Behavior
65
Figure 3-4: Port-Channel Configuration
66
Hash Prediction with ECMP and Port-Channel
67
Resilient Hasing
67
Port-Channel Interaction with Other Features
68
Port-Channel Interface Overview
68
Vlan
68
Port-Channel Configuration Examples
69
Port-Channel Configuration Guidelines
69
Statistics
69
Stp
69
Configuration Dynamic Port-Channels
70
Configuration Static Port-Channels
71
Configuring Dynamic Port-Channels
72
LACP Fallback Configuration
72
Configuring Static Port-Channels
73
MLAG - Operation and Configuration
74
Deployment Scenarios
75
Figure 3-5: STP Blocking
75
Overview
75
Definitions
76
Figure 3-6: MLAG in a Layer-2 Network
76
Figure 3-7: MLAG Components
76
Configuration Consistency
77
Figure 3-8: MLAG Configuration Diagram
79
MLAG Configuration
79
MLAG Fast Failover
79
Configuring UDLD
82
UDLD and Port-Channel Interfaces
82
UDLD Modes
82
Unidirectional Link Detection (UDLD)
82
Figure 3-9: UDLD Configuration Example
83
Configuring Port Mirroring
84
Port Mirroring
84
Configuration on the Source Switch (SW1)
85
Configuring RSPAN
85
Figure 3-10: RSPAN Configuration Example
85
Configuration on the Intermediate Switch (SW2)
86
Configuration on the Destination Switch (SW3)
87
Flow-Based Mirroring
87
VLAN-Based Mirroring
87
Classic STP, Multiple STP, and Rapdi STP
88
Spanning Tree Protocol
88
STP Operation
88
Figure 3-11: STP in a Small Bridged Network
89
MSTP in the Network
89
Figure 3-12: Single STP Topology
90
Figure 3-13: Logical MSTP Environment
91
BPDU Flooding
92
Edge Port
92
Optional STP Features
92
PDU Filtering
92
BPDU Protection
93
Loop Guard
93
Root Guard
93
Configuring STP
94
Figure 3-14: STP Example Network Diagram
94
STP Configuring Examples
94
Configuring MSTP
95
Figure 3-15: MSTP Configuration Example
96
Configuring IGMP Snooping
97
IGMP Snooping
97
IGMP Snooping Querier
97
Figure 3-16: Switch with IGMP Snooping
98
Igmpv3/Ssm Snooping
100
MLD Snooping
101
MLD Snooping Configuration Example
101
Figure 3-17: MLD Snooping Topology
102
MLD Snooping Configuration Example
102
MLD Snooping First Leave Configuration Example
103
MLD Snooping Verification Example
103
Figure 3-18: MLD Snooping Leave Configuration Topology
104
MLD Snooping Configuration
104
MLD Snooping Querier Configuration Example
104
Figure 3-19: MLD Snooping Querier Configuration Example
105
Configuring LLDP
106
LLDP and Data Center Application
106
LLDP and LLDP-MED
106
Sflow
108
Figure 3-20: Sflow Architecture
109
Sflow Sampling
109
Configuring Sflow
110
Counter Sampling
110
Packet Flow Sampling
110
Link Dependency
112
AR Guard
113
FIP Snooping
113
Ecn
117
Enabling ECN in Microsoft Windows
118
Example 1: SLA Example
118
Example 2: Data Cetner TCP (DCTCP) Configuration
121
Port-Channel Hashing
66
Port-Channels - Operation and Configuration
66
Static and Dynamic Port-Channel
66
Table 3-3: Switch Port Configuration
61
Configuring the Vlans and Ports on Switch 1
62
Configuring the Vlans and Ports on Switch 2
64
Switchport Modes
64
4 Configuring Security Features
123
Controlling Management Access
123
Using RADIUS Servers for Management Security
123
Figure 4-1: RADIUS Topology
124
Table 4-1: Authentication Method Summary
127
Figure 4-2: DHCP Binding
131
DHCP Snooping Logging and Rate Limits
132
IP Source Guard Overview
132
IPSG and Port Security
132
Dynamic ARP Inspection Overview
133
Increasing Security with DHCP Snooping, DAI, and IPSG
133
Optional DAI Features
133
Configuring DHCP Snooping
134
Figure 4-3: DHCP Snooping Configuration Topology
134
Configuring IPSG
135
Acls
136
MAC Acls
136
ACL Redirect Function
137
IP Acls
137
ACL Logging
138
ACL Mirror Function
138
Time-Based Acls
138
ACL Limitations
139
ACL Rule Priority
139
ACL Rule Remarks
139
ACL Configuration Process
140
Preventing False ACL Matches
140
Table 4-2: Common Ethertype Numbers
140
ACL Configuration Examples
141
Configuring an IP ACL
141
Ipv6 ACL Qualifies
141
Configuring Authentication Profiles for Post-Based Authentication
128
Configuring the Primary and Secondary RADIUS Servers
128
Configuring an Authentication Profile
129
Configuring DHCP Snooping, DAI, and IPSG
130
DHCP Snooping Overview
130
DHCP Snooping and Vlans
131
Populating the DHCP Snooping Bindings Database
131
RADIUS Dynamic Authorization
124
Configuring and Applying Authentication Profiles
126
Using TACACS+ to Control Management Access
126
Table 4-3: Common IP Protocol Numbers
141
Figure 4-4: IP ACL Example Network Diagram
142
Figure 4-5:Copp Configuration Topology
146
Configuring Service Prohibit
148
Service Prohibit Access
148
Configuring a MAC ACL
143
Configuring a Time-Based ACL
144
Control Plane Policing (Copp)
145
Copp Configuration Examples
146
5 Configuring Quality of Service
149
Cos
149
Defining Traffic Queues
149
Traffic Shaping on Egress Traffic
149
Trusted and Untrusted Port Modes
149
Cos Configuration Example
150
Supported Queue Management Methods
150
Figure 5-1: Cos Mapping and Queue Configuration
151
Diffserv
152
Configuration Diffserv to Provide Subnets Equal Access to External Network
153
Diffserv Functionality and Switch Roles
153
Elements of Diffserv Configuration
153
Figure 5-2: Diffserv Internet Access Example Network Diagram
154
Table 6-1: Files to Manage
156
Managing Configuration Files
157
Managing Switch Software (Images)
157
Uploading and Downloading Files
157
Creating and Applying Configuration Scripts
158
Editing and Downloading Configuration Files
158
File and Image Management Configuration Examples
159
Non-Disruptive Configuration Management
159
Saving the Running Configuration
159
Upgrading the Firmware
159
Managing Configuration Scripts
162
Enabling Automatic Image Installation and System Configuration
163
DHCP Auto Install Process
164
Obtaining IP Address Information
164
Obtaining Other Dynamic Information
164
Obtaining the Configuration File
165
Obtaining the Image
165
Monitoring and Completing the DHCP Auto Install Process
166
6 Configuring Switch Management Features
156
Managing Images and Files
156
Supported File Management Methods
156
Table 6-3: TFTP Request Types
166
Table 6-4: Auto Install Defaults
168
Downloading a Core Dump
169
Using NFS to Download a Core Dump
169
Setting the System Time
170
Using TFTP or FTP to Download a Core Dump
170
Manual Time Configuration
171
Configuring SNTP
172
Configuring System Log Example
172
Example 1 to Add Syslog Host
172
Example 2 to Verify Syslog Host Configuration
173
Table 6-2: Configuration File Possibilities
166
DHCP Auto Install Dependencies
167
Managing Downloaded Configuration Files
167
Saving a Configuration
167
Stopping and Restarting the Auto Install Process
167
Default Auto Install Values
168
Enabling DHCP Auto Install and Auto Image Download
168
Figure 6-1: System Log Topology
173
Figure 6-2: Syslog Server Screen
175
Figure 6-3: Syslog Packet Capture
175
Table 7-1: IP Routing Features
177
IP Routing Configuration Example
178
When to Configure VLAN Routing
178
7 Configuring Routing
177
Basic Routing and Features
177
VLAN Routing
177
Figure 7-1: Inter-VLAN Routing
178
Figure 7-2: IP Routing Example Topology
179
Figure 7-3: IP Unnumbered Configuration Example
181
Ospf
183
Configuring an OSPF Border Router and Setting Interface Costs
184
Figure 7-4: OSPF Area Border Router
184
Vrrp
186
VRRP Operation in the Network
186
VRRP Preemption
186
VRRP Router Priority
186
VRRP Accept Mode
187
VRRP Configuration Example
187
VRRP Route and Interface Tracking
187
Figure 7-5: VRRP with Load Sharing Network Diagram
188
VRRP with Load Sharing
188
Figure 7-6: VRRP with Tracking Network Diagram
190
VRRP with Route and Interface Tracking
190
IP Helper
193
Table 7-2: Default Ports - UDP Port Numbers Implied by Wildcard
193
Relay Agent Configuration Example
195
Configuring Switch B
180
IP Unnumbered Configuration Example
181
Configuring Switch a
179
Table 7-3: UDP Port Allocation
195
Figure 7-7: L3 Relay Network Diagram
196
Figure 7-8: Example BGP Network
198
BGP Behavior
199
BGP Route Selection
199
BGP Configuration Example
200
Configuring BGP on Router 9
200
Figure 7-9: BGP Configuration Example
200
Configuring BGP on Router 3
203
Ipv6 Routing
204
How Are Ipv6 Interface Configured
205
How Does Ipv6 Compare with Ipv6
205
Configuring Ipv6 Routing Features
206
Default Ipv6 Routing Values
206
Table 7-4: Ipv6 Routing Defaults
206
Table 7-5: Ipv6 Interface Defaults
206
Table 7-6: Global IP Routing Settings
207
Configuring Ipv6 Neighbor Discovery
208
Table 7-7: Ipv6 Interface Settings
208
Table 7-8: Ipv6 Neighbor Discovery Settings
209
Configuring Ipv6 Route Table Entries and Route Preferences
210
Ipv6 Show Commands
210
Table 7-9: Ipv6 Static Routes
210
Bidirectional Forwarding Detection
211
ECMP Hash Selection
211
Table 7-10: Ipv6 Configuration Status
211
Configuring BFD
212
Route Leaking
213
VRF Lite Operation and Configuration
213
Adding Leaked Routes
214
CPU-Originated Traffic
214
Using Leaked Routes
214
VRF Features Support
214
VRF Lite Development Scenarios
216
Configuring Global IP Routing Settings
207
Configuring Ipv6 Interface Settings
207
BGP Topology
197
Border Gateway Patrol (BGP)
197
Advertising Network Layer Reachability Information
198
External BGP Peering
198
Internal BGP Peering
198
Table 7-11: VRF Features List
216
Figure 7-10: VRF Scenarios
217
Figure 7-11: VRF Routing with Shared Services
217
VRF Configuration Example
219
8 Configuring Multicast Routing
221
IP Multicast Traffic
221
L3 Multicast Overview
221
Multicast Protocol Switch Support
221
Table 8-1: Multicast Protocol Support Summary
221
Table 8-2: L3 Multicast Defaults
226
Figure 8-1: Multicast VLAN Routing with IGMP and PIM-SM Example
227
Example 1: Mldv1 Configuration
229
Figure 8-2: MLD Topology
229
Example 2: Mldv2 Configuration
230
Example 3: MLD Configuration Verification
230
Table 9-1: DCB Features
232
Configuring PFC
233
PFC Operation and Behavior
233
Data Center Bridging Exchange Protocol
234
Interoperability with IEEE DCBX
234
DCBX and Port Roles
235
Configuration Source Port Selection Process
236
Configuring DCBX
237
Configuring Multicast VLAN Routing with IGMP and PIM-SM
227
L3 Multicast Configuration Examples
227
Determining Which Multicast Protocols to Enable
222
Multicast Protocol Roles
222
Multicast Routing Tables
222
Multicast Switch Requirements
222
Multicast Tunneling
222
Igmp
223
IGMP Proxy
223
MLD Protocol
223
Join Mechanism
224
Leave Mechanism
224
PIM Protocol
224
Using PIM-SM as the Multicast Routing Protocol
224
Default L3 Multicast Values
225
Using PIM-DM as the Multicast Routing Protocol
225
9 Configuring Data Center Features
232
Data Center Technology Overview
232
Priority-Based Flow Control
232
Figure 9-1: DCBX Configuration
237
Cos Queuing
238
Cos Queuing Function and Behavior
239
Queue Configuration
239
Trusted Port Queue Mappings
239
Un-Trusted Port Default Priority
239
Configuring Cos Queuing and ETS
240
Traffic Class Groups
240
Table 9-3: TCG Bandwidth and Scheduling
242
Table 9-2: 802.1P-To-TCG Mapping
242
Enhanced Transmission Selection
243
ETS Operation and Dependencies
243
Overview
243
VXLAN Gateway Operation and Configuration
243
Functional Description
244
VTEP to VN Association
244
Vxlan
244
Configuration of Remote Vteps
245
Tunnels
246
VTEP Nex-Hop Resolution
246
VXLAN UDP Destination Port
246
Host Configuration
247
MAC Learning and Aging
247
Ecmp
248
Mtu
248
TTL and DSCP/TOS
248
Packet Forwarding
249
VXLAN Configuration Examples
249
Unicast VXLAN Configuration
250
Table 9-4: VLAN and VXLAN Comparison
250
Figure 9-2: Unicast VXLAN Topology
250
Table 9-5: Terms and Acronyms
254
Appendix A: Term and Acronyms
254
Table 9-6: Terms and Acronyms (Cont.)
255
Table 9-7: Terms and Acronyms (Cont.)
256
Advertisement
Advertisement
Related Products
Quanta Cloud Technology Categories
Network Router
More Quanta Cloud Technology Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL