3COM 5500-SI User Manual

4 (1)

3Com® Switch 5500 Family

Configuration Guide

Switch 5500-SI

Switch 5500-EI

Switch 5500G-EI

www.3Com.com

Part Number: 10014922 Rev. AC Published: December 2006

3Com Corporation

350 Campus Drive

Marlborough, MA

USA 01752-3064

Copyright © 2006, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation.

3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.

3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time.

If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you.

UNITED STATES GOVERNMENT LEGEND

If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following:

All technical data and computer software are commercial in nature and developed solely at private expense. Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide.

Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries.

3Com and the 3Com logo are registered trademarks of 3Com Corporation.

Cisco is a registered trademark of Cisco Systems, Inc.

Funk RADIUS is a registered trademark of Funk Software, Inc.

Aegis is a registered trademark of Aegis Group PLC.

Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd.

IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.

All other company and product names may be trademarks of the respective companies with which they are associated.

ENVIRONMENTAL STATEMENT

It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to:

Establishing environmental performance standards that comply with national legislation and regulations.

Conserving energy, materials and natural resources in all operations.

Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards. Maximizing the recyclable and reusable content of all products.

Ensuring that all products can be recycled, reused and disposed of safely.

Ensuring that all products are labelled according to recognized environmental standards.

Improving our environmental record on a continual basis.

End of Life Statement

3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.

Regulated Materials Statement

3Com products do not contain any hazardous or ozone-depleting material.

Environmental Statement about the Documentation

The documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are vegetable-based with a low heavy-metal content.

3

CONTENTS

CONTENTS

ABOUT THIS GUIDE

 

Organization of the Manual 21

 

 

 

 

 

Intended Readership 22

 

 

 

 

 

 

Conventions

22

 

 

 

 

 

 

 

 

Related Manuals

23

 

 

 

 

 

 

1

 

 

 

 

 

 

 

GETTING STARTED

 

 

 

 

 

 

 

Product Overview

25

 

 

 

 

 

 

 

XRN Overview

26

 

 

 

 

 

 

 

Major Technologies

26

 

 

 

 

 

 

Typical Networking Topology

26

 

 

 

 

Product Features

27

 

 

 

 

 

 

 

Logging in to the Switch

29

 

 

 

 

 

 

Setting up Configuration Environment through the Console Port

29

 

Setting up Configuration Environment through Telnet 31

 

 

Setting up Configuration Environment through a Dial-up Modem

33

 

Command Line Interface

37

 

 

 

 

 

 

Command Line View

37

 

 

 

 

 

 

Features and Functions of Command Line

40

 

 

User Interface Configuration

42

 

 

 

 

 

User Interface Configuration

43

 

 

 

 

Displaying and Debugging User Interface

49

 

2

 

 

ADDRESS MANAGEMENT CONFIGURATION

 

 

Introduction to Address Management

51

 

 

 

Configuring Address Management

51

 

 

 

 

Configuring a Port-Based Address Management IP Address Pool

51

 

Binding the MAC Address and IP Address of a Legal User to the Specified Port 51

 

Address Management Configuration Example

52

 

 

Port-Based Address Management IP Address Pool Configuration Example 52

 

Configuration Example of Binding the MAC Address and IP Address of a Legal

 

User 53

 

 

 

 

 

 

 

 

3

 

 

 

 

 

 

 

PORT OPERATION

 

 

 

 

 

 

 

Ethernet Port Configuration Introduction

55

 

 

 

Ethernet Port Configuration

55

 

 

 

 

EthernetPort Security Features

62

 

 

 

 

Displaying and Debugging Ethernet Port

66

 

4 CHAPTER : CONTENTS

 

Displaying Port Configuration Information in Brief

67

 

Ethernet Port Configuration Example

67

 

 

 

Ethernet Port Troubleshooting

68

 

 

 

 

Link Aggregation Configuration 68

 

 

 

 

Link Aggregation Configuration

71

 

 

 

Displaying and Debugging Link Aggregation 74

 

 

Link Aggregation Configuration Example

75

 

 

Global Broadcast Suppression Feature

76

 

 

 

Configuring Global Broadcast Suppression

76

 

 

Global Broadcast Suppression Configuration Example 76

 

Configuration procedure 76

 

 

 

 

 

Displaying Information About a Specified Optical Port

77

 

 

 

 

 

 

4 XRN CONFIGURATION

 

 

 

 

 

Introduction to XRN 79

 

 

 

 

Configuring an XRN Fabric 79

 

 

 

Specifying the Stacking VLAN of the Switch

80

Setting Unit IDs for Switches

80

 

 

Saving the Unit ID of Each Unit in the Fabric

81

Specifying the Fabric Port of the Switch 81

 

Setting Unit Names for Switches

81

 

Setting a Fabric Name for Switches

81

 

Setting an XRN Authentication Mode for Switches 82

Displaying and Debugging a Fabric

82

 

Fabric Configuration Example

82

 

 

RMON on XRN 83

 

 

 

 

Configuration Commands for RMON on XRN 84

 

Clustering on XRN

84

 

 

 

 

Peer Fabric Port Detection

84

 

 

 

Work Flow of the Peer Fabric Port Detection Function 84

 

Prompt Information and Solution

85

 

Multiple Fabric Port Candidates

86

 

5

 

 

 

DLDP CONFIGURATION

 

 

 

DLDP Overview 89

 

 

 

 

 

DLDP Fundamentals

90

 

 

 

Precautions During DLDP Configuration 93

 

DLDP Configuration

93

 

 

 

 

Resetting DLDP Status

94

 

 

 

DLDP Configuration Example

94

 

6

 

 

 

 

VLAN OPERATION

 

 

 

 

VLAN Configuration

97

 

 

 

 

VLAN Overview

97

 

 

 

 

Configuring a VLAN

97

 

 

 

Displaying and Debugging VLAN

99

 

VLAN Configuration Example One

99

 

VLAN Configuration Example Two

100

5

Protocol-Based VLAN Configuration

100

Configuring Protocol-Based VLANs

100

Displaying the Information about Protocol-Based VLANs 101

Voice VLAN Configuration

102

 

Voice VLAN Configuration 102

 

Displaying and Debugging of Voice VLAN 106

Voice VLAN Configuration Example

106

Creating VLANs in Batches

107

 

Voice VLAN Configuration

107

 

 

Configuring the Voice VLAN Function

108

 

 

Voice VLAN Displaying and Debugging

109

 

 

Voice VLAN Configuration Example 109

 

7

 

 

 

 

 

GVRP CONFIGURATION

 

 

 

 

 

Introduction to GVRP

111

 

 

 

 

 

GVRP Working Scheme

111

 

 

 

 

GVRP Packet Format

113

 

 

 

 

 

Protocol Specifications

113

 

 

 

 

GVRP Configuration

114

 

 

 

 

 

Configuration Prerequisite

114

 

 

 

Configuration Procedure

114

 

 

 

 

Configuration Example

115

 

 

 

 

Displaying GVRP 116

 

 

 

 

 

 

 

 

 

 

8 VLAN-VPN CONFIGURATION

 

 

 

 

VLAN-VPN Overview

117

 

 

 

 

 

Implementation of VLAN-VPN

117

 

 

 

Adjusting the TPID Values of VLAN-VPN Packet

118

 

VLAN-VPN Configuration

118

 

 

 

 

Configuration Prerequisites

118

 

 

 

Configuration procedure

118

 

 

 

 

Inner VLAN Tag Priority Replication Configuration

119

 

Configuration Prerequisites

119

 

 

 

Configuration procedure

119

 

 

 

 

TPID Adjusting Configuration

119

 

 

 

 

Configuration Prerequisites

119

 

 

 

Configuration Procedure

119

 

 

 

 

VLAN-VPN Configuration Example

120

 

 

 

Network requirements

120

 

 

 

 

Network diagram

120

 

 

 

 

 

Configuration Procedure

121

 

 

 

9

 

 

 

 

 

 

 

DHCP OVERVIEW

 

 

 

 

 

 

 

Introduction to DHCP

123

 

 

 

 

DHCP IP Address Assignment

124

IP Address Assignment Policy

124

DHCP IP Address Preferences

124

Sending Device Information through DHCP Option60 124

6 CHAPTER : CONTENTS

10 DHCP SERVER CONFIGURATION

 

Introduction to DHCP Server

125

 

 

 

 

 

Usage of DHCP Server

 

125

 

 

 

 

 

DHCP Fundamentals

 

125

 

 

 

 

 

DHCP Packet Processing Modes

127

 

 

 

 

DHCP Address Pool

127

 

 

 

 

 

 

Global Address Pool-Based DHCP Server Configuration

128

 

Configuration Overview

128

 

 

 

 

 

Enabling DHCP

128

 

 

 

 

 

 

 

 

Configuring Global Address Pool Mode on Interface(s)

129

 

Configuring How to Assign IP Addresses in a Global Address Pool 129

 

Configuring DNS Services for DHCP Clients

130

 

 

 

Configuring NetBIOS Services for DHCP Clients

131

 

 

Customizing DHCP Service

132

 

 

 

 

 

Configuring Gateway Addresses for DHCP Clients

132

 

Interface Address Pool-based DHCP Server Configuration

132

 

Configuration Overview

132

 

 

 

 

 

Enabling DHCP

133

 

 

 

 

 

 

 

 

Configuring to Assign the IP addresses of Local Interface-based address pools to DHCP

 

Clients

133

 

 

 

 

 

 

 

 

 

Configuring to Assign IP Addresses of Interface-based Address Pools to DHCP

 

Clients

133

 

 

 

 

 

 

 

 

 

Configuring DNS Services for DHCP Clients

135

 

 

 

Configuring NetBIOS Services for DHCP Clients

136

 

 

Customizing DHCP Service

137

 

 

 

 

 

DHCP Security Configuration

137

 

 

 

 

 

Prerequisites

137

 

 

 

 

 

 

 

 

Configuring Private DHCP Server Detecting

137

 

 

 

Configuring IP Address Detecting

137

 

 

 

 

Option 184 Supporting Configuration

138

 

 

 

 

Prerequisites

139

 

 

 

 

 

 

 

 

Configuring the Option 184 Supporting Function

139

 

Configuration Example

142

 

 

 

 

 

DHCP Server Displaying and Debugging 144

 

 

 

 

DHCP Server Configuration Example

144

 

 

 

 

Troubleshooting DHCP Server

146

 

 

 

 

 

 

 

 

 

 

11 DHCP RELAY CONFIGURATION

 

 

 

 

 

Introduction to DHCP Relay

147

 

 

 

 

 

Usage of DHCP Relay

 

147

 

 

 

 

 

DHCP Relay Fundamentals

147

 

 

 

 

 

DHCP Relay Configuration

148

 

 

 

 

 

DHCP Relay Configuration Tasks

148

 

 

 

 

Enabling DHCP

148

 

 

 

 

 

 

 

 

Configuring an Interface to Operate in DHCP Relay Mode 148

 

DHCP Relay Displaying

149

 

 

 

 

 

 

DHCP Relay Configuration Example

149

 

 

 

 

Troubleshooting DHCP Relay

150

 

 

 

 

7

12 VRRP CONFIGURATION

 

 

VRRP Overview 151

 

 

Virtual Router Overview

152

 

Introduction to Backup Group 153

 

VRRP Configuration 155

 

 

Configuring a Virtual Router IP address

155

Configuring Backup Group-Related Parameters 156

Displaying and Clearing VRRP Information

157

VRRP Configuration Example

157

 

 

Single-VRRP Backup Group Configuration Example

157

 

VRRP Tracking Interface Example

158

 

 

 

Multiple-VRRP Backup Group Configuration Example

160

 

Troubleshooting VRRP

162

 

 

 

 

 

 

 

 

 

 

 

 

 

 

13 MSTP CONFIGURATION

 

 

 

 

 

 

 

MSTP Overview

163

 

 

 

 

 

 

 

 

MSTP Protocol Data Unit

163

 

 

 

 

 

Basic MSTP Terminologies

164

 

 

 

 

 

Fundamentals of MSTP

166

 

 

 

 

 

 

MSTP Implementation on Switches

168

 

 

 

Root Bridge Configuration

168

 

 

 

 

 

 

Configuring an MST Region

169

 

 

 

 

Setting the Switch as the Root/Secondary Root Bridge

 

170

 

Setting the Bridge Priority of a Switch

171

 

 

 

Configuring MSTP Operation Mode

172

 

 

 

Configuring the Maximum Hop Count of an MST Region

172

 

Configuring the Diameter of a Switched Network 173

 

 

Configuring MSTP Time Parameters

173

 

 

 

Configuring the Timeout Time Factor

175

 

 

 

Configuring the Maximum Transmission Speed of a Port

175

 

Setting a Port as an Edge Port

 

176

 

 

 

 

Specifying whether a Port Connect to Point-to-Point Link

177

 

Enabling MSTP

179

 

 

 

 

 

 

 

Leaf Node Configuration

180

 

 

 

 

 

 

Prerequisites

180

 

 

 

 

 

 

 

 

Configuring an MST Region

180

 

 

 

 

Configuring MSTP Operation Mode

181

 

 

 

Configuring the Timeout Time Factor

181

 

 

 

Configuring the Maximum Transmission Speed of a Port

181

 

Setting a Port as an Edge Port

 

181

 

 

 

 

Configuring the Path Cost of a Port

181

 

 

 

Configuring the Priority of a Port

183

 

 

 

Configuring a Port to Connect to Point-to-Point Link

184

 

Enabling MSTP

184

 

 

 

 

 

 

 

mCheck Configuration

184

 

 

 

 

 

 

Prerequisites

184

 

 

 

 

 

 

 

 

Configuration Procedure

185

 

 

 

 

 

Configuration Example

185

 

 

 

 

 

 

Protection Functions Configuration

185

 

 

8 CHAPTER : CONTENTS

 

Introduction to the Protection Functions

185

 

 

 

Prerequisites

186

 

 

 

 

 

 

 

 

 

 

Configuring BPDU Protection

187

 

 

 

 

 

 

Configuring Root Protection

 

187

 

 

 

 

 

 

Configuring Loop Prevention

188

 

 

 

 

 

 

Configuring TC-BPDU Attack Prevention

188

 

 

 

BPDU Tunnel Configuration

188

 

 

 

 

 

 

Introduction to BPDU Tunnel

 

188

 

 

 

 

 

 

Configuring BPDU Tunnel

 

189

 

 

 

 

 

 

Displaying and Debugging MSTP

190

 

 

 

 

 

MSTP Configuration Example

 

190

 

 

 

 

 

 

BPDU Tunnel Configuration Example

192

 

 

 

 

 

 

14 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION

 

Introduction to Centralized MAC Address Authentication

195

 

 

Centralized MAC Address Authentication Configuration

196

 

 

Enabling Global/Port-based Centralized MAC Address Authentication

196

 

Configuring an ISP Domain for MAC Address Authentication Users

196

 

Setting Centralized MAC Address Authentication Timers 196

 

 

Displaying and Debugging Centralized MAC Address Authentication

197

 

Centralized MAC Address Authentication Configuration Example 197

 

 

 

 

 

 

 

 

 

 

15 SSH TERMINAL SERVICES

 

 

 

 

 

 

 

 

 

SSH Terminal Services

199

 

 

 

 

 

 

 

 

 

Introduction to SSH

199

 

 

 

 

 

 

 

 

 

SSH Server Configuration

 

201

 

 

 

 

 

 

SSH Client Configuration

205

 

 

 

 

 

 

Displaying SSH Configuration

205

 

 

 

 

 

SSH Server Configuration Example

206

 

 

 

 

 

SSH Client Configuration Example

207

 

 

 

 

 

SSH Keygen Program

209

 

 

 

 

 

 

 

 

SFTP Service

210

 

 

 

 

 

 

 

 

 

 

 

SFTP Overview

210

 

 

 

 

 

 

 

 

 

SFTP Server Configuration

 

210

 

 

 

 

 

 

SFTP Client Configuration

 

211

 

 

 

 

 

 

SFTP Configuration Example

 

213

 

 

 

 

 

 

 

 

 

 

 

16 IP ROUTING PROTOCOL OPERATION

 

 

 

 

 

IP Routing Protocol Overview

 

217

 

 

 

 

 

 

Selecting Routes Through the Routing Table

218

 

 

 

Routing Management Policy

 

219

 

 

 

 

 

 

Static Routes

220

 

 

 

 

 

 

 

 

 

 

Configuring Static Routes

 

221

 

 

 

 

 

 

Example: Typical Static Route Configuration

223

 

 

 

Troubleshooting Static Routes

224

 

 

 

 

 

RIP 224

 

 

 

 

 

 

 

 

 

 

 

 

Configuring RIP

225

 

 

 

 

 

 

 

 

 

Traffic Sharing Across RIP Interfaces

233

 

 

 

 

9

 

Displaying and Debugging RIP

233

 

 

 

 

 

Example: Typical RIP Configuration

233

 

 

 

 

Troubleshooting RIP

234

 

 

 

 

 

 

 

 

OSPF Configuration

235

 

 

 

 

 

 

 

 

Calculating OSPF Routes

235

 

 

 

 

 

 

Basic Concepts Related to OSPF

236

 

 

 

 

 

Configuring OSPF

237

 

 

 

 

 

 

 

 

Displaying and Debugging OSPF

253

 

 

 

 

254

 

 

 

 

 

 

 

 

 

 

Example: Configuring DR Election Based on OSPF Priority

254

 

Example: Configuring OSPF Virtual Link

256

 

 

 

Troubleshooting OSPF

257

 

 

 

 

 

 

 

IP Routing Policy 258

 

 

 

 

 

 

 

 

 

Configuring an IP Routing Policy

259

 

 

 

 

 

Forwarding Layer 3 Broadcast Packets

263

 

 

 

 

Displaying and Debugging the Routing Policy

264

 

 

Typical IP Routing Policy Configuration Example

264

 

 

Troubleshooting Routing Protocols

265

 

 

 

 

Route Capacity Configuration

265

 

 

 

 

 

 

Limiting Route Capacity 266

 

 

 

 

 

 

Route Capacity Configuration

266

 

 

 

 

 

Displaying and Debugging Route Capacity

267

 

 

 

 

 

 

 

17 NETWORK PROTOCOL OPERATION

 

 

 

 

 

IP Address Configuration

269

 

 

 

 

 

 

 

IP Address Overview

269

 

 

 

 

 

 

 

 

Configuring IP Address

271

 

 

 

 

 

 

 

Displaying and Debugging IP Address

272

 

 

 

 

IP Address Configuration Example

273

 

 

 

 

Troubleshooting IP Address Configuration

273

 

 

ARP Configuration

273

 

 

 

 

 

 

 

 

 

Configuring ARP

274

 

 

 

 

 

 

 

 

Introduction to Gratuitous ARP

 

275

 

 

 

 

 

 

Gratuitous ARP Packet Learning Configuration

276

 

 

Resilient ARP Configuration

 

277

 

 

 

 

 

277

 

 

 

 

 

 

 

 

 

 

Displaying and Debugging Resilient ARP Configuration

278

 

Resilient ARP Configuration Example

278

 

 

 

 

BOOTP Client Configuration

279

 

 

 

 

 

 

Overview of BOOTP Client

279

 

 

 

 

 

 

BOOTP Client Configuration

280

 

 

 

 

 

Debugging BOOTP Client

280

 

 

 

 

 

 

DHCP Configuration

280

 

 

 

 

 

 

 

 

Overview of DHCP 280

 

 

 

 

 

 

 

 

Option 82 supporting

283

 

 

 

 

 

 

 

DHCP Client Configuration

 

285

 

 

 

 

 

 

DHCP Relay Configuration

286

 

 

 

 

 

 

Enabling DHCP

286

 

 

 

 

 

 

 

 

 

Configuring DHCP Relay Security

287

 

 

 

10 CHAPTER : CONTENTS

 

Option 82 Supporting Configuration

288

 

 

 

 

Prerequisites

288

 

 

 

 

 

 

 

 

 

 

Enabling Option 82 Supporting on a DHCP Relay

288

 

Option 82 Supporting Configuration Example

289

 

 

Introduction to DHCP Snooping

290

 

 

 

 

 

 

DHCP Snooping Configuration

291

 

 

 

 

 

 

Configuration Example

292

 

 

 

 

 

 

 

Introduction to DHCP Accounting

292

 

 

 

 

 

 

Structure of the DHCP Accounting Packets

 

292

 

 

DHCP Accounting Fundamentals

294

 

 

 

 

 

DHCP Accounting Configuration

294

 

 

 

 

 

Displaying and Debugging DHCP Configuration

296

 

 

DHCP Relay Configuration Example One

297

 

 

 

DHCP Relay Configuration Example Two

298

 

 

 

Troubleshooting DHCP Relay Configuration

 

299

 

 

Access Management Configuration

299

 

 

 

 

 

 

Access Management Overview

299

 

 

 

 

 

 

Configuring Access Management

299

 

 

 

 

 

Displaying and Debugging Access Management

301

 

 

Access Management Configuration Example

302

 

 

Access Management using the Web

302

 

 

 

 

 

UDP Helper Configuration

303

 

 

 

 

 

 

 

Overview of UDP Helper

303

 

 

 

 

 

 

 

UDP Helper Configuration

303

 

 

 

 

 

 

 

Displaying and Debugging UDP Helper Configuration

305

 

UDP Helper Configuration Example 305

 

 

 

 

 

IP Performance Configuration

305

 

 

 

 

 

 

 

Displaying and debugging IP Performance

 

306

 

 

Troubleshooting IP Performance

307

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

18 MULTICAST PROTOCOL

 

 

 

 

 

 

 

 

 

IP Multicast Overview

309

 

 

 

 

 

 

 

 

 

Multicast Addresses

310

 

 

 

 

 

 

 

 

IP Multicast Protocols

312

 

 

 

 

 

 

 

 

Forwarding IP Multicast Packets

313

 

 

 

 

 

 

Applying Multicast

314

 

 

 

 

 

 

 

 

 

IGMP Snooping

314

 

 

 

 

 

 

 

 

 

 

Configuring IGMP Snooping

317

 

 

 

 

 

 

Enabling IGMP Fast Leave Processing

318

 

 

 

 

Configuring IGMP Snooping Filter ACL

319

 

 

 

Configuring the Maximum Number of Multicast Groups on a Port 319

 

Configuring Multicast VLAN

320

 

 

 

 

 

 

Displaying and Debugging IGMP Snooping

 

321

 

 

Configuration Example—Enable IGMP Snooping

322

 

 

IGMP Snooping Fault Diagnosis and Troubleshooting

322

 

Common Multicast Configuration

323

 

 

 

 

 

 

Enabling Multicast

323

 

 

 

 

 

 

 

 

 

Configuring the Number Limit of Multicast Routing Entries 323

 

Multicast MAC Address Entry Configuration

324

 

11

 

Displaying Multicast MAC Address Configuration

324

 

 

Multicast Source Deny Configuration

325

 

 

 

Clearing MFC Forwarding Entries or Statistics Information 325

 

Clearing Route Entries From The Core Multicast Routing Table

325

 

Displaying and Debugging Common Multicast Configuration

326

 

Internet Group Management Protocol (IGMP)

326

 

 

 

Configuring IGMP

328

 

 

 

 

 

 

 

 

Displaying and debugging IGMP

 

333

 

 

 

 

PIM-DM Overview

333

 

 

 

 

 

 

 

 

 

Configuring PIM-DM

335

 

 

 

 

 

 

 

 

Displaying and Debugging PIM-DM

338

 

 

 

 

PIM-DM Configuration Example

 

338

 

 

 

 

PIM-SM Overview

339

 

 

 

 

 

 

 

 

 

PIM-SM Operating Principle

340

 

 

 

 

 

 

Preparations before Configuring PIM-SM

341

 

 

 

Configuring PIM-SM

341

 

 

 

 

 

 

 

 

Displaying and Debugging PIM-SM

346

 

 

 

 

PIM-SM Configuration Example

346

 

 

 

349

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

19 ACL CONFIGURATION

 

 

 

 

 

 

 

 

 

Brief Introduction to ACL

351

 

 

 

 

 

 

 

 

ACL Supported by the Switch

 

352

 

 

 

 

 

Configuring ACL

352

 

 

 

 

 

 

 

 

Defining ACL

353

 

 

 

 

 

 

 

 

 

Activating ACL

355

 

 

 

 

 

 

 

 

 

Displaying and Debugging ACL

356

 

 

 

 

 

Advanced ACL Configuration Example

356

 

 

 

Basic ACL Configuration Example

357

 

 

 

 

Link ACL Configuration Example

 

358

 

 

 

 

QoS Configuration

359

 

 

 

 

 

 

 

 

 

QoS Configuration

361

 

 

 

 

 

 

 

 

Setting Port Priority

361

 

 

 

 

 

 

 

 

Configuring the Priority for Protocol Packets

361

 

 

Setting Port Mirroring

362

 

 

 

 

 

 

 

 

Configuring Traffic Mirroring

362

 

 

 

 

 

Setting Traffic Limit

364

 

 

 

 

 

 

 

 

Setting Line Limit

365

 

 

 

 

 

 

 

 

Relabeling Priority Level

365

 

 

 

 

 

 

 

 

Configuring Traffic Statistics

365

 

 

 

 

 

 

Configuring WRED Operation

 

366

 

 

 

 

 

Configuring Control Over Telnet

 

366

 

 

 

 

Displaying and Debugging QoS Configuration

369

 

 

QoS Configuration Example

369

 

 

 

 

 

 

Port Mirroring Configuration Example

370

 

 

 

Priority Relabeling Configuration Example

371

 

 

 

QoS Profile Configuration

372

 

 

 

 

 

 

 

 

Configuring QoS Profile

372

 

 

 

 

 

 

 

Configuring Profile Application Mode

373

 

 

12 CHAPTER : CONTENTS

 

Applying QoS Profile to the Port 374

 

 

 

 

QoS Profile Configuration Example

374

 

 

 

ACL Control Configuration

376

 

 

 

 

 

Configuring ACL for Telnet Users

376

 

 

 

 

Defining ACL

376

 

 

 

 

 

 

 

Importing ACL

377

 

 

 

 

 

 

 

Configuration Example

377

 

 

 

 

 

 

Configuring ACL for SNMP Users

377

 

 

 

 

Configuration Example

379

 

 

 

 

 

 

Configuring ACL Control over the HTTP Users

379

 

 

Defining ACL

379

 

 

 

 

 

 

 

Calling ACL to Control HTTP Users

379

 

 

 

Configuration Example

380

 

 

 

 

 

 

 

 

 

20 CONFIGURATION FOR QOS FEATURES

 

 

 

RSPAN Features

381

 

 

 

 

 

 

 

Configuration Prerequisite

382

 

 

 

 

 

Configuration Procedures in the Source Switch

383

 

 

Configuration Procedures in the Intermediate Switch

383

 

Configuration Procedures in the Source Switch

384

 

 

Configuration Example

384

 

 

 

 

 

 

Features of Traffic Statistics

386

 

 

 

 

 

Improving the Depth First Order of ACL Matching

386

 

 

Displaying Information of the display acl command

387

 

 

Subdividing DSCP while Defining ACL Rules

387

 

 

 

The Synchronization Feature of Queue Scheduling for Aggregation Ports 388

 

Configuring Control Over Telnet

388

 

 

 

 

 

Configuration Preparation

388

 

 

 

 

 

Controlling Telnet using Source IP

389

 

 

 

Controlling Telnet using Source IP and Destination IP

389

 

Controlling Telnet using Source MAC

390

 

 

 

Configuration Example

390

 

 

 

 

 

 

 

 

 

 

 

 

21 802.1X CONFIGURATION

 

 

 

 

 

 

IEEE 802.1x Overview

391

 

 

 

 

 

 

 

802.1x System Architecture

391

 

 

 

 

 

802.1x Authentication Process

392

 

 

 

 

Implementing 802.1x on the Switch

393

 

 

 

Configuring 802.1x

393

 

 

 

 

 

 

 

Enabling/Disabling 802.1x

393

 

 

 

 

 

Setting the Port Access Control Mode

394

 

 

 

Setting the Port Access Control Method

394

 

 

 

Checking the Users that Log on the Switch using Proxy

394

 

Setting the User Number on a Port

395

 

 

 

Setting the Authentication in DHCP Environment

395

 

Configuring the Authentication Method for 802.1x User 395

 

802.1x PEAP Configuration

395

 

 

 

 

 

Setting the Maximum Times of Authentication Request Message

 

Retransmission

 

397

 

 

 

 

 

 

13

Configuring Timers 398

 

Enabling/Disabling a Quiet-Period Timer

399

802.1x Client Version Checking Configuration

399

Enabling the 802.1x Client Version Checking Function 399

Configuring the Maximum Number of Retires to Send Version Checking Request

Packets

399

 

 

 

 

Configuring the Version Checking Timer 400

 

 

802.1x Client Version Checking Configuration Example

400

Guest VLAN Configuration

400

 

 

 

Guest VLAN Configuration

401

 

 

 

Configure Guest VLAN in Ethernet port view 401

 

 

Guest VLAN Configuration Example

401

 

 

The 802.1x Trusted MAC Address Synchronization Function

402

802.1x Supplicant System Checking

402

 

 

Displaying and Debugging 802.1x 403

 

 

Auto QoS

403

 

 

 

 

802.1x Configuration Example 403

 

 

 

Centralized MAC Address Authentication

405

 

 

Centralized MAC Address Authentication Configuration

406

Enabling MAC Address Authentication Both Globally and On the Port 406

Configuring Centralized MAC Address Authentication Mode

406

Configuring the User Name and Password for Fixed Mode

 

407

Configuring Domain Name Used by the MAC Address Authentication User 407

Configuring Centralized MAC Address Authentication Timers 407

 

Displaying and Debugging Centralized MAC Address Authentication

408

Auto VLAN

408

 

 

 

 

 

 

Configuration Example of Centralized MAC Address Authentication

408

AAA and RADIUS Protocol Configuration

409

 

 

RADIUS Protocol Overview 409

 

 

 

 

Implementing AAA/RADIUS on the Ethernet Switch

410

 

Configuring AAA 410

 

 

 

 

 

Creating/Deleting an ISP Domain

411

 

 

 

Configuring Relevant Attributes of the ISP Domain

411

 

AAA Separation

413

 

 

 

 

 

 

Configuring Separate AAA Schemes

414

 

 

Configuration Example for Separate AAA Schemes

414

 

Enabling/Disabling the Messenger Alert

415

 

 

Configuring Self-Service Server URL

416

 

 

 

Dynamic VLAN Assignment

417

 

 

 

 

 

Configuring Dynamic VLAN Assignment

417

 

 

Configuration Example for Dynamic VLAN Assignment 417

 

Creating a Local User

418

 

 

 

 

 

Setting Attributes of the Local User

419

 

 

 

Disconnecting a User by Force

420

 

 

 

 

Configuring the RADIUS Protocol

420

 

 

 

Creating/Deleting a RADIUS Scheme

421

 

 

Configuring RADIUS Authentication/

 

 

 

 

Authorization Servers

421

 

 

 

 

 

Configuring RADIUS Accounting Servers and the Related Attributes

422

User Re-authentication at Reboot

424

 

 

 

 

14 CHAPTER : CONTENTS

 

Configuring User Re-authentication at Reboot

425

 

 

 

 

Configuration Example for User Re-authentication at Reboot

425

 

 

Setting the RADIUS Packet Encryption Key

425

 

 

 

 

 

Tag VLAN Assignment on Trunk/Hybrid Port Supported by 802.1x

 

 

Authentication 426

 

 

 

 

 

 

 

 

 

 

Identifier Authentication Method Attribute in RADIUS

426

 

 

 

Setting Retransmission Times of RADIUS Request Packet

426

 

 

 

Setting the Supported Type of the RADIUS Server

426

 

 

 

 

Setting the RADIUS Server State

427

 

 

 

 

 

 

 

Setting the Username Format Transmitted to the RADIUS Server

427

 

 

Setting the Unit of Data Flow that Transmitted to the RADIUS Server 428

 

 

Configuring the Local RADIUS Authentication Server 428

 

 

 

Configuring Source Address for RADIUS Packets Sent by NAS

428

 

 

Setting the Timers of the RADIUS Server

429

 

 

 

 

 

Displaying and Debugging AAA and RADIUS Protocol

430

 

 

 

AAA and RADIUS Protocol Configuration Example

431

 

 

 

Configuring the Switch 5500

433

 

 

 

 

 

 

 

AAA and RADIUS Protocol Fault Diagnosis and Troubleshooting

435

 

 

Problem Diagnosis

436

 

 

 

 

 

 

 

 

 

 

3Com-User-Access-Level 436

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

22 FILE SYSTEM MANAGEMENT

 

 

 

 

 

 

 

 

 

File System Overview

437

 

 

 

 

 

 

 

 

 

 

Directory Operation

438

 

 

 

 

 

 

 

 

 

 

File Attribute Configuration 438

 

 

 

 

 

 

 

 

 

File Attribute Configuration

439

 

 

 

 

 

 

 

 

File Operation

440

 

 

 

 

 

 

 

 

 

 

 

Storage Device Operation

440

 

 

 

 

 

 

 

 

Setting the Prompt Mode of the File System

441

 

 

 

 

Configuring File Management

441

 

 

 

 

 

 

 

 

Displaying the Current-configuration and Saved-configuration of the Switch

441

 

Saving the Current-configuration

442

 

 

 

 

 

 

 

Erasing Configuration Files from Flash Memory

442

 

 

 

 

Configuring the Name of the Configuration File used for the Next Startup.

442

 

Configuration File Backup and Restoration

443

 

 

 

 

 

 

Configuration Preparation

443

 

 

 

 

 

 

 

 

FTP Overview

443

 

 

 

 

 

 

 

 

 

 

 

Enabling/Disabling FTP Server

444

 

 

 

 

 

 

 

 

Configuring Source IP Address for FTP Serve and Client

444

 

 

 

Configuring the FTP Server Authentication and Authorization

445

 

 

Configuring the Running Parameters of FTP Server

445

 

 

 

Displaying and Debugging FTP Server 446

 

 

 

 

 

 

Displaying the Source IP Address Configuration

446

 

 

 

 

Introduction to FTP Client

446

 

 

 

 

 

 

 

 

FTP Server Configuration Example

448

 

 

 

 

 

 

 

TFTP Overview

449

 

 

 

 

 

 

 

 

 

 

 

Downloading Files by means of TFTP

450

 

 

 

 

 

 

Uploading Files by means of TFTP

450

 

 

 

 

 

 

 

TFTP Client Configuration Example

450

 

 

 

 

 

 

15

MAC Address Table Management

451

MAC Address Table Configuration

452

Displaying MAC Address Table

454

MAC Address Table Management Display Example 454

MAC Address Table Management Configuration Example 455

Device Management 456

 

 

Device Management Configuration

456

Device Management Configuration Example 457

System Maintenance and Debugging

 

459

Setting the Daylight Saving Time

 

459

459

 

 

Telneting with Specified Source IP Address/Source Interface IP Address 459

460

 

 

 

 

 

 

 

 

 

 

Basic System Configuration

460

 

 

 

 

Terminating the FTP Connection of a Specified User

461

 

 

Restarting the Switch

461

 

 

 

 

 

 

Displaying the State and Information of the System

461

 

 

System Debugging

462

 

 

 

 

 

 

Testing Tools for Network Connection

464

 

 

 

 

ping

464

 

 

 

 

 

 

 

 

 

tracert

464

 

 

 

 

 

 

 

 

 

Introduction to Remote-ping

465

 

 

 

 

 

Remote-ping Configuration

 

466

 

 

 

 

 

Introduction to Remote-ping Configuration

466

 

 

 

Configuring Remote-ping

466

 

 

 

 

 

Configuration Example

467

 

 

 

 

 

Logging Function

468

 

 

 

 

 

 

 

 

Introduction to Info-center

468

 

 

 

 

 

Info-Center Configuration

471

 

 

 

 

 

Sending the Information to Loghost 474

 

 

 

 

Sending the Information to Control Terminal

476

 

 

Sending the Information to Telnet Terminal or Dumb Terminal

478

Sending the Information to the Log Buffer

480

 

 

 

Sending the Information to the Trap Buffer

481

 

 

 

Sending the Information to SNMP Network Management

482

Configuring Synchronous Information Output Function

485

 

Configuration Examples of Sending Log to Unix Loghost

485

Configuration Examples for Sending Log to Linux Loghost

486

Configuration Examples of Sending Log to Control Terminal

488

RMON Configuration

489

 

 

 

 

 

 

Configuring RMON

489

 

 

 

 

 

 

Displaying and Debugging RMON

491

 

 

 

 

RMON Configuration Example 492

 

 

 

 

NTP Overview 492

 

 

 

 

 

 

 

 

NTP Configuration

494

 

 

 

 

 

 

 

Configuring NTP Operating Mode

494

 

 

 

 

Displaying and Debugging NTP

499

 

 

 

 

Typical NTP Configuration Examples

499

 

 

 

 

Configure NTP Server

499

 

 

 

 

 

NTP peer Configuration

 

501

 

 

 

 

 

16 CHAPTER : CONTENTS

 

Configure NTP Broadcast Mode

502

 

 

Configure NTP Multicast Mode

504

 

 

Configure Authentication-enabled NTP Server Mode

505

 

SSH Terminal Services

506

 

 

 

 

 

Configuring SSH Server

507

 

 

 

Setting System Protocol

507

 

 

 

Configuring SSH Client

510

 

 

 

SSH Configuration Example

515

 

 

File System Configuration

516

 

 

 

Introduction to File System

516

 

 

 

File System Configuration

517

 

 

 

FTP Lighting Configuration

518

 

 

 

Introduction to FTP

518

 

 

 

 

FTP Lighting Procedure

518

 

 

 

TFTP Lighting Configuration

 

520

 

 

 

TFTP Lighting Procedure

521

 

 

 

 

 

23 PORT TRACKING CONFIGURATION

 

 

Introduction to the Port Tracking Function 523

 

 

Port Tracking Configuration

523

 

 

 

Configuring the Port Tracking Function

523

 

 

Port Tracking Configuration Example

523

 

 

 

24 DYNAMICALLY APPLY ACL BY RADIUS SERVER CONFIGURATION

 

Introduction to Dynamically Apply ACL by RADIUS Server

525

 

Introduction to Dynamically Apply ACL by RADIUS Server Configurations 525

 

Configuration Example

526

 

 

 

Network requirements

526

 

 

 

Network diagram

526

 

 

 

 

Configuration procedure

527

 

 

 

Configuration on the switch 529

 

 

 

 

 

 

25 AUTO DETECT CONFIGURATION

 

 

 

Introduction to the Auto Detect Function

531

 

 

Configuring the auto detect function

531

 

 

Auto Detect Configuration Example

531

 

 

Auto Detect Implementation

532

 

 

 

Auto Detect Implementation in Static Routing 533

 

 

Configuring the Auto Detect Function for a Static Route

533

 

Configuration Example

533

 

 

 

Auto Detect Implementation in VRRP 534

 

 

Configuring the Auto Detect Function for VRRP 534

 

 

Configuration Example

534

 

 

 

Auto Detect Implementation in VLAN Interface Backup 536

 

Configuring the Auto Detect Function for VLAN Interface Backup 536

 

Configuration Example

536

 

 

17

26

RSTP CONFIGURATION

 

 

 

 

 

 

 

 

STP Overview 539

 

 

 

 

 

 

 

 

 

Implement STP

539

 

 

 

 

 

 

 

 

Configuration BPDU Forwarding Mechanism in STP

543

 

 

Implement RSTP on the Switch

543

 

 

 

 

 

RSTP Configuration

544

 

 

 

 

 

 

 

 

Enable/Disable RSTP on a Switch

 

547

 

 

 

 

Enable/Disable RSTP on a Port

547

 

 

 

 

 

Configure RSTP Operating Mode

 

548

 

 

 

 

Configure the STP-Ignore attribute of VLANs on a Switch

548

 

 

Set Priority of a Specified Bridge

 

549

 

 

 

 

 

Specify the Switch as Primary or Secondary Root Bridge

549

 

 

Set Forward Delay of a Specified Bridge

550

 

 

 

 

Set Hello Time of the Specified Bridge

550

 

 

 

 

Set Max Age of the Specified Bridge

550

 

 

 

 

Set Timeout Factor of the Bridge

 

551

 

 

 

 

Specifying the Maximum Transmission Rate of STP Packets on a Port

551

 

Set Specified Port to be an EdgePort

552

 

 

 

 

Specifying the Path Cost on a Port

552

 

 

 

 

Set the Priority of a Specified Port

553

 

 

 

 

Configure a Specified Port to be Connected to Point-to-Point Link

553

 

Set mCheck of the Specified Port

 

554

 

 

 

 

Configure the Switch Security Function

554

 

 

 

 

Display and Debug RSTP

556

 

 

 

 

 

 

 

RSTP Configuration Example

556

 

 

 

 

 

 

27

 

 

 

 

 

 

 

POE PROFILE CONFIGURATION

 

 

 

 

 

 

 

Introduction to PoE Profile

559

 

 

 

 

 

 

 

PoE Profile Configuration

559

 

 

 

 

 

 

 

PoE Profile Configuration Tasks

559

 

 

 

 

 

PoE Profile Configuration Example

560

 

 

 

28

 

 

 

 

 

 

 

SNMP CONFIGURATION

 

 

 

 

 

 

 

SNMP Configuration Introduction

563

 

 

 

 

 

SNMP Versions and Supported MIB

563

 

 

 

 

Configure SNMP

565

 

 

 

 

 

 

 

 

Enabling/Disabling SNMP Agent to Send Trap 566

 

 

 

Setting the Destination Address of Trap

566

 

 

 

 

Setting Lifetime of Trap Message

 

567

 

 

 

 

Setting SNMP System Information

567

 

 

 

 

Setting the Engine ID of a Local or Remote Device

567

 

 

 

Setting/Deleting an SNMP Group

 

567

 

 

 

 

Setting the Source Address of Trap

568

 

 

 

 

Adding/Deleting a User to/from an SNMP Group

568

 

 

 

Creating/Updating View Information or Deleting a View

568

 

 

Setting the Size of SNMP Packet Sent/Received by an Agent 568

 

 

Enabling/Disabling a Port Transmitting Trap Information SNMP Agent

569

 

Disabling SNMP Agent

569

 

 

 

 

 

 

18 CHAPTER : CONTENTS

 

Network Management Operation Logging Configuration

569

 

 

Displaying and Debugging SNMP

570

 

 

 

 

 

 

SNMP Configuration Example

570

 

 

 

 

 

 

Reading Usmusr Table Configuration Example

571

 

 

 

 

 

 

 

 

29 SOURCE IP ADDRESS CONFIGURATION

 

 

 

 

 

Configuring Source IP Address for Service Packets 573

 

 

 

Displaying the Source IP Address Configuration

574

 

 

 

 

 

 

30 PASSWORD CONTROL CONFIGURATION OPERATIONS

 

 

Introduction to Password Control Configuration

575

 

 

 

 

Password Control Configuration

 

576

 

 

 

 

 

 

 

Configuration Prerequisites

576

 

 

 

 

 

 

 

Configuration Tasks

576

 

 

 

 

 

 

 

 

 

Configuring Password Aging

 

577

 

 

 

 

 

 

 

Configuring the Limitation of Minimum Password Length

578

 

 

Configuring History Password Recording

579

 

 

 

 

Configuring a User Login Password in Encryption Mode

580

 

 

Configuring Login Attempts Limitation and Failure Processing Mode

580

 

Configuring the Timeout Time for Users to be authenticated 581

 

 

Displaying Password Control 581

 

 

 

 

 

 

 

Password Control Configuration Example

582

 

 

 

 

 

 

 

 

 

 

 

 

 

 

31 MSDP CONFIGURATION

 

 

 

 

 

 

 

 

 

Introduction to MSDP

585

 

 

 

 

 

 

 

 

 

MSDP Working Mechanism

587

 

 

 

 

 

 

 

Configuring MSDP Basic Functions

590

 

 

 

 

 

 

Configuration Prerequisites

590

 

 

 

 

 

 

 

Configuring MSDP Basic Functions

591

 

 

 

 

 

Configuring Connection Between MSDP Peers

591

 

 

 

 

Configuration Prerequisites

591

 

 

 

 

 

 

 

Configuring Description Information for MSDP Peers

592

 

 

Configuring Anycast RP Application

592

 

 

 

 

 

Configuring an MSDP Mesh Group

592

 

 

 

 

 

Configuring MSDP Peer Connection Control

593

 

 

 

 

Configuring SA Message Transmission

593

 

 

 

 

 

Configuration Prerequisites

593

 

 

 

 

 

 

 

Configuring the Transmission and Filtering of SA Request Messages

594

 

Configuring a Rule for Filtering the Multicast Sources of SA Messages

594

 

Configuring a Rule for Filtering Received and Forwarded SA Messages

595

 

Configuring SA Message Cache

595

 

 

 

 

 

 

Displaying and Debugging MSDP Configuration

596

 

 

 

 

MSDP Configuration Example

596

 

 

 

 

 

 

 

Configuration Example of Anycast RP Application

596

 

 

 

Troubleshooting MSDP Configuration

599

 

 

 

 

 

MSDP Peer Always in the Down State

599

 

 

 

 

 

No SA Entry in the SA Cache of the Router

599

 

 

 

 

 

19

 

 

 

32 CLUSTERING

 

 

Clustering Overview 601

 

Switch Roles 602

 

 

Introduction to NDP

603

 

Introduction to NTDP

603

 

Introduction to Cluster Roles

604

 

Management Device Configuration

605

 

Enabling System and Port NDP

605

 

Configuring NDP Parameters

 

605

 

Enabling System and Port NTDP

605

 

Configuring NTDP Parameters

 

605

 

Configuring Cluster Parameters

606

 

Configuring Internal-External Interaction 607

 

NM Interface for Cluster Management Configuration 607

 

Member Device Configuration

608

 

Enabling System and Port NDP

608

 

Enabling System and Port NTDP

608

 

Specifying the cluster FTP/TFTP server 608

 

Configuring Cluster Parameters

609

 

Displaying and Maintaining Cluster Configurations 609

 

Clustering Configuration Example

610

 

NM Interface for Cluster Management Configuration Example 612

 

 

33 HWTACACS CONFIGURATION

 

Configuring HWTACACS 615

 

 

HWTACACS configuration tasks

615

Creating a HWTACAS Scheme

616

Configuring HWTACACS Authentication Servers 617

Configuring HWTACACS Accounting Servers and the Related Attributes 617

 

Configuring Source Address for HWTACACS Packets Sent by NAS

618

 

Setting a Key for Securing the Communication with TACACS Server 618

 

Setting the Username Format Acceptable to the TACACS Server

618

 

Setting the Unit of Data Flows Destined for the TACACS Server

619

 

Setting Timers Regarding TACACS Server

619

 

 

Displaying and Debugging HWTACACS Protocol 620

 

 

HWTACACS Protocol Configuration Example

621

 

 

Configuring the FTP/Telnet User Authentication at a Remote TACACS Server 621

 

 

 

 

A PASSWORD RECOVERY PROCESS

 

 

 

Introduction 623

 

 

 

 

CLI Commands Controlling Bootrom Access

623

 

 

Bootrom Interface 624

 

 

 

 

Displaying all Files in Flash

624

 

 

 

Skipping the Current Configuration File

625

 

 

Bootrom Passwords 625

 

 

 

 

Bootrom Password Recovery

626

 

 

20 CHAPTER : CONTENTS

B RADIUS SERVER AND RADIUS CLIENT SETUP

 

Setting Up A RADIUS Server

627

 

 

 

 

 

 

Configuring Microsoft IAS RADIUS

627

 

 

 

 

Configuring Funk RADIUS

652

 

 

 

 

 

Configuring FreeRADIUS

656

 

 

 

 

 

 

Setting Up the RADIUS Client

658

 

 

 

 

 

Windows 2000 built-in client

658

 

 

 

 

Windows XP built-in client

658

 

 

 

 

 

Aegis Client Installation 659

 

 

 

 

 

 

 

C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS

 

Cisco Secure ACS (TACACS+) and the 3Com Switch 5500

661

 

Setting Up the Cisco Secure ACS (TACACS+) server

661

 

 

Adding a 3Com Switch 5500 as a RADIUS client

662

 

 

Adding a User for Network Login

664

 

 

 

 

Adding a User for Switch Login

665

 

 

 

 

 

 

 

 

 

 

 

 

 

 

D 3COM XRN

 

 

 

 

 

 

 

 

 

 

What is XRN?

672

 

 

 

 

 

 

 

 

Supported Switches

672

 

 

 

 

 

 

 

XRN Terminology

672

 

 

 

 

 

 

 

 

Benefits of XRN

 

673

 

 

 

 

 

 

 

 

XRN Features

673

 

 

 

 

 

 

 

 

Distributed Device Management (DDM)

673

 

 

 

Distributed Resilient Routing (DRR)

673

 

 

 

 

Distributed Link Aggregation (DLA)

674

 

 

 

 

How to Implement XRN—Overview

 

676

 

 

 

 

Important Considerations and Recommendations

676

 

 

Recommendations for Achieving Maximum Resilience

677

 

Unit ID Numbering Mechanism

678

 

 

 

 

678

 

 

 

 

 

 

 

 

 

 

Network Example using XRN

678

 

 

 

 

 

XRN Distributed Fabric Network

 

678

 

 

 

 

Recovering your XRN Network

680

 

 

 

 

 

Unit Failure

 

680

 

 

 

 

 

 

 

 

Interconnect Failure

680

 

 

 

 

 

 

 

How XRN Interacts with other 3Com Switches

680

 

 

How XRN Interacts with other Features 681

 

 

 

 

VLANs 681

 

 

 

 

 

 

 

 

 

Legacy Aggregated Links

682

 

 

 

 

 

 

STP/RSTP

683

 

 

 

 

 

 

 

 

Resilient Links

683

 

 

 

 

 

 

 

 

How a Failure affects the Distributed Fabric

684

 

 

Loss of a Switch within the XRN Distributed Fabric 684

Loss of the Fabric Interconnect 685

ABOUT THIS GUIDE

This guide provides information about configuring your network using the commands supported on the 3Com® Switch 5500 Family.

The descriptions in this guide apply to the Switch 5500-SI and Switch 5500-EI. Differences between the models are noted in the text.

Organization of the

Manual

The Switch 5500 Family Configuration Guide consists of the following chapters:

Getting Started—Details the main features and configurations of the Switch 5500.

Address Management—Details how to configure the switch on which the Address Manage (AM) feature is enabled.

Port Operation—Details how to configure Ethernet port and link aggregation.

XRN Fabric—Details how to configure an XRN fabric.

DLDP—Drtails overview and fundamentals for Device Link Detection Protocol.

VLAN Operation—Details how to configure VLANs.

GVRP Configuration—Details GARP VLAN Registration Protocol configuration.

VLAN-VPN—Details configuration information to create VLAN-VPNs.

DHCP—Details Dynamic Host Configuration Protocol.

Reliability—Details Virtual Router Redundancy Protocol (VRRP).

MSTP—Details Multiple spanning tree protocol.

Centralized MAC address authentication—Details Centralized MAC address authentication configuration.

SSH—Details Secure Shell authentication.

IP Routing Protocol Operation—Details how to configure routing protocols.

Network Protocol Operation—Details how to configure network protocols.

Multicast Protocol—Details how to configure multicast protocols.

ACL Configuration—Details how to configure QoS/ACL.

QoS—Detais Quality of Service

RSTP Configuration—Details how to configure RSTP.

802.1x Configuration—Details how to configure 802.1x.

File System Management—Details how to configure file system management.

Port Tracking—Details Port Tracking Configuration.

22 ABOUT THIS GUIDE

ACL by RADIUS—Details ACL by RADUIS Configuration.

Auto Detect—Details Auto Detect Configuration.

RSTP—Details Spanning Tree Protocol Configuration.

PoE—Details PoE profile Configuration.

SNMP—Details Simple Network Management Protocol Configuration.

Source IP Address—Details Source IP Address Configuration for the FTP client and server .

Password Control—Details Password Control Configuration.

MSDP—Details MSDP Configuration.

Clustering—Details Clustering Configuration.

HWTACACS—Details HWTACACS Configuration.

Intended Readership The manual is intended for the following readers:

Network administrators

Network engineers

Users who are familiar with the basics of networking

Conventions

This manual uses the following conventions:

 

Table 1

Icons

 

 

 

 

 

 

 

Icon

Notice Type

Description

 

 

 

 

 

 

Information note

Information that describes important features or instructions.

 

 

Caution

 

Information that alerts you to potential loss of data or potential

 

 

 

 

damage to an application, system, or device.

 

 

Warning

 

Information that alerts you to potential personal injury.

 

 

 

 

 

Table 2

Text conventions

 

 

 

 

 

Convention

Description

 

 

 

 

Screen displays

This typeface represents text as it appears on the screen.

 

Keyboard key names

If you must press two or more keys simultaneously, the key names are

 

 

 

linked with a plus sign (+), for example:

 

 

 

Press Ctrl+Alt+Del

 

The words “enter”

When you see the word “enter” in this guide, you must type something,

 

and type”

and then press Return or Enter. Do not press Return or Enter when an

 

 

 

instruction simply says “type.”

 

Fixed command

This typeface indicates the fixed part of a command text. You must type

 

text

 

the command, or this part of the command, exactly as shown, and press

 

 

 

Return or Enter when you are ready to enter the command.

Example: The command display history-command must be entered exactly as shown.

 

 

Related Manuals 23

 

Table 2 Text conventions (continued)

 

 

 

 

Convention

Description

 

 

 

 

Variable

This typeface indicates the variable part of a command text. You must type

 

command text

a value here, and press Return or Enter when you are ready to enter the

 

 

command.

 

 

Example: in the command super level, a value in the range 0 to 3 must

 

 

be entered in the position indicated by level

 

{ x | y | ... }

Alternative items, one of which must be entered, are grouped in braces

 

 

and separated by vertical bars. You must select and enter one of the items.

 

 

Example: in the command flow-control {hardware | none |

 

 

software}, the braces and the vertical bars combined indicate that you

 

 

must enter one of the parameters. Enter either hardware, or none, or

 

 

software.

 

[ ]

Items shown in square brackets [ ] are optional.

 

 

Example 1: in the command display users [all], the square brackets

 

 

indicate that the parameter all is optional. You can enter the command

 

 

with or without this parameter.

 

 

Example 2: in the command user-interface [type] first-number

 

 

[last-number] the square brackets indicate that the parameters [type]

 

 

and [last-number] are both optional. You can enter a value in place of

 

 

one, both or neither of these parameters.

 

 

Alternative items, one of which can optionally be entered, are grouped in

 

 

square brackets and separated by vertical bars.

 

 

Example 3: in the command header [shell | incoming | login]

 

 

text, the square brackets indicate that the parameters shell,

 

 

incoming and login are all optional. The vertical bars indicate that only

 

 

one of the parameters is allowed.

 

 

 

 

Related Manuals

The 3Com Switch 5500 Family Getting Started Guide provides information about

 

installation.

 

 

The 3Com Switch 5500 Family Command Reference Guide provides all the information you need to use the configuration commands.

24 ABOUT THIS GUIDE

GETTING STARTED

1

This chapter covers the following topics:

Product Overview

XRN Overview

Product Features

Logging in to the Switch

Command Line Interface

User Interface Configuration

Product Overview

The Switch 5500 Family are Layer 3 switching products supporting expandable resilient

 

networking (XRN). The Switch 5500 can be one of two series: Switch 5500-SI or the

 

Switch 5500-EI. The Switch 5500 family supports simple routing, basic service features,

 

and basic XRN; the Switch 5500 family supports rather complex routing protocols,

 

abundant service features and enhanced XRN. Besides saving user cost otherwise invested

 

on module rack-type switches, the Switch 5500 family with XRN also offer excellent

 

network availability, upgrade ability, performance, and power network control capacity.

 

Table 3 lists the models in the Switch 5500 family:

 

Table 3 Models in the Switch 5500 family

 

Power

Number of

Number of 100

Number of 1000

Console

 

supply unit

service

Mbps uplink

Model

(PSU)

ports

Mbps ports

ports

port

 

 

 

 

 

 

 

5500-SI

AC-input,

28

24

10/100 Mbps

4 SFP

1

28-Port

DC-input

 

 

 

 

 

5500-SI

AC-input,

52

48

10/100 Mbps

4 SFP

1

52-Port

DC-input

 

 

 

 

 

5500-EI

AC-input,

28

24

10/100 Mbps

4 SFP

1

28-Port

DC-input

 

 

 

 

 

5500-EI

AC-input,

52

48

10/100 Mbps

4 SFP

1

52-Port

DC-input

 

 

 

 

 

 

 

 

 

 

 

 

5500-EI PWR

AC-input,

28

24

10/100 Mbps

4 SFP

1

28-Port

DC-input

 

 

 

 

 

 

 

 

 

 

 

 

5500-EI PWR

AC-input,

52

48

10/100 Mbps

4 SFP

1

52-Port

DC-input

 

 

 

 

 

 

 

 

 

 

 

 

5500-EI

AC-input,

28

24

100 Mbps

2 10/100/1000

1

28-Port FX

DC-input

 

 

 

plus2 SFP

 

 

 

 

 

 

 

 

5500G-EI

AC-input,

24

 

20 10/100/1000

1

24-Port

DC-input

 

 

 

Mbps plus 4

 

 

 

 

 

 

10/100/1000 or SFP

 

 

 

 

 

 

 

 

5500G-EI

AC-input,

48

 

44 10/100/1000

1

48-Port

DC-input

 

 

 

Mbps plus 4

 

 

 

 

 

 

10/100/1000 or SFP

 

 

 

 

 

 

 

 

5500G-EI

AC-input,

24

 

20 10/100/1000

1

PWR 24-Port

DC-input

 

 

 

Mbps plus 4

 

 

 

 

 

 

10/100/1000 or SFP

 

26 CHAPTER 1: GETTING STARTED

Table 3 Models in the Switch 5500 family (continued)

 

 

Power

Number of

Number of 100

Number of 1000

Console

 

 

supply unit

service

Mbps uplink

 

Model

(PSU)

ports

Mbps ports

ports

port

 

 

 

 

 

 

 

 

 

5500G-EI

AC-input,

48

44 10/100/1000

1

 

 

PWR 48-Port

DC-input

 

 

Mbps plus 4

 

 

 

 

 

 

 

10/100/1000 or SFP

 

 

 

 

 

 

 

 

 

 

 

5500G-EI

AC-input,

24

20 10/100/1000

1

 

 

24-Port SFP

DC-input

 

 

Mbps plus 4

 

 

 

 

 

 

 

10/100/1000 or SFP

 

 

 

 

 

 

 

 

The Switch 5500 family supports the following services:

 

 

 

 

Internet broadband access

 

 

 

 

 

MAN (metropolitan area network), enterprise/campus networking

 

 

 

Multicast service, multicast routing, and audio and video multicast service.

 

 

 

XRN Overview

With the XRN (eXpandable Resilient Networking) feature, you can connect several

devices into a combined device and manage them as a single unit. The combined device is called the Fabric, while the member devices are units. With XRN you can:

Manage multiple devices in centralized manner, with low management cost.

Extend the number of ports and switching capacity just by adding devices. You can decide which equipment to purchase as needed, and better protect your existing investment while upgrading the network.

Provide backup between multiple devices to improve reliability and to eliminate single points of failure.

Major Technologies XRN includes three technologies: distributed device management (DDM), distributed link aggregation (DLA), and distributed resilient route (DRR).

DDM: Users can treat the Fabric as a single device. They can manage the Fabric through any port or IP address connected into the Fabric, and from any unit in the fabric.

DRR: The multiple units of a Fabric route and forward packets as a single unit, and provide uniform VLAN interfaces, routing table and L3 forwarding table, so the Fabric is regarded as a single Layer 3 switch. Failure of one of the units will not affect routing protocol and data forwarding.

DLA: Users can aggregate multiple ports of several different units in a Fabric into a group, for centralized management within the Fabric. Trans-unit link aggregation can bring convenient aggregation setting and effectively reduce single points of failure.

The Switch 5500-SI supports basic XRN, that is DDM and DLA; the Switch 5500-EI supports enhanced XRN, including DDM, DRR, and DLA.

Typical Networking Typical XRN networking topology is as shown in Figure 1. Switches of the same type Topology (that is, units) form a Fabric. As a core switch, the Fabric can be downlinked to

workgroup switches through several aggregation links, and uplinked to the server group also through several aggregation links.

Product Features 27

Figure 1 Networking Topology with XRN

Server

Core switches

Workgroup

switches

Desktop

PCs

Product Features

Table 4 describes the features:

 

Table 4 Function Features

 

 

 

 

 

Features

Description

 

 

 

 

Port

802.1D Learning

 

 

Static MAC (unicast/multicast)

 

 

Jumbo Frame (9k) (EI models only)

 

 

Unidirectional Link Detection (UDLD)

 

VLAN

VLAN compliant with IEEE 802.1Q Standard

 

 

Port-based VLAN

 

 

Protocol Based VLAN, compliant with IEEE 802.1v Standard (EI

 

 

models only)

 

 

Voice VLAN

 

 

8021.Q in Q Double Tagged VLAN Support (EI models only)

 

STP protocol

Spanning Tree Protocol (STP) / Rapid Spanning Tree Protocol

 

 

(RSTP), compliant with IEEE 802.1D/IEEE802.1w Standard

 

 

Multiple Spanning Tree Protocol (MSTP), compliant with IEEE

 

 

802.1s Standard

 

 

BPDU Guard

 

 

Spanning Tree Root Guard

 

Flow control

IEEE 802.3 flow control (full-duplex)

 

 

Back-pressure based flow control (half-duplex)

 

Traffic Suppression

Broadcast/Unicast/Multicast Suppression

28 CHAPTER 1: GETTING STARTED

Table 4 Function Features (continued)

Features

Description

 

 

Multicast

Internet Group Management Protocol (IGMP) Snooping

 

Multicast VLAN Registration (MVR)

 

Internet Group Management Protocol (IGMP) (EI models only)

 

Protocol-Independent Multicast-Dense Mode (PIM-DM) (EI

 

models only)

 

Protocol-Independent Multicast-Sparse Mode (PIM-SM) (EI

 

models only)

 

Mulitcast Source Discovery Protocol (MSDP) (EI models only)

IP routing

Static route

 

RIP V1/v2

 

OSPF (EI models only)

 

IP routing policy

 

Forwarding IP layer 3 broadcast packets

 

DHCP (Dynamic Host Configuration Protocol) Client

 

DHCP Server (EI models only)

 

DHCP Options 60, 82 and 184

 

DHCP Relay

 

UDP Relay

Link aggregation

Link aggregation

 

Link Aggregation Control Protocol (LACP), compliant with IEEE

 

802.3ad Standard

Mirror

Mirror based on the traffic classification

 

Port-based mirror

 

VLAN-based mirror

 

Remote mirroring

Security features

Multi-level user management and password protect

 

802.1X Network Login

 

MAC Based Network Login

 

Mixed 802.1X and MAC Based Network Login

 

RADIUS and TACACS+ Authentication, Authorization and

 

Accounting

 

PAP, CHAP, EAP-MD5,TLS,TTLS and PEAP Authenticating

 

Packet filtering

Quality of Service (QoS)

Traffic classification

 

Bandwidth control

 

Priority

 

Queues of different priority on the port

 

Queue scheduling: supports Strict Priority Queuing (SP),

 

Weighted Round Robin (WRR), WFQ, SP+WFQ, and SP+WRR

 

QoS profile management manner

 

Logging in to the Switch 29

Table 4 Function Features (continued)

 

 

 

Features

Description

 

 

 

Management and

Command line interface configuration

Maintenance

Configuration through console port

 

 

Remote configuration through Telnet or SSH

 

Configuration through dialing the Modem

 

SNMP v1/2c/3

 

System log

 

Level alarms

 

Output of debugging information

 

Ping and Tracert

 

Remote maintenance with Telnet, Modem and SSHv2

Loading and updates

Loading and upgrading of software through the XModem

 

protocol

 

Loading and upgrading of software through File Transfer

 

Protocol (FTP) , Trivial File Transfer Protocol (TFTP) and Secure File

 

Transfer Protocol (SFTP)

 

 

 

Logging in to the

This section describes how to log in to the switch.

Switch

 

Setting up

Perform the following procedure to set up the configuration environment through

Configuration

the console port.

Environment through

 

the Console Port

 

1To set up the local configuration environment, connect the serial port of a PC (or a terminal) to the console port of the Switch with the console cable (see Figure 2).

Figure 2 Setting up the Local Configuration Environment through the Console Port

Console port

Console cable

2Run terminal emulator (such as Terminal on Windows 3X or the Hyper Terminal on Windows 9X) on the PC. Set the terminal communication parameters as follows:

Baud rate = 19200

Databit = 8

Parity check = none

Stopbit = 1

Flow control = none

Terminal type = VT100

3COM 5500-SI User Manual

30 CHAPTER 1: GETTING STARTED

Figure 3 Setting up a New Connection

Figure 4 Configuring the Port for Connection

Loading...
+ 656 hidden pages