3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time
without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or
expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality,
and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s)
described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license agreement
included with the product as a separate document, in the hard copy documentation, or on the removable media in a
directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will
be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are provided to
you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense. Software is
delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item”
as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial
license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or
FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided
on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered
in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
Cisco is a registered trademark of Cisco Systems, Inc.
Funk RADIUS is a registered trademark of Funk Software, Inc.
Aegis is a registered trademark of Aegis Group PLC.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are
registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of Novell, Inc. UNIX is a
registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed
to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards.
Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully
biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are
vegetable-based with a low heavy-metal content.
Page 3
CONTENTS
CONTENTS
ABOUT THIS GUIDE
Organization of the Manual21
Intended Readership22
Conventions 22
Related Manuals23
1GETTING STARTED
Product Overview25
XRN Overview26
Major Technologies26
Typical Networking Topology26
Product Features27
Logging in to the Switch29
Setting up Configuration Environment through the Console Port29
Setting up Configuration Environment through Telnet31
Setting up Configuration Environment through a Dial-up Modem33
Command Line Interface37
Command Line View37
Features and Functions of Command Line40
User Interface Configuration42
User Interface Configuration43
Displaying and Debugging User Interface49
3
2ADDRESS MANAGEMENT CONFIGURATION
Introduction to Address Management51
Configuring Address Management51
Configuring a Port-Based Address Management IP Address Pool51
Binding the MAC Address and IP Address of a Legal User to the Specified Port51
Address Management Configuration Example52
Port-Based Address Management IP Address Pool Configuration Example52
Configuration Example of Binding the MAC Address and IP Address of a Legal
User53
3PORT OPERATION
Ethernet Port Configuration Introduction55
Ethernet Port Configuration55
EthernetPort Security Features62
Displaying and Debugging Ethernet Port66
Page 4
4 CHAPTER : CONTENTS
Displaying Port Configuration Information in Brief67
Ethernet Port Configuration Example67
Ethernet Port Troubleshooting68
Link Aggregation Configuration68
Link Aggregation Configuration71
Displaying and Debugging Link Aggregation74
Link Aggregation Configuration Example75
Global Broadcast Suppression Feature76
Configuring Global Broadcast Suppression76
Global Broadcast Suppression Configuration Example76
Configuration procedure76
Displaying Information About a Specified Optical Port77
4XRN CONFIGURATION
Introduction to XRN79
Configuring an XRN Fabric79
Specifying the Stacking VLAN of the Switch80
Setting Unit IDs for Switches80
Saving the Unit ID of Each Unit in the Fabric81
Specifying the Fabric Port of the Switch81
Setting Unit Names for Switches81
Setting a Fabric Name for Switches81
Setting an XRN Authentication Mode for Switches82
Displaying and Debugging a Fabric82
Fabric Configuration Example82
RMON on XRN83
Configuration Commands for RMON on XRN84
Clustering on XRN84
Peer Fabric Port Detection84
Work Flow of the Peer Fabric Port Detection Function84
Prompt Information and Solution85
Multiple Fabric Port Candidates86
5DLDP CONFIGURATION
DLDP Overview89
DLDP Fundamentals90
Precautions During DLDP Configuration93
DLDP Configuration93
14CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION
Introduction to Centralized MAC Address Authentication195
Centralized MAC Address Authentication Configuration196
Enabling Global/Port-based Centralized MAC Address Authentication196
Configuring an ISP Domain for MAC Address Authentication Users196
Setting Centralized MAC Address Authentication Timers196
Displaying and Debugging Centralized MAC Address Authentication197
Centralized MAC Address Authentication Configuration Example197
15SSH TERMINAL SERVICES
SSH Terminal Services199
Introduction to SSH199
SSH Server Configuration201
SSH Client Configuration205
Displaying SSH Configuration205
SSH Server Configuration Example206
SSH Client Configuration Example207
SSH Keygen Program209
SFTP Service210
SFTP Overview210
SFTP Server Configuration210
SFTP Client Configuration211
SFTP Configuration Example213
16IP ROUTING PROTOCOL OPERATION
IP Routing Protocol Overview217
Selecting Routes Through the Routing Table218
Routing Management Policy219
Static Routes220
Configuring Static Routes221
Example: Typical Static Route Configuration223
Troubleshooting Static Routes224
RIP224
Configuring RIP225
Traffic Sharing Across RIP Interfaces233
Page 9
Displaying and Debugging RIP233
Example: Typical RIP Configuration233
Troubleshooting RIP234
OSPF Configuration235
Calculating OSPF Routes235
Basic Concepts Related to OSPF236
Configuring OSPF237
Displaying and Debugging OSPF253
254
Example: Configuring DR Election Based on OSPF Priority254
Example: Configuring OSPF Virtual Link256
Troubleshooting OSPF257
IP Routing Policy258
Configuring an IP Routing Policy259
Forwarding Layer 3 Broadcast Packets263
Displaying and Debugging the Routing Policy264
Typical IP Routing Policy Configuration Example264
Troubleshooting Routing Protocols265
IP Address Overview269
Configuring IP Address 271
Displaying and Debugging IP Address272
IP Address Configuration Example273
Troubleshooting IP Address Configuration273
Option 82 Supporting Configuration288
Prerequisites288
Enabling Option 82 Supporting on a DHCP Relay288
Option 82 Supporting Configuration Example289
Introduction to DHCP Snooping290
DHCP Snooping Configuration291
Configuration Example292
Introduction to DHCP Accounting292
Structure of the DHCP Accounting Packets292
DHCP Accounting Fundamentals294
DHCP Accounting Configuration294
Displaying and Debugging DHCP Configuration296
DHCP Relay Configuration Example One297
DHCP Relay Configuration Example Two298
Troubleshooting DHCP Relay Configuration299
Access Management Configuration299
Access Management Overview299
Configuring Access Management299
Displaying and Debugging Access Management 301
Access Management Configuration Example302
Access Management using the Web302
UDP Helper Configuration303
Overview of UDP Helper303
UDP Helper Configuration303
Displaying and Debugging UDP Helper Configuration305
UDP Helper Configuration Example305
IP Performance Configuration305
Displaying and debugging IP Performance306
Troubleshooting IP Performance307
18MULTICAST PROTOCOL
IP Multicast Overview309
Multicast Addresses310
IP Multicast Protocols312
Forwarding IP Multicast Packets313
Applying Multicast314
IGMP Snooping314
Configuring IGMP Snooping317
Enabling IGMP Fast Leave Processing318
Configuring IGMP Snooping Filter ACL319
Configuring the Maximum Number of Multicast Groups on a Port319
Configuring Multicast VLAN320
Displaying and Debugging IGMP Snooping321
Configuration Example—Enable IGMP Snooping322
IGMP Snooping Fault Diagnosis and Troubleshooting322
Common Multicast Configuration323
Enabling Multicast323
Configuring the Number Limit of Multicast Routing Entries323
Multicast MAC Address Entry Configuration324
Page 11
Displaying Multicast MAC Address Configuration324
Multicast Source Deny Configuration325
Clearing MFC Forwarding Entries or Statistics Information325
Clearing Route Entries From The Core Multicast Routing Table325
Displaying and Debugging Common Multicast Configuration326
Internet Group Management Protocol (IGMP)326
Configuring IGMP328
Displaying and debugging IGMP333
PIM-DM Overview333
Configuring PIM-DM335
Displaying and Debugging PIM-DM338
PIM-DM Configuration Example338
PIM-SM Overview339
PIM-SM Operating Principle340
Preparations before Configuring PIM-SM341
Configuring PIM-SM341
Displaying and Debugging PIM-SM346
PIM-SM Configuration Example346
349
11
19ACL CONFIGURATION
Brief Introduction to ACL351
ACL Supported by the Switch352
Configuring ACL352
Defining ACL353
Activating ACL355
Displaying and Debugging ACL356
Advanced ACL Configuration Example356
Basic ACL Configuration Example357
Link ACL Configuration Example358
QoS Configuration359
QoS Configuration361
Setting Port Priority361
Configuring the Priority for Protocol Packets361
Setting Port Mirroring362
Configuring Traffic Mirroring362
Setting Traffic Limit364
Setting Line Limit365
Relabeling Priority Level365
Configuring Traffic Statistics365
Configuring WRED Operation366
Configuring Control Over Telnet366
Displaying and Debugging QoS Configuration369
QoS Configuration Example369
Port Mirroring Configuration Example370
Priority Relabeling Configuration Example371
Applying QoS Profile to the Port374
QoS Profile Configuration Example374
ACL Control Configuration376
Configuring ACL for Telnet Users376
Defining ACL376
Importing ACL377
Configuration Example377
Configuring ACL for SNMP Users377
Configuration Example379
Configuring ACL Control over the HTTP Users379
Defining ACL379
Calling ACL to Control HTTP Users379
Configuration Example380
20CONFIGURATIONFOR QOS FEATURES
RSPAN Features381
Configuration Prerequisite382
Configuration Procedures in the Source Switch383
Configuration Procedures in the Intermediate Switch383
Configuration Procedures in the Source Switch384
Configuration Example384
Features of Traffic Statistics386
Improving the Depth First Order of ACL Matching386
Displaying Information of the display acl command387
Subdividing DSCP while Defining ACL Rules387
The Synchronization Feature of Queue Scheduling for Aggregation Ports388
Configuring Control Over Telnet388
Configuration Preparation388
Controlling Telnet using Source IP389
Controlling Telnet using Source IP and Destination IP389
Controlling Telnet using Source MAC390
Configuration Example390
21802.1X CONFIGURATION
IEEE 802.1x Overview391
802.1x System Architecture391
802.1x Authentication Process392
Implementing 802.1x on the Switch393
Configuring 802.1x393
Enabling/Disabling 802.1x393
Setting the Port Access Control Mode394
Setting the Port Access Control Method394
Checking the Users that Log on the Switch using Proxy394
Setting the User Number on a Port395
Setting the Authentication in DHCP Environment395
Configuring the Authentication Method for 802.1x User395
802.1x PEAP Configuration395
Setting the Maximum Times of Authentication Request Message
Retransmission397
Page 13
Configuring Timers398
Enabling/Disabling a Quiet-Period Timer399
802.1x Client Version Checking Configuration399
Enabling the 802.1x Client Version Checking Function399
Configuring the Maximum Number of Retires to Send Version Checking Request
Packets399
Configuring the Version Checking Timer400
802.1x Client Version Checking Configuration Example400
Guest VLAN Configuration400
Guest VLAN Configuration401
Configure Guest VLAN in Ethernet port view401
Guest VLAN Configuration Example401
The 802.1x Trusted MAC Address Synchronization Function402
802.1x Supplicant System Checking402
Displaying and Debugging 802.1x403
Auto QoS403
802.1x Configuration Example403
Centralized MAC Address Authentication405
Centralized MAC Address Authentication Configuration406
Enabling MAC Address Authentication Both Globally and On the Port406
Configuring Centralized MAC Address Authentication Mode406
Configuring the User Name and Password for Fixed Mode407
Configuring Domain Name Used by the MAC Address Authentication User407
Configuring Centralized MAC Address Authentication Timers407
Displaying and Debugging Centralized MAC Address Authentication408
Auto VLAN408
Configuration Example of Centralized MAC Address Authentication408
AAA and RADIUS Protocol Configuration409
RADIUS Protocol Overview409
Implementing AAA/RADIUS on the Ethernet Switch410
Configuring AAA410
Creating/Deleting an ISP Domain411
Configuring Relevant Attributes of the ISP Domain411
AAA Separation413
Configuring Separate AAA Schemes414
Configuration Example for Separate AAA Schemes414
Enabling/Disabling the Messenger Alert415
Configuring Self-Service Server URL416
Dynamic VLAN Assignment417
Configuring Dynamic VLAN Assignment417
Configuration Example for Dynamic VLAN Assignment417
Creating a Local User418
Setting Attributes of the Local User419
Disconnecting a User by Force420
Configuring the RADIUS Protocol420
Creating/Deleting a RADIUS Scheme421
Configuring RADIUS Authentication/
Authorization Servers421
Configuring RADIUS Accounting Servers and the Related Attributes422
User Re-authentication at Reboot424
13
Page 14
14 CHAPTER : CONTENTS
Configuring User Re-authentication at Reboot425
Configuration Example for User Re-authentication at Reboot425
Setting the RADIUS Packet Encryption Key425
Tag VLAN Assignment on Trunk/Hybrid Port Supported by 802.1x
Authentication426
Identifier Authentication Method Attribute in RADIUS426
Setting Retransmission Times of RADIUS Request Packet426
Setting the Supported Type of the RADIUS Server426
Setting the RADIUS Server State427
Setting the Username Format Transmitted to the RADIUS Server427
Setting the Unit of Data Flow that Transmitted to the RADIUS Server428
Configuring the Local RADIUS Authentication Server428
Configuring Source Address for RADIUS Packets Sent by NAS428
Setting the Timers of the RADIUS Server429
Displaying and Debugging AAA and RADIUS Protocol430
AAA and RADIUS Protocol Configuration Example431
Configuring the Switch 5500433
AAA and RADIUS Protocol Fault Diagnosis and Troubleshooting435
Problem Diagnosis436
3Com-User-Access-Level436
22FILE SYSTEM MANAGEMENT
File System Overview437
Directory Operation438
File Attribute Configuration438
File Attribute Configuration439
File Operation440
Storage Device Operation440
Setting the Prompt Mode of the File System441
Configuring File Management441
Displaying the Current-configuration and Saved-configuration of the Switch441
Saving the Current-configuration442
Erasing Configuration Files from Flash Memory442
Configuring the Name of the Configuration File used for the Next Startup.442
Configuration File Backup and Restoration443
Configuration Preparation443
FTP Overview443
Enabling/Disabling FTP Server444
Configuring Source IP Address for FTP Serve and Client444
Configuring the FTP Server Authentication and Authorization445
Configuring the Running Parameters of FTP Server445
Displaying and Debugging FTP Server446
Displaying the Source IP Address Configuration446
Introduction to FTP Client446
FTP Server Configuration Example448
TFTP Overview449
Downloading Files by means of TFTP450
Uploading Files by means of TFTP450
TFTP Client Configuration Example450
Page 15
MAC Address Table Management451
MAC Address Table Configuration 452
Displaying MAC Address Table 454
MAC Address Table Management Display Example454
MAC Address Table Management Configuration Example455
Telneting with Specified Source IP Address/Source Interface IP Address459
460
Basic System Configuration460
Terminating the FTP Connection of a Specified User461
Restarting the Switch461
Displaying the State and Information of the System461
System Debugging462
Testing Tools for Network Connection464
ping464
tracert464
Introduction to Remote-ping465
Remote-ping Configuration466
Introduction to Remote-ping Configuration466
Configuring Remote-ping466
Configuration Example467
Logging Function468
Introduction to Info-center468
Info-Center Configuration471
Sending the Information to Loghost474
Sending the Information to Control Terminal476
Sending the Information to Telnet Terminal or Dumb Terminal478
Sending the Information to the Log Buffer480
Sending the Information to the Trap Buffer481
Sending the Information to SNMP Network Management 482
Configuring Synchronous Information Output Function485
Configuration Examples of Sending Log to Unix Loghost485
Configuration Examples for Sending Log to Linux Loghost486
Configuration Examples of Sending Log to Control Terminal488
RMON Configuration489
Configuring RMON489
Displaying and Debugging RMON491
RMON Configuration Example492
NTP Overview492
NTP Configuration494
Configuring NTP Operating Mode494
Displaying and Debugging NTP499
Introduction to File System516
File System Configuration517
FTP Lighting Configuration518
Introduction to FTP518
FTP Lighting Procedure518
TFTP Lighting Configuration520
TFTP Lighting Procedure521
23PORT TRACKING CONFIGURATION
Introduction to the Port Tracking Function523
Port Tracking Configuration523
Configuring the Port Tracking Function523
Port Tracking Configuration Example523
24DYNAMICALLY APPLY ACL BY RADIUS SERVER CONFIGURATION
Introduction to Dynamically Apply ACL by RADIUS Server525
Introduction to Dynamically Apply ACL by RADIUS Server Configurations525
Configuration Example526
Network requirements526
Network diagram526
Configuration procedure527
Configuration on the switch529
25AUTO DETECT CONFIGURATION
Introduction to the Auto Detect Function531
Configuring the auto detect function531
Auto Detect Configuration Example531
Auto Detect Implementation532
Auto Detect Implementation in Static Routing533
Configuring the Auto Detect Function for a Static Route533
Configuration Example533
Auto Detect Implementation in VRRP534
Configuring the Auto Detect Function for VRRP534
Configuration Example534
Auto Detect Implementation in VLAN Interface Backup536
Configuring the Auto Detect Function for VLAN Interface Backup536
Configuration Example536
Page 17
26RSTP CONFIGURATION
STP Overview539
Implement STP539
Configuration BPDU Forwarding Mechanism in STP 543
Implement RSTP on the Switch543
RSTP Configuration544
Enable/Disable RSTP on a Switch547
Enable/Disable RSTP on a Port547
Configure RSTP Operating Mode548
Configure the STP-Ignore attribute of VLANs on a Switch548
Set Priority of a Specified Bridge549
Specify the Switch as Primary or Secondary Root Bridge549
Set Forward Delay of a Specified Bridge550
Set Hello Time of the Specified Bridge550
Set Max Age of the Specified Bridge550
Set Timeout Factor of the Bridge 551
Specifying the Maximum Transmission Rate of STP Packets on a Port551
Set Specified Port to be an EdgePort552
Specifying the Path Cost on a Port552
Set the Priority of a Specified Port553
Configure a Specified Port to be Connected to Point-to-Point Link553
Set mCheck of the Specified Port554
Configure the Switch Security Function554
Display and Debug RSTP 556
RSTP Configuration Example556
17
27POE PROFILE CONFIGURATION
Introduction to PoE Profile559
PoE Profile Configuration559
SNMP Versions and Supported MIB563
Configure SNMP565
Enabling/Disabling SNMP Agent to Send Trap566
Setting the Destination Address of Trap 566
Setting Lifetime of Trap Message567
Setting SNMP System Information567
Setting the Engine ID of a Local or Remote Device567
Setting/Deleting an SNMP Group567
Setting the Source Address of Trap568
Adding/Deleting a User to/from an SNMP Group568
Creating/Updating View Information or Deleting a View568
Setting the Size of SNMP Packet Sent/Received by an Agent568
Enabling/Disabling a Port Transmitting Trap Information SNMP Agent569
Disabling SNMP Agent569
Configuring Source IP Address for Service Packets573
Displaying the Source IP Address Configuration574
30PASSWORD CONTROL CONFIGURATION OPERATIONS
Introduction to Password Control Configuration575
Password Control Configuration576
Configuration Prerequisites576
Configuration Tasks576
Configuring Password Aging577
Configuring the Limitation of Minimum Password Length578
Configuring History Password Recording579
Configuring a User Login Password in Encryption Mode580
Configuring Login Attempts Limitation and Failure Processing Mode580
Configuring the Timeout Time for Users to be authenticated581
Displaying Password Control581
Password Control Configuration Example582
Configuration Prerequisites591
Configuring Description Information for MSDP Peers592
Configuring Anycast RP Application592
Configuring an MSDP Mesh Group592
Configuring MSDP Peer Connection Control593
Configuring SA Message Transmission593
Configuration Prerequisites593
Configuring the Transmission and Filtering of SA Request Messages594
Configuring a Rule for Filtering the Multicast Sources of SA Messages594
Configuring a Rule for Filtering Received and Forwarded SA Messages595
Configuring SA Message Cache595
Displaying and Debugging MSDP Configuration596
MSDP Configuration Example596
Configuration Example of Anycast RP Application596
Troubleshooting MSDP Configuration599
MSDP Peer Always in the Down State599
No SA Entry in the SA Cache of the Router599
Page 19
32CLUSTERING
Clustering Overview601
Switch Roles602
Introduction to NDP603
Introduction to NTDP603
Introduction to Cluster Roles604
Management Device Configuration605
Enabling System and Port NDP605
Configuring NDP Parameters605
Enabling System and Port NTDP605
Configuring NTDP Parameters605
Configuring Cluster Parameters606
Configuring Internal-External Interaction607
NM Interface for Cluster Management Configuration607
Member Device Configuration608
Enabling System and Port NDP608
Enabling System and Port NTDP608
Specifying the cluster FTP/TFTP server608
NM Interface for Cluster Management Configuration Example612
19
33HWTACACS CONFIGURATION
Configuring HWTACACS615
HWTACACS configuration tasks615
Creating a HWTACAS Scheme616
Configuring HWTACACS Authentication Servers617
Configuring HWTACACS Accounting Servers and the Related Attributes617
Configuring Source Address for HWTACACS Packets Sent by NAS618
Setting a Key for Securing the Communication with TACACS Server618
Setting the Username Format Acceptable to the TACACS Server618
Setting the Unit of Data Flows Destined for the TACACS Server619
Setting Timers Regarding TACACS Server619
Displaying and Debugging HWTACACS Protocol620
HWTACACS Protocol Configuration Example621
Configuring the FTP/Telnet User Authentication at a Remote TACACS Server621
■ Source IP Address—Details Source IP Address Configuration for the FTP client
and server .
■ Password Control—Details Password Control Configuration.
■ MSDP—Details MSDP Configuration.
■ Clustering—Details Clustering Configuration.
■ HWTACACS—Details HWTACACS Configuration.
Intended ReadershipThe manual is intended for the following readers:
■ Network administrators
■ Network engineers
■ Users who are familiar with the basics of networking
Conventions This manual uses the following conventions:
Tab le 1 Icons
IconNotice TypeDescription
Information noteInformation that describes important features or instructions.
CautionInformation that alerts you to potential loss of data or potential
WarningInformation that alerts you to potential personal injury.
Tab le 2 Text conventions
ConventionDescription
Screen displays This typeface represents text as it appears on the screen.
Keyboard key names If you must press two or more keys simultaneously, the key names are
linked with a plus sign (+), for example:
Press Ctrl+Alt+Del
The words “enter”
and type”
When you see the word “enter” in this guide, you must type something,
and then press Return or Enter. Do not press Return or Enter when an
instruction simply says “type.”
Fixed command
text
This typeface indicates the fixed part of a command text. You must type
the command, or this part of the command, exactly as shown, and press
Return or Enter when you are ready to enter the command.
Example: The command display history-command must be entered
exactly as shown.
damage to an application, system, or device.
Page 23
Related Manuals23
Tab l e 2 Text conventions (continued)
ConventionDescription
Variable
command text
{ x | y | ... }Alternative items, one of which must be entered, are grouped in braces
[ ]
This typeface indicates the variable part of a command text. You must type
a value here, and press Return or Enter when you are ready to enter the
command.
Example: in the command super level, a value in the range 0 to 3 must
be entered in the position indicated by level
and separated by vertical bars. You must select and enter one of the items.
Example: in the command flow-control {hardware | none |
software}, the braces and the vertical bars combined indicate that you
must enter one of the parameters. Enter either hardware, or none, or
software.
Items shown in square brackets [ ] are optional.
Example 1: in the command
indicate that the parameter
with or without this parameter.
Example 2: in the command user-interface [type] first-number
[last-number] the square brackets indicate that the parameters [type]
and [last-number] are both optional. You can enter a value in place of
one, both or neither of these parameters.
Alternative items, one of which can optionally be entered, are grouped in
square brackets and separated by vertical bars.
display users [all], the square brackets
all is optional. You can enter the command
Example 3: in the command header
text, the square brackets indicate that the parameters shell,
incoming and login
one of the parameters is allowed.
are all optional. The vertical bars indicate that only
[shell | incoming | login]
Related ManualsThe 3Com Switch 5500 Family Getting Started Guide provides information about
installation.
The 3Com Switch 5500 Family Command Reference Guide provides all the
information you need to use the configuration commands.
Page 24
24ABOUT THIS GUIDE
Page 25
GETTING STARTED
1
This chapter covers the following topics:
■ Product Overview
■ XRN Overview
■ Product Features
■ Logging in to the Switch
■ Command Line Interface
■ User Interface Configuration
Product OverviewThe Switch 5500 Family are Layer 3 switching products supporting expandable resilient
networking (XRN). The Switch 5500 can be one of two series: Switch 5500-SI or the
Switch 5500-EI. The Switch 5500 family supports simple routing, basic service features,
and basic XRN; the Switch 5500 family supports rather complex routing protocols,
abundant service features and enhanced XRN. Besides saving user cost otherwise invested
on module rack-type switches, the Switch 5500 family with XRN also offer excellent
network availability, upgrade ability, performance, and power network control capacity.
Table 3 lists the models in the Switch 5500 family:
Tab le 3 Models in the Switch 5500 family
Model
5500-SI
28-Port
5500-SI
52-Port
5500-EI
28-Port
5500-EI
52-Port
5500-EI PWR
28-Port
5500-EI PWR
52-Port
5500-EI
28-Port FX
5500G-EI
24-Port
5500G-EI
48-Port
5500G-EI
PWR 24-Port
Power
supply unit
(PSU)
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
AC-input,
DC-input
Number of
service
ports
Number of 100
Mbps ports
2824 10/100 Mbps 4 SFP1
5248 10/100 Mbps 4 SFP1
2824 10/100 Mbps 4 SFP1
5248 10/100 Mbps 4 SFP1
28
52
28
24—20 10/100/1000
48—44 10/100/1000
24—20 10/100/1000
24 10/100 Mbps
48 10/100 Mbps
24 100 Mbps
Number of 1000
Mbps uplink
ports
4 SFP1
4 SFP1
2 10/100/1000
plus2 SFP
Mbps plus 4
10/100/1000 or SFP
Mbps plus 4
10/100/1000 or SFP
Mbps plus 4
10/100/1000 or SFP
Console
port
1
1
1
1
Page 26
26 CHAPTER 1: GETTING STARTED
Tab le 3 Models in the Switch 5500 family (continued)
Model
5500G-EI
PWR 48-Port
5500G-EI
24-Port SFP
Power
supply unit
(PSU)
AC-input,
DC-input
AC-input,
DC-input
Number of
service
ports
48—44 10/100/1000
24—20 10/100/1000
Number of 100
Mbps ports
Number of 1000
Mbps uplink
ports
Mbps plus 4
10/100/1000 or SFP
Mbps plus 4
10/100/1000 or SFP
Console
port
1
1
The Switch 5500 family supports the following services:
■ Internet broadband access
■ MAN (metropolitan area network), enterprise/campus networking
■ Multicast service, multicast routing, and audio and video multicast service.
XRN OverviewWith the XRN (eXpandable Resilient Networking) feature, you can connect several
devices into a combined device and manage them as a single unit. The combined
device is called the Fabric, while the member devices are units. With XRN you can:
■ Manage multiple devices in centralized manner, with low management cost.
■ Extend the number of ports and switching capacity just by adding devices. You can
decide which equipment to purchase as needed, and better protect your existing
investment while upgrading the network.
■ Provide backup between multiple devices to improve reliability and to eliminate
single points of failure.
Major TechnologiesXRN includes three technologies: distributed device management (DDM), distributed
link aggregation (DLA), and distributed resilient route (DRR).
■ DDM: Users can treat the Fabric as a single device. They can manage the Fabric
through any port or IP address connected into the Fabric, and from any unit in the
fabric.
■ DRR: The multiple units of a Fabric route and forward packets as a single unit, and
provide uniform VLAN interfaces, routing table and L3 forwarding table, so the
Fabric is regarded as a single Layer 3 switch. Failure of one of the units will not
affect routing protocol and data forwarding.
■ DLA: Users can aggregate multiple ports of several different units in a Fabric into a
group, for centralized management within the Fabric. Trans-unit link aggregation
can bring convenient aggregation setting and effectively reduce single points of
failure.
The Switch 5500-SI supports basic XRN, that is DDM and DLA; the Switch 5500-EI
supports enhanced XRN, including DDM, DRR, and DLA.
Typical Networking
Topology
Typical XRN networking topology is as shown in Figure 1. Switches of the same type
(that is, units) form a Fabric. As a core switch, the Fabric can be downlinked to
workgroup switches through several aggregation links, and uplinked to the server
group also through several aggregation links.
Page 27
Figure 1 Networking Topology with XRN
Unit 2
Unit 1
Unit3
Unit 4
Fabric
Server
Core
switches
Workgroup
switches
Desktop
PCs
Product Features27
Product FeaturesTable 4 describes the features:
Tab le 4 Function Features
FeaturesDescription
Port802.1D Learning
Static MAC (unicast/multicast)
Jumbo Frame (9k) (EI models only)
Unidirectional Link Detection (UDLD)
VLANVLAN compliant with IEEE 802.1Q Standard
Port-based VLAN
Protocol Based VLAN, compliant with IEEE 802.1v Standard (EI
models only)
Voice VLAN
8021.Q in Q Double Tagged VLAN Support (EI models only)
STP protocolSpanning Tree Protocol (STP) / Rapid Spanning Tree Protocol
Link Aggregation Control Protocol (LACP), compliant with IEEE
802.3ad Standard
MirrorMirror based on the traffic classification
Port-based mirror
VLAN-based mirror
Remote mirroring
Security featuresMulti-level user management and password protect
802.1X Network Login
MAC Based Network Login
Mixed 802.1X and MAC Based Network Login
RADIUS and TACACS+ Authentication, Authorization and
Accounting
PAP, CHAP, EAP-MD5,TLS,TTLS and PEAP Authenticating
Packet filtering
Quality of Service (QoS)Traffic classification
Bandwidth control
Priority
Queues of different priority on the port
Queue scheduling: supports Strict Priority Queuing (SP),
Weighted Round Robin (WRR), WFQ, SP+WFQ, and SP+WRR
QoS profile management manner
modelsonly)
Page 29
Logging in to the Switch29
Console port
Console cable
Tab le 4 Function Features (continued)
FeaturesDescription
Management and
Maintenance
Loading and updatesLoading and upgrading of software through the XModem
Command line interface configuration
Configuration through console port
Remote configuration through Telnet or SSH
Configuration through dialing the Modem
SNMP v1/2c/3
System log
Level alarms
Output of debugging information
Ping and Tracert
Remote maintenance with Telnet, Modem and SSHv2
protocol
Loading and upgrading of software through File Transfer
Protocol (FTP) , Trivial File Transfer Protocol (TFTP) and Secure File
Transfer Protocol (SFTP)
Logging in to the
Switch
Setting up
Configuration
Environment through
the Console Port
This section describes how to log in to the switch.
Perform the following procedure to set up the configuration environment through
the console port.
1 To set up the local configuration environment, connect the serial port of a PC (or a
terminal) to the console port of the Switch with the console cable (see Figure 2).
Figure 2 Setting up the Local Configuration Environment through the Console Port
2 Run terminal emulator (such as Terminal on Windows 3X or the Hyper Terminal on
Windows 9X) on the PC. Set the terminal communication parameters as follows:
■ Baud rate = 19200
■ Databit = 8
■ Parity check = none
■ Stopbit = 1
■ Flow control = none
■ Terminal type = VT100
Page 30
30 CHAPTER 1: GETTING STARTED
Figure 3 Setting up a New Connection
Figure 4 Configuring the Port for Connection
Page 31
Figure 5 Setting Communication Parameters
Logging in to the Switch31
Setting up
Configuration
Environment through
Te ln e t
3 The Switch is powered on and it displays self-test information. Press < Enter> to show
the command line prompt such as
4 Enter a command to configure the Switch or view the operation state. Enter a
<SW5500>.
? to
view online help. For details of specific commands, refer to the following sections.
Connecting a PC to the Switch through Telnet
After you have correctly configured the IP address of a VLAN interface for the Switch
through the console port (using the
and added the port (that connects to a terminal) to this VLAN (using the
ip address command in VLAN Interface View),
port
command in VLAN View), you can Telnet this Switch and configure it.
1 Authenticate the Telnet user through the console port before the user logs in by
Te ln e t.
By default, the password is required for authenticating the Telnet user to log in to the
Switch. If a user logs in through the Telnet without password, he will see the prompt
Login password has not been set!
<SW5500>system-view
[SW5500]user-interface vty 0
[SW5500-ui-vty0]set authentication password simple xxxx (xxxx is the
preset login password of the Telnet user)
2 To set up the configuration environment, connect the network port of the PC to a
port on the Switch through the LAN.
Page 32
32 CHAPTER 1: GETTING STARTED
Workstation
Workstation
Server
PC( forconfiguring the switch
via Telnet)
Ethernet port
Ethernet
Workstation
Workstation
Server
PC ( for configur ing the switch
via Telnet )
Ethernet port
Ethernet
3 Run Telnet on the PC and enter the IP address of the VLAN connected to the network
Figure 6 Setting up the Configuration Environment through Telnet
port on the PC.
Figure 7 Running Telnet
4 The terminal displays Login authentication and prompts the user to enter the
logon password. After you enter the correct password, it displays the command line
prompt (such as
try later!
<SW5500>). If the prompt All user interfaces are used, please
appears, too many users are connected to the Switch through Telnet. At
most five Telnet users are allowed to log on to the SW5500 Switch simultaneously.
5 Use the corresponding commands to configure the Switch or to monitor the running
state. Enter
? to view online help. For details of specific commands, refer to the
following chapters.
When configuring the Switch through Telnet, do not modify the IP address of the
Switch unnecessarily, for the modification might end the Telnet connection.
By default, when a Telnet user passes the password authentication to log on to the
Switch, the access level for commands will be Level 0.
Telneting a Switch through another Switch
After a user has logged into a Switch, it is possible to configure another Switch
through the Switch through Telnet. The local Switch serves as Telnet client and the
peer Switch serves as the Telnet server. If the ports connecting these two Switches are
in the same local network, their IP addresses must be configured in the same network
segment. Otherwise, the two Switches must establish a route to communicate with
each other.
to log in to, and configure, another Switch.
As shown in Figure 8, after you Telnet to a Switch, you can run the
telnet command
Page 33
Logging in to the Switch33
Telnet Client
PC
Telnet Server
Figure 8 Providing Telnet Client Service
1 Authenticate the Telnet user through the console port on the Telnet Server (a Switch)
before login.
By default, the password is required to authenticate Telnet users and to enable them
to log on to the Switch. If a user logs in through Telnet without the password, the
unit displays an error prompt .
(where xxxx is the preset login password of Telnet user)
Setting up
Configuration
Environment through a
Dial-up Modem
2 The user logs in to the Telnet Client (Switch). For the login process, refer to
“Connecting a PC to the Switch through Telnet” on page 31.
3 Perform the following on the Telnet Client:
<SW5500> telnet xxxx
(xxxx can be the hostname or IP address of the Telnet Server. If it is the hostname, use
ip host command to specify.)
the
4 Enter the preset login password and you will see the prompt such
prompt
All user interfaces are used, please try later! appears, it indicates
<SW5500>. If the
that too many users are connected to the Switch through Telnet. In this case, connect
later.
5 Use the corresponding commands to configure the Switch or view it running state.
? to view online help. For details of specific commands, refer to the following
Enter
chapters.
Perform the following procedure to set up the configuration environment through a
dial up modem.
1 Authenticate the modem user through the console port of the Switch before the user
logs in to the Switch through a dial-up modem.
By default, the password is required for authenticating the Modem user to log in to
the Switch. If a user logs in through the Modem without the password, the user will
see the prompt
<SW5500>system-view
[SW5500]user-interface aux 0
[SW5500-ui-aux0]set authentication password simple xxxx
login password of the Modem user.)
Login password has not been set!.
(xxxx is the preset
Page 34
34 CHAPTER 1: GETTING STARTED
2 Perform the following configurations on the Modem that is directly connected to the
Switch. (You are not required to configure the Modem connected to the terminal.)
ATS0=1-----------------Set auto response (ring once)
AT&D-------------------Ignore DTR signal
AT&K0------------------Disable flow control
AT&R1------------------Ignore RTS signal
AT&S0------------------Force DSR to be high-level
ATEQ1&W----------------Bar the modem to send command response or
execution result and save the configurations
After the configuration, enter AT&V to verify the Modem settings.
The Modem configuration commands and outputs may be different according to
different Modems. For details, refer to the User Manual of the Modem.
3Com recommends that the transmission rate on the console port must lower than
that of Modem, otherwise packets may be lost.
3 To set up the remote configuration environment, connect the Modems to a PC (or a
terminal) serial port and the Switch console port respectively (see Figure 9).
Page 35
Logging in to the Switch35
Modem
Telephone line
Modem
Modem serial port line
Rem o te tel:
1234567
Console port
PSTN
Figure 9 Setting up Remote Configuration Environment
4 Dial for connection to the Switch, using the terminal emulator and Modem on the
remote end. The number you dial is the telephone number of the Modem connected
to the Switch. See Figure 10 and Figure 11.
Figure 10 Setting the Dialed Number
Page 36
36 CHAPTER 1: GETTING STARTED
5 Enter the preset login password on the remote terminal emulator and wait for the
Figure 11 Dialing on the Remote PC
prompt
<SW5500>. Then you can configure and manage the Switch. Enter ? to view
online help. For details of specific commands, refer to the following chapters.
By default, after login, a modem user can access the commands at Level 0.
Page 37
Command Line Interface37
Command Line
Interface
The Switch 5500 family provide a series of configuration commands and command
line interfaces for configuring and managing the Switch. The command line interface
has the following characteristics:
■ Local configuration through the console port.
■ Local or remote configuration through Telnet or SSH.
■ Remote configuration through a dial-up Modem to log in to the Switch.
■ Hierarchy command protection to avoid the unauthorized users accessing the
Switch.
■ Access to online Help by entering ?.
■ Network test commands, such as Tracert and Ping, to troubleshoot the network.
■ Detailed debugging information to help with network troubleshooting.
■ Ability to log in and manage other Switch 5500 units directly, using the Telnet
command.
■ FTP service for users to upload and download files.
■ Ability to view previously executed commands.
■ The command line interpreter that searches for a target not fully matching the
keywords. You can enter the whole keyword or part of it, as long as it is unique
and unambiguous.
Command Line ViewThe Switch 5500 Family provides hierarchy protection for command lines to avoid
unauthorized users accessing it illegally.
Commands are classified into four levels, namely visit level, monitoring level, system
level and management level:
■ Visit level: Commands in this level include network diagnosis tools (such as ping
tracert), commands for the different language environments of the user
and
interface (
language-mode) and the telnet command. The saving of the
configuration file is not allowed at this command level.
■ Monitoring level: Commands in this level include the display command and the
debugging command, and are used for system maintenance, service fault and
diagnosis. The saving of the configuration file is not allowed at this command
level.
■ System level: Commands in this level include service configuration commands,
including routing commands and commands for each network layer, and are used
to provide direct network service to the user.
■ Management level: Commands in this level include those that influence basic
operation of the system and system support module, which plays a support role
for services. Commands in this level include file system commands, FTP
commands, TFTP commands, XModem downloading commands, user
management commands, and level setting commands.
Login users are also classified into four levels that correspond to the four command
levels respectively. After users of different levels log in, they can only use commands
at the levels that are equal to or lower than their own level.
To prevent unauthorized users from illegal intrusion, the user will be identified when
switching from a lower level to a higher level with the
super [ level ] command. User
ID authentication is performed when users at lower level become users at a higher
level. In other words, the user password for the higher level is needed. (Suppose the
Page 38
38 CHAPTER 1: GETTING STARTED
user has entered super password [ level level ] { simple | cipher } password..) For
the sake of confidentiality, on the screen the user cannot see the password that they
entered. Only when correct password is input three times, can the user switch to the
higher level. Otherwise, the original user level will remain unchanged.
Different command views are implemented according to different requirements. They
are related to one another. For example, after logging in to the Switch, you will enter
User View, in which you can only use some basic functions such as displaying the
running state and statistics information. In User View, enter
system-view to enter
System View, in which you can key in different configuration commands and enter
the corresponding views.
The command line provides the following views:
■ User View
■ RIP View
■ System View
■ Ethernet Port View
■ VLAN View
■ VLAN Interface View
■ Local-User View
■ User Interface View
■ FTP Client View
■ RSA Public Key View
■ RSA Key Code View
■ PIM View
Table 5 describes the features of different views and the ways to enter or quit.
Tab le 5 Features of Command Views
Command
view
User ViewShow the basic
System ViewConfigure system
Ethernet Port
View
VLAN ViewConfigure VLAN
FunctionPromptCommand to enterCommand to exit
<SW5500>This is the view you are in
information about
operation and
statistics
[SW5500]Enter system-view in User
parameters
Configure
[SW5500-Ethernet1/0/1]100M Ethernet Port View:
Ethernet port
parameters
[SW5500-GigabitEthernet1/0/24]GigabitEthernet Port View:
[SW5500-Vlan1]Enter vlan 1 in System
parameters
■ OSPF View
■ OSPF Area View
■ Route Policy View
■ Basic ACL View
■ Advanced ACL View
■ Layer-2 ACL View
■ User-Defined ACL View
■ QoS Profile View
■ RADIUS Server Group View
■ ISP Domain View
after connecting to the
Switch
View
Enter interface ethernet 1/0/1 in
System View
Enter interface
gigabitethernet
1/0/24 in System View
View
quit disconnects to
the Switch
quit or return
returns to User View
quit returns to
System View
return returns to
User View
quit returns to
System View
return returns to
User View
Page 39
Tab le 5 Features of Command Views (continued)
Command Line Interface39
Command
view
VLAN Interface
View
Local-User
View
User Interface
View
FTP Client View Configure FTP
RSA Public Key
View
RSA Key Code
View
PIM ViewConfigure PIM
RIP ViewConfigure RIP
OSPF ViewConfigure OSPF
OSPF Area
View
Route Policy
View
Basic ACL View Define the rule of
Advanced ACL
View
Layer-2 ACL
View
FunctionPromptCommand to enterCommand to exit
Configure IP
interface
parameters for a
VLAN or a VLAN
aggregation
Configure local
user parameters
Configure user
interface
parameters
Client parameters
Configure RSA
public key of SSH
user
Edit RSA public
key of SSH user
parameters
parameters
parameters
Configure OSPF
area parameters
Configure route
policy parameters
basic ACL
Define the rule of
advanced ACL
Define the rule of
layer-2 ACL
[SW5500-Vlan-interface1]Enter interface
vlan-interface 1 in
System View
[SW5500-luser-user1]Enter local-user user1
in System View
[SW5500-ui0]Enter user-interface 0
in System View
[SW5500-ftp]Enter ftp in User Viewquit returns to
[SW5500-rsa-public-key]Enter rsa
peer-public-key
SW5500003 in System View
[SW5500-rsa-key-code]Enter public-key-code
begin in RSA Public Key
View
[SW5500-PIM]Enter pim in System Viewquit returns to
[SW5500-rip]Enter rip in System Viewquit returns to
[SW5500-ospf]Enter ospf in System Viewquit returns to
[SW5500-ospf-0.0.0.1]Enter area 1 in OSPF View quit returns to OSPF
[SW5500-route-policy]Enter route-policy
policy1 permit node
10 in System View
[SW5500-acl- basic-2000]Enter acl number 2000
in System View
[SW5500-acl-adv-3000]Enter acl number 3000
in System View
[SW5500-acl-ethernetframe-4000]Enter acl number 4000
3 Enter a character string followed by a ?, then all the commands with this character
string as their initials will be listed.
<SW5500>p?
ping
4 Enter a command with a character string and ?, then all the keywords with this
character string as their initials in the command will be listed.
<SW5500>display ver?
version
5 Enter the first letters of a keyword of a command and press <Tab>. If no other
keywords begin with these letters, then this unique keyword will be displayed
automatically.
6 To switch to the Chinese display for the above information, perform the
language-mode command.
Page 41
Command Line Interface41
Displaying Characteristics of the Command Line
The command line interface provides a pausing function. If the information to be
displayed exceeds one screen, users have three choices, as shown in Table 6.
Tab le 6 Functions of Displaying
Key or CommandFunction
Press <Ctrl+C> when the display pausesStop displaying and executing command.
Enter a space when the display pausesContinue to display the next screen of
Press <Enter> when the display pausesContinue to display the next line of
information.
information.
History Command
The command line interface provides a function similar to that of the DosKey.
Commands entered by users are automatically saved by the command line interface
and you can invoke and execute them at any time later. The history command buffer
is defaulted as 10. That is, the command line interface stores 10 history commands
for each user. The operations are shown in Table 7.
Tab le 7 Retrieving History Command
OperationKeyResult
Display history commanddisplay
history-command
Retrieve the previous history
command
Retrieve the next history
command
Up cursor key <> or <Ctrl+P> Retrieve the previous history
Down cursor key <> or
<Ctrl+N>
Display history command by
user inputting
command, if there is any.
Retrieve the next history
command, if there is any.
Cursor keys can be used to retrieve the history commands in Windows 3.X Terminal
and Telnet. However, in Windows 9X HyperTerminal, the up and down cursor keys
and do not work, because Windows 9X HyperTerminal defines the two keys
differently. In this case, use the combination keys <Ctrl+P> and <Ctrl+N> instead for
the same purpose.
Common Command Line Error Messages
Incorrectly entered commands will cause error messages to be reported to users. The
common error messages are listed in Table 8.
Tab le 8 Common Command Line Error Messages
Error messages Causes
Unrecognized command ■ Cannot find the command
■ Cannot find the keyword
■ Wrong parameter type
■ The value of the parameter exceeds the range
Incomplete commandThe command is incomplete.
Too many parametersToo many parameters have been entered.
Ambiguous commandThe parameters entered are not specific.
Page 42
42 CHAPTER 1: GETTING STARTED
Editing Characteristics of Command Line
The command line interface provides basic command editing and supports the editing
of multiple lines. A command cannot be longer than 256 characters. See Table 9.
Tab le 9 Editing Functions
KeyFunction
Common keysInsert from the cursor position and the cursor moves to
the right, if the edition buffer still has free space.
BackspaceDelete the character preceding the cursor and the cursor
moves backward.
Leftwards cursor key <> or <Ctrl+B>Move the cursor a character backward
Rightwards cursor key <> or <Ctrl+F>Move the cursor a character forward
Up cursor key <> or <Ctrl+P>
Down cursor key <> or <Ctrl+N>
<Tab>Press <Tab> after typing an incomplete keyword and the
Retrieve the history command.
system will display partial help: If the keyword matching
the one entered is unique, the system will replace it with
the complete keyword and display it in a new line; if
there is no matched keyword or the matched keyword is
not unique, the system will do no modification but
display the originally typed word in a new line.
User Interface
Configuration
User interface configuration is another way provided by the Switch to configure and
manage the port data.
Switch 5500 family Switches support the following configuration methods:
■ Local configuration through the console port
■ Local and remote configuration through Telnet or SSH through an Ethernet port
■ Remote configuration through a dial-up modem through the console port.
According to the above-mentioned configuration methods, there are two types of
user interfaces:
■ AUX user interface
AUX user interface is used to log in to the Switch through the console port. A
fabric can have up to eight AUX user interfaces.
■ VTY user interface
VTY user interface is used to Telnet to the Switch. A Switch can have up to five
VTY user interfaces.
For SW5500 family Switches, AUX port, and console port are the same port. There is
only the one type of AUX user interface.
The user interface is numbered by absolute number or relative number.
To number the user interface by absolute number:
■ The AUX user interface is the first interface—user interface 0. The number ranges
from 0 to 7.
■ The VTY is numbered after the AUX user interface. The absolute number of the
first VTY is the AUX user interface number plus 1. The number ranges from 8 to
12.
Page 43
User Interface Configuration43
To number the user interface by relative number, represented by interface + number
assigned to each type of user interface:
■ AUX user interface = AUX 0.
■ The first VTY interface = VTY 0, the second one = VTY 1, and so on.
User Interface
Configuration
Tasks for configuring the user interface are described in the following sections:
■ Entering User Interface View
■ Configuring the User Interface-Supported Protocol
■ Configuring the Attributes of AUX (Console) Port
■ Configuring the Terminal Attributes
■ Managing Users
■ Configuring Redirection
Entering User Interface View
Use the
user-interface command to enter a User Interface View. You can enter a
single User Interface View or multi User Interface View to configure one or more user
interfaces respectively.
Perform the following configuration in System View.
Table 10 Entering User Interface View
OperationCommand
Enter a single User Interface View or multi User
Interface Views
user-interface [ type ]
first-number [ last-number ]
Configuring the User Interface-Supported Protocol
The following command is used for setting the supported protocol by the current user
interface. You can log in to the Switch only through the supported protocol. The
configuration becomes effective when you log in again.
Perform the following configurations in User Interface (VTY user interface only) View.
Table 11 Configuring the User Interface-supported Protocol
OperationCommand
Configure the user interface-supported
protocol
protocol inbound { all | ssh |
telnet }
By default, the user interface supports Telnet and SSH protocols.
If the Telnet protocol is specified, to ensure a successful login through Telnet, you
must configure the password by default.
If SSH protocol is specified, to ensure a successful login, you must configure the local
or remote authentication of username and password using the
authentication-mode scheme command. The protocol inbound ssh
configuration fails if you configure authentication-mode password and
authentication-mode none. When you configure SSH protocol successfully for the
user interface, then you cannot configure
authentication-mode none any more.
authentication-mode password and
Page 44
44 CHAPTER 1: GETTING STARTED
Configuring the Attributes of AUX (Console) Port
Use the
speed, flow control, parity, stop bit, and data bit commands to
configure these attributes of the AUX (console) port.
Perform the following configurations in User Interface (AUX user interface only) View.
Configuring the Transmission Speed on the AUX (Console) Port
Table 12 Configuring the Transmission Speed on the AUX (Console) Port
OperationCommand
Configure the transmission speed on the AUX
(console) port
Restore the default transmission speed on the AUX
(console) port
speed speed_value
undo speed
By default, the transmission speed on
the AUX (console) port is 9600bps.
Configuring the Flow Control on the AUX (Console) Port
Table 13 Configuring the Flow Control on theAUX (Console) Port
OperationCommand
Configure the flow control on the AUX (console) port flow-control { hardware | none
| software }
Restore the default flow control mode on the AUX
(console) port
undo flow-control
By default, the flow control on the AUX (console) port is none, that is, no flow control
will be performed.
Configuring Parity on the AUX (Console) Port
Table 14 Configuring Parity on the AUX (Console) Port
OperationCommand
Configure parity mode on the AUX (console)
port
Restore the default parity modeundo parity
parity { even | mark | none | odd |
space }
By default, the parity on the AUX (console) port is none, that is, no parity bit.
Configuring the Stop Bit of AUX (Console) Port
Table 15 Configuring the Stop Bit of AUX (Console) Port
OperationCommand
Configure the stop bit of the AUX (console) portstopbits { 1 | 1.5 | 2 }
Restore the default stop bit of the AUX (console) port undo stopbits
By default, the
Configuring the Data Bit of the
Table 16 Configuring the Data Bit of theAUX (Console) Port
OperationCommand
Configure the data bit of the AUX (console) portdatabits { 7 | 8}
Restore the default data bit of the AUX (console) portundo databits
By default, the
AUX (console) port supports 1 stop bit.
AUX (Console) port
AUX (console) port supports 8 data bits.
Page 45
User Interface Configuration45
Configuring the Terminal Attributes
The following commands can be used for configuring the terminal attributes,
including enabling/disabling terminal service, disconnection upon timeout, lockable
user interface, configuring terminal screen length, and history command buffer size.
Perform the following configuration in User Interface View. Perform the
lock
command in User View.
Enabling/Disabling Terminal ServiceAfter terminal service is disabled on a user
interface, you cannot log in to the Switch through the user interface. However, the
user logged in through the user interface before disabling the terminal service can
continue his operation. After such user logs out, he cannot log in again. In this case, a
user can log in to the Switch through the user interface only when the terminal
service is enabled again.
Table 17 Enabling/Disabling Terminal Service
OperationCommand
Enable terminal serviceshell
Disable terminal serviceundo shell
By default, terminal service is enabled on all the user interfaces.
Note the following points:
■ For security, the undo shell command can only be used on the user interfaces
other than AUX user interface.
■ You cannot use this command on the user interface through which you log in.
■ You will be asked to confirm before using undo shell on any legal user interface.
By default, idle-timeout is enabled and set to 10 minutes on all the user interfaces.
That is, the user interface will be disconnected automatically after 10 minutes without
any operation.
idle-timeout 0 Disables idle-timeout.
Locking the User InterfaceThis configuration locks the current user interface and
prompts the user to enter the password. This makes it impossible for others to
operate in the interface after the user leaves.
Table 19 Locking the User Interface
OperationCommand
Lock user interfacelock
Page 46
46 CHAPTER 1: GETTING STARTED
Setting the Screen LengthIf a command displays more than one screen of
information, you can use the following command to set how many lines to be
displayed in a screen, so that the information can be separated in different screens
and you can view it more conveniently.
Table 20 Setting the Screen Length
OperationCommand
Set the screen lengthscreen-length screen_length
Restore the default screen lengthundo screen-length
By default, the terminal screen length is 24 lines.
Set the history command buffer sizehistory-command max-size value
Restore the default history command buffer sizeundo history-command max-size
By default, the size of the history command buffer is 10, that is, 10 history commands
can be saved.
Managing Users
The management of users includes the setting of user login authentication method,
level of command which a user can use after logging in, level of command which a
user can use after logging in from a specific user interface, and command level.
Configuring the Authentication Method The following command is used for
configuring the user login authentication method to deny the access of an
unauthorized user.
Perform the following configuration in User Interface View.
Table 22 Configuring the Authentication Method
OperationCommand
Configure the authentication methodauthentication-mode { password | scheme }
Configure no authenticationauthentication-mode none
By default, terminal authentication is not required for users logged in through the
console port, whereas the password is required for authenticating the Modem and
Telnet users when they log in.
1 Perform local password authentication to the user interface
authentication-mode password command, you can perform local password
Using
authentication. That is, you need use the command below to configure a login
password to login successfully.
Page 47
User Interface Configuration47
Perform the following configuration in User Interface View.
Table 23 Configuring the local authentication password
OperationCommand
Configure the local
authentication password
Remove the local
authentication password
set authentication password { cipher | simple
}password
undo set authentication password
Configure for password authentication when a user logs in through a VTY 0 user
interface and set the password to 3Com.
2 Perform local or remote authentication of the username and the password to the user
interface
Using the
authentication-mode scheme command, you can perform local or remote
authentication of username and password. The type of the authentication depends
on your configuration.
In the following example, local username and password authentication are
configured.
Perform username and password authentication when a user logs in through VTY 0
user interface and set the username and password to zbr and 3Com respectively.
By default, the password is required for authenticating Modem and Telnet users when
they log in. If the password has not been set, when a user logs in, he will see the
prompt
Login password has not been set!
If the authentication-mode none command is used, the Modem and Telnet users
will not be required to enter a password.
Setting the command level used after a user has logged on The following
command is used for setting the command level used after a user logs in.
Perform the following configuration in Local-User View.
Table 24 Setting the Command Level used after a User Logs In
OperationCommand
Set command level used
after a user logs in
Restore the default
command level used after
a user logs in
By default, the specified logged-in user can access the commands at Level 1.
Setting the Command Level used after a User Logs In from a User Interface
You can use the following command to set the command level after a user logs in
from a specific user interface, so that a user is able to execute the commands at such
command level.
Perform the following configuration in User Interface View.
Table 25 Setting the Command Level used after a User Logs In from a User Interface
OperationCommand
Set command level used after a user logs in from a
user interface
Restore the default command level used after a user
logs in from a user interface
user privilege level level
undo user privilege level
By default, a user can access the commands at Level 3 after logging in through the
AUX user interface, and the commands at Level 0 after logging in through the VTY
user interface.
When a user logs in to the Switch, the available command level depends on two
points. One is the command level that the user is allowed to access, the other is the
set command level of this user interface. If the two levels are different, the former will
be taken. For example, the command level of VTY 0 user interface is 1, however, you
have the right to access commands of level 3; if you log in from VTY 0 user interface,
you can access commands of level 3 and lower.
Setting the command priorityThe following command is used for setting the
priority of a specified command in a certain view. The command levels include visit,
monitoring, system, and management, which are identified with 0 through 3
respectively. An administrator assigns authorities as per user requirements.
Perform the following configuration in System View.
Table 26 Setting the Command Priority
OperationCommand
Set the command priority
in a specified view.
Restore the default
command level in a
specified view.
command-privilege level level view view command
command-privilege view view command
Do not change the command level unnecessarily for it may cause inconvenience with
maintenance and operation.
Configuring Redirection
send commandThe following command can be used for sending messages
between user interfaces.
Perform the following configuration in User View.
Table 27 Configuring to Send Messages Between Different User Interfaces
OperationCommand
Configuring to send messages between
different user interfaces.
send { all |number | type number}
Page 49
User Interface Configuration49
auto-execute command The following command is used to automatically run a
command after you log in. After a command is configured to be run automatically, it
will be automatically executed when you log in again.
This command is usually used to automatically execute the
telnet command on the
terminal, which will connect the user to a designated device automatically.
Perform the following configuration in User Interface View.
Table 28 Configuring to Automatically Run the Command
OperationCommand
Configure to automatically run the commandauto-execute command text
Configure not to automatically run the
command
undo auto-execute command
Note the following points:
■ After executing this command, the user interface can no longer be used to carry
out the routine configurations for the local system. Use this command with
caution.
■ Make sure that you will be able to log in the system in another way and cancel the
configuration, before you use the
auto-execute command command and save the
configuration.
Telnet 10.110.100.1 after the user logs in through VTY0 automatically.
When a user logs on through VTY 0, the system will run telnet 10.110.100.1
automatically.
After the above configuration, use the display command in any view to display the
running of the user interface configuration, and to verify the effect of the
configuration.
Use the
Table 29 Displaying and Debugging User Interface
OperationCommand
Clear a specified user interfacefree user-interface [ type ] number
Display the user application information
of the user interface
Display the physical attributes and some
configurations of the user interface
free command in User View to clear a specified user interface.
display users [ all ]
display user-interface [type number | number ] [ summary ]
Page 50
50 CHAPTER 1: GETTING STARTED
Page 51
ADDRESS MANAGEMENT
2
Introduction to
Address Management
Configuring Address
Management
Configuring a
Port-Based Address
Management IP Address
Pool
CONFIGURATION
You can easily configure the switch on which the Address Manage (AM) feature is
enabled to allow a user with the specified MAC address to gain network access
through the specified IP address in a small network, such as a campus network. This
facilitates the implementation of user management and accounting.
Address management configuration tasks include:
■ Configuring a port-based address management IP address pool
■ Binding the MAC address and IP address of a legal user to the specified port
By setting an address management IP address pool on a port, you can allow a user
with the specified IP addresses to access the network. The Ethernet switch allows the
packets in the IP address pool whose IP addresses are the source IP addresses to pass
the port for layer 3 forwarding. The switch does not forward any packet from any IP
address not configured in the IP address pool.
Table 30 Configure a port-based address management IP address pool
OperationCommandDescription
Enter system viewsystem-view-
Enable address managementam enableRequired
The IP address pool configured on
each port to control layer 3
forwarding takes effect only after
address management is enabled.
Enter Ethernet port viewinterface interface-type
interface-number
Configure an address
management IP address pool
on a port
am ip-pool { address-list }Required
-
By default, the address
management IP address pool on
each port is null; that is, the switch
permits all packets to pass.
Binding the MAC
Address and IP Address
of a Legal User to the
Specified Port
When you are configuring an address management IP address pool on a port, if the IP
addresses in this IP address pool are those configured in the static ARP on another
port, the system will prompt you to delete the corresponding static ARP to ensure
that the binding takes effect.
You cannot configure static ARP for the IP address restricted by AM; otherwise, AM
fails.
This configuration binds the specified MAC addresses and IP addresses, only allowing
the packets from legal MAC addresses and legal IP addresses to be forwarded by the
switch. None of the following combinations enables network access through the
switch:
■ Illegal MAC address + illegal IP address
■ Legal MAC address + illegal IP address
■ Illegal MAC address + legal IP address
Page 52
52 CHAPTER 2: ADDRESS MANAGEMENT CONFIGURATION
Ext ernal network
Hub
Ext ernal network
Hub
Perform the following operations to bind the MAC address and IP address of a legal
user to the specified port; no other configuration is required.
Table 31 Bind the MAC address and IP address of a legal user to the specified port
OperationCommandDescription
Enter system viewsystem-view-
Bind the MAC address and IP address
of a legal user to the specified port
Enter Ethernet port viewinterface interface-type
Bind the MAC address and IP address
of a legal user to the specified port
am user-bind mac-addr
mac-address ip-addr ip-address[
interface interface-type
interface-number ]
interface-number
am user-bind mac-addr
mac-address ip-addr ip-address
Optional
-
Optional
Address Management
Configuration
Example
Port-Based Address
Management IP Address
Pool Configuration
Example
This section contains configuration examples.
Network requirements
The GigabitEthernet1/0/1 port of the switch is connected to multiple PCs.
Network diagram
Figure 12 Network diagram for address management
Configuration procedure
To enable address management, enter the following:
<S5500> system-view
[S5500] am enable
Page 53
Address Management Configuration Example53
Ext ernal network
Hub
Ext ernal network
Hub
To configure an address management IP address pool on GigabitEthernet 1/0/1,
allowing 20 IP addresses starting from 202.10.20.1 to 202.10.20.20 to access the
network, enter the following:
[S5500] interface GigabitEthernet 1/0/1
[S5500-GigabitEthernet 1/0/1] am ip-pool 202.10.20.1 20
Configuration Example
of Binding the MAC
Address and IP Address
of a Legal User
Network requirements
The GigabitEthernet1/0/1 port of the switch is connected to multiple PCs.
Network diagram
Figure 13 Network diagram for address management
Configuration procedure
To configure to bind MAC addresses and IP addresses to GigabitEthernet 1/0/1, only
allowing a PC whose MAC address is 00e0-fc00-3900 to access the network by using
the IP address 202.10.20.30, enter the following:
■ Displaying Port Configuration Information in Brief
■ Displaying Information About a Specified Optical Port
Ethernet Port
Configuration
Introduction
Ethernet Port
Configuration
The following features are found in the Ethernet ports of the Switch 5500
■ 10/100BASE-T Ethernet ports support MDI/MDI-X auto-sensing. They can operate
in half-duplex, full-duplex and auto-negotiation modes. They can negotiate with
other network devices to determine the operating mode and speed. Thus the
appropriate operating mode and speed is automatically configured and the system
configuration and management is greatly streamlined.
■ Gigabit SFP ports operate in 1000Mbps full duplex mode. The duplex mode can be
set to full (full-duplex) and auto (auto-negotiation) and its speed can be set to
1000 (1000Mbps) and auto (auto-negotiation).
Ethernet port configuration is described in the following sections:
■ Entering Ethernet Port View
■ Enabling/Disabling an Ethernet Port
■ Setting the Description Character String for the Ethernet Port
■ Setting the Duplex Attribute of the Ethernet Port
■ Setting Speed on the Ethernet Port
■ Setting the Cable Type for the Ethernet Port
■ Enabling/Disabling Flow Control for the Ethernet Port
■ Permitting/Forbidding Jumbo Frames to Pass through an Ethernet Port
■ Setting the Ethernet Port Suppression Ratio
■ Setting the Link Type for an Ethernet Port
■ Adding an Ethernet Port to Specified VLANs
■ Setting the Default VLAN ID for the Ethernet Port
■ Setting Loopback Detection for an Ethernet Port
■ Configuring VCT
■ VCT Configuration Example
■ Copying Port Configuration to Other Ports
Page 56
56 CHAPTER 3: PORT OPERATION
Entering Ethernet Port View
Before configuring an Ethernet port, enter Ethernet Port View.
Perform the following configuration in System View.
Table 32 Entering Ethernet Port View
OperationCommand
Enter Ethernet Port Viewinterface { interface_type
interface_num | interface_name }
Enabling/Disabling an Ethernet Port
Use the following command to disable or enable the port. After configuring the
related parameters and protocol of the port, you can use the following command to
enable the port. If you do not want a port to forward data, use the command to
disable it.
Perform the following configuration in Ethernet Port View.
Table 33 Enabling/Disabling an Ethernet Port
OperationCommand
Disable an Ethernet portshutdown
Enable an Ethernet portundo shutdown
By default, the port is enabled.
Setting the Description Character String for the Ethernet Port
To distinguish the Ethernet ports, use the following command to assign a description
to each port.
Perform the following configuration in Ethernet Port View.
Table 34 Setting the Description Character String for the Ethernet Port
OperationCommand
Set description character string for Ethernet port.description text
Delete the description character string of Ethernet.undo description
By default, the port description is a null character string.
Setting the Duplex Attribute of the Ethernet Port
To configure a port to send and receive data packets at the same time, set it to
full-duplex. To configure a port to either send or receive data packets, set it to
half-duplex. If the port has been set to auto-negotiation mode, the local and peer
ports will automatically negotiate the duplex mode.
Perform the following configuration in Ethernet Port View.
Table 35 Setting the Duplex Attribute for the Ethernet Port
OperationCommand
Set duplex attribute for Ethernet port.duplex { auto | full | half }
Restore the default duplex attribute of Ethernet port. undo duplex
Note that 10/100BASE-T Ethernet ports support full duplex, half duplex and
auto-negotiation, which can be set as required. Gigabit Ethernet ports support full
Page 57
Ethernet Port Configuration Introduction57
duplex and can be configured to operate in full (full duplex) or auto
(auto-negotiation) mode.
The port defaults to auto (auto-negotiation) mode.
Setting Speed on the Ethernet Port
Use the following command to set the speed of the Ethernet port. If the speed is set
to auto-negotiation mode, the local and peer ports will automatically negotiate the
port speed.
Perform the following configuration in Ethernet Port View.
Table 36 Setting Speed on the Ethernet Port
OperationCommand
Set the Ethernet port speedspeed { 10 | 100 | 1000 | auto }
Restore the default speed for the Ethernet portundo speed
Note that 10/100BASE-T Ethernet ports support 10Mbps, 100Mbps and
auto-negotiation, which can be set as required. Gigabit Ethernet ports support
1000Mbps and can be configured to operate at 1000 (1000Mbps) or auto
(auto-negotiation) speed.
By default, the speed of the port set to auto mode.
Setting the Cable Type for the Ethernet Port
Ethernet ports support straight-through and cross-over network cables. Use the
following command to configure the cable type.
Perform the following configuration in Ethernet Port View.
Table 37 Setting the Type of the Cable Connected to an Ethernet Port
OperationCommand
Set the type of the cable connected to an Ethernet
port.
Restore the default type of the cable connected to an
Ethernet port.
mdi { across | auto | normal }
undo mdi
By default, the cable type is auto (auto-recognized). That is, the system can
automatically recognize the type of cable connecting to the port.
Enabling/Disabling Flow Control for the Ethernet Port
After flow control is enabled in both the local and the peer Switch, if congestion
occurs in the local Switch, the Switch will inform its peer to pause packet sending. In
this way, packet loss is reduced. The flow control function of the Ethernet port can be
enabled or disabled using the following command.
Perform the following configuration in Ethernet Port View.
Table 38 Enabling/Disabling Flow Control for an Ethernet Port
OperationCommand
Enable Ethernet port flow controlflow-control
Disable Ethernet port flow controlundo flow-control
By default, Ethernet port flow control is disabled.
Page 58
58 CHAPTER 3: PORT OPERATION
Permitting/Forbidding Jumbo Frames to Pass through an Ethernet Port
An Ethernet port may encounter jumbo frames exceeding the standard frame length,
when switching large throughput data like transmitting files. This command can
forbid or permit jumbo frames to pass through an Ethernet port.
Perform the following configuration in Ethernet Port View.
Table 39 Permitting/Forbidding Jumbo Frame to Pass through the Ethernet Port
OperationCommand
Permit jumbo frame to pass through the Ethernet portjumboframe enable
Forbid jumbo frame to pass through the Ethernet portundo jumboframe enable
By default, jumbo frames with lengths between 1518 bytes and 9216 bytes inclusive
are permitted to pass through an Ethernet port.
Setting the Ethernet Port Suppression Ratio
Use the following commands to restrict broadcast/multicast/unicast traffic. Once
traffic exceeds the value set by the user, the system will maintain an appropriate
packet ratio by discarding the overflow traffic, so as to suppress storm, avoid
congestion and ensure the normal service.
Perform the following configuration in Ethernet Port View.
Table 40 Setting the Ethernet Port Suppression Ratio
OperationCommand
Set Ethernet port broadcast
suppression ratio
Restore the default Ethernet port
broadcast suppression ratio
Set Ethernet port multicast
suppression ratio
Restore the default Ethernet port
multicast suppression ratio
Set Ethernet port unicast suppression
ratio
Restore the default Ethernet port
unicast suppression ratio
broadcast-suppression { ratio | pps
bandwidth }
undo broadcast-suppression
multicast-suppression { ratio | pps
bandwidth }
undo multicast-suppression
unicast-suppression { ratio | pps
bandwidth }
undo unicast-suppression
By default, all traffic is allowed to pass through, that is, no suppression is performed.
Setting the Link Type for an Ethernet Port
An Ethernet port can operate in four different link types: access, hybrid, trunk and stack.
An access port carries one VLAN only, used for connecting to the user's computer. A trunk
port can belong to more than one VLAN and receive/send the packets on multiple VLANs,
used for connection between the Switches. A hybrid port can also carry more than one
VLAN and receive/send the packets on multiple VLANs, used for connecting to both
Switches and the user's computers. The difference between a hybrid port and a trunk port
is that a hybrid port allows the packets from multiple VLANs to be sent without tags, but
a trunk port only allows the packets from the default VLAN to be sent without tags.
Page 59
Ethernet Port Configuration Introduction59
Perform the following configuration in Ethernet Port View.
Table 41 Setting the Link Type for the Ethernet Port
OperationCommand
Configure the port as an access portport link-type access
Configure the port as a hybrid portport link-type hybrid
Configure the port as a trunk portport link-type trunk
Configure the port as a stack portport link-type xrn-fabric
Restore the default link type, that is, access portundo port link-type
By default, the port is access port.
Note that:
■ You can configure four types of ports concurrently on the same Switch, but you
cannot switch port type between trunk port, hybrid port and stack port. You must
return it first into access port and the set it as the other type. For example, you
cannot configure a trunk port directly as a hybrid port, but first set it as an access
port and then as a hybrid port.
■ For the Switch 5500-SI 28-Port, Switch 5500-EI 28-Port, and Switch 5500-EI PWR
28-Port, GigabitEthernet1/0/27 and GigabitEthernet1/0/28 ports can be
configured as a stack port; For the Switch 5500-SI 52-port, Switch 5500-EI
52-Port, Switch 5500-EI PWR 52-Port, GigabitEthernet1/0/51 and
GigabitEthernet1/0/52 ports can be configured as a stack port.
Adding an Ethernet Port to Specified VLANs
Use the following commands to add an Ethernet port to a specified VLAN. An access
port can only be added to one VLAN, while hybrid and trunk ports can be added to
multiple VLANs.
Perform the following configuration in Ethernet Port View.
Table 42 Adding the Ethernet Port to Specified VLANs
OperationCommand
Add the current access port to a specified
VLAN
Add the current hybrid port to specified
VLANs
Add the current trunk port to specified VLANs port trunk permit vlan {
Remove the current access port from to a
specified VLAN.
Remove the current hybrid port from to
specified VLANs.
Remove the current trunk port from specified
VLANs.
port access vlan vlan_id
port hybrid vlan vlan_id_list {
tagged | untagged }
vlan_id_list | all }
undo port access vlan
undo port hybrid vlan vlan_id_list
undo port trunk permit vlan {
vlan_id_list | all }
Note that the access port shall be added to an existing VLAN other than VLAN 1. The
VLAN to which a hybrid port is added must have already exist. The one to which a
trunk port is added cannot be VLAN 1.
After adding an Ethernet port to specified VLANs, the local port can forward packets
of these VLANs. Hybrid and trunk ports can be added to multiple VLANs, thereby
implementing the VLAN intercommunication between peers. For a hybrid port, you
Page 60
60 CHAPTER 3: PORT OPERATION
can configure to tag some VLAN packets, based on which the packets can be
processed differently.
Setting the Default VLAN ID for the Ethernet Port
Because the access port can only be included in one VLAN, its default VLAN is the one
to which it belongs. Because a hybrid port and a trunk port can be included in several
VLANs, you must configure the default VLAN ID. If the default VLAN ID has been
configured, the packets without VLAN Tag will be forwarded to the port that belongs
to the default VLAN. When sending the packets with VLAN Tag, if the VLAN ID of the
packet is identical to the default VLAN ID of the port, the system will remove VLAN
Tag before sending this packet.
Perform the following configuration in Ethernet Port View.
Table 43 Setting the Default VLAN ID for an Ethernet Port
OperationCommand
Set the default VLAN ID for a hybrid port.port hybrid pvid vlan
vlan_id
Set the default VLAN ID for a trunk portport trunk pvid vlan vlan_id
Restore the default VLAN ID of a hybrid port to the
default value
Restore the default VLAN ID of a trunk port to the
default value
undo port hybrid pvid
undo port trunk pvid
By default, the VLAN of a hybrid port and a trunk port is VLAN 1 and that of the
access port is the VLAN to which it belongs.
Note that to guarantee the proper packet transmission, the default VLAN ID of the
local hybrid port or trunk port should be identical with that of the hybrid port or trunk
port on the peer Switch.
Configuring Loopback Detection for Ethernet Ports
The goal of loopback detection is to check whether the ports of switch have
loopback.
After users enable loopback detection for Ethernet ports, the switch will monitor
whether the ports have loopback on a regular basis; if the switch detects loopback for
a particular port, it will put that port under control.
■ For Access port: If system detects loopback for a port, it will shut down that port,
send a Trap message to the terminal, and delete the corresponding MAC address
forwarding entry.
■ For Trunk ports and Hybrid ports: If system detects loopback for a port, it will send
a Trap message to the terminal. If the loopback detection and control function for
that port is enabled at the same time, the system will then shut down the given
port, send a Trap message to the terminal, and delete the corresponding MAC
address forwarding entry.
Table 44 Configure loopback detection for Ethernet port
OperationCommandDescription
Enter system viewsystem-view-
Enable the global port
loopback detection
Set the time interval for
loopback detection function
loopback-detection
enable
loopback-detection
interval-time time
Optional.By default, the global port
loopback detection function is disabled.
Optional.
Set to 30 seconds by default.
Page 61
Ethernet Port Configuration Introduction61
Table 44 Configure loopback detection for Ethernet port (continued)
OperationCommandDescription
Enter the Ethernet port viewinterface
Enable the loopback detection
function for a specified port
Enable the loopback detection
and control function for Trunk
ports and Hybrid ports
Configure the system to
detect loopback in all the
VLANs with Trunk ports and
Hybrid ports
Display the loopback detection
information
interface-type
interface-number
loopback-detection
enable
loopback-detection
control enable
loopback-detection
per-vlan enable
display
loopback-detection
-
Optional.By default, the loopback
detection function is disabled.
Optional.By default, the loopback
detection and control function is disabled.
Optional.
By default, system only detects loopback
for the default VLANs with Trunk ports
and Hybrid ports.
Optional.
This command can be used under any
view
Loopback detection function for a port is enabled only when the loopback-detection
enable command is enabled under both system view and port view.
When the undo loopback-detection enable command is used under system view, the
loopback detection function will be disabled for all ports.
Setting Loopback Detection for an Ethernet Port
Use the following command to enable port loopback detection and set the detection
interval for the external loopback condition of each port. If there is a loopback port
found, the Switch will put it under control.
Other correlative configurations function only when port loopback detection is
enabled in System View.
Perform the following configuration in the view listed in Table 45.
Table 45 Setting Loopback Detection for the Ethernet Port
OperationCommand
Enable loopback detection on the port (System
View/Ethernet Port View)
Disable loopback detection on the port (System
View/Ethernet Port View)
Enable the loopback controlled function of the
trunk and hybrid ports (Ethernet Port View)
Disable the loopback controlled function of the
trunk and hybrid ports (Ethernet Port View)
Set the external loopback detection interval of
the port (System View)
Restore the default external loopback detection
interval of the port (System View)
Configure that the system performs loopback
detection to all VLANs on Trunk and Hybrid
ports (Ethernet Port View)
Configure that the system only performs
loopback detection to the default VLANs on the
port (Ethernet Port View)
loopback-detection enable
undo loopback-detection enable
loopback-detection control
enable
undo loopback-detection control
enable
loopback-detection
interval-time time
undo loopback-detection
interval-time
loopback-detection per-vlan
enable
undo loopback-detection
per-vlan enable
Page 62
62 CHAPTER 3: PORT OPERATION
By default, port loopback detection and the loopback detection control function on
trunk and hybrid ports are disabled. The detection interval is 30 seconds, and the
system detects the default VLAN on the trunk and hybrid ports.
Configuring VCT
You can start the virtual cable test (VCT) to make the system test the cable connected
to the current electrical Ethernet port, and the system will return the test results in five
seconds. The test items include: whether short or open circuit exists in the Rx/Tx
direction of the cable, and what is the length of the cable in normal status or the
length from the port to the fault point of the cable.
Table 46 Configure VCT
OperationCommandDescription
Enter system viewsystem-view-
Enter Ethernet port viewinterface
interface-type
interface-number
Start VCT to make the system test
the cable connected to the current
electrical Ethernet port
virtual-cable-testRequired
-
By default, this test is not started.
VCT Configuration Example
EthernetPort Security
Features
Network requirements
Start VCT to make the system test the cable connected to the following port.
Configuration procedure
1 Enter the system view.
<S5500> system-view
2 Enter the Ethernet1/0/1 port view.
[S5500] interface Ethernet 1/0/1
3 Start VCT.
[S5500-Ethernet1/0/1] virtual-cable-test
Cable status: abnormal(open), 7 metres
Pair Impedance mismatch: yes
Pair skew: 4294967294 ns
Pair swap: swap
Pair polarity: normal
Insertion loss: 7 db
Return loss: 7 db
Near-end crosstalk: 7 db
Port security is a security mechanism to control network access. It is an expansion of
the current 802.1x and MAC address authentication. This scheme controls the
incoming/outgoing packets on port by checking the MAC addresses contained in
data frames, and provides multiple security and authentication modes; this greatly
improves the security and manageability of the system.
The port security scheme provides the following features:
1 NTK: Need to Know feature. By way of checking the destination MAC addresses of
the data frames to be sent from a port, this feature ensures that only successfully
Page 63
Ethernet Port Configuration Introduction63
authenticated devices can obtain data frames from the port so as to prevent illegal
devices from filching network data.
2 Intrusion Protection: By way of checking the source MAC addresses of the data
frames received on a port, this feature discovers illegal packets and takes appropriate
action (temporarily/permanently disabling the port, or filtering out the packets with
these MAC addresses) to guarantee the security on the port.
3 Device Tracking: This feature enables the switch to send trap messages in case special
data packets (generated by special actions such as illegal intrusion, and abnormal user
logon/logoff) pass through a port, thus helping the network administrator monitor
these special actions.
4 Binding of MAC and IP addresses to ports: This feature enables you to bind the MAC
and IP addresses of legal users to specific ports on the switch so that only legal user's
packets can pass through the corresponding ports, thus improving the security of the
system)
Configuring Port Security
Table 47 Configure port security
OperationCommandDescription
Enter system viewsystem-view-
Enable port securityport-security enableRequired
Set an OUI value for user
authentication
Enable the sending of
specified type(s) of trap
messages
Enter Ethernet port viewinterface interface-type
Set the security mode of the
port
Set the maximum number of
MAC addresses allowed to
access the port
Set the packet transmission
mode of the NTK feature on
the port
Optional
You need to specify the bound port if
you use this command in system
view.You do not need to specify the
bound port if you use this command in
Ethernet port view, because the MAC
and IP address will be bound to the
current port.
Required
By default, no action mode of the
Intrusion Protection feature is set on the
port.
Optional
By default, this time is 20 seconds
You can execute the display command in
any view.
The time set by the port-security timer disableport timer command takes effect when
the disableport-temporarily mode is set by the port-security intrusion-mode
command.
To avoid confliction, the following limitation on the 802.1x and the MAC address
authentication will be taken after port security is enabled:
1 The access control mode (set by the dot1x port-control command) automatically
changes to auto.
2 The dot1x port-method command can be successfully executed only when no user is
on-line.
3 The dot1x, dot1x port-method, dot1x port-control, and mac-authentication
commands cannot be used.
For detailed description of 802.1x authentication, refer to the security module of the
3Com S5500 Series Ethernet Switches Operation Manual.
Port Security Configuration Example
Network requirements
■ Enable port security on port Ethernet1/0/1 of switch A, and set the maximum
number of the MAC addresses that are allowed to access the port to 80.
■ Set the packet transmission mode of the NTK feature on the port to ntkonly, and
the action mode of the Intrusion Protection feature on the port to disableport.
■ Connect PC1 to the port through switch B.
■ Bind the MAC and IP addresses of PC1 to the port.
Page 65
Ethernet Port Configuration Introduction65
Switch ASwitch B
GigabitEthernet 1/0/1
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
PC1
PC2
Switch ASwitch B
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
Switch ASwitch B
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
PC1
PC2
Switch ASwitch B
GigabitEthernet 1/0/1
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
Switch ASwitch B
GigabitEthernet 1/0/1
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
PC1
PC2
Switch ASwitch B
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
Switch ASwitch B
PC1
PC2
IP Addr ess: 10. 153.1. 1
MAC Addres s: 00e0
-fc00-3900
PC1
PC2
Network diagram
Figure 14 Network diagram for port security configuration
Configuration procedure
Configure switch A as follows:
1 Enter the system view.
<S5500> system-view
2 Enable port security.
[S5500] port-security enable
3 Enter Ethernet1/0/1 port view.
4 Adopt MAC address authentication mode on the port.
5 Set the maximum number of MAC addresses allowed to access the port to 80.
6 Set the packet transmission mode of the NTK feature on the port to ntkonly.
7 Set the action mode of the Intrusion Protection feature on the port to disableport.
8 Return to the system view.
9 Enable the sending of intrusion packet discovery trap messages.
10 Bind the MAC and IP addresses of PC1 to Ethernet1/0/1 port.
[S5500] am user-bind mac-address 00e0-fc00-5600 ip-address 10.153.1.1
interface Ethernet1/0/1
Copying Port Configuration to Other Ports
To keep the configuration of other ports consistent with a specified port, you can
copy the configuration of that specified port to other ports. The configuration may
include: STP setting, QoS setting, VLAN setting, port setting, and LACP setting. The
STP setting includes STP enabling/disabling, link attribute (point-to-point or not), STP
priority, path cost, max transmission speed, loop protection, root protection, edge
port or not. The QoS setting includes traffic limiting, priority marking, default 802.1p
priority, bandwidth assurance, congestion avoidance, traffic redirection, traffic
Page 66
66 CHAPTER 3: PORT OPERATION
statistics. The VLAN setting includes permitted VLAN types, and default VLAN ID. The
port setting includes port link type, port speed, and duplex mode. LACP setting
includes LACP enabling/disabling.
Perform the following configuration in System View.
Table 48 Copying Port Configuration to Other Ports
Note that if the copy source is an aggregation group, take the port with minimum ID
as the source; if the copy destination is an aggregation group, make the
configurations of all group member ports identical with that of the source.
Displaying and
Debugging Ethernet
Port
After the above configuration, enter the
display command in any view to display the
running of the Ethernet port configuration, and to verify the effect of the
configuration.
Enter the
Enter the
reset command in User View to clear the statistics information of the port.
loopback command in Ethernet Port View to check whether the Ethernet
port works normally. In the process of the loopback test, the port cannot forward any
packets. The loop test will finish automatically after a short time.
Table 49 Displaying and Debugging Ethernet Port
OperationCommand
Perform loopback test on the Ethernet
port.
Display all port informationdisplay interface { interface_type |
Display port information of a specific unit display unit unit_id interface
Display hybrid port or trunk portdisplay port { hybrid | trunk }
Display the state of loopback detection on
the port.
Clear statistics information of the portreset counters interface [
■ The loopback test cannot be performed on a port disabled by the shutdown
command. During the loopback test, the system will disable
shutdown operation on the port. Some ports do not support the loopback
and
speed, duplex, mdi
test. If performing this command in these ports, you will see the system prompt.
■ After 802.1X is enabled, the port information cannot be reset.
Page 67
Ethernet Port Configuration Introduction67
Switch A
Switch B
Displaying Port
Configuration
Information in Brief
Ethernet Port
Configuration Example
This S5500 version has a new command, display brief interface for you to display the
port configuration information in brief, including the port type, link state, link rate,
duplex attribute, link type and default VLAN ID.
Table 50 Display the port configuration information in brief
OperationCommandDescription
Display the port
configuration information
in brief
4 Configure the default VLAN ID of Ethernet1/0/1 as 100.
[SW5500-Ethernet1/0/1]port trunk pvid vlan 100
Page 68
68 CHAPTER 3: PORT OPERATION
Ethernet Port
Troubleshooting
Link Aggregation
Configuration
Fault: Default VLAN ID configuration failed.
Troubleshooting: Take the following steps.
1 Use the
display interface or display port command to check if the port is a
trunk port or a hybrid port. If it is neither, configure it as a trunk port or a hybrid port.
2 Configure the default VLAN ID.
Brief Introduction to Link Aggregation
Link aggregation means aggregating several ports together to implement the
outgoing/incoming payload balance among the member ports and enhance the
connection reliability. Link aggregation includes manual aggregation, dynamic LACP
aggregation, and static LACP aggregation. In terms of load sharing, link aggregation
may be load sharing aggregation and non-load sharing aggregation.
For the member ports in an aggregation group, their basic configurations must be the
same. That is, if one is a trunk port, the others must also be; when it turns into access
port, then others must change to access port.
The basic configuration includes STP setting, QoS setting, VLAN setting, and port
setting. The STP setting includes STP enabling/disabling, link attribute (point-to-point
or not), STP priority, path cost, max transmission speed, loop protection, root
protection, edge port or not. The QoS setting includes traffic limiting, priority
marking, default 802.1p priority, bandwidth assurance, congestion avoidance, traffic
redirection, traffic statistics. The VLAN setting includes permitted VLAN types, and
default VLAN ID. The port setting includes port link type.
The Switch 5500-SI 28-Port can support up to 14 aggregation groups, the Switch
5500-SI 52-Port can support up to 26 aggregation groups, and the Switch 5500-EI
Series can support up to 32 aggregation groups. Each group can have a maximum of
eight 100 Mbps Ethernet ports or four Gigabit SFP ports. For the Switch 5500-SI
series, the ports in an aggregation group must physically belong to the same unit, but
for the Switch 5500-EI series, an aggregation group can contain ports which
physically belong to different units.
Brief Introduction to LACP
IEEE802.3ad-based Link Aggregation control protocol (LACP) implements dynamic
link aggregation and disaggregation and exchanges information with the peer
through LACP data unit (LACPADU). When LACP is enabled on it, the port notifies,
through sending LACPDU, the peer of its system priority, system MAC, port priority,
port number and operation key. On receiving this information, the peer compares the
received information with that stored at other ports to determine which ports can be
aggregated, so that the two parties can agree on adding/deleting which port
into/from a certain dynamic aggregation group.
The operation key is a configuration set generated by LACP based on port setting
(speed, duplex mode, basic configuration and management key). When LACP is
enabled, the management key of a dynamic aggregation port is 0 by default, but the
management key of a static aggregation port consists with the aggregation group ID.
For a dynamic aggregation group, all member ports must have the same operation
key, while for a manual or static aggregation group, only the active member ports
must have the same operation key.
Page 69
Link Aggregation Configuration69
Types of Link Aggregation
The types of link aggregation are described in the following sections:
■ Manual Aggregation and Static LACP Aggregation
■ Dynamic LACP Aggregation
Manual Aggregation and Static LACP Aggregation Both manual aggregation
and static LACP aggregation require manual configuration of aggregation groups and
prohibit automatic adding or deleting of member ports by the system. A manual or
static LACP aggregation group must contain at least one member port, and you must
delete the aggregation group, instead of the port, if the group contains only one port.
At a manual aggregation port, LACP is disabled and you are not allowed to enable it.
LACP is enabled at a static aggregation port. When a static aggregation group is
deleted, its member ports form one or several dynamic LACP aggregation groups and
LACP remains enabled on them. You are not allowed to disable LACP protocol at a
static aggregation group.
In a manual or static LACP aggregation group, its ports may be in active or inactive
state and only the active ports can transceive user service packets. The active port
with the minimum port number serves as the master port, while others as sub-ports.
In a manual aggregation group, the system sets the ports to active or inactive state by
using these rules:
■ The system sets the port with the highest priority to active state, and others to
inactive state based on the following descending order of priority levels:
■full duplex/high speed
■full duplex/low speed
■half duplex/high speed
■half duplex/low speed
■ The system sets to inactive state the ports which cannot aggregate with the active
port with minimum port number, due to hardware limit, for example, trans-board
aggregation unavailable.
■ The system sets to inactive state the ports with basic configurations different from
that of the active port with minimum port number.
In a static LACP aggregation group, the system sets the ports to active or inactive
state by using these rules:
■ The system sets the port with the highest priority to active state, and others to
inactive state based on the following descending order of priority levels:
■full duplex/high speed
■full duplex/low speed
■half duplex/high speed
■half duplex/low speed
■ The system sets to inactive state the ports which connect to different peer devices
from one that the active port with minimum port number connects to, or the ports
in different aggregation groups though they are connected to the same peer
device.
■ The system sets to inactive state the ports which cannot aggregate with the active
port with minimum port number, due to hardware limit, for example, trans-board
aggregation unavailable.
Page 70
70 CHAPTER 3: PORT OPERATION
■ The system sets to inactive state the ports with basic configurations different from
that of the active port with minimum port number.
Because only a defined number of ports can be supported in an aggregation group, if
the active ports in an aggregation group exceed the port quantity threshold for that
group, the system shall set some ports with smaller port numbers (in ascending order)
as selected ports and others as standby ports. Both selected and standby ports can
transceive LACP protocol, but standby ports cannot forward user service packets.
Dynamic LACP Aggregation
The LACP uses peer exchanges across the links to determine, on an ongoing basis, the
aggregation capability of the various links, and continuously provides the maximum
level of aggregation capability achievable between a given pair of systems as well as
under manual control through direct manipulation of the state variables of Link
Aggregation (for example, keys) by a network manager.
Dynamic LACP aggregation can be established even for a single port, as is called
single port aggregation. LACP is enabled at dynamic aggregation ports. Only the
ports with the same speed, duplex mode and basic configuration and connected to
the same device can be aggregated dynamically.
Because only a defined number of ports can be supported in an aggregation group, if
the ports in an aggregation group exceed the port quantity threshold for that group,
the system shall set some ports with smaller system IDs (system priority + system MAC
address) and port IDs (port priority + port number) as selected ports and others as
standby ports. If not, all member ports are selected ports. Both selected and standby
ports can transceive LACP protocol, but standby ports cannot forward user service
packets. Among the selected ports of an aggregation group, the one with minimum
port number serves as the master port for that group and the others are sub-ports.
In comparing system IDs, the system first compares system priority values; if they are
equal, then it compares system MAC addresses. The smaller system ID is given priority.
Comparing port IDs follows the same process: the system first compares port priority
values and then port numbers and the smaller port ID is given priority. If system ID
changes from non-priority to priority, then the selected or standby state is determined
by the port priority of the system. You can decide whether the port is selected or
standby by setting system priority and port priority.
Load Sharing
In terms of load balancing, link aggregation may be load balancing aggregation and
non-load balancing aggregation. In general, the system only provides limited load
balancing aggregation resources, so the system needs to rationally allocate these
resources among manual aggregation groups, static LACP aggregation groups,
dynamic LACP aggregation groups, and the aggregation groups including special
ports which require hardware aggregation resources. The system will always allocate
hardware aggregation resources to the aggregation groups with higher priority levels.
When the load sharing aggregation resources are used up for existing aggregation
groups, newly-created aggregation groups will be non-load sharing ones. The priority
levels (in descending order) for allocating load sharing aggregation resources are as
follows:
■ Aggregation groups including special ports which require hardware aggregation
resources
■ Manual and static LACP aggregation groups
■ Aggregation groups that probably reach the maximum rate after the resources are
allocated to them
Page 71
Link Aggregation Configuration71
■ Aggregation groups with the minimum master port numbers if they reach the
equal rate with other groups after the resources are allocated to them
When aggregation groups of higher priority levels appear, the aggregation groups of
lower priority levels release their hardware resources. For single-port aggregation
groups, if they can transceive packets normally without occupying hardware
resources, they shall not occupy the resources.
A load sharing aggregation group may contain several selected ports, but a non-load
sharing aggregation group can only have one selected port, while others are standby
ports. Selection criteria of selected ports vary for different types of aggregation
groups.
Link Aggregation
Configuration
Link aggregation configuration is described in the following sections:
■ Enabling/Disabling LACP
■ Creating/Deleting an Aggregation Group
■ Adding/Deleting an Ethernet Port into/from an Aggregation Group
■ Setting/Deleting the Aggregation Group Descriptor
■ Configuring System Priority
■ Configuring Port Priority
Enabling/Disabling LACP
You should first enable LACP at the ports before performing dynamic aggregation, so
that both parties can agree on adding/deleting the ports into/from a dynamic LACP
aggregation group.
Perform the following configuration in Ethernet Port View.
Table 51 Enabling/Disabling LACP
OperationCommand
Enable LACP at the portlacp enable
Disable LACP at the portundo lacp enable
By default, LACP is disabled at the port.
Note that:
■ You cannot enable LACP at a
■stack port
■mirrored port
■port with a static MAC address configured
■port with static ARP configured
■port with 802.1x enabled
■port in a manual aggregation group
■ You can add a port with LACP enabled into a manual aggregation group, but then
the LACP will be disabled on it automatically. Or you can add a port with LACP
disabled into a static LACP aggregation group, and then the LACP will be enabled
automatically.
■ The Switch selects the port with the minimum port number as the master port of
the aggregation group. This rule applies to all aggregation groups.
Page 72
72 CHAPTER 3: PORT OPERATION
Creating/Deleting an Aggregation Group
Use the following command to create a manual aggregation group or static LACP
aggregation group, but the dynamic LACP aggregation group is established by the
system when LACP is enabled on the ports. You can also delete an existing
aggregation group: when you delete a manual aggregation group, all its member
ports are disaggregated; when you delete a static or dynamic LACP aggregation
group, its member ports form one or several dynamic LACP aggregation groups.
Perform the following configuration in System View.
Table 52 Creating/Deleting an Aggregation Group
OperationCommand
Create an aggregation grouplink-aggregation group agg-id mode { manual |
static }
Delete an aggregation groupundo link-aggregation group agg-id
The Switch selects the port with the minimum port number as the master port of the
aggregation group. This rule applies to all aggregation groups.
A manual or static aggregation group can have up to eight ports. To change an
existing dynamic aggregation group into a manual or static group enter:
link-aggregation group agg-id mode
If the port number in a group exceeds eight, you will be prompted that a
configuration failure has occurred.
If the aggregation group you create already exists but contains no member port, you
can overwrite the existing group; if it already exists in the system and contains
member ports, then you can only change a dynamic or static LACP aggregation group
to a manual one, or a dynamic LACP aggregation group to a static one. In the former
case, LACP shall be disabled at the member ports automatically, while in the latter
case, LACP shall remain enabled.
Adding/Deleting an Ethernet Port into/from an Aggregation Group
You can add/delete ports into/from a manual or static LACP aggregation group, but
member port adding or deleting for a dynamic LACP aggregation group is
implemented by the system.
Perform the following configuration in Ethernet Port View.
Table 53 Adding/Deleting an Ethernet Port into/from an Aggregation Group
OperationCommand
Add an Ethernet port into the aggregation
group
Delete an Ethernet port from the aggregation
port
port link-aggregation group agg_id
undo port link-aggregation group
Note that:
■ You cannot enable LACP for a
■stack port
■mirrored port
■port with static MAC address configured
Page 73
Link Aggregation Configuration73
■port with static ARP configured
■port with 802.1x enabled.
■ You must delete the aggregation group, instead of the port, if the manual or static
LACP aggregation group contains only one port.
Setting/Deleting the Aggregation Group Descriptor
Perform the following configuration in System View.
Table 54 Setting/Deleting the Aggregation Group Descriptor
OperationCommand
Set aggregation group descriptorlink-aggregation group agg_id description
Delete aggregation group descriptor undo link-aggregation group agg_id
alname
description
By default, an aggregation group has no descriptor.
If you have saved the current configuration with the
save command, the configured
manual aggregation groups, static LACP aggregation groups and corresponding
descriptors exist when the system reboots. But the dynamic LACP aggregation groups
do not exist, and even the descriptors configured for them will not be restored.
Configuring System Priority
The LACP refers to system IDs in determining if the member ports are the selected or
standby port for a dynamic LACP aggregation group. The system ID consists of
two-byte system priority and six-byte system MAC, that is, system ID = system priority
+ system MAC. In comparing system IDs, the system first compares system priority
values; if they are equal, then it compares system MAC addresses. The smaller system
ID is given priority.
Changing system priority may affect the priority levels of member ports, and further
their selected or standby state.
Perform the following configuration in System View.
Table 55 Configuring System Priority
Operation Command
Configure system prioritylacp system-priority system_priority_value
Restore the default system priorityundo lacp system-priority
By default, system priority is 32768.
Configuring Port Priority
The LACP compares system IDs first and then port IDs (if system IDs are the same) in
determining if the member ports are selected or standby ports for a dynamic LACP
aggregation group. If the ports in an aggregation group exceed the port quantity
threshold for that group, the system shall set some ports with smaller port IDs as
selected ports and others as standby ports. The port ID consists of two-byte port
priority and two-byte port number, that is, port ID = port priority + port number. The
system first compares port priority values and then port numbers and the small port
ID is considered prior.
Page 74
74 CHAPTER 3: PORT OPERATION
Perform the following configuration in Ethernet Port View.
Table 56 Configuring Port Priority
OperationCommand
Configure port prioritylacp port-priority
port_priority_value
Restore the default port priorityundo lacp port-priority
By default, port priority is 32768.
Displaying and
Debugging Link
Aggregation
After the above configuration, enter the
display command in any view to display the
running of the link aggregation configuration, and to verify the effect of the
configuration.
You can also enter, in User View, the
port and
Table 57 Displaying And Debugging Link Aggregation
OperationCommand
Display summary information
of all aggregation groups
Display detailed information of
a specific aggregation group
Display local system IDdisplay lacp system-id
Display detailed link
aggregation information at the
port
Switch A connects Switch B with three aggregation ports, numbered as Ethernet1/0/1
to Ethernet1/0/3, so that incoming/outgoing load can be balanced among the
member ports.
Networking Diagram
Figure 16 Networking for Link Aggregation
Configuration Procedure
The following only lists the configuration for Switch A; configure Switch B similarly.
1 Manual link aggregation
a Create manual aggregation group 1.
[SW5500]link-aggregation group 1 mode manual
b Add Ethernet ports Ethernet1/0/1 to Ethernet1/0/3 into aggregation group 1.
[SW5500]interface ethernet1/0/1
[SW5500-Ethernet1/0/1]port link-aggregation group 1
[SW5500-Ethernet1/0/1]interface ethernet1/0/2
[SW5500-Ethernet1/0/2]port link-aggregation group 1
[SW5500-Ethernet1/0/2]interface ethernet1/0/3
[SW5500-Ethernet1/0/3]port link-aggregation group 1
2 Static LACP aggregation
a Create static LACP aggregation group 1.
[SW5500]link-aggregation group 1 mode static
b Add Ethernet ports Ethernet1/0/1 to Ethernet1/0/3 into aggregation group 1.
[SW5500]interface ethernet1/0/1
[SW5500-Ethernet1/0/1]port link-aggregation group 1
[SW5500-Ethernet1/0/1]interface ethernet1/0/2
[SW5500-Ethernet1/0/2]port link-aggregation group 1
[SW5500-Ethernet1/0/2]interface ethernet1/0/3
[SW5500-Ethernet1/0/3]port link-aggregation group 1
3 Dynamic LACP aggregation
a Enable LACP at Ethernet ports Ethernet1/0/1 to Ethernet1/0/3.
Only when the three ports are configured with identical basic configuration, rate and
duplex mode, can they be added into a same dynamic aggregation group after LACP
is enabled on them, for load sharing.
Global Broadcast
Suppression Feature
Configuring Global
Broadcast Suppression
Global Broadcast
Suppression
Configuration Example
This section describes how to configure the Global Broadcast Suppression feature.
You can use the following command to globally configure the size of the broadcast
traffic allowed to pass through each Ethernet port. Once the broadcast traffic exceeds
the threshold you configured, the system discards some broadcast packets to
decrease the ratio of the broadcast traffic into a reasonable range. This suppresses
broadcast storms and avoids network congestion to guarantee the normal operation
of network services.
Table 58 Configure global broadcast suppression
OperationCommandDescription
Enter system viewsystem-view-
Globally configure the size of
broadcast traffic allowed to
pass through each Ethernet
port
broadcast-suppression
{ ratio | pps max-pps }
By default, the system allows the
broadcast traffic to occupy 100%
network bandwidth. That is, it does
not limit broadcast traffic.
The broadcast suppression configured globally with the broadcast-suppression
command will take effect on all the Ethernet ports in a stack system.
Network requirements
Configure the global broadcast suppression ratio to 20. That is, allow 20% network
bandwidth to be occupied by broadcast traffic.
Configuration procedure
1 Enter system view.
<S5500> system-view
2 Configure the ratio of global broadcast suppression to 20.
Introduction to XRNSeveral XRN Switches of the same model can be interconnected to create a “Fabric”,
in which each Switch is a unit. The ports used to interconnect all the units are called
Fabric ports, while the other ports that are used to connect the Fabric to users are
called user ports. In this way, you can increase ports and switching capability by
adding devices to the Fabric. In addition, reliability of the system will be improved
because the devices within the Fabric can backup each other. This feature brings you
many advantages:
nRealizes unified management of multiple devices. Only one connection and one IP
address are required to manage the entire Fabric. Therefore, management cost is
reduced.
nEnables you to purchase devices on demand and expand network capacity
smoothly. Protects your investment to the full extent during network upgrade.
nEnsures high reliability by N+1 redundancy, avoids single point failure, and lessens
service interruption.
Figure 17 Fabric Example
Fabric Topology Mapper (FTM) function can manage and maintain Fabric topology.
FTM on each unit exchanges information with other units, including unit ID, Fabric
name, and the authentication mode between units, by using a special kind of
protocol packets. It manages and maintains Fabric topology according to the acquired
information. For example, when a new device is connected to a Fabric, FTM will
determine whether it should establish a new Fabric with the device according to the
information.
Configuring an XRN
Fabric
FTM provides user interfaces. You can configure VLAN unit IDs, Fabric name, and the
authentication mode between units by using the command.
Page 80
80 CHAPTER 4: XRN CONFIGURATION
Table 60 Configuring FTM
DeviceConfigurationDefault Settings Comment
SwitchSpecify the stacking
VLAN of the Switch
Set unit IDs for the
Switches
Specify the Fabric
port of the Switch
Set unit names for
the Switches
Set a name for the
Fabric where the
Switches belong
Set the
authentication
mode for the Fabric
The stacking
VLAN is VLAN
4093
The unit ID of a
Switch is set to 1
-For 28-port Switch, the 27th 28th
--
The Fabric name
of the Switches is
5500
No authentication
mode is set on the
Switches
You should specify the stacking
VLAN before the Fabric is
established.
Make sure that you have set
different unit IDs to different
Switches, so that the Fabric can
operate normally after all the
Switches are interconnected.
port can be the Fabric port, for
52-port Switch, the 51st, 52nd port
can be the Fabric port.
Interconnected the Switches with
the same Fabric name to form a
Fabric.
Set the same authentication mode
on all the devices within the Fabric.
Specifying the Stacking
VLAN of the Switch
Setting Unit IDs for
Switches
The Switch 5500 Series: the SI units supports basic XRN, that is, Distributed Device
Management (DDM) and Distributed Link Aggregation (DLA); the EI units support
enhanced XRN, that is DDM, Distributed Resilient Routing (DRR).
You can use the command in the following table to specify the
stacking VLAN of the
Switch.
Perform the following configuration in System View.
Table 61 Specifying the Stacking VLAN of the Switch
OperationCommand
Specifying the stacking VLAN of the Switchftm stacking-vlan vlan-id
Setting the stacking VLAN of the Switch to Default Value undo ftm stacking-vlan
By default, the stacking VLAN is VLAN 4093.
You should specify the stacking VLAN before the Fabric is established.
You can use the command in the following table to set unit IDs for Switches. Make
sure to set different unit IDs for different Switches in a Fabric. On the Switches that
support auto numbering, FTM will automatically number the Switches to constitute a
Fabric, so that each Switch has a unique unit ID in the Fabric.
Perform the following configuration in System View.
Table 62 Setting unit IDs for Switches
OperationCommand
Set unit IDs for Switcheschange unit-id <1-8> to {<1-8> |
auto-numbering }
nIf the modified unit ID does not exist in the Fabric, the Switch sets its priority to 5
and saves it in the unit Flash memory.
Page 81
Configuring an XRN Fabric81
nIf the modified unit ID is an existing one, the Switch prompts you to confirm if you
really want to change the unit ID. If you choose to change, the existing unit ID is
replaced and the priority is set to 5. Then you can use the
fabric save-unit-id
command to save the modified unit ID into the unit Flash memory and clear the
information about the existing one.
nIf auto-numbering is selected, the system sets the unit ID priority to 10. You can
use the
fabric save-unit-id command to save the modified unit ID into the
unit Flash memory and clear the information about the existing one.
The unit IDs in a Fabric are not necessarily numbered consecutively or in ascending
order.
By default, the unit ID of a Switch is set to 1. A unit ID can be set to a value in the
range from 1 to the maximum number of devices supported in XRN.
Saving the Unit ID of
Each Unit in the Fabric
Specifying the Fabric
Port of the Switch
Setting Unit Names for
Switches
You can use the commands in the following table to save the unit ID of each unit in
the Fabric to the unit Flash memory.
Perform the following configuration in User View.
Table 63 Save the unit ID of each unit in the Fabric
OperationCommand
Save the unit ID of each unit in the fabricfabric save-unit-id
Restore the unit ID of each unit in the fabricundo fabric save-unit-id
Perform the following configuration in System View.
Table 64 Specifying the Fabric Port of the Switch
OperationCommand
Specifying the stacking port of the
Switch
cancel the stacking port of the Switch undo fabric-port { interface-name |
nIn the example, it is assumed that the system will automatically change the unit IDs
of Switch B, Switch C and Switch D to 2, 3 and 4 after you choose
auto-numbering for unit-id.
RMON on XRNInterconnected switches form a fabric if they all support the XRN function and are all
of the same type. The RMON configurations of the devices in a fabric are the same.
The RMON configuration performed on a device of a fabric will be automatically
synchronized to all devices in the fabric if the configuration does not conflict with
those of other devices in the fabric.
Page 84
84 CHAPTER 4: XRN CONFIGURATION
If you configure the same entry in the same ROM group for devices of a fabric to be
different values, the entry values of all the conflicting devices will adopt that of the
conflicting device with the smallest Unit ID when you synchronize the devices. Such a
mechanism eliminates configuration conflicts between the devices in a fabric.
After the device configurations converge, you can collect RMON history and statistics
data of any units from any switch in the fabric.
Configuration
Commands for RMON on
XRN
After the configurations of the switches in a fabric converge, you can use the
following commands to collect RMON data of the devices in the fabric.
Table 69 Configuration commands on RMON on XRN
OperationCommandDescription
Collect the RMON statistics data of
a specified unit
Collect the RMON history data of a
specified units
display rmon statistics unit
unit-id
display rmon history unit
unit-id
You can execute the display
command in any view.
Clustering on XRNThrough neighbor topology discovery protocol (NTDP), Clustering can collect the
information about the connection relations of the devices in a network and candidate
devices, consequently maintaining and managing the cluster topology.
With Clustering employed, the NTDP topology information collecting function is
enabled by default on the management device of the cluster. And the timer is set to 1
minute. A management device can also perceive in time any changes of the cluster
topology caused by new devices being added to the cluster and determine the
candidate switches among the detected devices. By sending joining-request packets
to candidate switches, the management device also enables these devices to be
plug-and-play.
Peer Fabric Port
Detection
Work Flow of the Peer
Fabric Port Detection
Function
As the basis of the XRN function, the fabric topology management (FTM) module
manages and maintains the entire topology of a fabric. The FTM module also
implements the peer fabric port detection function.
A device can join a fabric only when the following conditions are met.
nThe number of the existing devices in the fabric does not reach the maximum
number of devices allowed by the fabric.
nThe fabric names of the device and the existing devices in the Fabric are the same.
nThe software version of the device is the same as that of the existing devices in the
fabric.
nThe device passes the security authentication if security authentication is enabled
in the fabric.
After a switch is powered on, the FTM module releases device information of the
switch through the fabric ports. The device information includes UNIT ID, CPU MAC,
device type ID, fabric port information, and all fabric configuration information. The
device information is released in the form of discovery packet (DISC). A new device
can join a fabric only when its DISC packets pass the authentication performed by the
existing devices in the fabric.
nIf a fabric port of a switch is connected to a non-fabric port, the switch will not
receive DISC packets from the peer. In this case, the switch cannot join the fabric.
Page 85
Peer Fabric Port Detection85
nIf the switch can receive DISC packets sent by the peer, the FTM module
determines whether peer sending ports correspond to local receiving ports
according to information in the packet. That is, if a DISC packet received by the
left port of the switch is sent by the right port of the peer device, the packet is
regarded legal. Otherwise, the packet is regarded illegal and is discarded.
nIf the maximum number of devices allowed by the fabric is reached, the devices in
the fabric do not send DISC packets and discard the received DISC packets. This
prevents new devices from joining the fabric.
nAfter receiving a DISC packet from a directly connected device, a device in a fabric
checks whether the device information (that is, the Fabric name and software
version) contained in the packet and those of its own are the same. If not, the
received DISC packet is illegal and will be discarded.
nIf authentication is enabled in the fabric, the current device in the fabric
authenticates received packets sent by new directly connected devices. Packets
that fail to pass the authentication will be discarded.
Prompt Information and
Solution
normal
If the port displays "normal", it indicates the fabric operates properly.
temporary
If the port displays "temporary", it indicates the port status is changing.
redundance port
If the port displays "redundance port", it indicates the port is the redundant port in
fabric ring topology.
The "normal", "temporary" and "redundance port" information do not mean a device
or a fabric operates improperly. No measure is needed for any of these three types of
information.
connection error
Analysis: The port matching errors (as listed in Table 70) may occur if a switch
prompts the "connection error" message.
Solution: Take the measures listed in Table 70 accordingly.
Table 70 Connection error type and solution
Error typeSolution
Two fabric ports of the same device (that
is, the right port and the left port) are
connected.
The left and right fabric ports of two
devices are not connected in a crossed
way.
A fabric port of the local switch is
connected to a non-fabric port.
Pull out one end of the cable and connect it to a
fabric port of another switch.
Connect the left and right ports of two devices in a
crossed way.
Check the types of the two interconnected ports on
two sides and make sure a fabric port is only
connected to ports of the same type.
Page 86
86 CHAPTER 4: XRN CONFIGURATION
reached max units
Analysis: The "reached max units" message indicates that the maximum number of
units allowed by the current fabric is reached. You will fail to add new devices to the
fabric in this case.
Solution: Remove the new device or existing devices in the fabric.
Up to eight devices can be in an XRN fabric at a time.
different system name
Analysis: The "different system name" message indicates the fabric name of the
device directly connected to the switch and the existing fabric name of the fabric are
not the same. Only the devices with the same fabric name can form a Fabric.
Solution: Configure the fabric name of the new device to be that of the fabric.
different product version
Analysis: The "different product version" message indicates the software version of
the directly connected device and that of the current device are not the same. A
device can join a fabric only when its software version is identical to that of the fabric.
Multiple Fabric Port
Candidates
Solution: Make sure the software version of the new device is the same as that of the
fabric.
auth failure
Analysis: The "auth failure" message indicates error occurs when the switch
authenticates a directly connected device. The error may occur if the XRN fabric
authentication modes configured for the both devices are not the same, or the
password configured does not match.
Solution: Make sure the XRN fabric authentication modes and the passwords
configured for the both devices are the same.
On a Switch 5500 series switch, four GigabitEthernet ports can operate as fabric
ports. The four ports are grouped into two groups. One group comprises of
GigabitEthernet1/1/1 and GigabitEthernet1/1/2 ports, the other comprises of
GigabitEthernet1/1/3 and GigabitEthernet1/1/4 ports. Only the ports of one group
can operate as fabric ports at a time. Of the ports in the two groups,
GigabitEthernet1/1/1 and GigabitEthernet1/1/3 ports can operate as UP fabric ports,
and GigabitEthernet1/1/2 and GigabitEthernet1/1/4 ports can operates as DOWN
fabric ports.
You can configure a port to be a fabric port using the fabric port command. Once
you configure a port to be a fabric port, the group to which the port belongs
becomes a fabric port group, and the other port in the group becomes a fabric port
automatically. For example, after you configure the GigabitEthernet1/1/1 port to be a
fabric port (a UP fabric port) by executing the fabric port GigabitEthernet1/1/1
enable command, the port group becomes a fabric port group, and
GigabitEthernet1/1/2 port, which belongs to the same port group, becomes a DOWN
fabric port.
Page 87
Multiple Fabric Port Candidates87
A port cannot be a fabric port if the jumboframe function is enabled on the port. So
make sure the jumboframe function is disabled on a port if you want to configure the
port to be a fabric port.
With a port group of a switch being the current fabric port group, you need to
invalidate the current fabric port group before configuring the other port group to be
a fabric port group.
After a fabric is configured, the master switch synchronizes its configuration file to all
the units in the fabric. As the Flashes of the units may differ in size, the synchronizing
operation may fail on certain units because of lack of Flash memory space, which
makes the fabric fails to be established. So make sure each unit has enough free Flash
memory space before configuring a fabric.
Page 88
88 CHAPTER 4: XRN CONFIGURATION
Page 89
DLDP CONFIGURATION
5
This chapter contains DLDP overview, fundamentals, precautions during
configuration, and configuration information.
DLDP OverviewYou may have encountered unidirectional links in networking. When a unidirectional
link occurs, the local device can receive packets from the peer device through the link
layer, but the peer device cannot receive packets from the local device. See Figure 20
and Figure 20. Unidirectional links can cause many problems, spanning tree topology
loop for example.
Device Link Detection Protocol (DLDP) can detect the link status of the optical fiber
cable or copper twisted pair (such as super category 5 twisted pair). If DLDP finds a
unidirectional link, it disables the related port automatically or informs users to disable
it manually depending on specific configuration, to avoid potential network
problems.
Figure 19 Fiber cross-connection
Figure 20 Fiber correct connection/disconnection in one direction
Page 90
90 CHAPTER 5: DLDP CONFIGURATION
DLDP provides the following features:
nAs a link layer protocol, it works together with the physical layer protocol to
nWhile the auto-negotiation mechanism on the physical layer detects physical
nThe auto-negotiation mechanism and DLDP, when enabled, work together to
nEven if the links of both ends can normally operate individually on the physical
DLDP FundamentalsDLDP status
DLDP may be in one of the six states: initial, inactive, active, advertisement, probe and
disable.
Table 71 DLDP status
monitor the link status of a device.
signals and faults; DLDP identifies peer devices and unidirectional links, and
disables unreachable ports.
detect and disable physical and logical unidirectional links, and to prevent the
failure of other protocols, such as STP (Spanning Tree Protocol).
layer, DLDP can detect (at the link layer) if these links are set up correctly and
packets can be exchanged normally between the two ends. This cannot be
implemented by the auto-negotiation mechanism.
StatusDescription
InitialDLDP is not enabled.
InactiveDLDP is enabled but the corresponding link is down
ActiveDLDP is enabled and the link is up, or an neighbor entry is cleared
AdvertisementAll neighbors communicate normally in both direction, or DLDP remains
ProbeDHCP sends packets to check if it is a unidirectional link. It enables the
DisableDLDP detects a unidirectional link, or finds (in enhanced mode) that a
in active status for more than five seconds and enters this status. It is a
stable status when no unidirectional link is found
probe sending timer and an echo waiting timer for each target neighbor.
neighbor disappears. At this time, DLDP does not receive or send DLDP
packets.
DLDP timers
DLDP works with the following timers:
Table 72 DLDP timers
TimerDescription
Advertisement sending
timer
Probe sending timerThe time interval is 1 second. In probe status, DLDP sends two probe
Echo waiting timerIt is enabled when DLDP enters probe status. The timeout time is 10
Time interval for sending advertisement packets, which can be
configured with a particular command.By default, the time interval is 10
seconds.
packets every second.
seconds.If no echo packet is received from the neighbor when the Echo
waiting timer expires, the local end is set to unidirectional
communication status and the state machine turns into disable status.
DLDP outputs log and tracking information, sends flush packets.
Depending on the user-defined DLDP down mode, DLDP disables the
local port automatically or prompt the user to disable the port manually.
At the same time, DLDP deletes the neighbor entry.
Page 91
DLDP Overview91
Table 72 DLDP timers (continued)
TimerDescription
Entry aging timerWhen a new neighbor joins, a neighbor entry is created, and the
Enhanced timerIn enhanced mode, if no packet is received from the neighbor when the
corresponding entry aging timer is enabled.When an advertisement
packet is received from a neighbor, the neighbor entry is updated, and
the corresponding entry aging timer is reset.In normal mode, if no packet
is received from the neighbor when the entry aging timer expires, DLDP
sends an advertisement packet with RSY tag, and deletes the neighbor
entry.In enhanced mode, if no packet is received from the neighbor
when the entry aging timer expires, DLDP enables the enhanced
timer.The time interval set for the entry aging timer is three times of that
for the advertisement timer.
entry aging timer expires, DLDP enables the enhanced timer for the
neighbor. The timeout time for the enhanced timer is 10 seconds.The
enhanced timer then sends two probe packets every one second and
totally eight packets continuously to the neighbor.If no echo packet is
received from the neighbor when the Echo waiting timer expires, the
local end is set to unidirectional communication status and the state
machine turns into disable status. DLDP outputs log and tracking
information, sends flush packets. Depending on the user-defined DLDP
down mode, DLDP disables the local port automatically or prompt the
user to disable the port manually. DLDP deletes the neighbor entry.
DLDP operating mode
DLDP can operate in two modes: normal and enhanced.
Table 73 DLDP operating mode and neighbor entry aging
Whether DLDP
probes neighbor
DLDP operating
mode
Normal modeNoYes (the neighbor entry ages
Enhanced modeYesYes (the enhancement timer
during neighbor
entry aging
Whether entry aging
timer is enabled during
neighbor entry aging
after the entry aging timer
expires)
is enabled after the entry
aging timer expires)
Whether enhanced
timer is enabled
when entry aging
timer expire
No
Yes (When the
enhanced timer expires,
the local end is set to
single pass status, and
the neighbor entry
ages)
DLDP implementation
1 If the link is up after DLDP is enabled on the port, DLDP sends DLDP packets to the
peer device, and analyses and processes DLDP packets received from the peer device.
DLDP in different status sends different packets.
.
Table 74 Types of packets sent by DLDP
DLDP statusPacket types
ActiveAdvertisement packets, including those with or without RSY tags
AdvertisementAdvertisement packets
ProbeProbe packets
Page 92
92 CHAPTER 5: DLDP CONFIGURATION
2 DLDP analyzes and processes received packets as follows:
nIn authentication mode, DLDP authenticates the packets on the port, and discards
nDLDP processes the received DLDP packets as follows:
Table 75 Process received DLDP packets
Packet typeProcessing procedure
Advertisement
packet
Flush packetDeletes the neighbor entry from the local device
Probe packetSends echo
Echo packetChecks whether
those do not pass the authentication.
Extracts
neighbor
information
packets
containing both
neighbor and its
own
information to
the peer
the local device
is in probe
status
If this neighbor entry does not exist on the local device, DLDP
creates the neighbor entry, enables the entry aging timer,
and turns to probe status.
If the neighbor entry already exists on the local device, DLDP
resets the entry aging timer.
Creates the neighbor entry if this neighbor entry does not
exist on the local device.
If the neighbor entry already exists on the local device,
refreshes the entry aging timer.
NoDiscards this echo packet
YesChecks whether
neighbor information
in the packet is the
same as that on the
local device
NoDiscards this echo
packet
YesSets the neighbor flag
bit to bidirectional
If all neighbors are in
bidirectional
communication state,
DLDP turns from
probe status to
advertisement status,
and sets the echo
waiting timer to 0.
3 If no echo packet is received from the neighbor, DLDP performs the following
processing
:Refer to Table 76 to process w
Table 76 Processing when no echo packet received from the neighbor
No Echo packet
received from the
neighborProcessing procedure
In normal mode, no
echo packet is received
when the echo waiting
timer expires
In enhanced mode, no
echo packet is received
when the enhanced
timer expires
DLDP turns into disable status. It outputs log and tracking information,
sends flush packets. Depending on the user-defined DLDP down mode,
DLDP disables the local port automatically or prompt the user to disable
the port manually. DLDP sends the RSY message and deletes the
neighbor entry.
hen no echo packet received from the neighbor.
Page 93
DLDP Configuration93
Precautions During DLDP
Configuration
It is recommended that the following precautions be taken during DLDP
configuration:
nDLDP works only when the link is up.
nTo ensure unidirectional links can be detected, you should make sure: DLDP is
enabled on both ends, and the time interval for sending advertisement packets,
authentication mode and password are set consistent on both ends.
nYou can adjust the time interval for sending advertisement packets in different
network circumstances, so that DLDP can respond rapidly to link failure. The time
interval should be shorter than one-third of the STP convergence time, which is
generally 30 seconds. If too long time interval is set, an STP loop may occur before
DLDP shut down unidirectional links. On the contrary, if too short time interval is
set, network traffic increases, and port bandwidth is reduced.
nDLDP does not process any LACP event, and treats each link in the aggregation
group as independent.
For the configuration of distributed products, note that:
nDuring hot plugging, if the interface board you insert has the same type as that
you have removed, DLDP restores working automatically.
nAfter the SRPU board switchover, the standby board takes over unidirectional link
detection. In this case, the DLDP parameters do not change and DLDP checks every
port again for unidirectional links.
For the configuration of the products supporting expandable resilient networking
(XRN), note that:
nDLDP supports XRN; its processing is fully distributed. In XRN, port management is
distributed to each port. Each unit completes only the DLDP tasks for its ports.
DLDP commands executed on a port take effect only on the unit where the port is
located.
nThe global DLDP configuration must be consistent on all units. The global DLDP
configuration commands take effect on all the units in the XRN.
nStack ports do not support DLDP.
DLDP ConfigurationTable 77 describes the DLDP basic configuration tasks:
Table 77 DLDP configuration tasks
OperationCommandDescription
Enter system viewsystem-view-
Enable DLDPEnable DLDP globallydldp enableRequired, by default,
When you use the dldp enable/dldp disable command in system view to
enable/disable DLDP globally on all optical ports of the switch, this command is only
valid for existing optical ports on the device, it is not valid for those added
subsequently.
DLDP can operate normally only when the same authentication mode and password
are set for local and peer ports.
Resetting DLDP StatusThe command here is only valid for those ports that are DLDP down due to the
detection of unidirectional link. You can use the command here to reset the DLDP
status of these ports to retrieve DLDP probes.
Table 78 Reset DLDP status
DLDP Configuration
Example
OperationCommandDescription
Reset DLDP
status
Enter system viewsystem-viewOptional
Reset the DLDP status of the
system
Reset the
DLDP status of
a port
Enter Ethernet
port view
Reset the
DLDP status of
a port
dldp reset
interface interface-type
interface-number |
Interface-name }
dldp reset
This command only applies to the ports in DLDP down status.
Network requirements
As shown in Figure 21 and Figure 22, two switches (SwitchA and SwitchB) are
connected with each other by fibers.
nThe two switches are connected by two pairs of fibers.
nThe cross lines in Figure 21 indicates the two fibers are incorrectly
cross-connected, and the vacant lines in Figure 22 indicates the two fibers may be
either correctly connected or disconnected.
nBoth switches support DLDP.
nUnidirectional links due to incorrect fiber connections between the two switches
(including disconnection in one direction and cross-connection) are expected to be
detected and then automatically shut down by DLDP.
nSuppose a cross-connection exists between SwitchA and SwitchB, which is then
corrected by a network administrator after DLDP shuts down the unidirectional
links. Now the ports taken down by DLDP need to be restored.
Page 95
DLDP Configuration Example95
Network diagram
Figure 21 Fiber cross-connection
Figure 22 Correct connection/disconnection in one direction
Configuration procedure
1 1Configure SwitchA
a Configure the ports to work in mandatory full duplex mode
c Set the time interval for sending DLDP packets to 15 seconds
[S5500A] dldp interval 15
d Configure DLDP to work in enhanced mode
[S5500A] dldp work-mode enhance
Page 96
96 CHAPTER 5: DLDP CONFIGURATION
e Set the DLDP handling mode for unidirectional links to auto
f Display the DLDP status on Switch A
g Restore the ports taken down by DLDP
2 Configure Switch B
a Configure the ports to work in mandatory full duplex mode
[S5500A] dldp unidirectional-shutdown auto
[S5500A] display dldp 2
If the fibers are correctly connected between the two switches, the system displays
the connections with the neighbor as bidirectional links, or else, it displays the
connections with the neighbor as unidirectional links.
e Set the DLDP handling mode for unidirectional links to auto
[S5500B] dldp unidirectional-shutdown auto
f Display the DLDP status on SwitchB
[S5500B] display dldp 2
If the fibers are correctly connected between the two switches, the system displays
the connections with the neighbor as bidirectional links, or else, it displays the
connections with the neighbor as unidirectional links.
g Restore the ports taken down by DLDP
[S5500B] dldp reset
For DLDP to detect fiber disconnection in one direction, you must configure the port
to work in mandatory full duplex mode.
When a port works in mandatory full duplex mode and DLDP is enabled, DLDP
considers a link as in unidirectional status if fiber in one direction is disconnected.
When a port works in non-mandatory full duplex mode, even if DLDP is enabled, it
does not take effect when fiber in one direction is disconnected, in that case, it
considers that the port is down.
Page 97
VLAN OPERATION
6
This chapter covers the following topics:
■ VLAN Configuration
■ Voice VLAN Configuration
VLAN ConfigurationThis chapter describes how to configure a VLAN
VLAN OverviewA virtual local area network (VLAN) creates logical groups of LAN devices into
segments to implement virtual workgroups. IEEE issued the IEEE 802.1Q in 1999,
which was intended to standardize VLAN implementation solutions.
Using VLAN technology, you can logically divide the physical LAN into different
broadcast domains. Every VLAN contains a group of workstations with the same
demands. However, the workstations of a VLAN do not have to belong to the same
physical LAN segment.
Within a VLAN, broadcast and unicast traffic is not forwarded to other VLANs.
Therefore, VLAN configurations are very helpful in controlling network traffic, saving
device investment, simplifying network management and improving security.
Configuring a VLANVLAN configuration is described in the following sections:
■ Creating/Deleting a VLAN
■ Adding Ethernet Ports to a VLAN
■ Setting/Deleting a VLAN or VLAN Interface Description Character String
■ Specifying/Removing the VLAN Interface
■ Shutting Down/Enabling the VLAN Interface
To configure a VLAN, first create a VLAN according to network requirements.
Creating/Deleting a VLAN
Use the following command to create/delete a VLAN. If the VLAN to be created exists,
enter the VLAN View directly. Otherwise, create the VLAN first, and then enter the
VLAN View.
Perform the following configurations in System View.
Table 79 Creating/Deleting a VLAN
OperationCommand
Create a VLAN and enter the VLAN Viewvlan vlan_id
Delete the specified VLAN undo vlan { vlan_id [ to vlan_id ] | all }
Note that the default VLAN, namely VLAN 1, cannot be deleted.
Page 98
98 CHAPTER 6: VLAN OPERATION
Adding Ethernet Ports to a VLAN
Use the following command to add Ethernet ports to a VLAN.
Perform the following configuration in VLAN View.
Table 80 Adding Ethernet Ports to a VLAN
OperationCommand
Add Ethernet ports to a VLANport interface_list
Remove Ethernet ports from a VLANundo port interface_list
By default, the system adds all the ports to a default VLAN, whose ID is 1.
Note that you can add/delete a trunk port or a hybrid port to/from VLAN by using the
port and undo port commands in Ethernet Port View, but not in VLAN View.
Setting/Deleting a VLAN or VLAN Interface Description Character String
Use the following command to set/delete a VLAN or VLAN interface description
character string.
Perform the following configuration in VLAN or VLAN Interface View.
Table 81 Setting/Deleting a Vlan or Vlan Interface Description Character String
OperationCommand
Set the description character string for a VLAN or
VLAN interface
Restore the default description of current VLAN or
VLAN interface
By default, a VLAN description character string is
description string
undo description
No description!. VLAN interface
description character string of VLAN interface is the interface name, for example,
Vlan-interface1 Interface.
Specifying/Removing the VLAN Interface
Use the following command to specify/remove the VLAN interface. To implement the
network layer function on a VLAN interface, the VLAN interface must be configured
with an IP address and a subnet mask.
Perform the following configurations in System View.
Table 82 Specifying/Removing the VLAN Interface
OperationCommand
Create a new VLAN interface and enter VLAN
Interface View
Remove the specified VLAN interfaceundo interface vlan-interface
interface vlan-interface
vlan_id
vlan_id
Create a VLAN first before creating an interface for it.
For this configuration task,
vlan_id takes the VLAN ID.
Page 99
VLAN Configuration99
Shutting Down/Enabling the VLAN Interface
Use the following command to shut down/enable a VLAN interface.
Perform the following configuration in VLAN Interface View.
Table 83 Shutting Down/Enabling the VLAN Interface
OperationCommand
Shut down the VLAN interfaceshutdown
Enabling the VLAN interfaceundo shutdown
The operation of shutting down or enabling the VLAN interface has no effect on the
UP/DOWN status of the Ethernet ports on the local VLAN.
By default, when all the Ethernet ports belonging to a VLAN are in DOWN status, this
VLAN interface is also DOWN, that it, this VLAN interface is shut down. When there is
one or more Ethernet ports in UP status, this VLAN interface is also UP, that is, this
VLAN interface is enabled.
Displaying and
Debugging VLAN
VLAN Configuration
Example One
After the above configuration, enter the
display command in any view to display the
running of the VLAN configuration, and to verify the effect of the configuration.
Table 84 Displaying and Debugging a VLAN
OperationCommand
Display information about the VLAN interfacedisplay interface
vlan-interface [vlan_id]
Display information about the VLANdisplay vlan [ vlan_id | all |
static | dynamic ]
Networking Requirements
Create VLAN2 and VLAN3. Add Ethernet1/0/1 and Ethernet1/0/2 to VLAN2 and add
Ethernet1/0/3 and Ethernet1/0/4 to VLAN3.
Networking Diagram
Figure 23 VLAN Configuration Example 1
Page 100
100 CHAPTER 6: VLAN OPERATION
1 Create VLAN 2 and enter its view.
2 Add Ethernet1/0/1 and Ethernet1/0/2 to VLAN2.
3 Create VLAN 3 and enter its view.
4 Add Ethernet1/0/3 and Ethernet1/0/4 to VLAN3.
Configuration Procedure
[SW5500]vlan 2
[SW5500-vlan2]port ethernet1/0/1 to ethernet1/0/2
[SW5500-vlan2]vlan 3
[SW5500-vlan3]port ethernet1/0/3 to ethernet1/0/4
VLAN Configuration
Example Two
Networking Requirements
Configure an IP address on a VLAN interface.
Networking Diagram
Figure 24 shows an example of a typical VLAN configuration.
Figure 24 VLAN Configuration Example 2
Configuration Procedure
1 If the VLAN does not currently exist, then create it. This example uses VLAN ID 3.
Comparing with port-based VLANs, protocol-based VLANs operate in a different way.
After you configure protocol-based VLANs for a switch, the switch inserts tags
automatically in the received untagged packets according to the protocols with which
the packets are encapsulated. This enables packets of specific protocols to be
transmitted in corresponding VLANs. For ease of network management and
maintenance, you can associate services with specific VLANs by configuring
protocol-based VLANs.
The following section describes protocol-based VLAN configuration tasks:
■ Creating a VLAN protocol type
■ Associating a port with a protocol-based VLAN
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.