3Com Switch 8800
Configuration Guide
www.3com.com
Part No. DUA1750-2BAA01
Published: December 2005
Copyright © 2005, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by
any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission
from 3Com Corporation.
3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without
obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed,
including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality, and fitness for a
particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this
documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license agreement included
with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named
LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are provided to you
subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense. Software is
delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as
defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for
the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR
52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided on any
licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in
other countries.
3Com, the 3Com logo, are registered trademarks of 3Com Corporation.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered
trademarks of Microsoft Corporation.
X/Open Company, Ltd.
All other company and product names may be trademarks of the respective companies with which they are associated.
UNIX is a registered trademark in the United States and other countries, licensed exclusively through
3Com Corporation
350 Campus Drive
Marlborough, MA
01752-3064
About This Manual
Release Notes
This manual applies to 3Com Switch 8800.
Related Manuals
The related manuals are listed in the following table.
Manual Content
Organization
3Com Switch 8800 Configuration Guide consists of the following parts:
z MPLS
z STP
z Security
3Com Switch 8800 Installation
Guide
It provides information for the system installation,
booting, hardware/software maintenance &
monitoring.
3Com Switch 8800 Command
Reference Guide
It introduces all commands available in the
Switch 8800, as well as a command index.
This module introduces the configuration on MPLS and BGP/MPLS VPN features.
This module introduces the configuration on STP feature.
This module presents the configuration on 802.1x, AAA and RADIUS protocols, and
TACACS+ protocol.
z Reliability
This module focuses on VRRP and HA configurations.
z System Management
This module details the configuration involved in system management and
maintenance, including file management, system maintenance, SNMP, RMON,
NTP protocol, SSH terminal services, and network management.
3
Switch 8800 Configuration Guide About This Manual
z PoE
This module focuses on power over Ethernet (PoE) configuration.
z NAT & VPLS
This module presents the configurations on NAT and VPLS.
z Appendix
This appendix offers the acronyms in this manual.
Intended Audience
The manual is intended for the following readers:
z Network engineers
z Network administrators
z Customers who are familiar with network fundamentals
Conventions
The manual uses the following conventions:
I. General conventions
Convention Description
Arial Normal paragraphs are in Arial.
Boldface
Courier New
Headings are in Boldface.
Terminal Display is in Courier New.
II. Command conventions
Convention Description
Boldface
italic
[ ]
{ x | y | ... }
The keywords of a command line are in Boldface.
Command arguments are in italic.
Items (keywords or arguments) in square brackets [ ] are
optional.
Alternative items are grouped in braces and separated by
vertical bars. One is selected.
[ x | y | ... ]
{ x | y | ... } *
Optional alternative items are grouped in square brackets
and separated by vertical bars. One or none is selected.
Alternative items are grouped in braces and separated by
vertical bars. A minimum of one or a maximum of all can be
4
Switch 8800 Configuration Guide About This Manual
Convention Description
selected.
Optional alternative items are grouped in square brackets
[ x | y | ... ] *
and separated by vertical bars. Many or none can be
selected.
# A line starting with the # sign is comments.
III. GUI conventions
Convention Description
< >
[ ]
/
IV. Keyboard operation
Format Description
<Key>
<Key1+Key2>
<Key1, Key2>
Button names are inside angle brackets. For example, click
the <OK> button.
Window names, menu items, data table and field names
are inside square brackets. For example, pop up the [New
User] window.
Multi-level menus are separated by forward slashes. For
example, [File/Create/Folder].
Press the key with the key name inside angle brackets. For
example, <Enter>, <Tab>, <Backspace>, or <A >.
Press the keys concurrently. For example, <Ctrl+Alt+A>
means the three keys should be pressed concurrently.
Press the keys in turn. For example, <Alt, A> means the
two keys should be pressed in turn.
5
Switch 8800 Configuration Guide About This Manual
V. Mouse operation
Action Description
Select
Click
Double-Click
Drag
Press and hold the primary mouse button (left mouse
button by default).
Select and release the primary mouse button without
moving the pointer.
Press the primary mouse button twice continuously and
quickly without moving the pointer.
Press and hold the primary mouse button and move the
pointer to a certain position.
VI. Symbols
Eye-catching symbols are also used in the manual to highlight the points worthy of
special attention during the operation. They are defined as follows:
Caution: Means reader be extremely careful during the operation.
Note: Means a complementary description.
6
3Com Switch 8800 Configuration Guide Table of Contents
Table of Contents
Chapter 1 Product Overview........................................................................................................1-1
1.1 Product Overview...............................................................................................................1-1
1.2 Function Features.............................................................................................................. 1-1
Chapter 2 Logging into Switch .................................................................................................... 2-1
2.1 Setting Up Configuration Environment Through the Console Port.................................... 2-1
2.2 Setting Up Configuration Environment Through Telnet..................................................... 2-3
2.2.1 Connecting a PC to the Switch Through Telnet...................................................... 2-3
2.2.2 Telneting a Switch Through Another Switch........................................................... 2-4
2.3 Setting Up Configuration Environment Through a Dial-up the Modem.............................2-5
Chapter 3 Command Line Interface............................................................................................. 3-1
3.1 Command Line Interface ...................................................................................................3-1
3.2 Command Line View.......................................................................................................... 3-1
3.3 Features and Functions of Command Line ....................................................................... 3-7
3.3.1 Online Help of Command Line................................................................................ 3-7
3.3.2 Displaying Characteristics of Command Line.........................................................3-9
3.3.3 History Command of Command Line......................................................................3-9
3.3.4 Common Command Line Error Messages............................................................3-10
3.3.5 Editing Characteristics of Command Line............................................................. 3-10
Chapter 4 User Interface Configuration......................................................................................4-1
4.1 User Interface Overview....................................................................................................4-1
4.2 User Interface Configuration..............................................................................................4-2
4.2.1 Entering User Interface View .................................................................................. 4-2
4.2.2 Define the Login Header.........................................................................................4-2
4.2.3 Configuring Asynchronous Port Attributes..............................................................4-3
4.2.4 Configuring Terminal Attributes...............................................................................4-4
4.2.5 Managing Users......................................................................................................4-6
4.2.6 Configuring Modem Attributes...............................................................................4-10
4.2.7 Configuring Redirection......................................................................................... 4-10
4.3 Displaying and Debugging User Interface.......................................................................4-11
Chapter 5 Management Interface Configuration........................................................................ 5-1
5.1 Management Interface Overview....................................................................................... 5-1
5.2 Management Interface Configuration................................................................................ 5-1
Chapter 6 Ethernet Port Configuration ....................................................................................... 6-1
6.1 Ethernet Port Overview......................................................................................................6-1
6.2 Ethernet Port Configuration...............................................................................................6-1
6.2.1 Entering Ethernet Port View....................................................................................6-2
6.2.2 Enabling/Disabling an Ethernet Port.......................................................................6-2
6.2.3 Setting Ethernet Port Description............................................................................ 6-2
TOC-1
3Com Switch 8800 Configuration Guide Table of Contents
6.2.4 Setting the Duplex Attribute of the Ethernet Port.................................................... 6-2
6.2.5 Setting Speed on the Ethernet Port ........................................................................ 6-2
6.2.6 Setting the Cable Type for the Ethernet Port.......................................................... 6-3
6.2.7 Enabling/Disabling Flow Control for the Ethernet Port............................................6-3
6.2.8 Permitting/Forbidding Jumbo Frame to Pass the Ethernet Port............................. 6-3
6.2.9 Setting the Ethernet Port Broadcast Suppression Ratio......................................... 6-4
6.2.10 Setting the Ethernet Port Mode............................................................................. 6-4
6.2.11 Setting the Link Type for the Ethernet Port...........................................................6-4
6.2.12 Adding the Ethernet Port to Specified VLANs.......................................................6-5
6.2.13 Setting the Default VLAN ID for the Ethernet Port................................................ 6-5
6.2.14 Setting the VLAN VPN Feature............................................................................. 6-6
6.2.15 Copying Port Configuration to Other Ports ........................................................... 6-6
6.2.16 Setting Port Hold Time..........................................................................................6-7
6.2.17 Setting the Ethernet Port in Loopback Mode........................................................6-7
6.3 Displaying and Debugging Ethernet Port ..........................................................................6-8
6.4 Ethernet Port Configuration Example................................................................................6-8
6.5 Ethernet Port Troubleshooting........................................................................................... 6-9
Chapter 7 Link Aggregation Configuration ................................................................................ 7-1
7.1 Overview............................................................................................................................7-1
7.1.1 Introduction to Link Aggregation ............................................................................. 7-1
7.1.2 Introduction to LACP...............................................................................................7-1
7.1.3 Aggregation Types..................................................................................................7-1
7.1.4 Load Sharing........................................................................................................... 7-2
7.2 Link Aggregation Configuration ......................................................................................... 7-3
7.2.1 Enabling/Disabling LACP at Port ............................................................................ 7-4
7.2.2 Creating/Deleting an Aggregation Group................................................................ 7-4
7.2.3 Adding/Deleting an Ethernet Port into/from an Aggregation Group........................ 7-4
7.2.4 Setting/Deleting Aggregation Group Description....................................................7-5
7.2.5 Configuring System Priority..................................................................................... 7-5
7.2.6 Configuring Port Priority..........................................................................................7-6
7.3 Displaying and Debugging Link Aggregation..................................................................... 7-6
7.4 Link Aggregation Configuration Example..........................................................................7-7
Chapter 8 VLAN Configuration ....................................................................................................8-1
8.1 VLAN Overview..................................................................................................................8-1
8.2 Configuring VLAN..............................................................................................................8-2
8.2.1 Creating/Deleting a VLAN.......................................................................................8-2
8.2.2 Specifying a Description Character String for a VLAN or VLAN interface.............. 8-2
8.2.3 Creating/Removing a VLAN Interface..................................................................... 8-3
8.2.4 Shutting down/Bringing up a VLAN Interface.......................................................... 8-3
8.3 Configuring Port-Based VLAN........................................................................................... 8-4
8.3.1 Adding Ethernet Ports to a VLAN............................................................................8-4
8.4 Configuring Protocol-Based VLAN .................................................................................... 8-4
TOC-2
3Com Switch 8800 Configuration Guide Table of Contents
8.4.1 Creating/Deleting a VLAN Protocol Type................................................................ 8-4
8.4.2 Associating/Dissociating a Port with/from a Protocol-Based VLAN........................8-5
8.5 Displaying VLAN................................................................................................................ 8-5
8.6 VLAN Configuration Example............................................................................................ 8-6
Chapter 9 GARP/GVRP Configuration......................................................................................... 9-1
9.1 Configuring GARP.............................................................................................................9-1
9.1.1 GARP Overview......................................................................................................9-1
9.1.2 Setting the GARP Timer.......................................................................................... 9-2
9.1.3 Displaying and Debugging GARP........................................................................... 9-3
9.2 Configuring GVRP.............................................................................................................9-3
9.2.1 GVRP Overview......................................................................................................9-3
9.2.2 Enabling/Disabling Global GVRP............................................................................ 9-4
9.2.3 Enabling/Disabling Port GVRP................................................................................9-5
9.2.4 Setting the GVRP Registration Type ...................................................................... 9-5
9.2.5 Displaying and Debugging GVRP........................................................................... 9-6
9.2.6 GVRP Configuration Example.................................................................................9-6
Chapter 10 Super VLAN Configuration.....................................................................................10-1
10.1 Super VLAN Overview................................................................................................... 10-1
10.2 Configuring a Super VLAN ............................................................................................ 10-1
10.2.1 Configuring a Super VLAN..................................................................................10-1
10.2.2 Super VLAN Configuration Example................................................................... 10-3
Chapter 11 IP Address Configuration ....................................................................................... 11-2
11.1 Introduction to IP Address ............................................................................................. 11-2
11.1.1 IP Address Classification and Representation.................................................... 11-2
11.1.2 Subnet and Mask ................................................................................................ 11-5
11.2 Configuring IP Address.................................................................................................. 11-6
11.2.1 Configuring the Hostname and Host IP Address................................................11-6
11.2.2 Configuring the IP Address of the VLAN Interface..............................................11-7
11.3 Displaying and debugging IP Address........................................................................... 11-7
11.4 IP Address Configuration Example................................................................................ 11-7
11.5 Troubleshooting IP Address Configuration.................................................................... 11-8
Chapter 12 ARP Configuration................................................................................................... 12-1
12.1 Introduction to ARP........................................................................................................ 12-1
12.2 Configuring ARP............................................................................................................12-2
12.2.1 Manually Adding/Deleting Static ARP Mapping Entries...................................... 12-2
12.2.2 Configuring the Dynamic ARP Aging Timer........................................................ 12-3
12.2.3 Enabling/Disabling the Checking Function of ARP Entry ................................... 12-3
12.3 Displaying and Debugging ARP.................................................................................... 12-3
12.4 Enabling/Disabling the Scheme of Preventing Attack from Packets.............................12-4
12.4.1 Introduction to the Scheme of Preventing Attack from Packets.......................... 12-4
TOC-3
3Com Switch 8800 Configuration Guide Table of Contents
Chapter 13 DHCP Configuration................................................................................................ 13-1
13.1 Introduction to DHCP.....................................................................................................13-1
13.1.1 How DHCP Works............................................................................................... 13-1
13.2 Configuring General DHCP ........................................................................................... 13-3
13.2.1 Enabling/Disabling DHCP Service......................................................................13-4
13.2.2 Configuring Processing Method of DHCP Packets.............................................13-4
13.2.3 Enabling/Disabling Fake DHCP Server Detection..............................................13-5
13.3 Configuring DHCP Server.............................................................................................. 13-6
13.3.1 Creating a Global DHCP IP Address Pool..........................................................13-6
13.3.2 Configuring IP Address Assignment Mode.........................................................13-7
13.3.3 Forbidding Specified IP Addresses to Be Automatically Assigned..................... 13-9
13.3.4 Configuring Lease Time For DHCP Address Pool............................................13-10
13.3.5 Configuring DHCP Client Domain Names ........................................................13-11
13.3.6 Configuring DNS Server Address for DHCP Clients......................................... 13-12
13.3.7 Configuring NetBIOS Server Address for DHCP Clients..................................13-13
13.3.8 Configuring NetBIOS Node Type for DHCP Clients......................................... 13-15
13.3.9 Configuring Custom DHCP Options.................................................................. 13-16
13.3.10 Configuring Outbound Gateway Address for DHCP Clients........................... 13-17
13.3.11 Configuring Parameters for DHCP Server to Send Ping Packets .................. 13-17
13.3.12 Displaying and Debugging the DHCP Server.................................................13-18
13.3.13 Clearing the Configuration Information of the DHCP Server..........................13-19
13.3.14 DHCP Server Configuration Example............................................................. 13-19
13.4 Configuring DHCP Relay.............................................................................................13-21
13.4.1 Introduction to DHCP Relay.............................................................................. 13-21
13.4.2 Configuring DHCP Relay .................................................................................. 13-22
13.4.3 Displaying and Debugging DHCP Relay...........................................................13-23
13.4.4 DHCP Relay Configuration Example................................................................13-24
Chapter 14 DNS Configuration................................................................................................... 14-1
14.1 Introduction to DNS .......................................................................................................14-1
14.1.1 Static Domain Name Resolution.........................................................................14-1
14.1.2 Dynamic Domain Name Resolution....................................................................14-1
14.2 Configuring Static Domain Name Resolution................................................................ 14-2
14.3 Configuring Dynamic Domain Name Resolution........................................................... 14-2
14.3.1 Enable/Disable Static Domain Name Resolution................................................ 14-2
14.3.2 Configure the IP Address of Domain Name Server............................................14-3
14.3.3 Configure Domain Name Suffix...........................................................................14-3
14.4 Displaying and Debugging Domain Name Resolution...................................................14-4
14.5 DNS Configuration Example..........................................................................................14-4
14.6 Troubleshooting Domain Name Resolution Configuration............................................ 14-5
Chapter 15 IP Performance Configuration................................................................................ 15-1
15.1 Configuring IP Performance .......................................................................................... 15-1
15.1.1 Configuring TCP Attributes ................................................................................. 15-1
TOC-4
3Com Switch 8800 Configuration Guide Table of Contents
15.2 Displaying and Debugging IP Performance...................................................................15-2
15.3 Troubleshooting IP Performance................................................................................... 15-3
Chapter 16 IP Routing Protocol Overview................................................................................16-5
16.1 Introduction to IP Route and Routing Table .................................................................. 16-5
16.1.1 IP Route and Route Segment.............................................................................16-5
16.1.2 Route Selection through the Routing Table........................................................ 16-6
16.2 Routing Management Policy..........................................................................................16-8
16.2.1 Routing Protocols and the Preferences of the Corresponding Routes............... 16-8
16.2.2 Supporting Load Sharing and Route Backup......................................................16-9
16.2.3 Routes Shared Between Routing Protocols...................................................... 16-10
Chapter 17 Static Route Configuration.....................................................................................17-1
17.1 Introduction to Static Route ........................................................................................... 17-1
17.1.1 Static Route......................................................................................................... 17-1
17.1.2 Default Route ...................................................................................................... 17-1
17.2 Configuring Static Route................................................................................................ 17-2
17.2.1 Configuring a Static Route..................................................................................17-2
17.2.2 Configuring a Default Route................................................................................17-3
17.2.3 Deleting All the Static Routes..............................................................................17-3
17.3 Displaying and Debugging Static Route........................................................................ 17-4
17.4 Typical Static Route Configuration Example.................................................................17-4
17.5 Troubleshooting Static Route Faults .............................................................................17-5
Chapter 18 RIP Configuration....................................................................................................18-1
18.1 Introduction to RIP.........................................................................................................18-1
18.1.1 RIP Operation Mechanism.................................................................................. 18-1
18.1.2 RIP Enabling and Running..................................................................................18-2
18.2 Configuring RIP..............................................................................................................18-2
18.2.1 Enabling RIP and Entering RIP View.................................................................. 18-3
18.2.2 Enabling RIP on the Specified Network Segment...............................................18-3
18.2.3 Configuring Unicast of the Packets..................................................................... 18-4
18.2.4 Configuring Split Horizon ....................................................................................18-4
18.2.5 Setting Additional Routing Metric........................................................................ 18-5
18.2.6 Configuring RIP to Import Routes of Other Protocols......................................... 18-5
18.2.7 Configuring Route Filtering ................................................................................. 18-6
18.2.8 Disabling RIP to Receive Host Route ................................................................. 18-7
18.2.9 Enabling RIP-2 Route Aggregation Function...................................................... 18-8
18.2.10 Setting the RIP Preference ............................................................................... 18-8
18.2.11 Specifying RIP Version of the Interface............................................................ 18-8
18.2.12 Configuring RIP Timers..................................................................................... 18-9
18.2.13 Configuring RIP-1 Zero Field Check of the Interface Packet.......................... 18-10
18.2.14 Specifying the Operating State of the Interface..............................................18-10
18.2.15 Setting RIP-2 Packet Authentication...............................................................18-11
18.3 Displaying and Debugging RIP.................................................................................... 18-12
TOC-5
3Com Switch 8800 Configuration Guide Table of Contents
18.4 Typical RIP Configuration Example............................................................................. 18-12
18.5 Troubleshooting RIP Faults.........................................................................................18-14
Chapter 19 OSPF Configuration ................................................................................................ 19-1
19.1 OSPF Overview.............................................................................................................19-1
19.1.1 Introduction to OSPF........................................................................................... 19-1
19.1.2 Process of OSPF Route Calculation................................................................... 19-1
19.1.3 OSPF Packets..................................................................................................... 19-2
19.1.4 LSA Type............................................................................................................. 19-3
19.1.5 Basic Concepts Related to OSPF....................................................................... 19-3
19.1.6 OSPF Features Supported by the Switch 8800.................................................. 19-5
19.2 Configuring OSPF.......................................................................................................... 19-6
19.2.1 Configuring Router ID .........................................................................................19-7
19.2.2 Enabling OSPF....................................................................................................19-7
19.2.3 Entering OSPF Area View................................................................................... 19-8
19.2.4 Specifying an Interface to Run OSPF.................................................................19-8
19.2.5 Configuring OSPF to Import Routes of Other Protocols.....................................19-9
19.2.6 Configuring OSPF to Import Default Routes.....................................................19-11
19.2.7 Configuring OSPF Route Filtering.....................................................................19-12
19.2.8 Configuring the Route Summary of OSPF........................................................ 19-13
19.2.9 Setting OSPF Route Preference....................................................................... 19-15
19.2.10 Configuring OSPF Timers............................................................................... 19-15
19.2.11 Configuring the Network Type on the OSPF Interface....................................19-17
19.2.12 Configuring NBMA Neighbors for OSPF......................................................... 19-18
19.2.13 Setting the Interface Priority for DR Election .................................................. 19-18
19.2.14 Configuring an Interval Required for Sending LSU Packets...........................19-20
19.2.15 Configuring the Cost for Sending Packets on an Interface.............................19-20
19.2.16 Configuring to Fill the MTU Field When an Interface Transmits DD Packets.19-20
19.2.17 Setting a Shortest Path First (SPF) Calculation Interval for OSPF.................19-21
19.2.18 Disabling the Interface to Send OSPF Packets..............................................19-21
19.2.19 Configuring OSPF Authentication...................................................................19-22
19.2.20 Configuring OSPF Virtual Link........................................................................19-23
19.2.21 Configuring Stub Area of OSPF...................................................................... 19-24
19.2.22 Configuring NSSA Area of OSPF ...................................................................19-24
19.2.23 Configuring OSPF and Network Management System (NMS)....................... 19-26
19.2.24 Resetting the OSPF Process..........................................................................19-27
19.3 Displaying and Debugging OSPF................................................................................ 19-27
19.4 Typical OSPF Configuration Example.........................................................................19-29
19.4.1 Configuring DR Election Based on OSPF Priority ............................................ 19-29
19.4.2 Configuring OSPF Virtual Link..........................................................................19-31
19.5 Troubleshooting OSPF Faults ..................................................................................... 19-32
Chapter 20 Integrated IS-IS Configuration................................................................................ 20-1
20.1 Introduction to Integrated IS-IS...................................................................................... 20-1
TOC-6
3Com Switch 8800 Configuration Guide Table of Contents
20.1.1 Terms of IS-IS Routing Protocol ......................................................................... 20-1
20.1.2 Two-level Structure of IS-IS Routing Protocol .................................................... 20-2
20.1.3 NSAP Structure of IS-IS Routing Protocol..........................................................20-4
20.1.4 IS-IS Routing Protocol Packets...........................................................................20-5
20.2 Configuring Integrated IS-IS..........................................................................................20-6
20.2.1 Enabling IS-IS and Entering the IS-IS View........................................................ 20-7
20.2.2 Setting Network Entity Title.................................................................................20-7
20.2.3 Enabling IS-IS on the Specified Interface...........................................................20-7
20.2.4 Setting Priority for DIS Election........................................................................... 20-8
20.2.5 Setting Router Type............................................................................................ 20-8
20.2.6 Setting Interface Circuit Level.............................................................................20-9
20.2.7 Configuring IS-IS to Import Routes of Other Protocols....................................... 20-9
20.2.8 Configuring IS-IS Route Filtering ...................................................................... 20-10
20.2.9 Configuring IS-IS Routing Leak.........................................................................20-11
20.2.10 Setting IS-IS Route Summary......................................................................... 20-11
20.2.11 Setting to Generate Default Route.................................................................. 20-12
20.2.12 Setting the Preference of IS-IS Protocol.........................................................20-12
20.2.13 Configuring IS-IS Route Metric Type .............................................................. 20-13
20.2.14 Setting IS-IS Link State Routing Cost.............................................................20-13
20.2.15 Configuring IS-IS Timers.................................................................................20-13
20.2.16 Setting IS-IS Authentication............................................................................20-16
20.2.17 Setting the Mesh Group of the Interface.........................................................20-17
20.2.18 Setting Overload Flag Bit................................................................................20-18
20.2.19 Setting to Discard the LSPs with Checksum Errors........................................20-18
20.2.20 Setting to Log the Peer Changes.................................................................... 20-19
20.2.21 Setting LSP Refreshment Interval................................................................... 20-19
20.2.22 Setting Lifetime of LSP.................................................................................... 20-19
20.2.23 Setting Parameters Related to SPF................................................................ 20-20
20.2.24 Enabling/Disabling the Interface to Send Packets.......................................... 20-21
20.2.25 Resetting All the IS-IS Data Structure............................................................. 20-22
20.2.26 Resetting the Specified IS-IS Peer .................................................................20-22
20.3 Displaying and Debugging Integrated IS-IS ................................................................ 20-22
20.4 Typical Integrated IS-IS Configuration Example..........................................................20-23
Chapter 21 BGP Configuration .................................................................................................. 21-1
21.1 BGP/MBGP Overview.................................................................................................... 21-1
21.1.1 Introduction to BGP............................................................................................. 21-1
21.1.2 BGP Message Types.......................................................................................... 21-2
21.1.3 BGP Routing Mechanism....................................................................................21-2
21.1.4 MBGP..................................................................................................................21-3
21.1.5 BGP Peer and Peer Group ................................................................................. 21-4
21.2 Configuring BGP............................................................................................................ 21-4
21.2.1 Enabling BGP...................................................................................................... 21-5
TOC-7
3Com Switch 8800 Configuration Guide Table of Contents
21.2.2 Configuring Basic Features for BGP Peer.......................................................... 21-5
21.2.3 Configuring application features of a BGP peer (group)..................................... 21-8
21.2.4 Configuring Route Filtering of a Peer (group)................................................... 21-12
21.2.5 Configuring Network Routes for BGP Distribution............................................21-14
21.2.6 Configuring the Interaction Between BGP and IGP.......................................... 21-14
21.2.7 Configuring BGP Route Summarization ...........................................................21-15
21.2.8 Configuring BGP Route Filtering....................................................................... 21-16
21.2.9 Configuring BGP Route Dampening.................................................................21-17
21.2.10 Configuring BGP Preference...........................................................................21-18
21.2.11 Configuring BGP Timer...................................................................................21-19
21.2.12 Configuring the Local Preference ................................................................... 21-19
21.2.13 Configuring MED for AS..................................................................................21-20
21.2.14 Comparing the MED Routing Metrics from the Peers in Different ASs...........21-20
21.2.15 Configuring BGP Route Reflector...................................................................21-21
21.2.16 Configuring BGP AS Confederation Attribute.................................................21-22
21.2.17 Clearing BGP Connection............................................................................... 21-24
21.2.18 Refreshing BGP Routes..................................................................................21-24
21.3 Displaying and Debugging BGP..................................................................................21-24
21.4 Typical BGP Configuration Example ........................................................................... 21-26
21.4.1 Configuring BGP AS Confederation Attribute...................................................21-26
21.4.2 Configuring BGP Route Reflector.....................................................................21-28
21.4.3 Configuring BGP Routing..................................................................................21-30
21.5 Troubleshooting BGP .................................................................................................. 21-33
Chapter 22 IP Routing Policy Configuration ............................................................................22-1
22.1 Introduction to IP Routing Policy....................................................................................22-1
22.1.1 Filter ....................................................................................................................22-1
22.1.2 Routing Policy Application................................................................................... 22-2
22.2 Configuring IP Routing Policy........................................................................................ 22-2
22.2.1 Configuring a Route-policy..................................................................................22-3
22.2.2 Configuring ip-prefix............................................................................................22-6
22.2.3 Configuring the AS Path List............................................................................... 22-7
22.2.4 Configuring a Community Attribute List ..............................................................22-8
22.2.5 Importing Routing Information Discovered by Other Routing Protocols.............22-8
22.2.6 Configuring Route Filtering ................................................................................. 22-9
22.3 Displaying and Debugging the Routing Policy.............................................................22-10
22.4 Typical IP Routing Policy Configuration Example ....................................................... 22-11
22.4.1 Configuring to Filter the Received Routing Information....................................22-11
22.5 Troubleshooting Routing Policy................................................................................... 22-12
Chapter 23 IP Multicast Overview.............................................................................................. 23-4
23.1 IP Multicast Overview.................................................................................................... 23-4
23.1.1 Problems with Unicast/Broadcast ....................................................................... 23-4
23.1.2 Advantages of Multicast......................................................................................23-6
TOC-8
3Com Switch 8800 Configuration Guide Table of Contents
23.1.3 Application of Multicast .......................................................................................23-7
23.2 Implementation of IP Multicast....................................................................................... 23-7
23.2.1 IP Multicast Addresses........................................................................................ 23-7
23.2.2 IP Multicast Protocols.......................................................................................... 23-9
23.3 RPF Mechanism for IP Multicast Packets ...................................................................23-10
Chapter 24 IGMP Snooping Configuration ............................................................................... 24-1
24.1 IGMP Snooping Overview ............................................................................................. 24-1
24.1.1 IGMP Snooping Principle.................................................................................... 24-1
24.1.2 Implement IGMP Snooping................................................................................. 24-2
24.2 IGMP Snooping Configuration....................................................................................... 24-4
24.2.1 Enabling/Disabling IGMP Snooping....................................................................24-4
24.2.2 Configuring Router Port Aging Time...................................................................24-5
24.2.3 Configuring Maximum Response Time............................................................... 24-5
24.2.4 Configuring Aging Time of Multicast Group Member Ports ................................24-6
24.2.5 Configuring Unknown Multicast Packets not Broadcasted within a VLAN ......... 24-6
24.3 Displaying and debugging IGMP Snooping................................................................... 24-7
24.4 IGMP Snooping Configuration Example........................................................................24-7
24.4.1 Enable IGMP Snooping....................................................................................... 24-7
24.5 Troubleshoot IGMP Snooping ....................................................................................... 24-8
Chapter 25 Multicast VLAN Configuration................................................................................ 25-1
25.1 Multicast VLAN Overview..............................................................................................25-1
25.2 Multicast VLAN Configuration........................................................................................25-1
25.3 Multicast VLAN Configuration Example......................................................................... 25-2
Chapter 26 Common Multicast Configuration..........................................................................26-1
26.1 Introduction to Common Multicast Configuration...........................................................26-1
26.2 Common Multicast Configuration...................................................................................26-1
26.2.1 Enabling Multicast...............................................................................................26-1
26.2.2 Configuring multicast route number limit............................................................. 26-2
26.2.3 Clearing MFC Forwarding Entries or Its Statistic Information............................. 26-2
26.2.4 Clearing Route Entries from the Kernel Multicast Routing Table ....................... 26-2
26.3 Controlled Multicast Configuration................................................................................. 26-3
26.3.1 Controlled Multicast Overview............................................................................. 26-3
26.3.2 Configuring Controlled Multicast.........................................................................26-3
26.3.3 Controlled Multicast Configuration Example.......................................................26-4
26.4 Displaying and Debugging Common Multicast Configuration.......................................26-5
Chapter 27 IGMP Configuration................................................................................................. 27-1
27.1 IGMP Overview.............................................................................................................. 27-1
27.1.1 Introduction to IGMP........................................................................................... 27-1
27.2 IGMP Configuration....................................................................................................... 27-2
27.2.1 Enabling Multicast...............................................................................................27-3
27.2.2 Enabling IGMP on an Interface........................................................................... 27-3
TOC-9
3Com Switch 8800 Configuration Guide Table of Contents
27.2.3 Configuring the IGMP Version ............................................................................ 27-3
27.2.4 Configuring the Interval to Send IGMP Query Message..................................... 27-4
27.2.5 Configuring the Interval and the Number of Querying IGMP Packets................27-4
27.2.6 Configuring the Present Time of IGMP Querier.................................................. 27-5
27.2.7 Configuring Maximum Response Time for IGMP Query Message..................... 27-5
27.2.8 Configuring the limit of IGMP groups on an interface.........................................27-6
27.2.9 Configuring a Router to Join Specified Multicast Group.....................................27-6
27.2.10 Limiting Multicast Groups that an Interface Can Access .................................. 27-7
27.2.11 Deleting IGMP Groups Joined on an Interface.................................................27-8
27.3 Displaying and Debugging IGMP...................................................................................27-9
Chapter 28 PIM-DM Configuration............................................................................................. 28-1
28.1 PIM-DM Overview.......................................................................................................... 28-1
28.1.1 Introduction to PIM-DM.......................................................................................28-1
28.1.2 PIM-DM Working Principle..................................................................................28-1
28.2 PIM-DM Configuration................................................................................................... 28-3
28.2.1 Enabling Multicast...............................................................................................28-3
28.2.2 Enabling PIM-DM................................................................................................28-3
28.2.3 Configuring the Time Intervals for Ports to Send Hello Packets......................... 28-4
28.2.4 Entering the PIM View......................................................................................... 28-4
28.2.5 Configuring the Filtering of Multicast Source/Group...........................................28-5
28.2.6 Configuring the Filtering of PIM Neighbor........................................................... 28-5
28.2.7 Configuring the Maximum Number of PIM Neighbor on an Interface................. 28-5
28.2.8 Clearing multicast route entries from PIM routing table...................................... 28-6
28.2.9 Clearing PIM Neighbors...................................................................................... 28-6
28.3 Displaying and Debugging PIM-DM...............................................................................28-6
28.4 PIM-DM Configuration Example....................................................................................28-7
Chapter 29 PIM-SM Configuration.............................................................................................29-1
29.1 PIM-SM Overview.......................................................................................................... 29-1
29.1.1 Introduction to PIM-SM ....................................................................................... 29-1
29.1.2 PIM-SM Working Principle.................................................................................. 29-1
29.1.3 Preparations before Configuring PIM-SM...........................................................29-2
29.2 PIM-SM Configuration ...................................................................................................29-3
29.2.1 Enabling Multicast...............................................................................................29-4
29.2.2 Enabling PIM-SM................................................................................................ 29-4
29.2.3 Entering the PIM View......................................................................................... 29-4
29.2.4 Configuring the Time Intervals for Ports to Send Hello Packets......................... 29-4
29.2.5 Configuring Candidate-BSRs.............................................................................. 29-4
29.2.6 Configuring Candidate-RPs ................................................................................ 29-5
29.2.7 Configuring Static RP.......................................................................................... 29-6
29.2.8 Configuring the PIM-SM Domain Border ............................................................29-6
29.2.9 Configuring the filtering of multicast source/group..............................................29-7
29.2.10 Configuring the filtering of PIM neighbor........................................................... 29-7
TOC-10
3Com Switch 8800 Configuration Guide Table of Contents
29.2.11 Configuring RP to Filter the Register Messages Sent by DR ........................... 29-7
29.2.12 Limiting the range of legal BSR.........................................................................29-7
29.2.13 Limiting the range of legal C-RP.......................................................................29-8
29.2.14 Clearing multicast route entries from PIM routing table.................................... 29-8
29.2.15 Clearing PIM Neighbors.................................................................................... 29-8
29.3 Displaying and Debugging PIM-SM............................................................................... 29-8
29.4 PIM-SM Configuration Example .................................................................................... 29-9
Chapter 30 MSDP Configuration................................................................................................ 30-1
30.1 MSDP Overview.............................................................................................................30-1
30.1.1 Introduction..........................................................................................................30-1
30.1.2 Working Principle ................................................................................................ 30-2
30.2 MSDP Configuration......................................................................................................30-4
30.2.1 Enabling MSDP................................................................................................... 30-4
30.2.2 Configuring MSDP Peers....................................................................................30-5
30.2.3 Configuring Static RPF Peers.............................................................................30-5
30.2.4 Configuring Originating RP ................................................................................. 30-6
30.2.5 Configuring SA Caching State ............................................................................ 30-6
30.2.6 Configuring the Maximum Number of SA caching.............................................. 30-7
30.2.7 Requesting Source Information of MSDP Peers.................................................30-7
30.2.8 Controlling the Source Information Created........................................................ 30-7
30.2.9 Controlling the Source Information Forwarded...................................................30-8
30.2.10 Controlling the Received Source Information ................................................... 30-9
30.2.11 Configuring MSDP Mesh Group......................................................................30-10
30.2.12 Configuring the MSDP Connection Retry Period............................................ 30-10
30.2.13 Shutting MSDP Peers Down........................................................................... 30-11
30.2.14 Clearing MSDP Connections, Statistics and SA Caching Configuration........30-11
30.3 Displaying and Debugging MSDP...............................................................................30-12
30.4 MSDP Configuration Examples...................................................................................30-13
30.4.1 Configuring Static RPF Peers...........................................................................30-13
30.4.2 Configuring Anycast RP....................................................................................30-14
30.4.3 MSDP Integrated Networking............................................................................30-18
Chapter 31 MBGP Multicast Extension Configuration ............................................................ 31-1
31.1 MBGP Multicast Extension Overview............................................................................31-1
31.1.1 Introduction..........................................................................................................31-1
31.1.2 MBGP Extension Attributes for Multicast............................................................31-1
31.1.3 MBGP Operating Mode and Message Type....................................................... 31-2
31.2 MBGP Multicast Extension Configuration...................................................................... 31-3
31.2.1 Enabling MBGP Multicast Extension Protocol....................................................31-3
31.2.2 Specifying Network Routes Notified by MBGP Multicast Extension...................31-4
31.2.3 Configuring the MED Value for an AS ................................................................31-4
31.2.4 Comparing MED Values from Different AS Neighbor Paths............................... 31-4
31.2.5 Configuring Local Preference.............................................................................. 31-5
TOC-11
3Com Switch 8800 Configuration Guide Table of Contents
31.2.6 Configuring MBGP Timer.................................................................................... 31-5
31.2.7 Configuring MBGP Peer (Group)........................................................................31-5
31.2.8 Configuring MBGP Route Aggregation...............................................................31-9
31.2.9 Configuring an MBGP Route Reflector...............................................................31-9
31.2.10 Configure MBGP Community Attributes .........................................................31-10
31.2.11 Importing IGP Routing Information into MBGP............................................... 31-10
31.2.12 Defining AS Path List and Routing Policy....................................................... 31-10
31.2.13 Configuring MBGP Route Filtering.................................................................. 31-11
31.2.14 Resetting BGP Connections ........................................................................... 31-11
31.3 Displaying and Debugging MBGP Configuration.........................................................31-11
31.4 MBGP Multicast Extension Configuration Example.....................................................31-12
Chapter 35 MPLS Architecture................................................................................................... 35-2
35.1 MPLS Overview.............................................................................................................35-2
35.2 MPLS Basic Concepts...................................................................................................35-3
35.2.1 FEC.....................................................................................................................35-3
35.2.2 Label....................................................................................................................35-3
35.2.3 LDP ..................................................................................................................... 35-6
35.3 MPLS Architecture......................................................................................................... 35-6
35.3.1 MPLS Network Structure..................................................................................... 35-6
35.3.2 Forwarding Labeled Packets...............................................................................35-7
35.3.3 Establishing LSP.................................................................................................35-7
35.3.4 LSP Tunnel and Hierarchy.................................................................................. 35-9
35.4 MPLS and other Protocols........................................................................................... 35-10
35.4.1 MPLS and Routing Protocols............................................................................ 35-10
35.5 MPLS Application ........................................................................................................35-10
35.5.1 MPLS VPN........................................................................................................35-10
Chapter 36 MPLS Basic Capability Configuration................................................................... 36-1
36.1 MPLS Basic Capability Overview .................................................................................. 36-1
36.2 MPLS Configuration....................................................................................................... 36-1
36.2.1 Defining MPLS LSR ID........................................................................................ 36-1
36.2.2 Enabling MPLS and Entering MPLS View..........................................................36-2
36.2.3 Configuring the Topology-Driven LSP Setup Policy ........................................... 36-2
36.2.4 Configuring Static LSP........................................................................................36-2
36.3 LDP Configuration .........................................................................................................36-3
36.3.1 Enabling LDP protocol ........................................................................................ 36-3
36.3.2 Enabling LDP on VLAN interface........................................................................ 36-4
36.3.3 Configuring Remote-Peer for Extended Discovery Mode...................................36-4
36.3.4 Configuring session parameters ......................................................................... 36-5
36.3.5 Configuring LDP Loop Detection Control............................................................36-7
36.3.6 Configuring LDP Authentication Mode Between Every Two Routers................. 36-8
36.4 Displaying and Debugging MPLS.................................................................................. 36-8
36.4.1 Displaying and Debugging MPLS....................................................................... 36-8
TOC-12
3Com Switch 8800 Configuration Guide Table of Contents
36.4.2 Displaying and Debugging LDP........................................................................36-10
36.5 Typical MPLS Configuration Example.........................................................................36-11
36.6 Troubleshooting MPLS Configuration.......................................................................... 36-15
Chapter 37 BGP/MPLS VPN Configuration............................................................................... 37-1
37.1 BGP/MPLS VPN Overview............................................................................................37-1
37.1.1 BGP/MPLS VPN Model....................................................................................... 37-2
37.1.2 BGP/MPLS VPN Implementation........................................................................ 37-5
37.1.3 Nested BGP/MPLS VPN Implementation...........................................................37-7
37.1.4 Hierarchical BGP/MPLS VPN Implementation.................................................... 37-7
37.1.5 Introduction to OSPF Multi-instance ................................................................... 37-8
37.1.6 Introduction to Multi-Role Host............................................................................ 37-9
37.2 BGP/MPLS VPN Configuration....................................................................................37-10
37.2.1 Configuring CE Router......................................................................................37-10
37.2.2 Configuring PE Router......................................................................................37-12
37.2.3 Configuring P Router......................................................................................... 37-25
37.3 Displaying and Debugging BGP/MPLS VPN............................................................... 37-25
37.4 Typical BGP/MPLS VPN Configuration Example........................................................ 37-27
37.4.1 Integrated BGP/MPLS VPN Configuration Example.........................................37-27
37.4.2 Hybrid BGP/MPLS VPN Configuration Example .............................................. 37-33
37.4.3 Extranet Configuration Example ....................................................................... 37-40
37.4.4 Hub&Spoke Configuration Example..................................................................37-44
37.4.5 CE Dual-home Configuration Example.............................................................37-50
37.4.6 Cross-domain BGP/MPLS VPN Configuration Example .................................. 37-56
37.4.7 Cross-Domain BGP/MPLS VPN Configuration Example — Option C..............37-61
37.4.8 Hierarchical BGP/MPLS VPN Configuration Example......................................37-68
37.4.9 OSPF Multi-instance sham link Configuration Example ................................... 37-72
37.4.10 Nested BGP/MPLS VPN Configuration Example ........................................... 37-77
37.4.11 OSPF Multi-instance CE Configuration Example............................................37-83
37.4.12 Multi-Role Host Configuration Example.......................................................... 37-85
37.5 Troubleshooting...........................................................................................................37-90
Chapter 38 MSTP Region-configuration ................................................................................... 38-1
38.1 Introduction to MSTP.....................................................................................................38-1
38.1.1 MSTP Concepts..................................................................................................38-2
38.1.2 MSTP Principles.................................................................................................. 38-7
38.1.3 MSTP Implementation on the Switch................................................................ 38-12
38.2 Configuring MSTP .......................................................................................................38-12
38.2.1 Configuring the MST Region for a Switch......................................................... 38-13
38.2.2 Specifying the Switch as a Primary or a Secondary Root bridge .....................38-15
38.2.3 Configuring the MSTP Running Mode..............................................................38-16
38.2.4 Configuring the Bridge Priority for a Switch......................................................38-17
38.2.5 Configuring the Max Hops in an MST Region................................................... 38-18
38.2.6 Configuring the Switching Network Diameter ................................................... 38-18
TOC-13
3Com Switch 8800 Configuration Guide Table of Contents
38.2.7 Configuring the Time Parameters of a Switch ..................................................38-19
38.2.8 Setting the Timeout Factor of a Specific Bridge................................................38-21
38.2.9 Configuring the Max Transmission Speed on a Port ........................................ 38-21
38.2.10 Configuring a Port as an Edge Port or Non-edge Port ...................................38-22
38.2.11 Configuring the Path Cost of a Port ................................................................ 38-23
38.2.12 STP Path Cost Calculation Standards on STP port........................................ 38-24
38.2.13 Configuring the Priority of a Port..................................................................... 38-26
38.2.14 Configuring the Port (Not) to Connect with the Point-to-Point Link.................38-27
38.2.15 Configuring the mCheck Variable of a Port..................................................... 38-28
38.2.16 Configuring the Switch Protection Function....................................................38-30
38.2.17 Enabling/Disabling MSTP on the Device........................................................ 38-32
38.2.18 Enable/Disable Address Table Reset on Specified Port................................. 38-33
38.2.19 Enabling/Disabling ARP Address Update.......................................................38-33
38.2.20 Enabling/Disabling MSTP on a Port................................................................ 38-34
38.3 Displaying and Debugging MSTP................................................................................ 38-34
38.4 Typical MSTP Configuration Example......................................................................... 38-35
Chapter 39 802.1x Configuration...............................................................................................39-2
39.1 802.1x Overview............................................................................................................39-2
39.1.1 802.1x Standard Overview.................................................................................. 39-2
39.1.2 802.1x System Architecture................................................................................39-3
39.1.3 802.1x Authentication Process............................................................................39-4
39.1.4 Implementing 802.1x on Ethernet Switches........................................................ 39-4
39.2 802.1x Configuration......................................................................................................39-5
39.2.1 Enabling/Disabling 802.1x...................................................................................39-5
39.2.2 Setting the Port Access Control Mode................................................................39-6
39.2.3 Setting Port Access Control Method...................................................................39-7
39.2.4 Checking the Users that Log on the Switch via Proxy........................................39-7
39.2.5 Setting Supplicant Number on a Port.................................................................. 39-8
39.2.6 Setting the Authentication in DHCP Environment............................................... 39-8
39.2.7 Configuring Authentication Method for 802.1x User...........................................39-8
39.2.8 Enabling/Disabling Guest VLAN ......................................................................... 39-9
39.2.9 Setting the Maximum times of authentication request message retransmission39-10
39.2.10 Configuring 802.1x Timers.............................................................................. 39-10
39.2.11 Enabling/Disabling quiet-period Timer............................................................39-11
39.3 Displaying and Debugging 802.1x...............................................................................39-12
39.4 802.1x Configuration Example.....................................................................................39-12
Chapter 40 AAA and RADIUS/TACACS+ Protocol Configuration .......................................... 40-1
40.1 AAA and RADIUS/TACACS+ Protocol Overview..........................................................40-1
40.1.1 AAA Overview.....................................................................................................40-1
40.1.2 RADIUS Protocol Overview ................................................................................ 40-1
40.1.3 TACACS+ Protocol Overview.............................................................................40-2
40.1.4 Implementing AAA/RADIUS on a Switch............................................................40-5
TOC-14
3Com Switch 8800 Configuration Guide Table of Contents
40.2 AAA Configuration ......................................................................................................... 40-6
40.2.1 Creating/Deleting an ISP Domain.......................................................................40-6
40.2.2 Configuring Relevant Attributes of an ISP Domain............................................. 40-7
40.2.3 Configuring Self-Service Server URL ................................................................. 40-8
40.2.4 Creating/Deleting a Local User...........................................................................40-9
40.2.5 Setting the Attributes of a Local User ...............................................................40-10
40.2.6 Disconnecting a User by Force......................................................................... 40-11
40.2.7 Configuring Dynamic VLAN Delivering ............................................................. 40-11
40.3 Configuring RADIUS Protocol......................................................................................40-12
40.3.1 Creating/Deleting a RADIUS scheme...............................................................40-13
40.3.2 Setting IP Address and Port Number of a RADIUS Server .............................. 40-13
40.3.3 Setting the RADIUS Packet Encryption Key.....................................................40-15
40.3.4 Setting the Response Timeout Timer of a RADIUS Server..............................40-16
40.3.5 Setting the Retransmission Times of RADIUS Request Packets.....................40-16
40.3.6 Enabling the Selection Of Radius Accounting Option....................................... 40-17
40.3.7 Setting a Real-time Accounting Interval............................................................40-17
40.3.8 Setting the Maximum Times of Real-time Accounting Request Failing to be
Responded...................................................................................................................40-18
40.3.9 Enabling/Disabling Stopping Accounting Request Buffer................................. 40-19
40.3.10 Setting the Maximum Retransmitting Times of Stopping Accounting Request40-19
40.3.11 Setting the Supported Type of RADIUS Server.............................................. 40-20
40.3.12 Setting RADIUS Server State ......................................................................... 40-20
40.3.13 Setting the Username Format Transmitted to RADIUS Server ...................... 40-21
40.3.14 Setting the Unit of Data Flow that Transmitted to RADIUS Server.................40-21
40.3.15 Creating/Deleting a Local RADIUS authentication Server..............................40-22
40.4 Configuring TACACS+ Protocol ..................................................................................40-22
40.4.1 Creating a HWTACAS Scheme ........................................................................ 40-23
40.4.2 Configuring TACACS+ Authentication Servers................................................. 40-23
40.4.3 Configuring TACACS+ Authorization Servers .................................................. 40-24
40.4.4 Configuring TACACS+ Accounting Servers and the Related Attributes...........40-25
40.4.5 Configuring the Source Address for TACACS+ Packets Sent by NAS ............40-26
40.4.6 Setting a Key for Securing the Communication with TACACS Server ............. 40-26
40.4.7 Setting the Username Format Acceptable to the TACACS Server...................40-26
40.4.8 Setting the Unit of Data Flows Destined for the TACACS Server..................... 40-27
40.4.9 Setting Timers Regarding TACACS Server...................................................... 40-27
40.5 Displaying and Debugging AAA and RADIUS Protocol .............................................. 40-29
40.6 AAA and RADIUS/TACACS+ Protocol Configuration Examples.................................40-30
40.6.1 Configuring Authentication at Remote RADIUS Server.................................... 40-30
40.6.2 Configuring Authentication at Local RADIUS Authentication Server................ 40-32
40.6.3 Configuring Authentication at Remote TACACS Server................................... 40-32
40.7 Troubleshooting AAA and RADIUS/TACACS+...........................................................40-34
TOC-15
3Com Switch 8800 Configuration Guide Table of Contents
Chapter 41 VRRP Configuration................................................................................................41-1
41.1 Introduction to VRRP.....................................................................................................41-1
41.2 Configuring VRRP .........................................................................................................41-3
41.2.1 Enabling/Disabling the Function to Ping the Virtual IP Address.........................41-3
41.2.2 Enabling/Disabling the Check of TTL Value of VRRP Packet............................41-4
41.2.3 Setting Correspondence Between Virtual IP Address and MAC Address.......... 41-4
41.2.4 Adding/Deleting a Virtual IP Address.................................................................. 41-5
41.2.5 Configuring the Priority of Switches in the Virtual Router...................................41-5
41.2.6 Configuring Preemption and Delay for a Switch Within a Virtual Router............ 41-6
41.2.7 Configuring Authentication Type and Authentication Key................................... 41-7
41.2.8 Configuring Virtual Router Timer.........................................................................41-8
41.2.9 Configuring Switch to Track a Specified Interface.............................................. 41-8
41.3 Displaying and debugging VRRP.................................................................................. 41-9
41.4 VRRP Configuration Example ..................................................................................... 41-10
41.4.1 VRRP Single Virtual Router Example...............................................................41-10
41.4.2 VRRP Tracking Interface Example ................................................................... 41-11
41.4.3 Multiple Virtual Routers Example...................................................................... 41-13
41.5 Troubleshooting VRRP................................................................................................41-14
Chapter 42 HA Configuration..................................................................................................... 42-1
42.1 Introduction to HA..........................................................................................................42-1
42.2 Configuring HA...............................................................................................................42-1
42.2.1 Restarting the Slave System Manually............................................................... 42-2
42.2.2 Starting the Master-Slave Switchover Manually ................................................. 42-2
42.2.3 Enabling/Disabling Automatic Synchronization...................................................42-2
42.2.4 Synchronizing the Configuration File Manually................................................... 42-3
42.2.5 Configuring the Load Mode of the Fabric and Slave Board................................42-3
42.3 Displaying and Debugging HA Configuration................................................................42-4
Chapter 43 File System Management........................................................................................ 43-4
43.1 File System Configuration.............................................................................................. 43-4
43.1.1 File System Overview .........................................................................................43-4
43.1.2 Directory Operation.............................................................................................43-5
43.1.3 File Operation...................................................................................................... 43-5
43.1.4 Storage Device Operation...................................................................................43-6
43.1.5 Setting the Prompt Mode of the File System ...................................................... 43-7
43.2 Configuration File Management.....................................................................................43-7
43.2.1 Configuration File Management Overview.......................................................... 43-7
43.2.2 Displaying the Current-Configuration and Saved-Configuration of Ethernet Switch43-8
43.2.3 Modifying and Saving the Current-Configuration................................................ 43-9
43.2.4 Erasing Configuration Files from Flash Memory.................................................43-9
43.2.5 Configuring the Name of the Configuration File Used for the Next Startup........ 43-9
43.3 FTP Configuration........................................................................................................ 43-10
43.3.1 FTP Overview....................................................................................................43-10
TOC-16
3Com Switch 8800 Configuration Guide Table of Contents
43.3.2 Enabling/Disabling FTP Server......................................................................... 43-12
43.3.3 Configuring the FTP Server Authentication and Authorization.........................43-12
43.3.4 Configuring the Running Parameters of FTP Server........................................43-13
43.3.5 Displaying and Debugging FTP Server............................................................. 43-13
43.3.6 Disconnecting an FTP User..............................................................................43-13
43.3.7 Introduction to FTP Client ................................................................................. 43-14
43.3.8 FTP Client Configuration Example.................................................................... 43-14
43.3.9 FTP Server Configuration Example .................................................................. 43-15
43.4 TFTP Configuration .....................................................................................................43-17
43.4.1 TFTP Overview ................................................................................................. 43-17
43.4.2 Downloading Files by Means of TFTP..............................................................43-18
43.4.3 Uploading Files by Means of TFTP................................................................... 43-18
43.4.4 TFTP Client Configuration Example .................................................................43-19
Chapter 44 MAC Address Table Management.......................................................................... 44-1
44.1 MAC Address Table Management Overview ................................................................ 44-1
44.2 MAC Address Table Management Configuration.......................................................... 44-2
44.2.1 Setting MAC Address Table Entries ................................................................... 44-2
44.2.2 Setting MAC Address Aging Time.......................................................................44-2
44.3 Maximum MAC Address Number Learned by Ethernet Port and Forwarding Option
Configuration..........................................................................................................................44-3
44.3.1 Maximum MAC Address Number Learned by a Port and Forwarding Option
Configuration Tasks ....................................................................................................... 44-4
44.3.2 Configuring Maximum MAC Address Number Learned by Ethernet Port and
Forwarding Option Example........................................................................................... 44-5
44.4 Displaying and Debugging MAC Address Tables..........................................................44-5
44.5 Resetting MAC Addresses............................................................................................. 44-6
44.6 MAC Address Table Management Configuration Example........................................... 44-6
Chapter 45 Device management................................................................................................ 45-1
45.1 Device Management Overview......................................................................................45-1
45.2 Device Management Configuration ............................................................................... 45-1
45.2.1 Rebooting the Ethernet Switch............................................................................45-1
45.2.2 Enabling the Timing Reboot Function................................................................. 45-1
45.2.3 Designating the APP Adopted on Next Booting.................................................. 45-2
45.2.4 Upgrading BootROM........................................................................................... 45-3
45.2.5 Setting Slot Temperature Limit............................................................................45-3
45.2.6 Updating Service Processing Boards..................................................................45-3
45.3 Displaying and Debugging Device Management...........................................................45-4
45.4 Device Management Configuration Example................................................................45-5
45.4.1 Using the Switch as an FTP Client to Implement the Remote Upgrade............. 45-5
45.4.2 Use the Switch as an FTP Server to Implement the Remote Upgrade .............. 45-7
Chapter 46 System Maintenance and Debugging.................................................................... 46-1
46.1 Basic System Configuration........................................................................................... 46-1
TOC-17
3Com Switch 8800 Configuration Guide Table of Contents
46.1.1 Setting a Name for a Switch................................................................................46-1
46.1.2 Setting the System Clock....................................................................................46-1
46.1.3 Setting the Time Zone......................................................................................... 46-1
46.1.4 Setting the Summer Time ................................................................................... 46-2
46.2 Displaying the State and Information of the System......................................................46-2
46.3 System Debugging ........................................................................................................46-3
46.3.1 Enabling/Disabling the Terminal Debugging....................................................... 46-3
46.3.2 Displaying Diagnostic Information....................................................................... 46-4
46.4 Testing Tools for Network Connection ..........................................................................46-5
46.4.1 ping......................................................................................................................46-5
46.4.2 ping-distribute enable.......................................................................................... 46-5
46.4.3 tracert..................................................................................................................46-6
46.5 Logging Function...........................................................................................................46-6
46.5.1 Introduction to Info-center...................................................................................46-6
46.5.2 Info-center Configuration................................................................................... 46-10
46.5.3 Sending the Configuration Information to the Loghost ..................................... 46-14
46.5.4 Sending the Configuration Information to Console terminal.............................46-16
46.5.5 Sending the Configuration Information to Telnet Terminal or Dumb Terminal.46-19
46.5.6 Sending the Configuration Information to the Log Buffer.................................. 46-21
46.5.7 Sending the Configuration Information to the Trap Buffer................................46-23
46.5.8 Sending the Configuration Information to SNMP Network Management..........46-25
46.5.9 Displaying and Debugging Info-center..............................................................46-27
46.5.10 Configuration Examples of Sending Log to the Unix Loghost ........................ 46-28
46.5.11 Configuration examples of sending log to Linux loghost ................................ 46-30
46.5.12 Configuration Examples of Sending Log to the Console Terminal.................46-32
Chapter 47 SNMP Configuration................................................................................................ 47-1
47.1 SNMP Overview.............................................................................................................47-1
47.2 SNMP Versions and Supported MIB............................................................................. 47-1
47.3 Configuring SNMP.........................................................................................................47-3
47.3.1 Setting Community Names ................................................................................. 47-3
47.3.2 Setting the System Information........................................................................... 47-4
47.3.3 Enabling/Disabling SNMP Agent to Send Trap...................................................47-4
47.3.4 Setting the Destination Address of Trap.............................................................47-5
47.3.5 Setting Lifetime of Trap Message ....................................................................... 47-5
47.3.6 Setting the Engine ID of a Local or Remote Device............................................47-6
47.3.7 Setting/Deleting an SNMP Group ....................................................................... 47-6
47.3.8 Setting the Source Address of Trap.................................................................... 47-7
47.3.9 Adding/Deleting a User to/from an SNMP Group ............................................... 47-7
47.3.10 Creating/Updating View Information or Deleting a View...................................47-8
47.3.11 Setting the Size of the SNMP Packet Sent/Received by an Agent...................47-8
47.3.12 Disabling SNMP Agent...................................................................................... 47-8
47.4 Displaying and Debugging SNMP................................................................................. 47-9
TOC-18
3Com Switch 8800 Configuration Guide Table of Contents
47.5 SNMP Configuration Example....................................................................................... 47-9
Chapter 48 RMON Configuration...............................................................................................48-1
48.1 RMON Overview............................................................................................................ 48-1
48.2 Configuring RMON ........................................................................................................48-1
48.2.1 Adding/Deleting an Entry to/from the Event Table.............................................. 48-2
48.2.2 Adding/Deleting an Entry to/from the Alarm Table..............................................48-2
48.2.3 Adding/Deleting an Entry to/from the Extended RMON Alarm Table.................48-3
48.2.4 Adding/Deleting an Entry to/from the History Control Table...............................48-4
48.2.5 Adding/Deleting an Entry to/from the Statistics Table......................................... 48-5
48.3 Displaying and Debugging RMON................................................................................. 48-5
48.4 RMON Configuration Example ...................................................................................... 48-6
Chapter 49 NTP Configuration...................................................................................................49-1
49.1 Brief Introduction to NTP ...............................................................................................49-1
49.1.1 NTP Functions.....................................................................................................49-1
49.1.2 Basic Operating Principle of NTP........................................................................49-1
49.2 NTP Configuration......................................................................................................... 49-2
49.2.1 Configuring NTP Operating Mode....................................................................... 49-2
49.2.2 Configuring NTP ID Authentication.....................................................................49-6
49.2.3 Setting NTP Authentication Key.......................................................................... 49-6
49.2.4 Setting Specified Key as Reliable.......................................................................49-7
49.2.5 Designating an Interface to Transmit NTP Messages ........................................ 49-7
49.2.6 Setting NTP Master Clock................................................................................... 49-8
49.2.7 Setting Authority to Access a Local Ethernet Switch..........................................49-8
49.2.8 Setting Maximum Local Sessions.......................................................................49-9
49.3 Displaying and Debugging NTP.....................................................................................49-9
49.4 NTP Configuration Example........................................................................................49-10
49.4.1 Configuring a NTP Server................................................................................. 49-10
49.4.2 NTP Peer Configuration Example..................................................................... 49-11
49.4.3 Configure NTP Broadcast Mode.......................................................................49-13
49.4.4 Configure NTP Multicast Mode.........................................................................49-14
49.4.5 Configure Authentication-Enabled NTP Server Mode ...................................... 49-16
Chapter 50 SSH Terminal Service.............................................................................................. 50-1
50.1 SSH Terminal Service ...................................................................................................50-1
50.1.1 SSH Overview..................................................................................................... 50-1
50.1.2 SSH Server Configuration...................................................................................50-3
50.1.3 SSH Client Configuration..................................................................................50-12
50.1.4 Displaying and Debugging SSH........................................................................ 50-13
50.1.5 SSH Server Configuration Example.................................................................. 50-13
50.1.6 SSH Client Configuration Example...................................................................50-16
50.2 SFTP Service............................................................................................................... 50-17
50.2.1 SFTP Overview.................................................................................................50-17
50.2.2 SFTP Server Configuration............................................................................... 50-17
TOC-19
3Com Switch 8800 Configuration Guide Table of Contents
50.2.3 SFTP Client Configuration ................................................................................ 50-18
50.2.4 SFTP Configuration Example............................................................................50-22
Chapter 51 PoE Configuration...................................................................................................51-1
51.1 PoE Overview................................................................................................................51-1
51.1.1 PoE on the Switch............................................................................................... 51-1
51.1.2 External PSE4500-A Power System...................................................................51-2
51.2 PoE Configuration.......................................................................................................... 51-2
51.2.1 PoE Configuration Tasks ....................................................................................51-3
51.3 Comprehensive Configuration Example........................................................................51-5
Chapter 52 PoE PSU Supervision Configuration..................................................................... 52-1
52.1 Introduction to PoE PSU Supervision............................................................................ 52-1
52.2 AC Input Alarm Thresholds Configuration.....................................................................52-1
52.2.1 AC Input Alarm Thresholds Configuration Tasks................................................52-1
52.2.2 AC Input Alarm Thresholds Configuration Example ........................................... 52-2
52.3 DC Output Alarm Thresholds Configuration..................................................................52-2
52.3.1 DC Output Alarm Thresholds Configuration Tasks............................................. 52-3
52.3.2 DC Output Alarm Thresholds Configuration Example ........................................ 52-3
52.4 Displaying PoE Supervision Information .......................................................................52-4
52.5 PoE PSU Supervision Configuration Example..............................................................52-4
TOC-20
3Com Switch 8800 Configuration Guide Chapter 1 Product Overview
Chapter 1 Product Overview
1.1 Product Overview
The Switch 8800 is a large-capacity , modularized L2/L3 switch. It is mainly designed for
broadband MAN, backbone, switching core and convergence center of large-sized
enterprise network and campus network. It provides diverse services and can be used
in constructing a stable and high-performance IP network.
The Switch 8800 supports the following services:
z Internet broadband access
z MAN, enterprise/campus networking
z Providing multicast service and multicast routing and supporting multicast audio
and video services.
1.2 Function Features
Table 1-1 Function features
Features Implementation
Supports VLAN compliant with IEEE 802.1Q Standard
VLAN
STP protocol
Flow control
Broadcast
Suppression
Multicast
Supports port-based and MAC-based VLAN
Supports GARP VLAN Registration Protocol (GVRP)
Supports Spanning Tree Protocol (STP) / Multiple Spanning Tree
Protocol (MSTP), compliant with IEEE 802.1D/IEEE 802.1s
Standard
Supports IEEE 802.3x flow control (full-duplex)
Supports back-pressure based flow control (half-duplex)
Supports Broadcast Suppression
Supports Internet Group Management Protocol Snooping (IGMP
Snooping)
Supports Internet Group Management Protocol (IGMP)
Supports Protocol-Independent Multicast-Dense Mode (PIM-DM )
Supports Protocol-Independent Multicast-Sparse Mode
(PIM-SM)
Supports Multicast Source Discovery Protocol (MSDP)
Supports Multiprotocol BGP (MBGP)
1-1
3Com Switch 8800 Configuration Guide Chapter 1 Product Overview
Features Implementation
Supports static routing
Supports Routing Information Protocol (RIP) v1/v2
Supports Open Shortest Path First (OSPF)
IP routing
Supports Border Gateway Protocol (BGP)
Supports Intermediate System-to-Intermediate System
intra-domain routing information exchange protocol (IS-IS)
Supports IP routing policy
DHCP Relay Supports Dynamic Host Configuration Protocol (DHCP) Relay
Link
aggregation
Mirror
Supports link aggregation, including two kinds of link a ggregation
LACPs (link aggregation control protocols): static aggregation
and dynamic aggregation.
Supports the port-based mirror
Supports flow mirroring of copying messages to CPU
Supports traffic classification
Supports bandwidth control
Quality of
Service (QoS)
Supports congestion control
Supports traffic shaping and traffic supervision
Supports queues of different priority on the port
Queue scheduling: supports Strict Priority Queuing (SP),
Weighted Round Robin (WRR), and SP+WRR
Supports Multi-level user management and password protect
Security
features
Supports 802.1X authentication
Supports Packet filtering
MPLS
Supports Multiprotocol Label Switching (MPLS) basic function
Supports MPLS L3 VPN
Supports Command Line Interface configuration
Supports local configuration via Console port and AUX port
Supports Local and remote configuration through Telnet on
Ethernet port
Supports Remote configuration through dialing with modem via
Management
and
Maintenance
the AUX port.
Supports SNMP management (Supports Quidview NMS and
RMON MIB Group 1, 2, 3 and 9)
Supports system log
Supports level alarms
Supports output of the debugging information
Supports PING and Tracert
Supports the remote maintenance via Telnet and Modem
Loading and
updating
Supports to load and upgrade software via XModem protocol
Supports to load and upgrade software via File Transfer Protocol
(FTP) and Trivial File Transfer Protocol (TFTP)
1-2
3Com Switch 8800 Configuration Guide Chapter 2 Logging into Switch
Chapter 2 Logging into Switch
2.1 Setting Up Configuration Environment Through the
Console Port
Step 1: As shown in the figure below, to set up the local configuration environment,
connect the serial port of a PC (or a terminal) to the Console port of the switch with the
Console cable.
RS-232 Serial port
Console port
Console cable
Figure 2-1 Set up the local configuration environment through the Console port
Step 2: Run termin al emulator (such as Terminal on Windows 3X or the Hyper Terminal
on Windows 9X) on the Computer. Set the terminal communication parameters as
follows: Set the baud rate to 9600, databit to 8, parity check to none, stopbit to 1, flow
control to none and select the terminal type as VT100.
Figure 2-2 Set up new connection
2-1
3Com Switch 8800 Configuration Guide Chapter 2 Logging into Switch
Figure 2-3 Configure the port for connection
Figure 2-4 Set communication parameters
Step 3: The switch i s powered on. Display self-test information of the switch and prompt
you to press Enter to show the command line prompt such as <SW8800>.
Step 4: Input a command to config ure the switch or view the operation st ate. Input a “?”
for an immediate help. For details of specific commands, refer to the following chapters.
2-2