Accton Technology ES4626 User Manual

ES4624-SFP/ES4626-SFP L3 Gigabit Ethernet Switch
1
www.edge-core.com
Preface
ES4624-SFP/ES4626-SFP L3 Gigabit Ethernet Switch is a high performance routing
enterprise and campus networks.ES4624-SFP/ES4626-SFP L3 Gigabit Ethernet Switch
support a variety of network interfaces from 100Mb, 1000Mb to 10 GB Ethernet.
We are providing this manual for your better understanding, use and maintenance of
the ES4624-SFP/ES4626-SFP L3 Gigabit Ethernet Switch. We strongly recommend you
to read through this manual carefully before installation and configuration to avoid
possible malfunction or damage to the switch. Furthermore, we sincerely hope our
products and services satisfy you.
2
Content
CHAPTER 1 SWITCH MANAGEMENT.......................................................................... 17
1.1 MANAGEMENT OPTIONS........................................................................................... 17
1.1.1 Out-Of-Band Management.............................................................................. 17
1.1.2 In-band Management...................................................................................... 20
1.1.3 Management Via Telnet .................................................................................. 20
1.1.4 Management Via HTTP................................................................................... 23
1.2 MANAGEMENT INTERFACE ........................................................................................ 25
1.2.1 CLI Interface ................................................................................................... 25
1.2.2 Configuration Modes....................................................................................... 26
1.2.3 Configuration Syntax....................................................................................... 29
1.2.4 Shortcut Key Support...................................................................................... 30
1.2.5 Help Function.................................................................................................. 30
1.2.6 Input Verification ............................................................................................. 31
1.2.7 Fuzzy Match Support ...................................................................................... 31
1.3 WEB MANAGEMENT ................................................................................................. 32
1.3.1 Main Page....................................................................................................... 32
1.3.2 Module Front Panel......................................................................................... 32
CHAPTER 2 BASIC SWITCH CONFIGURATION.......................................................... 34
2.1 COMMANDS FOR BASIC SWITCH CONFIGURATION ...................................................... 34
2.1.1 Commands for Basic Configuration ................................................................ 34
2.2 MONITOR AND DEBUG COMMAND.............................................................................. 48
2.2.1 Ping................................................................................................................. 48
2.2.2 Ping6............................................................................................................... 48
2.2.3 Telnet .............................................................................................................. 49
2.2.4 SSH ................................................................................................................ 51
2.2.5 Traceroute....................................................................................................... 55
2.2.6 Traceroute6..................................................................................................... 55
2.2.7 Show............................................................................................................... 56
2.2.8 Debug ............................................................................................................. 62
2.2.9 System log ...................................................................................................... 62
2.3 CONFIGURATE SWITCH IP ADDRESSES...................................................................... 67
2.3.1 Switch IP Addresses Configuration Task List .................................................. 67
2.3.2 Commands For Configuring Switch IP ............................................................ 68
2.4 SNMP CONFIGURATION ........................................................................................... 69
2.4.1 Introduction To SNMP ..................................................................................... 69
3
2.4.2 SNMP Configuration Task List......................................................................... 72
2.4.3 Commands for SNMP ..................................................................................... 74
2.4.4 Typical SNMP Configuration Examples........................................................... 84
2.4.5 SNMP Troubleshooting ................................................................................... 85
2.5 SWITCH UPGRADE ................................................................................................... 86
2.5.1 Switch System Files........................................................................................ 86
2.5.2 BootROM Upgrade ......................................................................................... 86
2.5.3 FTP/TFTP Upgrade......................................................................................... 89
2.5.4 FTP/TFTP Configuration Examples ................................................................ 97
2.5.5 FTP/TFTP Troubleshooting........................................................................... 101
2.6 SECURITY FEATURE CONFIGURATION...................................................................... 103
2.6.1 Security Feature Introduction ........................................................................ 103
2.6.2 Security Feature Configuration ..................................................................... 103
2.6.3 Commands for Security Feature ................................................................... 105
2.6.4 Security Feature Example............................................................................. 108
2.7 JUMBO CONFIGURATION......................................................................................... 109
2.7.1 Jumbo Introduction ....................................................................................... 109
2.7.2 Jumbo Configuration Task Sequence............................................................ 109
2.7.3 Jumbo Command.......................................................................................... 109
2.8 SFLOW CONFIGURATION......................................................................................... 109
2.8.1 sFlow introduction ......................................................................................... 109
2.8.2 sFlow Configuration Task ...............................................................................11 0
2.8.3 Commands for sFlow ..................................................................................... 111
2.8.4 sFlow Examples.............................................................................................116
2.8.5 sFlow Troubleshooting...................................................................................116
2.9 TACACS+ CONFIGURATION ....................................................................................117
2.9.1 TACACS+ Introduction ...................................................................................117
2.9.2 TACACS+ Configurations...............................................................................117
2.9.3 Commands for TACACS+ ..............................................................................118
2.9.4 Typical TACACS+ Scenarios......................................................................... 120
2.9.5 TACACS+ Troubleshooting ........................................................................... 120
2.10 WEB MANAGEMENT ............................................................................................. 121
2.10.1 Switch Basic Configuration ......................................................................... 121
2.10.2 SNMP Configuration ................................................................................... 121
2.10.3 Switch upgrade ........................................................................................... 124
2.10.4 Monitor And Debug Command.................................................................... 127
2.10.5 Switch Maintenance.................................................................................... 128
2.10.6 Telnet server configuration .......................................................................... 129
4
2.10.7 Telnet server user configuration .................................................................. 129
2.10.8 Telnet security IP......................................................................................... 129
CHAPTER 3 PORT CONFIGURATION........................................................................131
3.1 INTRODUCTION TO PORT ........................................................................................ 131
3.2 PORT CONFIGURATION........................................................................................... 131
3.2.1 Network Port Configuration........................................................................... 131
3.2.2 VLAN Interface Configuration ....................................................................... 140
3.2.3 Network Management Port Configuration ..................................................... 142
3.3 PORT MIRRORING CONFIGURATION......................................................................... 145
3.3.1 Introduction to Port Mirroring......................................................................... 145
3.3.2 Port Mirroring Configuration Task List ........................................................... 146
3.3.3 Commands for Mirroring Configuration ......................................................... 146
3.3.4 Device Mirroring Troubleshooting ................................................................. 147
3.4 PORT CONFIGURATION EXAMPLE............................................................................ 148
3.5 PORT TROUBLESHOOTING...................................................................................... 148
3.6 WEB MANAGEMENT ............................................................................................... 149
3.6.1 Ethernet port configuration............................................................................ 149
3.6.2 Physical port configuration............................................................................ 149
3.6.3 Bandwidth control ......................................................................................... 150
3.6.4 Vlan interface configuration........................................................................... 150
3.6.5 Allocate IP address for L3 port ...................................................................... 151
3.6.6 L3 port IP addr mode configuration............................................................... 151
3.6.7 Port mirroring configuration........................................................................... 151
3.6.8 Mirror configuration ....................................................................................... 151
3.6.9 Port debug and maintenance ........................................................................ 152
3.6.10 Show port information ................................................................................. 152
CHAPTER 4 PORT CHANNEL CONFIGURATION ..................................................... 153
4.1 INTRODUCTION TO PORT CHANNEL ......................................................................... 153
4.2 PORT CHANNEL CONFIGURATION TASK LIST ............................................................ 154
4.3 COMMANDS FOR PORT CHANNEL............................................................................. 155
4.3.1 debug lacp .................................................................................................... 155
4.3.2 port-group ..................................................................................................... 155
4.3.3 port-group mode ........................................................................................... 156
4.3.4 interface port-channel ................................................................................... 157
4.3.5 show port-group ............................................................................................ 157
4.4 PORT CHANNEL EXAMPLE ...................................................................................... 161
4.5 PORT CHANNEL TROUBLESHOOTING....................................................................... 164
5
4.6 WEB MANAGEMENT ............................................................................................... 164
4.6.1 LACP port group configuration...................................................................... 164
4.6.2 LACP port configuration................................................................................ 165
CHAPTER 5 VLAN CONFIGURATION........................................................................ 166
5.1 VLAN CONFIGURATION.......................................................................................... 166
5.1.1 Introduction to VLAN..................................................................................... 166
5.1.2 VLAN Configuration Task List ....................................................................... 167
5.1.3 Commands For Vlan Configuration............................................................... 169
5.1.4 Typical VLAN Application .............................................................................. 174
5.2 GVRP CONFIGURATION ......................................................................................... 176
5.2.1 Introduction to GVRP .................................................................................... 176
5.2.2 GVRP Configuration Task List....................................................................... 176
5.2.3 Commands for GVRP ................................................................................... 177
5.2.4 Typical GVRP Application ............................................................................. 180
5.2.5 GVRP Troubleshooting ................................................................................. 182
5.3 DOT1Q-TUNNEL CONFIGURATION............................................................................ 183
5.3.1 Dot1q-tunnel Introduction.............................................................................. 183
5.3.2 Dot1q-tunnel Configuration ........................................................................... 184
5.3.3 Commands for Dot1q-Tunnel Configuration.................................................. 184
5.3.4 Typical Applications Of The Dot1q-tunnel ..................................................... 186
5.3.5 Dot1q-tunnel Troubleshooting ....................................................................... 187
5.4 VLAN-TRANSLATION CONFIGURATION..................................................................... 187
5.4.1 VLAN-translation Introduction ....................................................................... 187
5.4.2 VLAN-translation Configuration..................................................................... 188
5.4.3 Commands for VLAN-Translation Configuration ........................................... 188
5.4.4 Typical application of VLAN-translation......................................................... 190
5.4.5 VLAN-translation Troubleshooting ................................................................ 191
5.5 DYNAMIC VLAN CONFIGURATION ........................................................................... 191
5.5.1 Dynamic VLAN Introduction .......................................................................... 191
5.5.2 Dynamic VLAN Configuration ....................................................................... 192
5.5.3 Typical Application Of The Dynamic VLAN ................................................... 199
5.5.4 Dynamic VLAN Troubleshooting ................................................................... 200
5.6 VOICE VLAN CONFIGURATION................................................................................ 200
5.6.1 Voice VLAN Introduction ............................................................................... 200
5.6.2 Voice VLAN Configuration............................................................................. 201
5.6.3 Typical Applications Of The Voice VLAN....................................................... 204
5.6.4 Voice VLAN Troubleshooting ........................................................................ 205
6
CHAPTER 6 MAC TABLE CONFIGURATION.............................................................206
6.1 INTRODUCTION TO MAC TABLE............................................................................... 206
6.1.1 Obtaining MAC Table .................................................................................... 206
6.1.2 Forward or Filter............................................................................................ 208
6.2 COMMANDS FOR MAC ADDRESS TABLE CONFIGURATION .......................................... 209
6.2.1 mac-address-table ........................................................................................ 209
6.2.2 show mac-address-table............................................................................... 210
6.3 TYPICAL CONFIGURATION EXAMPLES ...................................................................... 210
6.4 TROUBLESHOOTING ................................................................................................211
6.5 MAC ADDRESS FUNCTION EXTENSION ....................................................................211
6.5.1 MAC Address Binding....................................................................................211
CHAPTER 7 MSTP CONFIGURATION........................................................................ 219
7.1 MSTP INTRODUCTION............................................................................................ 219
7.1.1 MSTP Region................................................................................................ 219
7.1.2 Port Roles ..................................................................................................... 221
7.1.3 MSTP Load Balance ..................................................................................... 221
7.2 MSTP CONFIGURATION TASK LIST.......................................................................... 221
7.3 COMMANDS FOR MSTP ......................................................................................... 225
7.3.1 abort.............................................................................................................. 225
7.3.2 exit ................................................................................................................ 225
7.3.3 instance vlan ................................................................................................. 226
7.3.4 name............................................................................................................. 226
7.3.5 revision-level ................................................................................................. 227
7.3.6 spanning-tree ................................................................................................ 227
7.3.7 spanning-tree format..................................................................................... 228
7.3.8 spanning-tree forward-time ........................................................................... 228
7.3.9 spanning-tree hello-time................................................................................ 229
7.3.10 spanning-tree link-type p2p......................................................................... 229
7.3.11 spanning-tree maxage................................................................................. 230
7.3.12 spanning-tree max-hop ............................................................................... 230
7.3.13 spanning-tree mcheck................................................................................. 231
7.3.14 spanning-tree mode .................................................................................... 231
7.3.15 spanning-tree mst configuration.................................................................. 231
7.3.16 spanning-tree mst cost................................................................................ 232
7.3.17 spanning-tree mst port-priority .................................................................... 233
7.3.18 spanning-tree mst priority............................................................................ 233
7.3.19 spanning-tree portfast ................................................................................. 234
7
7.3.20 spanning-tree digest-snooping.................................................................... 234
7.3.21 spanning-tree tcflush (global mode)............................................................ 235
7.3.22 spanning-tree tcflush (port mode) ............................................................... 235
7.4 MSTP EXAMPLE.................................................................................................... 236
7.5 MSTP TROUBLESHOOTING .................................................................................... 241
7.5.1 Commands for Monitor And Debug ............................................................... 241
7.6 WEB MANAGEMENT ............................................................................................... 245
7.6.1 MSTP field operation..................................................................................... 245
7.6.2 MSTP port operation..................................................................................... 246
7.6.3 MSTP global control...................................................................................... 247
7.6.4 Show MSTP setting....................................................................................... 249
CHAPTER 8 QOS AND PBR CONFIGURATION.........................................................250
8.1 QOS CONFIGURATION............................................................................................ 250
8.1.1 Introduction to QoS ....................................................................................... 250
8.1.2 QoS Configuration Task List.......................................................................... 255
8.1.3 Commands for QoS ...................................................................................... 259
8.1.4 QoS Example................................................................................................ 268
8.1.5 QoS Troubleshooting .................................................................................... 271
8.2 PBR CONFIGURATION............................................................................................ 276
8.2.1 Introduction to PBR....................................................................................... 276
8.2.2 PBR configuration ......................................................................................... 276
8.2.3 PBR examples .............................................................................................. 277
CHAPTER 9 L3 FORWARD CONFIGURATION..........................................................278
9.1 LAYE R 3 INTERFACE............................................................................................... 278
9.1.1 Introduction to Layer 3 Interface ................................................................... 278
9.1.2 Layer 3 Interface Configuration Task List ...................................................... 278
9.1.3 Commands for Layer 3 Interface................................................................... 279
9.2 IP CONFIGURATION................................................................................................ 279
9.2.1 Introduction to IPv4, IPv6.............................................................................. 279
9.2.2 IP Configuration ............................................................................................ 281
9.2.3 IP Configuration Examples............................................................................ 296
9.2.4 IP Troubleshooting ........................................................................................ 300
9.3 IP FORWARDING .....................................................................................................311
9.3.1 Introduction to IP Forwarding.........................................................................311
9.3.2 IP Route Aggregation Configuration Task ......................................................311
9.3.3 Commands for IP Route Aggregation.............................................................311
9.4 URPF................................................................................................................... 312
8
9.4.1 URPF Introduction ........................................................................................ 312
9.4.2 URPF Operation Mechanism ........................................................................ 312
9.4.3 URPF Configuration Task Sequence............................................................. 312
9.4.4 Commands For URPF .................................................................................. 313
9.4.5 URPF Troubleshooting.................................................................................. 314
9.5 ARP ..................................................................................................................... 315
9.5.1 Introduction to ARP....................................................................................... 315
9.5.2 ARP Configuration Task List.......................................................................... 315
9.5.3 Commands for ARP Configuration ................................................................ 316
CHAPTER 10 DHCP CONFIGURATION...................................................................... 319
10.1 INTRODUCTION TO DHCP..................................................................................... 319
10.2 DHCP SERVER CONFIGURATION .......................................................................... 320
10.2.1 DHCP Sever Configuration Task List .......................................................... 320
10.2.2 Commands for DHCP Server Configuration................................................ 322
10.3 DHCP RELAY CONFIGURATION............................................................................. 330
10.3.1 DHCP Relay Configuration Task List........................................................... 331
10.3.2 Commands for DHCP Relay Configuration ................................................. 332
10.4 DHCP CONFIGURATION EXAMPLE ........................................................................ 334
10.5 DHCP TROUBLESHOOTING .................................................................................. 337
10.5.1 Commands for Monitor and Debug ............................................................. 337
10.6 WEB MANAGEMENT ............................................................................................. 340
10.6.1 DHCP server configuration ......................................................................... 340
10.6.2 DHCP debugging ........................................................................................ 345
CHAPTER 11 SNTP CONFIGURATION.......................................................................347
11.1 INTRODUCTION TO SNTP ..................................................................................... 347
11.2 COMMANDS FOR SNTP........................................................................................ 348
11.2.1 sntp server .................................................................................................. 348
11.2.2 sntp poll ....................................................................................................... 348
11.2.3 debug sntp .................................................................................................. 349
11.2.4 show sntp .................................................................................................... 349
11.3 TYPICAL SNTP CONFIGURATION EXAMPLES .......................................................... 349
11.4 WEB MANAGEMENT.............................................................................................. 350
11.4.1 SNMP/NTP server configuration ................................................................. 350
11.4.2 Request interval configuration..................................................................... 350
11.4.3 Time difference............................................................................................ 350
11.4.4 Show SNTP................................................................................................. 351
CHAPTER 12 PREVENT ARP, ND SPOOFING CONFIGURATION............................352
9
12.1 OVERVIEW........................................................................................................... 352
12.1.1 ARP ( Address Resolution Protocol)............................................................ 352
12.1.2 ARP Spoofing.............................................................................................. 352
12.1.3 How to prevent void ARP/ND Spoofing for our Layer 3 Switch ................... 352
12.2 PREVENT ARP, ND SPOOFING CONFIGURATION..................................................... 353
12.2.1 Prevent ARP, ND Spoofing Configuration Task List..................................... 353
12.3 COMMANDS FOR PREVENTING ARP, ND SPOOFING............................................... 354
12.3.1 ip arp-security updateprotect....................................................................... 354
12.3.2 ipv6 nd-security updateprotect .................................................................... 354
12.3.3 ip arp-security learnprotect.......................................................................... 355
12.3.4 ipv6 nd learnprotect .................................................................................... 355
12.3.5 ip arp-security convert................................................................................. 355
12.3.6 ipv6 nd-security convert .............................................................................. 356
12.3.7 clear ip arp dynamic.................................................................................... 356
12.3.8 clear ipv6 nd dynamic ................................................................................. 356
12.4 PREVENT ARP, ND SPOOFING EXAMPLE............................................................... 356
CHAPTER 13 ROUTING PROTOCOL......................................................................... 359
13.1 ROUTING PROTOCOL OVERVIEW........................................................................... 359
13.1.1 Routing Table .............................................................................................. 360
13.2 IP ROUTING POLICY............................................................................................. 361
13.2.1 Introduction To Routing Policy..................................................................... 361
13.2.2 IP Routing Policy Configuration Task List.................................................... 363
13.2.3 Commands for Routing Policy..................................................................... 367
13.2.4 Configuration Examples.............................................................................. 379
13.2.5 Troubleshooting .......................................................................................... 380
13.3 STATI C ROUTE..................................................................................................... 383
13.3.1 Introduction to Static Route......................................................................... 383
13.3.2 Introduction to Default Route ...................................................................... 383
13.3.3 Static Route Configuration Task List............................................................ 384
13.3.4 Commands for Static Route ........................................................................ 384
13.3.5 Configuration Examples.............................................................................. 388
13.4 RIP..................................................................................................................... 389
13.4.1 Introduction to RIP ...................................................................................... 389
13.4.2 RIP Configuration Task List......................................................................... 391
13.4.3 Commands for RIP ..................................................................................... 397
13.4.4 RIP Examples ............................................................................................. 412
13.4.5 RIP Troubleshooting.................................................................................... 415
13.5 RIPNG ................................................................................................................ 421
10
13.5.1 Introduction to RIPng .................................................................................. 421
13.5.2 RIPng Configuration Task List ..................................................................... 422
13.5.3 Commands For RIPng ................................................................................ 426
13.5.4 RIPng Configuration Examples ................................................................... 431
13.5.5 RIPng Troubleshooting................................................................................ 433
13.6 OSPF................................................................................................................. 437
13.6.1 Introduction to OSPF .................................................................................. 437
13.6.2 OSPF Configuration Task List ..................................................................... 440
13.6.3 Commands for OSPF.................................................................................. 444
13.6.4 OSPF Example ........................................................................................... 465
13.6.5 OSPF Troubleshooting................................................................................ 474
13.7 OSPFV3............................................................................................................. 483
13.7.1 Introduction to OSPFv3............................................................................... 483
13.7.2 OSPFv3 Configuration Task List ................................................................. 486
13.7.3 Commands for OSPFV3 ............................................................................. 490
13.7.4 OSPFv3 Examples...................................................................................... 500
13.7.5 OSPFv3 Troubleshooting............................................................................ 503
13.8 BGP ................................................................................................................... 510
13.8.1 BGP Introduction......................................................................................... 510
13.8.2 BGP Configuration Task List ....................................................................... 514
13.8.3 Commands for BGP.................................................................................... 526
13.8.4 Configuration Examples of BGP ................................................................. 567
13.8.5 BGP Troubleshooting .................................................................................. 581
13.9 MBGP4+ ............................................................................................................ 592
13.9.1 MBGP4+ Introduction.................................................................................. 592
13.9.2 MBGP4+ Configures Mission List ............................................................... 592
13.9.3 MBGP4+ Examples..................................................................................... 593
13.9.4 MBGP4+ Troubleshooting........................................................................... 594
CHAPTER 14 IGMP SNOOPING ................................................................................. 595
14.1 INTRODUCTION TO IGMP SNOOPING..................................................................... 595
14.2 IGMP SNOOPING CONFIGURATION TASK ............................................................... 595
14.3 COMMANDS FOR IGMP SNOOPING ....................................................................... 597
14.3.1 ip igmp snooping vlan ................................................................................. 597
14.3.2 ip igmp snooping vlan immediate-leave ...................................................... 597
14.3.3 ip igmp snooping vlan l2-general-querier .................................................... 597
14.3.4 ip igmp snooping vlan limit.......................................................................... 598
14.3.5 ip igmp snooping vlan mrouter-port interface .............................................. 598
14.3.6 ip igmp snooping vlan mrpt ......................................................................... 599
11
14.3.7 ip igmp snooping vlan query-interval........................................................... 599
14.3.8 ip igmp snooping vlan query-mrsp .............................................................. 599
14.3.9 ip igmp snooping vlan query-robustness..................................................... 600
14.3.10 ip igmp snooping vlan suppression-query-time ......................................... 600
14.4 IGMP SNOOPING EXAMPLE.................................................................................. 601
14.5 IGMP SNOOPING TROUBLESHOOTING .................................................................. 603
14.5.1 Commands for Monitor And Debug............................................................. 603
CHAPTER 15 MULTICAST VLAN................................................................................ 607
15.1 INTRODUCTIONS TO MULTICAST VLAN.................................................................. 607
15.2 MULTICAST VLAN CONFIGURATION TASK.............................................................. 607
15.3 COMMANDS FOR MULTICAST VLAN...................................................................... 608
15.3.1 multicast-vlan .............................................................................................. 608
15.3.2 multicast-vlan association<vlan-list>........................................................... 608
15.4 EXAMPLES OF MULTICAST VLAN.......................................................................... 609
CHAPTER 16 IPV4 MULTICAST PROTOCOL ............................................................ 611
16.1 IPV4 MULTICAST PROTOCOL OVERVIEW.................................................................611
16.1.1 Introduction to Multicast ...............................................................................611
16.1.2 Multicast Address........................................................................................ 612
16.1.3 IP Multicast Packet Transmission................................................................ 613
16.1.4 IP Multicast Application ............................................................................... 613
16.2 PIM-DM ............................................................................................................. 614
16.2.1 Introduction to PIM-DM ............................................................................... 614
16.2.2 PIM-DM Configuration Task List.................................................................. 615
16.2.3 Commands for PIM-DM .............................................................................. 616
16.2.4 PIM-DM Configuration Examples................................................................ 618
16.2.5 PIM-DM Troubleshooting ............................................................................ 619
16.3 PIM-SM.............................................................................................................. 622
16.3.1 Introduction to PIM-SM ............................................................................... 622
16.3.2 PIM-SM Configuration Task List .................................................................. 623
16.3.3 Commands for PIM-SM............................................................................... 626
16.3.4 PIM-SM Configuration Examples ................................................................ 635
16.3.5 PIM-SM Troubleshooting............................................................................. 637
16.4 DVMRP.............................................................................................................. 646
16.4.1 Introduction to DVMRP ............................................................................... 646
16.4.2 Configuration Task List................................................................................ 647
16.4.3 Commands for DVMRP............................................................................... 649
16.4.4 DVMRP Configuration Examples ................................................................ 652
12
16.4.5 DVMRP Troubleshooting............................................................................. 652
16.5 ECSCM.............................................................................................................. 657
16.5.1 Introduction to ECSCM ............................................................................... 657
16.5.2 ECSCM Configuration Task List .................................................................. 658
16.5.3 Commands for ECSCM............................................................................... 661
16.5.4 ECSCM Configuration Examples ................................................................ 666
16.5.5 ECSCM Troubleshooting............................................................................. 667
16.6 IGMP ................................................................................................................. 669
16.6.1 Introduction to IGMP ................................................................................... 669
16.6.2 Configuration Task List................................................................................ 671
16.6.3 Commands for IGMP .................................................................................. 673
16.6.4 IGMP Configuration Example...................................................................... 678
16.6.5 IGMP Troubleshooting ................................................................................ 679
CHAPTER 17 IPV6 MULTICAST PROTOCOL ............................................................683
17.1 PIM-DM6............................................................................................................ 683
17.1.1 Introduction to PIM-DM6 ............................................................................. 683
17.1.2 PIM-DM Configuration Task List.................................................................. 684
17.1.3 Commands for PIM-DM6 ............................................................................ 685
17.1.4 PIM-DM Typical Application ........................................................................ 689
17.1.5 PIM-DM Troubleshooting ............................................................................ 690
17.2 PIM-SM6............................................................................................................ 693
17.2.1 Introduction to PIM-SM6 ............................................................................. 693
17.2.2 PIM-SM Configuration Task List .................................................................. 694
17.2.3 Commands for PIM-SM............................................................................... 697
17.2.4 PIM-SM Typical Application......................................................................... 705
17.2.5 PIM-SM Troubleshooting............................................................................. 707
17.3 MLD ................................................................................................................... 716
17.3.1 Introduction to MLD..................................................................................... 716
17.3.2 MLD Configuration Task List ....................................................................... 717
17.3.3 Commands for MLD.................................................................................... 718
17.3.4 MLD Typical Application.............................................................................. 724
17.3.5 MLD Troubleshooting.................................................................................. 725
17.4 MLD SNOOPING .................................................................................................. 727
17.4.1 MLD Snooping Introduction......................................................................... 727
17.4.2 MLD Snooping Configuration Task.............................................................. 728
17.4.3 Commands For MLD Snooping Configuration ............................................ 729
17.4.4 MLD Snooping Examples............................................................................ 736
17.4.5 MLD Snooping Troubleshooting.................................................................. 739
13
CHAPTER 18 ACL CONFIGURATION......................................................................... 740
18.1 INTRODUCTION TO ACL........................................................................................ 740
18.1.1 Access-list................................................................................................... 740
18.1.2 Access-group .............................................................................................. 740
18.1.3 Access-list Action and Global Default Action ............................................... 741
18.2 ACL CONFIGURATION........................................................................................... 741
18.2.1 ACL Configuration Task Sequence.............................................................. 741
18.2.2 Commands for ACL..................................................................................... 754
18.3 ACL EXAMPLE ..................................................................................................... 772
18.4 ACL TROUBLESHOOTING...................................................................................... 773
18.4.1 Command for Monitor And Debug............................................................... 773
18.5 WEB MANAGEMENT ............................................................................................. 777
18.5.1 Numeric standard ACL configuration........................................................... 777
18.5.2 Delete numeric IP ACL................................................................................ 778
18.5.3 Configure the numeric extended ACL ......................................................... 778
18.5.4 Configure and delete the standard ACL name ............................................ 779
18.5.5 Configure extended ACL name configuration.............................................. 780
18.5.6 Firewall configuration .................................................................................. 780
18.5.7 ACL port binding.......................................................................................... 781
CHAPTER 19 802.1X CONFIGURATION .................................................................... 782
19.1 INTRODUCTION TO 802.1X .................................................................................... 782
19.2 802.1X CONFIGURATION TASK LIST....................................................................... 783
19.3 COMMANDS FOR 802.1X ...................................................................................... 787
19.3.1 aaa enable .................................................................................................. 787
19.3.2 aaa-accounting enable................................................................................ 787
19.3.3 dot1x accept-mac........................................................................................ 788
19.3.4 dot1x eapor enable ..................................................................................... 788
19.3.5 dot1x enable ............................................................................................... 789
19.3.6 dot1x macfilter enable................................................................................. 789
19.3.7 dot1x max-req ............................................................................................. 789
19.3.8 dot1x max-user ........................................................................................... 790
19.3.9 dot1x port-control ........................................................................................ 790
19.3.10 dot1x port-method..................................................................................... 791
19.3.11 dot1x re-authenticate................................................................................. 791
19.3.12 dot1x re-authentication.............................................................................. 792
19.3.13 dot1x timeout quiet-period......................................................................... 792
19.3.14 dot1x timeout re-authperiod ...................................................................... 792
14
19.3.15 dot1x timeout tx-period.............................................................................. 793
19.3.16 radius-server accounting host ................................................................... 793
19.3.17 radius-server authentication host .............................................................. 794
19.3.18 radius-server dead-time ............................................................................ 794
19.3.19 radius-server key ...................................................................................... 795
19.3.20 radius-server retransmit ............................................................................ 795
19.3.21 radius-server timeout ................................................................................ 796
19.4 802.1X APPLICATION EXAMPLE ............................................................................. 797
19.5 802.1X TROUBLESHOOTING ................................................................................. 797
19.5.1 Command for Monitor and debug ............................................................... 798
19.6 WEB MANAGEMENT ............................................................................................. 804
19.6.1 RADIUS client configuration........................................................................ 804
19.6.2 802.1X configuration ................................................................................... 806
CHAPTER 20 VRRP CONFIGURATION......................................................................810
20.1 INTRODUCTION TO VRRP..................................................................................... 810
20.2 CONFIGURATION TASK LIST ...................................................................................811
20.3 COMMANDS FOR VRRP ....................................................................................... 813
20.3.1 advertisement-interval................................................................................. 813
20.3.2 circuit-failover.............................................................................................. 813
20.3.3 debug vrrp................................................................................................... 814
20.3.4 disable......................................................................................................... 814
20.3.5 enable ......................................................................................................... 815
20.3.6 interface ...................................................................................................... 815
20.3.7 preempt-mode............................................................................................. 815
20.3.8 priority ......................................................................................................... 816
20.3.9 router vrrp ................................................................................................... 816
20.3.10 show vrrp .................................................................................................. 816
20.3.11 virtual-ip..................................................................................................... 817
20.4 TYPICAL VRRP SCENARIO ................................................................................... 818
20.5 VRRP TROUBLESHOOTING .................................................................................. 819
20.6 WEB MANAGEMENT ............................................................................................. 819
20.6.1 Create VRRP Number................................................................................. 819
20.6.2 Configure VRRP Dummy IP........................................................................ 819
20.6.3 Configure VRRP Port.................................................................................. 820
20.6.4 Activate Virtual Router................................................................................. 820
20.6.5 Configure Preemptive Mode For VRRP ...................................................... 820
20.6.6 Configure VRRP priority.............................................................................. 820
20.6.7 Configure VRRP Timer interval ................................................................... 821
15
20.6.8 Configure VRRP Interface Monitor.............................................................. 821
20.6.9 Configure Authentication Mode For VRRP.................................................. 821
CHAPTER 21 MRPP CONFIGURATION...................................................................... 823
21.1 MRPP INTRODUCTION ......................................................................................... 823
21.1.1 Conception Introduction .............................................................................. 823
21.1.2 MRPP Protocol Packet Types ..................................................................... 824
21.1.3 MRPP Protocol Operation System.............................................................. 825
21.2 MRPP CONFIGURATION TASK LIST ....................................................................... 826
21.3 COMMANDS FOR MRPP ...................................................................................... 827
21.3.1 clear mrpp statistics .................................................................................... 827
21.3.2 control-vlan ................................................................................................. 827
21.3.3 debug mrpp................................................................................................. 828
21.3.4 enable ......................................................................................................... 828
21.3.5 fail-timer ...................................................................................................... 829
21.3.6 hello-timer ................................................................................................... 829
21.3.7 mrpp enable ................................................................................................ 830
21.3.8 mrpp ring..................................................................................................... 830
21.3.9 node-mode.................................................................................................. 830
21.3.10 primary-port............................................................................................... 831
21.3.11 secondary-port .......................................................................................... 831
21.3.12 show mrpp ................................................................................................ 831
21.3.13 show mrpp statistics.................................................................................. 832
21.4 MRPP TYPICAL SCENARIO.................................................................................... 832
21.4.1 MRPP typical scenario 1............................................................................. 832
21.4.2 MRPP typical scenario 2............................................................................. 834
21.4.3 MRPP typical scenario 3............................................................................. 837
21.5 MRPP TROUBLESHOOTING .................................................................................. 840
CHAPTER 22 CLUSTER CONFIGURATION............................................................... 842
22.1.1 Introduction to cluster network management .............................................. 842
22.1.2 Cluster Network Management Configuration Sequence ............................. 842
22.1.3 Commands for cluster................................................................................. 844
22.1.4 Examples of Cluster Administration ............................................................ 850
22.1.5 Cluster Administration Troubleshooting....................................................... 851
16

Chapter 1 Switch Management

1.1 Management Options

After purchasing the switch, the user needs to configure the switch for network
management. ES4624-SFP/ES4626-SFP Switch provides two management options:
in-band management and out-of-band management.

1.1.1 Out-Of-Band Management

Out-of-band management is the management through Console interface. Generally,
the user will use out-of-band management for the initial switch configuration, or when
in-band management is not available. For instance, the user must assign an IP address
to the switch via the Console interface to be able to access the switch through Telnet.
The procedures for managing the switch via Console interface are listed below:
Step 1: setting up the environment:
Connect with serial port
Fig 1-1 Out-of-band Management Configuration Environment
As shown in Fig 1-1, the serial port (RS-232) is connected to the switch with the
serial cable provided. The table below lists all the devices used in the connection.
Device Name Description
PC machine Has functional keyboard and RS-232,with terminal emulator
installed,such as HyperTerminal included in Windows
9x/NT/2000/XP.
Serial port cable One end attach to the RS-232 serial port, the other end to
the Console port.
ES4624-SFP/ES462 Functional Console port required.
17
6-SFP
Step 2 Entering the HyperTerminal
Open the HyperTerminal included in Windows after the connection established. The
example below is based on the HyperTerminal included in Windows XP.
1) Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
Fig 1-2 Opening HyperTerminal
2) Type a name for opening HyperTerminal, such as “Switch”.
Fig 1-3 Opening HyperTerminal
3) In the “Connecting using” drop-list, select the RS-232 serial port used by the PC, e.g.
COM1, and click “OK”.
18
Fig 1-4 Opening HyperTerminal
4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for
“Parity checksum”, “1” for stop bit and “none” for traffic control;or,you can also click
“Restore default” and click “OK”.
Fig 1-5 Opening HyperTerminal
Step 3 :Entering switch CLI interface
Power on the switch, the following appears in the HyperTerminal windows, that is the
CLI configuration mode for ES4624-SFP/ES4626-SFP Switch.
ES4624-SFP Management Switch
19
Copyright (c) 2001-2006 by Accton Technology Corporation.
All rights reserved.
Reset chassis ... done.
Testing RAM...
134,217,728 RAM OK.
Initializing...
Attaching to file system ... done.
Loading nos.img ... done.
Starting at 0x10000...
Current time is WED APR 20 09: 37: 52 2005
ES4624-SFP Switch Operating System, Software Version ES4624-SFP 1.1.0.0,
Copyright (C) 2001-2006 by Accton Technology Corporation
http: //www.edge-core. com.
ES4624-SFP Switch
24 Ethernet/IEEE 802.3 interface(s)
Press ENTER to start session
The user can now enter commands to manage the switch. For a detailed description
for the commands, please refer to the following chapters.

1.1.2 In-band Management

In-band management refers to the management by login to the switch using Telnet.
In-band management enables management of the switch for some devices attached to
the switch. In the case when in-band management fails due to switch configuration
changes, out-of-band management can be used for configuring and managing the switch.

1.1.3 Management Via Telnet

To manage the switch with Telnet, the following conditions should be met:
1) Switch has an IP address configured
20
2) The host IP address (Telnet client) and the switch’s VLAN interface IP address is
in the same network segment.
3) If not 2), Telnet client can connect to an IP address of the switch via other
devices, such as a router.
ES4624-SFP/ES4626-SFP Switch is a Layer 3 switch that can be configured with
several IP addresses. The following example assumes the shipment status of the switch
where only VLAN1 exists in the system.
The following describes the steps for a Telnet client to connect to the switch’s VLAN1
interface by Telnet.
Fig 1-6 Manage the switch by Telnet
Step 1: Configure the IP addresses for the switch
First is the configuration of host IP address. This should be within the same network
segment as the switch VLAN1 interface IP address. Suppose the switch VLAN interface
IP address 10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run
“ping 10.1.128.251” from the host and verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below.
Before in-band management, the switch must be configured with an IP address by
out-of-band management (i.e. Console mode), The configuration commands are as
follows (All switch configuration prompts are assumed to be “switch” hereafter if not
otherwise specified):
Switch>
Switch>en
Switch#config
Switch(Config)#interface vlan 1
Switch(Config-If-Vlan1)#ip address 10.1.128.251 255.255.255.0
Switch(Config-If-Vlan1)#no shutdown
21
Step 2: Run Telnet Client program.
Run Telnet client program included in Windows with the specified Telnet target.
Fig 1-7 Run telnet client program included in Windows
When accessing a switch with IPv6 address, it is recommended to use the Firefox
browser with 1.5 or later version. For example, if the IPv6 address of the switch is
“3ffe:506:1:2::3”, enter the switch address at the address bar: http://[3ffe:506:1:2::3],
where the address should be in the square brackets.
Step 3: Login to the switch
Login to the Telnet configuration interface. Valid login name and password are
required, otherwise the switch will reject Telnet access. This is a method to protect the
switch from unauthorized access. As a result, when Telnet is enabled for configuring and
managing the switch, username and password for authorized Telnet users must be
configured with the following command:
username <user> password {0|7} <password>.
Assume an authorized user in the switch has a username of “test”, and password of
“test”, the configuration procedure should like the following:
Switch
>en
Switch#config
Switch(Config)#username test password 0 test
Enter valid login name and password in the Telnet configuration interface, Telnet
user will be able to enter the switch’s CLI configuration interface. The commands used in
the Telnet CLI interface after login is the same as that in the Console interface.
22
Fig 1-8 Telnet Configuration Interface

1.1.4 Management Via HTTP

To manage the switch via HTTP, the following conditions should be met:
1) Switch has an IP address configured
2) The host IP address (HTTP client) and the switch’s VLAN interface IP address
are in the same network segment;
3) If 2) is not met, HTTP client should connect to an IP address of the switch via
other devices, such as a router.
Similar to management via Telnet, as soon as the host succeeds to ping an IP
address of the switch and to type the right login password, it can access the switch via
HTTP. The configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP function on the
switch.
For configuring the IP address on the switch through out-of-band management, see
the relevant chapter.
To enable the WEB configuration, users should type the CLI command ip http server in the global mode as below:
Switch
Switch#config
Switch(Config)#ip http server
>en
23
Step 2: Run HTTP protocol on the host.
Open the Web browser on the host and type the IP address of the switch.Or run
directly the HTTP protocol on the Windows. For example, the IP address of the switch is
“10.1.128.251”.
Fig 1-9 Run HTTP Protocol
Step 3: Logon to the switch
To logon to the HTTP configuration interface, valid login user name and password
are required; otherwise the switch will reject HTTP access. This is a method to protect
the switch from the unauthorized access. Consequently, in order to configure the switch
via HTTP, username and password for authorized HTTP users must be configured with
the following command in the global mode:
username <username> password <show_flag> <password>.
Suppose an authorized user in the switch has a username as “test”, and password
as “test”. The configuration procedure is as below:
Switch
>en
Switch#config
Switch(Config)# username test password 0 test
The Web login interface is as below:
24
Fig 1-10 Web Login Interface
Input the right username and password, and then the main Web configuration
interface is shown as below.
Fig 1-11 Main Web Configuration Interface

1.2 Management Interface

1.2.1 CLI Interface

25
CLI interface is familiar to most users. As aforementioned, out-of-band management
and Telnet login are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration
commands. Those commands are categorized according to their functions in switch
configuration and management. Each category represents a different configuration mode.
The Shell for the switch is described below:
z Configuration Modes
z Configuration Syntax
z Shortcut keys
z Help function
z Input verification
z Fuzzy match support

1.2.2 Configuration Modes

Interface Mode
1.2.2.1 User Mode
User Mode
Admin Mode
Global Mode
Vlan Mode
DHCP address pool
configuration mode
Fig 1-12 Shell Configuration Modes
Route configuration
mode
ACL configuration
mode
On entering the CLI interface, entering user entry system first. If as common user, it
is defaulted to User Mode. The prompt shown is “Switch>“, the symbol “>“ is the prompt
for User Mode. When disable command is run under Admin Mode, it will also return to
the User Mode.
Under User Mode, no configuration to the switch is allowed, only clock time and
version information of the switch can be queries.
26
1.2.2.2 Admin Mode
To Admin Mode sees the following: In user entry system, if as Admin user, it is
defaulted to Admin Mode. Admin Mode prompt “Switch#” can be entered under the User
Mode by running the enable command and entering corresponding access levels admin user password, if a password has been set. Or, when exit command is run under Global
Mode, it will also return to the Admin Mode. ES4624-SFP/ES4626-SFP Switch also
provides a shortcut key sequence "Ctrl+z”, this allows an easy way to exit to Admin Mode
from any configuration mode (except User Mode).
Under Admin Mode, when disable command is run, it will return to User Mode. When
exit command is run, it will exit the entry and enter user entry system direct. Next users
can reenter the system on entering corresponding user name and password.
Under Admin Mode, the user can query the switch configuration information,
connection status and traffic statistics of all ports; and the user can further enter the
Global Mode from Admin Mode to modify all configurations of the switch. For this reason,
a password must be set for entering Admin mode to prevent unauthorized access and
malicious modification to the switch.
1.2.2.3 Global Mode
Type the config command under Admin Mode will enter the Global Mode prompt
“Switch(Config)#”. Use the exit command under other configuration modes such as
Interface Mode, VLAN mode will return to Global Mode.
The user can perform global configuration settings under Global Mode, such as MAC
Table, Port Mirroring, VLAN creation, IGMP Snooping start, GVRP and STP, etc. And the
user can go further to Interface Mode for configuration of all the interfaces.
1.2.2.4 Interface Mode
Use the interface command under Global Mode can enter the interface mode
specified. ES4624-SFP/ES4626-SFP Switch provides three interface type: VLAN
interface, Ethernet port and port-channel, and accordingly the three interface
configuration modes.
Interface
Entry Prompt Operates Exit Type VLAN Interface
Ethernet Port Type interface
Type interface
vlan <Vlan-id>
command under
Global Mode.
ethernet
Switch(Config-If­Vlanx)#
Switch(Config­ethernetxx)#
27
Configure
switch IPs, etc
Configure
supported
Use the exit
command to
return to
Global Mode.
Use the exit
command to
<interface-list>
command under
Global Mode.
port-channel Type interface
port-channel
<port-channel-nu
mber> command
under Global
Mode.
Switch(Config-if­port-channelx)#
duplex mode,
speed, etc.
of Ethernet
Port.
Configure
port-channel
related
settings such
as duplex
mode, speed,
etc.
return to
Global Mode.
Use the exit
command to
return to
Global Mode.
1.2.2.5 VLAN Mode
Using the vlan <vlan-id> command under Global Mode can enter the corresponding
VLAN Mode. Under VLAN Mode the user can configure all member ports of the
corresponding VLAN. Run the exit command to exit the VLAN Mode to Global Mode.
1.2.2.6 DHCP Address Pool Mode
Type the ip dhcp pool <name> command under Global Mode will enter the DHCP
Address Pool Mode prompt “Switch(Config-<name>-dhcp)#”. DHCP address pool properties can be configured under DHCP Address Pool Mode. Run the exit command to
exit the DHCP Address Pool Mode to Global Mode.
1.2.2.7 Route Mode
Routing Protocol RIP Routing Protocol
OSPF
Entry Prompt Operates Exit
Type router rip
command
under
Global
Mode.
Type router
Switch(Config-Router-Rip)# Configure
RIP protocol
parameters.
Switch(Config-Router-Ospf)# Configure
Use the
exit”
command to
return to
Global
Mode.
Use the
Routing Protocol
ospf
command
under
Global
28
OSPF
protocol
parameters.
exit”
command to
return to
Global
Mode. Mode.
1.2.2.8 ACL Mode
ACL type Entry Prompt Operates Exit Standard IP ACL Mode
Extended IP ACL Mode
Type
access-list ip
command
under Global
Mode.
Type
access-list ip
command
under Global
Mode.
Switch(Config-Std-Nacl­a)#
Switch(Config-Ext-Nacl­b)#
Configure
parameters
for
Standard
IP ACL
Mode
Configure
parameters
for
Extended
IP ACL
Mode
Use the “exit”
command to
return to
Global Mode.
Use the “exit”
command to
return to
Global Mode.

1.2.3 Configuration Syntax

ES4624-SFP/ES4626-SFP Switch provides various configuration commands.
Although all the commands are different, they all abide by the syntax for
ES4624-SFP/ES4626-SFP Switch configuration commands. The general commands
format of ES4624-SFP/ES4626-SFP Switch is shown below:
cmdtxt <variable> { enum1 | … | enumN } [option] Conventions: cmdtxt in bold font indicates a command keyword; <variable> indicates a variable parameter; {enum1 | … | enumN } indicates a mandatory parameter that should be selected from the parameter set enum1~enumN; and the square bracket ([ ]) in [option] indicate an optional parameter. There may be combinations of “< >“, “{ }” and “[ ]” in the command line, such as [<variable>],{enum1 <variable>| enum2}, [option1
[option2]], etc.
Here are examples for some actual configuration commands:
z show calendar, no parameters required. This is a command with only a keyword
and no parameter, just type in the command to run.
z vlan <vlan-id>, parameter values are required after the keyword. z duplex {auto|full|half}, user can enter duplex half, duplex full or duplex auto for this
29
command.
z snmp-server community <string>{ro|rw}, the followings are possible:
snmp-server community <string> ro snmp-server community <string> rw

1.2.4 Shortcut Key Support

ES4624-SFP/ES4626-SFP Switch provides several shortcut keys to facilitate user
configuration, such as up, down, left, right and Blank Space. If the terminal does not
recognize Up and Down keys, ctrl +p and ctrl +n can be used instead.
Key(s) Function
Back Space Delete a character before the cursor, and the cursor moves back.
Up “ Show previous command entered. Up to ten recently entered
commands can be shown.
Down “ Show next command entered. When use the Up key to get
previously entered commands, you can use the Down key to
return to the next command
Left “ The cursor moves one character to
the left.
Right “ The cursor moves one character to
the right.
Ctrl +p The same as Up key “”.
Ctrl +n The same as Down key “”.
Ctrl +b The same as Left key “”.
Ctrl +f The same as Right key “”.
Ctrl +z Return to the Admin Mode directly from the other configuration
modes ( except User Mode).
Ctrl +c Break the ongoing command process, such as ping or other
command execution.
Tab When a string for a command or keyword is entered, the Tab can
be used to complete the command or keyword if there is no
You can use the Left and
Right key to modify an
entered command.
conflict.

1.2.5 Help Function

There are two ways in ES4624-SFP/ES4626-SFP Switch for the user to access help
information: the “help” command and the “?”.
30
Loading...
+ 823 hidden pages