DCN DCRS-5650-28CT, DCRS-5650-52CT, DCRS-5650-28C, DCRS-5650-52C Configuration Manual

Port Configuration Content
1
Content
CHAPTER 1 PORT CONFIGURATION......................................1-1
1.1 INTRODUCTION TO PORT......................................................................1-1
1.2 NETWORK PORT CONFIGURATION TASK LIST ........................................1-1
1.3 PORT CONFIGURATION EXAMPLE .........................................................1-3
1.4 PORT TROUBLESHOOTING ...................................................................1-4
CHAPTER 2 PORT ISOLATION FUNCTION CONFIGURATION
2-1
2.1 INTRODUCTION TO PORT ISOLATION FUNCTION......................................2-1
2.2 TASK SEQUENCE OF PORT ISOLATION...................................................2-1
2.3 PORT ISOLATION FUNCTION TYPICAL EXAMPLES ................................... 2-2
CHAPTER 3 PORT LOOPBACK DETECTION FUNCTION
CONFIGURATION ......................................................................
3-1
3.1 INTRODUCTION TO PORT LOOPBACK DETECTION FUNCTION ...................3-1
3.2 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION TASK LIST .....3-2
3.3 PORT LOOPBACK DETECTION FUNCTION EXAMPLE ...............................3-3
3.4 PORT LOOPBACK DETECTION TROUBLESHOOTING ................................3-4
CHAPTER 4 ULDP FUNCTION CONFIGURATION...................4-1
4.1 INTRODUCTION TO ULDP FUNCTION.....................................................4-1
4.2 ULDP CONFIGURATION TASK SEQUENCE .............................................4-2
4.3 ULDP FUNCTION TYPICAL EXAMPLES ..................................................4-5
4.4 ULDP TROUBLESHOOTING..................................................................4-6
CHAPTER 5 LLDP FUNCTION OPERATION CONFIGURATION
Port Configuration Content
2
.................................................................................................... 5-1
5.1 INTRODUCTION TO LLDP FUNCTION .....................................................5-1
5.2 LLDP FUNCTION CONFIGURATION TASK SEQUENCE..............................5-2
5.3 LLDP FUNCTION TYPICAL EXAMPLE ....................................................5-5
5.4 LLDP FUNCTION TROUBLESHOOTING...................................................5-6
CHAPTER 6 PORT CHANNEL CONFIGURATION....................6-1
6.1 INTRODUCTION TO PORT CHANNEL.......................................................6-1
6.2 PORT CHANNEL CONFIGURATION TASK LIST .........................................6-2
6.3 PORT CHANNEL EXAMPLES .................................................................6-3
6.4 PORT CHANNEL TROUBLESHOOTING ....................................................6-5
CHAPTER 7 JUMBO CONFIGURATION ...................................7-1
7.1 INTRODUCTION TO JUMBO....................................................................7-1
7.2 JUMBO CONFIGURATION TASK SEQUENCE ............................................7-1
Port Configuration Chapter 1 Port Configuration
1-1
Chapter 1 Port Configuration
1.1 Introduction to Port
DCRS-5650-28CT provides 24 fixed 100M electric ports and 4 fixed 1000M ports (2
1000M electric ports and 2 1000M combo ports).
DCRS-5650-52CT provides 48 fixed 100M electric ports and 4 fixed 1000M ports (2
1000M electric ports and 2 1000M combo ports).
DCRS-5650-28C provides 24 fixed 100M electric ports and 4 fixed 1000M combo
ports.
DCRS-5650-52C provides 48 fixed 100M electric ports and 4 fixed 1000M combo
ports.
1.2 Network Port Configuration Task List
1. Enter the network port configuration mode
2. Configure the properties for the network ports (1) Enable/Disable ports
(2) Configure port names (3) Configure port cable types (4) Configure port speed and duplex mode (5) Configure bandwidth control (6) Configure traffic control (7) Enable/Disable port loopback function
3. Set the date traffic suppression function
4. Virtual cable test
1. Enter the Ethernet port configuration mode
Command Explanation Global Mode
interface ethernet <interface-list>
Enters the network port configuration mode.
2. Configure the properties for the Ethernet ports
Port Configuration Chapter 1 Port Configuration
1-2
Command Explanation Port Mode
shutdown no shutdown
Enables/Disables specified ports.
name <string> no name
Names or cancels the name of specified ports.
mdi { auto | across | normal } no mdi
Sets the cable type for the specified port
speed-duplex {auto | force10-half | force10-full | force100-half | force100-full | force100-fx | {{force1g-half | force1g-full} [nonegotiate [master | slave]]}}
Sets port speed and duplex mode of 1000M fiber ports.
bandwidth control <bandwidth> {both | receive | transmit} no bandwidth control
Sets
or cancels the bandwidth used for
incoming/outgoing traffic for specified ports.
flow control no flow control
Enables/Disables traffic control function for specified ports.
loopback no loopback
Enables/Disables loopback test function for specified ports.
3. Set the date traffic suppression function
Command Explanation Port Configuration Mode
rate-suppression {broadcast| brmc|brmcdlf|all} <Kbits> no rate-suppression
Enable the packet suppression function of the switch, and set the allowed data traffic. The no operation of this command will disable this function.
4. Virtual cable test
Command Explanation Port Configuration Mode virtual-cable-test Test virtual cables of the port.
Port Configuration Chapter 1 Port Configuration
1-3
1.3 Port Configuration Example
Fig 1-1 Port Configuration Example
No VLAN has been configured in the switches, default VLAN1 is used.
Switch Port Property
Switch1 0/0/7 Ingress bandwidth limit: 150 M Switch2 0/0/8 Mirror source port 0/0/9 100Mbps full, mirror source port 0/0/27 1000Mbps full, mirror destination port Switch3 0/0/12 100Mbps full
The configurations are listed below:
Switch1:
Switch1(config)#interface ethernet 0/0/7 Switch1(Config-If-Ethernet0/0/7)#bandwidth control both 50
Switch2:
Switch2(config)#interface ethernet 0/0/9 Switch2(Config-If-Ethernet0/0/9)#speed-duplex force100-full Switch2(Config-If-Ethernet0/0/9)#exit Switch2(config)#interface ethernet 0/0/27 Switch2(Config-If-Ethernet0/0/27)# speed-duplex force1000-full Switch2(Config-If-Ethernet0/0/27)#exit Switch2(config)#monitor session 1 source interface ethernet0/0/8;0/0/9 Switch2(config)#monitor session 1 destination interface ethernet 0/0/27
Switch3:
Switch3(config)#interface ethernet 0/0/12 Switch3(Config-If-Ethernet0/0/12)#speed-duplex force1000-full
0/0/7
Switc
h 2
Switch 3
0/0/9
0/0/12 0/0/8
0/0/27
Switc
h 1
Port Configuration Chapter 1 Port Configuration
1-4
Switch3(Config-If-Ethernet0/0/12)#exit
1.4 Port Troubleshooting
Here are some situations that frequently occurs in port configuration and the advised solutions: & Two connected fiber interfaces won’t link up if one interface is set to auto-negotiation
but the other to forced speed/duplex. This is determined by IEEE 802.3.
& The following combinations are not recommended: enabling traffic control as well as
setting multicast limiting for the same port; setting broadcast, multicast and unknown destination unicast control as well as port bandwidth limiting for the same port. If such combinations are set, the port throughput may fall below the expected performance.
Port Configuration Chapter 2 Port Isolation Function Configuration
2-1
Chapter 2 Port Isolation Function
Configuration
2.1 Introduction to Port Isolation Function
Port isolation is an independent port-based function working in an inter-port way, which isolates flows of different ports from each other. With the help of port isolation, users can isolate ports within a VLAN to save VLAN resources and enhance network security. After this function is configured, the ports in a port isolation group will be isolated from each other, while ports belonging to different isolation groups or no such group can forward data to one another normally. No more than 16 port isolation groups can a switch have.
100M ports are usually downlink ports, and only used as uplink ones in special cases. Please notice that 8 of them work as a whole group, which means, if ethernet 0/0/1 is configured as an uplink port, ports from ethernet 0/0/1 to ethernet 0/0/8 will all become uplink ones, and be able to communicate with other ports; if ethernet 0/0/1 is configured as a downlink port, ports from ethernet 0/0/1 to ethernet 0/0/8 will all become downlink ones. Other ports follow the same rule.
2.2 Task Sequence of Port Isolation
1. Create an isolate port group
2. Add Ethernet ports into the group
3. Display the configuration of port isolation
1. Create an isolate port group
Command Explanation Global Mode
isolate-port group <WORD> no isolate-port group <WORD>
Set a port isolation group; the no operation of this command will delete the port isolation group.
2. Add Ethernet ports into the group
Command Explanation Global Mode
Port Configuration Chapter 2 Port Isolation Function Configuration
2-2
isolate-port group <WORD> switchport interface [<ethernet>] <IFNAME> no isolate-port group <WORD> switchport interface [<ethernet>] <IFNAME>
Add one port or a group of ports into a port isolation group to isolate, which will become isolated from the other ports in the group; the no operation of this command will remove one port or a group of ports out of a port isolation group.
3. Display the configuration of port isolation
Command Explanation Admin Mode and Global Mode
show isolate-port group [ <WORD> ]
Display the configuration of port isolation, including all configured port isolation groups and Ethernet ports in each group.
2.3 Port Isolation Function Typical Examples
Fig 2-1 A typical example of port isolation function
The topology and configuration of switches are showed in the figure above, with e0/0/1, e0/0/10 and e0/0/17 all belonging to VLAN 100. The requirement is that, after port
S1
e0/0/17
S3S2
Port Configuration Chapter 2 Port Isolation Function Configuration
2-3
isolation is enabled on switch S1, e0/0/1 and e0/0/10 on switch S1 can not communicate with each other, while both of them can communicate with the uplink port e0/0/17. That is, the communication between any pair of downlink ports is disabled while that between any downlink port and a specified uplink port is normal. The uplink port can communicate with any port normally. The configuration of S1: Switch(config)#isolate-port group test Switch(config)#isolate-port group test switchport interface ethernet 0/0/1;0/0/10
Port Configuration Chapter 3 Port Loopback Detection
Function Configuration
3-1
Chapter 3 Port Loopback Detection
Function Configuration
3.1 Introduction to Port Loopback Detection Function
With the development of switches, more and more users begin to access the network through Ethernet switches. In enterprise network, users access the network through layer-2 switches, which means urgent demands for both internet and the internal layer 2 Interworking. When layer 2 Interworking is required, the messages will be forwarded through MAC addressing the accuracy of which is the key to a correct Interworking between users. In layer 2 switching, the messages are forwarded through MAC addressing. Layer 2 devices learn MAC addresses via learning source MAC address, that is, when the port receives a message from an unknown source MAC address, it will add this MAC to the receive port, so that the following messages with a destination of this MAC can be forwarded directly , which also means learn the MAC address once and for all to forward messages.
When a new source MAC is already learnt by the layer 2 device, only with a different source port, the original source port will be modified to the new one, which means to correspond the original MAC address with the new port. As a result, if there is any loopback existing in the link, all MAC addresses within the whole layer 2 network will be corresponded with the port where the loopback appears (usually the MAC address will be frequently shifted from one port to another ), causing the layer 2 network collapsed. That is why it is a necessity to check port loopbacks in the network. When a loopback is detected, the detecting device should send alarms to the network management system, ensuring the network manager is able to discover, locate and solve the problem in the network and protect users from a long-lasting disconnected network.
Since detecting loopbacks can make dynamic judgment of the existence of loopbacks in the link and tell whether it has gone, the devices supporting port control (such as port isolation and port MAC address learning control) can maintain that automatically, which will not only reduce the burden of network managers but also response time, minimizing the effect caused loopbacks to the network.
Loading...
+ 23 hidden pages