Orion A10E, A28E, A28F Configuration Manual

A10E/A28E/A28F Configuration Guide
Orion Networks provides customers with comprehensive technical support and services. For any assistance, please contact our local office or company headquarters.
Website: http://www.orionnetworks.com Tel: 512.646.4025 Email: info@orionnetworks.com Address: 4262 Entry Ct STE K, Chantilly, VA 20151 USA
-----------------------------------------------------------------------------------------------------------------------------------------
Notice
Copyright © 2013 Orion Networks All rights reserved. No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in Writing from Orion Networks.
is the trademark of Orion Networks. All other trademarks and trade names mentioned in this document are the property of their respective holders. The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
Orion Networks A10E/A28E/A28F Configuration Guide
Preface
Orion Networks
i
Product name
Hardware version
Software version
A10E
A
NOS_4.14
A28E
A
NOS_4.14
Symbol
Description
Indicates a hazard with a medium or low level of risk which, if not avoided, could result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided, could cause equipment damage, data loss, and performance degradation, or unexpected results.
Provides additional information to emphasize or supplement important points of the main text.
Preface
Objectives
This guide describes features supported by the A10E/A28E, and related configurations, including basic principles and configuration procedure of Ethernet, route, reliability, OAM, security, and QoS, and related configuration examples.
The appendix lists terms, acronyms, and abbreviations involved in this document. By reading this guide, you can master principles and configurations of the A10E/A28E, and
how to network with the A10E/A28E.
Versions
The following table lists the product versions related to this document.
Conventions
Symbol conventions
The symbols that may be found in this document are defined as follows.
Orion Networks A10E/A28E/A28F Configuration Guide
Preface
Orion Networks
ii
Symbol
Description
Indicates a tip that may help you solve a problem or save time.
Convention
Description
Times New Roman
Normal paragraphs are in Times New Roman.
Arial
Paragraphs in Warning, Caution, Notes, and Tip are in Arial.
Boldface
Names of files, directories, folders, and users are in boldface. For example, log in as user root.
Italic
Book titles are in italics.
Lucida Console
Terminal display is in Lucida Console.
Convention
Description
Boldface
The keywords of a command line are in boldface.
Italic
Command arguments are in italics.
[]
Items (keywords or arguments) in square brackets [ ] are optional.
{ x | y | ... }
Alternative items are grouped in braces and separated by vertical bars. Only one is selected.
[ x | y | ... ]
Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected.
{ x | y | ... } *
Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected.
[ x | y | ... ] *
Optional alternative items are grouped in square brackets and separated by vertical bars. A minimum of none or a maximum of all can be selected.
General conventions
Command conventions
Orion Networks A10E/A28E/A28F Configuration Guide
Preface
Orion Networks
iii
Convention
Description
Boldface
Buttons, menus, parameters, tabs, windows, and dialog titles are in boldface. For example, click OK.
>
Multi-level menus are in boldface and separated by the ">" signs. For example, choose File > Create > Folder.
Format
Description
Key
Press the key. For example, press Enter and press Tab.
Key 1+Key 2
Press the keys concurrently. For example, pressing Ctrl+C means the two keys should be pressed concurrently.
Key 1, Key 2
Press the keys in turn. For example, pressing Alt, A means the two keys should be pressed in turn.
Action
Description
Click
Select and release the primary mouse button without moving the pointer.
Double-click
Press the primary mouse button twice continuously and quickly without moving the pointer.
Drag
Press and hold the primary mouse button and move the pointer to a certain position.
GUI conventions
Keyboard operation
Mouse operation
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
iv
Contents
Preface ....................................................................................................................................... 1
Objectives .......................................................................................................................................... 1
Versions ............................................................................................................................................. 1
Conventions ....................................................................................................................................... 1
Symbol conventions ....................................................................................................................................1
General conventions ...................................................................................................................................2
Command conventions ...............................................................................................................................2
GUI conventions ..........................................................................................................................................3
Keyboard operation ....................................................................................................................................3
Mouse operation.........................................................................................................................................3
Contents .................................................................................................................................... 4
Figures ..................................................................................................................................... 16
Tables ...................................................................................................................................... 18
1 Basic configurations ................................................................................................................. 1
1.1 Accessing the device ..................................................................................................................... 1
1.1.1 Introduction .......................................................................................................................................1
1.1.2 Accessing from the Console interface ................................................................................................2
1.1.3 Accessing from Telnet ........................................................................................................................3
1.1.4 Accessing from SSHv2 ........................................................................................................................4
1.1.5 Checking configurations .....................................................................................................................6
1.2 CLI ................................................................................................................................................ 6
1.2.1 Introduction .......................................................................................................................................6
1.2.2 Command line level ...........................................................................................................................7
1.2.3 Command line mode ..........................................................................................................................7
1.2.4 Command line shortcuts ....................................................................................................................9
1.2.5 Command line help message .......................................................................................................... 10
1.2.6 CLI message ..................................................................................................................................... 12
1.2.7 Command line history message ...................................................................................................... 13
1.2.8 Restoring default value of command line ....................................................................................... 14
1.3 Managing users ........................................................................................................................... 14
1.3.1 Checking configurations .................................................................................................................. 15
1.4 Managing files ............................................................................................................................ 15
1.4.1 Managing BootROM files ................................................................................................................ 15
1.4.2 Managing system files ..................................................................................................................... 17
1.4.3 Managing configuration files .......................................................................................................... 18
1.4.4 Checking configurations .................................................................................................................. 19
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
v
1.5 Configuring clock management.................................................................................................... 19
1.5.1 Configuring time and time zone...................................................................................................... 19
1.5.2 Configuring DST ............................................................................................................................... 20
1.5.3 Configuring NTP .............................................................................................................................. 20
1.5.4 Configuring SNTP ............................................................................................................................ 21
1.5.5 Checking configurations .................................................................................................................. 22
1.6 Configuring interface management .............................................................................................. 22
1.6.1 Default configurations of interfaces ................................................................................................ 22
1.6.2 Configuring basic attributes for interfaces ...................................................................................... 23
1.6.3 Configuring flow control on interfaces ........................................................................................... 23
1.6.4 Configuring the Combo interface .................................................................................................... 24
1.6.5 Configuring interface rate statistics ................................................................................................ 24
1.6.6 Configuring interface statistics ........................................................................................................ 25
1.6.7 Enabling/Disabling interfaces ......................................................................................................... 25
1.6.8 Checking configurations .................................................................................................................. 25
1.7 Configuring basic information ...................................................................................................... 26
1.8 Task scheduling ........................................................................................................................... 27
1.9 Watchdog ................................................................................................................................... 27
1.10 Load and upgrade...................................................................................................................... 28
1.10.1 Introduction .................................................................................................................................. 28
1.10.2 Configuring TFTP auto-upload method ......................................................................................... 29
1.10.3 Upgrading system software by BootROM ..................................................................................... 29
1.10.4 Upgrading system software by CLI ................................................................................................ 31
1.10.5 Checking configurations ................................................................................................................ 32
1.10.6 Exampe for configuring TFTP auto-loading ................................................................................... 32
2 Ethernet ................................................................................................................................ 34
2.1 MAC address table ...................................................................................................................... 34
2.1.1 Introduction .................................................................................................................................... 34
2.1.2 Preparing for configurations ........................................................................................................... 36
2.1.3 Default configurations of MAC address table ................................................................................. 36
2.1.4 Configuring static MAC address ...................................................................................................... 36
2.1.5 Configuring multicast filtering mode for MAC address table ......................................................... 37
2.1.6 Configuring MAC address learning.................................................................................................. 37
2.1.7 Configuring MAC address limit ....................................................................................................... 38
2.1.8 Configuring the aging time of MAC addresses ................................................................................ 38
2.1.9 Checking configurations .................................................................................................................. 38
2.1.10 Maintenance ................................................................................................................................. 39
2.1.11 Example for configuring the MAC address table........................................................................... 39
2.2 VLAN .......................................................................................................................................... 40
2.2.1 Introduction .................................................................................................................................... 40
2.2.2 Preparing for configurations ........................................................................................................... 42
2.2.3 Default configurations of VLAN ....................................................................................................... 42
2.2.4 Configuring VLAN attributes ........................................................................................................... 43
2.2.5 Configuring interface mode ............................................................................................................ 43
2.2.6 Configuring VLAN on Access interface ............................................................................................ 44
2.2.7 Configuring VLAN on the Trunk interface ....................................................................................... 44
2.2.8 Checking configurations .................................................................................................................. 45
2.3 QinQ ........................................................................................................................................... 46
2.3.1 Introduction .................................................................................................................................... 46
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
vi
2.3.2 Preparing for configurations ........................................................................................................... 47
2.3.3 Default configurations of QinQ ....................................................................................................... 47
2.3.4 Configuring basic QinQ ................................................................................................................... 47
2.3.5 Configuring selective QinQ ............................................................................................................. 47
2.3.6 Configuring the egress interface toTrunk mode ............................................................................. 48
2.3.7 Checking configurations .................................................................................................................. 48
2.3.8 Maintenance ................................................................................................................................... 48
2.3.9 Example for configuring basic QinQ ................................................................................................ 49
2.3.10 Example for configuring selective QinQ ........................................................................................ 51
2.4 VLAN mapping ............................................................................................................................ 54
2.4.1 Introduction .................................................................................................................................... 54
2.4.2 Preparing for configurations ........................................................................................................... 55
2.4.3 Configuring 1:1 VLAN mapping ....................................................................................................... 55
2.4.4 Configuring N:1 VLAN mapping ...................................................................................................... 55
2.4.5 Checking configurations .................................................................................................................. 56
2.4.6 Example for configuring VLAN mapping ......................................................................................... 56
2.5 Interface protection .................................................................................................................... 58
2.5.1 Introduction .................................................................................................................................... 58
2.5.2 Preparing for configurations ........................................................................................................... 59
2.5.3 Default configurations of interface protection ............................................................................... 59
2.5.4 Configuring interface protection ..................................................................................................... 59
2.5.5 Checking configurations .................................................................................................................. 59
2.5.6 Example for configuring interface protection ................................................................................. 60
2.6 Port mirroring ............................................................................................................................. 63
2.6.1 Introduction .................................................................................................................................... 63
2.6.2 Preparing for configurations ........................................................................................................... 63
2.6.3 Default configurations of port mirroring ........................................................................................ 64
2.6.4 Configuring port mirroring on a local port ...................................................................................... 64
2.6.5 Checking configurations .................................................................................................................. 65
2.6.6 Example for configuring port mirroring .......................................................................................... 65
2.7 Layer 2 protocol transparent transmission ................................................................................... 66
2.7.1 Introduction .................................................................................................................................... 66
2.7.2 Preparing for configurations ........................................................................................................... 67
2.7.3 Default configurations of Layer 2 protocol transparent transmission ............................................ 67
2.7.4 Configuring transparent transmission parameters ......................................................................... 67
2.7.5 Checking configuration ................................................................................................................... 68
2.7.6 Maintenance ................................................................................................................................... 68
2.7.7 Configuring Layer 2 protocol transparent transmission.................................................................. 68
3 IP services ............................................................................................................................. 72
3.1 ARP ............................................................................................................................................ 72
3.1.1 Introduction .................................................................................................................................... 72
3.1.2 Preparing for configurations ........................................................................................................... 73
3.1.3 Default configurations of ARP ......................................................................................................... 73
3.1.4 Configuring static ARP table entries ................................................................................................ 73
3.1.5 Configuring aging time of dynamic ARP entries ............................................................................. 74
3.1.6 Configuring dynamic ARP entry learning mode .............................................................................. 74
3.1.7 Checking configurations .................................................................................................................. 74
3.1.8 Maintenance ................................................................................................................................... 74
3.1.9 Configuring ARP .............................................................................................................................. 75
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
vii
3.2 Layer 3 interface ......................................................................................................................... 76
3.2.1 Introduction .................................................................................................................................... 76
3.2.2 Preparing for configurations ........................................................................................................... 76
3.2.3 Configuring the Layer 3 interface .................................................................................................... 76
3.2.4 Checking configurations .................................................................................................................. 77
3.2.5 Example for configuring Layer 3 interface to interconnect with host ............................................. 77
3.3 Default gateway .......................................................................................................................... 79
3.3.1 Introduction .................................................................................................................................... 79
3.3.2 Preparing for configurations ........................................................................................................... 79
3.3.3 Configuring the default gateway ..................................................................................................... 79
3.3.4 Configuring static route ................................................................................................................... 80
3.3.5 Checking configurations .................................................................................................................. 80
3.4 DHCP Client ................................................................................................................................ 80
3.4.1 Introduction .................................................................................................................................... 80
3.4.2 Preparing for configurations ........................................................................................................... 83
3.4.3 Default configurations of DHCP client ............................................................................................. 83
3.4.4 Applying the IP address through DHCP ........................................................................................... 83
3.4.5 (Optional) configuring DHCP client ................................................................................................. 84
3.4.6 (Optional) Renewing or releasing the IP address ............................................................................ 84
3.4.7 Checking configurations .................................................................................................................. 85
3.4.8 Configuring DHCP clients application .............................................................................................. 85
3.5 DHCP Relay ................................................................................................................................. 86
3.5.1 Introduction .................................................................................................................................... 86
3.5.2 Preparing for configurations ........................................................................................................... 87
3.5.3 Default configurations of DHCP Relay ............................................................................................. 87
3.5.4 Configuring global DHCP Relay ....................................................................................................... 87
3.5.5 Configuring interface DHCP Relay ................................................................................................... 87
3.5.6 Configuring the destination IP address for forwarding packets ...................................................... 88
3.5.7 (Optional) configuring DHCP Relay to support Option 82 .............................................................. 88
3.5.8 Checking configurations .................................................................................................................. 88
3.6 DHCP Snooping ........................................................................................................................... 89
3.6.1 Introduction .................................................................................................................................... 89
3.6.2 Preparing for configurations ........................................................................................................... 90
3.6.3 Default configurations of DHCP Snooping ...................................................................................... 90
3.6.4 Configuring DHCP Snooping ............................................................................................................ 90
3.6.5 Checking configurations .................................................................................................................. 91
3.6.6 Example for configuring DHCP Snooping ........................................................................................ 91
3.7 DHCP options .............................................................................................................................. 93
3.7.1 Introduction .................................................................................................................................... 93
3.7.2 Preparing for configurations ........................................................................................................... 94
3.7.3 Default configurations of DHCP Option .......................................................................................... 94
3.7.4 Configuring DHCP Option field ........................................................................................................ 95
3.7.5 Checking configurations .................................................................................................................. 95
4 QoS ....................................................................................................................................... 96
4.1 Introduction ................................................................................................................................ 96
4.1.1 Service model .................................................................................................................................. 96
4.1.2 Priority trust .................................................................................................................................... 97
4.1.3 Traffic classification ......................................................................................................................... 97
4.1.4 Traffic policy .................................................................................................................................... 99
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
viii
4.1.5 Priority mapping ........................................................................................................................... 100
4.1.6 Congestion management .............................................................................................................. 100
4.1.7 Rate limiting based on interface and VLAN .................................................................................. 101
4.2 Configuring basic QoS................................................................................................................ 102
4.2.1 Preparing for configurations ......................................................................................................... 102
4.2.2 Default configurations of basic QoS .............................................................................................. 102
4.2.3 Enabling global QoS ...................................................................................................................... 102
4.2.4 Checking configurations ................................................................................................................ 102
4.3 Configuring traffic classification and traffic policy ....................................................................... 103
4.3.1 Preparing for configurations ......................................................................................................... 103
4.3.2 Default configurations of traffic classification and traffic policy ................................................... 103
4.3.3 Creating traffic classification ......................................................................................................... 103
4.3.4 Configuring traffic classification rules ........................................................................................... 103
4.3.5 Creating token bucket and rate limiting rules ............................................................................... 104
4.3.6 Creating traffic policy .................................................................................................................... 105
4.3.7 Defining traffic policy mapping ..................................................................................................... 105
4.3.8 Defining traffic policy operations .................................................................................................. 105
4.3.9 Applying traffic policy to interfaces .............................................................................................. 106
4.3.10 Checking configurations .............................................................................................................. 107
4.3.11 Maintenance ............................................................................................................................... 107
4.4 Configuring priority mapping ..................................................................................................... 107
4.4.1 Preparing for configurations ......................................................................................................... 107
4.4.2 Default configurations of basic QoS .............................................................................................. 108
4.4.3 Configuring interface trust priority type ....................................................................................... 108
4.4.4 Configuring CoS to local priority ................................................................................................... 109
4.4.5 Configuring mapping from DSCP to local priority ......................................................................... 109
4.4.6 Configuring mapping from local priority to DSCP ......................................................................... 109
4.4.7 Configuring all-traffic modification on the interface .................................................................... 110
4.4.8 Configuring specific-traffic modification ....................................................................................... 110
4.4.9 Configuring CoS copying ............................................................................................................... 110
4.4.10 Checking configurations .............................................................................................................. 111
4.5 Configuring congestion management ......................................................................................... 111
4.5.1 Preparing for configurations ......................................................................................................... 111
4.5.2 Default configurations of congestion management ..................................................................... 112
4.5.3 Configuring SP queue scheduling .................................................................................................. 112
4.5.4 Configuring WRR or SP+WRR queue scheduling ........................................................................... 112
4.5.5 Configuring queue transmission rate ............................................................................................ 112
4.5.6 Checking configurations ................................................................................................................ 113
4.6 Configuring rate limiting based on interface and VLAN ............................................................... 113
4.6.1 Preparing for configurations ......................................................................................................... 113
4.6.2 Configuring rate limiting based on interface ................................................................................ 113
4.6.3 Configuring rate limiting based on VLAN ...................................................................................... 114
4.6.4 Configuring rate limiting based on QinQ ...................................................................................... 114
4.6.5 Checking configurations ................................................................................................................ 114
4.6.6 Maintenance ................................................................................................................................. 114
4.7 Configuring examples ................................................................................................................ 115
4.7.1 Example for configuring congestion management ....................................................................... 115
4.7.2 Example for configuring rate limiting based on interface ............................................................. 117
5 Multicast ............................................................................................................................. 119
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
ix
5.1 Overview .................................................................................................................................. 119
5.1.2 IGMP Snooping ............................................................................................................................. 121
5.1.3 MVR ............................................................................................................................................... 122
5.1.4 MVR Proxy ..................................................................................................................................... 122
5.1.5 IGMP filtering ................................................................................................................................ 123
5.2 Configuring IGMP Snooping ....................................................................................................... 124
5.2.1 Preparing for configurations ......................................................................................................... 124
5.2.2 Default configurations of IGMP Snooping .................................................................................... 124
5.2.3 Enabling global IGMP Snooping .................................................................................................... 125
5.2.4 (Optional) enabling IGMP Snooping on VLANs ............................................................................. 125
5.2.5 Configuring the multicast router interface ................................................................................... 125
5.2.6 (Optional) configuring the aging time of IGMP Snooping ............................................................. 126
5.2.7 (Optional) configuring instance leaving ........................................................................................ 126
5.2.8 (Optional) configuring static multicast forwarding table .............................................................. 127
5.2.9 Checking configurations ................................................................................................................ 127
5.3 Configuring MVR ....................................................................................................................... 128
5.3.1 Preparing for configurations ......................................................................................................... 128
5.3.2 Default configurations of MVR ...................................................................................................... 128
5.3.3 Configuring MVR basic information .............................................................................................. 128
5.3.4 Configuring MVR interface information ........................................................................................ 129
5.3.5 Checking configurations ................................................................................................................ 130
5.4 Configuring MVR Proxy ............................................................................................................. 130
5.4.1 Preparing for configurations ......................................................................................................... 130
5.4.2 Default configurations of IGMP Proxy ........................................................................................... 131
5.4.3 Configuring IGMP Proxy ................................................................................................................ 131
5.4.4 Checking configurations ................................................................................................................ 132
5.5 Configuring IGMP filtering ......................................................................................................... 132
5.5.1 Preparing for configurations ......................................................................................................... 132
5.5.2 Default configurations of IGMP filtering ....................................................................................... 133
5.5.3 Enabling global IGMP filtering ...................................................................................................... 133
5.5.4 Configuring IGMP filtering rules.................................................................................................... 133
5.5.5 Applying IGMP filtering rules ........................................................................................................ 134
5.5.6 Configuring the maximum multicast group number .................................................................... 134
5.5.7 Checking configuration ................................................................................................................. 135
5.6 Maintenance ............................................................................................................................. 135
5.7 Configuration examples ............................................................................................................. 136
5.7.1 Example for configuring IGMP Snooping ...................................................................................... 136
5.7.2 Example for configuring MVR and MVR Proxy .............................................................................. 137
5.7.3 Example for applying IGMP filtering and maximum multicast group number to the interface ... 140
5.7.4 Example for applying IGMP filtering and maximum multicast group number to the VLAN ......... 142
6 Security ............................................................................................................................... 145
6.1 ACL ........................................................................................................................................... 145
6.1.1 Introduction .................................................................................................................................. 145
6.1.2 Preparing for configurations ......................................................................................................... 146
6.1.3 Default configurations of ACL ....................................................................................................... 146
6.1.4 Configuring IP ACL ......................................................................................................................... 147
6.1.5 Configuring MAC ACL .................................................................................................................... 147
6.1.6 Configuring MAP ACL .................................................................................................................... 147
6.1.7 Applying ACL ................................................................................................................................. 150
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
x
6.1.8 Checking configurations ................................................................................................................ 152
6.1.9 Maintenance ................................................................................................................................. 152
6.2 Secure MAC address .................................................................................................................. 152
6.2.1 Introduction .................................................................................................................................. 152
6.2.2 Preparing for configurations ......................................................................................................... 154
6.2.3 Default configurations of secure MAC address ............................................................................. 154
6.2.4 Configuring basic functions of secure MAC address ..................................................................... 154
6.2.5 Configuring static secure MAC address......................................................................................... 155
6.2.6 Configuring dynamic secure MAC address ................................................................................... 156
6.2.7 Configuring Sticky secure MAC address ........................................................................................ 156
6.2.8 Checking configurations ................................................................................................................ 157
6.2.9 Maintenance ................................................................................................................................. 157
6.2.10 Example for configuring secure MAC address ............................................................................ 157
6.3 Dynamic ARP inspection ............................................................................................................ 159
6.3.1 Introduction .................................................................................................................................. 159
6.3.2 Preparing for configurations ......................................................................................................... 161
6.3.3 Default configurations of dynamic ARP inspection ....................................................................... 161
6.3.4 Configuring trusted interfaces of dynamic ARP inspection .......................................................... 161
6.3.5 Configuring static binding of dynamic ARP inspection ................................................................. 162
6.3.6 Configuring dynamic binding of dynamic ARP inspection ............................................................ 162
6.3.7 Configuring protection VLAN of dynamic ARP inspection ............................................................ 162
6.3.8 Configuring rate limiting on ARP packets on the interface ........................................................... 162
6.3.9 Configuring global ARP packet rate limiting auto-recovery time .................................................. 163
6.3.10 Checking configurations .............................................................................................................. 163
6.3.11 Example for configuring dynamic ARP inspection ...................................................................... 163
6.4 RADIUS ..................................................................................................................................... 166
6.4.1 Introduction .................................................................................................................................. 166
6.4.2 Preparing for configurations ......................................................................................................... 166
6.4.3 Default configurations of RADIUS ................................................................................................. 167
6.4.4 Configuring RADIUS authentication .............................................................................................. 167
6.4.5 Configuring RADIUS accounting .................................................................................................... 168
6.4.6 Checking configurations ................................................................................................................ 168
6.4.7 Example for configuring RADIUS ................................................................................................... 169
6.5 TACACS+ ................................................................................................................................... 170
6.5.1 Introduction .................................................................................................................................. 170
6.5.2 Preparing for configurations ......................................................................................................... 170
6.5.3 Default configurations of TACACS+ ............................................................................................... 171
6.5.4 Configuring TACACS+ authentication ............................................................................................ 171
6.5.5 Configuring TACACS+ accounting .................................................................................................. 172
6.5.6 Configuring TACACS+ authorization .............................................................................................. 172
6.5.7 Checking configurations ................................................................................................................ 173
6.5.8 Maintenance ................................................................................................................................. 173
6.5.9 Example for configuring TACACS+ ................................................................................................. 173
6.6 Storm control ............................................................................................................................ 174
6.6.1 Preparing for configurations ......................................................................................................... 175
6.6.2 Default configurations of storm control ........................................................................................ 175
6.6.3 Configuring storm control ............................................................................................................. 175
6.6.4 Configuring DLF packet forwarding ............................................................................................... 176
6.6.5 Checking configurations ................................................................................................................ 176
6.6.6 Example for configuring storm control ......................................................................................... 176
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
xi
6.7 802.1x ...................................................................................................................................... 177
6.7.1 Introduction .................................................................................................................................. 177
6.7.2 Preparing for configruations ......................................................................................................... 179
6.7.3 Default configurations of 802.1x ................................................................................................... 180
6.7.4 Configuring basic functions of 802.1x ........................................................................................... 180
6.7.5 Configuring 802.1x re-authentication ........................................................................................... 181
6.7.6 Configuring 802.1x timers ............................................................................................................. 181
6.7.7 Checking configurations ................................................................................................................ 182
6.7.8 Maintenance ................................................................................................................................. 182
6.7.9 Example for configuring 802.1x .................................................................................................... 183
6.8 IP Source Guard ........................................................................................................................ 184
6.8.1 Introduction .................................................................................................................................. 184
6.8.2 Preparing for configurations ......................................................................................................... 186
6.8.3 Default configurations of IP Source Guard .................................................................................... 186
6.8.4 Configuring interface trust status of IP Source Guard .................................................................. 186
6.8.5 Configuring IP Source Guide binding ............................................................................................ 186
6.8.6 Checking configurations ................................................................................................................ 188
6.8.7 Example for configuring IP Source Guard ..................................................................................... 188
6.9 PPPoE+ ..................................................................................................................................... 190
6.9.1 Introduction .................................................................................................................................. 190
6.9.2 Preparing for configurations ......................................................................................................... 191
6.9.3 Default configurations of PPPoE+ ................................................................................................. 192
6.9.4 Configuring basic functions of PPPoE+ ......................................................................................... 192
6.9.5 Configuring PPPoE+ packet information ....................................................................................... 193
6.9.6 Checking configurations ................................................................................................................ 195
6.9.7 Maintenance ................................................................................................................................. 195
6.9.8 Example for configuring PPPoE+ ................................................................................................... 195
6.10 Loopback detection ................................................................................................................. 197
6.10.1 Introduction ................................................................................................................................ 197
6.10.2 Preparing for configurations ....................................................................................................... 198
6.10.3 Default configurations of loopback detection ............................................................................ 198
6.10.4 Configuring loopback detection .................................................................................................. 199
6.10.5 Checking configurations .............................................................................................................. 200
6.10.6 Maintenance ............................................................................................................................... 200
6.10.7 Example for configuring loopback detection .............................................................................. 200
6.11 Line detection ......................................................................................................................... 202
6.11.1 Introduction ................................................................................................................................ 202
6.11.2 Preparing for configurations ....................................................................................................... 202
6.11.3 Configuring line detection........................................................................................................... 202
6.11.4 Checking configurations .............................................................................................................. 202
6.11.5 Example for configuring line detection ....................................................................................... 203
7 Reliability ............................................................................................................................ 205
7.1 Link aggregation ........................................................................................................................ 205
7.1.1 Introduction .................................................................................................................................. 205
7.1.2 Preparing for configurations ......................................................................................................... 206
7.1.3 Default configurations of link aggregation .................................................................................... 206
7.1.4 Configuring manual link aggregation ............................................................................................ 207
7.1.5 Configuring static LACP link aggregation....................................................................................... 207
7.1.6 Checking configurations ................................................................................................................ 209
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
xii
7.1.7 Example for configuring manual link aggregation ........................................................................ 209
7.1.8 Example for configuring static LACP link aggregation ................................................................... 211
7.2 Interface backup ....................................................................................................................... 213
7.2.1 Introduction .................................................................................................................................. 213
7.2.2 Preparing for configurations ......................................................................................................... 215
7.2.3 Default configurations of interface backup ................................................................................... 215
7.2.4 Configuring basic functions of interface backup ........................................................................... 215
7.2.5 (Optional) configuring force switching on interfaces .................................................................... 216
7.2.6 Checking configurations ................................................................................................................ 216
7.2.7 Example for configuring interface backup .................................................................................... 217
7.3 Failover ..................................................................................................................................... 219
7.3.1 Introduction .................................................................................................................................. 219
7.3.2 Preparing for configurations ......................................................................................................... 219
7.3.3 Default configurations of failover ................................................................................................. 219
7.3.4 Configuring failover ....................................................................................................................... 220
7.3.5 Checking configurations ................................................................................................................ 220
7.3.6 Example for configuring failover ................................................................................................... 221
7.4 STP ........................................................................................................................................... 223
7.4.1 Introduction .................................................................................................................................. 223
7.4.2 Preparation for configuration ....................................................................................................... 225
7.4.3 Default configurations of STP ........................................................................................................ 225
7.4.4 Enabling STP .................................................................................................................................. 226
7.4.5 Configuring STP parameters .......................................................................................................... 226
7.4.6 Checking configurations ................................................................................................................ 227
7.4.7 Example for configuring STP ......................................................................................................... 227
7.5 MSTP ........................................................................................................................................ 230
7.5.1 Introduction .................................................................................................................................. 230
7.5.2 Preparation for configuration ....................................................................................................... 233
7.5.3 Default configurations of MSTP .................................................................................................... 233
7.5.4 Enable MSTP ................................................................................................................................. 234
7.5.5 Configuring MST domain and its maximum hop count ................................................................ 234
7.5.6 Configuring root bridge/backup bridge ........................................................................................ 235
7.5.7 Configuring device interface and system priority ......................................................................... 236
7.5.8 Configuring network diameter for switch network ...................................................................... 236
7.5.9 Configuring inner path overhead for interfaces............................................................................ 237
7.5.10 Configuring external path cost for interface ............................................................................... 237
7.5.11 Configuring maximum transmitting speed for interface............................................................. 238
7.5.12 Configuring MSTP timer .............................................................................................................. 238
7.5.13 Configuring edge interface .......................................................................................................... 239
7.5.14 Configuring STP/MSTP mode switching ...................................................................................... 239
7.5.15 Configuring link type ................................................................................................................... 240
7.5.16 Configuring root interface protection ......................................................................................... 240
7.5.17 Configuring interface loopguard ................................................................................................. 241
7.5.18 Executing mcheck operation ....................................................................................................... 241
7.5.19 Checking configuration ............................................................................................................... 242
7.5.20 Maintenance ............................................................................................................................... 242
7.5.21 Example for configuring MSTP .................................................................................................... 242
7.6 ERPS ......................................................................................................................................... 248
7.6.1 Introduction .................................................................................................................................. 248
7.6.2 Preparing for configurations ......................................................................................................... 248
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
xiii
7.6.3 Default configurations of ERPS ..................................................................................................... 249
7.6.4 Creating ERPS ring ......................................................................................................................... 249
7.6.5 (Optional) creating ERPS sub-ring ................................................................................................. 251
7.6.6 Configuring ERPS fault detection .................................................................................................. 252
7.6.7 (Optional) configuring ERPS switching control ............................................................................. 253
7.6.8 Checking configurations ................................................................................................................ 254
7.6.9 Maintenance ................................................................................................................................. 254
7.7 RRPS ......................................................................................................................................... 254
7.7.1 Introduction .................................................................................................................................. 254
7.7.2 Preparing for configurations ......................................................................................................... 256
7.7.3 Default configurations of RRPS ..................................................................................................... 257
7.7.4 Creating RRPS ................................................................................................................................ 257
7.7.5 Configuring basic functions of RRPS ............................................................................................. 257
7.7.6 Checking configuration ................................................................................................................. 259
7.7.7 Maintenance ................................................................................................................................. 259
7.7.8 Example for configuring Ethernet ring .......................................................................................... 259
8 OAM ................................................................................................................................... 262
8.1 EFM .......................................................................................................................................... 262
8.1.1 Introduction .................................................................................................................................. 262
8.1.2 Preparing for configurations ......................................................................................................... 263
8.1.3 Default configurations of EFM ...................................................................................................... 264
8.1.4 Configuring basic functions of EFM .............................................................................................. 264
8.1.5 Configuring active functions of EFM ............................................................................................. 265
8.1.6 Configuring passive functions of EFM ........................................................................................... 267
8.1.7 Checking configurations ................................................................................................................ 268
8.1.8 Maintenance ................................................................................................................................. 269
8.1.9 Example for configuring EFM ........................................................................................................ 269
8.2 CFM .......................................................................................................................................... 270
8.2.1 Introduction .................................................................................................................................. 271
8.2.2 Preparing for configurations ......................................................................................................... 272
8.2.3 Default configurations of CFM ...................................................................................................... 273
8.2.4 Enabling CFM ................................................................................................................................ 274
8.2.5 Configuring basic CFM functions .................................................................................................. 274
8.2.6 Configuring fault detection ........................................................................................................... 275
8.2.7 Configuring fault acknowledgement ............................................................................................. 277
8.2.8 Configuring fault location .............................................................................................................. 278
8.2.9 Checking configurations ................................................................................................................ 279
8.2.10 Maintenance ............................................................................................................................... 279
8.2.11 Example for configuring CFM ...................................................................................................... 280
8.3 SLA ........................................................................................................................................... 283
8.3.1 Introduction .................................................................................................................................. 283
8.3.2 Preparing for configurations ......................................................................................................... 283
8.3.3 Default configurations of SLA ........................................................................................................ 284
8.3.4 Creating SLA operations ................................................................................................................ 284
8.3.5 Configuring SLA scheduling ........................................................................................................... 285
8.3.6 Checking configuration ................................................................................................................. 285
8.3.7 Example for configuring SLA ......................................................................................................... 286
9 System management ........................................................................................................... 288
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
xiv
9.1 SNMP ....................................................................................................................................... 288
9.1.1 Introduction .................................................................................................................................. 288
9.1.2 Preparing for configurations ......................................................................................................... 290
9.1.3 Default configurations of SNMP .................................................................................................... 290
9.1.4 Configuring basic functions of SNMP v1/v2c ................................................................................ 291
9.1.5 Configuring basic functions of SNMP v3 ....................................................................................... 292
9.1.6 Configuring other information of SNMP ....................................................................................... 294
9.1.7 Configuring Trap ............................................................................................................................ 294
9.1.8 Checking configurations ................................................................................................................ 295
9.1.9 Example for configuring SNMP v1/v2c and Trap ........................................................................... 296
9.1.10 Example for configuring SNMP v3 and Trap ................................................................................ 298
9.2 KeepAlive ................................................................................................................................. 300
9.2.1 Introduction .................................................................................................................................. 300
9.2.2 Preparing for configurations ......................................................................................................... 300
9.2.3 Default configurations of KeepAlive .............................................................................................. 301
9.2.4 Configuring KeepAlive ................................................................................................................... 301
9.2.5 Checking configurations ................................................................................................................ 301
9.2.6 Example for configuring KeepAlive ............................................................................................... 302
9.3 RMON ...................................................................................................................................... 303
9.3.1 Introduction .................................................................................................................................. 303
9.3.2 Preparing for configurations ......................................................................................................... 304
9.3.3 Default configurations of RMON ................................................................................................... 304
9.3.4 Configuring RMON statistics ......................................................................................................... 304
9.3.5 Configuring RMON historical statistics .......................................................................................... 305
9.3.6 Configuring RMON alarm group ................................................................................................... 305
9.3.7 Configuring RMON event group .................................................................................................... 306
9.3.8 Checking configurations ................................................................................................................ 306
9.3.9 Maintenance ................................................................................................................................. 307
9.3.10 Example for configuring RMON alarm group .............................................................................. 307
9.4 LLDP ......................................................................................................................................... 308
9.4.1 Introduction .................................................................................................................................. 308
9.4.2 Preparing for configurations ......................................................................................................... 310
9.4.3 Default configurations of LLDP ...................................................................................................... 310
9.4.4 Enabling global LLDP ..................................................................................................................... 311
9.4.5 Enabling interface LLDP ................................................................................................................. 311
9.4.6 Configuring basic functions of LLDP .............................................................................................. 311
9.4.7 Configuring LLDP alarm ................................................................................................................. 312
9.4.8 Checking configurations ................................................................................................................ 312
9.4.9 Maintenance ................................................................................................................................. 313
9.4.10 Example for configuring basic functions of LLDP ........................................................................ 313
9.5 Extended OAM .......................................................................................................................... 316
9.5.1 Introduction .................................................................................................................................. 316
9.5.2 Preparation for configuration ....................................................................................................... 317
9.5.3 Default configurations of extended OAM ..................................................................................... 318
9.5.4 Establishing OAM link ................................................................................................................... 318
9.5.5 Configure extended OAM protocols ............................................................................................. 318
9.5.6 Entering remote configuration mode ........................................................................................... 319
9.5.7 (Optional) showing remote extended OAM capacity ................................................................... 319
9.5.8 Configuring remote host name ..................................................................................................... 320
9.5.9 Configuring MTU for the remote device ....................................................................................... 320
Orion Networks A10E/A28E/A28F Configuration Guide
Contents
Orion Networks
xv
9.5.10 Configuring the IP address of the remote device ....................................................................... 321
9.5.11 Configuring interface parameters on the remote device............................................................ 321
9.5.12 Uploading and downloading files on the remote device ............................................................ 323
9.5.13 Configuring remote network management ................................................................................ 326
9.5.14 Configuring remote VLAN ........................................................................................................... 327
9.5.15 Configuring remote QinQ ............................................................................................................ 328
9.5.16 Managing remote configuration files .......................................................................................... 329
9.5.17 Rebooting remote device ............................................................................................................ 330
9.5.18 Checking configuration ............................................................................................................... 330
9.5.19 Maintenance ............................................................................................................................... 331
9.5.20 Example for configuring extended OAM to manage the remote device .................................... 331
9.6 Optical module DDM ................................................................................................................. 333
9.6.1 Introduction .................................................................................................................................. 333
9.6.2 Preparing for configurations ......................................................................................................... 333
9.6.3 Default configurations of optical module DDM ............................................................................ 333
9.6.4 Enabling optical module DDM ...................................................................................................... 334
9.6.5 Enabling optical module DDM to send Trap messages ................................................................. 334
9.6.6 Checking configurations ................................................................................................................ 334
9.7 System log ................................................................................................................................ 335
9.7.1 Introduction .................................................................................................................................. 335
9.7.2 Preparing for configurations ......................................................................................................... 336
9.7.3 Default configurations of system log ............................................................................................ 336
9.7.4 Configuring basic information of system log................................................................................. 337
9.7.5 Configuring system log output ...................................................................................................... 337
9.7.6 Checking configurations ................................................................................................................ 338
9.7.7 Example for outputting system logs to log server......................................................................... 338
9.8 Power monitoring ..................................................................................................................... 339
9.8.1 Introduction .................................................................................................................................. 339
9.8.2 Preparing for configurations ......................................................................................................... 339
9.8.3 Default configurations of power monitoring ................................................................................ 339
9.8.4 Configuring power monitoring alarm ........................................................................................... 340
9.8.5 Checking configurations ................................................................................................................ 340
9.9 CPU monitoring......................................................................................................................... 340
9.9.1 Introduction .................................................................................................................................. 340
9.9.2 Preparing for configurations ......................................................................................................... 341
9.9.3 Default configurations of CPU monitoring .................................................................................... 341
9.9.4 Viewing CPU monitoring information ........................................................................................... 341
9.9.5 Configuring CPU monitoring alarm ............................................................................................... 341
9.9.6 Checking configurations ................................................................................................................ 342
9.10 Ping ........................................................................................................................................ 342
9.11 Traceroute .............................................................................................................................. 342
10 Appendix ........................................................................................................................... 344
10.1 Terms ...................................................................................................................................... 344
10.2 Abbreviations.......................................................................................................................... 349
Orion Networks A10E/A28E/A28F Configuration Guide
Figures
Orion Networks
xvi
Figures
Figure 1-1 Accessing the A10E/A28E through PC connected with Console interface 2 Figure 1-2 Communication parameters configuration in Hyper Terminal 3 Figure 1-3 Networking with the A10E/A28E as Telnet server 3 Figure 1-4 A10E/A28E as Telnet client networking 4 Figure 1-5 Configuring auto-loading 32 Figure 2-1 MAC application networking 39 Figure 2-2 Dividing VLANs 41 Figure 2-3 Typical networking with basic QinQ 46 Figure 2-4 Basic QinQ networking application 49 Figure 2-5 Selective QinQ networking application 52 Figure 2-6 Networking with VLAN mapping based on single Tag 54 Figure 2-7 VLAN mapping application networking 57 Figure 2-8 Interface protection application networking 60 Figure 2-9 Port mirroring principle 63 Figure 2-10 Port mirroring application networking 65 Figure 2-11 Layer 2 protocol transparent transmission application networking 69 Figure 3-1 Configuring ARP networking application 75 Figure 3-2 Layer 3 interface configuration networking 78 Figure 3-3 DHCP typical application networking 81 Figure 3-4 Structure of DHCP packets 81 Figure 3-5 DHCP client networking 83 Figure 3-6 DHCP client networking 85 Figure 3-7 DHCP Relay application networking 86 Figure 3-8 DHCP Snooping networking 89 Figure 3-9 DHCP Snooping networking application 92 Figure 4-1 Traffic classification 98 Figure 4-2 Structure of IP packet head 98 Figure 4-3 Structure of IP priority and DSCP priority 98 Figure 4-4 Structure of VLAN packets 98 Figure 4-5 Structure of CoS priority packets 99 Figure 4-6 SP scheduling 101 Figure 4-7 WRR scheduling 101 Figure 4-8 Configure queue schedule networking 115 Figure 4-9 Rate limiting based on interface 117 Figure 5-1 Mapping relation between IPv4 multicast address and multicast MAC address 121 Figure 5-2 IGMP Snooping application networking 136 Figure 5-3 MVR application networking 138 Figure 5-4 Applying IGMP filtering on the interface 141 Figure 5-5 Applying IGMP filtering in the VLAN 143 Figure 6-1 Configuring secure MAC address 158 Figure 6-2 Principle of dynamic ARP inspection 160 Figure 6-3 Configuring dynamic ARP inspection 164
Orion Networks A10E/A28E/A28F Configuration Guide
Figures
Orion Networks
xvii
Figure 6-4 Configuring RADIUS 169 Figure 6-5 Configuring TACACS+ 174 Figure 6-6 Configuring storm control 177 Figure 6-7 802.1x structure 178 Figure 6-8 Configuring 802.1x 183 Figure 6-9 IP Source Guard principle 185 Figure 6-10 Configuring IP Source Guard 189 Figure 6-11 Accessing the network through PPPoE authentication 191 Figure 6-12 Configuring PPPoE+ 196 Figure 6-13 Loopback detection networking 198 Figure 6-14 Loopback detection application 201 Figure 6-15 Line detection application networking 203 Figure 7-1 Configuring manual link aggregation 210 Figure 7-2 Configuring static LACP link aggregation 211 Figure 7-3 Principles of interface backup 214 Figure 7-4 Application of interface backup in different VLANs 214 Figure 7-5 Configuring interface backup 217 Figure 7-6 Configuring failover 221 Figure 7-7 Network storm due to loopback 223 Figure 7-8 Loop networking with STP 224 Figure 7-9 VLAN packet forward failure due to RSTP 225 Figure 7-10 STP application networking 227 Figure 7-11 Basic concepts of the MSTI network 231 Figure 7-12 MSTI concepts 232 Figure 7-13 Networking of multiple spanning trees instances in MST domain 233 Figure 7-14 MSTP application networking 243 Figure 7-15 RRPS in normal status 255 Figure 7-16 RRPS in switching status 256 Figure 7-17 RRPS application networking 259 Figure 8-1 OAM classification 263 Figure 8-2 Configuring EFM 269 Figure 8-3 Different MD Levels 271 Figure 8-4 Network Sketch Map of MEP and MIP 272 Figure 8-5 CFM application 280 Figure 8-6 SLA application networking 286 Figure 9-1 Working mechanism of SNMP 289 Figure 9-2 SNMP v3 authentication mechanism 293 Figure 9-3 Configuring SNMP v1/v2c and Trap 296 Figure 9-4 Configuring SNMP v3 and Trap 298 Figure 9-5 Configuring KeepAlive 302 Figure 9-6 RMON 303 Figure 9-7 Configuring RMON alarm group 307 Figure 9-8 LLDPDU structure 309 Figure 9-9 Basic TLV structure 309 Figure 9-10 Configuring basic functions of LLDP 314 Figure 9-11 Extended OAM application networking 316 Figure 9-12 Configuring extended OAM to manage the remote device 331 Figure 9-13 Outputting system logs to log servers 338
Orion Networks A10E/A28E/A28F Configuration Guide
Tables
Orion Networks
xviii
Tables
Table 1-1 Function keys description for command line message display characteristics 13 Table 2-1 Interface mode and packet processing 41 Table 3-1 Fields definition of DHCP packets 81 Table 3-2 Common DHCP options 93 Table 4-1 Mapping relationship of local priority, DSCP priority, and CoS priority 100 Table 4-2 Mapping between local priority and queue 100 Table 4-3 Default CoS to local priority and color mapping relationship 108 Table 4-4 Default DSCP to local priority and color mapping relationship 108 Table 9-1 TLV type 309 Table 9-2 Log level 335
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
1
1 Basic configurations
This chapter introduces the basic configuration and configuration process about the A10E/A28E and provides the related configuration applications, including the following chapters:
Accessing the device
CLI
Managing users
Managing files
Configuring clock management
Configuring interface management
Configuring basic information
Task scheduling
Watchdog
Load and upgrade
1.1 Accessing the device
1.1.1 Introduction
The A10E/A28E can be configured and managed in Command Line Interface (CLI) mode or NView NNM network management mode.
The A10E/A28E CLI mode has a variety of configuration modes:
Console mode: it must be used for the first configuration. The A10E/A28E supports the Console interface of RJ-45 type or USB type.
Telnet mode: log in through the Console mode, open Telnet service on the Switch, configure Layer 3 interface IP address, set the user name and password, and then take remote Telnet configuration.
SSHv2 mode: before accessing the A10E/A28E through SSHv2, you need to log in to the A10E/A28E and start the SSHv2 service through the Console interface.
When configuring the A10E/A28E in network management mode, you must first configure Layer 3 interface IP address in CLI, and then configure the A10E/A28E through NView NNM system.
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
2
Note
Note
The configuration steps in this manual are in command line mode.
1.1.2 Accessing from the Console interface
The Console interface is a command interface used for network device to connect to a PC with terminal emulation program. You can take this interface to configure and manage the local device. In this management method, the A10E/A28E can communicate directly without a network, so it is called out-of-band management. You can also perform configuration and management on the A10E/A28E through the Console interface when the network runs out of order.
In the below two conditions, you can only log in to the A10E/A28E and configure it through the Console port:
The A10E/A28E is powered on to start for the first time.
You cannot access the A10E/A28E through Telnet.
When logging in to the A10E/A28E through the Console interface, use the CBL­RS232-DB9F/RJ45-2m cable delivered with the A10E/A28E. If you need to make the Console serial port cable, see A10E/A28E Hardware Description.
If you want to access the A10E/A28E through PC via Console interface, connect Console interface and PC RS-232 serial port, as shown in Figure 1-1; then run the terminal emulation program such as Windows XP Hyper Terminal program in PC to configure communication parameters as shown in Figure 1-2, and then log in to the A10E/A28E.
Figure 1-1 Accessing the A10E/A28E through PC connected with Console interface
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
3
Note
Figure 1-2 Communication parameters configuration in Hyper Terminal
Microsoft is not in support of Hyper Terminal since Windows Vista system. For Windows Vista or Windows 7, download Hyper Terminal program from internet. It is free to download HyperTerminal program.
1.1.3 Accessing from Telnet
You can use a PC to log in to the A10E/A28E remotely through Telnet. You can log in to an A10E/A28E from PC at first, then Telnet other A10E/A28E devices on the network. You do not need to connect a PC to each A10E/A28E.
Telnet service provided by the A10E/A28E includes:
Telnet Server: run the Telnet client program on a PC to log in to the A10E/A28E, and take configuration and management. As shown in Figure 1-3, the A10E/A28E is providing Telnet Server service at this time.
Figure 1-3 Networking with the A10E/A28E as Telnet server Before accessing the A10E/A28E through Telnet, you need to log in to the A10E/A28E
through the Console interface and start the Telnet service. Take the following configurations on the A10E/A28E that needs to start Telnet service.
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
4
Step
Configuration
Description
1
Alpha-A28E#config
Enter global configuration mode.
2
Alpha-A28E(config)#interface ip
if-number
Enter Layer 3 interface configuration mode.
3
Alpha-A28E(config-ip)#ip address
ip-address
[
ip-
mask
] [
vlan-id ]
Alpha-A28E(config-ip)#quit
Configure the IP address for the A10E/A28E and bind the VLAN of specified ID. This VLAN is used to open the Telnet service interface.
4
Alpha-A28E(config)#telnet­server accept port-list { all |
port-list
}
(Optional) configure the interface in support of Telnet function.
5
Alpha-A28E(config)#telnet­server close terminal-telnet
session-number
(Optional) release the specified Telnet connection.
6
Alpha-A28E(config)#telnet­server max-session
session-
number
(Optional) configure device supports maximal Telnet sessions.
Step
Configuration
Description
1
Alpha-A28E#telnet
ip-address
[ port
port-id
]
Log in to a device from Telnet.
Telnet Client: when you connect the A10E/A28E through the PC terminal emulation program or Telnet client program on a PC, then telnet other A10E/A28E and configure/manage them. As shown in Figure 1-4, Switch A not only acts as Telnet server but also provides Telnet client service.
Figure 1-4 A10E/A28E as Telnet client networking Configure Telnet Client device as below.
1.1.4 Accessing from SSHv2
Telnet is lack of security authentication and it transports packet by Transmission Control Protocol (TCP) which exists with big potential security hazard. Telnet service may cause hostile attacks, such as Deny of Service (DoS), host IP deceive, and routing deceiving.
The traditional Telnet and File Transfer Protocol (FTP) transmits password and data in plaintext cannot satisfy users' security demands. SSHv2 is a network security protocol, which can effectively prevent the disclosure of information in remote management through data
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
5
Function
Default value
SSHv2 server function status
Disable
Local SSHv2 key pair length
512 bits
SSHv2 authentication method
password
SSHv2 authentication timeout
600s
Allowable failure times for SSHv2 authentication
20
SSHv2 snooping port number
22
SSHv2 session function status
Enable
Step
Configuration
Description
1
Alpha-A28E#config
Enter global configuration mode.
2
Alpha­A28E(config)#generate ssh-key [
length
]
Generate local SSHv2 key pair and designate its length.
3
Alpha­A28E(config)#ssh2 server
(Optional) start the SSHv2 server. Use the no ssh2 server command to shut down the
SSHv2 server.
4
Alpha­A28E(config)#ssh2 server authentication { password | rsa­key }
(Optional) configure SSHv2 authentication mode. 5
Alpha­A28E(config)#ssh2 server authentication public-key
(Optional) type the public key of clients to the A10E/A28E in rsa-key authentication mode.
6
Alpha­A28E(config)#ssh2 server authentication­timeout
period
(Optional) configure SSHv2 authentication timeout. The A10E/A28E refuses to authenticate and then closes the connection when the client authentication time exceeds this overtemperature threshold.
encryption, and provides greater security for remote login and other network services in network environment.
SSHv2 allows data to be exchanged via TCP and it builds up a secure channel over TCP. Besides, SSHv2 supports other service ports besides standard port 22, thus to avoid illegal attack from network.
Before accessing the A10E/A28E via SSHv2, you must log in to the A10E/A28E through Console interface and starts up SSHv2 service.
The default configuration to accessing the A10E/A28E through SSHv2 is as follows.
Configure SSHv2 service for the A10E/A28E as below.
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
6
Step
Configuration
Description
7
Alpha­A28E(config)#ssh2 server authentication­retries
times
(Optional) configure the allowable failure times for SSHv2 authentication. The A10E/A28E refuses to authenticate and then closes the connection when client authentication failure numbers exceeds this overtemperature threshold.
8
Alpha­A28E(config)#ssh2 server port
port-id
(Optional) configure SSHv2 snooping port number.
When configuring SSHv2 snooping port number, the input parameter cannot take effect until SSHv2 is restarted.
9
Alpha­A28E(config)#ssh2 server session
session-list
enable
(Optional) enable SSHv2 session on the A10E/A28E.
No.
Configuration
Description
1
Alpha-A28E#show telnet-server
Show configurations of the Telnet server.
2
Alpha-A28E#show ssh2 public-key [ authentication | rsa ]
Show the public key used for SSHv2 authentication on the A10E/A28E and client.
3
Alpha-A28E#show ssh2 { server | session }
Show SSHv2 server or session information.
Note
1.1.5 Checking configurations
Use the following commands to check the configuration results.
1.2 CLI
1.2.1 Introduction
CLI is the path for communication between user and the A10E/A28E. You can complete device configuration, monitor and management by executing relative commands.
You can log in to the A10E/A28E through PC that run terminal emulation program or the CPE device, enter into CLI once the command prompt appears.
The features of CLI:
Local configuration via Console interface is available.
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
7
Local or remote configuration via Telnet, Secure Shell v2 (SSHv2) is available.
Protection for different command levels, users in different level can only execute commands in related level.
Different command types belong to different command modes. You can only execute a type of configuration in its related command mode.
You can operate the commands by shortcut keys.
You can view or execute a historical command by transferring history record. The A10E/A28E supports saving the latest 20 historical commands.
Online help is available by inputting "?" at any time.
Smart analysis methods such as incomplete matching and context association, etc. facilitate user input.
1.2.2 Command line level
The A10E/A28E uses hierarchy protection methods to divide command line into 16 levels from low to high.
0–4: visitor, users can execute the commands of ping, clear, and history, etc. in this level;
5–10: monitor, users can execute the command of show and so on;
11–14: operator, users can execute commands for different services like VLAN, IP, etc.;
15: administrator, used for system basic running commands.
1.2.3 Command line mode
Command line mode is the CLI environment. All system commands are registered in one (or some) command line mode, the command can only run under the corresponding mode.
Establish a connection with the A10E/A28E. If the A10E/A28E is in default configuration, it will enter user EXEC mode, and the screen will display:
Alpha-A28E>
Input the enable command and correct password, and then enter privileged EXEC mode. The default password is admin.
Alpha-A28E>enable Password: Alpha-A28E#
In privileged EXEC mode, input the command of config terminal to enter global configuration mode.
Alpha-A28E#config terminal Alpha-A28E(config)#
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
8
Mode
Enter method
Description
User EXEC
Log in to the A10E/A28E, input correct username and password
Alpha-A28E>
Privileged EXEC
In user EXEC mode, input the enable command and correct password.
Alpha-A28E#
Global configuration
In privileged EXEC mode, input the config terminal command.
Alpha-A28E(config)#
Physical layer interface configuration
In global configuration mode, input the interface port port-id command.
Alpha-A28E(config­port)#
Layer 3 interface configuration
In global configuration mode, input the interface ip if-number command.
Alpha-A28E(config­ip)#
VLAN configuration
In global configuration mode, input the vlan vlan-id command.
Alpha-A28E(config­vlan)#
Traffic classification configuration
In global configuration mode, input the class-map class-map- name command.
Alpha-A28E(config­cmap)#
Traffic policy configuration
In global configuration mode, input the policy-map policy- map-name command.
Alpha-A28E(config­pmap)#
Traffic policy configuration binding with traffic classification
In traffic policy configuration mode, input the class-map class- map-name command.
Alpha-A28E(config­pmap-c)#
Access control list configuration
In global configuration mode, input the access-list-map acl- number { deny | permit } command.
Alpha-A28E(config­aclmap)#
Note
Command line prompt "Alpha-A28E" is the default host name. You can use the command of hostname string to modify the host name in privileged EXEC mode.
Some commands can be used both in global configuration mode and other modes, but the accomplished functions are closely related to command line modes.
Generally, in a command line mode, you can go back to the previous level command line mode by the command of quit or exit, but in the privileged EXEC mode, you need to use disable command to go back to user EXEC mode.
Users can go back to privileged EXEC mode through the end command from any command line mode except the user EXEC mode or privileged EXEC mode.
The A10E/A28E supports the following command line modes:
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
9
Mode
Enter method
Description
Service instance configuration
In global configuration mode, input the service cisid level level command.
Alpha-A28E(config­service)#
MST region configuration
In global configuration mode, input the spanning-tree region- configuration command.
Alpha-A28E(config­region)#
Profile configuration
In global configuration mode, input the igmp filter profile profile-number command.
Alpha-A28E(config­igmp-profile)#
Cluster configuration
In global configuration mode, input the cluster command.
Alpha-A28E(config­cluster)#
Shortcut
Description
Up cursor key (↑)
Show previous command if there is any command input earlier; the display has no change if the current command is the earliest one in history records.
Down cursor key ()
Show next command if there is any newer command; the display has no change if the current command is the newest one in history records.
Left cursor key ()
Move the cursor one character to left; the display has no change if the cursor is at the beginning of command.
Right cursor key (→)
Move the cursor one character to right; the display has no change if the cursor is at the end of command.
Backspace
Delete the character before the cursor; the display has no change if the cursor is at the beginning of command.
Tab
Click Tab after inputting a complete keyword, cursor will automatically appear a space to the end; click Tab again, the system will show the follow-up inputting keywords.
Click Tab after inputting an incomplete keyword, system automatically executes partial helps:
System take the complete keyword to replace input if the matched keyword is the one and only, and leave one word space between the cursor and end of keyword;
In case of mismatch or matched keyword is not the one and only, display prefix at first, then click Tab to check words circularly, no space from cursor to the end of keyword, click Space key to input the next word;
If input incorrect keyword, click Tab will change to the next line and prompt error, the input keyword will not change.
1.2.4 Command line shortcuts
The A10E/A28E supports the following command line shortcuts:
Orion Networks A10E/A28E/A28F Configuration Guide
1 Basic configurations
Orion Networks
10
Shortcut
Description
Ctrl+A
Move the cursor to the head of line.
Ctrl+C
Break off some running operation, such as ping, traceroute and so on.
Ctrl+D or Delete
Delete the cursor location characters
Ctrl+E
Move the cursor to the end of line.
Ctrl+K
Delete all characters behind the cursor (including cursor location).
Ctrl+X
Delete all characters before the cursor (except cursor location).
Ctrl+Z
Return to privileged EXEC mode from other modes (except user EXEC mode).
Space or y
When the terminal printing command line information exceeds the screen, continue to show the information in next screen.
Enter
When the terminal printing command line information exceeds the screen, continue to show the information in next line.
1.2.5 Command line help message
Complete help
You can get complete help in the below three conditions:
Click "?" in any command mode to get all commands and their brief description under the command view.
Alpha-A28E>?
The command output is as below.
clear Clear screen enable Turn on privileged mode command exit Exit current mode and down to previous mode help Message about help history Most recent historical command language Language of help message list List command quit Exit current mode and down to previous mode terminal Configure terminal test Test command .
Loading...
+ 346 hidden pages