PLANET Technology does not warrant that the hardware will work properly in all environments and applications,
and makes no warranty and representation, either implied or expressed, with respect to the quality,
performance, merchantability, or fitness for a particular purpose. PLANET has made every effort to ensure that
this User's Manual is accurate; PLANET disclaims liability for any inaccuracies or omissions that may have
occurred.
Information in this User's Manual is subject to change without notice and does not represent a commitment on
the part of PLANET. PLANET assumes no responsibility for any inaccuracies that may be contained in this
User's Manual. PLANET makes no commitment to update or keep current the information in this User's Manual,
and reserves the right to make improvements to this User's Manual and/or to the products described in this
User's Manual, at any time without notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate your
comments and suggestions.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment. This equipment generates, uses,
and can radiate radio frequency energy and, if not installed and used in accordance with the Instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in a residential area is
likely to cause harmful interference in which case the user will be required to correct the interference at whose
own expense.
CE Mark Warning
This device is compliant with Class A of CISPR 32. In a residential environment this equipment may cause
radio interference.
WEEE Warning
To avoid the potential effects on the environment and human health as a result of the presence
of hazardous substances in electrical and electronic equipment, end users of electrical and
electronic equipment should understand the meaning of the crossed-out wheeled bin symbol.
Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE
separately.
Energy Saving Note of the Device
This power required device does not support Standby mode operation.
For energy saving, please remove the power cable to disconnect the device from the power circuit.
Without removing power cable, the device will still consuming power from the power source. In the view of
Saving the Energy and reduce the unnecessary power consuming, it is strongly suggested to remove the
power connection for the device if this device is not intended to be active.
Revision
User’s Manual of PLANET Layer 3 24-/48-Port 10G SFP+ plus 4-Port 100G QSFP28 Managed Switch
Models: XGS-6350-24X4C, XGS-6350-48X2Q4C
Revision: 1.0
Part No: EM-XGS-6350 Series Configuration Guide_v1.0
3.1PORT NUMBER OF THE SWITCH ............................................................................................................. 50
3.2PREPARATION BEFORE SWITCH START UP .............................................................................................. 50
3.3ACQUIRING HELP .................................................................................................................................. 50
CHAPTER 14 CONFIGURATION OF THE PHYSICAL INTERFACE ............................. 129
14.1CONFIGURING PORT DESCRIPTION .................................................................................................... 129
14.2CONFIGURING THE ATTRIBUTES OF THE PORT .................................................................................... 129
14.3RATE CONTROL ................................................................................................................................. 130
25.3STORM CONTROL ............................................................................................................................. 190
25.4RAT E LIMIT ....................................................................................................................................... 190
51.1.1 IP .......................................................................................................................................... 373
51.1.2 IP Routing Protocol .............................................................................................................. 373
51.2CONFIGURING IPADDRESS TASK LIST .............................................................................................. 374
Unless specified, “Managed Switch” mentioned in this users manual refers to the XGS-6350-24X4C/XGS6350-48X2Q4C.
Open the box of the Managed Switch and carefully unpack it. The box should contain the following items:
Quick Installation Guide
DB9 to RJ45 Interface RS232
Console Cable
Rack Mount Accessory Kit
AC Power Cord
XGS-6350-24X4C XGS-6350-48X2Q4C
■ ■
■ ■
■ ■
■ ■
SFP Dust Cap 28 54
If any item is found missing or damaged, please contact your local reseller for replacement.
30
1.2 Product Description
Powerful 100Gbps Solution for All Long-Reach Networks
PLANET XGS-6350-Series is a High-performance Layer 3 Managed Switch that meets the next-generation
Metro, Data Center, Campus and Enterprise network requirements.
The administrator can flexibly choose the suitable transceivers according to the transmission distance or the
transmission speed required to extend the 1G/10G/40G/100G network efficiently. Besides, with high switching
capacity, the XGS-6350-Series can handle extremely large amounts of data in a secure topology linking to
backbone or high capacity servers where audio, video streaming and multicast applications are utilized.
Extractive Power Supply Design to Increase Flexibilty
The XGS-6350-Series is equipped with one extractive 100~240V AC power supply unit, so it is easy to replace
the power for users. Besides, the XGS-6350-Series reserves another backup power slot on the rear panel
where the second AC or DC power can be added to make it a redundant power supply. The redundant power
system is specifically designed to handle the demands of high-tech facilities requiring the highest power
integrity.
Rich Multi-layer Networking Protocols
The XGS-6350-Series comes with the complete Layer 3 managed function with comprehensive protocols and
applications to facilitate the rapid service deployment and management for both the traditional L2 and L3
networks. With support for advanced features, including RIP, RIPng, OSPFv2, OSPFv3, BGP, BGP4+, etc.,
this switch is ideal for the traditional or fully-virtualized data center.
Strong Multicast
The XGS-6350-Series supports abundant multicast features. In Layer 2, it features IPv4 IGMPv1/v2/v3
snooping and IPv6 MLD v1/v2 snooping. With Multicast VLAN Registration (MVR), multicast receiver/sender
control and illegal multicast source detection functions can be had. In Layer 3 multicast protocols, it features
PIM-DM, PIM-SM and PIM-SSM which make the XGS-6350-Series great for any robust networking.
Full IPv6 Support
The XGS-6350-Series supports IPv4-to-IPv6 technologies including IPv4 manual/automatic tunnel, IPv6-to-
IPv4 tunnel, and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) tunnel. It comprehensively
supports IPv6 Neighbor Discovery, DHCPv6, Path MTU Discovery, IPv6-based Telnet, SSH and ACL, meeting
the need of IPv6 network device management and service control.
31
High Reliability
The key components of the XGS-6350-Series are management module, power system and the fan system
that support redundancy design. All system modules support hot-swap and seamless switching without manual
intervention.
It supports In-service Software Upgrade (ISSU) and Graceful Restart (GR) for OSPF/BGP routing protocol,
guaranteeing non-stop user data transmission when the system is upgraded. It supports Bidirectional
Forwarding Detection (BFD) that realizes fault detection and service recovery in seconds through linking with
Layer 2 or Layer 3 protocol.
Excellent and Secure Traffic Control
The XGS-6350-Series is loaded with powerful traffic management and WRR features to enhance services
offered by telecoms and enterprises. The WRR functionalities include wire-speed Layer 4 traffic classifiers and
bandwidth limitation which are particularly useful for multi-tenant unit, multi-business unit, Telco, or network
service applications.
Powerful Security from Layer 2 to Layer 4
The ACL policies supported can classify the traffic by source/destination IP addresses, source/destination MAC
addresses, IP protocols, TCP/UDP, IP precedence, time ranges and ToS. Moreover, various policies can be
conducted to forward the traffic. The XGS-6350-Series also provides IEEE 802.1x port-based access
authentication, which can be deployed with RADIUS, to ensure the port level security and block illegal users.
Thus, the XGS-6350-Series empowers enterprises and campuses to take full advantage of the limited network
resources and guarantees the best performance in VoIP and video conferencing transmissions.
Robust Layer 2 Features
The XGS-6350-Series can be programmed for basic switch management functions such as port speed
configuration, port aggregation, VLAN, Spanning Tree Protocol, WRR, bandwidth control and IGMP snooping.
It also supports 802.1Q tagged VLAN, Q-in-Q, voice VLAN and GVRP Protocol. In addition, the number of
VLAN interfaces is 1K and the number of VLAN IDs is 4K. By supporting port aggregation, the XGS-6350Series allows the operation of a high-speed trunk combined with multiple ports, making it an LACP link
aggregation.
Efficient and Secure Management
For efficient management, the XGS-6350-Series Managed 100Gigabit Switch is equipped with console, Web
and SNMP management interfaces.
With its built-in Web-based management interface, the XGS-6350-Series offers an easy-to-use,
platform-independent management and configuration facility.
The XGS-6350-Series supports standard Simple Network Management Protocol (SNMP) and can be
managed via any standard-based management software.
32
For reducing product learning time, the XGS-6350-Series offers Cisco-like command via Telnet or
console port. Moreover, the XGS-6350-Series offers secure remote management by supporting SSH
connection which encrypts the packet content at each session.
Centralized Hardware Stacking Management
The XGS-6350-Series can be used to build a virtually logical facility. The XGS-6350-Series gives the
enterprises, service providers and telecoms flexible control over port density, uplinks and switch stack
performance. The XGS-6350-Series can connect as a ring for redundancy and ensures that data integrity is
retained even if one switch in the stack fails. You can even hot-swap switches without disrupting the network,
which greatly simplifies the tasks of upgrading the LAN for catering to increasing bandwidth demands.
Flexibility and Extension Solution
The XGS-6350-Series provides 24/48 10Gbps SFP+, 40Gbps QSFP+ and 100Gbps QSFP28 Fiber interfaces.
Each of the SFP+ slots support Dual Speed, 10GBASE-SR/LR or 1000BASE-SX/LX and each of the QSFP28
slots supports native 100 Gigabit Ethernet, 40G and 4 x 10 Gigabit Ethernet modes. Therefore, the
administrator can flexibly choose the suitable SFP transceiver according to not only the transmission distance,
but also the transmission speed required. The distance can be extended from 550 meters to 2km (multi-mode
fiber) or up to 10/20/30/40/50/70/120 km (single-mode fiber or WDM fiber). They are well suited for applications
within the enterprise data centers and distributions.
Redundant Ring, Fast Recovery for Critical Network Applications
The XGS-6350-Series supports redundant ring technology and features strong, rapid self-recovery capability
to prevent interruptions and external intrusions. It incorporates advanced ITU-T G.8032 ERPS (Ethernet Ring
Protection Switching) technology and Spanning Tree Protocol (802.1s MSTP) into customer’s network to
enhance system reliability and uptime in harsh environments. In a certain simple Ring network, the recovery
time could be less than 50ms to quickly bring the network back to normal operation.
33
1.3 Product Features
XGS-6350-24XC
24 10GBASE-SR/LR SFP+ slots, compatible with 1000BASE-SX/LX/BX SFP
4 QSFP28 slots with each supporting native 100 Gigabit Ethernet, 40G and 4 x 10 Gigabit Ethernet modes
RJ45 to DB9 console interface for switch basic management and setup
MNG port for HTTP server access
USB port
XGS-6350-48X2Q4C
48 10GBASE-SR/LR SFP+ slots, compatible with 1000BASE-SX/LX/BX SFP
2 QSFP+ slots with each supporting 40G and 4 x 10 Gigabit Ethernet modes
4 QSFP28 slots with each supporting native 100 Gigabit Ethernet, 40G and 4 x 10 Gigabit Ethernet
modes
RJ45 to DB9 console interface for switch basic management and setup
MNG port for HTTP server access
USB port
IPv4 Features
Static Routing, RIP v1/v2, OSPF and BGP
Policy Routing
BFD for OSFP and BGP
IPv6 Features
ICMPv6, DHCPv6, ACLv6,IPv6 Telnet
IPv6 Neighbor Discovery
Path MTU Discovery
MLD and MLD Snooping
IPv6 Static Routing, RIPng, OSFPv3 and BGP4+
Manual Tunnel, ISATAP Tunnel and 6-to-4 Tunnel
- 802.3ad Link Aggregation Control Protocol (LACP)
- Cisco ether-channel (static trunk)
Supports Spanning Tree Protocol
- STP, IEEE 802.1D (Classic Spanning Tree Protocol)
- RSTP, IEEE 802.1w (Rapid Spanning Tree Protocol)
- MSTP, IEEE 802.1s (Multiple Spanning Tree Protocol, spanning tree by VLAN)
Port mirroring to monitor the incoming or outgoing traffic on a particular port (many to 1)
Loop protection to avoid broadcast loops
Link Layer Discovery Protocol (LLDP)
Ethernet OAM 802.3ah/802.1ag/ITU-Y.1731
Supports G.8032 ERPS (Ethernet Ring Protection Switching)
Quality of Service
Ingress shaper and egress rate limit per port bandwidth control
8 priority queues on all switch ports
- IEEE 802.1p CoS/DSCP/Precedence
- VLAN ID
- Policy-based ingress and egress QoS
Multicast
Supports IPv4 IGMP snooping v1, v2 and v3
Supports IPv6 MLD snooping v1 and v2
Querier mode support
MVR (Multicast VLAN Registration)
- Built-in RADIUS client to cooperate with the RADIUS servers
- RADIUS/TACACS+ users access authentication
Access Control List
- IP-based Access Control List (ACL)
- MAC-based Access Control List (ACL)
- Time-based ACL
DHCP Snooping to filter distrusted DHCP messages
Dynamic ARP Inspection discards ARP packets with invalid MAC address to IP address binding
IP Source Guard prevents IP spoofing attacks
- Four RMON groups (history, statistics, alarms, and events)
- SNMP trap for interface Link Up and Link Down notification
Built-in Trivial File Transfer Protocol (TFTP) client
BOOTP and DHCP for IP address assignment
System Maintenance
- Firmware upload/download via HTTP
- Reset button for system reboot or reset to factory default
- Dual images
DHCP Functions:
- DHCP Relay
- DHCP Option 82
- DHCP Server
User Privilege levels control
Network Time Protocol (NTP), SPAN, RSPAN
Network Diagnostic
- SFP-DDM (Digital Diagnostic Monitor)
- ICMP remote IP ping
Syslog remote alarm
System Log
PLANET NMS System and Smart Discovery Utility for deployment management
Stacking Management
Virtualized multiple XGS-6350-Series switches integrated into one logical device
Single IP address stack management, supporting up to 2 hardware units stacked together
Stacking architecture supports redundant Ring mode
36
1.4 Product Specifications
XGS-6350-24X4C
Product XGS-6350-24X4C XGS-6350-48X2Q4C
Hardware Specifications
QSFP28 Slots
QSFP+ Slots
SFP+ Slots
Console
Management
USB
Dimensions (W x D x H)
Weight
Power Consumption
4 with each supporting native 100/40 Gigabit Ethernet and 4 x 10 Gigabit
Ethernet modes
2, each supports 40 Gigabit
-
24 10GBASE-SR/LR SFP+
interfaces
Compatible with 1000BASESX/LX/BX SFP transceiver
1 x RJ45-to-DB9 serial port (9600, 8, N, 1)
1 x 10/100/1000BASE-T RJ45 port
1 x USB 2.0
442.5 x 364 x 44 mm, 1U height 442 x 404 x 44 mm, 1U height
5990g 8400g
75 watts/210 BTU (maximum)
Ethernet and 4 x 10 Gigabit
Ethernet modes
48 10GBASE-SR/LR SFP+
interfaces
Compatible with 1000BASESX/LX/BX SFP transceiver
147 watts/504.3 BTU
(maximum)
Power Requirements
Number of Power Supply
Bays
Number of Fan Trays
LED
AC 100~240V, 50/60Hz
AC 100~240V, 50/60Hz
2
4 fixed 4
System:
PWR, SYS
Ports:
40G/100G QSFP Port: LNK/ACT
DC 36~72V (Optional power
module)
System:
PWRA, PWRB, Green
SYS, Green
MNG, Green
Ports:
10G SFP+ interfaces:
LNK/ACT, Green
40G/100G QSFP28 interfaces:
LNK/ACT, Green
40G QSFP+ interfaces:
37
Switching Specifications
LNK/ACT, Green
Switch Architecture
Switch Capacity
Switch Throughput
Address Table
Shared Data Buffer
Flow Control
Jumbo Frame
IPv4 Layer 3 Functions
IP Routing Protocol
Multicast Routing Protocol
Store-and-forward
800Gbps/non-blocking 1.92Tbps/non-blocking
960Mpps 1440Mpps@64bytes
32K MAC address table with auto
learning function
64K MAC address table with
auto learning function
4MB 9MB
Back pressure for half duplex
IEEE 802.3x pause frame for full duplex
IEEE 802.3ad LACP/static trunk
Supports 8 groups with 8 ports per trunk group
8 priority queues on all switch ports
Traffic Supervision and Traffic Shaping
Scheduling for priority queues
- Weighted Round Robin (WRR)
- Strict priority (SP)
- SP+WRR
Traffic classification:
- IEEE 802.1p CoS
- DSCP
- DiffServ
- Precedence
- TOS
- VLAN ID
- IP ACL
- MAC ACL
Policy-based ingress and egress QoS
802.1p and DSCP priority remark
IEEE 802.1x port-based network access control
AAA authentication: TACACS+ and IPv4/IPv6 over RADIUS
39
Security Function
Supports Standard and Expanded ACL
Access Control List
Security
AAA
Network Access Control
Management Function
System Configuration
IP-based ACL/MAC-based ACL
Time-based ACL
Up to 1K entries
Port isolation
Port security, supports IP + MAC + port binding
Identification and filtering of L2/L3/L4 based ACL
Defend against DOS or TCP attacks
Suppression of broadcast, multicast and unknown unicast packet
DHCP Snooping, DHCP Option 82
Command line authority control based on user levels
TACACS+ and IPv4/IPv6 over RADIUS
IEEE 802.1x port-based network access control
Console and Telnet
Web browser
SNMP v1, v2c
Secure Management
Interfaces
System Management
SSHv2, SSLv3 and SNMPv3
Maximum 8 sessions for SSH and Telnet connection
Supports both IPv4 and IPv6 Protocols
Supports the user IP security inspection for IPv4/IPv6 SNMP
Supports MIB and TRAP
Supports TFTP, FTP
Supports IPv4/IPv6 NTP
Supports RMON 1, 2, 3, 9 groups
Supports the RADIUS authentication for IPv4/IPv6 Telnet user name and
password
The right configuration for users to adopt RADIUS server’s shell
management
Supports Security IP safety net management function: avoid unlawful
landing at non-restrictive area
Supports TACACS+
Supports SPAN, RSPAN
Event Management
SNMP MIBs
Supports syslog server for IPv4 and IPv6
RFC 1213 MIB-II
RFC 1215 Internet Engineering Task Force
RFC 1271 RMON
RFC 1354 IP-Forwarding MIB
This section describes the hardware features and installation of the Managed Switch on the desktop or rack
mount. For easier management and control of the Managed Switch, familiarize yourself with its display
indicators, and ports. Front panel illustrations in this chapter display the unit LED indicators. Before connecting
any network device to the Managed Switch, please read this chapter completely.
2.1 Hardware Description
2.1.1 Switch Front Panel
The unit front panel provides a simple interface monitoring the switch. Figure 2-1-1, 2-1-2, 2-1-3 and 2-1-4
show the front panel of the Managed Switches.
XGS-6350-24X4C Front Panel
Figure 2-1-1 XGS-6350-24X4C front panel
XGS-6350-48X2Q4C Front Panel
Figure 2-1-2 XGS-6350-48X2Q4C front panel
■ Gigabit TP interface
10/100/1000BASE-T copper, RJ45 twisted-pair: Up to 100 meters.
■ SFP/SFP+ slots
SFP/SFP+ mini-GBIC slot, SFP (Small Factor Pluggable) transceiver module: From 550 meters (Multimode fiber) to 10/30/50/70/120 kilometers (Single-mode fiber).
■ Console Port
The console port is an RJ45 type, RS232 male serial port connector. It is an interface for connecting a
terminal directly. Through the console port, it provides rich diagnostic information including IP address
setting, factory reset, port management, link status and system setting. Users can use the attached RS232
cable in the package and connect to the console port on the device. After the connection, users can run
any terminal emulation program (Hyper Terminal, ProComm Plus, Telix, Winterm and so on) to enter the
startup screen of the device.
■ USB Interface
The USB port is a USB2.0 type; it is an interface for uploading/restoring the configuration/firmware.
■ MGMT Port
The MGMT port is an RJ45 type, an independent interface for Telnet or SSH.
43
2.1.2 LED Indications
The front panel LEDs indicate instant status of port links, data activity, system operation, stack status and
system power, and helps monitor and troubleshoot when needed.
44
XGS-6350-24X4C
System
LED Color Function
PWR
Green
SYS Green
Interfaces
Lights to indicate that the Switch has power.
Power is off.
Off
Blinks to indicate the system diagnosis is completed; lights to indicate the system is
normally starting up.
Figure 2-1-3 XGS-6350-24X4C front panel
LED Color Function
Blinks to indicate the data is transmitting and receiving through the port; lights to indicate
LNK/ACT Green
the link on the port is normal.
40G Status LED (Divided into 4 10G)
LED Color Function
Operating in 100G mode, the LED does not light; when the QSFP+ corresponding port
LNK/ACT
Green
(CG1~CG4)
indicator is lit, 4 indicators indicate the LINK/ACT status of the 4 10GE ports
corresponding to the QSFP+ port.
45
XGS-6350-48X2Q4C
Figure 2-1-4 XGS-6350-48X2Q4C front panel
System
LED Color Function
Green
PWRA
Lights to indicate that the Switch has power.
PWRB
SYS Green
MNG
Off
Power is off.
Blinks to indicate the system diagnosis is completed; lights to indicate the system is normally
starting up.
Green
Lights to indicate that the Switch has connected the Ethernet cable to management port.
Off
Lights to indicate that the Switch has not connected the Ethernet cable to management port.
Interfaces
LED Color Function
LNK/ACT Green
Blinks to indicate the data is transmitting and receiving through the port; lights to indicate the
link on the port is normal.
40G BREAKOUT LED
LED Color Function
LNK/ACT
(1~4)
Operating in 100Gbps on 4 QSFP28 ports and 40Gbps on 2 QSFP+ ports, the BREAKOUT
Green
LED does not light; when you configure the interface dividing into 4 10G ports through
configuration, the BREAKOUT LED indicators will light up.
46
2.2 Switch Installation
This section describes how to install your Managed Switch and make connections to the Managed Switch.
Please read the following topics and perform the procedures in the order being presented. To install your
Managed Switch on a desktop or shelf, simply complete the following steps.
2.2.1 Desktop Installation
To install the Managed Switch on desktop or shelf, please follow these steps:
Step 1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch.
Step 2: Place the Managed Switch on the desktop or the shelf near an AC power source, as shown inFigure
2-2-1.
Figure 2-2-1 Place the Managed Switch on the desktop
Step 3: Keep enough ventilation space between the Managed Switch and the surrounding objects.
When choosing a location, please keep in mind the environmental restrictions discussed in
Chapter 1, Section 4 under Specifications.
Step 4:Connect the Managed Switch to network devices.
Connect one end of a standard network cable to the 10/100/1000 RJ45 ports on the front of the
Managed Switch and connect the other end of the cable to the network devices such as printer servers,
workstations or routers, etc.
Connection to the Managed Switch requires UTP Category 5 network cabling with RJ45
tips. For more information, please see the Cabling Specification in Appendix A.
47
Step 5:Supply power to the Managed Switch.
Connect one end of the power cable to the Managed Switch.
Connect the power plug of the power cable to a standard wall outlet.
When the Managed Switch receives power, the Power LED should remain solid Green.
2.2.2 Rack Mounting
To install the Managed Switch in a 19-inch standard rack, please follow the instructions described below:
Step 1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the front side.
Step 2: Attach the rack-mount bracket to each side of the Managed Switch with supplied screws attached to
the package.
Figure 2-2-2 shows how to attach brackets to one side of the Managed Switch.
Figure 2-2-2 Attach brackets to the Managed Switch.
You must use the screws supplied with the mounting brackets. Damage caused to the
parts by using incorrect screws would invalidate the warranty.
Step 3: Secure the brackets tightly.
Step 4: Follow the same steps to attach the second bracket to the opposite side.
Step 5: After the brackets are attached to the Managed Switch, use suitable screws to securely attach the
brackets to the rack, as shown in Figure 2-2-3.
48
Figure 2-2-3 Mounting SGS-6341 Series in a Rack
Step 6: Proceed with Steps 4 and 5 of Session 2.2.1 Desktop Installation to connect the network cabling and
supply power to the Managed Switch.
■ AC Power Receptacle
Compatible with electrical services in most areas of the world, the Managed Switch’s power supply
automatically adjusts to line power in the range of 100-240VAC and 50/60 Hz.
Plug the female end of the power cord firmly into the receptacle on the rear panel of the Managed Switch.
Plug the other end of the power cord into an electrical outlet and then the power will be ready.
49
Chapter 3 Configuration Preparation
The chapter mainly describes the following preparatory works before you configure the switch at
the first time:
Port number of the switch
Preparation before switch startup
How to get help
Command mode
Cancelling a command
Saving configuration
3.1 Port Number of the Switch
The physical port of the switch is numbered in the <type><slot>/<port> form. The type-to-name
table is shown as follows:
Interface Type Name Simplified Name
10M Ethernet Ethernet e
100M fast Ethernet FastEthernet f
1000M Ethernet GigaEthernet g
The expansion slot number to mark and set ports must be the number 0. Other expansion slots
are numbered from left to right, starting from 1.
The ports in the same expansion slot are numbered according to the order from top to bottom and
the order from left to right, starting from 1. If only one port exists, the port number is 1.
Note:
Ports in each kind of modulars must be numbered sequently from top to bottom and from left to
right.
3.2 Preparation Before Switch Startup
Do the following preparatory works before the switch is configured:
(1) Set the switch’s hardware according to the requirements of the manual.
(2) Configure a PC terminal simulation program.
(3) Determine the IP address layout for the IP network protocols.
3.3 Acquiring Help
Use the question mark (?) and the direction mark to help you enter commands:
Enter a question mark. The currently available command list is displayed.
50
Switch> ?
Enter several familiar characters and press the space key. The available command list
starting with the entered familiar characters is displayed.
Switch> s?
Enter a command, press the space key and enter the question mark. The command
parameter list is displayed.
Switch> show ?
Press the “up” key and the commands entered before can be displayed. Continue to press
the “up” key and more commands are to be displayed. After that, press the “down” key and
the next command to be entered is displayed under the current command.
3.4 Command Modes
The command line interfaces for the switch can be classified into several modes. Each command
mode enables you to configure different groupware. The command that can be used currently is
up to the command mode where you are. You can enter the question mark in different command
modes to obtain the available command list. Common command modes are listed in the following
table:
Command
Mode
System
monitoring
mode
User mode Log in. Switch> Run
Management
mode
Office
configuration
mode
Port
configuration
mode
Login Mode Prompt Exit Mode
Ctrl-p
Enter
power is on.
Enter
in user mode.
Enter
management mode.
Enter the
command in office
configuration mode,
such as
after the
enter
enable
or
config
interface
interface f0/1
in
monitor# Run
Switch# Run
Switch_config# Run
Switch_config_f0/1# Run
.
quit
exit
exit
exit
directly back to the
management mode.
exit
directly back to the
management mode.
.
or
or
or
or
quit
quit
quit
quit
.
.
or
or
Ctrl-z
Ctrl-z
to
to
Each command mode is unsuitable to subsets of some commands. If problem occurs when you
enter commands, check the prompt and enter the question mark to obtain the available command
list. Problem may occur when you run in incorrect command mode or you misspelled the command.
Pay attention to the changes of the interface prompt and the relative command mode in the
following case:
To cancel a command or resume its default properties, add the keyword “no” before most commands. An
example is given as follows:
no ip routing
3.6 Saving Configuration
You need to save configuration in case the system is restarted or the power is suddenly off. Saving
configuration can quickly recover the original configuration. You can run write to save configuration in
management mode or office configuration mode.
52
Chapter 4 System Management Configuration
4.1 File Management Configuration
4.1.1 Managing the file system
The filename in flash is no more than 20 characters and filenames are case insensitive.
GP3616 SWITCH is mainly consisted of MSU. As MSU needs IOS, download BIN file to MSU. Ensure the
suffix of the BIN file is .bin. The BIN file name can be arbitrary.
In GP3616 file system, IOS file with the suffix .bin is used for MSU startup. The file name is arbitrary.
BOOTROM will select a bin startup automatically based on the sequence. tiger.blob file is applied on the PON
program of GP3616 board card. startup-config is the system configuration file; config.db is the ONU
configuration database file; and if index-config is the port mapping configuration file.
4.1.2 Commands for the file system
The boldfaces in all commands are keywords. Others are parameters. The content in the square brakcet “[ ]”
is optional.
Command Purpose
format
dir
[filename] Displays files and directory names. The file name in the symbol “[]” means to
delete
filename Deletes a file. The system will prompt if the file does not exist.
md
dirname Creates a directory.
rd
dirname Deletes a directory. The system will prompt if the directory is not existed.
more
filename Displays the content of a file. If the file content cannot be displayed by one
cd
Changes the path of the current file system.
pwd
Displays the current path.
Formats the file system and delete all data.
display files starting with several letters. The file is displayed in the following
format:
Index number file name <FILE> length established time
page, it will be displayed by pages.
4.1.3 Starting up from a file manually
monitor#boot flash <local_filename>
The command is to start an SWITCH software in the flash, which may contain multiple SWITCH softwares.
53
Description
Parameters Description
local_filename
file name in the flash, the user must enter the file name
54
Example
monitor#boot flash switch.bin
4.1.4 Updating software
User can use this command to download SWITCH system software locally or remotely to obtain version update
or the custom-made function version.
There are two ways of software update in monitor mode.
55
Through TFTP protocol
monitor#copy tftp flash [ip_addr]
The command is to copy file from the tftp server to the flash in the system. After you enter the command, the
system will prompt you to enter the remote server name and the remote filename.
56
Description
Parameters Description
ip_addr
Means the IP address of the TFTP server. If this parameter is not
designated, you are prompted to enter the IP address after the
copy command is run.
57
Example
The following example shows a main.bin file is read from the server, written into the SWITCH and changed
into the name switch. Bin.
The SWITCH configuration is saved as a file, the filename is startup-config. You can use commands similar to
software update to update the configuration.
58
Through TFTP protocol
monitor#copy tftp flash startup-config
4.1.6 Using ftp to perform the update of software and configuration
switch #copy ftp flash [ip_addr]
Use ftp to perform the update of software and configuration in formal program management. Use the copy
command to download a file from ftp server to SWITCH, also to upload a file from file system of the SWITCH
to ftp server. After you enter the command, the system will prompt you to enter the remote server name and
remote filename.
copy{ftp:[[[//login-name:[loginpassword]@]location]/directory]/filename}|flash:filename>}{flash<:filename>|ftp:[[[//login-name:[loginpassword]@]location]/directory]/filename}<blksize><mode><type>
59
Description
Parameters Description
login-nam Username of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy
command is run.
login-password Password of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy
command is run.
ip_addr
active Means to connect the ftp server in active mode.
passive Means to connect the ftp server in passive mode.
type Set the data transmission mode (ascii or binary)
IP address of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy
command is run.
60
Example
The following example shows a main.bin file is read from the server, written into the SWITCH and changed
into the name switch.bin.
switch#copy ftp flash
Prompt:ftp user name[anonymous]? login-nam
Prompt:
Prompt:Source file name[]?main.bin
Prompt:Remote-server ip address[]?192.168.20.1
Prompt:Destination file name[main.bin]?switch.bin
Or
1) When the ftp server is out of service, the wait time is long. If this problem is caused by the
tcp timeout time (the default value is 75s), you can configure the global command ip tcp
synwait-time to modify the tcp connection time. However, it is not recommended to use it.
2) When you use ftp in some networking conditions, the rate of data transmission might be
relatively slow. You can properly adjust the size of the transmission block to obtain the best
effect. The default size is 512 characters, which guarantee a relatively high operation rate in
most of the networks.
4.2 Basic System Management Configuration
4.2.1 Configuring Ethernet IP Address
monitor#ip address <ip_addr> <net_mask>
This command is to configure the IPaddress of the Ethernet.,The default IP address is 192.168.0. 1,and the
network mask is255.255.255.0.
61
Description
Parameters Description
ip_addr
IP address of the Ethernet
net_mask
Mask of the Ethernet
62
Example
monitor#ip address 192.168.1.1 255.255.255.0
4.2.2 Setting the Default Route
monitor#ip route default <ip_addr>
This command is used to configure the default route. You can configure only one default route.
63
Description
Parameters Description
ip_addr
IP address of the gateway
64
Example
monitor#ip route default 192.168.1.1
4.2.3 Using Ping to Test Network Connection State
monitor#ping <ip_address>
This command is to test network connection state.
65
Description
Parameters Description
ip_address
Stands for the destination IP address
66
Example
monitor#ping 192.168.20.100
PING 192.168.20.100: 56 data bytes
64 bytes from 192.168.20.100: icmp_seq=0. time=0. ms
64 bytes from 192.168.20.100: icmp_seq=1. time=0. ms
64 bytes from 192.168.20.100: icmp_seq=2. time=0. ms
64 bytes from 192.168.20.100: icmp_seq=3. time=0. ms
The system uses the line command to configure terminal parameters. Through the command, you can
configure the width and height that the terminal displays.
5.2 Configuration Tasks
The system has four types of lines: console, aid, asynchronous and virtual terminal. Different systems have
different numbers of lines of these types. Refer to the following software and hardware configuration guide for
the proper configuration.
Line Type Interface Description Numbering
CON(CTY)
VTY
Console
Virtual and
asynchrono
us
To log in to the system for
configuration.
To connect Telnet, X.25 PAD, HTTP
and Rlogin of synchronous ports
(such as Ethernet and serial port)
on the system
5.2.1 Relationship between Line and Interface
0
32 numbers starting from 1
68
Relationship between Synchronous Interface and VTY Line
The virtual terminal line provides a synchronous interface to access to the system. When you connect to the
system through VTY line, you actually connects to a virtual port on an interface. For each synchronous interface,
there can be many virtual ports.
For example, if several Telnets are connecting to an interface (Ethernet or serial interface).
Steps for configuring VTY:
(1) Log in to the line configuration mode.
(2) Configure the terminal parameters.
Note: The serial port terminal and telnet terminal may log out the system if they log on to SWITCH
without any operation within a certain time. The timeout can be configured.
For VTY configuration, refer to the section “VTY configuration example”.
5.3 Monitor and Maintenance
Runshow line to checkthe VTYconfiguration.
5.4 Browsing Logs
By default, the system will export the logs to the console port.
After the terminal monitor command is set on the telnet line, the logs will be exported to this line.
By default the logs will not be exported to the cache and cannot be browsed after you run show log. After you
run logging buffer size to set the log cache, you can run show log to browse the log information.
5.5 VTY Configuration Example
It shows how to cancel the limit of the line number per screen for all VTYs without more prompt:
SSH client can provide a secure and encrypted communication link through SSH server and other devices.
This connection has the same functions as those of Telnet. SSH server supports the following encryption
algorithms: des, 3des and blowfish.
6.1.2 SSH Client
SSH client runs on the basis of the SSH protocol, providing authentication and encryption. Due to the
application of authentication and encryption, SSH client ssh client allows to establish secure communication
in unsecure network environment between our’s communication devices or between other devices that support
ssh server. SSH client supports the following encryption algorithms: des, 3des and blowfish.
6.1.3 Attribute Realization
SSH server and SSH client support SSH 1.5. Both of them supports the shell application.
6.2 Configuration Tasks
6.2.1 Configuring the Authentication Method List
SSH server adopts the login authentication mode. SSH server uses the default authentication method list by
default.
In global configuration mode, the following command can be used to configure the authentication method list.
Command Purpose
ip sshd auth-method STRING Configure the authentication method list.
The length of the authentication method's
name is no more than 20 characters.
6.2.2 Configuring Access List
In order to control SSH server to access other devices, you can configure ACL for SSH server.
In global configuration mode, the following command can be used to configure the timeout time.
Command Purpose
ip sshd access-class STRING Configures ACL. The length of the access list's
name is no more than 19 characters.
6.2.3 Configuring the Authentication Timeout Time
After SSH client connects SSH server successfully, the SSH server will close the connection if the
authentication cannot be passed during the configured time.
70
In global configuration mode, the following command can be used to configure the authentication timeout.
Command Purpose
ip sshd timeout <60-65535> Configure the authentication timeout time.
6.2.4 Configuring the Authentication Retry Times
If the times for failed authentications exceed the maximum times, SSH server will not allow you to retry
authentication and the system enters the silent period. The maximum times for retrying authentication is 6 by
default.
In global configuration mode, the following command can be used to configure the authentication retry times.
Command Purpose
ip sshd auth-retries <0-65535> Configures the authentication retry times.
6.2.5 Configuring the Login Silence Period
The system enters in the silent period when the authentication retry times exceed the threshold. The silence
period is 60s by default.
In global configuration mode, the following command can be used to configure the silence period.
Command Purpose
ip sshd silence-period <0-3600> Configures the login silence period
6.2.6 Enabling Encryption Key Saving Function
Enable ssh server and the initial encryption key needs to be calculated. The process may take one to two
minutes. When enabling the encryption key saving function, the initial encryption key is saved in the flash.
When enabling ssh server in a second time, the encryption key will be read first.
sftp function is disabled by default. Use the following command to enable sftp function in global configuration
mode:
Command Purpose
ip sshd save Enable encryption key saving function.
6.2.7 Enabling SFTP Function
The SFTP function refers to the secure file transmission system based on SSH, of which the authentication
procedure and data transmission are encrypted. Though it has low transmission efficiency, network security is
highly improved.
SFTP function is disabled by default. Run following command to enable SFTP function in global configuration
mode.
Command Purpose
ip sshd sftp Enable sftp function.
71
6.2.8 Enabling SSH Server
Ssh server is disabled by default. WHEN SSH server is enabled, a RSA key pair will be generated and then
listens the connection request from SSH client. The whole process probably requires one or two minutes.
The following command can be used in global configuration mode to enable SSH server:
Command Purpose
ip sshd enable Enable SSH server. The digit of the password is
1024.
6.3 Configuration Example of SSH Server
The following configuration allows the host whose IP is 192.168.20.40 to access SSH server, while the local
user database will be used to authenticate the user.
6.3.1 ACL
ip access-list standard ssh-acl
permit 192.168.20.40
6.3.2 Global Configuration
aaa authentication login ssh-auth local
ip sshd auth-method ssh-auth
ip sshd access-class ssh-acl
SNMP is a protocol for the application layer.It provides the format for the packets which are transmitted
between NMS and agent.
SNMP management server is a part of the network management system, such as CiscoWorks.
SNMP agent includes the MIB variable and the SNMP management server can be used to browse or change
these variables’ values.The management server can get the values from the agent or save these variables in
the agent.The agent collects data from MIB.MIB is the database of equipment parameters and network data.
73
SNMP Notification
When a special event occurs, the system will send an inform to the SNMP management server.For example,
when the agent system runs into a incorrect condition, it will send a message to the management server.
The SNMP notification can be sent as a trap or a inform request.Because the receiver receives a trap and
does not send any response, the transmitter hence cannot confirm whether the trap is received. In this way,
the trap is unreliable.Comparatively, the SNMP management server uses SNMP to respond PDU, which is
acted as a response of this message.If the management server does not receive the inform request, it will not
transmit a response.If the transmitter does not receives the response, it will transmit the inform request again.In
this way, the inform has more chance to arrive the planned destination.
7.2 SNMP Tasks
Configuring idle time value
Configuring the time value of waiting for acknowledgement
Configuring busy time value of remote end
Configuring time value of Response
Configuring the time of reject
Configuring the redial times
Configuring the size of window for resend
Configuring the size of accumulated data packet
Setting the acknowledgement time-delay
Setting the maximum numbers of acknowledgement
Showing LLC2 link information
Debugging LLC2 link information
7.3 LLC2 Configuration Tast
7.3.1 Configuring Idle Time Value
The command is used for controlling the frequency of query at the idle time (no data exchanged)
The command “no” can be used for restoring to the default value.
Command Purpose
llc2 idle-time
[no]
[seconds] Used for controlling the frequency of query at the idle
time (no data exchanged). seconds:The interval
seconds of sending RR frame at the idle time. The
maximum is 60 seconds, the minimum is 1 second, and
the default is 10 seconds.
Configuration mode: Interface Configuration
Notes:
At idle time, no I (information) frame is exchanged and RR (receive ready) frame is sent to the
remote end periodically to tell the remote end that the local end is ready to receive data. The
relative small value should be set for ensuring the prompt advice to the remote end. If the value is
set too small, too many RR frames is likely to be sent on the network.
Example: Setting RR frame sent every 12 seconds
74
int ethernet1/1
llc2 idle-time 12
7.3.2 Configuring the Time Value of Waiting for Acknowledgement
Command Purpose
llc2 t1-time
[no]
Configuration mode: Interface configuration
Notes:
When the local end sends I frame, it will wait for remote acknowledgement. If no acknowledgement
is received within a given time, the I-frame will be resent. The relative big value should be set on
the network where the data is transmitted at a slow rate.
Example:Setting 12 seconds as the time value of waiting for acknowledgement.
int ethernet1/1
llc2 t1-time 12
[seconds] Used for controlling the waiting time of expecting remote
acknowledgement. The command “no” can be used for
restoring to the default value.
of waiting for remote acknowledgement. The maximum
is 60 seconds, the minimum is 1 second and the default
is 1 second.
Seconds The seconds
7.3.3 Configuring Busy Time Value of Remote Terminal
Command Purpose
llc2 tbusy-time
[no]
[seconds] Used for controlling the waiting time when the remote
end is busy. The command “no” can be used for
restoring to the default value. Seconds The waiting
seconds when the remote end is busy. The maximum is
60 seconds, the minimum is 1 second and the default is
10 seconds.
Configuration mode: Interface configuration
Notes:
a LLC2 connective end is able to inform the opposite end that local end is busy and prevent the
opposite end from sending data to local end by sending a RNR (receive not ready) The relative big
value can be set for averting the timeout.
Example: Setting 12 seconds as the busy time value of remote end.
int ethernet1/1
llc2 tbusy-time 12
7.3.4 Configuring Time Value of Response
The command is used for controlling the time of waiting for the response of remote end. The command “no”
can be used for restoring to the default value.
Command Purpose
llc2 tpf-time
[no]
[seconds] used for controlling the time of waiting for the response
of remote end. The command “no” can be used for
restoring to the default value. Seconds :The seconds of
waiting for the response of remote end. The maximum
is 60 seconds, the minimum is 1 second, and the default
is 1 second.
75
Configuration Mode: Interface Configuration
Notes:
A LLC2 connective end sometimes needs to know the status of opposite end. For this purpose, a
command frame that requires a response from the opposite end needs to be sent. When the
opposite end receives the command frame, it will reply a response frame. If the error occurs in the
process, the send end will keep waiting. In order to avoid the situation, a clock needs to be enabled.
When the arrival time is hit, the clock will think that the error occurs and it will send a separate
command frame. The command is used for setting the time of waiting for the response of the
opposite end to the command frame.
Example: Setting 12 seconds as the time of waiting for the response of the opposite end.
int ethernet1/1
llc2 tpf-time 12
7.3.5 Configuring the Time of Rejection
The command is
Command Purpose
llc2 trej-time
[no]
[seconds] Used for controlling the time of waiting for the response
of remote end to the reject frame. The command “no”
can be used for restoring to the default value. Seconds:
The seconds of waiting when the remote end is
busy. The maximum is 60 seconds, the minimum is 1
second and the default is 3 seconds.
Configuration mode: Interface configuration
Notes:
The data receive and send on the two ends of LLC2 link is carried out on the set sequence. When
a LLC2 connective end receives I frame of opposite end whose sequence number is not the
expected one, it will send a REJ (reject) frame and enable a clock. If no response is made at the
arrival time, LLC2 link will be disconnected. The command is used for setting the time of waiting
for the response of the opposite end to the REJ (reject) frame.
Example: Setting 12 seconds as the waiting time.
int ethernet1/1
llc2 trej-time 12
7.3.6 Configuring the Redial Times
The command is
Command Purpose
llc2 n2 retry-count
[no]
Used for controlling the times of re-sending the frame.
The command “no” can be used for restoring to the
default value. retry-count:The times of resending frame.
The maximum is 255, the minimum is 1 and the default
is 8.
Configuration mode: Interface configuration
Notes:
When one end of LLC2 sends the data to the opposite end, it will wait for the acknowledgement of
the opposite end. If the opposite end does not send the acknowledgement within a given time, the
local end will resend the data. But the time of resend shall be limited. When the value of resend
times exceeds retry-count, LLC2 will be disconnected. The command is used for setting the times
of retry-count.
76
Example: Setting the times of re-send as 12
int ethernet1/1
llc2 n2 12
7.3.7 Configuring the Size Of Window for Resending
The command is
Command Purpose
llc2 local-window packet-count
[no]
Configuration mode: Interface configuration
Notes:
When one end of LLC2 link sends data to the opposite end, it can only send a certain amount of
data before waiting for the acknowledgement of the opposite end. The command is used for setting
the maximum value. When the set value is too big, it may lead to the loss of data because the
opposite end is not able to receive all the data.
Used for controlling the maximum size of I frame send
(namely the size of window for resend) when I frame is
not confirmed. The command “no” can be used for
restoring to the default value. packet-count:The
maximum size of I frame send. The maximum is 127,
the minimum is 1 and the default is 7.
Example: Setting the size of send window as 12.
int ethernet1/1
llc2 local-window 12
7.3.8 Configuring the Size of Accumulated Data Packet
The command is
Command Purpose
llc2 holdqueue [packet-count
[no]
Configuration mode: Interface configuration
Notes:
When the opposite end is busy, one end of LLC2 link is not able to send data (I frame). All the data
shall be reserved before the busyness of the opposite end is cleared. But the reserved amount is
limited. The command is used for setting the data amount to be reserved.
Example: Setting maximum data amount to be reserved as 120.
int ethernet1/1
llc2 holdqueue 120
] Used for controlling the maximum local accumulated
size of data packet when I frame (the remote end is
busy) cannot be sent. The command “no” can be used
for restoring to the default value. packet-count:The
maximum size of data packets reserved by I frame
when I frame is not confirmed.
7.3.9 Setting the Acknowledgement Time-Delay
When an I-frame (information frame) is received, an acknowledgement frame shall be sent immediately. In
order to reduce the unnecessary acknowledgement, the acknowledgement can be delayed. If information
frame is sent, an information frame will be sent as an acknowledgement instead of acknowledge frame. When
77
the information frame sent by the opposite end exceeds the acknowledged maximum size, an acknowledge
frame will be sent immediately rather than at the timeout. The command below can be used for setting the
value.
Command Purpose
llc2 ack-delay-time
seconds Setting the acknowledgement time-delay
7.3.10 Setting the Maximum Numbers of Acknowledgement
When the information frame sent by the opposite end exceeds the maximum number of acknowledgement in
the process of acknowledging the time delay, the acknowledgement frame shall be sent immediately for
clearing the network timeout perceived by the opposite end. The command below can be used for setting the
value.
Command Purpose
llc2 ack-max
numberSetting the acknowledgement time-delay.
7.3.11 Showing LLC2 Link Information
Command Purpose
show llc interface [type
Configuration Mode: Interface, configuration and global
Notes:
number] Used for showing the related information of LLC2 link
connection.
Showing the related information of LLC2 link connection. Under interface mode, the command
“show llc” is used for displaying LLC2 link information of the interface.
Example: Under interface mode, the command “show llc” is used for showing llc2 information on ethernet1/1.
int ethernet1/1
sho llc ethernet1/1
7.3.12 Debugging LLC2 Link Information
The command is
Command Purpose
debug llc2 [packet|error|state
Configuration mode: Management Mode
Notes:
packet,Opening the debug switch of LLC2 link status information
Example, opening the debug switch of LLC2 link.
debug llc2 packet
debug llc2 state
debug llc2 error
] Used for opening LLC2 debug switch.
78
7.4 Example of LLC2 Configuration
The number of LLC2 frame received before the response can be configured. For example, it is supposed that
two information frames are received at the time 0 rather than at the maximum number 3, the responses of
these frames are not sent. If the third frame that makes the router response is not received within 800 ms, the
response will be transmitted as the time-delay timer is activated.
In this connection, as it is told that all the frames are received, the counter that calculates the maximum number
of information frame is reset as 0.
7.4.1 Configuring SDLC as Two-Way and Concurrent Mode
SDLC two-way and concurrent mode allows master SDLC link station to use a full duplex serial circuit. When
an outstanding polling occurs, the master SDLC link station is able to send the data to the slave station. The
two-way and concurrent mode works only on the side of SDLC master station. In the slave link station, it
response to the polling sent from the master station.
SDLC two-way and concurrent mode runs in the multi-branch link environment or point-to-point link
environment.
In the multi-branch link environment, a two-way and concurrent master station is able to poll a slave station
and receive the data from the slave station and send the data (information frame) to other slave stations.
In the point-to-point link environment, so long as no maximum limit on reaching the window, a two-way and
concurrent master station is able to send the data (information frame) to the slave station even if there is an
outstanding polling.
Any one of the commands can be used under interface configuration mode for activating the two-way and
concurrent mode:
Command Purpose
sdlc simultaneous full-datamode
sdlc simultaneous half-datamode
Setting the send of data from master station to the
polled slave station and receive of data from it.
Shutting down the master station sending the data to
the slave station.
7.4.2 Configuring SDLC Timer and Re-Sending Times
When SDLC workstation sends frame, it will wait for the response of receive end. The response indicates the
frame has been received. The response time allowed by the router before re-sending frame can be amended.
The times of re-sending the frame by the software can be set before terminating SDLC session process.
Through controlling these values, by controlling these values, the network overhead can be reduced in
continuing to detect the transmitted frame.
One or two commands below can be used under interface configuration mode for configuring SDLC timer and
retransmission times:
Command Purpose
79
sdlc t1
milliseconds Controlling the total time of software of waiting for
response.
sdlc n2 retry-count
Configuring the times of software of retrying a timeout
operation.
7.4.3 Configuring the Number of SDLC Frame and Information Frame
The maximum length of input frame and the maximum number of the information frame (or the size of window)
received before router sends response to the receive end can be configured. When the configured value is
relative big, the network overhead can be reduced.
The command below can be used under interface configuration mode for configuring SDLC frame and number
of information frame.
Command Purpose
sdlc n1
bit-count Configuring the maximum length of input frame
sdlc k
window-size Configuring the size of local window of router
sdlc
poll-limit-value
count
Configuring the times of master station’s polling to the
slave station.
7.4.4 Controlling the Size of Cache
The size of cache can be controlled. The cache is used for storing the data that is not decided to be sent to
remote SDLC station. The command is especially useful in SDLC protocol convert equipment that implements
the communication between SNA workstation whose link layer protocol is LLC2 in token-ring local area network
(LAN) and SNA workstation whose link layer protocol is SDLC on serial link. The frame length and the size of
window on the token-ring are usually much bigger than the acceptable ones on the serial link. What’s more,
the serial link is slower than token-ring.
In order to control the accumulation problem produced in the high-speed data transmission from token-ring to
serial link, the command below can be used on the basis of each address under interface configuration mode:
Command Purpose
sdlc holdqueue address queue-size
Setting the maximum quantity of the data packets
stored in the sequence before transmission.
7.4.5 Controlling the polling of slave station
The interval of router’s polling to the slave station, the length of time of sending data from master station to
slave station and how long the software polls a slave station before moving to the next station can be controlled.
The following points should be noted in using these commands:
Only when the slave station is polled by the master station, the data can be transmitted. When the polling
terminates and the value of timer is too big, the response time of slave station will add. When the value of the
timer is reduced too small, it will lead to the congestion of serial link and data flood due to the excessive and
unnecessary polling frames sent from the slave station, which takes the extra CPU time for dealing with them.
The communication efficiency between master station and single slave station can be improved by increasing
80
the limit value of polling, but it may delay the polling to other slave stations.
One or more commands below can be used under interface configuration mode for controlling the polling of
slave station:
Command Purpose
sdlc poll-pause-timer
sdlc poll-limit-value count
millisecondsConfiguring the waiting time interval of router’s polling
to two slave stations on some single serial port.
Configuring the times of a master station’s polling to
slave station.
The “def” format of these commands can be used for restoring to the default polling value.
7.4.6 Configuring SDLC Interface as Half-Duplex Mode
Under default state, SDLC interface runs under full duplex mode. The command below can be used under
interface configuration mode for configuring SDLC interface as half-duplex mode.
Command Purpose
half-duplex
Configuring SDLC interface as half-duplex mode.
7.4.7 Configuring XID Value
XID value set in the router shall be consistent with the corresponding parameter set on token-ring host with
which SDLC equipment will communicate and shall match with the corresponding system parameter in IDBLK
and IDNUM defined in VTAM of token ring host.
Notes:
Configuring XID value will affect the attribute of the interface. If XID value is configured, it means
that the equipment connected with the interface is Pu2.0. XID value can be configured after the
port is shut down.
The command below can be used under interface configuration mode for configuring XID value.
Command Purpose
sdlc xid address xid
Designating XID value related to SDLC station.
7.4.8 Configuring the Maximum Value of SDLC Information Frame
Normally, the router and SDLC equipment that interacts with router protocol shall support the same and
maximum length of SDLC information frame. The bigger the value is, the more efficient the link is used and
the performance will be better.
After SDLC equipment is configured with the maximum possible information frame to be sent, the router shall
be configured for supporting the same maximum length of information frame. The default value is 265 bytes.
The maximum value supported by the software must be smaller than the maximum frame value of LLC2
defined at the time of configuring the maximum length of LLC2 information frame.
The command below can be used under interface configuration mode for configuring the maximum value of
SDLC information frame:
81
Command Purpose
sdlc sdlc-largest-frame
address sizeConfiguring the maximum length of information frame
that can be sent or received by the designated SDLC
station.
7.4.9 Monitoring SDLC Workstation
The command below can be used under management mode for monitoring the configuration of SDLC
workstation and deciding which SDLC parameter needs to be adjusted.
Command Purpose
show interfaces
Showing configuration information of SDLC
workstation.
82
Chapter 8 AAA Configuration
8.1 AAA Overview
Access control is used to control the users to access SWITCH or NAS and to limit their service types.
Authentication, authorization, and accounting (AAA) network security services provide the primary framework
through which you set up access control on your SWITCH or access server.
8.1.1 AAA Security Service
AAA is an architectural framework for configuring a set of three independent security functions in a consistent
manner. AAA provides a modular way of performing the following services:
Authentication: It is a method of identifying users, including username/password inquiry and
encryption according to the chosen security protocol.
Authentication is a method to distinguish the user’s identity before users access the network
and enjoy network services. AAA authentication can be configured through the definition of
an authentication method list and then application of this method list on all interfaces. This
method list defines the authentication type and the execution order; any defined
authentication method list must be applied on a specific interface before it is executed. The
only exception is the default authentication method list (which is named default). If there are
no other authentication method lists, the default one will be applied on all interfaces
automatically. If anyone is defined, it will replace the default one. For how to configure all
authentications, see “Authentication Configuration”.
Authorization: it is a remote access control method to limit user’s permissions.
AAA authorization takes effect through a group of features in which a user is authorized with
some permissions. Firstly, the features in this group will be compared with the information
about a specific user in the database, then the comparison result will be returned to AAA to
confirm the actual permissions of this user. This database can be at the accessed local
server or SWITCH, or remote Radius/TACACS+ server. The Radius or TACACS+ server
conducts user authorization through a user-related attribute-value peer. The attribute value
(AV) defines the allowably authorized permissions. All authorization methods are defined
through AAA. Like authentication, an authorization method list will be first defined and then
this list will be applied on all kinds of interfaces. For how to carry on the authorization
configuration, see “Authorization Configuration”.
Accounting: it is a method to collect user’s information and send the information to the
security server. The collected information can be used to open an account sheet, make
auditing and form report lists, such as the user ID, start/end time, execution commands, and
the number of packets or bytes.
The accounting function can track the services that users access, and at the same time track
the service-consumed network resource number. When AAA accounting is activated, the
access server can report user’s activities to the TACACS+ or Radius server in way of
accounting. Each account contains an AV peer, which is stored on the security server. The
data can be used for network management, client's accounting analysis or audit. Like
authentication and authorization, an accounting method list must be first defined and then
applied on different interfaces. For how to carry on the accounting configuration, see
“Accounting Configuration”.
8.1.2 Benefits of Using AAA
AAA provides the following benefits:
Increased flexibility and control of access configuration
Scalability
83
Standardized authentication methods, such as RADIUS, TACACS+, and Kerberos
Multiple backup systems
8.1.3 AAA Principles
AAA is designed to enable you to dynamically configure the type of authentication and authorization you want
on a per-line (per-user) or per-service (for example, IP, IPX, or VPDN) basis. You define the type of
authentication and authorization you want by creating method lists, then applying those method lists to specific
services or interfaces.
8.1.4 AAA Method List
To configure AAA, define a named method list first and then apply it to the concrete service or interface. This
method list defines the running AAA type and their running sequence. Any defined method list must be applied
to a concrete interface or service before running. The only exception is the default method list. The default
method list is automatically applied to all interfaces or services. Unless the interface applies other method list
explicitly, the method list will replace the default method list.
A method list is a sequential list that defines the authentication methods used to authenticate a user. In AAA
method list you can specify one or more security protocols. Thus, it provides with a backup authentication
system, in case the initial method is failed. Our SWITCH software uses the first method listed to authenticate
users; if that method does not respond, the software selects the next authentication method in the method list.
This process continues until there is successful communication with a listed authentication method or the
authentication method list is exhausted, in which case authentication fails.
It is important to notice that the SWITCH software attempts authentication with the next listed authentication
method only when there is no response from the previous method. If authentication fails at any point in this
cycle—meaning that the security server or local user name database responds by denying the user access—
the authentication process stops and no other authentication methods are attempted.
The following figures shows a typical AAA network configuration that includes four security servers: R1 and R2
are RADIUS servers, and T1 and T2 are TACACS+ servers. Take the authentication as an example to
demonstrate the relation between AAA service and AAA method list.
Figure 8-1 Typical AAA Network Configuration
In this example, default is the name of the method list, including the protocol in the method list and the request
84
sequence of the method list follows the name. The default method list is automatically applied to all interfaces.
When a remote user attempts to dial in to the network, the network access server first queries R1 for
authentication information. If R1 authenticates the user, it issues a PASS response to the network access
server and the user is allowed to access the network. If R1 returns a FAIL response, the user is denied access
and the session is terminated. If R1 does not respond, then the network access server processes that as an
ERROR and queries R2 for authentication information. This pattern continues through the remaining
designated methods until the user is either authenticated or rejected, or until the session is terminated.
A FAIL response is significantly different from an ERROR. A FAIL means that the user has not met the criteria
contained in the applicable authentication database to be successfully authenticated. Authentication ends with
a FAIL response. An ERROR means that the security server has not responded to an authentication query.
Only when an ERROR is detected will AAA select the next authentication method defined in the authentication
method list.
Suppose the system administrator wants to apply the method list to a certain or a specific port. In such case,
the system administrator should create a non-default method list and then apply the list of this name to an
appropriate port.
8.1.5 AAA Configuration Process
You must first decide what kind of security solution you want to implement. You need to assess the security
risks in your particular network and decide on the appropriate means to prevent unauthorized entry and attack.
Before you configure AAA, you need know the basic configuration procedure. To do AAA security configuration
on SWITCH or access servers, perform the following steps:
If you decide to use a security server, configure security protocol parameters first, such as
RADIUS, TACACS+, or Kerberos.
Define the method lists for authentication by using an AAA authentication command.
Apply the method lists to a particular interface or line, if required.
(Optional) Configure authorization using the aaa authorization command.
(Optional) Configure accounting using the aaa accounting command.
8.2 Authentication Configuration
8.2.1 AAA Authentication Configuration Task List
Configuring Login Authentication Using AAA
Configuring PPP Authentication Using AAA
Enabling Password Protection at the Privileged Level
Configuring Message Banners for AAA Authentication
Modifying the Notification Character String for Username Input
Modifying AAA authentication password-prompt
Creating local user name authentication database
Creating the Authentication Database with the Local Privilege
85
8.2.2 AAA Authentication Configuration Task
General configuration process of AAA authentication
To configure AAA authentication, perform the following configuration processes:
(1) If you decide to use a separate security server, configure security protocol parameters, such
as RADIUS, or TACACS+. Refer to the relevant section for the concrete configuration
methods.
(2) Configuring Authentication Method List Using aaa authentication
(3) If necessary, apply the accounting method list to a specific interface or line.
86
Configuring Login Authentication Using AAA
The AAA security services facilitate a variety of login authentication methods. Use the aaa authentication login
command to enable AAA authentication no matter which of the supported login authentication methods you
decide to use. With the aaa authentication login command, you create one or more lists of authentication
methods that are tried at login. These lists are applied using the login authentication line configuration
command. After the authentication method lists are configured, you can apply these lists by running login
authentication. You can run the following command in global configuration mode to start the configuration:
Command Purpose
aaa authentication login {default
name}method1 [method2...]
line
console
{
line-number]
login authentication {default
vty
|
} line-number [ending-
| list-
| list-name}
Enables AAA globally.
Enter the configuration mode of a line.
Applies the authentication list to a line or set
of lines. (In the line configuration mode)
The list-name is a character string used to name the list you are creating. The key word method specifies the
actual method of the authentication method. The additional methods of authentication are used only if the
previous method returns an error, not if it fails. To specify that the authentication should succeed even if all
methods return an error, specify none as the final method in the command line.
The default parameter can create a default authentication list, which will be automatically applied to all
interfaces. For example, to specify that authentication should succeed even if (in this example) the TACACS+
server returns an error, enter the following command:
aaa authentication login default group radius
Note:
Because the none keyword enables any user logging in to successfully authenticate, it should be
used only as a backup method of authentication.
If you cannot find the authentication method list, you can only login through the console port. Any other way of
login is in accessible.
The following table lists the supported login authentication methods:
Keyword Notes:
enable Uses the enable password for authentication.
group nameUses named server group for authentication.
group radius Uses RADIUS for authentication.
group tacacs+ Uses group tacacs+ for authentication.
line Uses the line password for authentication.
local Uses the local username database for authentication.
localgroup Uses the local strategy group username database for authentication.
local-case Uses case-sensitive local user name authentication.
none Passes the authentication unconditionally.
(1) Using the enable password to carry on the login authentication:
87
To specify the enable password as the user authentication method, run the following
command:
aaa authentication login default enable
(2) Using the line password to login
Use the aaa authentication login command with the line method keyword to specify the line
password as the login authentication method. For example, to specify the line password as
the method of user authentication at login when no other method list has been defined, enter
the following command:
aaa authentication login default line
Before you can use a line password as the login authentication method, you need to define
a line password.
(3) Using the local password to carry on the login authentication:
When you run aaa authentication login, you can use the keyword “local” to designate the
local database as the login authentication method. For example, if you want to specify the
local username database as the user authentication method and not define any other
method, run the following command:
aaa authentication login default local
For information about adding users into the local username database, refer to the section
"Establishing Username Authentication" in this chapter.
(4) Login Authentication Using RADIUS
Use the aaa authentication login command with the group radius method to specify RADIUS
as the login authentication method. For example, to specify RADIUS as the method of user
authentication at login when no other method list has been defined, enter the following
command:
aaa authentication login default group radius
Before you can use RADIUS as the login authentication method, you need to enable
communication with the RADIUS security server. For more information about establishing
communication with a RADIUS server, refer to the chapter "Configuring RADIUS."
88
Enabling Password Protection at the Privileged Level
Use the aaa authentication enable default command to create a series of authentication methods that are used
to determine whether a user can access the privileged EXEC command level. You can specify up to four
authentication methods. The additional methods of authentication are used only if the previous method returns
an error, not if it fails. To specify that the authentication should succeed even if all methods return an error,
specify none as the final method in the command line. Use the following command in global configuration
mode:
Command Purpose
aaa authentication enable default
[method2...]
method1
Enables user ID and password checking for
users requesting privileged EXEC level.
The method argument refers to the actual list of methods the authentication algorithm tries, in the sequence
entered.
The following table lists the supported enable authentication methods:
Keyword Notes
enable Uses the enable password for authentication.
group group-name Uses named server group for authentication.
group radius Uses RADIUS authentication.
group tacacs+ Uses tacacs+ for authentication.
line Uses the line password for authentication.
none Passes the authentication unconditionally.
When configuring enable authentication method as the remote authentication, use RADIUS for authentication.
Do as follows:
(5) Uses RADIUS for enable authentication:
The user name for authentication is $ENABLElevel$; level is the privileged level the user
enters, that is, the number of the privileged level after enable command. For instance, if the
user wants to enter the privileged level 7, enter command enable 7; if configuring RADIUS
for authentication, the user name presenting to Radius-server host is $ENABLE7$; the
privileged level of enable is 15 by default, that is, the user name presenting to Radius-server
host in using RADIUS for authentication is $ENABLE15$. The user name and the password
need to configured on Radius-server host in advance. The point is that in user database of
Radius-server host, the Service-Type of the user specifying the privileged authentication is
6, that is, Admin-User.
89
Configuring Message Banners for AAA Authentication
The banner of configurable, personal logon or failed logon is supported. When AAA authentication fails during
system login, the configured message banner will be displayed no matter what the reason of the failed
authentication is.
90
Configuring the registration banner
Run the following command in global configuration mode.
Command Purpose
aaa authentication banner
string delimiter
delimiter text-
Configures a personal logon registration
banner.
91
Configuring the banner of failed logon
Run the following command in global configuration mode.
Command Purpose
aaa authentication fail-message
text-string delimiter
delimiter
Configures a personal banner about failed
logon.
92
Usage Guidelines
When creating a banner, you need to configure a delimiter and then to configure the text string itself. The
delimiter is to notify that the following text string will be displayed as the banner. The delimiter appears
repeatedly at the end of the text character string, indicating that the banner is ended.
93
Modifying the Notification Character String for Username Input
To modify the default text of the username input prompt, run aaa authentication username-prompt. You can
run no aaa authentication username-prompt to resume the password input prompt.
username:
The aaa authentication username-prompt command does not change any prompt information provided by the
remote TACACS+ server or the RADIUS server. Run the following command in global configuration mode:
Command Purpose
aaa authentication username-prompt
string
text-
Modifies the default text of the username
input prompt.
94
Modifying AAA authentication password-prompt
To change the text displayed when users are prompted for a password, use the aaa authentication passwordprompt command. To return to the default password prompt text, use the no form of this command. You can
run no aaa authentication username-prompt to resume the password input prompt.
password:
The aaa authentication password-prompt command does not change any prompt information provided by the
remote TACACS+ server or the RADIUS server. Run the following command in global configuration mode:
Command Purpose
aaa authentication password-prompt
string
text-
String of text that will be displayed when the
user is prompted to enter a password.
95
Creating the Authentication Database with the Local Privilege
To create the enable password database with the local privilege level, run enable password { [encryption-type]
encrypted-password} [level level] in global configuration mode. To cancel the enable password database, run
no enable password [level level].
The following example shows how to configure the SWITCH to authenticate and authorize using RADIUS:
aaa authentication login radius-login group radius local
aaa authorization network radius-network group radius
line vty 3
login authentication radius-login
The meaning of each command line is shown below:
The aaa authentication login radius-login group radius local command configures the
SWITCH to use RADIUS for authentication at the login prompt. If RADIUS returns an error,
the user is authenticated using the local database.
The aaa authorization network radius-network group radius command queries RADIUS for
network authorization, address assignment, and other access lists.
The login authentication radius-login command enables the radius-login method list for line
3.
8.3 Authorization Configuration
8.3.1 AAA Authorization Configuration Task List
Configuring EXEC authorization through AAA
8.3.2 AAA Authorization Configuration Task
97
General configuration process of AAA authorization
To configure AAA authorization, perform the following configuration processes:
(6) If you decide to use a separate security server, configure security protocol parameters, such
as RADIUS, or TACACS+. Refer to the relevant section for the concrete configuration
methods.
(7) Run aaa authorization to define the authorization method list. The authorization service is
not provided by default.
(8) If necessary, apply the accounting method list to a specific interface or line.
98
Configuring EXEC authorization through AAA
To enable AAA authorization, run aaa authorization. The aaa authorization exec command can create one or
several authorization method lists and enable the EXEC authorization to decide whether the EXEC hull
program is run by the users or not, or decide whether the users are authorized with the privilege when entering
the EXEC hull program. After the authorization method lists are configured, you can apply these lists by running
login authorization. You can run the following command in global configuration mode to start the configuration:
Command Purpose
aaa authorization exec {default
name}method1 [method2...]
line [console
number]
login authorization {default
vty
|
] line-number [ending-line-
| list-
| list-name}
Creates the global authorization list.
Enter the configuration mode of a line.
Applies the authorization list to a line or set of
lines. (In the line configuration mode)
The list-name is a character string used to name the list you are creating. The method keyword is used to
designate the real method for the authorization process. Only when the previously-used method returns the
authorization error can other authorization methods be used. If the authorization fails because of the previous
method, other authorization methods will not be used. If you requires the EXEC shell to be entered even when
all authorization methods returns the authorization errors, designate none as the last authorization method in
the command line.
The default parameter can create a default authentication list, which will be automatically applied to all
interfaces. For example, you can run the following command to designate RADIUS as the default authorization
method of EXEC:
aaa authorization exec default group radius
Note:
If the authorization method list cannot be found during authorization, the authorization will be directly passed
without the authorization service conducted.
The following table lists currently-supported EXEC authorization methods:
Keyword Notes:
group WORD Uses the named server group to conduct authorization.
group radius Uses RADIUS authorization.
group tacacs+ Uses tacacs+ authorization.
local Uses the local database to perform authorization.
if-authenticated Automatically authorizes the authencated user with all required functions.
none Passes the authorization unconditionally.
8.3.3 AAA Authorization Examples
99
Example of Local EXEC Authorization
The following example shows how to perform the local authorization and local authorization by configuring the
SWITCH: