Planet XGS-5240 User Manual

L2+ 24-Port 10G SFP+ plus 2-Port 40G QSFP+ Managed Switch
XGS-5240-24X2QR
1
Copyright © PLANET Technology Corp. 2019. Contents are subject to revision without prior notice. PLANET is a registered trademark of PLANET Technology Corp. All other trademarks belong to their respective owners.
Disclaimer
PLANET Technology does not warrant that the hardware will work properly in all environments and applications, and makes no warranty and representation, either implied or expressed, with respect to the quality, performance, merchantability, or fitness for a particular p urpose. PLAN ET has made every effort to ensure that this User' s Manual is ac curate; PLANET disclaim s liabilit y for any inacc uracies or om issions that may have occurred.
Information in this User's Manual is subject to change without notice and does not represent a commitment on the part of PLANET. PLANET assumes no responsibility for any inaccur acies that may be contained in this User's Manual. PLANET makes no commitment to update or keep current the information in this User's Manual, and reserves the right to make improvements to this User's Manual and/or to the products described in this User's Manual, at any time without notice.
If you find inform ation in this manual that is incor rect, misleading, or inc omplete, we would apprec iate your comments and suggestions.
FCC Warning
This equipment has been t ested and found to com ply with the lim its for a Class A digital device, pursuan t to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the e quipm ent is oper ated in a commercial environment. This equ ipm ent gener ates, us es, and can radiate radio frequency energy and, if not installed and used in accordance with the Instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at whose own expense.
CE Mark Warning
This device is com pliant with Class A of CISPR 32. In a residential env ironment this equip ment may cause radio interference.
WEEE Warning
To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and electronic equipment, end users of electrical and electronic equipment should understand the meaning of the crossed-out wheeled bin symbol. D o not dispose of WEEE as un sorted municipal waste an d have to collect such WEEE separately.
Energy Saving Note of the Device
This power required device does not support Standby mode operation. For energy saving, please remove the power cable to disconnect the device from the power circuit. Without removing pow er cable, the device will still consuming po wer from the power sourc e. In the view of
Saving the Energy and r educe the unnecessary po wer consuming, it is strongl y suggested to remove the power connection for the device if this device is not intended to be active.
Revision
User’s Manual of L2+ 24-Port 10G SFP+ plus 2-Port 40G QSFP+ Managed Switch with 36-72V DC Redundant Power Models: XGS-5240-24X2QR Revision: 1.0 (August, 2019) Part No: EM-XGS-5240 Series Configuration Guide_v1.0
2
Configuration Guide of XGS-5240-Series
Contents
CHAPTER 1 INTRODUCTION ....................................................................................... 21
1.1 PACKET CONTENTS ............................................................................................................................... 21
1.2 PRODUCT DESCRIPTION ........................................................................................................................ 22
1.3 PRODUCT FEATURES ............................................................................................................................. 24
1.4 PRODUCT SPECIFICATIONS .................................................................................................................... 27
CHAPTER 2 INSTALLATION ......................................................................................... 31
2.1 HARDWARE DESCRIPTION ...................................................................................................................... 31
2.1.1 Switch Front Panel ................................................................................................................... 31
2.1.2 LED Indications ........................................................................................................................ 32
2.1.3 Switch Rear Panel .................................................................................................................... 32
2.2 SWITCH INSTALLATION........................................................................................................................... 33
2.2.1 Desktop Installation .................................................................................................................. 33
2.2.2 Rack Mounting .......................................................................................................................... 34
2.2.3 Installing the SFP/SFP+ Transceiver ........................................................................................ 35
CHAPTER 3 SWITCH MANAGEMENT .......................................................................... 40
3.1 MANAGEMENT OPTIONS ........................................................................................................................ 40
3.1.1 Out-Of-Band Management ....................................................................................................... 40
3.1.2 In-band Management ............................................................................................................... 43
3.2 CLI INTERFACE ..................................................................................................................................... 49
3.2.1 Configuration Mo des ................................................................................................................ 49
3.2.2 Configuration Syntax ................................................................................................................ 52
3.2.3 Shortcut Key Support ............................................................................................................... 53
3.2.4 Help Function ........................................................................................................................... 54
3.2.5 Input Verification ....................................................................................................................... 54
3.2.6 Fuzzy Match Support ................................................................................................................ 55
CHAPTER 4 BASIC SWITCH CONFIGURATION .......................................................... 56
4.1 BASIC CONFIGURATION ......................................................................................................................... 56
4.2 TELNET MANAGEMENT .......................................................................................................................... 57
4.2.1 T elnet ........................................................................................................................................ 57
4.2.2 SSH .......................................................................................................................................... 59
4.3 CONFIGURE SWITCH IP ADDRESSES ...................................................................................................... 61
4.3.1 Switch IP Addresses Configuration Task List ........................................................................... 61
4.4 SNMP CONFIGURATION ........................................................................................................................ 62
4.4.1 Introduction to SNMP ............................................................................................................... 62
3
Configuration Guide of XGS-5240-Series
4.4.2 Introduction to MIB ................................................................................................................... 64
4.4.3 Introduction to RMON ............................................................................................................... 65
4.4.4 SNMP Configuration ................................................................................................................. 65
4.4.5 Typical SNMP Configuration Examples .................................................................................... 68
4.4.6 SNMP Troubleshooting ............................................................................................................. 69
4.5 SWITCH UPGRADE ................................................................................................................................. 70
4.5.1 Switch System Files ................................................................................................................. 70
4.5.2 BootROM Upgrade ................................................................................................................... 71
4.5.3 FTP/TFTP Upgrade .................................................................................................................. 73
CHAPTER 5 FILE SYSTEM OPERATIONS ................................................................... 82
5.1 INTRODUCTION TO FILE STORAGE DEVICES ............................................................................................ 82
5.2 FILE SYSTEM OPERATION CONFIGURATION TASK LIST ............................................................................ 82
5.3 TYPICAL APPLICATIONS ......................................................................................................................... 84
5.4 TROUBLESHOOTING .............................................................................................................................. 84
CHAPTER 6 CLUSTER CONFIGURATION ................................................................... 85
6.1 INTRODUCTION TO CLUSTER NETWORK MANAGEMENT ............................................................................. 85
6.2 CLUSTER NETWORK MANAGEMENT CONFIGURATION SEQUENCE ............................................................ 85
6.3 EXAMPLES OF CLUSTER ADMINISTRATION .............................................................................................. 89
6.4 CLUSTER ADMINISTRATION TROUBLESHOOTING ..................................................................................... 90
CHAPTER 7 USB FUNCTION CONFIGURATION ......................................................... 91
7.1 INTRODUCTION ...................................................................................................................................... 91
7.2 USB FUNCTION CONFIGURATION LIST ................................................................................................... 91
7.3 USB FUNCTION EXAMPLES ................................................................................................................... 93
7.4 USB FUNCTION TROUBLESHOOTING ...................................................................................................... 93
CHAPTER 8 DEVICE MANAGEMENT .......................................................................... 95
8.1 DEVICE MANAGEMENT BRIEF ................................................................................................................ 95
8.2 DEVICE MANAGEMENT CONFIGURATION ................................................................................................. 95
8.2.1 Monitor and Debug Task ........................................................................................................... 95
CHAPTER 9 PORT CONFIGURATION .......................................................................... 97
9.1 INTRODUCTION TO PORT ........................................................................................................................ 97
9.2 NETWORK PORT CONFIGURATION TASK LIST ......................................................................................... 97
9.3 PORT CONFIGURATION EXAMPLE ......................................................................................................... 100
4
Configuration Guide of XGS-5240-Series
9.4
PORT TROUBLESHOOTING ................................................................................................................... 101
CHAPTER 10 PORT ISOLATION FUNCTION CONFIGURATION ................................ 102
10.1 INTRODUCTION TO PORT ISOLATION FUNCTION ................................................................................... 102
10.2 TASK SEQUENCE O F PORT ISOLATION ................................................................................................ 102
10.3 PORT ISOLATION FUNCTION TYPICAL EXAMPLES ................................................................................ 103
CHAPTER 11 PORT LOOPBACK DETECTION F UNCTION CONFIGURATION ......... 105
11.1 INTRODU CTI ON TO PORT LOOPBACK DETECTION FUNCTION ................................................................ 105
11.2 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION TASK LIST .................................................. 106
11.3 PORT LOOPBACK DETECTION FUNCTION EXAMPLE............................................................................. 107
11.4 PORT LOOPBACK DETECTION TROUBLESHOOTING ............................................................................. 108
CHAPTER 12 ULDP FUNCTION CONFIGURATION ..................................................... 109
12.1 INTRODUCTION TO ULDP FUNCTION .................................................................................................. 109
12.2 ULDP CONFIGURATION TASK SEQUENCE .......................................................................................... 110
12.3 ULDP FUNCTION TYPICAL EXAMPLES ............................................................................................... 113
12.4 ULDP TROUBLESHOOTING ................................................................................................................ 114
CHAPTER 13 LLDP FUNCTION OPERATION CONFIGURATION ............................... 116
13.1 INTRODUCTION TO LLDP FUNCTION ................................................................................................... 116
13.2 LLDP FUNCTION CONFIGURATION TASK SEQUENCE ........................................................................... 117
13.3 LLDP FUNCTION TYPICAL EXAMPLE .................................................................................................. 120
13.4 LLDP FUNCTION TROUBLESHOOTING ................................................................................................ 121
CHAPTER 14 PORT CHANNEL CONFIGURATION...................................................... 122
14.1 INTRODUCTION TO PORT CHANNEL .................................................................................................... 122
14.2 BRIEF INTRODUCTION TO LACP ........................................................................................................ 123
14.2.1 Static LACP Aggregation ...................................................................................................... 124
14.2.2 Dynamic LACP Aggregation ................................................................................................. 124
14.3 INTRODUCTION TO LOAD BALANCE ..................................................................................................... 125
14.4 PORT CHANNEL CONFIGURATION TASK LIST ...................................................................................... 125
14.5 PORT CHANNEL EXAMPLES ............................................................................................................... 129
14.6 TROUBLESHOOTING .......................................................................................................................... 133
14.6.1 Port Channel Troubleshooting .............................................................................................. 133
14.6.2 Load Balance Troubleshooting ............................................................................................. 133
5
Configuration Guide of XGS-5240-Series
CHAPTER 15 MTU CONFIGURATION .......................................................................... 135
15.1 INTRODUCTION TO MTU .................................................................................................................... 135
15.2 MTU CONFIGURATION TASK SEQUENCE ............................................................................................ 135
CHAPTER 16 BPDU-TUNNEL-PROTOCOL CONFIGURATION ................................... 136
16.1 INTRODUCTION TO BPDU-TUNNEL-PROTOCOL...................................................................................... 136
16.1.1 bpdu-tunnel-protocol function ............................................................................................... 136
16.1.2 Background of bpdu-tunnel-protocol .................................................................................... 136
16.2 BPDU-TUNNEL-PROTOCOL CONFIGURATION TASK LIST ........................................................................ 137
16.3 EXAMPLES OF BPDU-TUNNEL-PROTOCOL ........................................................................................... 137
16.4 BPDU-TUNNEL-PROTOCOL TROUBLESHOOTING ................................................................................... 139
CHAPTER 17 DDM CONFIGURATION .......................................................................... 140
17.1 INTRODUCTION TO DDM .................................................................................................................... 140
17.1.1 Brief Introduction to DDM ..................................................................................................... 140
17.1.2 DDM Function ....................................................................................................................... 141
17.2 DDM CONFIGURATION TASK LIST ...................................................................................................... 142
17.3 EXAMPLES OF DDM .......................................................................................................................... 143
17.4 DDM TROUBLESHOOTING ................................................................................................................. 148
CHAPTER 18 EFM OAM CONFIGURATION ................................................................. 149
18.1 INTRODUCTION TO EFM OAM ........................................................................................................... 149
18.2 EFM OAM CONFIGURATION .............................................................................................................. 152
18.3 EFM OAM EXAMPLE ........................................................................................................................ 154
18.4 EFM OAM TROUBLESHOOTING ......................................................................................................... 155
CHAPTER 19 LLDP-MED .............................................................................................. 157
19.1 INTRODUCTION TO LLDP-MED.......................................................................................................... 157
19.2 LLDP-MED CONFIGURATION TASK SEQUENCE .................................................................................. 157
19.3 LLDP-MED EXAMPLE ...................................................................................................................... 160
19.4 LLDP-MED TROUBLESHOOTING ....................................................................................................... 162
CHAPTER 20 PORT SECURITY .................................................................................... 164
20.1 INTRODUCTION TO PORT SECURITY ............................................................................................... 164
20.2 PORT SECURITY CONFIGURATION TASK LIST ................................................................................. 164
20.3 EXAMPLE OF PORT SECURITY ....................................................................................................... 165
6
Configuration Guide of XGS-5240-Series
20.4
PORT SECURITY TROUBLESHOOTING ............................................................................................ 166
CHAPTER 21 QSFP+ PORT SPLIT AND COMBINATION CONFIGURATION ............. 167
21.1 INTRODUCTION TO QSFP+ PORT SPLIT AND COMBINATION CONFIGURATION ....................................... 167
21.2 QSFP+ PORT CONFIGURATION ......................................................................................................... 167
21.3 TYPICAL CASE OF QSFP+ PORT CONFIGURATION.............................................................................. 168
21.4 QSFP+ PORT CONFIGURATION TROUBLESHOOTING ........................................................................... 168
CHAPTER 22 VLAN CONFIGURATION ........................................................................ 169
22.1 VLAN CONFIGURATION ..................................................................................................................... 169
22.1.1 Introduction to VLAN ............................................................................................................ 169
22.1.2 VLAN Configuration Task List ............................................................................................... 170
22.1.3 Typical VLAN Application ...................................................................................................... 173
22.1.4 Typical Application of Hybrid Port ......................................................................................... 174
22.2 GVRP CONFIGURATION .................................................................................................................... 176
22.2.1 Introduction to GVRP ............................................................................................................ 176
22.2.2 GVRP Configuration Task List .............................................................................................. 177
22.2.3 Example of GVRP ................................................................................................................ 178
22.2.4 GVRP Troubleshooting ......................................................................................................... 180
22.3 DOT1Q-TUNNEL CONFIGURATION ....................................................................................................... 180
22.3.1 Introduction to Dot1q-tunnel ................................................................................................. 180
22.3.2 Dot1q-tunnel Configuration................................................................................................... 181
22.3.3 Typical Applications of the Dot1q-tunnel .............................................................................. 182
22.3.4 Dot1q-tunnel Troubleshooting .............................................................................................. 183
22.4 VLAN-TRANSLATION CONFIGURATION ............................................................................................... 183
22.4.1 Introduction to VLAN-translation .......................................................................................... 183
22.4.2 VLAN-translation Configuration ............................................................................................ 183
22.4.3 Typical application of VLAN-translation ................................................................................ 184
22.4.4 VLAN-translation Troubleshooting ........................................................................................ 185
22.5 DYNAMIC VLAN CONFIGURATION ...................................................................................................... 186
22.5.1 Introduction to Dynamic VLAN ............................................................................................. 186
22.5.2 Dynamic VLAN Configuration ............................................................................................... 186
22.5.3 Typical Application of the Dynamic VLAN ............................................................................ 188
22.5.4 Dynamic VLAN Troubleshooting .......................................................................................... 189
22.6 VOICE VLAN CONFIGURATION .......................................................................................................... 190
22.6.1 Introduction to Voice VLAN................................................................................................... 190
22.6.2 Voice VLAN Configuration .................................................................................................... 191
22.6.3 Typical Applications of the Voice VLAN ................................................................................ 191
22.6.4 Voice VLAN Troubleshooting ................................................................................................ 193
22.7 SUPER VLAN CONFIGURATION.......................................................................................................... 193
7
Configuration Guide of XGS-5240-Series
22.7.1 Introduction to Super VLAN .................................................................................................. 193
22.7.2 Super VLAN Configuration ................................................................................................... 195
22.7.3 Typical Application of Super VLAN ....................................................................................... 196
22.7.4 Super VLAN Troubleshooting ............................................................................................... 197
CHAPTER 23 MAC TABLE CONFIGURATION ............................................................. 199
23.1 INTRODUCTION TO MAC TABLE ......................................................................................................... 199
23.1.1 Obtaining MAC Table ............................................................................................................ 199
23.1.2 Forward or Filter ................................................................................................................... 201
23.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST ............................................................................. 202
23.3 TYPICAL CONFIGURATION EXAMPLES ................................................................................................. 203
23.4 MAC TABLE TROUBLESHOOTING ....................................................................................................... 204
23.5 MAC NOTIFICATION CONFIGURATION ................................................................................................. 204
23.5.1 Introduction to MAC Notification ........................................................................................... 204
23.5.2 MAC Notification Configuration ............................................................................................ 204
23.5.3 MAC Notification Example .................................................................................................... 206
23.5.4 MAC Notification Troubleshooting ........................................................................................ 206
CHAPTER 24 MSTP CONFIGURATION ........................................................................ 207
24.1 INTRODUCTION TO MSTP .................................................................................................................. 207
24.1.1 MSTP Region ....................................................................................................................... 207
24.1.2 Port Roles ............................................................................................................................. 209
24.1.3 MSTP Load Balance ............................................................................................................. 209
24.2 MSTP CONFIGURATION TASK LIST .................................................................................................... 209
24.3 MSTP EXAMPLE ............................................................................................................................... 214
24.4 MSTP TROUBLESHOOTING ................................................................................................................ 218
CHAPTER 25 QOS CONFIGURATION .......................................................................... 219
25.1 INTRODUCTION TO QOS ..................................................................................................................... 219
25.1.1 QoS Terms ............................................................................................................................ 219
25.1.2 QoS Implementation ............................................................................................................. 220
25.1.3 Basic QoS Model .................................................................................................................. 221
25.2 QOS CONFIGURATION TASK LIST ....................................................................................................... 224
25.3 QOS EXAMPLE ................................................................................................................................. 229
25.4 QOS TROUBLESHOOTING .................................................................................................................. 232
CHAPTER 26 PBR CONFIGURATION ......................................................................... 26-1
26.1 INTRODUCTION TO PBR .................................................................................................................... 26-1
26.2 PBR CONFIGURATION ...................................................................................................................... 26-1
8
Configuration Guide of XGS-5240-Series
26.3
PBR EXAMPLES .............................................................................................................................. 26-2
CHAPTER 27 IPV6 PBR CONFIGURATION................................................................. 27-1
27.1 INTRODUCTION TO PBR (POLICY-BASED ROUTER) ............................................................................ 27-1
27.2 PBR CONFIGURATION TASK SEQUENCE ............................................................................................ 27-1
27.3 PBR EXAMPLES .............................................................................................................................. 27-3
27.4 PBR TROUBLESHOOTING HELP ........................................................................................................ 27-4
CHAPTER 28 FLOW-BASED REDIRECTION .............................................................. 28-1
28.1 INTRODUCTION TO FLOW-BASED REDIRECTION .................................................................................. 28-1
28.2 FLOW-BASED REDIRECTION CONFIGURATION TASK SEQUENCE .......................................................... 28-1
28.3 FLOW-BASED REDIRECTION EXAMPLES ............................................................................................ 28-2
28.4 FLOW-BASED REDIRECTION TROUBLESHOOTING HELP ...................................................................... 28-2
CHAPTER 29 EGRESS QOS CONFIGURATION ......................................................... 29-1
29.1 INTRODUCTION TO EGRESS QOS ...................................................................................................... 29-1
29.1.1 Egress QoS Terms .............................................................................................................. 29-1
29.1.2 Basic Egress QoS Model ..................................................................................................... 29-1
29.2 EGRESS QOS CONFIGURATION ......................................................................................................... 29-3
29.3 EGRESS QOS EXAMPLES ................................................................................................................. 29-6
29.4 EGRESS QOS TROUBLESHOOTING HELP ........................................................................................... 29-7
CHAPTER 30 FLEXIBLE QINQ CONFIGURATION ..................................................... 30-1
30.1 INTRODUCTION TO FLEXIBLE QINQ ................................................................................................... 30-1
30.1.1 QinQ Technique ................................................................................................................... 30-1
30.1.2 Basic QinQ........................................................................................................................... 30-1
30.1.3 Flexible QinQ ....................................................................................................................... 30-1
30.2 FLEXIBLE QINQ CONFIGURATION TASK LIST ..................................................................................... 30-1
30.3 FLEXIBLE QINQ EXAMPLE ................................................................................................................ 30-3
30.4 FLEXIBLE QINQ TROUBLESHOOTING ................................................................................................. 30-5
CHAPTER 31 LAYER 3 MANAGEMENT CONFIGURATION ....................................... 31-6
31.1 LAYE R 3 MANAGEMENT INTERFACE................................................................................................... 31-6
31.1.1 Introduction to Layer 3 Management Interface ................................................................... 31-6
31.1.2 Layer 3 Interface Configuration Task List ............................................................................ 31-6
31.2 IP CONFIGURATION .......................................................................................................................... 31-7
31.2.1 Introduction to IPv4, IPv6 .................................................................................................... 31-7
31.2.2 IP Configuration ................................................................................................................... 31-9
9
Configuration Guide of XGS-5240-Series
31.2.3 IPv6 Troubleshooting ......................................................................................................... 31-11
31.3 ARP .............................................................................................................................................. 31-11
31.3.1 Introduction to ARP ............................................................................................................ 31-11
31.3.2 ARP Configuration Task List .............................................................................................. 31-11
31.3.3 ARP Troubleshooting ......................................................................................................... 31-12
CHAPTER 32 ARP SCANNING PREVENTION FUNCTION CONFIGURATION .......... 32-1
32.1 INTRODUCTION TO ARP SCANNING PREVENTION FUNCTION ............................................................... 32-1
32.2 ARP SCANNING PREVENTION CONFIGURATION TASK SEQUENCE ....................................................... 32-2
32.3 ARP SCANNING PREVENTION TYPICAL EXAMPLES ............................................................................ 32-4
32.4 ARP SCANNING PREVENTION TROUBLESHOOTING HELP ................................................................... 32-5
CHAPTER 33 PREVENT ARP, ND SPOOFING CONFIGURATION ............................. 33-1
33.1 OVERVIEW ....................................................................................................................................... 33-1
33.1.1 ARP (Address Resolution Protocol)..................................................................................... 33-1
33.1.2 ARP Spoofing ...................................................................................................................... 33-1
33.1.3 How to prevent void ARP/ND Spoofing ............................................................................... 33-1
33.2 PREVENT ARP, ND SPOOFING CONFIGURATION................................................................................. 33-2
33.3 PREVENT ARP, ND SPOOFING EXAMPLE .......................................................................................... 33-3
CHAPTER 34 ARP GUARD CONFIGURATION ........................................................... 34-1
34.1 INTRODUCTION TO ARP GUARD ...................................................................................................... 34-1
34.2 ARP GUARD CONFIGURATION TASK LIST ........................................................................................ 34-2
CHAPTER 35 GRA TUIT OUS ARP CONFIGURATION ................................................. 35-1
35.1 INTRODUCTION TO GRATUITOUS ARP ............................................................................................... 35-1
35.2 GRATUITOUS ARP CONFIGURATION TASK LIST.................................................................................. 35-1
35.3 GRATUITOUS ARP CONFIGURATION EXAMPLE ................................................................................... 35-2
35.4 GRATUITOUS ARP TROUBLESHOOTING ............................................................................................. 35-3
CHAPTER 36 DHCP CONFIGURATION ....................................................................... 36-4
36.1 INTRODUCTION TO DHCP ................................................................................................................. 36-4
36.2 DHCP SERVER CONFIGURATION ...................................................................................................... 36-5
36.3 DHCP RELAY CONFIGURATION ......................................................................................................... 36-8
36.4 DHCP CONFIGURATION EXAMPLES .................................................................................................. 36-9
36.5 DHCP TROUBLESHOOTING ............................................................................................................ 36-12
CHAPTER 37 DHCPV6 CONFIGURATION .................................................................. 37-1
10
Configuration Guide of XGS-5240-Series
37.1
INTRODUCTION TO DHCPV6 ............................................................................................................. 37-1
37.2 DHCPV6 SERVER CONFIGURATION .................................................................................................. 37-2
37.3 DHCPV6 REL AY DELEGATION CONFIGURATION................................................................................. 37-4
37.4 DHCPV6 PREFIX DELEGATION SERVER CONFIGURATION .................................................................. 37-4
37.5 DHCPV6 PREFIX DELEGATION CLIENT CONFIGURATION .................................................................... 37-6
37.6 DHCPV6 CONFIGURATION EXAMPLES .............................................................................................. 37-7
37.7 DHCPV6 TROUBLESHOOTING ........................................................................................................ 37-11
CHAPTER 38 DHCP OPTION 82 CONFIGURATION ................................................... 38-1
38.1 INTRODUCTION TO DHCP OPTION 82 ................................................................................................ 38-1
38.1.1 DHCP option 82 Message Structure ................................................................................... 38-1
38.1.2 option 82 Working Mechanism ............................................................................................ 38-2
38.2 DHCP OPTION 82 CONFIGURATION TASK LIST .................................................................................. 38-3
38.3 DHCP OPTION 82 APPLICATION EXAMPLES ...................................................................................... 38-6
38.4 DHCP OPTION 82 TROUBLESHOOTING .............................................................................................. 38-8
CHAPTER 39 DHCPV6 OPTION37, 38 ......................................................................... 39-1
39.1 INTRODUCTION TO DHCPV6 OPTION37, 38 ....................................................................................... 39-1
39.2 DHCPV6 OPTION37, 38 CONFIGURATION TASK LIST ......................................................................... 39-1
39.3 DHCPV6 OPTION37, 38 EXAMPLES .................................................................................................. 39-7
39.3.1 DHCPv6 Snooping opti on3 7, 38 Ex ample .......................................................................... 39-7
39.3.2 DHCPv6 Relay option37, 38 Example ................................................................................ 39-9
39.4 DHCPV6 OPTION37, 38 TROUBLESHOOTING................................................................................... 39-10
CHAPTER 40 DHCP SNOOPING CONFIGURATION................................................... 40-1
40.1 INTRODUCTION TO DHCP SNOOPING ................................................................................................ 40-1
40.2 DHCP SNOOPING CONFIGURATION TASK SEQUENCE ........................................................................ 40-2
40.3 DHCP SNOOPING TYPICAL APPLICATION .......................................................................................... 40-7
40.4 DHCP SNOOPING TROUBLESHOOTING HELP .................................................................................... 40-8
40.4.1 Monitor and Debug Information ........................................................................................... 40-8
40.4.2 DHCP Snooping Troubleshooting Help ............................................................................... 40-8
CHAPTER 41 DHCP OPTION 60 AND OPTION 43 ...................................................... 41-1
41.1 INTRODUCTION TO DHCP OPTION 60 AND OPTION 43 ......................................................................... 41-1
41.2 DHCP OPTION 60 AND OPTION 43 CONFIGURATION TASK LIST ........................................................... 41-1
41.3 DHCPV6 OPTION 60 AND OPTION 43 EXAMPLE ................................................................................. 41-2
11
Configuration Guide of XGS-5240-Series
41.4
DHCP OPTION 60 AND OPTION 43 TROUBLESHOOTING ...................................................................... 41-3
CHAPTER 42 IPV4 MULTICAST PROTOCOL ............................................................. 42-4
42.1 IPV4 MULTICAST PROTOCOL OVERVIEW ........................................................................................... 42-4
42.1.1 Introduction to Multicast ....................................................................................................... 42-4
42.1.2 Multicast Address ................................................................................................................ 42-5
42.1.3 IP Multicast Packet Transmission ........................................................................................ 42-6
42.1.4 IP Multicast Application ........................................................................................................ 42-7
42.2 IGMP .............................................................................................................................................. 42-7
42.2.1 Introduction to IGMP ............................................................................................................ 42-7
42.2.2 IGMP Configuration Task List .............................................................................................. 42-9
42.2.3 IGMP Configuration Exam ples .......................................................................................... 42-11
42.2.4 IGMP Troubleshooting ....................................................................................................... 42-12
42.3 IGMP SNOOPING ........................................................................................................................... 42-13
42.3.1 Introduction to IGMP Snooping ......................................................................................... 42-13
42.3.2 IGMP Snooping Configuration Task List ............................................................................ 42-13
42.3.3 IGMP Snooping Examples ................................................................................................ 42-16
42.3.4 IGMP Snooping Troubleshooting....................................................................................... 42-18
42.4 IGMP PROXY CONFIGURATION ....................................................................................................... 42-19
42.4.1 Introduction to IGMP Proxy ............................................................................................... 42-19
42.4.2 IGMP Proxy Configuration Task List .................................................................................. 42-19
42.4.3 IGMP Proxy Examples ...................................................................................................... 42-21
42.4.4 IGMP Proxy Troubleshooting ............................................................................................. 42-23
CHAPTER 43 IPV6 MULTICAST PROTOCOL ............................................................. 43-1
43.1 MLD ............................................................................................................................................... 43-1
43.1.1 Introduction to MLD ............................................................................................................. 43-1
43.1.2 MLD Configuration Task List ................................................................................................ 43-1
43.1.3 MLD Typical Application ...................................................................................................... 43-3
43.1.4 MLD Troubleshooting Help .................................................................................................. 43-4
43.2 MLD SNOOPING............................................................................................................................... 43-4
43.2.1 Introduction to MLD Snooping ............................................................................................. 43-4
43.2.2 MLD Snooping Configurat ion Task ...................................................................................... 43-5
43.2.3 MLD Snooping Examples .................................................................................................... 43-7
43.2.4 MLD Snooping Troubleshooting ........................................................................................ 43-10
CHAPTER 44 MULTICAST VLAN ................................................................................. 44-1
44.1 INTRODUCTIONS TO MULTICAST VLAN.............................................................................................. 44-1
44.2 MULTICAST VLAN CONFIGURATION TASK LIST ................................................................................. 44-1
44.3 MULTICAST VLAN EXAMPLES .......................................................................................................... 44-2
12
Configuration Guide of XGS-5240-Series
CHAPTER 45 ACL CONFIGURATION .......................................................................... 45-5
45.1 INTRODUCTION TO ACL .................................................................................................................... 45-5
45.1.1 Access-list ............................................................................................................................ 45-5
45.1.2 Access-group ....................................................................................................................... 45-5
45.1.3 Access-list Action and Global Default Action ....................................................................... 45-6
45.2 ACL CONFIGURATION TASK LIST ...................................................................................................... 45-6
45.3 ACL EXAMPLE ............................................................................................................................... 45-22
45.4 ACL TROUBLESHOOTING ............................................................................................................... 45-26
CHAPTER 46 SELF-DEFINED ACL CONFIGURATION ............................................... 46-1
46.1 INTRODUCTION TO SELF-DEFINED ACL ............................................................................................. 46-1
46.1.1 Standard Self-defined ACL Template .................................................................................. 46-1
46.1.2 Digital Self-defined ACL ....................................................................................................... 46-2
46.2 SELF-DEFINED ACL CONFIGURATION ................................................................................................ 46-2
46.3 SELF-DEFINED ACL EXAMPLE .......................................................................................................... 46-3
46.4 SELF-DEFINED ACL TROUBLESHOOTING ........................................................................................... 46-4
CHAPTER 47 802.1X CONFIGURATION ..................................................................... 47-1
47.1 INTRODUCTION TO 802.1X ................................................................................................................ 47-1
47.1.1 The Authentication Structure of 802.1x ............................................................................... 47-1
47.1.2 The Work Mechanism of 802.1x .......................................................................................... 47-3
47.1.3 The Encapsulation of EAPOL Messages ............................................................................ 47-4
47.1.4 The Encapsulation of EAP Attributes ................................................................................... 47-6
47.1.5 The Authentication Methods of 802.1x ................................................................................ 47-7
47.1.6 The Extension and Optimization of 802.1x ........................................................................ 47-12
47.1.7 The Features of VLAN Allocation ...................................................................................... 47-13
47.2 802.1X CONFIGURATION TASK LIST ................................................................................................ 47-14
47.3 802.1X APPLICATION EXAMPLE ...................................................................................................... 47-17
47.3.1 Examples of Guest Vlan Applications ................................................................................ 47-17
47.3.2 Examples of IPv4 Radius Applications .............................................................................. 47-20
47.3.3 Examples of IPv6 Radius Application ................................................................................ 47-21
47.4 802.1X TROUBLESHOOTING............................................................................................................ 47-22
CHAPTER 48 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT,
VLAN CONFIGURATION ............................................................................................... 48-1
48.1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN .................... 48-1
48.2 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN CONFIGURATION TASK
SEQUENCE .............................................................................................................................................. 48-2
13
Configuration Guide of XGS-5240-Series
48.3
THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TYPICAL EXAMPLES ................. 48-5
48.4 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TROUBLESHOOTING HELP ........ 48-6
CHAPTER 49 OPERATION AL CONFIGURATION OF AM FUNCTION ....................... 49-1
49.1 INTRODUCTION TO AM FUNCTION...................................................................................................... 49-1
49.2 AM FUNCTION CONFIGURATION TASK LIST........................................................................................ 49-1
49.3 AM FUNCTION EXAMPLE .................................................................................................................. 49-3
49.4 AM FUNCTION TROUBLESHOOTING ................................................................................................... 49-3
CHAPTER 50 SECURITY FEATURE CONFIGURATION ............................................. 50-1
50.1 INTRODUCTION TO SECURITY FEATURE ............................................................................................. 50-1
50.2 SECURITY FEATURE CONFIGURATION ................................................................................................ 50-1
50.2.1 Prevent IP Spoofing Function Configuration Task Sequence ............................................. 50-1
50.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence .............. 50-1
50.2.3 Anti Port Cheat Function Configuration Task Sequence ..................................................... 50-2
50.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence .............................. 50-2
50.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence ............................ 50-3
50.3 SECURITY FEATURE EXAMPLE .......................................................................................................... 50-3
CHAPTER 51 TACACS+ CONFIGURATION ................................................................ 51-1
51.1 INTRODUCTION TO TACACS+ .......................................................................................................... 51-1
51.2 TACACS+ CONFIGURATION TASK LIST ............................................................................................ 51-1
51.3 TACACS+ SCENARIOS TYPICAL EXAMPLES ..................................................................................... 51-2
51.4 TACACS+ TROUBLESHOOTING ........................................................................................................ 51-3
CHAPTER 52 RADIUS CONFIGURATION ................................................................... 52-1
52.1 INTRODUCTION TO RADIUS ............................................................................................................. 52-1
52.1.1 AAA and RADIUS Introduction ............................................................................................ 52-1
52.1.2 Message structure for RADIUS ........................................................................................... 52-1
52.2 RADIUS CONFIGURATION TASK LIST ............................................................................................... 52-3
52.3 RADIUS TYPICAL EXAMPLES........................................................................................................... 52-5
52.3.1 IPv4 Radius Example .......................................................................................................... 52-5
52.3.2 IPv6 RadiusExample ........................................................................................................... 52-6
52.4 RADIUS TROUBLESHOOTING ........................................................................................................... 52-7
CHAPTER 53 SSL CONFIGURATION .......................................................................... 53-1
53.1 INTRODUCTION TO SSL .................................................................................................................... 53-1
53.1.1 Basic Element of SSL .......................................................................................................... 53-1
14
Configuration Guide of XGS-5240-Series
53.2
SSL CONFIGURATION TASK LIST ...................................................................................................... 53-3
53.3 SSL TYPICAL EXAMPLE ................................................................................................................... 53-3
53.4 SSL TROUBLESHOOTING .................................................................................................................. 53-4
CHAPTER 54 IPV6 SECURITY RA CONFIGURATION ................................................ 54-1
54.1 INTRODUCTION TO IPV6 SECURITY RA .............................................................................................. 54-1
54.2 IPV6 SECURITY RA CONFIGURATION TASK SEQUENCE ...................................................................... 54-1
54.3 IPV6 SECURITY RA TYPICAL EXAMPLES ........................................................................................... 54-2
54.4 IPV6 SECURITY RA TROUBLESHOOTING HELP .................................................................................. 54-3
CHAPTER 55 VLAN-ACL CONFIGURATION ............................................................... 55-1
55.1 INTRODUCTION TO VLAN-ACL ......................................................................................................... 55-1
55.2 VLAN-ACL CONFIGURATION TASK LIST ........................................................................................... 55-1
55.3 VLAN-ACL CONFIGURATION EXAMPLE ............................................................................................ 55-3
55.4 VLAN-ACL TROUBLESHOOTING ...................................................................................................... 55-4
CHAPTER 56 MAB CONFIGURATION ......................................................................... 56-1
56.1 INTRODUCTION TO MAB ................................................................................................................... 56-1
56.2 MAB CONFIGURATION TASK LIST ..................................................................................................... 56-1
56.3 MAB EXAMPLE ................................................................................................................................ 56-3
56.4 MAB TROUBLESHOOTING ................................................................................................................ 56-6
CHAPTER 57 PPPOE INTERMEDIA T E AGENT CONFIGURATION ............................ 57-1
57.1 INTRODUCTION TO PPPOE INTERMEDIATE AGENT ............................................................................. 57-1
57.1.1 Brief Introduction to PPPoE ................................................................................................. 57-1
57.1.2 Introduction to PPPoE IA ..................................................................................................... 57-1
57.2 PPPOE INTERMEDIATE AGENT CONFIGURATION TASK LIST ............................................................... 57-6
57.3 PPPOE INTERMEDIATE AGENT TYPICAL APPLICATION ....................................................................... 57-7
57.4 PPPOE INTERMEDIATE AGENT TROUBLESHOOTING ........................................................................... 57-9
CHAPTER 58 SAVI CONFIGURATION ......................................................................... 58-1
58.1 INTRODUCTION TO SAVI ................................................................................................................... 58-1
58.2 SAVI CONFIGURATION ..................................................................................................................... 58-1
58.3 SAVI TYPICAL APPLICATION ............................................................................................................. 58-5
58.4 SAVI TROUBLESHOOTING ................................................................................................................ 58-7
15
Configuration Guide of XGS-5240-Series
CHAPTER 59 CAPTIVE PORT A L AUTHENTICATION ................................................. 59-1
59.1 CAPTIVE PORTAL AUTHENTICATION CONFIGURATION ......................................................................... 59-1
59.1.1 Introduction to Captive Portal Authentication ...................................................................... 59-1
59.1.2 Captive Portal Authentication Configuration ........................................................................ 59-1
59.1.3 Captive Portal Authentication Examples ............................................................................. 59-4
59.1.4 Captive Portal Authentication Troubleshooting ................................................................... 59-6
59.2 ACCOUNTING FUNCTION CONFIGURATION ......................................................................................... 59-7
59.2.1 Introduction to Accounting Function .................................................................................... 59-7
59.2.2 Accounting Function Configuration ...................................................................................... 59-7
59.2.3 Accounting Function Examples ........................................................................................... 59-9
59.2.4 Accounting Function Troubleshooting ............................................................................... 59-10
59.3 FREE-RESOURCE CONFIGURATION .................................................................................................. 59-10
59.3.1 Introduction to Free-resource ............................................................................................ 59-10
59.3.2 Free-resource Conf i gur ati on .............................................................................................. 59-10
59.3.3 Free-resource Examples ................................................................................................... 59-10
59.3.4 Free-resource Troubleshooting ......................................................................................... 59-11
59.4 AUTHENTICATION WHITE-LIST CONFIGURATION ............................................................................... 59-11
59.4.1 Introduction to Authentication White-list ............................................................................ 59-11
59.4.2 Authentication White-list Configuration .............................................................................. 59-12
59.4.3 Authentication White-list Examples ................................................................................... 59-12
59.4.4 Authentication White-list Troubleshooting ......................................................................... 59-12
59.5 AUTOMATIC PAGE PUSHING AFTER SUCCESSFUL AUTHENTICATION (IT IS NOT SUPPORTED
CURRENTLY
59.6 HTTP-REDIRECT-FILTER ................................................................................................................... 59-15
59.7 PORTAL NON-PERCEPTION ............................................................................................................. 59-18
) .......................................................................................................................................... 59-13
59.5.1 Introduction to Automatic Page Pushing after Successful Authentication ......................... 59-13
59.5.2 Automatic Page Pushing after Successful Authentication Configuration .......................... 59-13
59.5.3 Automatic Page Pushing after Successful Authentication Example .................................. 59-14
59.5.4 Automatic Page Pushing after Successful Authentication Troubleshooting ...................... 59-15
59.6.1 Introduction to http-redirect-filter ....................................................................................... 59-15
59.6.2 http-redirect-filter Configuration ......................................................................................... 59-15
59.6.3 http-redirect-filter Examples............................................................................................... 59-16
59.6.4 http-redirect-filter Troubleshooting ..................................................................................... 59-18
59.7.1 Introduction to Portal Non-perception ................................................................................ 59-18
59.7.2 Portal Non-perception Configuration ................................................................................. 59-18
59.7.3 Portal Non-perception Examples ....................................................................................... 59-18
59.7.4 Portal Non-perception Troubleshooting ............................................................................. 59-20
59.8 PORTAL ESCAPING ......................................................................................................................... 59-20
59.8.1 Portal Server Escaping ...................................................................................................... 59-21
59.8.2 Radius Server Escaping .................................................................................................... 59-25
16
Configuration Guide of XGS-5240-Series
CHAPTER 60 VRRP CONFIGURATION ..................................................................... 60-29
60.1 INTRODUCTION TO VRRP ............................................................................................................... 60-29
60.2 VRRP CONFIGURATION TASK LIST ................................................................................................. 60-30
60.3 VRRP TYPICAL EXAMPLES ............................................................................................................ 60-31
60.4 VRRP TROUBLESHOOTING ............................................................................................................. 60-32
CHAPTER 61 IPV6 VRRPV3 CONFIGURATION .......................................................... 61-1
61.1 INTRODUCTION TO VRRPV3 ............................................................................................................. 61-1
61.1.1 The Format of VRRPv3 Message........................................................................................ 61-2
61.1.2 VRRPv3 Working Mechanism ............................................................................................. 61-3
61.2 VRRPV3 CONFIGURATION ................................................................................................................ 61-4
61.2.1 Configuration Task Sequence .............................................................................................. 61-4
61.3 VRRPV3 TYPICAL EXAMPLES .......................................................................................................... 61-6
61.4 VRRPV3 TROUBLESHOOTING ........................................................................................................... 61-7
CHAPTER 62 MRPP CONFIGURATION ....................................................................... 62-1
62.1 INTRODUCTION TO MRPP ................................................................................................................. 62-1
62.1.1 Conception Introduction ....................................................................................................... 62-1
62.1.2 MRPP Protocol Packet Types ............................................................................................. 62-2
62.1.3 MRPP Protocol Operation System ...................................................................................... 62-3
62.2 MRPP CONFIGURATION TASK LIST ................................................................................................... 62-4
62.3 MRPP TYPICAL SCENARIO ............................................................................................................... 62-6
62.4 MRPP TROUBLESHOOTING .............................................................................................................. 62-8
CHAPTER 63 ULPP CONFIGURATION ....................................................................... 63-1
63.1 INTRODUCTION TO ULPP .................................................................................................................. 63-1
63.2 ULPP CONFIGURATION TASK LIST .................................................................................................... 63-3
63.3 ULPP TYPICAL EXAMPLES ............................................................................................................... 63-5
63.3.1 ULPP Typical Example1 ...................................................................................................... 63-5
63.3.2 ULPP Typical Example2 ...................................................................................................... 63-7
63.4 ULPP TROUBLESHOOTING ............................................................................................................... 63-9
CHAPTER 64 ULSM CONFIGURATION ....................................................................... 64-1
64.1 INTRODUCTION TO ULSM ................................................................................................................. 64-1
64.2 ULSM CONFIGURATION TASK LIST ................................................................................................... 64-2
64.3 ULSM TYPICAL EXAMPLE ................................................................................................................ 64-3
64.4 ULSM TROUBLESHOOTING .............................................................................................................. 64-4
17
Configuration Guide of XGS-5240-Series
CHAPTER 65 MIRROR CONFIGURATION .................................................................. 65-5
65.1 INTRODUCTION TO MIRROR ............................................................................................................... 65-5
65.2 MIRROR CONFIGURATION TASK LIST ................................................................................................. 65-5
65.3 MIRROR EXAMPLES .......................................................................................................................... 65-6
65.4 DEVICE MIRROR TROUBLESHOOTING ................................................................................................ 65-7
CHAPTER 66 RSPAN CONFIGURATION ..................................................................... 66-1
66.1 INTRODUCTION TO RSPAN ............................................................................................................... 66-1
66.2 RSPAN CONFIGURATION TASK LIST ................................................................................................. 66-3
66.3 TYPICAL EXAMPLES OF RSPAN ....................................................................................................... 66-4
66.4 RSPAN TROUBLESHOOTING ............................................................................................................ 66-7
CHAPTER 67 SNTP CONFIGURATION ....................................................................... 67-9
67.1 INTRODUCTION TO SNTP .................................................................................................................. 67-9
67.2 TYPICAL EXAMPLES OF SNTP CONFIGURATION .............................................................................. 67-10
CHAPTER 68 NTP FUNCTION CONFIGURATION ...................................................... 68-1
68.1 INTRODUCTION TO NTP FUNCTION .................................................................................................... 68-1
68.2 NTP FUNCTION CONFIGURATION TASK LIST ...................................................................................... 68-1
68.3 TYPICAL EXAMPLES OF NTP FUNCTION ............................................................................................ 68-4
68.4 NTP FUNCTION TROUBLESHOOTING ................................................................................................. 68-5
CHAPTER 69 DNSV4/V6 CONFIGURATION ................................................................ 69-1
69.1 INTRODUCTION TO DNS .................................................................................................................... 69-1
69.2 DNSV4/V6 CONFIGURATION TASK LIST ............................................................................................. 69-2
69.3 TYPICAL EXAMPLES OF DNS ............................................................................................................ 69-4
69.4 DNS TROUBLESHOOTING ................................................................................................................. 69-6
CHAPTER 70 SUMMER TIME CONFIGURATION ....................................................... 70-1
70.1 INTRODUCTION TO SUMMER TIME ...................................................................................................... 70-1
70.2 SUMMER TIME CONFIGURATION TASK SEQUENCE .............................................................................. 70-1
70.3 EXAMPLES OF SUMMER TIME ............................................................................................................ 70-2
70.4 SUMMER TIME TROUBLESHOOTING ................................................................................................... 70-2
CHAPTER 71 MONITOR AND DEBUG ........................................................................ 71-3
71.1 PING ................................................................................................................................................ 71-3
18
Configuration Guide of XGS-5240-Series
71.2
PING6 .............................................................................................................................................. 71-3
71.3 TRACEROUTE ................................................................................................................................... 71-3
71.4 TRACEROUTE6 ................................................................................................................................. 71-4
71.5 SHOW .............................................................................................................................................. 71-4
71.6 DEBUG ............................................................................................................................................ 71-5
71.7 SYSTEM LOG .................................................................................................................................... 71-6
71.7.1 System Log Introduction ...................................................................................................... 71-6
71.7.2 System Log Configuration ................................................................................................... 71-8
71.7.3 System Log Configuration Example .................................................................................... 71-9
CHAPTER 72 RELOAD SWITCH AFTER SPECIFIED TIME ....................................... 72-1
72.1 INTRODUCE TO RELOAD SWITCH AFTER SPECIFID TIME ...................................................................... 72-1
72.2 RELOAD SWITCH AFTER SPECIFID TIME TASK LIST ............................................................................ 72-1
CHAPTER 73 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND
SENT BY CPU ................................................................................................................ 73-1
73.1 INTRODUCTION TO DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AN D SENT BY CPU ............. 73-1
73.2 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY CPU TASK LIST ......................... 73-1
CHAPTER 74 VSF ......................................................................................................... 74-3
74.1 OVERVIEW ....................................................................................................................................... 74-3
74.1.1 Introduction of VSF .............................................................................................................. 74-3
74.1.2 Basic Concept ..................................................................................................................... 74-5
74.1.3 Glossary............................................................................................................................... 74-6
74.1.4 VSF Typical Application ....................................................................................................... 74-6
74.1.5 LACP MAD .......................................................................................................................... 74-7
74.1.6 BFD MAD............................................................................................................................. 74-8
74.2 RELEVANT VSF CONFIGURATION ...................................................................................................... 74-9
74.2.1 VSF Configuration ............................................................................................................... 74-9
74.2.2 LACP MAD Configuration .................................................................................................. 74-11
74.2.3 BFD MAD Configuration .................................................................................................... 74-12
74.3 TYPICAL VSF EXAMPLE ................................................................................................................. 74-13
74.4 VSF TROUBLESHOOTING................................................................................................................ 74-16
CHAPTER 75 SWITCH OPERATION .......................................................................... 75-18
75.1 ADDRESS TABLE ............................................................................................................................ 75-18
75.2 LEARNING ...................................................................................................................................... 75-18
75.3 FORWARDING & FILTERING ............................................................................................................. 75-18
19
Configuration Guide of XGS-5240-Series
75.4
STORE-AND-FORWARD ................................................................................................................... 75-18
75.5 AUTO-NEGOTIATION ....................................................................................................................... 75-19
CHAPTER 76 TROUBLESHOOTING ........................................................................... 76-1
CHAPTER 77 APPENDIX A .......................................................................................... 77-1
77.1 A.1 SWITCH'S RJ45 PIN ASSIGNMENTS ............................................................................................ 77-1
77.2 A.2 10/100MBPS, 10/100BASE-TX ................................................................................................ 77-1
CHAPTER 78 GLOSSARY ............................................................................................ 78-1
20
Configuration Guide of XGS-5240-Series
The Managed Switch
Quick Installation Guide
RJ45-to-DB9 RS232 Cable
Rack Mounting Kit
Rubber Feet
SFP Dust Cap
QSFP Dust Cap
Ground Cable
Power Cord
Dust-proof Caps
Dust-proof Caps
XGS-5240-24X2QR
24
2

Chapter 1 INTRODUCTION

Thank you for purchasing PLANET Industrial L3 Managed Gigabit/10 Gigabit Ethernet Switch. The description of this model is shown below:
XGS-5240-24X2QR

1.1 Packet Contents

Open the box of the Managed Switch and carefull y unpack it. The box should contain t he following items:
L2+ 24-Port 10G SFP+ plus 2-Port 40G QSFP+ Managed Switch with 36-72V DC Redundant Power
If any of these are m issing or damaged, please contac t your dealer imm ediately; if possible, retai n the carton including the or iginal pac k ing mater ial, and use them again to rep ack the produc t in case there is a need to return it to us for repair.
SFP+
QSFP+
21
Configuration Guide of XGS-5240-Series

1.2 Product Description

Powerful 40Gbps Solution for Networks
PLANET XGS-5240-24X2QR is a high perform ance Layer 2+ Managed S witch that m eets the next generation Metro, Data Center, Campus and Enterprise network requirements. It has high-density 24 10G SFP+ and 2 40G QSFP fiber interfaces delivered in a 1RU rugged case.
To help customer stay on top of business, the XGS-5240-24X2QR not only offers ultra high transmission performance, but also IPv4/IPv6 VLAN routing feature which allows to cross over different VLAN groups and IP addresses for the purpose of having a highly-secure, flexible management.
The administrator can flexibly choose the suitable transceivers according to the transmission distance or the transmission speed required extending the 1G/10G/40G network efficiently. Besides, with 640Gbps switching c apacity, the XGS-5240-24X2QR can handle extremel y large amounts of data in a secure topology linking to backbone or high capacity servers where audio, video streaming and multicast applications are utilized.
High Reliability Hardware Stacking
Using QSFP+ port to connect several servers and build a virtually logical facility, the XGS-5240-24X2QR gives the enter prises, ser vice provider s and telec oms flexible c ontrol over p ort density, uplinks and switch stack performance. The stack redundancy of the XGS-5240-24X2QR ensures that data inte grity is retained even if one switch in the stac k fails. You can even hot-swap switches without d isrupting the net work, which great ly sim plifies the t ask s of upgradi ng the L AN for catering to increasing bandwidth demands
Redundant AC/DC Power Supply to Ensure Continuous Operation
The XGS-5240-24X2QR is particularly e quipp ed with one 1 00~24 0V AC power su ppl y unit and o ne 36~72V DC power supply unit to provide an enhanced reliable and scalable redundant power supply. The continuous p ower system is specificall y designed to fulfill the dem ands of high-tech facilities requiring the highes t power integrit y. With the 36~72V DC power supply, th e XGS-5240-24X2QR is able to act as a telecom-level device that can be located in the electronic room.
22
Configuration Guide of XGS-5240-Series
Robust Layer 2 Features
The XGS-5240-24X2QR can be program med for advanced switch m anagement functions such as dynamic port link aggregation, Q-in-Q VLAN, private VLAN, Multiple Spanning Tree Protocol (MSTP), Layer 2/4 QoS, bandwidth control and IGMP/MLD snooping. The XGS-5240-24X2QR provides 802.1Q tagged VLAN. Via aggregation of supporting ports, the XGS-5240-24X2QR allows the operation of a high-speed trunk com bining multip le ports . The switch en ables a m axim um of up to 128 trunk groups with 8 ports for each trunk group and supports connection fail-over as well.
Efficient and Secure Management
For efficient management, the XGS-5240-24X2QR is equipped with console, Web and SNMP management interfaces. With the built-in Web-based management interface, the XGS-5240-24X2QR offers an easy-to-use, platform-independent management and configuration facility. The XGS-5240-24X2QR supports stand ard Simple Network Management Protocol (SNMP) and can be managed via any standard-b ased manage ment software. F or text-bas ed managem ent, the XGS-5240-24X2QR can be accessed via Telnet and the console port. Moreover, the XGS-5240-24X2QR offers secure remote management by supporting SSH, SSL and SNMP v3 connection which encrypt the packet content at each session.
More and more eng ineers or administrators use Cisco command to manag e Ethernet s witch. For reducing product le arning time, the XGS-5240-24X2QR offers Cisco-like comm and and customers do not need to learn new command. W ith easy and friendly m anagement interfaces, and plenty of management functions included , The XGS-5240-24X2QR is the b est choice for ISPs to build the IPv6 FTTx edge service and for SMBs to connect with the IPv6 network.
Flexibility and Extension Solution
The XGS-5240-24X2QR provides twenty-four 10Gbps SFP+ and two 40Gbps QSFP Fiber interfaces. Each of the SFP + slots sup ports Dual Speed, 10GBASE-SR/LR or 1000BASE-SX/LX and each of the QSFP slots supports native 40G and four 10 Gigabit Ethernet modes. Therefore, the administrator can flexibly choose the suitable SFP transceiver according to not only the transmission distance, but also th e trans m ission spee d requir ed. T he dist ance ca n be ex tende d fr om 550 m eter s to 2km (multi-mode fiber) or up to 10/20/30/40/50/70/120 km (single-mode fiber or WDM fiber). They are well suited for applications within the enterprise data centers and distributions.
23
Configuration Guide of XGS-5240-Series
Enhanced Security
The XGS-5240-24X2QR offers comprehensive Layer 2 to Layer 4 Access Control List (ACL) for enforcing securit y to the edge. It can be used to restrict net work access by denying pac kets based on source and destination I P address, TCP/UDP ports or def ined typical network application. Their protection mechanism also comprises 802.1x Port-based and MAC-based customer and dev ice authentication. As to private VLAN function, c om munications between edge ports can be protec te d to ensure custom er privacy. The XGS-5240-24X2QR also pro vides functions of DHCP snooping, Option 82 and ARP guard, and Anti-ARP scanning so as to prevent IP from attacking and discarding ARP packet s with invalid MAC address. The network administrators can now co nstruc t a highly-secure corporate network with considerably less time and effort than before.
IPv6/IPv4 Dual Stack
As the XGS-5240-24X2QR supports the IPv6 Protocol, they h elp SMBs and enterprises to step in the IPv6 era with the lowest investment, meaning the existing network facilities need not be replaced.
Intelligent SFP Diagnosis Mechanism
The XGS-5240-24X2QR supports SFP-DDM (Digital Diagnostic Monitor) function that greatly helps network administrator to easily monitor real-time parameters of the SFP, such as optical output power, optical input power, temperature, laser bias current, and transceiver supply voltage.

1.3 Product Features

Physical Port
24 10GBASE-SR/LR SFP+ slots, compatible with 1000BASE-SX/LX /BX SF P  2 QSFP+ slots with each supporting native 40G and four 10 Gigabit Ethernet modes.  1 10/100/1000BASE-T RJ45 MGMT port  1 USB2.0 interface for configuration and firmware storage  RJ45 console interface for switch basic management and setup
Stacking Features
Hardware Stack ing
Virtualized multiple XGS-5240-24X2QR switches into one logical device
Connects with stack member via assigned 10G SFP+ interfaces or 40G QSFP+
interfaces
Single IP address stack management, supporting up to 4 hardware units stacked together
Stacking architecture supports redundancy Ring mode
24
Configuration Guide of XGS-5240-Series
Layer 2 Features
Prevents packet loss flow control
- IEEE 802.3x pause frame flow control in full-duplex mode
- Back-pressure flow control in half-duplex mode
High performance Store-and-Forward architecture, broadcast storm control and port
loopback detection
32K MAC address table, automatic source address learning and aging Supports VLAN
- IEEE 802.1Q tag-based VLAN
- Up to 4K VLAN IDs
- Provider Bridging (VLAN Q-in-Q, IEEE 802.1ad) supported
- Private VLAN Edge (PVE) supported
- Protocol-based VLAN
- MAC-based VL AN
- IP subnet VLAN
Supports Link Aggregation
- Maximum 128 trunk groups, up to 8 ports per trunk group
- IEEE 802.3ad LACP (Link Aggregation Control Protocol)
- Cisco ether-channel (static trunk)
Supports Spanning Tree Protocol
- STP, IEEE 802.1D (Classic Spanning Tree Protocol)
- RSTP, IEEE 802.1w (Rapid Spanning Tree Protocol)
- MSTP, IEEE 802.1s (Multiple Spanning Tree Protocol, spanning tree by VLAN)
- Supports BPDU & root guard
Port mirroring to monitor the incoming or outgoing traffic on a particular port (many to many) Provides port mirror (many-to-1)
Quality of Service
8 priority queues on all switch ports Support for strict priority and WRR (Weighted Round Robin) CoS policies Traffic classification
- IEEE 802.1p CoS/ToS
- IPv4/IPv6 DSCP
- Port-based WRR
Strict priority and WRR CoS policies
Multicast
Supports IPv4 IGMP snooping v1, v2 and v3; IP v6 MLD v1 and v2 snooping Querier mode support Supports Multicast VLAN Register (MVR)
DHCP
25
Configuration Guide of XGS-5240-Series
IPv4/IPv6 DHCP Client,IPv4/IPv6 DHCP Relay
Option 82
IPv4/IPv6 DHCP Snooping,IPv4/IPv6 DHCP Server
Security
 IEEE 802.1x port-based network access authentication  MAC-based network access authentication  Built-in RADIUS client to cooperate with the RADIUS servers for IPv4 and IPv6  TACACS+ login users access authentication  IP-based Access Control List (ACL)  MAC-based Access Control List  Supports ARP inspection  IP Source Guard prevents IP spoofing attacks  Dynamic ARP Inspection discards ARP packets with invalid MAC address to IP address
binding
Management
Management IP for IPv4 and IPv6 Switch Management Interface
- Console/Telnet Command Line Interface
- Web switch management
- SNMP v1, v2c, and v3 switch management
- SSH/SSL secure access
Firmware upload/download via TFTP or HTTP Protocol for IPv4 and IPv6 SNTP (Simple Network Time Protocol) for IPv4 and IPv6 User privilege levels control Syslog server for IPv4 and IPv6 Supports DDM
OAM EFM; OAM CFM
Four RMON groups 1, 2, 3, 9 (history, statistics, alarms and events) Supports sFlow Supports ULDP (like Cisco UDLD) Supports LLDP/LLDP MED Supports ping, trace route function for IPv4 and IPv6
Redundant Power System
Redundant 100~240V AC/36-72V DC dual power  Active-active redundant power failure protection  Backup of catastrophic power failure on one supply  Fault toler ance and res ilie n c e
26

1.4 Product Specifications

Compatible with 1000BASE-SX/LX/BX SFP transceiver
Dimensions (W x D x H)
Product XGS-5240-24X2QR
Hardware Specification s
Configuration Guide of XGS-5240-Series
SFP+ Slots
QSFP+ Slots
Console 1 x RJ45-to-RS232 serial port (9600, 8, N, 1) Switch Architecture Store-and-forward Switch Fabric 640Gbps/non-blocking Switch Throughput 476Mpps Address Table 32K MAC address table with auto learning function ACL Table 3K (ingress) + 1K (egress) Shared Data Buffer 4MB
Flow Control
Jumbo Frame 10Kbytes
24 10GBASE-SR/LR SFP+ interfaces
2 with each supporting 40 Gigabit Eth ernet and four 10 Gigabit
Ethernet modes
Back pressure for half duplex IEEE 802.3x pause frame for full duplex
System: PWR/DC/MGMT/SYS(Green)
LED
Weight 4.3kg Power Consumption 56.64W/ 194.33 BTU
Power Requirements
Fan 3
Layer 3 Protocol
Other ICMPv6,ND,DNSv6
Layer 2 Functions
Ports: 1/10G SFP+ slot: LNK/ACT(Orange/ Green) 40G QSFP+ slot: LNK/ACT (Green)
440 x 318x 43.6 mm, 1U height
AC 100~240V, 50/60Hz DC 36-72V
Configured Tunnels ISATAP GRE Tunnel
27
Configuration Guide of XGS-5240-Series
Port disable/enable 1 &10Gbps full duplex mode selection
Port Configuration
Flow control dis a bl e/en ab le Bandwidth control on each port Port loopback detection
Port-based VLAN
IEEE802.1Q Private VLAN
VLAN
Protocol VLAN Voice VLAN MAC VLAN VLAN Translation
Bandwidth Control TX/RX/Both
IEEE 802.3ad LACP/static trunk
Link Aggregati on
Supports 128 groups with 8 ports per trunk group 8 priority queues on all switch ports
Supports strict priority and Weighted Round Robin (WRR) CoS
policies
QoS
Multicast
Access Control List
Security
Traffic classification:
- IEEE 802.1p CoS/ToS
- IPv4/IPv6 DSCP
- Port-based WRR IGMP v1/v2/v3 snooping
Querier mode support MLD v1/v2 snooping Multicast VLAN Register (MVR)
Supports Standard and Expanded ACL IP-based ACL/MAC-based ACL Time-based ACL Up to 512 entries
Supports MAC + port binding IPv4/IPv6 + MAC + port binding IPv4/IPv6 + port binding Supports MAC filter ARP scanning prevention
Authentication
IEEE 802.1x port-based network access control AAA authentication: TACACS+ and IPv4/IPv6 over RADIUS
28
Configuration Guide of XGS-5240-Series
Interfaces
RFC 2674 Bridge MIB Extensions (IEEE 802.1P MIB)
Management functions
System Configuration Console, Telnet, Web browser, SNMP v1, v2c Secure Management
Management
SNMP MIBs
SSH, SSL, SNMPv3 Supports both IPv4 and IPv6 addressing
Supports the user IP security inspection for IPv4/IPv6 SNMP Supports MIB and TRAP Supports IPv4/IPv6 FTP/TFTP Supports IPv4/IPv6 NTP Supports RMON 1, 2, 3, 9 four groups Supports the RADIUS authentication for IPv4/IPv6 Telnet user
name and password Supports IPv4/IPv6 SSH The right configuration for users to adopt RADIUS server’s shell
management Supports CLI, console, Telnet Supports SNMP v1, v2c and v3 Supports Security IP safety net management function: avoid
unlawful landing at nonrestrictive area Supports Syslog server for IPv4 and IPv6 Supports TACACS+
RFC 1213 MIB-II RFC 1215 Internet Engineering Task Force RFC 1271 RMON RFC 1354 IP-Forwarding M IB RFC 1493 Bridge MIB RFC 1643 Ether-like MIB RFC 1907 SNMP v2 RFC 2011 IP/ICMP MIB RFC 2012 TCP MIB RFC 2013 UDP MIB RFC 2096 IP forward MIB RFC 2233 if MIB RFC 2452 TCP6 MIB RFC 2454 UDP6 MIB RFC 2465 IPv6 MIB RFC 2466 ICMP6 MIB RFC 2573 SNMP v3 notify RFC 2574 SNMP v3 vacm RFC 2674 Bridge MIB Extensions (IEEE 802.1Q MI B)
Standard Conformance
Regulatory Compliance FCC Part 15 Class A, CE
Standards Compliance
IEEE 802.3ae 10Gb/s Ethernet IEEE 802.3x flow control and back pressure
29
Configuration Guide of XGS-5240-Series
Relative Humidity: 5 ~ 90% (non-condensing)
Relative Humidity: 5 ~ 90% (non-condensing)
IEEE 802.3ad port trunk with LACP IEEE 802.1D Spanning Tree Protocol IEEE 802.1w Rapid Spanning Tree Protocol IEEE 802.1s Multiple Spanning Tree Protocol IEEE 802.1p Class of Service IEEE 802.1Q VLAN tagging IEEE 802.1X port authentication network control IEEE 802.1ab LLDP RFC 768 UDP RFC 793 TFTP RFC 791 IP RFC 792 ICMP RFC 2068 HTTP RFC 1112 IGMP v1 RFC 2236 IGMP v2 RFC 3376 IGMP v3
Environment
Operating
Storage
RFC 2710 MLD v1 FRC 3810 MLD v2
Temperature: 0 ~ 50 degrees C
Temperature: -10 ~ 70 degrees C
30
Configuration Guide of XGS-5240-Series

Chapter 2 INSTALLATION

This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount . For easier managem ent and control of the Ma naged S witch, fam iliari ze yourse lf with its display indicators, and ports. Front panel illustrations in this chapter display the unit LED indicators. Before connec ting any network device to the Ma naged Switch, please read this chapt er completely.

2.1 Hardware Description

2.1.1
The unit front panel prov ides a simple interf ace monitoring the s witch. Figure 2-1-1, show th e front panel of the Managed Switches.
XGS-5240-24X2QR Front Panel
SFP+ slots
QSFP+ slots

Switch Front Panel

Figure 2-1-1 XGS-5240-24X2QR front panel
SFP/SFP+ mini-GBIC slot, SFP (Small Factor Pluggable) transceiver module: From 550 meters (Multi-mode fiber) to 10/30/50/70/120 kilometers (Single-mode fiber).
40GBASE-SR4 transceiver 850nm, MMF, OM3 100m,OM4 150m , Supporting 40G divided into 4 10G,n eed to cooperate with MTP optical fiber
Console Port
The console port is an RJ45 type, RS232 male serial port connector. It is an interface for connecting a term inal directly. Through the console po rt, it provides rich diagnost ic inform ation including IP address setting, factory reset, port managem ent, link status and system setting. Users can use the attached RS232 cable in the package and connect to the console port on the device. After the connect ion, users can run any terminal em ulation program (Hyper Terminal, ProComm Plus, Telix, Winterm and so on) to enter the startup screen of the device.
USB Interface
The USB port is a USB2.0 type; it is an interface for uploading/restoring the configuration/firmware.
31
Configuration Guide of XGS-5240-Series
Alarm Port
The alarm port is an RJ45 type, an interface for monitoring the external devices (such as alarm) when monitoring external devices has failed.
MGMT Port
The MGMT port is an RJ45 type, an independent interface for Telnet or SSH.

2.1.2 LED Indications

The front panel LEDs indicate instant status of port links, data activity, system operation, stack status and system power, and helps monitor and troubleshoot when needed.
XGS-5240-24X2QR Front Panel
Figure 2-1-2 XGS-5240-24X2QR LED panel

2.1.3 Switch Rear Panel

The rear panel of the Managed Switch indicates AC inlet and DC power socket , which accepts input power from 100 to 240V A C, 50-60Hz. 36 to 72V DC .Figure 2-1-3 shows the re ar panel of these Managed Switches
XGS-5240-24X2QR Re ar Panel
Figure 2-1-3 Rear panel of XGS-5240-24X2QR
AC Power Receptacle
Compatible with electrical services in most areas of the world, the Managed Switch’s power supply automatically adjusts to line power in the range of 100-240VAC and 50/60 Hz.
32
Configuration Guide of XGS-5240-Series
ns
Plug the female end of the power cord firmly into the receptacle on the rear panel of the Managed Switch. Plug the other end of the power cord int o an electrical outlet and th en the power will be ready.

2.2 Switch Installation

This section describes ho w to install your Managed Switch and m ake connections to the Managed Switch. Please read the following topics and perf orm the procedures in the order being presente d. To install your Managed Switch on a desktop or shelf, simply complete the following steps.

2.2.1 Desktop Install a tion

To install the Managed Switch on desktop or shelf, please follow these steps:
Step 1: Attach the rubber feet to the recessed areas on the bottom of the Managed Switch. Step 2: Plac e th e M anaged Switch on the desktop or the s helf near an AC power sourc e, as shown
in Figure 2-2-1.
Figure 2-2-1 Place the Managed Switch on the desktop
Step 3: Keep enough ventilation space between the Manag ed S witc h and the surrounding objects.
When choosing a location, please keep in mind the environmental restrictio discussed in Chapter 1, Sec tion 4 under Specifications.
33
Configuration Guide of XGS-5240-Series
Switch requires UTP Category 5 network cabling
45 tips. For more information, please see the Cabling Specification in
Step 4: Connect the Managed Switch to network devices.
Connect one end of a standard net work c able to the 10/10 0/1000 RJ45 ports on the front of the Managed Switch a nd connec t the oth er end of the c able to the net work devices s uch as printer servers, workstations or routers, etc.
Connection to the Managed with RJ Appendix A.
Step 5: Supply power to the Managed S witch.
Connect one end of the power cable to the Managed Switch. Connect the power plug of the power cable to a standard wall outlet. When the Managed Switch receives power, the Power LED should remain solid Green.

2.2.2 Rack Mounting

To ins tall the Managed Switch in a 19-inch s tandard rack, please follow the instruc tions described below: Step 1: Place the Managed Switch on a hard flat surface, with the front panel positioned towards the
front side.
Step 2: Attach the rack-mount brack et to each side of the Managed Switc h with supplied scre ws
attached to the package.
Figure 2-2-2 shows how to attach brackets to one side of the Managed Switch.
Figure 2-2-2 Attach brackets to the Managed Switch.
You must use the screws supplied with the mounting brackets. Damage caused to the parts by using incorrect screws would in va lidate the warranty.
34
Configuration Guide of XGS-5240-Series
Step 3: Secure the brackets tightly. Step 4: Follow the same steps to attach the second bracket to the opposite side. Step 5: After the brack ets are attached to the Managed Switch, use suitable screws to securely
attach the brackets to the rack, as shown in Figure 2-2-3.
Figure 2-2-3 Mounting SGS-6341 Series in a Rack
Step 6: Proceed with Steps 4 and 5 of Session 2.2.1 Desktop Ins tallation to connect the network
cabling and supply power to the Managed Switch.

2.2.3 Installing the SFP/SFP+ Transceiver

The sections describe how to insert an SFP/SFP+ transceiver into an SFP/SFP+ slot. The SFP/SFP+ transceivers are hot-pluggable and hot-swappable. You can plug in and out the transceiver to/from any S FP/SFP+ port without having to power down the Managed Switch, as the
Figure 2-16 shows.
35
Configuration Guide of XGS-5240-Series
(Mbps)
degrees C
degrees C
degrees C
degrees C
(Mbps)
(TX/RX)
Figure 2-16 Plug in the SFP transceiver
Approved PLANET SFP/SFP+ Transceivers PLANET Managed S witch supports both single mode and multi-mode SFP/SFP+ transceivers. The
following list of approved PLANET SFP/SFP+ transceivers is correct at the time of publication:
Gigabit Ethernet Transceiver (1000BASE-X SFP)
Model
Speed
MGB-GT 1000 Copper -- 100m -- 0 ~ 60 degrees C MGB-SX 1000 LC Multi Mod e 550m 850nm 0 ~ 60 degrees C
MGB-SX2 1000 LC Multi Mod e 2km 1310nm 0 ~ 60 degrees C
MGB-LX 1000 LC Single Mode 10km 1310nm 0 ~ 60 degrees C MGB-L30 1000 LC Single Mode 30km 1310nm 0 ~ 60 degrees C MGB-L50 1000 LC Single Mode 50km 1550nm 0 ~ 60 degrees C MGB-L70 1000
MGB-L120 1000 LC Single Mode 120km 1550nm 0 ~ 60 degrees C
MGB-TSX 1000 LC Multi Mode 550m 850nm -40 ~ 75 MGB-TLX 1000 LC Single Mode 10km 1310nm -40 ~ 75
MGB-TL30 1000 LC Single Mode 30km 1310nm -40 ~ 75 MGB-TL70 1000 LC Single Mode 70km 1550nm -40 ~ 75
Connector
Interface
LC Single Mode 70km 1550nm 0 ~ 60 degrees C
Fiber Mode Distance Wavelength (nm) Operating Temp.
Gigabit Ethernet Transceiver (1000BASE-BX, Single Fiber Bi-directional SFP)
Model
Speed
Connector
Interface
Fiber Mode Distance
Wavelength
Operating Temp.
36
Configuration Guide of XGS-5240-Series
degrees C
degrees C
degrees C
degrees C
degrees C
degrees C
degrees C
degrees C
MGB-LA10 1000
WDM(LC)
MGB-LB10 1000 WDM(LC) Single
MGB-LA20 1000 WDM(LC) Single
MGB-LB20 1000 WDM(LC) Single
MGB-LA40 1000 WDM(LC) Single
MGB-LB40 1000 WDM(LC) Single
MGB-LA60 1000 WDM(LC) Single
MGB-LB60 1000 WDM(LC) Single
MGB-TLA10 1000 WDM(LC) Single
MGB-TLB10 1000 WDM(LC) Single
MGB-TLA20 1000 WDM(LC) Single
MGB-TLB20 1000 WDM(LC) Single
MGB-TLA40 1000 WDM(LC) Single
MGB-TLB40 1000 WDM(LC) Single
MGB-TLA60 1000 WDM(LC) Single
MGB-TLB60 1000 WDM(LC) Single
Single
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
Mode
10km 1310nm/1550nm 0 ~ 60 degrees C
10km 1550nm/1310nm 0 ~ 60 degrees C
20km 1310nm/1550nm 0 ~ 60 degrees C
20km 1550nm/1310nm 0 ~ 60 degrees C
40km 1310nm/1550nm 0 ~ 60 degrees C
40km 1550nm/1310nm 0 ~ 60 degrees C
60km 1310nm/1550nm 0 ~ 60 degrees C
60km 1550nm/1310nm 0 ~ 60 degrees C
10km 1310nm/1550nm
10km 1550nm/1310nm
20km 1310nm/1550nm
20km 1550nm/1310nm
40km 1310nm/1550nm
40km 1550nm/1310nm
60km 1310nm/1550nm
60km 1550nm/1310nm
-40 ~ 75
-40 ~ 75
-40 ~ 75
-40 ~ 75
-40 ~ 75
-40 ~ 75
-40 ~ 75
-40 ~ 75
37
10Gbps SFP+ (10G Ethernet/10GBASE)
(nm)
Temp.
degrees
C
degrees
C
(Mbps)
Connector
length
(TX)
(RX)
10G
WDM(LC)
Single Mode
20km
1330nm
1270nm
0 ~ 60 degrees C
10G
WDM(LC)
Single Mode
40km
1270nm
1330nm
0 ~ 60 degrees C
10G
WDM(LC)
Single Mode
40km
1330nm
1270nm
0 ~ 60 degrees C
10G
WDM(LC)
Single Mode
60km
1270nm
1330nm
0 ~ 60 degrees C
10G
WDM(LC)
Single Mode
60km
1330nm
1270nm
0 ~ 60 degrees C
Switch. If you
Switch will
Configuration Guide of XGS-5240-Series
Model Speed (Mbps)
MTB-SR 10G LC Multi Mode Up to 300m 850nm
10G LC
MTB-LR
Connector
Interface
Fiber Mode Distance
Single Mode 10km 1310nm
10Gbps SFP+ (10GBASE-BX, Single Fiber Bi-directional SFP)
Model
MTB-LA20 MTB-LB20
MTB-LA40 MTB-LB40
MTB-LA60 MTB-LB60
Speed
Interface
10G WDM(LC) Single Mode 20km 1270nm 1330nm 0 ~ 60 degrees C
Fiber Mode Distance
Wave
Wavelength
Wavelength
Operating
0 ~ 60
0 ~ 60
Operating Temp.
It is recommended to use PLANET SFP/SFP+ on th e Managed insert an SFP/SFP+ transc eiver that is not supported, the Managed not recognize it.
1. Before we connect the SGS-6341 series to the other network device, we have to make sure both sides of the SFP transceivers are with the same media type, for example: 1000BASE-SX to 1000BASE-SX, 1000Bas-LX to 1000BASE-LX.
2. Check whether the fiber-optic cable type matches with the SFP transceiver requirement. To connect to 1000BASE-SX SFP transceiver, please use the multi-mode fiber cable with
one side being the male duplex LC connector type.
To connect to 1000BASE-LX SFP transceiver, please use the single-mode fiber cable with
one side being the male duplex LC connector type.
Connect the Fiber Cable
1. Insert the duplex LC connector into the SFP/SFP+ transceiver.
2. Connect the other end of the cable to a device w ith S F P/SFP+ transceiver installed.
3. Check the LNK/ACT LED of the SFP/SFP+ slot on the front of the Managed Switch. Ensure that the SFP/SFP+ transceiver is operating correctly.
4. Check the Link mode of the SFP/SFP+ port if the link fails. To function with some fiber-NICs or Media Converters, user has to set the port Link mode to “10G Force”, “1000M Force” or “100M Force”.
38
Configuration Guide of XGS-5240-Series
Remove the Transceiver Module
1. Make sure there is no network activity anymore.
2. Remove the Fiber-Optic Cable gently.
3. Lift up the lever of the MGB module and turn it to a horizontal position.
4. Pull out the module gently through the lever.
Figure 2-17: How to Pull Out the SFP/SFP+ Transceiver
Never pull out the module without lifting up the lever o f the m odule and t urni ng it to a horizontal position. Directly pulling out the module could damage the module and the SFP/SFP+ module slot of the Managed Switch.
39
Configuration Guide of XGS-5240-Series
Device Name
Description
such as HyperTerminal included in Windows
9x/NT/2000/XP.
Serial port cable
One end attach to th e RS-232 ser ial port, the other end to t he

Chapter 3 witch Management

3.1 Management Optio ns

After purchasing the switch, the user needs to configure the s witch for network m anagement.
Switch provides two management options: in-band management and out-of-band management.

3.1.1 Out-Of-Band Management

Out-of-band managem ent is the management thro ugh Console interface. Gene rally, the user will use out-of-band management for the initial switch configuration, or when in-band management is not available. For instance, the user must assign an IP address to the switch via the Console interface to be able to access the switch through Telnet.
The procedures for managing the switch via Console interface are listed below:
Step 1: setting up the environment:
Connect with serial port
Fig 1-1 Out-of-band Management Configuration Environment
As shown in above, the serial port (RS-232) is connected to th e switch with the serial cable provided. The table below lists all the devices used in the connection.
PC machine Has functional keyboard and RS-232, with terminal emulator
installed,
40
Configuration Guide of XGS-5240-Series
Console port.
Switch
Functional Console port required.
Step 2 Entering the HyperTerminal
Open the HyperTerminal included in Windows after the c onnection established. T he example below is based on the HyperTerminal included in Windows XP.
1) Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
Fig 1-2 Opening Hyper Terminal
2) Type a name for opening HyperTerminal, such as “Switch”.
Fig 1-3 Opening HyperTerminal
3) In the “Connecting using” drop-list, select the RS-232 serial port used by the PC, e.g. COM1, and click “OK”.
41
Configuration Guide of XGS-5240-Series
Fig 1-4 Opening HyperTerminal
4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for “Parity checksum”, “1” for stop bit and “n one” for tr affic control; or, you c an also cl ick “Res tore defaul t” and click “OK”.
Fig 1-5 Opening HyperTerminal
5The configuration interface of the Op en ing H yperTerminal
42
Configuration Guide of XGS-5240-Series
Fig 1-6 Opening HyperTerminal
Step 3: Entering switch CLI interface
Power on the switch, the following appears in the HyperTerminal windows, that is the CLI configuration mode for Switch.
Switch>
The user can now en ter commands to manage th e switch. For a detailed desc ription for the commands, please refer to the following chapters.

3.1.2 In-band Management

In-band management r efers to the management by login to the switch us ing Telnet, or using HTTP, or usi ng SNM P m anagement software to c onf ig ure the switch. In-ban d management enab les management of the switch for some devices attached to the switch. In the case when in-band management fails due to s witch configuration changes, out-of-band m anagement can be used for configuring and managing the switch.
1.1.1.1 Management via Telnet
To manage the switch with Telnet, the following conditions should be met:
1) Switch has an IPv4/IPv6 address configured;
2) The host IP address (Telnet client) and the switch’s VLAN interf ace IPv4/IPv6 address is in the same network segment;
3) If 2) is not met, Telnet cl ient can connect to an IPv4/IPv6 address of the switch via other
43
Configuration Guide of XGS-5240-Series
devices, such as a router.
The switch is a Layer 3 switc h that can be configured with several IPv4/IPv6 addresses, the configuration m ethod refers to the relative c hapter. T he following example ass umes the shipment status of the switch where only VLAN1 exists in the system.
The following descr ibes the s teps for a Telnet client to connect to the s witch’s VLAN1 inter face by Telnet(IPV4 address example):
Connected with cable
Fig 1-7 Manage the switch by Telnet
Step 1: Configure the IP addresses for the switch and start the Telnet Server function on the switch.
First is the configuration of host IP address. This should be within the same network segment as the switch VLAN1 interface IP address. Suppose the switch VLAN1 interface IP address is
10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run “ping 10.1.128.251” from the host and verify the result, check for reasons if ping failed.
The IP address configur ation commands for VLAN1 interf ace are listed belo w. Before in-band management, the s witch must be configured with a n IP address by out-of-band m anagement (i.e. Console mode), the c onfiguration commands are as follows (All switch configuration pr ompts are assumed to be “Switch” hereafter if not otherwise specified): Switch> Switch>enable Switch#config Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1 28. 251 255 . 255. 255. 0 Switch(Config-if-Vlan1)#no shutdown
To enabl e the Telnet Server function, users shoul d type the C LI com mand te lnet-ser ver enable in the global mode as below: Switch>enable Switch#config
44
Configuration Guide of XGS-5240-Series
Switch(config)# telnet-server enable
Step 2: Run T elnet Client program.
Run Telnet client program included in Windows with the specified Telnet target.
Fig 1-8 Run telnet client program included in Windows
Step 3: Login to the switch.
Login to the Telnet configuration interface. Valid login name and password are required, otherwise the switch will reject Telnet access. This is a method to protect the switch from unauthorized acces s. As a res ult, when Telnet is enabled for configur ing and m anaging the s witch, username and password for authorized Tel net users must be configured with the following command: username <username> privilege <privilege> [password (0|7) <password>]. To open the local authentication st yle with the follo wing command: aut hentication line vty login local. Privilege option must exist and just is 15. Ass ume an authorized user in the switch has a us ername of “test”, and password of “test”, the configuration procedure should like the following: Switch>enable Switch#config Switch(config)#username test privilege 15 password 0 test Switch(config)#authentication line vty login local
Enter valid login nam e and password in the Telnet configuration interf ace, Telnet user will be able to enter the switch’s CLI configuration interface. The commands used in the Telnet CLI interface after login is the same as that in the Console interface.
45
Configuration Guide of XGS-5240-Series
Fig 1-9 Telnet Configuration Interface
1.1.1.2 Management via HTTP
To manage the switch via HTTP, the following conditions should be met:
1) Switch has an IPv4/IPv6 address configured;
2) The host IPv4/IPv6 address ( HTTP client) and the switch’s VLAN interface IPv4/IPv6 address
are in the same network segment;
3) If 2) is not met, HT TP client should connect to an IPv4/IPv6 address of the switch via other
devices, such as a router.
Similar to m anagement the switch via Telnet, as soon as t he host succeeds to ping/ping6 an IPv4/IPv6 address of the s witch and to type the right login password , it can access the switch via HTTP. The configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP server function on the switch.
For configuring the I P address on the switch throug h out-of-band managem ent, see the telnet management chapter. To enable the WEB configuratio n, users should t ype the CLI command IP http s erver in the global mode as below: Switch>enable Switch#config
46
Configuration Guide of XGS-5240-Series
Switch(config)#ip http server
Step 2: Run HTTP protocol on the host.
Open the Web browser on the h ost and type the IP address of the switch, or run directl y the HTTP protocol on the Windows. For example, the IP address of the switch is “10.1.128.251”;
Fig 1-10 Run HTTP Protocol
When accessing a switch with I Pv 6 ad dres s , it is r ec o m m ended to us e t he Fir ef o x browser with
1.5 or later version. For exam ple, if the IPv6 ad dress of the s witch is 3ffe:506:1:2: :3. Input the IPv6 address of the switch is http://[3ffe:506:1:2::3] and the address should draw together with the square brackets. Step 3: Login to the switch.
Login to the Web configuration interface. Valid login name and password are required, otherwise the switch will reject HTTP access. This is a method to protect the switch from unauthorized acces s. As a res ult, when Telnet is enabled for configur ing and m anaging the s witch, username and password for authorized Tel net users must be configured with the following command: username <username> privilege <privilege> [password (0|7) <password>]. To open the local authentication st yle with the follo wing command: authentication line web login local. Privilege option must exist and just is 15. Assume an authorized user in the switch has a username of “admin”, and password of “admin”, the configuration procedure should like the following: Switch>enable Switch#config Switch(config)#username admin privile ge 15 password 0 admin Switch(config)#authentication line web login local The Web login interface of switch is as below:
47
Configuration Guide of XGS-5240-Series
Fig 1-11 Web Login Interface
Input the right username and password, and then the main Web configuration interface is shown as below.
Fig 1-12 Main Web Configuration Interface
Notice: When configure the switch, the name of the switch is composed with English letters.
1.1.1.3 Manage the Switch via SNMP Network Management Software
The necessities required by SNMP network management software to manage switches:
1) IP addresses are configured on the switch;
48
Configuration Guide of XGS-5240-Series
2) The IP address of the client host and that of the VLAN interface on the switch it subordinates to should be in the same segment;
3) If 2) is not met, the client should be able to reach an IP address of the switch through devices like routers;
4) SNMP should be enabled.
The host with SNMP net work management software shoul d be able to ping the IP address of the switch, so that, when runn ing, SNMP network m anagement software will be able to find it and implement read/write operation on it. Details about how to manage switches via SNMP network management software will not be covered in this manual, please refer to “Snmp network management software user manual”.

3.2 CLI Interface

The switch provides thress management interface for users: CLI (Command Line Interface) interface, Web interface, Snmp netword m anagement software. W e will introduc e the CLI interf ace and Web configur ation inte rface in d etails, Web interface is familiar with CLI interf ace function and will not be covered, please refer to “Snmp network management software user manual”.
CLI interface is fam iliar to most users. As aforementio ned, o ut -of-band management and Telnet login are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration commands. Those commands are categorized according to their functions in switch configuration and management. Each cate gory represents a d ifferent configuration mode. T he Shell for the switch is described below:
Configuration Modes Configuration Syntax Shortcut keys Help function Input verification Fuzzy match support

3.2.1 Configuration Modes

49
Configuration Guide of XGS-5240-Series
Fig 1-13 Shell Configuration Modes
1.1.1.4 User Mode
On entering the CLI interface, entering user entry system first. If as common user, it is defaulted to User Mode. The prompt shown is “ Switch>“, the symbol “>“ is t he prompt for User Mode. W hen exit command is run under Admin Mode, it will also return to the User Mode.
Under User Mode, no configuration to the switch is allowed, only clock time and version information of the switch can be queries.
1.1.1.5 Admin Mode
To Adm in Mode sees the following: In user entry sys tem, if as Admin user, it is defaulted to Admin Mode. Admin Mode prompt “Switch #” can be entered under the User Mode by runnin g the enable command and entering corresponding access levels admin user password, if a password has been set. Or, when exit command is run u nder Global Mode, it will also retur n to the Admin Mode. Switch also provides a shortcut key sequence "Ctrl+z”, th is allows an easy way to exit to Admin Mode from any configuration mode (except User Mode).
Under Admin Mode, the us er can quer y the s witch conf iguration inf orm ation, connectio n status and traffic statistics of all por ts ; and th e us er c an f ur ther enter th e G lob al Mod e from Admin Mode to modify all configurat ions of the s witch. For th is reason, a p assword m ust be set for entering Adm in
50
Configuration Guide of XGS-5240-Series
Type
Configure switch
e.
supported duplex mode, speed, etc. of Ethernet Port.
e.
c.
mode to prevent unauthorized access and malicious modification to the switch.
1.1.1.6 Global Mode
Type the config command under Admin Mode will enter the Global Mode prompt “Switch(config)#”. Use the exit command under other configuration modes such as Port Mode, VLAN mode will return to Global Mode.
The user can perform global configuration settings under Globa l Mode, such as MAC Table, Port Mirroring, VLAN c reation, IGMP Snooping start a nd STP, etc. And th e user can go further to Port Mode for configuration of all the interfaces.
Interface Mode
Use the interface comm and under Global Mode can enter the inter face m ode specif ied. Switch provides three interfac e type: 1. VLAN interf ace; 2. Ethernet port; 3. port-c hannel, accordingly the three interface configuration modes.
Interface
VLAN Interface
Ethernet Port Type interface ethernet <inte
port-channel Type interface port-channel
VLAN Mode
Entry Operates Exit
Type interface vlan <Vlan-i d> command under Global M
ode.
rface-list> command under Gl obal Mode.
<port-channel-number> command under Global Mode.
IPs, etc
Configure
Configure port-cha nnel related settin gs such as duplex mode, speed, et
Use the exit co mmand to return to Global Mod
Use the exit co mmand to return to Global Mod
Use the exit co mmand to return to Global Mod e.
Using the vlan <vlan-id> command under Global Mode can enter the corresponding VLAN Mode. Under VLAN Mode t he us er c an c onf ig ure al l m ember ports of the corr esponding VL AN. R u n the exit command to exit the VLAN Mode to Global Mode.
DHCP Address Pool Mode
Type the ip dhcp pool <name> command under Global Mode wil l enter the DHC P Address Pool Mode prompt “Switch(Config-<name>-dhcp)#”. DHCP address pool properties can be configured
51
Configuration Guide of XGS-5240-Series
Routing Protocol
Entry
Operates
Exit
Mode.
Mode.
bal Mode.
Mode.
ACL type
Entry
Operates
Exit
under Global Mode.
Mode.
Global Mode.
under Global Mode.
Mode.
Global Mode.
under DHCP Address Pool Mode . Run the exit command to exit the DHCP Address Pool Mod e to Global Mode.
Route Mode
RIP Routing Protocol
OSPF Routing Protocol
BGP Routing Protocol
ACL Mode
Standard IP
Type router rip c ommand under Gl obal Mode.
Type router ospf command under Global Mode.
Type router bgp <AS mumber> co mmand under Glo
Type ip access-list
Configure RIP protocol parameters.
Configure OSPF protocol parameters.
Configure BGP protocol parameters.
Configure parameters
Use the exit command to return to Global
Use the exit command to return to Global
Use the exit command to return to Global
Use the exit com
ACL Mode
Extended IP ACL Mode
standard command
Type ip access-list extanded command
for Standard IP ACL
Configure parameters for Extended IP ACL
mand to return to
Use the exit com mand to return to

3.2.2 Configuration Syntax

Switch provides various configuration commands. Although all the commands are different, they all abide by the syntax for Switch configuration commands. The general commands format of Switch is shown below:
cmdtxt <variable> {enum1 | … | enumN } [option1 | … | optionN]
Conventions: cmdtxt in bold font indic ates a command keyword; <variable> indicates a v ariable parameter; {enum1 | … | enumN } indicat es a mandator y parameter that should be selec ted from the parameter set enum1~enumN; and the square brack et ([ ]) in [option1 | … | optionN] indicate an optional param eter. There m a y be combinations of “< >“, “ { } ” a nd “ [ ]” in the c o m m and line, such
52
Configuration Guide of XGS-5240-Series
Key(s)
Function
Back Space
Delete a character before the cursor, and the cursor moves back.
commands can be shown.
command
the left.
You can use the Left and Right key to modify an
the right.
Ctrl +p
The same as Up key “↑”.
Ctrl +n
The same as Down key “↓”.
Ctrl +b
The same as Left key “←”.
Ctrl +f
The same as Right key “→”.
(except User Mode).
execution.
used to complete the command or keyword if there is no conflict.
as [<variable>], {enum1 <variable>| enum2}, [option1 [option2]], etc.
Here are examples for some actual configuration commands: show version, no parameters required. This is a command with only a keyword and no
parameter, just type in the command to run.
vlan <vla n -id>, parameter values are required after the keyword. firewall {enable | disable}, user can enter firewall enable or firewa ll dis a b le for this command. snmp-server community {ro | rw} <string>, the followings are possible:
snmp-server community ro <string>
snmp-server community rw <string>

3.2.3 Shortcut Key Support

Switch provides sever al shortcut keys to facilitate user conf iguration, such as up, down, left, right and Blank Space. If the terminal does not rec o gni ze U p an d Do wn keys, ctrl +p and ctrl +n can be used instead.
Up “↑” Show previous command entered. Up to ten recently entered
Down “↓” Show next command ent ered. W hen use the Up k ey to get previousl y
entered commands , you can use the Down ke y to return to the nex t
Left “←” The cursor moves one character to
Right “→” The cursor moves one character to
entered command.
Ctrl +z Return to the Adm in Mo de direc tly from the other co nf igurati on modes
Ctrl +c Break the ongoing command process, such as ping or other command
Tab When a string for a c ommand or ke yword is entered, the Tab can be
53
Configuration Guide of XGS-5240-Series
Access to Help
Usage and function
brief description of the associated help system.
that begin with that string.
Output error message
Explanation
Unrecognized command or illegal parameter!
error in parameter scope, type or format.
the current input.
The command is recognized, but no valid parameter record is found.
mode
can not be used under current mode.
Please configure pr ecursor command
The command is recognized, but the prerequisite

3.2.4 Help Function

There are two ways in Swit ch for the us er to acces s help infor mation: the “h elp” com mand and the “?”.
Help Under any comm and line prom pt, type in “ help” a nd pres s Enter will get a
“?” 1 Under any comm and line prompt, enter “?” to g et a command list of
the current mode and related brief description.
2 Enter a “?” after the c ommand keyword with a n em bedded space. If
the position should be a parameter, a description of that parameter type, scope, etc, will be ret urned; if the position s hould be a k eyword, then a set of keywords with brief description will be returned; if the output is “<cr>“, then the command is complete, press Enter to run the command.
3 A “?” immediately following a string. This will display all the commands

3.2.5 Input Verification

1.1.1.7 Returned Information: success
All commands entered thr ough keyboards undergo s yntax check by the She ll. Nothing will be returned if the user en tered a correct command unde r corresponding modes an d the execution is successful.
1.1.1.8 Returned Information: error
The entered comm and does not exist, or there is
Ambiguous command At least two interpretations is possible basing on
Invalid command or parameter
This command is not exist in current
The command is recognized, but this command
54
Configuration Guide of XGS-5240-Series
"*" at first!
command has not been configured.
end of command line!
syntax error : missing '"' before the
Quotation marks are not used in pairs.

3.2.6 Fuzzy Match Support

Switch shell support fuzzy match in searching command and keyword. Shell will recognize commands or keywords correctly if the entered string causes no conflict. For example:
1) For command “show interfaces status ethernet1/0/1”, typing “sh in status ethernet1/0/1” will
work.
2) However, for command “show running-config”, the system will report a “> Ambiguous command!”
error if only “show r” is entered, as Shell is unable to tell whether it is “show run” or “show running-config”. Therefore, Shell will only recognize the command if “sh ru” is entered.
55
Configuration Guide of XGS-5240-Series
Command
Explanation
Normal User Mode/ Admin Mode
command to step into
command is for exiting admin mode.
Admin Mode
config [terminal]
Enter global mode from admin mode.
Various Modes
such as using this command in global m ode to
user mode from admin mode.
show privilege
Show privilege of the current users.
Except User Mode/ Admin Mode
when not at User Mode/ Admin Mode.
Admin Mode
[YYYY.MM.DD]
show version
Display version information of the switch.
set default
Restore to the factory default.
Memory.
reload
Hot reset the switch.
show cpu usage
Show CPU usage rate.
show cpu utilization
Show current CPU utilization rate.
show memory usage
Show memory usage rate.

Chapter 4 Basic Switch Configuration

4.1 Basic Configuration

Basic switch configurati on includes commands for entering and exiting the adm in mode, commands for entering and exiting interface m ode, for configuring and dis playing the switch clock, for displaying the version information of the switch system, etc.
The User uses enable
enable [<1-15>] disable
exit
end
clock set <HH:MM:SS>
admin mode from norm al user mode or m odify the privilege level of the users. The disable
Exit current mode and enter previous mode,
go back to admin mode, and back to normal
Quit current mode and return to Admin mode
Set system date and time.
write
Save current configurati on parameters to Flash
56
Configuration Guide of XGS-5240-Series
Global Mode
when the
successful.
no web-auth privilege
web.
Command
Explanation
Global Mode
no telnet-server enable
switch: the no command disables the
banner motd <LINE> no banner motd
web-auth privilege <1-15>
Configure the information displayed login authentication of a telnet or console user is
Configure the level of logging in the switch by

4.2 Telnet Management

4.2.1
1.1.1.9 Introduction to Telnet
login to a remote host with its IP address of hostnam e from his own works tation. Telnet c an send the user ’s keystrokes to the rem ote host and send the rem ote host output t o the user ’s screen through TCP conne ction. This is a transparent service, as to the user, the keyboard

Telnet

Telnet is a simple remote terminal protocol for remote login. Using Telnet, the user can
and monitor seems to be connected to the remote host directly.
Telnet employs the Client-Server mode, the local system is the Telnet client and the remote host is the Telnet server. Switch can be either the Telnet Server or the Telnet client.
When switch is used as the Telnet server, the user can use the Telnet client program included in W indows or th e other operatio n s ystems to lo gin to s witch, as descr ibed earl ier in the In-band managem ent section. As a Telnet server, switch allows up t o 5 telnet clie nt TCP connections.
And as Telnet client, using t eln et c om mand under Adm in Mode allows the user to login to the other remote hos ts. Switch can only establ ish TCP connection to one remote host. If a connection to another remote host is desired, the current TCP connection must be dropped.
1.1.1.10 Telnet Conf iguration Task List
1. Configure Telnet Server
2. Telnet to a remote host from the switch.
1. Configure Telnet Server
telnet-server enable
Enable the Telnet server function in the
57
Configuration Guide of XGS-5240-Series
Telnet function.
no username <username>
the telnet user authorization.
he no command
command and configuring command
authorize when executing some command.
secure address.
security address.
no authentication ip access-class
he no form
command will cancel the binding ACL.
no authentication ipv6 access-class
command will cancel the binding ACL.
login
no authentication enable
enable authentication
authorization line {console | vty | web}
exec
authorization line vty command <1-15>
Configure command authorization
username <user-name> [privilege <privil ege>] [password [0 | 7] <password>]
aaa authorization config-commands no aaa authorization config-commands
authentication securityip <ip-addr> no authentication securityip <ip-addr>
authentication securityipv6 <ipv6-addr> no authentication securityipv6 <ipv6-add r>
Configure user name and password of the telnet. The no form command deletes
Enable command authorization function for the login user with VTY (login with Telnet and SSH). T disables this function. Onl y enabling this
authorization manner, it will request to
Configure the secure I P address to login to the switch through Telnet: the no command deletes the authorized Telnet
Configure IPv6 security address to login to the switch through Telnet; the no command deletes the authorized Telnet
authentication ip access-class {<num-st d>|<name>}
authentication ipv6 access-class {<num­std>|<name>}
authentication line {console | vty | web} login method1 [method2 …] no authentication line {console | vty | web}
authentication enable method1 [method 2 …]
exec method1 [method2 …] no authorization line {console | vty | web}
Binding standard IP ACL protocol to login with Telnet/SSH/Web; t
Binding standard IPv6 ACL protocol to login with Telnet/SSH/Web; the no form
Configure authenticati on method list with telnet.
Configure the method list.
Configure the authorization method list with telnet.
58
{local | radius | tacacs} (none|)
manner and authorization selection
he no command
recovers to be default manner.
mand <1-15>
Admin Mode
Display debug information for Telnet
information.
t includes line
number, user name and user IP.
line who logs in through telnet or ssh.
Command
Explanation
Admin Mode
<ipv6-addr> | host <hostname>} [<port>]
client included in the switch.
Configuration Guide of XGS-5240-Series
no authorization line vty command <1-15>
accounting line {console | vty} comman d <1-15> {start-stop | stop-only | none} method1 [method2…] no accounting line {console | vty} com
terminal monitor terminal no monitor
show users
priority of login user with VTY (login with Telnet and SSH). T
Configure the accounting method list.
client login to the switch; the no command disables the debug
Show the user information who logs in through telnet or ssh. I
Delete the logged user information on the
clear line vty <0-31>
2. Telnet to a remote host from the switch
telnet [vrf <vrf-name>] {<ip-addr> |
appointed line, force user to get down the
Login to a remote host with the Telnet

4.2.2 SSH

1.1.1.11 Introduction to SSH
SSH (Secure Shell) is a protocol which ensures a se cure remote access connection t o network devices. It is based on the reliable TCP/IP protocol. By conductin g the mechanism such as key distribution, authentication and encryption between SSH server and SSH client, a secure connection is established. T he information tra nsferred on th is connection is protected from being intercepted and decrypted. The switch meets the requirements of SSH2.0. It supports SSH2.0 client software such as SSH Secure Client and putty. Users can run the
59
Configuration Guide of XGS-5240-Series
Command
Explanation
Global Mode
no ssh-server enable
command disables SSH function.
lient software for logging on the
command deletes the
username.
Configure timeout value for SSH
the default timeout value for SSH authentication.
retrying SSH authentication.
<moduls>
SSH server.
Admin Mode
command stops
SSH client side.
show crypto key
Show the secret key of ssh.
rypto key clear rsa
Clear the secret key of ssh.
above software to manage the switch remotely.
The switch present ly supports RSA authentication, 3DES cryptography protocol and SS H user password authentication etc.
1.1.1.12 SSH Server Configuration Task List
ssh-server enable
username <username> [privilege <privil ege>] [password [0 | 7] <password>] no username <username>
ssh-server timeout <timeout> no ssh-server timeout
ssh-server authentication-retires <authe ntication-retires> no ssh-server authentication-retries
ssh-server host-key create rsa modulus
Enable SSH functi on on the switch; the no
Configure the username and password of SSH c switch; the no
authentication; the no command restores
Configure the num ber of times for retrying SSH authentication; the no command restores the default number of times for
Generate the new RSA host key on the
terminal monitor terminal no monitor
1.1.1.13 Example of SSH Server Configuration
Example1:
Requirement: Enable S SH server on the switch, and run SSH2. 0 client software such as Secure shell client or putty on the terminal. Log on the switch by using the usernam e and password from the client.
Configure the I P address, add SSH us er and enable SSH s ervice on the s witch. S SH2.0
Display SSH debug inform ation on the SSH client side; the no displaying SSH debug information on the
60
Configuration Guide of XGS-5240-Series
Command
Explanation
Global Mode
interface vlan <vlan-id>
Create VLAN interf ace ( la yer 3 i nterf ace); the
client can log on the switch by using the username and password to configure the switch. Switch(config)#ssh-server enable Switch(config)#interface vlan 1 Switch(Config-if-Vl an1) #ip addr es s 100.1 00. 1 00. 200 2 55.2 55.2 55. 0 Switch(Config-if-Vlan1)#exit Switch(config)#username test privilege 15 password 0 test
In IPv6 networks, the terminal should run SSH client software which support IPv6, such as putty6. Users should not modify the configuration of the switch except allocating an IPv6 address for the local host.

4.3 Configure Switch IP Addresses

All Ethernet ports of switch are default to Data Link layer ports and perform layer 2 forwarding. VLAN interface represent a Layer 3 interface function which can be assigned an IP address, which is a lso the IP address of the sw itch. All VLAN interf ace related configuration commands can be configured under VLAN Mode. Switch provides three IP address configuration methods:
Manual
BOOTP
DHCP
Manual configuration of IP address is assign an IP address manually for the switch.
In BOOTP/DHCP mode, th e switch operates as a BOOTP/DHCP client, send broadcast packets of BOOTPRequest to the BOOTP/DHCP servers, and the BOOTP/DHCP servers assign the address on receiving the request. In addition, switch can act as a DHCP server, and dynamically assign n etwork param eters such as IP addres ses, gatewa y addresses and DNS server addresses to DHCP clients DHCP Server configuration is detailed in later chapters.

4.3.1 Switch IP Addresses Configuration Task List

1 Enable VLAN port mode 2 Manual configuration 3 BOOTP configuration 4 DHCP configuration
1. Enable VLAN port mode
61
Configuration Guide of XGS-5240-Series
no interface vlan <vlan-id>
no command deletes the VLAN interface.
nter the network management port
configuration mode.
Command
Explanation
VLAN Interface Mode
condary]
ength>
command deletes IPv6 address.
Command
Explanation
VLAN Interface Mode
obtain IP address and gateway address
disables the BootP client function.
Command
Explanation
VLAN Interface Mode
obtain IP address and gateway address
disables the DHCP client function.
interface ethernet <interface-name>
2. Manual configuration
ip address <ip_address> <mask> [secon dary] no ip address <ip_address> <mask> [se
ipv6 address <ipv6-address / prefix-leng th> [eui-64] no ipv6 address <ipv6-address / prefix-l
3. BOOTP configurati o n
E
Configure IP address of VLAN interface; the no command deletes IP address of VLAN interface.
Configure IPv6 address, including aggregation global unicast address, loca l site address and local link address. The no
ip bootp-client enable no ip bootp-client enable
4. DHCP configuration
ip bootp-client enable no ip bootp-client enable

4.4 SNMP Configuration

4.4.1

Introduction to SNMP

Enable the switch to be a BootP client and
through BootP negotiatio n; the no command
Enable the switch to be a DHCP client and
through DHCP negotiat ion; the no command
SNMP (Simple Network Management Protocol) is a standard network management
62
Configuration Guide of XGS-5240-Series
protocol widely used in computer network management. SNMP is an evolving protocol. SNMP v1 [RFC1157] is the first version of SNMP which is adapted by vast numbers of manufacturers for its simplicity and eas y implementation; SNMP v2c is an enha nced version of SNMP v1, which supports layered net work management; SNMP v3 strengthens the s ecurity by adding USM (User-based Security Mode) and VACM (View-based Access Control Model).
SNMP protocol provides a simple way of exchange network management information between two points in th e network. SNMP employs a polling m echanism of message quer y, and transmits mess ages through U D P (a connec t ion le ss tr anspor t la yer pr otocol). Therefor e it is well supported by the existing computer networks.
SNMP protocol employs a station-agent mode. There are two parts in this s truc tu r e: NMS (Network Management Station) and Agent. NMS is the workstation on which SNMP client program is running. It is the core on the SNMP network management. Agent is the server software runs on the devices which need to be managed. NMS manages all the managed objects through Agents. The switch supports Agent function.
The communication between NMS and Agent functions in Client/Server mode by exchanging standard messages. NMS sends request and the Agent responds. There are seven types of SNMP message:
Get-Request
Get-Response
Get-Next-Request
Get-Bulk-Request
Set-Request
Trap
Inform-Request
NMS sends queries to the Agent with Get-Request, Get-Next-Request, Get-Bulk-Request and Set-Request messages; and the Agent, upon receiving the requests, replies with Get-Response message. On some special situations, like network device ports are on Up/Down status or the network topology changes, Agents can send Trap messages to NMS to inform the abnorm al events. Besides, NM S can also be set to alert to some abno rmal events by enabling RMON function. When alert events are triggered, Agents will send Trap messages or log the event according to the settings. Inform-Request is mainly used for inter-NMS communication in the layered network management.
USM ensures the transf er security by well-designed encr yption and authenticatio n. USM encrypts the mess ages according to the user typed pass word. This mec hanism ensures that the messages can’t be viewed on transmission. And USM authentication ensures that the messages can’t be changed on transmission. USM employs DES-CBC cryptography. And HMAC-MD5 and HMAC-SHA are used for authentication.
VACM is used to classif y the users’ access permission. It puts the user s with the same
63
Configuration Guide of XGS-5240-Series
access permission in the same group. Users can’t conduct the operation which is not authorized.

4.4.2 Introduction to MIB

The network management information access ed by NMS is well defined a nd or g ani ze d in a Management Information Base (MIB). MIB is pre-defined information which can be accessed by network management protocols. It is in layered and structured form. The pre-defined management information can be obtained from monitored network devices. ISO ASN.1 defines a tree structure for MID. Each MIB organizes all the available information with this tree structure. And each node on this tree contains an OID (Object Identifier) and a brief description about the node. OID is a s et of integers d ivided by periods. It identifies the nod e and can be used to locate the node in a MID tree structure, shown in the figure below:
Fig 2-1 ASN.1 Tree Instance
In this figure, the OID of the object A is 1.2.1.1. NMS can loc ate this object thro ugh this unique OID and gets the standard variables of the object. MIB defines a set of standard variables for monitored network devices by following this structure.
If the variable inform ation of Agent MIB needs to be bro wsed, the MIB browse software needs to be run on the N M S. MI B in the Agent usuall y cons ist s of publ ic MIB and priv ate MIB. The public MIB cont ains pu blic networ k m anagement inf ormation t hat can be acces sed b y all NMS; private MIB contains specific information which can be viewed and contr olled by the support of the manufacturers.
MIB-I [RFC1156] is the first implemented pub lic MIB of SNMP, and is replaced b y MIB-II [RFC1213]. MIB-II expands MIB-I and keeps the OID of MIB tree in MIB-I. MIB-II contains sub-trees which are c al led groups . O bj ects i n th os e groups cover all the f unc tion a l domains in network managem ent. NMS obtains the net work m anagement i nform ation b y visiting the MIB
64
Configuration Guide of XGS-5240-Series
of SNMP Agent.
The switch can operate as a SNMP Agent, and supports both SNMP v1/v2c and SNMP v3. The switch supports basic MIB-II, RMON public MIB and other pub lic MID such as BRIDGE MIB. Besides, the switch supports self-defined private MIB.

4.4.3 Introduction t o RMO N

RMON is the m ost important expansion of the s tandard SNMP. RMON is a set of MIB definitions, used to define standard network monitor functions and interfaces, enabling the communication between SNMP management terminals and remote monitors. RMON provides a highly efficient method to monitor actions inside the subnets.
MID of RMON consists of 10 groups. The switch supports the most frequently used group 1, 2, 3 and 9:
Statistics: Maintain bas ic usage and error statistics for each subnet monitored by the Agent.
History: Record periodical statistic samples available from Statistics.
Alarm: Allow m anagem ent c onsole us ers t o set an y count or inte ger f or sam ple i ntervals
and alert thresholds for RMON Agent records.
Event: A list of all events generated by RMON Agent. Alarm depends on the implementation of Event. Statistics and History display some current or histor y subnet statis tics. Alarm and Event p rovide a m ethod to m onitor any int eger data change in the network , and pro vide som e alerts u pon abnor mal events (send ing Trap or record in logs).

4.4.4 SNMP Configuration

1.1.1.14 SNMP Configuration Task List
1. Enable or disable SNMP Agent server function
2. Configure SNMP community string
3. Configure IP address of SNMP management base
4. Configure engine ID
5. Configure user
6. Configure group
7. Configure view
8. Configuring TRAP
9. Enable/Disable RMON
65
Configuration Guide of XGS-5240-Series
Command
Explanation
Global Mode
nt function on the
Agent function on the switch.
Command
Explanation
Global Mode
{<ipv6-num-std>|<ipv6-name>}]
command deletes the configured
Command
Explanation
Global Mode
ss> | <ipv6-address> }
address.
snmp-server securityip disable
function on the NMS.
Command
Explanation
Global Mode
no snmp-server engineid
This command is used for SNMP v3.
Command
Explanation
Global Mode
1. Enable or disable SNMP Agent server function
snmp-server enabled no snmp-server enabled
2. Configure SNMP community string
snmp-server community {ro | rw} {0 | 7} <string> [access {<num-std>|<nam e>}] [ipv6-access {<ipv6-num-std>|<ipv6­name>}] [read <read-view-name>] [write <write-view-name>] no snmp-server community <string> [ac cess {<num-std>|<name>}] [ipv6-access
Enable the SNMP Age switch; the no com mand disables the SNMP
Configure the community string for the switch; the no community string.
3. Configure IP address of SNMP management station
snmp-server securityip { <ipv4-address> | <ipv6-address> } no snmp-server securityip { <ipv4-addre
snmp-server securityip enable
4. Configure engine ID
snmp-server engineid <engine-string>
Configure IPv4/IPv6 security address which is allowed to access the switch on the NMS; t he no com mand deletes the configured security
Enable or disable secure IP address check
Configure the local engine ID on the switch.
5. Configure user
66
snmp-server user <use-string> <group-s
{<ipv6-num-std>|<ipv6-name>}]
Command
Explanation
Global Mode
6-num-std>|<ipv6-name>}]
Command
Explanation
Global Mode
d-string>]
Command
Explanation
Global Mode
no snmp-server enable traps
This command is used for SNMP v1/v2/v3.
| <host-ipv6-address> } {v1 | v2c | {v3
to receive SNMP Trap information. For SNMP
tring> [{authPriv | authNoPriv} auth {md 5 | sha} <word>] [access {<num-std>|<n
Configuration Guide of XGS-5240-Series
ame>}] [ipv6-access {<ipv6-num-std>|<ip v6-name>}] no snmp-server user <user-string> [acc ess {<num-std>|<name>}] [ipv6-access
6. Configure group
snmp-server group <group-string> {noa uthnopriv|authnopriv|authpriv} [[read <r ead-string>] [write <write-string>] [notify <notify-string>]] [access {<num-std>|<n ame>}] [ipv6-access {<ipv6-num-std>|<ip v6-name>}] no snmp-server group <group-string> {n oauthnopriv|authnopriv|authpriv} [access
Add a user to a SNMP group. This c ommand is used to configure USM for SNMP v3.
Set the group infor mation on the s witch. This command is used to configure VACM for SNMP v3.
{<num-std>|<name>}] [ipv6-access {<ipv
7. Configure view
snmp-server view <view-string> <oid-stri ng> {include|exclude} no snmp-server view <view-string> [<oi
8. Configuring TRAP
snmp-server enable traps
Configure view on t he switch. T his command is used for SNMP v3.
Enable the switch to send Trap message.
snmp-server host { <host-ipv4-address>
Set the host IPv4/IPv6 ad dress which is us ed
67
Configuration Guide of XGS-5240-Series
v}}} <user-string>
community string; for SNMP v3, this
form of this
ess> | <ipv6-address>}
[no] switchport updown notification
trap message to the port of UP/DOWN event.
Command
Explanation
Global mode
no rmon enable
{noauthnopriv | authnopriv | authpriv}}} <user-string> no snmp-server host { <host-ipv4-addre ss> | <host-ipv6-address> } {v1 | v2c | {v3 {noauthnopriv | authnopriv | authpri
snmp-server trap-source {<ipv4-addres s> | <ipv6-address>}
no snmp-server trap-source {<ipv4-addr
Port mode
enable
9. Enable/Disable RMON
v1/v2, this command also configures Trap
command also configures Trap user name and security level. The “no” command cancels this IPv4 or IPv6 address.
Set the source IPv4 or I Pv6 address which is used to send trap packet, the no command deletes the configuration.
Enable/disable the function of sending the
rmon enable
Enable/disable RMON.

4.4.5 Typic al SNMP Configuration Examples

The IP address of the NMS is 1.1.1.5; the IP address of the switch (Agent) is 1.1.1.9. Scenario 1: The N MS network administrative soft ware uses SNM P protocol to obt ain data from the switch. The configuration on the switch is listed below: Switch(config)#snmp-server enable Switch(config)#snmp-server community rw private Switch(config)#snmp-server community ro public Switch(config)#snmp-server securityip 1.1.1.5
The NMS can use private as the community string to access the switch with read-write permission, or use public as the community string to access the switch with read-only permission.
Scenario 2: NMS will receive Trap messages from the switch (Note: NMS may have community string verification for the Trap mess ages. In this scenario, t he NMS uses a Trap verification community string of usertrap). The configuration on the switch is listed below:
68
Configuration Guide of XGS-5240-Series
Switch(config)#snmp-server enable Switch(config)#snmp-server host 1.1.1.5 v1 usertrap Switch(config)#snmp-server enable traps
Scenario 3: NMS uses SNMP v3 to obtain information from the switch. The configuration on the switch is listed below: Switch(config)#snmp-server Switch(config)#snmp-server user tester UserGroup authPriv auth md5 hellotst Switch(config)#snmp-server group UserGroup AuthPriv read max write max notify max Switch(config)#snmp-server view max 1 include
Scenario 4: NMS wants to receive the v3Trap messages sent by the switch. The configuration on the switch is listed below: Switch(config)#snmp-server enable Switch(config)#snmp-server host 10.1.1.2 v3 authpriv tester Switch(config)#snmp-server enable traps Scenario 5: The IP v6 address of the NMS is 2004:1:2:3::2; the IP v6 address of the switch (Agent) is 2004:1:2:3::1. The NMS network adm inistrative software uses SNMP protocol to obtain data from the switch. The configuration on the switch is listed below: Switch(config)#snmp-server enable Switch(config)#snmp-server community rw private Switch(config)#snmp-server community ro public Switch(config)#snmp-server securityip 2004:1:2:3::2
The NMS can use private as the community string to access the switch with read-write permission, or use public as the community string to access the switch with read-only permission.
Scenario 6: NMS will receive Trap messages from the switch (Note: NMS may have community string verification for the Trap mess ages. In this scenario, t he NMS uses a Trap verification community string of usertrap). The configuration on the switch is listed below: Switch(config)#snmp-server host 2004:1:2:3::2 v1 usertrap Switch(config)#snmp-server enable traps

4.4.6 SNMP Troubleshooting

When users configure the SNMP, the SNMP server may fail to run properly due to
69
Configuration Guide of XGS-5240-Series
physical connection failure and wrong configuration, etc. Users can troubleshoot the problems by following the guide below:
Good condition of the physical connection. Interface and datalink la yer protocol is U p (use the “s how interface” command), and the
connection between the switch and host can be verified by ping (use “ping” command).
The switch enabled SNMP Agent server function (use “snmp-server” command) Secure IP for NMS (use “snm p-server securityip” com mand) and community string (us e
“snmp-server community” command) are correctly configured, as any of them fails, SNMP
will not be able to communicate with NMS properly. If Trap function is required , remember to enable Trap (use “snmp-server enable tr aps”
command). And remember to properly configure the target host IP address and
community string for Trap (use “s nmp-server host” com mand) to ensure Trap message
can be sent to the specified host. If RMON function is required, RMON must be enabled first (use “rmon enable”
command). Use “show snm p” command to verify sent and received SNMP messages; Use “show
snmp status” command to verify SNMP configuration information; Use “debug snmp
packet” to enable SNMP debugging function and verify debug information.
If users still can’t solve the SNMP problems, Please contact our technical and service center.

4.5 Switch Upgrade

Switch provides two ways for switch upgrade: BootROM upgrade and the TFTP/FTP upgrade under Shell.

4.5.1 Switch System Files

The system files includes system im age file and boot f ile. The updat ing of the swit ch is to update the two files by overwrite the old files with the new ones.
The system image files r ef er s t o the compressed files of the s witch hard war e dr ivers, and software support program , etc, nam ely what we usu ally ca ll the IMG update file. The IMG f ile can only be saved in the FLASH with a defined name of nos.img
The boot file is for initiating the switch, namely what we usually call the ROM update file (It can be compress ed into IM G f ile if it is of lar ge s i ze). In switch, the boot file is allow ed t o save in ROM only. Switch mandates the path and the name of boot file to be flash:/boot.rom.
The update method of the system image file and the boot file is the same. The switc h supplies the user with two modes of updating: 1. BootROM mode; 2. TFTP and FTP update at
70
Configuration Guide of XGS-5240-Series
Shell mode. This two update method will be explained in details in following two sections.

4.5.2 BootROM Upgrade

There is one method f or BootROM upgr ade: TFT P which can be configured at BootR OM command.
Console cable connection
Fig 2-2 Typical topology for switch upgrade in BootROM mode
The upgrade procedures are listed below:
Step 1:
As shown in the figure , a P C is used as the co nsole f or the switch. A console cable is us ed to connect PC to the management port on the switch. The PC should have TFTP server software installed and has the image file required for the upgrade.
Step 2:
Press “ctrl+b” on switch boot up until the switch enters BootROM monitor mode. The operation
cable connection
result is shown below:
[Boot]:
Step 3:
Under BootROM m ode, run “setconfig” to set the IP address and mask of the switch under BootROM mode, ser ver IP address and mask. Suppose th e switch address is 192.168.1.2, and PC address is 192.168.1.66, and the configuration should like: [Boot]: setconfig Host IP Address: [10.1.1.1] 192.168.1.2 Server IP Address: [10.1.1.2] 192.168.1.66 [Boot]:
71
Configuration Guide of XGS-5240-Series
Step 4:
Enable T FTP server in the PC. Ru n TFT P server program . Before s tart download ing upgrade file to the switch, verify the connecti vity between the server a nd the switch by pi ng from the switch. If ping succeeds, run “load” command in the BootROM m ode f r om the s witch; if it f ails , perform troubleshooting to find out the cause. The following updat e file boot.rom. (This device onl y supports the upgrading of the boot file under the BootROM mode.) [Boot]: load boot.rom TFTP from server 192.168.1.66; our IP address is 192.168.1.2 Filename 'boot.rom'. Load address: 0x81000000 Loading: ################################################################# ################################ done Bytes transferred = 438700 (6b1ac hex) [Boot]:
Step 5:
Execute write boot.rom in BootROM mode. The following saves the update file. [Boot]: write boot.rom File exists, overwrite? (Y/N)[N] y
Writing flash:/boot.rom......
Write flash:/boot.rom OK.
[Boot]:
Step 6:
After successful upgrade, execute run or reboot command in BootROM mode to return to CLI configuration interfac e.
[Boot]: runor reboot
Other commands in BootROM mode
1. DIR command Used to list existing files in the FLASH. [Boot]: dir Scanning JFFS2FS: , done.
-rw-r--r-- 2861 Thu Jan 01 03:45:31 1970 portal.c f g
72
Configuration Guide of XGS-5240-Series
-rw-r--r--11577853 Thu Jan 01 00:04:56 1970 a.img
-rw-r--r-- 4 Thu Jan 01 03:15:07 1970 board_web_language
-rw-r--r—11577853 Thu Jan 01 13:58:15 1970 nos.img
4 file(s), 0 dir(s)
Total size:31457280 bytes , files used size:23158571 bytes, free size:8298709 bytes [Boot]:
2. boot command Used to set the IMAGE file to r un upon s ystem s tart-up, a nd the co nf iguratio n file to run u pon configuration recovery. [Boot]: boot img nos.img primary 0 bytes written, 2704 bytes skipped. flash:/nos.img will be used as the primary img file at the next time!
[Boot]: show boot-files The primary img file : flash:/nos.img The backup img file : flash:/nos.img
The startup-config file: NULL
[Boot]:

4.5.3 FTP/TFTP Upgrade

1.1.1.15 Introduction to FTP/TFTP
FTP(File Transfer Protocol)/TFTP(Trivial File Transfer Protocol) are both file transfer protocols that belonging to fourth layer(application layer) of the TCP/IP protocol stack, used for transferring files between hosts, hosts and switches. Both of them transfer files in a client-server model. Their differences are listed below.
FTP builds upon TCP to provide reliable connection-oriented data stream transfer service. However, it does not provide file access authorization and uses simple authentication mechanism (transfers username and password in plain text for authentication). W hen using FTP to transfer files, two connections need to be established between the client and the server: a management conn ection and a data connect ion. A transfer request should be sent by the FTP client to establish managem ent c onnection o n por t 21 in the ser ver, and negotiate a data
73
Configuration Guide of XGS-5240-Series
connection through the management connection.
There are two types of data connections: active connection and passive connection.
In active connection, the client transmits its address and port number for data transmission to the server, the management connection maintains until data transfer is complete. Then, using the address and port number provided by the client, the server establishes data con nec ti o n on por t 20 ( if not engaged) to tr ans f er data; if port 20 is engaged, the server automatically generates some other port number to establish data connection.
In passive connection, the client, through management connection, not ify the server to establish a passive connection. The server then creates its own data listening port and informs the client about the port, and the client establishes data connection to the specified port.
As data connection is es tablished thr ough the s pecifie d address an d port, th ere is a third party to provide data connection service.
TFTP builds upon UDP, providing unreliable data stream transfer service with no user authentication or permission-based file access authorization. It ensures correct data transmission by sending and acknowledging mechanism and retransmission of time-out packets. The advant age of TFT P over FTP is that it is a sim ple and lo w overhe ad f ile tr ansfer service.
Switch can operate as either FTP/TFTP client or server. When switch operates as a FTP/TFTP client, configuration files or system files can be downloaded from the remote FTP/TFTP servers (can be hosts or other switches) without affecting its normal operation. And file list can also be retrieved from the serv er in ftp client mode. Of c ourse, switch can also upload current configuration files or system files to the remote FTP/TFTP servers (can be hosts or other switches). When switch operates as a FTP/TFTP server, it can provide file upload and download service for authorized FTP/TFTP clients, as file list service as FTP server.
Here are some terms frequently used in FTP/TFTP. ROM: Short for EPROM, erasable read-only memory. EPROM is repalced by FLASH memory in switch. SDRAM: RA M memory in the switch, used f or system software operation and configuration sequence storage.
FLASH: Flash memory used to save system file and configuration file. System file: including system image file and boot file. System image file: refers to the compressed file for switch hardware driver and software
support program , usually refer to as IMAGE upgrade file. In switch, the s ystem image file is allowed to save in FLASH only. Switch mandates the name of system image file to be uploaded via FTP in Global Mode to be nos.img, other IMAGE system files will be rejected. Boot file: refers to the file initializes the switch, also referred to as the ROM upgrade file (Large size file can be compressed as IMAGE file). In switch, the boot file is allowed to save in
74
Configuration Guide of XGS-5240-Series
ROM only. Switch mandates the path and the name of two boot f ile s to be flash:/boot.rom and flash:/config.rom. Configuration file: including start up configuration file and running configuration file. The distinction between start u p configuration file and running configur ation file can facilitate the backup and update of the configurations. Start up configuration file: refers to the configuration sequence used in switch startup. Startup configuration file stores in nonvolatile storage, corresponding to the so-called configuration save. If the device does not supp ort CF, the co nfiguration file stores in FLASH only, if the device supports CF, the configuration file stores in FLASH or CF, if the device supports multi-config file, names the configuration file to be .cfg file, the default is startup.cfg. If the device does not support multi-config file, mandates the name of startup configuration file to be startup-config. Running configuration file: refers to the running configuration sequence use in the switch. In switch, the running configuration file stores in the RAM. In the current version, the running configuration sequence running-config can be saved from the RAM to FLASH by write command or copy running-config startup-config command, so that the running configuration sequence becomes the start up configuration f ile, which is called configurat ion save. To prevent illicit file upload and easier configuration, switch mandates the name of running configuration file to be running-config. Factory configuration file: The configuration file shipped with switch in the name of factory-config. Run set def ault and write, and restart the switch , factor y configuratio n file wi ll be loaded to overwrite current start up configuration file.
1.1.1.16 FTP/TFTP Configuration
The configurations of switch as FTP and TFTP clients are almost the same, so the configuration procedures for FTP and TFTP are described together in this manual.
1.1.1.16.1 FTP/TFTP Configuration Task List
1. FTP/TFTP client configuration
1Upload/download the configuration file or system file. 2For FTP client, server file list can be checked.
2. FTP server configuration
1Start FTP server 2Configure FTP login username and password 3Modify FTP server connection idle time 4Shut down FTP server
75
Configuration Guide of XGS-5240-Series
Command
Explanation
Admin Mode
[ascii | binary]
Admin Mode
For FTP client, server file list can be
//user: password@IPv4|IPv6 Address.
Command
Explanation
Global Mode
in.
Command
Explanation
Global Mode
no ip ftp username<username>
password.
Command
Explanation
Global Mode
ftp-server timeout <seconds>
Set connection idle time.
3. TFTP server configuration
1Start TFTP server 2Configure TFTP server connection idle time 3Configure retransmission times before timeout for packets without
acknowledgement
4 Shut down TFTP server
1. FTP/TFTP client co n figuration
1FTP/TFTP client upload/download file
copy <source-url> <destination-url>
2For FTP client, server file list can be checked.
ftp-dir <ftpServerUrl>
2. FTP server configuration
1Start FTP server
ftp-server enable no ftp-server enable
2Configure FTP login username and password
FTP/TFTP client upload/download file.
checked. FtpServerUrl form at looks lik e: ftp:
Start FTP server, the no comm and shuts down FTP server and prevents FT P user from loggi ng
ip ftp username <username> password [0 | 7] <password>
3Modify FTP server connection idle time
3. TFTP server configuration
Configure FTP login username and password; this no comm and will delete the username an d
76
1Start TFTP server
Command
Explanation
Global Mode
TFTP server and prevents TFTP user from logging in.
Command
Explanation
Global Mode
<seconds>
interval.
Command
Explanation
Global Mode
<number>
Configuration Guide of XGS-5240-Series
tftp-server enable no tftp-server enable
2Modify TFTP server connection idle time
tftp-server retransmission-timeout
3Modify TFTP server connection retransmission time
tftp-server retransmission-number
Start TFTP server, the no c omm and s huts do wn
Set maximum retransmission time within timeout
Set the retransmission time for TFTP server.
1.1.1.17 FTP/TFTP Configuration Examples
The configuration is same for IPv4 address or IPv6 address. The exam ple only for IPv4 address.
10.1.1.2
10.1.1.1
Fig 2-3 Download nos.img file as FTP/TFTP client
Scenario 1: The switch is used as FTP/TFTP client. The switch connects from one of its ports to a computer, which is a FTP/TFTP server with an IP address of 10.1.1.1; the switch acts as a FTP/TFTP client, the IP address of the switch management VLAN is 10.1.1.2. Download “nos.img” file in the computer to the switch.
77
Configuration Guide of XGS-5240-Series
FTP Configuration Computer side configuration: Start the FTP server software on the computer and set the username “Switch”, and the password “superuser” . Place the “ 12_30_n os.img” file to the appro priate F TP server director y on the computer. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#exit Switch#copy ftp: //Switch:switch@10.1.1.1/12_30_nos.img nos.img
With the above commands, the switch will have the “nos.img” file in the computer downloaded to the FLASH. TFTP Configuration Computer side configuration: Start TFTP server software on the computer and place the “12_30_nos.img” file to the appropriate TFTP server directory on the computer. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#exit Switch#copy tftp: //10.1.1.1/12_30_nos.img nos.img
Scenario 2: The switch is used as FTP server. The switch operates as the FTP server and connects from one of its p or ts to a com puter, which is a FT P client. Transfer the “nos .im g” f ile in the switch to the computer and save as 12_25_nos.img. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#ftp-server enable Switch(config)# username Admin password 0 superuser
78
Configuration Guide of XGS-5240-Series
Computer side configuration: Login to the switch with any FTP client software, wit h the username “Switch” and password “superuser”, use the command “get n os.img 12_25_nos.im g” to download “nos.im g” file from the switch to the computer.
Scenario 3: The s witc h is used as TFTP server. The switch operates as the TFTP server an d connects from one of its ports to a computer, which is a TFTP client. Transfer the “nos.img” file in the switch to the computer. The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch(config)#tftp-server enable Computer side configuration: Login to the switch with any TFTP client software, use the “tftp” command to download “nos.img” file from the switch to the computer.
Scenario 4: Switch acts as FTP client to view file list on the FTP server. Synchronization conditions: The s witch connects to a computer b y an Ethernet port, the com puter is a FTP server with an IP address of 10.1.1.1; the switch acts as a FTP client, and the IP address of the switch management VLAN1 interface is 10.1.1.2.
FTP Configuration: PC side: Start the FTP server software on the PC and set the username “ Switch”, and the passwor d “superuser”. Switch: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-Vlan1)#no shut Switch(Config-if-Vlan1)#exit Switch#copy ftp: //Switch: superuser@10.1.1.1 220 Serv-U FTP-Server v2.5 build 6 for WinSock ready... 331 User name okay, need password. 230 User logged in, proceed. 200 PORT Command successful. 150 Opening ASCII mode data connection for /bin/ls.
79
Configuration Guide of XGS-5240-Series
recv total = 480 nos.img nos.rom parsecommandline.cpp position.doc qmdict.zip …(some display omitted here) show.txt snmp.TXT 226 Transfer complete.
1.1.1.18 FTP/TFTP Troubleshooting
1.1.1.18.1 FTP Troubleshooting
When upload/downl oad system file with FTP protocol, the connectivity of th e link m ust be ensured, i.e., use th e “Ping” command to ver ify the connectivity bet ween the FTP client and server before running the FTP program. If ping fails, you will need to chec k for appropriate troubleshooting information to recover the link connectivity. The following is what the message displays when files are successfully transferred.
Otherwise, please verify link connectivity and retry “copy” command again.
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
331 User name okay, need password.
230 User logged in, proceed.
200 PORT Command successful.
nos.img file length = 1526021
read file ok
send file
150 Opening ASCII mode data connection for nos.img.
226 Transfer complete.
close ftp client. The following is the m essage displays when files are successfully rece ived. Otherwise,
please verify link connectivity and retry “copy” command again.
220 Serv-U FTP-Server v2.5 build 6 for WinSock ready...
331 User name okay, need password.
230 User logged in, proceed.
200 PORT Command successful.
recv total = 1526037
80
Configuration Guide of XGS-5240-Series
************************
write ok
150 Opening ASCII mode data connection for nos.img (1526037 bytes).
226 Transfer complete. If the switch is upgrad ing system file or s ystem start up f ile through FT P, the s witch m ust
not be restarted until “close ftp client” or “226 Transfer complete.” is dis pla yed, indicating
upgrade is successful, otherwise the switch may be rendered unable to start. If the
system file and system start up file upgrade through FTP fails, please try to upgrade again
or use the BootROM mode to upgrade.
1.1.1.18.2 TFTP Troubleshooting
When upload/downlo ad system file with TFTP protocol, the c onnectivity of the link m ust be ensured, i.e., use the “ Ping” command to v erify the connectivit y between the TFTP client and server before running the TFTP program. If ping fails, you will need to check for appropriate troubleshooting information to recover the link connectivity. The following is the message displays whe n f iles ar e suc c es sfully transferred. Other wise,
please verify link connectivity and retry “copy” command again.
nos.img file length = 1526021
read file ok
begin to send file, wait...
file transfers complete.
Close tftp client. The following is the m essage displays when files are succ essfully received. Otherwise,
please verify link connectivity and retry “copy” command again.
begin to receive file, wait...
recv 1526037
************************
write ok
transfer complete
close tftp client.
If the switch is upgrading system file or system start up file through TFTP, the switch must not be restarted until “close tftp client” is displayed, indicating upgrade is successful, otherwise the switch may be rendere d unable t o start. If the s ystem file and s ystem start up f ile upgrade through TFTP fails, please try upgrade again or use the BootROM mode to upgrade.
81
Configuration Guide of XGS-5240-Series
Command
Explanation
Admin Configuration Mode
format <device>
Format the storage device.
Command
Explanation
Admin Configuration Mode
directory in a designated
directory on a certain device.
Command
Explanation
Admin Configuration Mode

Chapter 5 File S ystem Operations

5.1 Introduction to File Storage Devices

File storage de vices us ed i n switches mainl y incl ude F LA SH c ar ds. As the most comm on storage device, FLASH is usually used to store system image files (IMG f iles), system boot files (ROM files) and system configuration files (CFG files).
Flash can copy, delete, or rename files under Shell or Bootrom mode.

5.2 File System Operation Configuration Task list

1. The formatting operation of storage devices
2. The creation of sub-directories
3. The deletion of sub-directory
4. Changing the current working directory of the storage device
5. The display operation of the current working directory
6. The display operation of information about a designated file or directory
7. The deletion of a designated file in the file system
8. The renaming operation of files
9. The copying operation of files
1. The formatting operation of storage devices
2. The creation of sub-directories
mkdir <directory>
3. The deletion of sub-directory
Create a sub-
82
Configuration Guide of XGS-5240-Series
directory in a designated
directory on a certain device.
Command
Explanation
Admin Configuration Mode
storage device.
Command
Explanation
Admin Configuration Mode
pwd
Display the current working directory.
Command
Explanation
Admin Configuration Mode
directory on the storage device.
Command
Explanation
Admin Configuration Mod e
delete <file-url>
Delete the designated file in the file system.
Command
Explanation
Admin Configuration Mode
switch to a new one.
Command
Explanation
Admin Configuration Mode
store it as a new one.
rmdir <directory>
4. Changing the current working directory o f th e storage device
cd <directory>
5. The display operation of the current working directory
6. The display operation of information a b o u t a designated file or directory
Delete a sub-
Change the current working directory of the
dir [WORD]
7. The deletion of a designated file in the file system
8. The renaming operation of files
rename <source-file-url> <dest-file>
9. The copy operation of files
Display information ab out a des ignated f ile or
Change the name of a des ignated file on the
copy <source-file-url > <dest-file-url>
Copy a designated file one the switch and
83
Configuration Guide of XGS-5240-Series

5.3 T y pical A pplications

Copy an IMG file flash:/nos.img stored in the FLASH on the boardcard, to cf:/nos-6.1.11.0.img. The configuration of the switch is as follows: Switch#copy flash:/nos.img flash:/nos-6.1.11.0.img Copy flash:/nos.img to flash:/nos-6.1.11.0.img? [Y:N] y
Copyed file flash:/nos.img to flash:/nos-6.1.11.0.img.

5.4 Troubleshooting

If errors occur when users t ry to implem ent file s ystem operat ions, pleas e check whether they are caused by the following reasons
Whether file names or paths are entered correctly.
When renaming a file, whether it is in use or the ne w fil e name is already used b y a n
existing file or directory.
84
Configuration Guide of XGS-5240-Series

Chapter 6 Cluster Configuration

6.1 Introduction to cluster network management

Cluster network management is an in-band configuration management. Unlike CLI, SNMP and Web Config which implement a direct management of the target switches through a management works tation, cluster network management implement s a direct management of the target switches (member switches) thro ugh an intermediate switch (commander s witc h). A commander switch can m anage m ultiple m em ber switc hes. As s oon as a Public IP address is configured in the commander switch, all the member switches which are configured with private IP addresses can be m anaged r em otely. This feature economizes public IP addresses which are short of supply. Cluster network management can dynamically discover cluster feature enabled switches (candidate switches). Network administrators can statically or dynamically add the candidate switches to the cluster which is already established. Accordingly, they can configure and manage the member s witches through the comm ander switch. When the m ember switches are distr ibuted in various ph ysical locations (suc h as on the different floors of the same building), cluster network management has obvious advantages. Moreover, cluster network management is an in-band management. The commander switch ca n communicate with member switches in existing network. There is no need to build a specific network for network management.
Cluster network management has the following features:
Save IP addresses Simplify configuration tasks Indifference to network topology and distance limitation Auto detecting and auto establishing With factory default settings, multiple switches can be managed
through cluster network management
The commander switch can upgrade and configure any member
switches in the cluster

6.2 Cluster Network Management Configuration Sequence

Cluster Network Management Configuration Sequence:
1 Enable or disable cluster f unct ion
85
Configuration Guide of XGS-5240-Series
Command
Explanation
Global Mode
no cluster run
the switch.
Command
Explanation
Global Mode
no cluster ip-pool
for cluster member devices.
2 Create cluster
1) Configure private IP address pool for member switch es of t he cluster
2) Create or delete cluster
3) Add or remove a member switch
3 Configure attributes of the cluster in the commander switch
1) Enable or disable automatically adding cluster members
2) Set automatically added member s t o manually added ones
3) Set or modify the time interval of keep-alive messages on switches in the cluster.
4) Set or modify the max number of lost keep-alive messages that can be tolerated
5) Clear the list of candidate switches m aintained by the switch
4 Configure attributes of the cluster in the candidate sw itc h
1) Set the time interval of keep-aliv e m essages of the cluster
2) Set the max number of lost keep-alive messages that can be tolerated in the cluster
5 Remote cluster network management
1) Remote configuration management
2) Remotely upgrade member sw it ch
3) Reboot member switch
6 Manage cluster networ k with web
1) Enable http
7 Manage cluster networ k with snmp
1) Enable snmp server
1. Enable or disable cluster
cluster run [key <WORD>] [vid <VID>]
Enable or disable clust er function in
2. Create a cluster
cluster ip-pool <commander-ip>
Configure the private IP address pool
86
Configuration Guide of XGS-5240-Series
no cluster commander
address <mac-addr>}
Command
Explanation
Global Mode
or disable adding newly
cluster.
automatically added
members into manually added ones.
no cluster keepalive interval
cluster.
Set the max number of lost
alive messages that can be
tolerated in the cluster.
Admin mode
n-list> | mac-address <mac-addr>]
switches maintained by the switch.
Command
Explanation
Global Mode
no cluster keepalive interval
alive interval of the
cluster.
Set the max number of lost
alive messages that can be
tolerated in the clusters.
Command
Explanation
cluster commander [<cluster_name>]
cluster member {candidate-sn <candidate-s
n> | mac-address <mac-addr> [id <member­id> ]}
no cluster member {id <member-id> | mac-
3. Configure attributes of the cluster in th e commander switch
cluster auto-add no cluster auto-add
cluster member auto-to-user
Create or delete a cluster.
Add or remove a member switch.
Enable discovered candidate switch to the
Change
cluster keepalive interval <second>
cluster keepalive loss-count <int> no cluster keepalive loss-count
clear cluster nodes [nodes-sn <candidate-s
4. Configure attributes of the cluster in th e candidate switch
cluster keepalive interval < second>
cluster keepalive loss-count <int> no cluster keepalive loss-count
Set the keep-alive interval of the
keep-
Clear nodes in the list of candidate
Set the keep-
keep-
5. Remote cluster network management
87
Configuration Guide of XGS-5240-Series
Admin Mode
In the commander switch, this
manage member switches.
switch.
In the commander switch, this command is used to reset the member switch.
In the commander switch, this command is used to remotely
only upgrade nos.img file.
Command
Explanation
Global Mode
switch by web. The commander
member node in member cluster topology.
Command
Explanation
Global Mode
rcommand member <member-id>
rcommand commander
cluster reset member [id <member-id> | mac-address <mac-addr>]
cluster update member <member-id> <src-u rl> <dst-filename>[ascii | binary]
6. Manage cluster network with web
command is used to configure and
In the member switch, this comm and is used to configure t he commander
upgrade the member switch. It can
ip http server
7. Manage cluster netwo r k with snmp
Enable http function in commander switch and member switch. Notice: must insure th e http function be enabled in member switch when commander switch visiting member
switch visit member switch via beat
88
Configuration Guide of XGS-5240-Series
Enable snmp server function in commander switch and member
function be enabled in member switch when commander switch
mber id>.
switch. Notice: must insure t he snmp server
snmp-server enable
visiting member switch by snmp. The commander switch visit member switch via configure character string <commander-community>@sw<me

6.3 Examples of Cluster Administration

Scenario:
The four switches SW1-SW4, amongst the SW1 is the comm and switch and other switches are member switch. T he SW2 and SW4 is directly connected with t he comm and switch, SW3 connects to the command switch through SW2.
E1 E1 E1 E1 E2 E2
SW1 SW2 SW3 SW4
Configuration Procedure
1. Configure the command switch Configuration of SW1: Switch(config)#cluster run Switch(config)#cluster ip-p ool 10.2.3.4 Switch(config)#cluster commander 5526 Switch(config)#cluster aut o -add
Fig 4-1 Examples of Cluster
2. Configure the member switch Configuration of SW2-SW4 Switch(config)#cluster run
89
Configuration Guide of XGS-5240-Series

6.4 Cluster Administration Troubleshooting

When encountering prob lems in applying the cluster admin, ple ase check the following
possible causes:
If the com mand switch is c orrectly configure d and the auto ad ding function
(cluster auto-add) is e nabled. If the ports connected the comm and switch and member switch belongs to the cluster vlan.
After cluster commander is enabled in VLAN1 of the command switch,
please don’t enable a rout ing protocol (RIP, OSPF, BGP) in this VLAN in order to prevent the rout ing protocol from broadcasting the pri vate cluster addresses in this VLAN to other switches and cause routing loops.
Whether the connection between the command switch and the member
switch is correct. We can use the debug cluster packets to check if the command and the member switches can receive and process related cluster admin packets correctly.
90
Configuration Guide of XGS-5240-Series
Command
Explanation
Admin Mode
cd usb:
Enter in the USB letter.
Command
Explanation

Chapter 7 USB Function Configuration

7.1 Introduction

When there is USB device inserted or pulled out, the switch can detect that information of
USB hot inserting and pulling out and the switch will mount or uninstall the USB device.
When there is USB device inserted, the switch will mount the USB file system. It can read, copy, delete, renam e the f iles in U SB, a nd it can also r ecover t he co nfigurat ion, d ownload the files and save the files.
This device supports the flow-passed warning function of the USB. When the actual electric current ex ceeds the rated current of the device, the s witch will prompt user th at the temperature is too high. And then, ther e is the danger of burning out the device if the U SB is inserted.

7.2 USB Function Configuration List

1. Mount the USB device and enter in the USB letter
2. Show the USB letter information
3. Copy the source file to be the destination file
4. Delete the file content
5. Rename the file name
6. Update the config file under the USB letter to the switch
7. Update the bootrom file under the USB letter to the switch
8. Update the img file under the USB letter to the switch
9. Create the content
10. Delete the existed content
11. Uninstall the USB device
1. Mount the USB device and enter in the USB letter
2. Show the USB letter information
91
Admin Mode
dir
Show the USB letter information.
Command
Explanation
Admin Mode
file.
Command
Explanation
Admin Mode
delete filename
Delete the file.
Command
Explanation
Admin Mode
destination file name.
Command
Explanation
Admin Mode
he reverse
startup.cfg usb:/startup.cfg
Command
Explanation
Admin Mode
he reverse
usb:/boot.rom
3. Copy the source file to be the destination file
Configuration Guide of XGS-5240-Series
copy source destination
4. Delete the file content
5. Rename the file name
rename source destitation
6. Update the config file under the USB letter to the switch
Copy the source file to be t he dest inat io n
Rename the source f ile name to be the
Update the config file under the USB
copy usb:/startup.cfg startup.cfg
7. Update the bootrom file under the USB letter to the switch
copy usb:/boot.rom boot.rom
letter to the switch. T transmission is supported: copy
Update the bootrom file under the USB letter to the switch. T transmission is supported: copy boot.rom
92
Configuration Guide of XGS-5240-Series
Command
Explanation
Admin Mode
supported: copy nos.img usb:/nos.img
Command
Explanation
Admin Mode
mkdir
Create the content.
Command
Explanation
Admin Mode
rmdir
Delete the existed content.
8. Update the img file under the USB letter to the switch
Update the img file under the USB letter
copy usb:/nos.img nos.img
9. Create the content
10. Delete the existed content

7.3 USB Function Examples

to the switch. The reverse transmission is
Delete source1.txt in the usb letter, and rename tt.txt in the usb letter as tttt.txt. Create the new content of sw1 in the usb letter.
Switch#delete source1.txt Switch#rename usb:/tt.txt usb:/tttt.txt Switch#mkdir sw1

7.4 USB Function Troubleshooting

Currently, only the USB device mounting and un installing under the CLI user op eration
page mode is supported. This command is not supported under the non-CLI user
operation page mode. Make sure the switch is power-on and the USB device is inserted correctly. The file
content in the USB device will mount to the file system of the switch automatically. For the reading and writing function of USB, the hot inserting and pulling out are not
supported currently.
93
Configuration Guide of XGS-5240-Series
Insert the USB device, the file content will not mount to the switch file system, this function
does not support the Chinese recognition and displaying of the file content. Input dir com mand directl y, show the file content under the f lash letter as default. If user
want it to show the file info rmation of the usb, input cd usb: t o enter the usb letter, and
then input dir to s how th e fi le inf orm ation. User can also us e the abso lute pa th an d input
dir usb: to show the file content. This command does not support the big file showing currently.
94
Configuration Guide of XGS-5240-Series
Command
Explanation
Admin Mode
id>] slot
<slot-id>
Command
Explanation
Admin Mode
the fan.
Command
Explanation

Chapter 8 Device Management

8.1 Device Management Brief

The device managem ent function of switch pr ovides information about l ine card status, line card operation debugging, power supply and fan status. This function enables the maintenance and management of the physical devices and restart of the switch and line cards, and hot swapping of the cards. Switch supp orts dual-m aster mode. If 2 m aster managem ent cards are present in the s yst em, the master control board in th e smaller slot number becomes the Active Master and the other board becomes the Standby Master.

8.2 Device Management Configuration

8.2.1
1. Display the c h ip inf ormation
2. Display information of the fan status
3. Display information of the power status
1. Display the chip information
show [member <member-
2. Display the information of the fan status

Monitor and Debug Task

Show basic information of each chip.
Shows whet her the f an tra y is in place a nd
show fan
3. Display the information of the power status
its running status, and s hows the speed of
95
Configuration Guide of XGS-5240-Series
Admin Mode
its running status.
show power
Shows if the power s upply is in place and
96
Configuration Guide of XGS-5240-Series

Chapter 9 Port Configuration

9.1 Introduction to Port

Switch contains Cable ports and Combo ports. The Com bo ports can be configured as either 1000GX-TX ports or SFP Gigabit fiber ports.
If the user needs to c onfigure s ome networ k ports , he/she can us e the i nterface e thernet <interface-list> command to enter the appropriate Ethernet port configuration mode, where <interface-list> stan ds f or one or m ore por ts. If <interf ac e-lis t> co nta ins m ultip le p or ts, s pec ial characters such as ';' or '-' can be us ed to separ ate po rts, ';' is used for dis crete p ort num bers and '-' is used f or consecutive por t numbers. Suppose an operation shou ld be perform ed on ports 2,3,4,5 the command would look like: interface ethernet 1/0/2-5. Port speed, duplex mode and traffic control can be configured under Ethernet Port Mode causing the performance of the corresponding network ports to change accordingly.

9.2 Network Port Configuration Task List

1. Enter the network port configuration mode
2. Configure the properties for the network ports
(1) Configure combo mode for combo ports
(2) Enable/Disable ports (3) Configure port names (4) Configure port cable types (5) Configure port speed and duplex mode (6) Configure bandwidth control (7) Configure traffic control (8) Enable/Disable port loopback function (9) Configure broadcast storm control function for the switch (10) Configure scan port mode (11) Configure rate-violation control of the port
(12) Configure interval of port-rate-statistics
3. Virtual cable test
1. Enter the Ethernet port configuration mode
97
Configuration Guide of XGS-5240-Series
Command
Explanation
Global Mode
interface ethernet <interface-list>
Enters the network port configuration mode.
Command
Explanation
Port Mode
d-auto | fiber | sfp-preferred-auto}
only).
no shutdown
no description
ports.
no speed-duplex
Sets port speed and duplex mode of
function of 1000Base-FX ports.
no bandwidth control
Sets or cancels the bandwidth used for
no flow control
specified ports.
no loopback
specified ports.
2. Configure the properties for the Ethe rnet ports
media-type {copper | copper-preferre
shutdown
description <string>
speed-duplex {auto [10 [100 [1000]] [auto | full | half |]] | force10-half | f orce10-full | force100-half | force100­full | force100-fx [module-type {auto­detected | no-phy-integrated | phy-in tegrated}] | {{force1g-half | force1g-f ull} [nonegotiate [master | slave]]}| f orce10g-full}
negotiation {on|off}
Sets the combo port mode (combo ports
Enables/Disables specified ports.
Specifies or cancels the name of specified
100/1000Base-TX or 100Base-FX ports . The no format of this command restores the default setting, i.e., negotiates speed and duplex mode automatically.
Enables/Disables the auto-negotiation
bandwidth control <bandwidth> [bot h | receive | transmit]
flow control
loopback
incoming/outgoing traffic for specified ports.
Enables/Disables traffic control function for
Enables/Disables loopback test function for
98
Configuration Guide of XGS-5240-Series
the storm control function for
and unicasts with
and sets the allowed broadcast packet
disables the broadcast storm control function.
port-scan-mode.
rate-violation function of a port.
Global Mode
value>
Command
Explanation
Admin Mode
|)IFNAME
Enables broadcasts, multicasts
storm control {unicast | broadcast | multicast} {kbps <Kbits> | pps <PP S>}
port-scan-mode {interrupt | poll} no port-scan-mode
rate-violation <200-2000000> [recover y <0-86400>] no rate-violation
port-rate-statistics interval <interval -
unknown destinations (short for broadcast),
number; the no format of this command
Configure port-scan-mode as interrupt or po ll mode, the no comm and restores the default
Set the max packet reception rate of a port. If the rate of the received packet violates the packet reception rate, shut down this port and configure the r ecovery time, the default is 300s. The no command will disable the
Configure the interval of port-rate-statistics.
3. Virtual cable test
virtual-cable-test interface (ethernet
Test virtual cables of the port.
99
Configuration Guide of XGS-5240-Series
Switch
Port
Property
Switch1
1/0/7
Ingress bandwidth limit: 50 M
Switch2
1/0/8
Mirror source port
1/0/9
100Mbps full, mirror source port
1/0/10
1000Mbps full, mirror destination port
Switch3
1/0/12
100Mbps full
1/0/7
Switch 2
Switch 3
1/0/9
1/0/12
1/0/8
1/0/10
Switch 1

9.3 Port Configuration Example

Fig 1-1 Port Configuration Example
No VLAN has been configured in the switches, default VLAN1 is used.
The configurations are listed below: SW1
Switch1(config)#interface ethernet 1/0/7 Switch1(Config-If-Ethernet1/0/7)#bandwidth control 50000 both
SW2 Switch2(config)#interface ethernet 1/0/9
Switch2(Config-If-Ethernet1/0/9)#speed-duplex force100-full Switch2(Config-If-Ethernet1/0/9)#exit Switch2(config)#interface ethernet 1/0/10 Switch2(Config-If-Ethernet1/0/10)#speed-duplex force1g-full Switch2(Config-If-Ethernet1/0/10)#exit Switch2(config)#monitor session 1 source interface ethernet 1/0/8;1/0/9 Switch2(config)#monitor session 1 destination interface ethernet 1/0/10
SW3 Switch3(config)#interface ethernet 1/0/12
Switch3(Config-If-Ethernet1/0/12)#speed-duplex force100-full
100
Loading...