User Manual
SURPASS hiD 6615 S223/S323 R1.5
UMN:CLI
A50010-Y3-C150-2-7619
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
Important Notice on Product Safety
Elevated voltages are inevitably present at specific points in this electrical equipment. Some of the parts may also have elevated operating temperatures.
Non-observance of these conditions and the safety instructions can result in personal injury or in property damage.
Therefore, only trained and qualified personnel may install and maintain the system.
The system complies with the standard EN 60950-1 / IEC 60950-1. All equipment connected has to comply with the applicable safety standards.
The same text in German:
Wichtiger Hinweis zur Produktsicherheit
In elektrischen Anlagen stehen zwangsläufig bestimmte Teile der Geräte unter Spannung. Einige Teile können auch eine hohe Betriebstemperatur aufweisen.
Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Körperverletzungen und Sachschäden führen.
Deshalb wird vorausgesetzt, dass nur geschultes und qualifiziertes Personal die Anlagen installiert und wartet.
Das System entspricht den Anforderungen der EN 60950-1 / IEC 60950-1. Angeschlossene Geräte müssen die zutreffenden Sicherheitsbestimmungen erfüllen.
Trademarks:
All designations used in this document can be trademarks, the use of which by third parties for their own purposes could violate the rights of their owners.
Copyright (C) Siemens AG 2005-2006.
Issued by the Communications Group
Hofmannstraße 51
D-81359 München
Technical modifications possible.
Technical specifications and features are binding only insofar as they are specifically and expressly agreed upon in a written contract.
2 |
A50010-Y3-C150-2-7619 |
User Manual |
UMN:CLI |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
|
Reason for Update
Summary: System software upgrade added
Details:
Chapter/Section |
Reason for Update |
|
|
11 |
System software upgrade added |
|
|
Issue History
Issue |
Date of Issue |
Reason for Update |
Number |
|
|
|
|
|
01 |
07/2006 |
Initial release |
|
|
|
02 |
08/2006 |
System software upgrade added |
|
|
|
A50010-Y3-C150-2-7619 |
3 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
This document consists of a total 381 pages. All pages are issue 2.
Contents |
|
|
1 |
Introduction ....................................................................................................... |
20 |
1.1 |
Audience........................................................................................................... |
20 |
1.2 |
Document Structure.......................................................................................... |
20 |
1.3 |
Document Convention ...................................................................................... |
21 |
1.4 |
Document Notation ........................................................................................... |
21 |
1.5 |
CE Declaration of Conformity ........................................................................... |
21 |
1.6 |
GPL/LGPL Warranty and Liability Exclusion .................................................... |
22 |
2 |
System Overview.............................................................................................. |
23 |
2.1 |
System Features............................................................................................... |
24 |
3 |
Command Line Interface (CLI) ......................................................................... |
27 |
3.1 |
Command Mode ............................................................................................... |
27 |
3.1.1 |
Privileged EXEC View Mode ............................................................................ |
29 |
3.1.2 |
Privileged EXEC Enable Mode......................................................................... |
29 |
3.1.3 |
Global Configuration Mode............................................................................... |
29 |
3.1.4 |
Bridge Configuration Mode............................................................................... |
30 |
3.1.5 |
Rule Configuration Mode.................................................................................. |
31 |
3.1.6 |
DHCP Configuration Mode ............................................................................... |
32 |
3.1.7 |
DHCP Option 82 Configuration Mode .............................................................. |
32 |
3.1.8 |
Interface Configuration Mode ........................................................................... |
33 |
3.1.9 |
RMON Configuration Mode .............................................................................. |
33 |
3.1.10 |
Router Configuration Mode .............................................................................. |
34 |
3.1.11 |
VRRP Configuration Mode ............................................................................... |
34 |
3.1.12 |
Route-Map Configuration Mode ....................................................................... |
35 |
3.2 |
Useful Tips ........................................................................................................ |
36 |
3.2.1 |
Listing Available Commands ............................................................................ |
36 |
3.2.2 |
Calling Command History................................................................................. |
37 |
3.2.3 |
Using Abbreviation............................................................................................ |
38 |
3.2.4 |
Using Command of Privileged EXEC Enable Mode......................................... |
38 |
3.2.5 |
Exit Current Command Mode ........................................................................... |
39 |
4 |
System Connection and IP Address ................................................................. |
40 |
4.1 |
System Connection........................................................................................... |
40 |
4.1.1 |
System Login .................................................................................................... |
40 |
4.1.2 |
Password for Privileged EXEC Mode............................................................... |
41 |
4.1.3 |
Changing Login Password................................................................................ |
42 |
4.1.4 |
Management for System Account..................................................................... |
42 |
4.1.4.1 |
Creating System Account ................................................................................. |
42 |
4.1.4.2 |
Configuring Security Level................................................................................ |
43 |
4.1.5 |
Limiting Number of User................................................................................... |
47 |
4.1.6 |
Telnet Access.................................................................................................... |
47 |
4.1.7 |
Auto Log-out ..................................................................................................... |
48 |
4.1.8 |
System Rebooting ............................................................................................ |
48 |
4.1.8.1 |
Manual System Rebooting ............................................................................... |
48 |
4.1.8.2 |
Auto System Rebooting.................................................................................... |
49 |
4.2 |
System Authentication ...................................................................................... |
49 |
4.2.1 |
Authentication Method...................................................................................... |
50 |
4 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
4.2.2 |
Authentication Interface..................................................................................... |
50 |
4.2.3 |
Primary Authentication Method ......................................................................... |
50 |
4.2.4 |
RADIUS Server ................................................................................................. |
51 |
4.2.4.1 |
RADIUS Server for System Authentication ....................................................... |
51 |
4.2.4.2 |
RADIUS Server Priority ..................................................................................... |
51 |
4.2.4.3 |
Timeout of Authentication Request.................................................................... |
51 |
4.2.4.4 |
Frequency of Retransmit ................................................................................... |
52 |
4.2.5 |
TACACS Server................................................................................................. |
52 |
4.2.5.1 |
TACACS Server for System Authentication....................................................... |
52 |
4.2.5.2 |
TACACS Server Priority .................................................................................... |
52 |
4.2.5.3 |
Timeout of Authentication Request.................................................................... |
52 |
4.2.5.4 |
Additional TACACS+ Configuration................................................................... |
53 |
4.2.6 |
Accounting Mode............................................................................................... |
54 |
4.2.7 |
Displaying System Authentication ..................................................................... |
54 |
4.2.8 |
Sample Configuration........................................................................................ |
55 |
4.3 |
Assigning IP Address......................................................................................... |
56 |
4.3.1 |
Enabling Interface.............................................................................................. |
57 |
4.3.2 |
Disabling Interface............................................................................................. |
57 |
4.3.3 |
Assigning IP Address to Network Interface ....................................................... |
58 |
4.3.4 |
Static Route and Default Gateway .................................................................... |
58 |
4.3.5 |
Displaying Forwarding Information Base(FIB) Table......................................... |
59 |
4.3.6 |
Forwarding Information Base(FIB) Retain......................................................... |
59 |
4.3.7 |
Displaying Interface ........................................................................................... |
60 |
4.3.8 |
Sample Configuration........................................................................................ |
60 |
4.4 |
SSH (Secure Shell) ........................................................................................... |
61 |
4.4.1 |
SSH Server........................................................................................................ |
61 |
4.4.1.1 |
Enabling SSH Server......................................................................................... |
61 |
4.4.1.2 |
Displaying On-line SSH Client........................................................................... |
61 |
4.4.1.3 |
Disconnecting SSH Client ................................................................................. |
61 |
4.4.1.4 |
Displaying Connection History of SSH Client.................................................... |
61 |
4.4.1.5 |
Assigning Specific Authentication Key............................................................... |
62 |
4.4.2 |
SSH Client ......................................................................................................... |
62 |
4.4.2.1 |
Login to SSH Server.......................................................................................... |
62 |
4.4.2.2 |
File Copy ........................................................................................................... |
62 |
4.4.2.3 |
Configuring Authentication Key ......................................................................... |
62 |
4.5 |
802.1x Authentication ........................................................................................ |
64 |
4.5.1 |
802.1x Authentication ........................................................................................ |
65 |
4.5.1.1 |
Enabling 802.1x................................................................................................. |
65 |
4.5.1.2 |
Configuring RADIUS Server.............................................................................. |
65 |
4.5.1.3 |
Configuring Authentication Mode ...................................................................... |
66 |
4.5.1.4 |
Authentication Port ............................................................................................ |
67 |
4.5.1.5 |
Force Authorization............................................................................................ |
67 |
4.5.1.6 |
Configuring Interval for Retransmitting Request/Identity Packet ...................... |
67 |
4.5.1.7 |
Configuring Number of Request to RADIUS Server ......................................... |
68 |
4.5.1.8 |
Configuring Interval of Request to RADIUS Server .......................................... |
68 |
4.5.2 |
802.1x Re-Authentication .................................................................................. |
68 |
4.5.2.1 |
Enabling 802.1x Re-Authentication ................................................................... |
68 |
4.5.2.2 |
Configuring the Interval of Re-Authentication ................................................... |
69 |
4.5.2.3 |
Configuring the Interval of Requesting Re-authentication................................. |
69 |
4.5.2.4 |
802.1x Re-authentication .................................................................................. |
69 |
4.5.3 |
Initializing Authentication Status ........................................................................ |
70 |
A50010-Y3-C150-2-7619 |
5 |
UMN:CLI |
|
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
4.5.4 |
Applying Default Value...................................................................................... |
70 |
4.5.5 |
Displaying 802.1x Configuration....................................................................... |
70 |
4.5.6 |
802.1x User Authentication Statistic ................................................................. |
70 |
4.5.7 |
Sample Configuration ....................................................................................... |
71 |
5 |
Port Configuration............................................................................................. |
73 |
5.1 |
Port Basic ......................................................................................................... |
73 |
5.1.1 |
Selecting Port Type........................................................................................... |
73 |
5.2 |
Ethernet Port Configuration .............................................................................. |
74 |
5.2.1 |
Enabling Ethernet Port ..................................................................................... |
74 |
5.2.2 |
Auto-negotiation................................................................................................ |
75 |
5.2.3 |
Transmit Rate ................................................................................................... |
75 |
5.2.4 |
Duplex Mode..................................................................................................... |
76 |
5.2.5 |
Flow Control...................................................................................................... |
76 |
5.2.6 |
Port Description ................................................................................................ |
77 |
5.2.7 |
Traffic Statistics................................................................................................. |
78 |
5.2.7.1 |
The Packets Statistics....................................................................................... |
78 |
5.2.7.2 |
The CPU statistics ............................................................................................ |
79 |
5.2.7.3 |
The Protocol statistics....................................................................................... |
79 |
5.2.8 |
Port Status ........................................................................................................ |
80 |
5.2.9 |
Initializing Port Statistics ................................................................................... |
80 |
5.3 |
Port Mirroring .................................................................................................... |
80 |
6 |
System Environment ........................................................................................ |
83 |
6.1 |
Environment Configuration ............................................................................... |
83 |
6.1.1 |
Host Name........................................................................................................ |
83 |
6.1.2 |
Time and Date .................................................................................................. |
83 |
6.1.3 |
Time Zone......................................................................................................... |
84 |
6.1.4 |
Network Time Protocol ..................................................................................... |
84 |
6.1.5 |
NTP (Network Time Protocol)........................................................................... |
85 |
6.1.6 |
Simple Network Time Protocol (SNTP) ............................................................ |
85 |
6.1.7 |
Terminal Configuration...................................................................................... |
86 |
6.1.8 |
Login Banner .................................................................................................... |
87 |
6.1.9 |
DNS Server....................................................................................................... |
87 |
6.1.10 |
Fan Operation................................................................................................... |
88 |
6.1.11 |
Disabling Daemon Operation ........................................................................... |
88 |
6.1.12 |
System Threshold............................................................................................. |
88 |
6.1.12.1 |
CPU Load ......................................................................................................... |
88 |
6.1.12.2 |
Port Traffic ........................................................................................................ |
89 |
6.1.12.3 |
Fan Operation................................................................................................... |
89 |
6.1.12.4 |
System Temperature......................................................................................... |
90 |
6.1.12.5 |
System Memory................................................................................................ |
90 |
6.1.13 |
Enabling FTP Server ........................................................................................ |
90 |
6.1.14 |
Assigning IP Address of FTP Client.................................................................. |
91 |
6.2 |
Configuration Management .............................................................................. |
91 |
6.2.1 |
Displaying System Configuration...................................................................... |
91 |
6.2.2 |
Saving System Configuration ........................................................................... |
92 |
6.2.3 |
Auto-Saving ...................................................................................................... |
92 |
6.2.4 |
System Configuration File ................................................................................ |
92 |
6.2.5 |
Restoring Default Configuration ....................................................................... |
93 |
6.3 |
System Management........................................................................................ |
94 |
6.3.1 |
Network Connection ......................................................................................... |
94 |
6 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
6.3.2 |
IP ICMP Source-Routing ................................................................................... |
97 |
6.3.3 |
Tracing Packet Route ........................................................................................ |
98 |
6.3.4 |
Displaying User Connecting to System ............................................................. |
99 |
6.3.5 |
MAC Table ......................................................................................................... |
99 |
6.3.6 |
Configuring Ageing time .................................................................................. |
100 |
6.3.7 |
Running Time of System ................................................................................. |
100 |
6.3.8 |
System Information.......................................................................................... |
100 |
6.3.9 |
System Memory Information ........................................................................... |
101 |
6.3.10 |
CPU packet limit .............................................................................................. |
101 |
6.3.11 |
Average of CPU Load...................................................................................... |
101 |
6.3.12 |
Running Process ............................................................................................. |
101 |
6.3.13 |
Displaying System Image................................................................................ |
102 |
6.3.14 |
Displaying Installed OS ................................................................................... |
102 |
6.3.15 |
Default OS ....................................................................................................... |
102 |
6.3.16 |
Switch Status ................................................................................................... |
103 |
6.3.17 |
Tech Support ................................................................................................... |
103 |
7 |
Network Management ..................................................................................... |
104 |
7.1 |
Simple Network Management Protocol (SNMP) ............................................. |
104 |
7.1.1 |
SNMP Community ........................................................................................... |
104 |
7.1.2 |
Information of SNMP Agent............................................................................. |
105 |
7.1.3 |
SNMP Com2sec .............................................................................................. |
106 |
7.1.4 |
SNMP Group ................................................................................................... |
106 |
7.1.5 |
SNMP View Record......................................................................................... |
107 |
7.1.6 |
Permission to Access SNMP View Record ..................................................... |
107 |
7.1.7 |
SNMP Version 3 User...................................................................................... |
108 |
7.1.8 |
SNMP Trap ...................................................................................................... |
108 |
7.1.8.1 |
SNMP Trap Host.............................................................................................. |
109 |
7.1.8.2 |
SNMP Trap Mode ............................................................................................ |
109 |
7.1.8.3 |
Enabling SNMP Trap ....................................................................................... |
110 |
7.1.8.4 |
Disabling SNMP Trap ...................................................................................... |
111 |
7.1.8.5 |
Displaying SNMP Trap .................................................................................... |
112 |
7.1.9 |
SNMP Alarm .................................................................................................... |
112 |
7.1.9.1 |
Enabling Alarm Notification ............................................................................. |
112 |
7.1.9.2 |
Default Alarm Severity..................................................................................... |
113 |
7.1.9.3 |
Alarm Severity Criterion................................................................................... |
113 |
7.1.9.4 |
Generic Alarm Severity.................................................................................... |
114 |
7.1.9.5 |
ADVA Alarm Severity ....................................................................................... |
115 |
7.1.9.6 |
ERP Alarm Severity ......................................................................................... |
116 |
7.1.9.7 |
STP Guard Alarm Severity .............................................................................. |
117 |
7.1.10 |
Displaying SNMP Configuration ...................................................................... |
117 |
7.1.11 |
Disabling SNMP .............................................................................................. |
118 |
7.2 |
Operation, Administration and Maintenance (OAM)........................................ |
119 |
7.2.1 |
OAM Loopback................................................................................................ |
119 |
7.2.2 |
Local OAM Mode............................................................................................. |
120 |
7.2.3 |
OAM Unidirection ............................................................................................ |
120 |
7.2.4 |
Remote OAM................................................................................................... |
120 |
7.2.5 |
Displaying OAM Configuration ........................................................................ |
121 |
7.3 |
Link Layer Discovery Protocol (LLDP) ............................................................ |
123 |
7.3.1 |
LLDP Operation............................................................................................... |
123 |
7.3.2 |
LLDP Operation Type ...................................................................................... |
123 |
A50010-Y3-C150-2-7619 |
7 |
UMN:CLI |
|
User Manual |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
7.3.3 |
Basic TLV........................................................................................................ |
123 |
7.3.4 |
LLDP Message ............................................................................................... |
124 |
7.3.5 |
Interval and Delay Time.................................................................................. |
124 |
7.3.6 |
Displaying LLDP Configuration....................................................................... |
125 |
7.4 |
Remote Monitoring (RMON)........................................................................... |
126 |
7.4.1 |
RMON History................................................................................................. |
126 |
7.4.1.1 |
Source Port of Statistical Data........................................................................ |
127 |
7.4.1.2 |
Subject of RMON History ............................................................................... |
127 |
7.4.1.3 |
Number of Sample Data ................................................................................. |
127 |
7.4.1.4 |
Interval of Sample Inquiry............................................................................... |
127 |
7.4.1.5 |
Activating RMON History................................................................................ |
128 |
7.4.1.6 |
Deleting Configuration of RMON History........................................................ |
128 |
7.4.1.7 |
Displaying RMON History............................................................................... |
128 |
7.4.2 |
RMON Alarm................................................................................................... |
129 |
7.4.2.1 |
Subject of RMON Alarm ................................................................................. |
129 |
7.4.2.2 |
Object of Sample Inquiry ................................................................................ |
130 |
7.4.2.3 |
Absolute Comparison and Delta Comparison ................................................ |
130 |
7.4.2.4 |
Upper Bound of Threshold ............................................................................. |
130 |
7.4.2.5 |
Lower Bound of Threshold ............................................................................. |
131 |
7.4.2.6 |
Configuring Standard of the First Alarm.......................................................... |
131 |
7.4.2.7 |
Interval of Sample Inquiry............................................................................... |
131 |
7.4.2.8 |
Activating RMON Alarm.................................................................................. |
132 |
7.4.2.9 |
Deleting Configuration of RMON Alarm.......................................................... |
132 |
7.4.2.10 |
Displaying RMON Alarm................................................................................. |
132 |
7.4.3 |
RMON Event................................................................................................... |
132 |
7.4.3.1 |
Event Community ........................................................................................... |
132 |
7.4.3.2 |
Event Description............................................................................................ |
133 |
7.4.3.3 |
Subject of RMON Event ................................................................................. |
133 |
7.4.3.4 |
Event Type...................................................................................................... |
133 |
7.4.3.5 |
Activating RMON Event.................................................................................. |
133 |
7.4.3.6 |
Deleting Configuration of RMON Event.......................................................... |
134 |
7.4.3.7 |
Displaying RMON Event................................................................................. |
134 |
7.5 |
Syslog ............................................................................................................. |
135 |
7.5.1 |
Syslog Output Level ....................................................................................... |
135 |
7.5.2 |
Facility Code ................................................................................................... |
137 |
7.5.3 |
Syslog Bind Address....................................................................................... |
137 |
7.5.4 |
Debug Message for Remote Terminal ............................................................ |
138 |
7.5.5 |
Disabling Syslog ............................................................................................. |
138 |
7.5.6 |
Displaying Syslog Message............................................................................ |
138 |
7.5.7 |
Displaying Syslog Configuration..................................................................... |
138 |
7.6 |
Rule and QoS ................................................................................................. |
139 |
7.6.1 |
How to Operate Rule and QoS....................................................................... |
139 |
7.6.2 |
Rule Configuration.......................................................................................... |
140 |
7.6.2.1 |
Rule Creation.................................................................................................. |
140 |
7.6.2.2 |
Rule Priority .................................................................................................... |
140 |
7.6.2.3 |
Packet Classification ...................................................................................... |
141 |
7.6.2.4 |
Rule Action...................................................................................................... |
143 |
7.6.2.5 |
Applying Rule.................................................................................................. |
145 |
7.6.2.6 |
Modifying and Deleting Rule........................................................................... |
145 |
7.6.2.7 |
Displaying Rule............................................................................................... |
146 |
7.6.3 |
QoS................................................................................................................. |
146 |
8 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
7.6.3.1 |
Scheduling Algorithm....................................................................................... |
147 |
7.6.3.2 |
Qos Weight...................................................................................................... |
149 |
7.6.3.3 |
802.1p Priory-to-queue Mapping..................................................................... |
149 |
7.6.3.4 |
Queue Parameter ............................................................................................ |
150 |
7.6.3.5 |
Displaying QoS................................................................................................ |
150 |
7.6.4 |
Admin Access Rule.......................................................................................... |
150 |
7.6.4.1 |
Rule Creation................................................................................................... |
151 |
7.6.4.2 |
Rule Priority ..................................................................................................... |
151 |
7.6.4.3 |
Packet Classification ....................................................................................... |
152 |
7.6.4.4 |
Rule Action ...................................................................................................... |
153 |
7.6.4.5 |
Applying Rule .................................................................................................. |
153 |
7.6.4.6 |
Modifying and Deleting Rule ........................................................................... |
154 |
7.6.4.7 |
Displaying Rule................................................................................................ |
154 |
7.7 |
NetBIOS Filtering............................................................................................. |
155 |
7.8 |
Martian Filtering............................................................................................... |
156 |
7.9 |
Max Host ......................................................................................................... |
156 |
7.9.1 |
Max New Hosts ............................................................................................... |
157 |
7.10 |
Port Security .................................................................................................... |
158 |
7.10.1 |
Port Security on Port ....................................................................................... |
158 |
7.10.2 |
Port Security Aging .......................................................................................... |
160 |
7.11 |
MAC Table ....................................................................................................... |
161 |
7.12 |
MAC Filtering................................................................................................... |
163 |
7.12.1 |
Default Policy of MAC Filtering........................................................................ |
163 |
7.12.2 |
Adding Policy of MAC Filter............................................................................. |
163 |
7.12.3 |
Deleting MAC Filter Policy............................................................................... |
164 |
7.12.4 |
Listing of MAC Filter Policy ............................................................................. |
164 |
7.12.5 |
Displaying MAC Filter Policy ........................................................................... |
164 |
7.13 |
Address Resolution Protocol (ARP) ................................................................ |
165 |
7.13.1 |
ARP Table........................................................................................................ |
165 |
7.13.1.1 |
Registering ARP Table..................................................................................... |
166 |
7.13.1.2 |
Displaying ARP Table ...................................................................................... |
166 |
7.13.2 |
ARP Alias......................................................................................................... |
167 |
7.13.3 |
ARP Inspection................................................................................................ |
167 |
7.13.4 |
Gratuitous ARP................................................................................................ |
169 |
7.13.5 |
Proxy-ARP....................................................................................................... |
169 |
7.14 |
ICMP Message Control ................................................................................... |
169 |
7.14.1 |
Blocking Echo Reply Message........................................................................ |
170 |
7.14.2 |
Interval for Transmit ICMP Message ............................................................... |
170 |
7.14.3 |
Transmitting ICMP Redirect Message............................................................. |
172 |
7.14.4 |
The policy of unreached messages................................................................. |
173 |
7.15 |
IP TCP Flag Control......................................................................................... |
173 |
7.15.1 |
RST Configuration ........................................................................................... |
173 |
7.15.2 |
SYN Configuration........................................................................................... |
174 |
7.16 |
Packet Dump ................................................................................................... |
174 |
7.16.1 |
Verifying Packet Dump .................................................................................... |
174 |
7.16.1.1 |
Packet Dump by Protocol................................................................................ |
175 |
7.16.1.2 |
Packet Dump with Option................................................................................ |
175 |
7.16.2 |
Debug Packet Dump ....................................................................................... |
177 |
7.17 |
Displaying the usage of the packet routing table............................................. |
177 |
8 |
System Main Functions ................................................................................... |
178 |
A50010-Y3-C150-2-7619 |
9 |
UMN:CLI |
|
User Manual |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
8.1 |
VLAN .............................................................................................................. |
178 |
8.1.1 |
Port-Based VLAN ........................................................................................... |
179 |
8.1.1.1 |
Creating VLAN................................................................................................ |
180 |
8.1.1.2 |
Specifying PVID.............................................................................................. |
180 |
8.1.1.3 |
Assigning Port to VLAN .................................................................................. |
180 |
8.1.1.4 |
Deleting VLAN ................................................................................................ |
180 |
8.1.1.5 |
Displaying VLAN............................................................................................. |
181 |
8.1.2 |
Protocol-Based VLAN..................................................................................... |
181 |
8.1.3 |
MAC address-based VLAN ............................................................................ |
181 |
8.1.4 |
Subnet-based VLAN....................................................................................... |
182 |
8.1.5 |
Tagged VLAN.................................................................................................. |
182 |
8.1.6 |
VLAN Description ........................................................................................... |
183 |
8.1.7 |
Displaying VLAN Information.......................................................................... |
183 |
8.1.8 |
QinQ ............................................................................................................... |
184 |
8.1.8.1 |
Double Tagging Operation.............................................................................. |
185 |
8.1.8.2 |
Double Tagging Configuration ........................................................................ |
185 |
8.1.8.3 |
TPID Configuration ......................................................................................... |
186 |
8.1.9 |
Layer 2 Isolation ............................................................................................. |
186 |
8.1.9.1 |
Port Isolation................................................................................................... |
187 |
8.1.9.2 |
Shared VLAN.................................................................................................. |
187 |
8.1.10 |
VLAN Translation............................................................................................ |
189 |
8.1.11 |
Sample Configuration ..................................................................................... |
189 |
8.2 |
Link Aggregation............................................................................................. |
192 |
8.2.1 |
Port Trunk ....................................................................................................... |
193 |
8.2.1.1 |
Configuring Port Trunk.................................................................................... |
193 |
8.2.1.2 |
Disabling Port Trunk ....................................................................................... |
194 |
8.2.1.3 |
Displaying Port Trunk Configuration............................................................... |
194 |
8.2.2 |
Link Aggregation Control Protocol (LACP) ..................................................... |
194 |
8.2.2.1 |
Configuring LACP........................................................................................... |
195 |
8.2.2.2 |
Packet Route .................................................................................................. |
195 |
8.2.2.3 |
Operating Mode of Member Port .................................................................... |
196 |
8.2.2.4 |
Identifying Member Ports within LACP........................................................... |
197 |
8.2.2.5 |
BPDU Transmission Rate............................................................................... |
197 |
8.2.2.6 |
Key value of Member Port .............................................................................. |
197 |
8.2.2.7 |
Priority of Member Port................................................................................... |
198 |
8.2.2.8 |
Priority of Switch............................................................................................. |
198 |
8.2.2.9 |
Displaying LACP Configuration ...................................................................... |
199 |
8.3 |
Spanning-Tree Protocol (STP)........................................................................ |
200 |
8.3.1 |
STP Operation ................................................................................................ |
201 |
8.3.2 |
RSTP Operation ............................................................................................. |
205 |
8.3.3 |
MSTP Operation ............................................................................................. |
209 |
8.3.4 |
Configuring STP/RSTP/MSTP/PVSTP/PVRSTP Mode (Required) ................ |
211 |
8.3.5 |
Configuring STP/RSTP/MSTP........................................................................ |
212 |
8.3.5.1 |
Activating STP/RSTP/MSTP .......................................................................... |
212 |
8.3.5.2 |
Root Switch..................................................................................................... |
212 |
8.3.5.3 |
Path-cost......................................................................................................... |
212 |
8.3.5.4 |
Port-priority ..................................................................................................... |
213 |
8.3.5.5 |
MST Region.................................................................................................... |
214 |
8.3.5.6 |
MSTP Protocol................................................................................................ |
215 |
8.3.5.7 |
Point-to-point MAC Parameters...................................................................... |
215 |
8.3.5.8 |
Edge Ports ...................................................................................................... |
215 |
10 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
8.3.5.9 |
Displaying Configuration ................................................................................. |
216 |
8.3.6 |
Configuring PVSTP/PVRSTP.......................................................................... |
217 |
8.3.6.1 |
Activating PVSTP/PVRSTP............................................................................. |
217 |
8.3.6.2 |
Root Switch ..................................................................................................... |
218 |
8.3.6.3 |
Path-cost ......................................................................................................... |
218 |
8.3.6.4 |
Port-priority ...................................................................................................... |
218 |
8.3.7 |
Root Guard ...................................................................................................... |
219 |
8.3.8 |
Restarting Protocol Migration .......................................................................... |
219 |
8.3.9 |
Bridge Protocol Data Unit Configuration ......................................................... |
220 |
8.3.9.1 |
Hello Time........................................................................................................ |
220 |
8.3.9.2 |
Forward Delay ................................................................................................. |
221 |
8.3.9.3 |
Max Age........................................................................................................... |
221 |
8.3.9.4 |
BPDU Hop ....................................................................................................... |
222 |
8.3.9.5 |
BPDU Filter...................................................................................................... |
222 |
8.3.9.6 |
BPDU Guard.................................................................................................... |
222 |
8.3.9.7 |
Self Loop Detection ......................................................................................... |
223 |
8.3.9.8 |
Displaying BPDU Configuration ...................................................................... |
224 |
8.3.10 |
Sample Configuration...................................................................................... |
225 |
8.4 |
Virtual Router Redundancy Protocol (VRRP).................................................. |
227 |
8.4.1 |
Configuring VRRP ........................................................................................... |
228 |
8.4.1.1 |
Associated IP Address..................................................................................... |
228 |
8.4.1.2 |
Access to Associated IP Address .................................................................... |
229 |
8.4.1.3 |
Master Router and Backup Router.................................................................. |
229 |
8.4.1.4 |
VRRP Track Function ...................................................................................... |
231 |
8.4.1.5 |
Authentication Password................................................................................. |
232 |
8.4.1.6 |
Preempt ........................................................................................................... |
233 |
8.4.1.7 |
VRRP Statistics ............................................................................................... |
234 |
8.5 |
Rate Limit ........................................................................................................ |
234 |
8.5.1 |
Configuring Rate Limit..................................................................................... |
235 |
8.5.2 |
Sample Configuration...................................................................................... |
235 |
8.6 |
Flood Guard..................................................................................................... |
236 |
8.6.1 |
Configuring Flood-Guard................................................................................. |
236 |
8.6.2 |
Sample Configuration...................................................................................... |
237 |
8.7 |
Bandwidth........................................................................................................ |
237 |
8.8 |
Dynamic Host Configuration Protocol (DHCP)................................................ |
238 |
8.8.1 |
DHCP Server................................................................................................... |
239 |
8.8.1.1 |
DHCP Pool Creation........................................................................................ |
240 |
8.8.1.2 |
DHCP Subnet .................................................................................................. |
240 |
8.8.1.3 |
Range of IP Address........................................................................................ |
240 |
8.8.1.4 |
Default Gateway .............................................................................................. |
241 |
8.8.1.5 |
IP Lease Time.................................................................................................. |
241 |
8.8.1.6 |
DNS Server ..................................................................................................... |
242 |
8.8.1.7 |
Manual Binding................................................................................................ |
242 |
8.8.1.8 |
Domain Name.................................................................................................. |
243 |
8.8.1.9 |
DHCP Server Option ....................................................................................... |
243 |
8.8.1.10 |
Static Mapping ................................................................................................. |
243 |
8.8.1.11 |
Recognition of DHCP Client ............................................................................ |
243 |
8.8.1.12 |
IP Address Validation....................................................................................... |
244 |
8.8.1.13 |
Authorized ARP ............................................................................................... |
244 |
8.8.1.14 |
Prohibition of 1:N IP Address Assignment....................................................... |
245 |
8.8.1.15 |
Ignoring BOOTP Request................................................................................ |
245 |
A50010-Y3-C150-2-7619 |
11 |
UMN:CLI |
|
User Manual |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
8.8.1.16 |
DHCP Packet Statistics .................................................................................. |
245 |
8.8.1.17 |
Displaying DHCP Pool Configuration ............................................................. |
246 |
8.8.2 |
DHCP Address Allocation with Option 82....................................................... |
247 |
8.8.2.1 |
DHCP Class Capability................................................................................... |
247 |
8.8.2.2 |
DHCP Class Creation..................................................................................... |
247 |
8.8.2.3 |
Relay Agent Information Pattern..................................................................... |
247 |
8.8.2.4 |
Associating DHCP Class ................................................................................ |
248 |
8.8.2.5 |
Range of IP Address for DHCP Class ............................................................ |
248 |
8.8.3 |
DHCP Lease Database .................................................................................. |
249 |
8.8.3.1 |
DHCP Database Agent ................................................................................... |
249 |
8.8.3.2 |
Displaying DHCP Lease Status ...................................................................... |
249 |
8.8.3.3 |
Deleting DHCP Lease Database .................................................................... |
250 |
8.8.4 |
DHCP Relay Agent ......................................................................................... |
250 |
8.8.4.1 |
Packet Forwarding Address............................................................................ |
251 |
8.8.4.2 |
Smart Relay Agent Forwarding....................................................................... |
251 |
8.8.5 |
DHCP Option 82 ............................................................................................. |
252 |
8.8.5.1 |
Enabling DHCP Option 82.............................................................................. |
253 |
8.8.5.2 |
Option 82 Sub-Option..................................................................................... |
253 |
8.8.5.3 |
Option 82 Reforwarding Policy ....................................................................... |
254 |
8.8.5.4 |
Option 82 Trust Policy .................................................................................... |
254 |
8.8.5.5 |
Simplified DHCP Option 82 ............................................................................ |
255 |
8.8.6 |
DHCP Client ................................................................................................... |
256 |
8.8.6.1 |
Enabling DHCP Client .................................................................................... |
256 |
8.8.6.2 |
DHCP Client ID............................................................................................... |
256 |
8.8.6.3 |
DHCP Class ID ............................................................................................... |
256 |
8.8.6.4 |
Host Name...................................................................................................... |
256 |
8.8.6.5 |
IP Lease Time................................................................................................. |
257 |
8.8.6.6 |
Requesting Option.......................................................................................... |
257 |
8.8.6.7 |
Forcing Release or Renewal of DHCP Lease ................................................ |
257 |
8.8.6.8 |
Displaying DHCP Client Configuration ........................................................... |
257 |
8.8.7 |
DHCP Snooping ............................................................................................. |
258 |
8.8.7.1 |
Enabling DHCP Snooping .............................................................................. |
258 |
8.8.7.2 |
DHCP Trust State ........................................................................................... |
258 |
8.8.7.3 |
DHCP Rate Limit ............................................................................................ |
259 |
8.8.7.4 |
DHCP Lease Limit .......................................................................................... |
259 |
8.8.7.5 |
Source MAC Address Verification................................................................... |
259 |
8.8.7.6 |
DHCP Snooping Database Agent................................................................... |
260 |
8.8.7.7 |
Displaying DHCP Snooping Configuration ..................................................... |
261 |
8.8.8 |
IP Source Guard ............................................................................................. |
261 |
8.8.8.1 |
Enabling IP Source Guard.............................................................................. |
261 |
8.8.8.2 |
Static IP Source Binding ................................................................................. |
262 |
8.8.8.3 |
Displaying IP Source Guard Configuration..................................................... |
262 |
8.8.9 |
DHCP Filtering................................................................................................ |
263 |
8.8.9.1 |
DHCP Packet Filtering.................................................................................... |
263 |
8.8.9.2 |
DHCP Server Packet Filtering ........................................................................ |
263 |
8.8.10 |
Debugging DHCP ........................................................................................... |
264 |
8.9 |
Ethernet Ring Protection (ERP)...................................................................... |
265 |
8.9.1 |
ERP Operation................................................................................................ |
265 |
8.9.2 |
Loss of Test Packet (LOTP)............................................................................ |
267 |
8.9.3 |
Configuring ERP............................................................................................. |
267 |
8.9.3.1 |
ERP Domain ................................................................................................... |
267 |
12 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
8.9.3.2 |
RM Node ......................................................................................................... |
268 |
8.9.3.3 |
Port of ERP domain......................................................................................... |
268 |
8.9.3.4 |
Protected VLAN............................................................................................... |
268 |
8.9.3.5 |
Protected Activation......................................................................................... |
268 |
8.9.3.6 |
Manual Switch to Secondary........................................................................... |
269 |
8.9.3.7 |
Wait-to-Restore Time....................................................................................... |
269 |
8.9.3.8 |
Learning Disable Time..................................................................................... |
269 |
8.9.3.9 |
Test Packet Interval ......................................................................................... |
269 |
8.9.3.10 |
Displaying ERP Configuration ......................................................................... |
270 |
8.10 |
Stacking ........................................................................................................... |
270 |
8.10.1 |
Switch Group ................................................................................................... |
271 |
8.10.2 |
Designating Master and Slave Switch............................................................. |
271 |
8.10.3 |
Disabling Stacking ........................................................................................... |
272 |
8.10.4 |
Displaying Stacking Status .............................................................................. |
272 |
8.10.5 |
Accessing to Slave Switch from Master Switch .............................................. |
272 |
8.10.6 |
Sample Configuration...................................................................................... |
272 |
8.11 |
Broadcast Storm Control ................................................................................. |
274 |
8.12 |
Jumbo-frame Capacity .................................................................................... |
275 |
8.13 |
Blocking Direct Broadcast ............................................................................... |
276 |
8.14 |
Maximum Transmission Unit (MTU) ................................................................ |
276 |
9 |
IP Multicast ...................................................................................................... |
278 |
9.1 |
Multicast Routing Information Base................................................................. |
279 |
9.1.1 |
Enabling Multicast Routing (Required)............................................................ |
279 |
9.1.2 |
Limitation of MRIB Routing Entry .................................................................... |
279 |
9.1.3 |
Clearing MRIB Information .............................................................................. |
280 |
9.1.4 |
Displaying MRIB Information........................................................................... |
281 |
9.1.5 |
Multicast Time-To-Live Threshold.................................................................... |
281 |
9.1.6 |
MRIB Debug .................................................................................................... |
281 |
9.1.7 |
Multicast Aging ................................................................................................ |
282 |
9.2 |
Internet Group Management Protocol (IGMP) ................................................ |
283 |
9.2.1 |
IGMP Basic Configuration ............................................................................... |
283 |
9.2.1.1 |
IGMP Version per Interface ............................................................................. |
283 |
9.2.1.2 |
Removing IGMP Entry..................................................................................... |
284 |
9.2.1.3 |
IGMP Debug.................................................................................................... |
284 |
9.2.1.4 |
IGMP Robustness Value ................................................................................. |
284 |
9.2.2 |
IGMP Version 2 ............................................................................................... |
284 |
9.2.2.1 |
IGMP Static Join Setting.................................................................................. |
284 |
9.2.2.2 |
Maximum Number of Groups .......................................................................... |
285 |
9.2.2.3 |
IGMP Query Configuration .............................................................................. |
285 |
9.2.2.4 |
IGMP v2 Fast Leave........................................................................................ |
287 |
9.2.2.5 |
Displaying the IGMP Configuration ................................................................. |
287 |
9.2.3 |
L2 MFIB ........................................................................................................... |
288 |
9.2.4 |
IGMP Snooping Basic Configuration............................................................... |
288 |
9.2.4.1 |
Enabling IGMP Snooping per VLAN ............................................................... |
288 |
9.2.4.2 |
Robustness Count for IGMP v2 Snooping ...................................................... |
289 |
9.2.5 |
IGMP v2 Snooping .......................................................................................... |
289 |
9.2.5.1 |
IGMP v2 Snooping Fast Leave ....................................................................... |
290 |
9.2.5.2 |
IGMP v2 Snooping Querier ............................................................................. |
291 |
9.2.5.3 |
IGMP v2 Snooping Last-Member-Interval ....................................................... |
293 |
9.2.5.4 |
IGMP v2 Snooping Report Method ................................................................. |
294 |
A50010-Y3-C150-2-7619 |
13 |
UMN:CLI |
|
User Manual |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
9.2.5.5 |
Mrouter Port.................................................................................................... |
294 |
9.2.5.6 |
Multicast TCN Flooding .................................................................................. |
295 |
9.2.6 |
IGMP v3 Snooping.......................................................................................... |
297 |
9.2.6.1 |
IGMP Snooping Version ................................................................................. |
297 |
9.2.6.2 |
Join Host Management................................................................................... |
297 |
9.2.6.3 |
Immediate Block ............................................................................................. |
298 |
9.2.7 |
Multicast VLAN Registration (MVR) ............................................................... |
298 |
9.2.7.1 |
Enabling MVR................................................................................................. |
299 |
9.2.7.2 |
MVR Group Address....................................................................................... |
299 |
9.2.7.3 |
MVR IP Address ............................................................................................. |
299 |
9.2.7.4 |
Send and Receive Port................................................................................... |
300 |
9.2.7.5 |
Displaying MVR Configuration........................................................................ |
300 |
9.2.8 |
IGMP Filtering and Throttling.......................................................................... |
300 |
9.2.8.1 |
Creating IGMP Profile..................................................................................... |
301 |
9.2.8.2 |
Policy of IGMP Profile..................................................................................... |
301 |
9.2.8.3 |
Group Range of IGMP Profile......................................................................... |
301 |
9.2.8.4 |
Applying IGMP Profile to the Filter Port.......................................................... |
302 |
9.2.8.5 |
Max Number of IGMP Join Group .................................................................. |
302 |
9.2.9 |
Displaying IGMP Snooping Table ................................................................... |
303 |
9.3 |
PIM-SM (Protocol Independent Multicast-Sparse Mode) ............................... |
303 |
9.3.1 |
PIM Common Configuration ........................................................................... |
304 |
9.3.1.1 |
PIM-SM and Passive Mode ............................................................................ |
305 |
9.3.1.2 |
DR Priority ...................................................................................................... |
305 |
9.3.1.3 |
Filters of Neighbor in PIM ............................................................................... |
306 |
9.3.1.4 |
PIM Hello Query ............................................................................................. |
306 |
9.3.1.5 |
PIM Debug...................................................................................................... |
307 |
9.3.2 |
BSR and RP ................................................................................................... |
307 |
9.3.3 |
Bootstrap Router (BSR).................................................................................. |
307 |
9.3.4 |
RP Information................................................................................................ |
308 |
9.3.4.1 |
Static RP for Certain Group ............................................................................ |
308 |
9.3.4.2 |
Enabling Transmission of Candidate RP Message ........................................ |
309 |
9.3.4.3 |
KAT (Keep Alive Time) of RP.......................................................................... |
310 |
9.3.4.4 |
Ignoring RP Priority......................................................................................... |
310 |
9.3.5 |
PIM-SM Registration ...................................................................................... |
310 |
9.3.5.1 |
Rate Limit of Register Message ..................................................................... |
310 |
9.3.5.2 |
Registeration Suppression Time..................................................................... |
310 |
9.3.5.3 |
Filters for Register Message from RP ............................................................. |
311 |
9.3.5.4 |
Source Address of Register Message ............................................................. |
311 |
9.3.5.5 |
Reachability for PIM Register Process........................................................... |
312 |
9.3.6 |
SPT Switchover .............................................................................................. |
312 |
9.3.7 |
PIM Join/Prune Interoperability ...................................................................... |
313 |
9.3.8 |
Cisco Router Interoperability .......................................................................... |
313 |
9.3.8.1 |
Checksum of Full PIM Register Message ...................................................... |
313 |
9.3.8.2 |
Candidate RP Message with Cisco BSR........................................................ |
314 |
9.3.8.3 |
Excluding GenID Option ................................................................................. |
314 |
9.3.9 |
PIM-SSM Group ............................................................................................. |
315 |
9.3.10 |
PIM Snooping ................................................................................................. |
315 |
9.3.11 |
Displaying PIM-SM Configuration................................................................... |
316 |
10 |
IP Routing Protocol......................................................................................... |
317 |
10.1 |
Border Gateway Protocol (BGP) .................................................................... |
317 |
14 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
10.1.1 |
Basic Configuration ......................................................................................... |
318 |
10.1.1.1 |
Configuration Type of BGP.............................................................................. |
318 |
10.1.1.2 |
Enabling BGP Routing..................................................................................... |
318 |
10.1.1.3 |
Disabling BGP Routing.................................................................................... |
319 |
10.1.2 |
Advanced Configuration .................................................................................. |
319 |
10.1.2.1 |
Summary of Path............................................................................................. |
320 |
10.1.2.2 |
Automatic Summarization of Path ................................................................... |
320 |
10.1.2.3 |
Multi-Exit Discriminator (MED) ........................................................................ |
321 |
10.1.2.4 |
Choosing Best Path......................................................................................... |
321 |
10.1.2.5 |
Graceful Restart .............................................................................................. |
323 |
10.1.3 |
IP Address Family............................................................................................ |
324 |
10.1.4 |
BGP Neighbor ................................................................................................. |
325 |
10.1.4.1 |
Default Route................................................................................................... |
325 |
10.1.4.2 |
Peer Group ...................................................................................................... |
325 |
10.1.4.3 |
Route Map ....................................................................................................... |
326 |
10.1.4.4 |
Force Shutdown .............................................................................................. |
326 |
10.1.5 |
BGP Session Reset......................................................................................... |
327 |
10.1.5.1 |
Session Reset of All Peers .............................................................................. |
327 |
10.1.5.2 |
Session Reset of Peers within Particular AS................................................... |
328 |
10.1.5.3 |
Session Reset of Specific Route ..................................................................... |
329 |
10.1.5.4 |
Session Reset of External Peer ...................................................................... |
329 |
10.1.5.5 |
Session Reset of Peer Group.......................................................................... |
330 |
10.1.6 |
Displaying and Managing BGP ....................................................................... |
331 |
10.2 |
Open Shortest Path First (OSPF).................................................................... |
333 |
10.2.1 |
Enabling OSPF................................................................................................ |
333 |
10.2.2 |
ABR Type Configuration .................................................................................. |
335 |
10.2.3 |
Compatibility Support ...................................................................................... |
335 |
10.2.4 |
OSPF Interface................................................................................................ |
335 |
10.2.4.1 |
Authentication Type ......................................................................................... |
336 |
10.2.4.2 |
Authentication Key........................................................................................... |
336 |
10.2.4.3 |
Interface Cost .................................................................................................. |
337 |
10.2.4.4 |
Blocking Transmission of Route Information Database .................................. |
338 |
10.2.4.5 |
Routing Protocol Interval ................................................................................. |
338 |
10.2.4.6 |
OSPF Maximum Transmission Unit (MTU) ..................................................... |
340 |
10.2.4.7 |
OSPF Priority................................................................................................... |
340 |
10.2.4.8 |
OSPF Network Type........................................................................................ |
341 |
10.2.5 |
Non-Broadcast Network .................................................................................. |
341 |
10.2.6 |
OSPF Area ...................................................................................................... |
342 |
10.2.6.1 |
Area Authentication ......................................................................................... |
342 |
10.2.6.2 |
Default Cost of Area ........................................................................................ |
343 |
10.2.6.3 |
Blocking the Transmission of Routing Information Between Area .................. |
343 |
10.2.6.4 |
Not So Stubby Area (NSSA)............................................................................ |
344 |
10.2.6.5 |
Area Range ..................................................................................................... |
346 |
10.2.6.6 |
Shortcut Area................................................................................................... |
346 |
10.2.6.7 |
Stub Area ......................................................................................................... |
347 |
10.2.6.8 |
Virtual Link....................................................................................................... |
347 |
10.2.7 |
Default Metric .................................................................................................. |
349 |
10.2.8 |
Graceful Restart Support................................................................................. |
349 |
10.2.9 |
Opaque-LSA Support ...................................................................................... |
351 |
10.2.10 |
Default Route................................................................................................... |
351 |
10.2.11 |
Finding Period ................................................................................................. |
352 |
A50010-Y3-C150-2-7619 |
15 |
UMN:CLI |
|
User Manual |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
10.2.12 |
External Routes to OSPF Network................................................................. |
353 |
10.2.13 |
OSPF Distance ............................................................................................... |
354 |
10.2.14 |
Host Route...................................................................................................... |
355 |
10.2.15 |
Passive Interface ............................................................................................ |
355 |
10.2.16 |
Blocking Routing Information.......................................................................... |
356 |
10.2.17 |
Summary Routing Information........................................................................ |
356 |
10.2.18 |
OSPF Monitoring and Management............................................................... |
356 |
10.2.18.1 |
Displaying OSPF Protocol Information........................................................... |
357 |
10.2.18.2 |
Displaying Debugging Information.................................................................. |
359 |
10.2.18.3 |
Limiting Number of Database ......................................................................... |
359 |
10.2.18.4 |
Maximum Process of LSA .............................................................................. |
360 |
10.3 |
Routing Information Protocol (RIP)................................................................. |
361 |
10.3.1 |
Enabling RIP................................................................................................... |
361 |
10.3.2 |
RIP Neighbor Router ...................................................................................... |
362 |
10.3.3 |
RIP Version..................................................................................................... |
363 |
10.3.4 |
Creating available Static Route only for RIP .................................................. |
364 |
10.3.5 |
Redistributing Routing Information ................................................................. |
364 |
10.3.6 |
Metrics for Redistributed Routes .................................................................... |
366 |
10.3.7 |
Administrative Distance .................................................................................. |
367 |
10.3.8 |
Originating Default Information....................................................................... |
367 |
10.3.9 |
Routing Information Filtering .......................................................................... |
367 |
10.3.9.1 |
Filtering Access List and Prefix List ................................................................ |
368 |
10.3.9.2 |
Disabling the transmission to Interface .......................................................... |
368 |
10.3.9.3 |
Offset List........................................................................................................ |
368 |
10.3.10 |
Maximum Number of RIP Routes................................................................... |
369 |
10.3.11 |
RIP Network Timer.......................................................................................... |
369 |
10.3.12 |
Split Horizon.................................................................................................... |
370 |
10.3.13 |
Authentication Key.......................................................................................... |
370 |
10.3.14 |
Restarting RIP ................................................................................................ |
371 |
10.3.15 |
UDP Buffer Size of RIP................................................................................... |
371 |
10.3.16 |
Monitoring and Managing RIP ........................................................................ |
372 |
11 |
System Software Upgrade.............................................................................. |
373 |
11.1 |
General Upgrade ............................................................................................ |
373 |
11.2 |
Boot Mode Upgrade ....................................................................................... |
374 |
11.3 |
FTP Upgrade .................................................................................................. |
377 |
12 |
Abbreviations .................................................................................................. |
379 |
16 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
Illustrations |
|
|
Fig. 2.1 |
Network Structure with hiD 6615 S223/S323................................................. |
23 |
Fig. 3.1 |
Software mode structure ................................................................................ |
28 |
Fig. 4.1 |
Process of 802.1x Authentication................................................................... |
64 |
Fig. 4.2 |
Multiple Authentication Servers...................................................................... |
65 |
Fig. 5.1 |
hiD 6615 S223/S323 Interface ....................................................................... |
73 |
Fig. 5.2 |
Port Mirroring.................................................................................................. |
81 |
Fig. 6.1 |
Ping Test for Network Status .......................................................................... |
97 |
Fig. 6.2 |
IP Source Routing .......................................................................................... |
97 |
Fig. 7.1 |
Weighted Round Robin ................................................................................ |
147 |
Fig. 7.2 |
Weighted Fair Queuing ................................................................................ |
148 |
Fig. 7.3 |
Strict Priority Queuing .................................................................................. |
148 |
Fig. 7.4 |
NetBIOS Filtering ......................................................................................... |
155 |
Fig. 8.1 |
Port-based VLAN ......................................................................................... |
179 |
Fig. 8.2 |
Example of QinQ Configuration ................................................................... |
184 |
Fig. 8.3 |
QinQ Frame.................................................................................................. |
184 |
Fig. 8.4 |
In Case Packets Going Outside in Layer 2 environment ............................. |
187 |
Fig. 8.5 |
In Case External Packets Enter under Layer 2 environment (1) ................. |
188 |
Fig. 8.6 |
In Case External Packets Enter under Layer 2 environment (2) ................. |
188 |
Fig. 8.7 |
Link Aggregation........................................................................................... |
193 |
Fig. 8.8 |
Example of Loop .......................................................................................... |
200 |
Fig. 8.9 |
Principle of Spanning Tree Protocol............................................................. |
200 |
Fig. 8.10 |
Root Switch .................................................................................................. |
201 |
Fig. 8.11 |
Designated Switch ....................................................................................... |
202 |
Fig. 8.12 |
Port Priority................................................................................................... |
203 |
Fig. 8.13 |
Port State...................................................................................................... |
204 |
Fig. 8.14 |
Alternate Port and Backup port .................................................................... |
205 |
Fig. 8.15 |
Example of Receiving Low BPDU................................................................ |
206 |
Fig. 8.16 |
Convergence of 802.1d Network.................................................................. |
207 |
Fig. 8.17 |
Network Convergence of 802.1w (1)............................................................ |
207 |
Fig. 8.18 |
Network Convergence of 802.1w (2)............................................................ |
208 |
Fig. 8.19 |
Network Convergece of 802.1w (3).............................................................. |
208 |
Fig. 8.20 |
Compatibility with 802.1d (1)........................................................................ |
209 |
Fig. 8.21 |
Compatibility with 802.1d (2)........................................................................ |
209 |
Fig. 8.22 |
CST and IST of MSTP (1) ............................................................................ |
210 |
Fig. 8.23 |
CST and IST of MSTP (2) ............................................................................ |
211 |
Fig. 8.24 |
Example of PVSTP....................................................................................... |
217 |
Fig. 8.25 |
Root Guard................................................................................................... |
219 |
Fig. 8.26 |
Example of Layer 2 Network Design in RSTP Environment........................ |
225 |
Fig. 8.27 |
Example of Layer 2 Network Design in MSTP Environment........................ |
226 |
Fig. 8.28 |
VRRP Operation........................................................................................... |
227 |
Fig. 8.29 |
VRRP Track.................................................................................................. |
232 |
Fig. 8.30 |
Rate Limit and Flood Guard ......................................................................... |
236 |
Fig. 8.31 |
DHCP Service Structure............................................................................... |
238 |
Fig. 8.32 |
Example of DHCP Relay Agent.................................................................... |
250 |
Fig. 8.33 |
DHCP Option 82 Operation.......................................................................... |
253 |
Fig. 8.34 |
DHCP Server Packet Filtering...................................................................... |
264 |
Fig. 8.35 |
Ethernet Ring Protocol Operation in Failure State ....................................... |
265 |
Fig. 8.36 |
Ring Protection............................................................................................. |
266 |
Fig. 8.37 |
Link Failure Recovery .................................................................................. |
266 |
A50010-Y3-C150-2-7619 |
17 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
Fig. 8.38 |
Ring Recovery............................................................................................. |
267 |
Fig. 8.39 |
Example of Stacking.................................................................................... |
270 |
Fig. 9.1 |
IGMP Snooping Configuration Network ...................................................... |
278 |
Fig. 9.2 |
PIM-SM Configuration Network................................................................... |
278 |
Fig. 9.3 |
IGMP Snooping and PIM-SM Configuration Network ................................. |
279 |
Fig. 9.4 |
IP Multicasting ............................................................................................. |
290 |
Fig. 9.5 |
RPT of PIM-SM ........................................................................................... |
304 |
Fig. 9.6 |
STP of PIM-SM............................................................................................ |
304 |
Fig. 9.7 |
In Case Multicast Source not Directly Connected to Multicast Group ........ |
313 |
18 |
A50010-Y3-C150-2-7619 |
User Manual |
|
UMN:CLI |
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
Tables |
|
|
Tab. 1.1 |
Overview of Chapters..................................................................................... |
20 |
Tab. 1.2 |
Command Notation of Guide Book ................................................................ |
21 |
Tab. 3.1 |
Main Commands of Privileged EXEC View Mode ......................................... |
29 |
Tab. 3.2 |
Main Commands of Privileged EXEC Enable Mode...................................... |
29 |
Tab. 3.3 |
Main Commands of Global Configuration Mode ............................................ |
30 |
Tab. 3.4 |
Main Commands of Bridge Configuration Mode ............................................ |
31 |
Tab. 3.5 |
Main Commands of Rule Configuration Mode ............................................... |
31 |
Tab. 3.6 |
Main Commands of DHCP Configuration Mode ............................................ |
32 |
Tab. 3.7 |
Main Commands of DHCP Option 82 Configuration Mode............................ |
32 |
Tab. 3.8 |
Main Commands of Interface Configuration Mode ........................................ |
33 |
Tab. 3.9 |
Main Commands of RMON Configuration Mode ........................................... |
33 |
Tab. 3.10 |
Main Commands of Router Configuration Mode............................................ |
34 |
Tab. 3.11 |
Main Commands of VRRP Configuration Mode............................................. |
34 |
Tab. 3.12 |
Main Commands of Route-map Configuration Mode..................................... |
35 |
Tab. 3.13 |
Command Abbreviation.................................................................................. |
38 |
Tab. 6.1 |
World Time Zone ............................................................................................ |
84 |
Tab. 6.2 |
Options for Ping.............................................................................................. |
95 |
Tab. 6.3 |
Options for Ping for Multiple IP Addresses..................................................... |
96 |
Tab. 6.4 |
Options for Tracing Packet Route .................................................................. |
98 |
Tab. 7.1 |
Default 802.1p Priory-to-queue Map............................................................ |
149 |
Tab. 7.2 |
ICMP Message Type .................................................................................... |
170 |
Tab. 7.3 |
Mask Calculation of Default Value ............................................................... |
171 |
Tab. 7.4 |
Options for Packet Dump ............................................................................. |
176 |
Tab. 8.1 |
Advantages and Disadvantages of Tagged VLAN ....................................... |
183 |
Tab. 8.2 |
STP Path-cost .............................................................................................. |
213 |
Tab. 8.3 |
RSTP Path-cost............................................................................................ |
213 |
A50010-Y3-C150-2-7619 |
19 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
This manual is intended for SURPASS hiD 6615 S223/S323 single-board Fast Ethernet switch operators and maintenance personnel for providers of Ethernet services. This manual assumes that you are familiar with the following:
•Ethernet networking technology and standards
•Internet topologies and protocols
•Usage and functions of graphical user interfaces.
Tab. 1.1 briefly describes the structure of this document.
|
Chapter |
Description |
|
|
|
|
|
1 |
Introduction |
Introduces the overall information of the document. |
|
|
|
|
|
2 |
System Overview |
Introduces the hiD 6615 S223/S323 system. It also lists the features |
|
of the system. |
|||
|
|
||
|
|
|
|
3 |
Command Line Interface (CLI) |
Describes how to use the Command Line Interface (CLI). |
|
|
|
|
|
4 |
System Connection and IP Address |
Describes how to manage the system account and IP address. |
|
|
|
|
|
5 |
Port Configuration |
Describes how to configure the Ethernet ports. |
|
|
|
|
|
6 |
System Environment |
Describes how to configure the system environment and manage- |
|
ment functions. |
|||
|
|
||
|
|
|
|
7 |
Network Management |
Describes how to configure the network management functions. |
|
|
|
|
|
8 |
System Main Functions |
Describes how to configure the system main functions. |
|
|
|
|
|
9 |
IP Multicast. |
Describes how to configure the IP multicast packets. |
|
|
|
||
10 IP Routing Protocol. |
Describes how to configure IP routing protocol. |
||
|
|
|
|
12 Abbreviations |
Lists all abbreviations and acronyms which appear in this docu- |
||
ment. |
|||
|
|
||
|
|
|
Tab. 1.1 Overview of Chapters
20 |
A50010-Y3-C150-2-7619 |
User Manual |
UMN:CLI |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
|
This guide uses the following conventions to convey instructions and information.
|
Information |
|
|
This information symbol provides useful information when using commands to configure |
|
i |
||
and means reader take note. Notes contain helpful suggestions or references. |
||
|
Warning |
|
|
This warning symbol means danger. You are in a situation that could cause bodily injury |
!or broke the equipment. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents by making quick guide based on this guide.
The following table shows commands used in guide book. Please be aware of each command to use them correctly.
Notation |
Description |
|
|
|
|
a |
Commands you should use as is. |
|
|
|
|
NAME, PROFILE, VALUE, … |
Variables for which you supply values. |
|
|
|
|
PORTS |
For entry this variable, see Section 5.1. |
|
|
|
|
[ ] |
Commands or variables that appear within square brackets [ ] are |
|
optional. |
||
|
||
|
|
|
< > |
Range of number that you can use. |
|
|
|
|
{ } |
A choice of required keywords appears in braces { }. You must se- |
|
lect one. |
||
|
||
|
|
|
| |
Optional variables are separated by vertical bars |. |
|
|
|
Tab. 1.2 Command Notation of Guide Book
The CE declaration of the product will be fulfilled if the construction and cabling is undertaken in accordance with the manual and the documents listed there in, e.g. mounting instructions, cable lists where necessary account should be taken of project-specific documents.
Deviations from the specifications or unstipulated changes during construction, e.g. the use of cable types with lower screening values can lead to violation of the CE requirements. In such case the conformity declaration is invalidated and the responsibility passes to those who have caused the deviations.
A50010-Y3-C150-2-7619 |
21 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
The Siemens product, SURPASS hiD 6615, contains both proprietary software and “Open Source Software”. The Open Source Software is licensed to you at no charge under the GNU General Public License (GPL) and the GNU Lesser General Public License (LGPL). This Open Source Software was written by third parties and enjoys copyright protection. You are entitled to use this Open Source Software under the conditions set out in the GPL and LGPL licenses indicated above. In the event of conflicts between Siemens license conditions and the GPL or LGPL license conditions, the GPL and LGPL conditions shall prevail with respect to the Open Source portions of the software.
The GPL can be found under the following URL:
http://www.gnu.org/copyleft/gpl.html
The LGPL can be found under the following URL:
http://www.gnu.org/copyleft/lgpl.html
In addition, if the source code to the Open Source Software has not been delivered with this product, you may obtain the source code (including the related copyright notices) by sending your request to the following e-mail address: opensrc@dasannetworks.com You will, however, be required to reimburse Siemens for its costs of postage and copying.
Any source code request made by you must be sent within 3 years of your purchase of the product. Please include a copy of your sales receipt when submitting your request. Also please include the exact name and number of the device and the version number of the installed software.
The use of Open Source Software contained in this product in any manner other than the simple running of the program occurs at your own risk, that is, without any warranty claims against Siemens. For more information about the warranties provided by the authors of the Open Source Software contained in this product, please consult the GPL and LGPL.
You have no warranty claims against Siemens when a defect in the product is or couldhave been caused by changes made by you in any part of the software or its configuration. In addition, you have no warranty claims against Siemens when the Open Source Software infringes the intellectual property rights of a third party.
Siemens provides no technical support for either the software or the Open Source Software contained therein if either has been changed.
22 |
A50010-Y3-C150-2-7619 |
User Manual |
UMN:CLI |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
|
SURPASS hiD 6615 L3 switch is typical Layer 3 switch intended to construct large-scale network, which provides aggregated function of upgraded LAN network consisted of typical Ethernet switch. Layer 3 switch can connect to PC, web server, LAN equip-ment, backbone equipment, or another switch through various interfaces.
SURPASS hiD 6615 L3 switch supports routing based on VLAN, IP multicasting, and provides Layer 3 switching service such as IP packet filtering or DHCP.
The Fig. 2.1 shows network construction with using hiD 6615 S223/S323.
Fig. 2.1 Network Structure with hiD 6615 S223/S323
A50010-Y3-C150-2-7619 |
23 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
Main features of hiD 6615 S223/S323, having Fast Ethernet switch and Layer 3 switching function which supports both Ethernet switching and IP routing, are follow.
Routing functionalities such as RIP, OSPF, BGP and PIM-SM are only available for hiD
!6615 S323. (Unavailable for hiD 6615 S223)
VLAN
Virtual Local Area Network (VLAN) is made by dividing one network into several logical networks. Packet can not be transmitted and received between different VLANs. Therefore it can prevent unnecessary packets accumulating and strengthen security. The hiD 6615 S223/S323 recognizes 802.1q tagged frame and supports maximum 4096 VLANs and Port based, Protocol based, MAC based VLANs.
Quality of Service (QoS)
For the hiD 6615 S223/S323, QoS-based forwarding sorts traffic into a number of classes and marks the packets accordingly. Thus, different quality of service is providing to each class, which the packets belong to. The QoS capabilities enable network managers to protect mission-critical applications and support differentiated level of bandwidth for managing traffic congestion. The hiD 6615 S223/S323 support ingress and egress (shaping) rate limiting, and different scheduling type such as SP (Strict Priority), WRR (Weighted Round Robin) and WFQ (Weighted Fair Queuing).
Multicasting
Because broadcasting in a LAN is restricted if possible, multicasting could be used instead of broadcasting by forwarding multicast packets only to the member hosts who joined multicast group. The hiD 6615 S223/S323 provides IGMP V2, IGMP snooping and PIM-SM for host membership management and multicast routing.
SNMP
Simple Network Management Protocol (SNMP) is to manage Network Elements using TCP/IP protocol. The hiD 6615 S223/S323 supports SNMP version 1, 2, 3 and Remote Monitoring (RMON). Network operator can use MIB also to monitor and manage the hiD 6615 S223/S323.
IP Routing
The hiD 6615 S323 is Layer 3 switch, which has routing table and IP address as router. Therefore, it supports static routing, RIP v1/v2, OSPF v2 and BGP v4 for unicast routing.
24 |
A50010-Y3-C150-2-7619 |
User Manual |
UMN:CLI |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
|
DHCP
The hiD 6615 S223/S323 supports DHCP (Dynamic Host Control Protocol) Server that automatically assigns IP address to clients accessed to network. That means it has IP address pool, and operator can effectively utilize limited IP source by leasing temporary IP address. In layer 3 network, DHCP request packet can be sent to DHCP server via DHCP relay and Option 82 function.
Spanning Tree Protocol (STP)
To prevent loop and preserve backup route in layer 2 network, the hiD 6615 S223/S323 supports STP (802.1D). Between STP enabled switches, a root bridge is automatically selected and the network remains in tree topology. But the recovery time in STP is very slow (about 30 seconds), RSTP (Rapid Spanning Tree Protocol) is also provided. IEEE 802.1W defines the recovery time as 2 seconds. If there is only one VLAN in the network, traditional STP works. However, in more than one VLAN network, STP cannot work per VLAN. To avoid this problem, the hiD 6615 S223/S323 supports Multiple Spanning Tree Protocol (MSTP).
Link Aggregation (Trunking)
The hiD 6615 S223/S323 aggregates several physical interfaces into one logical port (aggregate port). Port trunk aggregates interfaces with the standard of same speed, same duplex mode, and same VLAN ID. According to IEEE 802.3ad, the hiD 6615 S223/S323 can configure maximum 8 aggregate ports and up to 12 trunk groups.
LACP
The hiD 6615 S223/S323 supports Link Aggregation Control Protocol (LACP), complying with IEEE 802.3ad, which aggregates multiple links of equipments to use more enlarged bandwidth.
System Management based on CLI
It is easy for users who administer system by using telnet or console port to configure the functions for system operating through CLI. CLI is easy to configure the needed functions after looking for available commands by help menu different with UNIX.
Broadcast Storm Control
Broadcast storm control is, when too much of broadcast packets are being transmitted to network, a situation of network timeout because the packets occupy most of transmit capacity. The hiD 6615 S223/S323 supports broadcast and multicast storm control, which disuses flooding packet, that exceed the limit during the time configured by user.
A50010-Y3-C150-2-7619 |
25 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
RADIUS and TACACS+
hiD 6615 S223/S323 supports client authentication protocol, that is RADIUS(Remote Authentication Dial-In User Service) and TACACS+(Terminal Access Controller Access Control System Plus). Not only user IP and password registered in switch but also authentication through RADIUS server and TACACS+ server are required to access. Therefore, security of system and network management is strengthened.
26 |
A50010-Y3-C150-2-7619 |
User Manual |
UMN:CLI |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
|
This chapter describes how to use the Command Line Interface (CLI) which is used to configure the hiD 6615 S223/S323 system.
•Useful Tips
3.1Command Mode
You can configure and manage the hiD 6615 S223/S323 by console terminal that is installed on user’s PC. For this, use the CLI-based interface commands. Connect RJ45-to- DB9 console cable to the hiD 6615 S223/S323.
This chapter explains how CLI command mode is organized before installing. CLI command mode is consisted as follow:
•Privileged EXEC View Mode
•Privileged EXEC Enable Mode
•Global Configuration Mode
•Bridge Configuration Mode
•Rule Configuration Mode
•DHCP Configuration Mode
•DHCP Option 82 Configuration Mode
•Interface Configuration Mode
•RMON Configuration Mode
•Router Configuration Mode
•VRRP Configuration Mode
•Route-Map Configuration Mode
A50010-Y3-C150-2-7619 |
27 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
Fig. 3.1 shows hiD 6615 S323 software mode structure briefly.
Fig. 3.1 Software mode structure
28 |
A50010-Y3-C150-2-7619 |
User Manual |
UMN:CLI |
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
|
When you log in to the switch, the CLI will start with Privileged EXEC View mode that is a read-only mode. In this mode, you can see a system configuration and information with several commands.
Tab. 3.1 shows main command of Privileged EXEC View mode.
Command |
Description |
|
|
enable |
Opens Privileged EXEC Enable mode. |
|
|
exit |
Logs out the switch. |
|
|
show |
Shows a system configuration and information. |
|
|
Tab. 3.1 Main Commands of Privileged EXEC View Mode
To configure the switch, you need to open Privileged EXEC Enable mode with the enable command, then the system prompt will changes from SWITCH> to SWITCH#.
Command |
Mode |
Description |
|
|
|
enable |
View |
Opens Privileged EXEC Enable mode. |
|
|
|
You can set a password to Privileged EXEC Enable mode to enhance security. Once setting a password, you should enter a configured password, when you open Privileged EXEC Enable mode.
Tab. 3.2 shows main commands of Privileged EXEC Enable mode.
Command |
Description |
|
|
clock |
Inputs time and date in system. |
|
|
configure terminal |
Opens Configuration mode. |
|
|
telnet |
Connects to another device through telnet. |
|
|
terminal length |
Configures the number of lines to be displayed in screen. |
|
|
traceroute |
Traces transmission path of packet. |
|
|
where |
Finds users accessed to system through telnet. |
|
|
Tab. 3.2 Main Commands of Privileged EXEC Enable Mode
In Global Configuration mode, you can configure general functions of the system. You can also open another configuration mode from this mode.
To open Global Configuration mode, enter the configure terminal command, and then the system prompt will be changed from SWITCH# to SWITCH(config)#.
Command |
Mode |
Description |
|
|
|
|
|
configure terminal |
Enable |
Opens Global Configuration mode from Privileged |
|
EXEC Enable mode. |
|||
|
|
||
|
|
|
A50010-Y3-C150-2-7619 |
29 |
UMN:CLI |
User Manual |
|
|
SURPASS hiD 6615 S223/S323 R1.5 |
|
|
|
|
Tab. 3.3 shows a couple of important main commands of Global Configuration mode.
Command |
Description |
|
|
access-list |
Configures policy to limit routing information on the standard of AS. |
|
|
arp |
Registers IP address and MAC address in ARP table. |
|
|
bgp |
Helps BGP configuration. |
|
|
bridge |
Opens Bridge Configuration mode. |
|
|
copy |
Makes a backup file for the configuration of the switch. |
|
|
dot1x |
Configures various functions of 802.1x daemon. |
|
|
end |
Closes current mode and returns to User EXEC mode. |
|
|
exit |
Closes current mode and returns to previous mode. |
|
|
hostname |
Changes host name of the switch. |
|
|
exec-timeout |
Configures auto-logout function. |
|
|
fan |
Configures fan operation |
|
|
interface |
Opens Interface Configuration mode. |
|
|
ip |
Configures various functions of the interface. |
|
|
passwd |
Changes a system password. |
|
|
qos |
Configures QoS. |
|
|
restore factory-defaults |
Restores the default configuration of the switch. |
|
|
rmon-alarm |
Opens Rmon-alarm configuration mode. |
|
|
rmon-event |
Opens Rmon-event configuration mode. |
|
|
rmon-history |
Opens Rmon-history configuration mode. |
|
|
route-map |
Opens Route-map Configuration mode. |
|
|
router |
Opens Router Configuration mode.(OSPF. RIP, VRRP, PIM, BGP) |
|
|
snmp |
Configures SNMP. |
|
|
sntp |
Configures SNTP |
|
|
syslog |
Configures syslog. |
|
|
time-zone |
Configures time zone. |
|
|
Tab. 3.3 Main Commands of Global Configuration Mode
In Bridge Configuration mode, you can configure various Layer 2 functions such as VLAN, STP, LACP, EFM OAM, etc.
To open Bridge Configuration mode, enter the bridge command, then the system prompt will be changed from SWITCH(config)# to SWITCH(bridge)#.
Command |
Mode |
Description |
|
|
|
bridge |
Global |
Opens Bridge Configuration mode. |
|
|
|
30 |
A50010-Y3-C150-2-7619 |