Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However,
no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of
third parties which may result from its use. No license is granted by implication or otherwise under any
patent or patent rights of SMC. SMC reserves the right to change specifications at any time without
notice.
Copyright (C) 2009 by
SMC Networks, Inc.
20 Mason
Irvine, CA 92618
All rights reserved. Printed in Taiwan
Trademarks:
SMC is a registered trademark; and EZ Switch, TigerAccess, TigerStack and TigerSwitch are trademarks of SMC Networks, Inc. Other product and company names are trademarks or registered
trademarks of their respective holders.
SMC7824M/VSW1
CLI Management Guide
TigerAccess™ EE
Warranty and Product Registration
To register SMC products and to review the detailed warranty statement, please refer to
the Support Section of the SMC Website at http://www.smc.com
This manual is intended for Ethernet/IP DSLAM operators and maintenance personnel for
providers of Digital Subscriber Line(DSL) and Ethernet services. This manual assumes
that you are familiar with the following:
• Ethernet networking technology and standards
• Internet topologies and protocols
• DSL technology and standards
• Usage and functions of graphical user interfaces.
1.2 Document Structure
Tab. 1.1 briefly describes the structure of this document.
Chapter Description
1 Introduction Introduces the overall information of the document.
2 System Overview Introduces the switch system. It also lists the features of the system.
3 Command Line Interface (CLI) Describes how to use the Command Line Interface (CLI).
4 System Connection and IP AddressDescribes how to manage the system account and IP address.
5 Port Configuration Describes how to configure the Ethernet or VDSL ports.
6 System Environment
7 Network Management Describes how to configure the network management functions.
8 System Main Functions Describes how to configure the system main functions.
9 IP Multicast Describes how to configure the IP multicast functions.
10 System Software Upgrade Describes how to upgrade the system software.
11 Abbreviations
Describes how to configure the system environment and manage-
ment functions.
Lists all abbreviations and acronyms which appear in this docu-
ment.
Tab. 1. 1 Overview of Chapters
SMC7824M/VSW19
CLI Management Guide
TigerAccess™ EE
1.3 Document Convention
This guide uses the following conventions to convey instructions and information.
Information
i
and means reader take note. Notes contain helpful suggestions or references.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury
This information symbol provides useful information when using commands to configure
!
or broke the equipment. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents by making quick guide based on this guide.
1.4 Document Notation
The following table shows commands used in guide book. Please be aware of each
command to use them correctly.
Notation Description
a Commands you should use as is.
NAME, PROFILE, VALUE, … Variables for which you supply values.
PORTS For entry this variable, see Section 5.1.
[ ]
< > Range of number that you can use.
{ }
| Optional variables are separated by vertical bars |.
Commands or variables that appear within square brackets [ ] are
optional.
A choice of required keywords appears in braces { }. You must se-
lect one.
Tab. 1. 2 Command Notation of Guide Book
20 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
1.5 Virus Protection
To prevent a virus infection you may not use any software other than that which is re-
!
!
leased for the Operating System (OS based on Basis Access Integrator), Local Craft
Terminal (LCT) and transmission system.
Even when exchanging data via network or external data media(e.g. floppy disks) there is
a possibility of infecting your system with a virus. The occurrence of a virus in your system may lead to a loss of data and breakdown of functionality.
The operator is responsible for protecting against viruses, and for carrying out repair procedures when the system is infected.
You have to do the following:
•You have to check every data media (used data media as well as new ones) for virus before reading data from it.
•You must ensure that a current valid virus scanning program is always available. This program has to be supplied with regular updates by a certified software.
• It is recommended that you make periodic checks against viruses in your OS.
• At the LCT it is recommended to integrate the virus scanning program into the startup
sequence.
1.6 CE Declaration of Conformity
The CE declaration of the product will be fulfilled if the construction and cabling is undertaken in accordance with the manual and the documents listed there in, e.g. mounting instructions, cable lists where necessary account should be taken of project-specific documents.
Deviations from the specifications or unstipulated changes during construction, e.g. the
use of cable types with lower screening values can lead to violation of the CE requirements. In such case the conformity declaration is invalidated and the responsibility
passes to those who have caused the deviations.
This is a class A product. In a domestic environment this product may cause radio refer-
!
ence in which case the user may be required to take adequate measures.
SMC7824M/VSW21
CLI Management Guide
TigerAccess™ EE
2 System Overview
The switch, which is IP VDSL, uses VDSL (Very high-data rate Digital Subscriber Line)
technologies so that users can be served voice communication and data communication
at the same time through existing telephone line. Since VDSL technology takes the telephone line, you do not need to install LAN line newly. Therefore, you can save the cost
and provide advanced service for users in apartments, buildings, and hotels.
The switch supports maximum 100Mbps of upload and 100Mbps down load in case of
Symmetric, and up to 50 Mbps of upload and 100 Mbps of download or 10VLR Mbps of
upload 50VLR Mbps of download in case of Asymmetric.
The switch offers 24-Port VDSL2 service interface and fixed 2-Port 10/100/1000Base-T
and 1-slot for option uplink module. Note – The uplink module is not used in the first release.
Managed switches, as IP-VDSL of Layer 2 switch, supports VLAN, Rate limit, port trunking, port mirroring, IGMP snooping, and packet filtering.
Fig. 2.1 shows the front view of the switch.
Fig. 2.1 The front view of switch
22 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
2.1 System Features
The following introduces the main features of the VDSL2 system which provides Layer 2
switching, Ethernet switching and related functions.
Virtual Local Area Network (VLAN)
Virtual local area network (VLAN) is made by dividing one network into several logical
networks. Packet cannot be transmitted and received between different VLANs. Therefore, it can prevent needless packets accumulating and strengthen security. The switch
recognizes 802.1Q tagged frame and supports maximum 4096 VLANs. Port based, Protocol based, MAC based and Subnet based VLANs are supported in the switch.
Quality of Service (QoS)
For the switch, QoS-based forwarding sorts traffic into a number of classes and marks the
packets accordingly. Thus, different quality of service is provided to each class, which the
packets belong to. The rich QoS capabilities enable network managers to protect missioncritical applications and support differentiated level of bandwidth for managing traffic congestion. The switch supports ingress and egress (shaping) rate limiting, and different
scheduling type such as SP (Strict Priority) and DWRR (Weighted Deficit Round Robin).
IP Multicast
Because broadcasting in a LAN is restricted if possible, multicasting could be used instead of broadcasting by forwarding multicast packets only to the member hosts who
joined multicast group. The switch provides IGMPv2 and IGMP snooping for host membership management.
SNMP
Simple network management protocol (SNMP) is to manage Network Elements using
TCP/IP protocol. The switch supports SNMP version 1, 2, 3 and Remote Monitoring
(RMON). Network operator can use MIB also to monitor and manage the switch.
Dynamic Host Configuration Protocol (DHCP)
The switch supports Dynamic Host Configuration Protocol (DHCP) server that automatically assigns IP address to clients accessed to network. That means it has IP address
pool, and operator can effectively utilize limited IP source by leasing temporary IP address. In layer 3 network, DHCP request packet can be sent to DHCP server via DHCP
relay and option 82.
Spanning Tree Protocol (STP)
To prevent loop and preserve backup route in Layer 2 network, the switch supports spanning tree protocol (STP) defined in IEEE 802.1D. Between STP enabled switches, a root
bridge is automatically selected and the network remains in tree topology. But the recovery time in STP is very slow (about 30 seconds), rapid spanning tree protocol (RSTP) is
also provided. IEEE 802.1w defines the recovery time as 2 seconds. If there is only one
SMC7824M/VSW23
CLI Management Guide
TigerAccess™ EE
VLAN in the network, traditional STP works. However in more than one VLAN network,
STP cannot work per VLAN. To avoid this problem, the switch supports multiple spanning
tree protocol (MSTP) IEEE 802.1s.
Trunking & Link Aggregation Control Protocol (LACP)
The switch aggregates several physical interfaces into one logical port (aggregate port).
Port trunk aggregates interfaces with the standard of same speed, same duplex mode,
and same VLAN ID.
The switch supports link aggregation control protocol (LACP), complying with IEEE
802.3ad, which aggregates multiple links of equipments to use more enlarged bandwidth.
System Management based on CLI
It is easy for users who administer system by using telnet or console port to configure the
functions for system operating through CLI. CLI is easy to configure the needed functions
after looking for available commands by help menu different with UNIX.
Broadcast Storm Control
Broadcast storm control is, when too much of broadcast packets are being transmitted to
network, a situation of network timeout because the packets occupy most of transmit capacity. switch supports broadcast and multicast storm control, which disuses flooding
packet, that exceed the limit during the time configured by user.
Outband Management Interface
The switch can connect to equipments at remote place by assigning IP address to MGMT
interface. Since MGMT interface is operated regardless of status of service port, it is still
possible to configure and manage equipment at remote place.
RADIUS and TACACS+
The switch supports client authentication protocol, that is RADIUS (Remote Authentication Dial-In User Service) and TACACS+ (Terminal Access Controller Access Control System Plus). Not only user IP and password registered in switch but also authentication
through RADIUS server and TACACS+ server are required to access. So security of system and network management is strengthened.
Secure Shell (SSH)
Network security is getting more important because the access network has been generalized among numerous users. Secure shell (SSH) is a network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key
cryptography to authenticate the remote computer and to allow the remote computer to
authenticate the user.
24 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
3 Command Line Interface (CLI)
The switch enables system administrators to manage the switch by providing the command line interface (CLI). This user-friendly CLI provides you with a more convenient
management environment.
To manage the system with the CLI, a management network environment is required. The
switch can connect to the management network either directly (outband) or through the
access network (inband). It can even connect using a combination of the two; for example,
a cascaded switch connects inband to the cascading switch, and then from the cascading
switch to the management network through the outband interface.
The switch also provides the RS232 console interface to simply access the system with a
provided RJ45-to-DB9 cable.
This chapter describes a basic instruction for using the command line interface (CLI)
which is used for managing the system.
•
Configuration Mode
•
Configuration Mode Overview
•
Useful Tips
3.1 Configuration Mode
You can configure and manage the switch with the CLI via a management network environment or the console interface.
The CLI provides the following command modes:
•
Privileged EXEC View Mode
•
Privileged EXEC Enable Mode
•
Global Configuration Mode
•
Bridge Configuration Mode
•
DHCP Pool Configuration Mode
•
DHCP Option 82 Configuration Mode
•
Interface Configuration Mode
•
Rule Configuration Mode
•
RMON Configuration Mode
SMC7824M/VSW25
CLI Management Guide
TigerAccess™ EE
3.1.1 Privileged EXEC View Mode
When you log in to the switch, the CLI will start with Privileged EXEC View mode which is
a read-only mode. In this mode, you can see a system configuration and information with
several commands.
Tab. 3.1 shows main command of Privileged EXEC View mode.
Command Description
enable Opens Privileged EXEC Enable mode.
exit Logs out the switch.
show Shows a system configuration and information.
Tab. 3. 1 Main Command of Privileged EXEC View Mode
3.1.2 Privileged EXEC Enable Mode
To configure the switch, you need to open Privileged EXEC Enable mode with the enable
command, then the system prompt will changes from SWITCH> to SWITCH#.
Command Mode Description
enable View Opens Privileged EXEC Enable mode.
You can set a password to Privileged EXEC Enable mode to enhance security. Once set-
ting a password, you should enter a configured password, when you open Privileged EX-EC Enable mode.
Tab. 3.2 shows main commands of Privileged EXEC Enable mode.
Command Description
clock Sets a system time and date.
configure terminal Opens Global Configuration mode.
reload Reboots the system.
telnet Connects to a remote host through telnet.
terminal length Configures the number of lines of the current terminal.
traceroute Traces a packet route.
where Displays users accessing the system via telnet or console.
Tab. 3. 2 Main Command of Privileged EXEC Enable Mode
26 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
3.1.3 Global Configuration Mode
In Global Configuration mode, you can configure general functions of the system. You can
also open another configuration mode from this mode.
To open Global Configuration mode, enter the configure terminal command, and then
the system prompt will be changed from SWITCH# to SWITCH(config)#.
Command Mode Description
configure terminal Enable Opens Global Configuration mode.
Tab. 3.3 shows main commands of Global Configuration mode.
Command Description
bridge Opens Bridge Configuration mode.
dns Sets a DNS server.
dot1x Configures 802.1X authentication.
exec-timeout Sets an auto log-out timer.
help Shows a description of the interactive help system.
hostname Sets a host name of the system.
interface Opens Interface Configuration mode to configure a specified interface.
mvr Configures MVR.
ntp Configures NTP.
passwd Sets a system password.
qos Configures QoS.
rmon-alarm Opens RMON Configuration mode to configure RMON alarm.
snmp Configures SNMP.
ssh Configures SSH.
stack Configures a system stacking.
syslog Configures a syslog.
threshold Sets a system threshold.
Tab. 3. 3 Main Command of Global Configuration Mode
3.1.4 Bridge Configuration Mode
In Bridge Configuration mode, you can configure various Layer 2 functions such as VLAN,
STP, LACP, EFM OAM, etc.
To open Bridge Configuration mode, enter the bridge command, then the system prompt
will be changed from SWITCH(config)# to SWITCH(bridge)#.
Command Mode Description
bridge Global Opens Bridge Configuration mode.
SMC7824M/VSW27
CLI Management Guide
TigerAccess™ EE
Tab. 3.4 shows main commands of Bridge Configuration mode.
Command Description
lacp Configures LACP.
mac Configures a MAC table.
mirror Configures a port mirroring.
oam Configures EFM OAM.
port Configures Ethernet port.
spanning-tree Configures Spanning Tree Protocol (STP).
trunk Configures a trunk port.
vlan Configures VLAN.
Tab. 3. 4 Main Command of Bridge Configuration Mode
3.1.5 DHCP Pool Configuration Mode
In DHCP Pool Configuration mode, you can configure general functions of DHCP per
each DHCP pool. The switch supports multiple DHCP environments with this pool based
DHCP configuration.
To open DHCP Pool Configuration mode, enter the ip dhcp pool command, then the system prompt will be changed from SWITCH(config)# to SWITCH(config-dhcp[POOL])#.
Command Mode Description
ip dhcp pool POOL Global
To open DHCP Pool Configuration mode, use the service dhcp command in the Global
!
Configuration mode first!
Tab. 3.5 shows main commands of DHCP Pool Configuration mode.
Command Description
default-router Configures the default gateway of the pool.
dns-server Configures a DNS server.
range Configures the range of IP addresses.
Tab. 3. 5 Main Command of DHCP Pool Configuration Mode
3.1.6 DHCP Option Configuration Mode
In DHCP Option Configuration mode, you can configure DHCP option. You can define
DHCP options that are carried in the DHCP communication between DHCP server and
client or relay agent. A specific DHCP option can be defined by its format type, length and
value.
Opens DHCP Pool Configuration mode to configure
DHCP.
28 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To open DHCP Option Configuration mode, use the command. Then the system prompt
will be changed from SWITCH(config)# to SWITCH(dhcp-opt[NAME])#.
Command Mode Description
ip dhcp option format NAME Global
Opens DHCP Option Configuration mode to configure
DHCP options.
Tab. 3.7 is the main commands of DHCP Option Configuration mode.
Command Description
attr Configures the attribute for option field in the DHCP packet.
Tab. 3. 6 Main Command of DHCP Option Configuration Mode
3.1.7 DHCP Option 82 Configuration Mode
In DHCP Option 82 Configuration mode, you can configure DHCP option 82 for DHCP relay agent. This feature enables network administrators to manage IP resources more efficiently.
To open DHCP Option 82 Configuration mode, enter the ip dhcp option82 command,
then the system prompt will be changed from SWITCH(config)# to SWITCH(configopt82)#.
Command Mode Description
ip dhcp option82 Global
Opens DHCP Option 82 Configuration mode to config-
ure DHCP option 82.
To open DHCP Option 82 Configuration mode, use the service dhcp command in the
!
Global Configuration mode first!
Tab. 3.7 is the main commands of DHCP Option 82 Configuration mode.
Command Description
policy Configures the policy for option 82 field in the DHCP packet.
system-remote-id Configures a system remote ID.
system-circuit-id Configures a system circuit ID.
trust Configures a option82 packet of policy
Tab. 3. 7 Main Command of DHCP Option 82 Configuration Mode
3.1.8 Interface Configuration Mode
In Interface Configuration mode, you can configure Ethernet interfaces. To open Interface
Configuration mode, enter the interface command, then the system prompt will be
changed from SWITCH(config)# to SWITCH(config-if)#.
Command Mode Description
interface INTERFACE Global Opens Interface Configuration mode.
SMC7824M/VSW29
CLI Management Guide
TigerAccess™ EE
Tab. 3.8 shows main commands of Interface Configuration mode.
Command Description
description Specifies a description.
ip address Assigns IP address.
shutdown Deactivates an interface.
mtu Sets MTU value.
Tab. 3. 8 Main Command of Interface Configuration Mode
3.1.9 Rule Configuration Mode
The switch modifies previous Rule Configuration mode to Flow, Policer and Policy Configuration modes. Rule configuration mode is expanded into three different modes accord-
ing to its roles for Rule mechanism. You can configure a rule for incoming or outgoing
packets. Using the function, you can handle packets classified by the rule.
To open Rule Configuration mode, enter the flow, policer and policy commands, then
the system prompt will be changed from SWITCH(config)# to SWITCH(configflow[NAME])#, SWITCH(config-policer[NAME])# and SWITCH(config-policy[NAME])# .
Command Mode Description
flow NAME create Opens Flow Configuration mode.
policer NAME create Opens Policer Configuration mode.
policy NAME create
Tab. 3.9 shows the commands of Rule Configuration mode.
Command Description
cos Classifies an IEEE 802.1p priority.
mac Classifies a MAC address.
action match Configures a rule action for classified packets.
rate-limit Comfigures a rate-limit of classified packets
priority Configures a rule priority of specified policy.
Tab. 3. 9 The Commands of Rule Configuration Mode
3.1.10 RMON Configuration Mode
In RMON Configuration mode, you can configure RMON alarm, RMON event and RMON
history. The switch provides three different configuration modes to configure each type of
RMON.
Global
Opens Policy Configuration mode.
Command Mode Description
rmon-alarm <1-65535>
rmon-event <1-65535>
rmon-history <1-65535>
Global
Opens RMON Configuration mode.
1-65535: index number
30 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
Tab. 3.10 shows main commands of RMON Configuration mode.
Command Description
active Activates RMON.
owner
Shows the subject which configures each RMON and uses relevant
information.
Tab. 3.10 Main Command of RMON Configuration Mode
3.2 Configuration Mode Overview
Fig. 3.1 shows the overview of the configuration mode for the switch.
Privileged EXEC View
SWITCH>
enable
Privileged EXEC Enable
SWITCH#
exit
Back to previous mode
end
Back to Privileged EXEC Enable mode
ip dhcp poolPOOL
(POOL: pool name)
DHCP Pool Configuration mode
SWITCH(config-dhcp[POOL])#
ip dhcp option82
Option 82 Configuration mode
SWITCH(config-opt82)#
rmon-alarm <1-65535>
rmon-event <1-65535>
rmon-history <1-65535>
configure terminal
Global Configuration mode
SWITCH(config)#
interface INTERFACE
INTERFACE: interface name
Interface Configuration mode
SWITCH(config-if)#
bridge
Bridge Configuration mode
SWITCH(bridge)#
flow [admin] NAME create (NAME: flow name)
policer NAME create (NAMEL policer name)
policy [admin] NAME create (NAME: policy name)
This section describes useful tips for operating the switch with a CLI.
Listing Available Command
•
•
Calling Command History
•
Using Abbreviation
•
Using Command of Privileged EXEC Enable Mode
•
Exit Current Command Mode
3.3.1 Listing Available Command
To list available commands, input question mark <?> in the current mode. When you input
the question mark <?>, you can see available commands used in this mode and variables
following after the commands.
The following is the available commands on Privileged EXEC Enable mode of the switch.
SWITCH# ?
Exec commands:
clear Reset functions
clock Manually set the system clock
configure Enter configuration mode
copy Copy from one file to another
debug Debugging functions
default-os Select default OS
disconnect Disconnect user connection
enable Turn on privileged mode command
erase Erase saved configuration
exit End current mode and down to previous mode
halt Halt process
help Description of the interactive help system
no Negate a command or set its defaults
ping Send echo messages
quote Execute external command
rcommand Management stacking node
release Release the acquired address of the interface
(Omitted)
SWITCH#
Question mark <?> will not be shown in the screen and you do not need to press
i
<ENTER> key to display the command list.
If you need to find out the list of available commands of the current mode in detail, use
the following command.
Command Mode Description
show list Shows available commands of the current mode.
show cli
All
Shows available commands of the current mode with
tree structure.
32 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
The following is an example of displaying the list of available commands of Privileged EXEC Enable mode.
SWITCH# show list
clear arp
clear arp IFNAME
clear cpe stat-error (PORTS|)
clear ip arp inspection statistics (vlan VLAN_NAME|)
clear ip dhcp authorized-arp invalid
clear ip dhcp leasedb A.B.C.D/M
clear ip dhcp leasedb all
clear ip dhcp leasedb pool POOL
clear ip dhcp relay statistics
clear ip dhcp statistics
clear ip igmp
clear ip igmp group *
clear ip igmp group A.B.C.D
clear ip igmp group A.B.C.D IFNAME
clear ip igmp interface IFNAME
clear ip igmp snooping stats port (PORTS|cpu|)
clear ip kernel route
clear ip mcfdb (*|vlan VLAN)
clear ip mcfdb vlan VLAN group A.B.C.D source A.B.C.D
clear ip route kernel
clear lacp statistic
clear lldp statistics (PORTS|)
clear lre error-stat-all (PORTS|)
-- more --
Press the <ENTER> key to skip to the next list.
i
In case that the switch installed command shell, you can find out commands starting with
a specific alphabet. Input the first letter and question mark without space. The following is
an example of finding out the commands starting “s” in Privileged EXEC Enable mode of
the switch.
SWITCH# s?
show Show running system information
ssh Configure secure shell
SWITCH# s
Also, it is possible to view variables you should input following after commands. After inputting the command you need, make one space and input a question mark. The following is an example of viewing variables after the write command. Please note that you
must input one space between the command and question mark.
SWITCH# write ?
memory Write to NV memory
terminal Write to terminal
SWITCH# write
SMC7824M/VSW33
CLI Management Guide
TigerAccess™ EE
The switch also provides the simple instruction of calling the help string with the help
command. You can see the instruction using the command regardless of the configuration
mode.
To display the instruction of calling the help string for using CLI, use the following command.
Command Mode Description
help All
Shows the instruction of calling the help string for using
CLI.
3.3.2 Calling Command History
In case of installed command shell, you do not have to enter the command you entered
before. When you need to reuse the commands you did, use this arrow key <↑>. When
you press the arrow key, the commands will be displayed in the latest order.
The following is an example of calling command history after using several commands.
After using these commands in order: show clock→configure terminal→interface1
→ exit, press the arrow key <↑> and then you will see the commands from latest one:
exit → interface 1→ configure terminal → show clock.
SWITCH(config)# exit
SWITCH# show clock
Mon, 5 Jan 1970 23:50:12 +0000
SWITCH# configure terminal
SWITCH(config)# interface1
SWITCH(config-if)# exit
SWITCH(config)# exit
SWITCH# (press the arrow key ↑)
SWITCH# exit (press the arrow key ↑)
SWITCH# interface1 (press the arrow key ↑)
SWITCH# configure terminal (press the arrow key ↑)
SWITCH# show clock (press the arrow key ↑)
The switch also provides the command that shows the commands used before up to 100
lines.
Command Mode Description
Enable
showhistory
Global
Bridge
Shows a command history.
34 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
3.3.3 Using Abbreviation
Several commands can be used in the abbreviated form. The following table shows some
examples of abbreviated commands.
Command Abbreviation
clock cl
exit ex
show sh
configure terminal con te
Tab. 3. 11 Command Abbreviation
3.3.4 Using Command of Privileged EXEC Enable Mode
You can execute the commands of Privileged EXEC Enable mode as show, ping, telnet,
traceroute, and so on regardless of which mode you are located on.
To execute the commands of Privileged EXEC Enable mode on different mode, use the
following command.
Command Mode Description
do COMMAND All
3.3.5 Exit Current Command Mode
To exit to the previous command mode, use the following command.
Command Mode Description
exit Exits to the previous command mode.
end
If you use the exit command in Privileged EXEC Enable mode or Privileged EXEC View
!
mode, you will be logged out!
All
Executes the commands of Privileged EXEC Enable
mode.
Exits to Privileged EXEC Enable mode.
SMC7824M/VSW35
CLI Management Guide
TigerAccess™ EE
4 System Connection and IP Address
4.1 System Connection
After installing the system, the switch is supposed to examine that each port is rightly
connected to network and management PC. You can connect to the system to configure
and manage the switch. This section provides instructions how to change password for
system connection and how to connect to the system through telnet as the following order.
•
Connecting to the Console Port
•
System Login
•
Password for Privileged EXEC Enable Mode
•
Changing Login Password
•
Login Password Recovery Process
•
Management for System Account
•
Limiting Number of Users
•
Auto Log-out
•
Telnet Access
•
System Rebooting
4.1.1 Connecting to the Console Port
To begin setup, you must connect the Console to the RJ45 Console port. To connect the
cable, perform the following steps:
Step 1 Attach the RJ45 connector on the cable to the RJ45 connector on the console port of the
switch.
Step2 Connect the other end of the cable to one of the serial ports on your workstation.
Step3 Open your terminal emulation software and configure the COM port settings to which you
have connected the cable. The settings should be set to match the default settings for the
switch, which are:
• 9600 bps
• 8 data bits
• 1 stop bit
• No parity
• No flow control
4.1.2 System Login
After installing the switch, finally make sure that each port is correctly connected to PC for
network and management. And then, turn on the power and boot the system as follows.
Step 1
When you turn on the switch, booting will be automatically started and login prompt will
be displayed.
SWITCH login:
36 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
Step 2
When you enter a login ID at the login prompt, the password prompt will be displayed,
and then enter the proper password to log in the system. By default setting, the login ID is
configured as admin with no password.
SWITCH login: admin
Password:
SWITCH>
Step 3
In Privileged EXEC View mode, you can check only the configuration for the switch. To
configure and manage the switch, you should begin Privileged EXEC Enable mode. The
following is an example of beginning Privileged EXEC Enable mode.
SWITCH> enable
SWITCH#
4.1.3 Password for Privileged EXEC Enable Mode
You can configure a password to enhance the security for Privileged EXEC Enable mode.
To configure a password for Privileged EXEC Enable mode, use the following command.
Command Mode Description
passwd enable PASSWORD
passwd enable 8 PASSWORD
Global
Configures a password to begin Privileged EXEC En-
able mode.
Configures an encrypted password.
password enable does not support encryption at default value. Therefore it shows the
!
string (or password) as it is when you use the show running-config command. In this
case, the user’s password is shown to everyone and has unsecured environment.
To encrypt the password which will be shown at running-config, you should use the ser-vice password-encryption command. And to represent the string (password) is encrypted, input 8 before the encrypted string.
When you use the password enable command with 8 and “the string”, you will make into
Privileged EXEC Enable mode with the encrypted string. Therefore, to log in the system,
you should do it with the encrypted string as password that you configured after 8. In
short, according to using the 8 option or not, the next string is encrypted or not.
The following is an example of configuring the password in Privileged EXEC Enable
mode as testpassword.
SWITCH# configure terminal
SWITCH(config)# passwd enabletestpassword
SWITCH(config)#
The following is an example of accessing after configuring a password.
SWITCH login: admin
Password:
SWITCH> enable
SMC7824M/VSW37
CLI Management Guide
TigerAccess™ EE
Password:
SWITCH#
To delete the configured password, use the following command.
Command Mode Description
no passwd enable Global Deletes the password.
The created password can be displayed with the show running-config command. To encrypt the password not to be displayed, use the following command.
Command Mode Description
service password-encryption Global Encrypts the system password.
To disable password encryption, use the following command.
Command Mode Description
no service password-encryptionGlobal Disables password encryption.
4.1.4 Changing Login Password
To configure a password for created account, use the following command.
Command Mode Description
passwd [NAME] Global Configures a password for created account.
The following is an example of changing the current password.
SWITCH(config)# passwd
Changing password for admin
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password:junior95
Re-enter new password:junior95
Password changed.
SWITCH(config)#
The password you are entering will not be shown in the screen, so please be careful not
!
to make a mistake.
38 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.1.5 Login Password Recovery Process
To upgrade the system software in the boot mode, perform the following step-by-step instruction:
Step 1
After the switch is manually restarted, “Start Address: 0x010000000” will be
shown up.
Step 2
Keep on pressing [Space Bar] key until “console=ttyS0,9600 root=/dev/ram rw”
is shown up on the screen.
Step 3
Enter “password” next to “console=ttyS0,9600 root=/dev/ram rw”.
Step 4
Check “password restore to default...” on the booting messages. It means that
the current password returns to the default setting.
Step 4
Check “password restore to default...” on the booting messages. It means that
the current password returns to the default setting. By default setting, the password is
configured as nsn-switch.
For the switch, the administrator can create a system account. And it is possible to set the
security level from 0 to 15 to enhance the system security.
To create a system account, use the following command.
Command Mode Description
user add NAME DESCRIPTION
Global
user add NAME level <0-15>
DESCRIPTION
Creates a system account.
NAME: user name
Creates a system account with a security level.
NAME: user name
i
help in Privileged EXEC View mode and cannot access to Privileged EXEC Enable mode.
The account with the highest level 15 has a read-write authority.
To delete the created account, use the following command.
The account of level 0 to level 14 without any configuring authority only can use exit and
Command Mode Description
user del NAMEGlobal Delete the created account.
To display a created account, use the following command.
Command Mode Description
show user
4.1.6.2 Security Level
For the switch, it is possible to configure the security level from 0 to 15 for a system account. The level 15, as the highest level, has a read-write authority. The administrator can
configure from level 0 to level 14. The administrator decides which level user uses which
commands in which level. As the basic right from level 0 to level 14, it is possible to use
exit and help command in Privileged EXEC View mode and it is not possible to access to
Privileged EXEC Enable mode.
Enable
Global
Bridge
Shows a created account.
40 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To define the security level and its authority, use the following command.
Command Mode Description
privilege view level <0-15>
{COMMAND | all}
privilege enable level <0-15>
{COMMAND | all}
privilege configure level <0-15>
{COMMAND | all}
privilege interface level <0-15>
{COMMAND | all}
privilege {flow | policer | policy}
level <0-15> {COMMAND | all}
privilege bridge level <0-15>
{COMMAND | all}
privilege rmon-alarm level
<0-15> {COMMAND | all}
privilege rmon-event level
<0-15> {COMMAND | all}
privilege rmon-history level
<0-15> {COMMAND | all}
privilege dhcp-pool level
<0-15> {COMMAND | all}
privilege dhcp-pool-class level
<0-15> {COMMAND | all}
privilege dhcp-option82 level
<0-15> {COMMAND | all}
privilege dhcp-class level
<0-15> {COMMAND | all}
Global
Uses the specific command of Privileged EXEC View
mode in the level.
Uses the specific command of Privileged EXEC Enable
mode in the level.
Uses the specific command of Global Configuration
mode in the level.
Uses the specific command of Interface Configuration
mode in the level.
Uses the specific command of Rule Configuration
mode in the level.
Uses the specific command of Bridge Configuration
mode in the level.
Uses the specific command of RMON Configuration
mode in the level.
Uses the specific command of DHCP Pool Configura-
tion mode in the level.
Uses the specific command of DHCP Pool Class Con-
figuration mode in the level.
Uses the specific command of DHCP Option 82 Con-
figuration mode in the level.
Uses the specific command of DHCP Class Configura-
tion mode in the level.
The commands that are used in low level can be also used in the higher level. For example, the command in level 0 can be used in from level 0 to level 14.
The commands should be input same as the displayed commands by show list. Therefore, it is not possible to input the commands in the bracket separately.
SWITCH# show list
clear arp
clear arp IFNAME
clear cpe stat-error (PORTS|)
clear ip arp inspection statistics (vlan VLAN_NAME|)
clear ip dhcp authorized-arp invalid
clear ip dhcp leasedb A.B.C.D/M
clear ip dhcp leasedb all
(Omitted)
SMC7824M/VSW41
CLI Management Guide
TigerAccess™ EE
The commands starting with the same character are applied by inputting only the starting
commands. For example, if you input show, all the commands starting with show are
applied. To delete a configured security level, use the following command.
Command Mode Description
no privilege
no privilege view level <0-15> {COMMAND | all}
no privilege enable level <0-15> {COMMAND |
all}
no privilege configure level <0-15> {COM-
MAND | all}
no privilege interface level <0-15> {COMMAND
| all}
no privilege {flow | policer | policy} level <0-
15> {COMMAND | all}
no privilege bridge level <0-15> {COMMAND |
all}
no privilege rmon-alarm level <0-15> {COM-
MAND | all}
no privilege rmon-event level <0-15> {COM-
MAND | all}
no privilege rmon-history level <0-15> {COM-
MAND | all}
no privilege dhcp-pool level <0-15> {COM-
MAND | all}
no privilege dhcp-pool-class level <0-15>
{COMMAND | all}
no privilege dhcp-option82 level <0-15>
{COMMAND | all}
no privilege dhcp-class level <0-15> {COM-
MAND | all}
Global
Deletes all configured security lev-
els.
Delete a configured security level on
each mode.
To display a configured security level, use the following command.
Command Mode Description
show privilege Shows a configured security level.
show privilege now
Enable
Global
Bridge
Shows a security level of current mode.
The following is an example of creating the system account test0 having a security level
10 and test1 having a security level 1 with no password.
SWITCH(config)# user add test0level0level0user
Changing password for test0
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
42 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
Enter new password:(Enter)
Bad password: too short.
Warning: weak password (continuing).
Re-enter new password: (Enter)
Password changed.
SWITCH(config)# user add test1 level 1 level1user
Changing password for test1
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
In the above configuration, as level 0, it is possible to use only show command in Privileged EXEC Enable mode; however as level 1, it is possible to use not only the com-
mands in level 1 but also time configuration commands in Privileged EXEC Enable mode
and accessing commands to Global Configuration mode.
4.1.7 Limiting Number of Users
For the switch, you can limit the number of users accessing the switch through both console interface and telnet. In case of using the system authentication with RADIUS or TACACS+, a configured number includes the number of users accessing the switch via the
authentication server.
SMC7824M/VSW43
CLI Management Guide
TigerAccess™ EE
To set the number of users accessing the switch, use the following command.
Command Mode Description
login connect <1-8>
no login connect
Global
Sets the number of users accessing the switch.
Default: 8
Deletes a configured value.
4.1.8 Auto Log-out
For security reasons of the switch, if no command is entered within the configured inactivity time, the user is automatically logged out of the system. Administrator can configure
the inactivity timer.
To enable auto log-out function, use the following command.
Command Mode Description
Enables auto log-out.
exec-timeout <1-35791> [<0-59>]
exec-timeout 0
Global
1-35791: time unit in minutes (by default 10 minutes)
0-59: time unit in seconds
Disables auto log-out.
To display a configuration of auto-logout function, use the following command.
Command Mode Description
show exec-timeout
The following is an example of configuring auto log-out function as 60 seconds and viewing the configuration.
SWITCH(config)# exec-timeout60
SWITCH(config)# show exec-timeout
Log-out time : 60 seconds
SWITCH(config)#
4.1.9 Telnet Access
To connect to a remote host via telnet, use the following command.
Command Mode Description
telnet DESTINATION[TCP-PORT]Enable
Enable
Global
Bridge
Shows a configuration of auto-logout function.
Connects to a remote host.
DESTINATION: IP address or host name
In case of telnet connection, you need to wait for the [OK] message, when you save a
!
system configuration. Otherwise, all changes will be lost when the telnet session is disconnected.
44 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
SWITCH# write memory
[OK]
SWITCH#
The system administrator can disconnect users connected from remote place. To disconnect a user connected through telnet, use the following command.
Command Mode Description
disconnect TTY-NUMBEREnable Disconnects a user connected through telnet.
The following is an example of disconnecting a user connected from a remote place.
SWITCH# where
admin at ttys0 from console for 4 days 22 hours 15 minutes 24.88 seconds
admin at ttyp0 from 10.0.1.4:1670 for 4 days 17 hours 53 minutes 28.76 seconds
admin at ttyp1 from 147.54.140.133:49538 for 6 minutes 34.12 seconds
SWITCH# disconnectttyp0
SWITCH# where
admin at ttys0 from console for 4 days 22 hours 15 minutes 34.88 seconds
admin at ttyp1 from 147.54.140.133:49538 for 6 minutes 44.12 seconds
SWITCH#
4.1.10 System Rebooting
4.1.10.1 Manual System Rebooting
When installing or maintaining the system, some tasks require rebooting the system by
various reasons. Then you can reboot the system with a selected system OS.
To restart the system manually, use the following command.
Command Mode Description
reload [os1 | os2] Enable Restarts the system.
If you reboot the system without saving new configuration, new configuration will be deleted. So, you have to save the configuration before rebooting. Not to make that mistake,
the switch reconfirms that by displying the following message to ask if user really wants to
reboot and save configuration.
If you want to save the system configuration, press <Y> key at first question, if you want
to continue to reboot the system, press <Y> key at second question.
The following is an example of restarting the system with the reload command.
SWITCH# reload
Do you want to save the system configuration? [y/n]
Do you want to reload the system? [y/n]
SMC7824M/VSW45
CLI Management Guide
TigerAccess™ EE
4.1.10.2 Auto System Rebooting
The switch reboots the system according to user’s configuration. There are two basis for
system rebooting. These are CPU and memory. CPU is rebooted in case CPU Load or Interrupt Load continues for the configured time. Memory is automatically rebooted in case
memory low occurs as the configured times.
To enable the auto system rebooting, use the following command.
Command Mode Description
Configures the system to restart automatically in case
auto-reset cpu <50-100> <1-100>
TIME
Bridge
auto-reset memory <1-120> <1-
10>
no auto-reset {cpu | memory}
an average of CPU or interrupt load exceeds the con-
figured value during the user-defined time.
50-100: average of CPU load
1-100: average of interrupt load
Configures the system to restart automatically in case
memory low occurs as the configured value.
1-120: time of memory low
1-10: count of memory low
Disables auto system rebooting.
To display a current configured auto system rebooting, use the following command.
Command Mode Description
show auto-reset cpu
show auto-reset memory
Enable
Global
Bridge
Shows a current configured auto system rebooting by
CPU.
Shows a current configured auto system rebooting by
system memory.
46 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.2 System Authentication
For the enhanced system security, the switch provides two authentication methods to access the switch such as Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+).
4.2.1 Authentication Method
To set the system authentication method, use the following command.
Command Mode Description
Sets a system authentication method.
local: console access
login {local | remote} {radius |
tacacs | host | all} {enable | dis-
able}
Global
no login {local | remote} {radius |
tacacs | host | all}
no login
remote: telnet/SSH access
radius: RADIUS authentication
tacacs: TACACS+ authentication
host: nominal system authentication (default)
all: all types of the authentication
Deletes a configured system authentication method.
4.2.2 Authentication Interface
If more than 2 interfaces exist in the switch, you can set one interface to access RADIUS
or TACACS server. To set an authentication interface, use the following command.
Command Mode Description
login {radius | tacacs} interface
INTERFACE [A.B.C.D]
no login {radius | tacacs}
interface
Global
4.2.3 Primary Authentication Method
You can set the order of the authentication method by giving the priority to each authentication method. To set the primary authentication method, use the following command
Command Mode Description
login {local | remote} {radius |
tacacs | host} primary
Global
Sets an authentication interface.
radius: RADIUS authentication
tacacs: TACACS+ authentication
INTERFACE: interface name
A.B.C.D: source IP address (optional)
Deletes a specified authentication interface.
Sets a system authentication method.
local: console access
remote: telnet/SSH access
radius: RADIUS authentication
tacacs: TACACS+ authentication
host: nominal system authentication (default)
SMC7824M/VSW47
CLI Management Guide
TigerAccess™ EE
4.2.4 RADIUS Server
4.2.4.1 RADIUS Server for System Authentication
To add/delete a RADIUS server for system authentication, use the following command.
Command Mode Description
Adds a RADIUS server with its information.
loginradiusserver A.B.C.D
KEY [auth_port PORT acct_port
PORT]
no login radius server [A.B.C.D]
Global
A.B.C.D: IP address
KEY: authentication key value
auth_port: authentication port (optional)
acct_port: accounting port (optional)
Deletes an added RADIUS server.
i
You can add up to 5 RADIUS servers.
4.2.4.2 RADIUS Server Priority
To specify the priority of a registered RADIUS server, use the following command.
Command Mode Description
login radius server move
A.B.C.D <1-5>
4.2.4.3 Timeout of Authentication Request
After an authentication request, the switch waits for a response from a RADIUS server for
specified time. To specify a timeout value, use the following command.
Command Mode Description
login radius timeout <1-100>
no login radius timeout
Global
Global
Specifies a priority of RADIUS server.
A.B.C.D: IP address
1-5: priority of RADIUS server
Specifies a timeout value.
1-100: timeout value for a response (default: 5)
Deletes a specified timeout value.
4.2.4.4 Frequency of Retransmit
In case of no response from a RADIUS server, the switch is supposed to retransmit an
authentication request. To set the frequency of retransmitting an authentication request,
use the following command.
Command Mode Description
login radius retransmit <1-10>
no login radius retransmit
Global
48 SMC7824M/VSW
Sets the frequency of retransmit.
1-10: frequency count (default: 3)
Deletes a specified frequency count.
Management Guide CLI
TigerAccess™ EE
4.2.5 TACACS+ Server
4.2.5.1 TACACS+ Server for System Authentication
To add/delete the TACACS+ server for system authentication, use the following command.
Command Mode Description
Adds a TACACS+ server with its information.
login tacacs server A.B.C.DKEY
no login tacacs server [A.B.C.D]
Global
A.B.C.D: IP address
KEY: authentication key value
Deletes an added TACACS+ server.
i
You can add up to 5 TACACS+ servers.
4.2.5.2 TACACS+ Server Priority
To specify the priority of a registered TACACS+ server, use the following command.
Command Mode Description
login tacacs server move
A.B.C.D <1-5>
4.2.5.3 Timeout of Authentication Request
After the authentication request, the switch waits for the response from the TACACS+
server for specified time. To specify a timeout value, use the following command.
Command Mode Description
login tacacs timeout <1-100>
no login tacacs timeout
Global
Global
Specifies the priority of TACACS+ server.
A.B.C.D: IP address
1-5: priority of TACACS server
Specifies a timeout value.
1-100: timeout value for the response (default: 5)
Deletes a specified timeout value.
4.2.5.4 Additional TACACS+ Configuration
The switch provides several additional options to configure the system authentication via
TACACS+ server.
TCP Port for the Authentication
To specify TCP port for the system authentication, use the following command.
Command Mode Description
login tacacs socket-port
<1-65535>
no logintacacssocket-port
Global
SMC7824M/VSW49
Specifies TCP port for the authentication.
1-65535: TCP port
Deleted the configured TCP port for the authentication
CLI Management Guide
TigerAccess™ EE
Authentication Type
To select the authentication type for TACACS+, use the following command.
Command Mode Description
Selects an authentication type for TACACS+.
login tacacs auth-type {ascii |
pap | chap}
no login tacacs auth-type
Global
ascii: plain text
pap: password authentication protocol
chap: challenge handshake authentication protocol
Deletes a specified authentication type.
Priority Level
According to a defined priority level, the user has different authority to access the system.
This priority should be defined in the TACACS+ server in the same way. To define the priority level of user, use the following command.
Command Mode Description
login tacacs priority-level {min |
user | max | root}
no login tacacs priority-level
Global
Defines the priority level of user, see the below infor-
mation for the order of priority.
Deletes a defined priority level.
i
The order of priority is root = max > user > min.
4.2.6 Accounting Mode
The switch provides the accounting function of AAA (Authentication, Authorization, and
Accounting). Accounting is the process of measuring the resources a user has consumed.
Typically, accounting measures the amount of system time a user has used or the amount
of data a user has sent and received.
To set an accounting mode, use the following command.
Command Mode Description
Sets an accounting mode.
login accounting-mode {none |
start | stop | both}
no login accounting-mode
Global
4.2.7 Displaying System Authentication
To display a configured system authentication, use the following command.
start: measures start point only.
stop: measures stop point only.
both: measures start and stop point both.
Deletes a configured accounting mode.
Command Mode Description
Enable
showlogin
Global
Bridge
Shows a configured system authentication.
50 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.3 Configuring Interface
The Layer 2 switches only see the MAC address in an incoming packet to determine
where the packet needs to come from/to and which ports should receive the packet. The
Layer 2 switches do not need IP addresses to transmit packets. However, if you want to
access to the switch from a remote place with TCP/IP through SNMP or telnet, it requires
an IP address.
You can enable the interface to communicate with another network device on the network
by assigning an IP address as follows:
•
Enabling Interface
•
Assigning IP Address to Network Interface
•
Static Route and Default Gateway
•
Interface Description
•
Displaying Interface
4.3.1 Enabling Interface
To assign an IP address to an interface, you need to enable the interface first. If the interface is not enabled, you cannot access it from a remote place, even though an IP address
has been assigned.
To configure an interface, you need to open Interface Configuration mode first. To open
Interface Configuration mode, use the following command.
Command Mode Description
interface INTERFACE
Global
Interface
Opens Interface Configuration mode to configure a
specified interface.
To enable/disable an interface, use the following command.
Command Mode Description
no shutdown Enables an interface.
shutdown
Interface
Disables an interface.
To enable/disable an interface in Global Configaration mode, use the following command.
Command Mode Description
interface noshutdown INTER-
FAC E
interface shutdown INTERFACE
Global
Enables an interface.
Disables an interface.
The following is an example of enabling the interface 1.
SWITCH# configure terminal
SWITCH(config)# interface1
SWITCH(config-if)# no shutdown
SWITCH(config-if)#
SMC7824M/VSW51
CLI Management Guide
TigerAccess™ EE
i
To display if an interface is enabled, use the show running-config command.
4.3.2 Assigning IP Address to Network Interface
After enabling an interface, assign an IP address. To assign an IP address to a network
interface, use the following command.
Command Mode Description
ip address A.B.C.D/MAssigns an IP address to an interface.
ip address A.B.C.D/M secondaryAssigns a secondary IP address to an interface.
ip address dhcp Assigns an IP address from a DHCP server.
no ip address A.B.C.D/MClears an IP address assigned to an interface.
no ip address A.B.C.D/M secon-
dary
no ip address dhcp
The ip address dhcp command is for configuring an interface as a DHCP client. For the
i
detail of configuring a DHCP client, see Section
Interface
Clears a secondary IP address assigned to an inter-
face.
Stops assigning an IP address from a DHCP server.
8.6.9.
To display an assigned IP address, use the following command.
Command Mode Description
show ip Interface Shows an IP address assigned to an interface.
4.3.3 Static Route and Default Gateway
The static route is a predefined route to a specific network and/or device such as a host.
Unlike a dynamic routing protocol, static routes are not automatically updated and must
be manually reconfigured if the network topology changes. Static route includes destination address, neighbor address, and etc. To configure a static route, use the following
command.
To configure a static route, use the following command.
Command Mode Description
ip route A.B.C.D SUBNET-MASK
{GATEWAY | null} [<1-255>]
Global
ip route A.B.C.D/M {GATEWAY |
null} [<1-255> | src A.B.C.D]
Configures a static route.
A.B.C.D: destination IP prefix
A.B.C.D/M: destination IP prefix with mask
GATEWAY: gateway address
1-255: distance value
src: binding source IP address
52 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To delete a configured static route, use the following command.
Command Mode Description
no ip route A.B.C.D SUBNET-MASK {GATEWAY
| null} [<1-255>]
no ip route A.B.C.D/M {GATEWAY | null} [<1-
255>]
Global Deletes a configured static route.
To configure a default gateway, use the following command.
Command Mode Description
ip route default {GATEWAY |
null} [<1-255>]
Global Configures a default gateway.
To delete a configure default gateway, use the following command.
Command Mode Description
no ip route default {GATEWAY |
null} [<1-255>]
Global Deletes a default gateway.
To display a configured static route, use the following command.
Command Mode Description
show ip route [ A.B.C.D |
A.B.C.D/M ]
show ip route database
4.3.4 Interface Description
To specify a description on an interface, use the following command.
Command Mode Description
description DESCRIPTIONSpecifies a description on an interface.
no description
The following is the example of specifying a description on the interface 1.
SWITCH(config)# interface1
SWITCH(config-if)# descriptionsample_description
SWITCH(config-if)# show interface1
Interface default
Hardware is Ethernet, address is 00d0.cb00.0d83
Description: sample_description
index 43 metric 1 mtu 1500 <UP,BROADCAST,RUNNING,MULTICAST>
VRF Binding: Not bound
Bandwidth 100m
Enable
Global
Bridge
Interface
Shows configured routing information.
Shows configured routing information with IP routing
To display an interface status and configuration, use the following command.
Command Mode Description
Enable
show interface [INTERFACE]
show ip interface {INTERFACE |
brief}
Global
Bridge
Interface
Enable
Global
Bridge
Shows an interface status and configuration.
INTERFACE: interface name
Shows brief information of interface.
INTERFACE: interface name
The following is the sample output of the show ip interface brief command.
SWITCH(config)# show ip interface brief
Interface IP-Address Status Protocol
lo unassigned up up
mgmt 10.27.41.91 up up
default unassigned up up
SWITCH(config)#
54 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.4 Secure Shell (SSH)
Network security is getting more important because the access network has been generalized among numerous users. However, typical FTP and telnet service have big weakness for their security. Secure shell (SSH) is a network protocol that allows establishing a
secure channel between a local and a remote computer. It uses public-key cryptography
to authenticate the remote computer and to allow the remote computer to authenticate the
user.
4.4.1 SSH Server
The switch can be operated as SSH server. You can configure the switch as SSH server
with the following procedure.
•
Enabling SSH Server
•
Displaying On-line SSH Client
•
Disconnecting SSH Client
•
Assigning Specific Authentication Key
•
Displaying Connection History of SSH Client
4.4.1.1 Enabling SSH Server
To enable/disable SSH server, use the following command.
Command Mode Description
ssh server enable Enables SSH server.
ssh server disable
Global
4.4.1.2 Displaying On-line SSH Client
To display SSH clients connected to SSH server, use the following command.
Command Mode Description
Enable
show ssh
Global
Bridge
4.4.1.3 Disconnecting SSH Client
To disconnect an SSH client connected to SSH server, use the following command.
Disables SSH server.
Shows SSH clients connected to SSH server.
Command Mode Description
ssh disconnect PID Global
Disconnects SSH clients connected to SSH server.
PID: SSH client number
SMC7824M/VSW55
CLI Management Guide
TigerAccess™ EE
4.4.1.4 Assigning Specific Authentication Key
After enabling SSH server, each client will upload its own generated authentication key.
The SSH server can assign the specific key among the uploaded keys from several clients.
To verify an authentication key, use the following command.
Command Mode Description
ssh key verify FILENAME Global Verifies a generated authentication key.
i
from SSH server to login.
4.4.1.5 Displaying Connection History of SSH Client
If the SSH server verify the key for specific client, other clients must download the key file
To display the connection history of SSH client, use the following command.
Command Mode Description
show ssh history
Enable
Global
Bridge
Shows the connection history of SSH clients who are
connected to SSH server up to now.
4.4.2 SSH Client
The switch can be used as SSH client with the following procedure.
Login to SSH Server
•
•
File Copy
•
Authentication Key
4.4.2.1 Login to SSH Server
To login to SSH server after configuring the switch as SSH client, use the following command.
Command Mode Description
ssh login DESTINATION [PUB-
LIC-KEY]
Enable
Logins to SSH server.
DESTINATION: IP address of SSH server
PUBLIC-KEY: public key
4.4.2.2 File Copy
To copy a system configuration file from/to SSH server, use the following command.
Command Mode Description
copy {scp | sftp} config
{download | upload} FILENAME
Enable
56 SMC7824M/VSW
Downloads and uploads a file to through SSH server.
FILE: destination file name
Management Guide CLI
TigerAccess™ EE
4.4.2.3 Authentication Key
SSH client can access to server through authentication key after configuring authentication key and informing it to server. It is safer to use authentication key than inputting
password every time for login, and it is also possible to connect to several SSH servers
with using one authentication key.
To configure an authentication key in the switch, use the following command.
Command Mode Description
ssh keygen {rsa1 | rsa | dsa} Global
copy {scp | sftp} key upload
FILENAME
Enable
To configure authentication key and connect to SSH server with the authentication key,
perform the following procedure.
Configures an authentication key.
rsa1: SSH ver. 1 authentication
rsa: SSH ver. 2 authentication
dsa: SSH ver. 2 authentication
FILENAME: key file name
Step 1
Configure the authentication key in the switch.
SWITCH_A(config)# ssh keygen dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/etc/.ssh/id_dsa):
Enter passphrase (empty for no passphrase):networks
Enter same passphrase again:networks
Your identification has been saved in /etc/.ssh/id_dsa.
Your public key has been saved in /etc/.ssh/id_dsa.pub.
Step 2
Copy the generated authentication key to SSH server.
Step 3
Connect to SSH server with the authentication key.
SWITCH_A(config)# ssh login172.16.209.10
Enter passphrase for key '/etc/.ssh/id_dsa': networks
SWITCH_B#
SMC7824M/VSW57
CLI Management Guide
TigerAccess™ EE
4.5 802.1x Authentication
To enhance security and portability of network management, there are two ways of authentication based on MAC address and port-based authentication which restrict clients
attempting to access to port.
Port-based authentication (802.1x) is used to authenticate the port self to access without
users’ count to access the network.
802.1x authentication adopts EAP (Extensible Authentication Protocol) structure. In EAP
system, there are EAP-MD5 (Message Digest 5), EAP-TLS (Transport Level Security),
EAP-SRP (Secure Remote Password), EAP-TTLS (Tunneled TLS) and the switch supports EAP-MD5 and EAP-TLS. Accessing with user’s ID and password, EAP-MD5 is 1way Authentication based on the password. EAP-TLS accesses through the mutual authentication system of server authentication and personal authentication and it is possible
to guarantee high security because of mutual authentication system.
At a request of user Authentication, from user’s PC EAPOL-Start type of packets are
transmitted to authenticator and authenticator again requests identification. After getting
respond about identification, request to approve access to RADIUS server and be authenticated by checking access through user’s information.
The following figure explains the process of 802.1x authentication.
EAPOL
(EAP over LAN)
[Suppliant][Authenticator][Authentication Server]
EAPOL-Start
EAP-Request / Identity
EAP-Response / IdentityRADIUS-Access-Request
EAP-ResponseRADIUS-Access-Request
EAP-SuccessRADIUS-Access-Accept
EAP over RADIUS
RADIUS
Server
RADIUS-Access-ChallengeEAP-Request
Fig. 4.1 Process of 802.1x Authentication
58 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.5.1 802.1x Authentication
4.5.1.1 Enabling 802.1x
To configure 802.1x, the user should enable 802.1x daemon first. To enable 802.1x daemon, use the following command.
Command Mode Description
dot1x system-auth-control Enables 802.1x daemon.
no dot1x system-auth-control
4.5.1.2 RADIUS Server
As RADIUS server is registered in authenticator, authenticator also can be registered in
RADIUS server.
Here, authenticator and RADIUS server need extra data authenticating each other besides they register each other’s IP address. The data is key and should be the same
value for each other. For the key value, every kinds of character can be used except the
space or special character.
Global
Disables 802.1x daemon.
RADIUS
Server
[Suppliant][Authenticator][Authentication Server]
Authentication request
in order
Designate as default
RADIUS server
Response
RADIUS Servers
A : 10.1.1.1
B : 20.1.1.1
C : 30.1.1.1
:
J : 100.1.1.1
Fig. 4.2 Multiple Authentication Servers
If you register in several servers, the authentication server starts form RADIUS server
registered as first one, then requests the second RADIUS server in case there’s no response. According to the order of registering the authentication request, the authentication request is tried and the server which responds to it becomes the default server from
the point of response time.
SMC7824M/VSW59
CLI Management Guide
TigerAccess™ EE
After default server is designated, all requests start from the RADIUS server. If there’s no
response from default server again, the authentication request is tried for RADIUS server
designated as next one.
To configure IP address of RADIUS server and key value, use the following command.
Command Mode Description
dot1x radius-server host
{A.B.C.D | NAME} auth-port <0-
65535> keyKEY
dot1x radius-server host
{A.B.C.D | NAME} keyKEY
no dot1x radius-server host
{A.B.C.D | NAME}
Global
Registers RADIUS server with key value and UDP port
of radius server.
0-65535: UDP port (default: 1812)
Configures IP address of RADIUS server and key
value.
Deletes a registered RADIUS server.
i
The key option is authentication information between the authenticator and RADIUS
server. The authenticator and RADIUS server must have a same key value, and you can
use alphabetic characters and numbers for the key value. The space or special character
is not allowed.
To set priority to a registered RADIUS server, use the following command..
You can designate up to 5 RADIUS servers as authentication server.
Command Mode Description
dot1x radius-server move
{A.B.C.D | NAME} priority PRIOR-
ITY
4.5.1.3 Authentication Mode
You can set the authentication mode from the port-based to the MAC-based. To set the
authentication mode, use the following command.
Command Mode Description
dot1x auth-mode mac-base
PORTS
no dot1x auth-mode mac-base
PORTS
Global Sets priority to a registered RADIUS server.
Sets the authentication mode to the MAC-based.
Global
Restores the authentication mode to the port-based.
Before setting the authentication mode to the MAC-based, you need to set a MAC filtering
!
policy to deny for all the Ethernet ports. To configure a MAC filtering policy, see Section
7.11.1.
60 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.5.1.4 Authentication Port
After configuring 802.1x authentication mode, you should select the authentication port.
The switch can permit the users requesting the access regardless of the authentication
from RADIUS server. For example, even though a client is authenticated from the server,
it is possible to configure not to be authenticated from the server.
To manage the approval for the designated port, use the following command.
Command Mode Description
dot1x port-control {auto | force-
authorized | force-unauthorized}
PORTS
no dot1x port-controlPORTS
Global
Configures a state of the authentication port.
auto: authorization up to RADIUS server (default)
force-authorized: force authorization
force-unauthorized: force unauthorization
Deletes a configured authentication port state.
4.5.1.6 Interval for Retransmitting Request/Identity Packet
In the switch, it is possible to specify how long the device waits for a client to send back a
response/identity packet after the device has sent a request/identity packet. If the client
does not send back a response/identity packet during this time, the device retransmits the
request/identity packet.
To configure the number of seconds that the switch waits for a response to a request/identity packet, use the following command.
Command Mode Description
dot1x timeout tx-period <1-
65535> PORTS
no dot1x timeout tx-period
PORTS
Global
Sets reattempt interval for requesting request/identity
packet.
1-65535: retransmit interval (default: 30)
Disables the interval for requesting identity.
4.5.1.7 Number of Requests to RADIUS Server
After 802.1x authentication configured as explained above and the user tries to connect
with the port, the process of authentication is progressed among user’s PC and the
equipment as authenticator and RADIUS server. It is possible to configure how many
times the device which will be authenticator requests for authentication to RADIUS server.
SMC7824M/VSW61
CLI Management Guide
TigerAccess™ EE
To configure times of authentication request in the switch, please use the command in
Global mode.
Command Mode Description
dot1x radius-server retries <1-
10>
Global
Configure times of authentication request to RADIUS
server.
1-10: retry number (default: 3)
4.5.1.8 Interval of Request to RADIUS Server
For the switch, it is possible to set the time for the retransmission of packets to check
RADIUS server. If there’s a response from other packets, the switch waits for a response
from RADIUS server during the configured time before resending the request.
Command Mode Description
dot1x radius-server timeout <1-
120>
Global
Configures the interval of request to RADIUS server.
1-120: interval (default: 1)
You should consider the distance from the server for configuring the interval of requesting
the authentication to RADIUS server. If you configure the interval too short, the authentication couldn’t be realized. If it happens, you’d better to reconfigure the interval longer.
4.5.2 802.1x Re-Authentication
In the switch, it is possible to update the authentication status on the port periodically. To
enable re-authentication on the port, you should perform the below procedure.
Step 1
Enable 802.1x re-authentication.
Step 2
Configure the interval of re-authentication.
Step 3
Configure the interval of requesting re-authentication in case of re-authentication fails.
Step 4
Execute 802.1x re-authenticating regardless of the interval.
4.5.2.1 Enabling 802.1x Re-Authentication
To enable 802.1x re-authentication using the following command.
RAIDIUS server contains the database about the user who has access right. The database is real-time upgraded so it is possible for user to lose the access right by updated
database even though he is once authenticated. In this case, even though the user is accessible to network, he should be authenticated once again so that the changed database
is applied to. Besides, because of various reasons for managing RADIUS server and
802.1x authentication port, the user is supposed to be re-authenticated every regular time.
The administrator of the switch can configure a term of re-authentication.
To configure a term of re-authentication, use the following command.
Command Mode Description
dot1x timeout reauth-period <1-
4294967295> PORTS
no dot1x timeout reauth-period
PORTS
Global
Sets the period between re-authentication attempts.
Deletes the period between re-authentication attempts.
4.5.2.3 Interval of Requesting Re-Authentication
When the authenticator sends request/identity packet for re-authentication and no response is received from the suppliant for the number of seconds, the authenticator retransmits the request to the suppliant. In the switch, you can set the number of seconds
that the authenticator should wait for a response to request/identity packet from the suppliant before retransmitting the request.
To set reattempt interval for requesting request/identity packet, use the following command.
Command Mode Description
dot1x timeout quiet-period <1-
65535> PORTS
no dot1x timeout quiet-period
PORTS
4.5.2.4 802.1x Re-Authentication
In Section 4.5.2.2, it is described even though the user is accessible to network, he
should be authenticated so that the changed database is applied to. Besides, because of
various reasons managing RADIUS server and 802.1x authentication port, the user is
supposed to be re-authenticated every regular time.
Global
Sets reattempt interval for requesting request/identity
packet.
1-65535: reattempt interval (default: 30)
Disables the interval for requesting identity.
However, there are some cases of implementing re-authentication immediately. In the
switch, it is possible to implement re-authentication immediately regardless of configured
time interval.
Command Mode Description
dot1x reauthenticate PORTS Global
Performs re-authentication regardless of the configured
time interval.
SMC7824M/VSW63
CLI Management Guide
TigerAccess™ EE
4.5.3 Initializing Authentication Status
The user can initialize the entire configuration on the port. Once the port is initialized, the
supplicants accessing to the port should be re-authenticated.
Command Mode Description
dot1x initialize PORTSGlobal Initializes the authentication status on the port.
4.5.4 Restoring Default Value
To restore the default value of the 802.1x configuration, use the following command.
Command Mode Description
dot1x default PORTSGlobal Restores the default value of the 802.1x configuration.
4.5.5 Displaying 802.1x Configuration
To display 802.1x configuration, use the following command.
Command Mode Description
show dot1x Shows 802.1x configuration on the system.
show dot1x PORTS
Enable
Global
Bridge
Shows 802.1x configuration on the port.
4.5.6 802.1x User Authentication Statistics
It is possible for user to make reset state by showing and deleting the statistics of 802.1x
user authentication.
To display the statistics about the process of 802.1x user authentication, use the following
command.
Command Mode Description
Enable
show dot1x statisticsPORTS
Global
Bridge
To make reset state by deleting the statistics of 802.1x user authentication, use the following command.
Command Mode Description
dot1x clear statistics PORTS Global
Shows the statistics of 802.1x user authentication on
the port.
Makes reset state by deleting the statistics of 802.1x
on the port.
64 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
4.5.7 Sample Configuration
The following is the example of configuring the port 25 with the port-based authentication
specifying the information of RADIUS server.
The following is the example of configuring the port 25 with the MAC-based authentication.
SWTICH(config)# dot1x auth-mode mac-base25
SWTICH(config)# show dot1x
802.1x authentication is enabled.
RADIUS Server TimeOut: 1(S)
RADIUS Server Retries: 3
RADIUS Server : 10.1.1.1 (Auth key : test)
----------------------------------------------
| 1 2 3
802.1x |123456789012345678901234567890123
----------------------------------------------
PortEnable |.................................
PortAuthed |.................................
MacEnable |........................m........
MacAuthed |........................u........
----------------------------------------------
p = port-based, m = mac-based, a = authenticated, u = unauthenticated
SWITCH(config)#
66 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
5 Port Configuration
The switch provides maximum 24 VDSL ports including integrated splitters. In this chapter,
you can find the instructions for the basic port configuration such as auto-negotiation, flow
control, transmit rate, etc. Please read the following instructions carefully before you configure a port in the switch.
This chapter contains the following sections.
•
Port Basic
•
Ethernet Port Configuration
•
VDSL Port Configuration
•
Port Mirroring
5.1 Port Basic
The switch provides 24 VDSL ports for the subscriber interface and 2 fixed ports of
10/100/1000Base-T Gigabit Ethernet and 1 optional module of 2 uplink ports(2-port SFP
or 1-port GE-PON & 1-port SFP) supporting 100/1000Base-X interface.
5.2 Ethernet Port Configuration
5.2.1 Enabling Ethernet Port
To enable/disable the Ethernet port, use the following command.
Command Mode Description
port {enable | disable} PORTS Bridge
The following is an example of disabling the Ethernet port 25.
Auto-negotiation is a mechanism that takes control of the cable when a connection is established to a network device. Auto-negotiation detects the various modes that exist in the
network device on the other end of the wire and advertises it own abilities to automatically
configure the highest performance mode of interoperation. As a standard technology, this
allows simple, automatic connection of devices that support a variety of modes from a va-
SMC7824M/VSW67
CLI Management Guide
TigerAccess™ EE
riety of manufacturers. To enable/disable the auto-negotiation on an Ethernet port, use
the following command.
Command Mode Description
port nego PORTS {on | off} Bridge
Enables/disables the auto-negotiation on a specified
port, enter a port number. (default: on)
Auto-negotiation operates only on 10/100/1000Base-TX interface. You cannot enable this
!
function on 1000Base-X optical interface.
The following is an example of disabling the auto-negotiation on the Ethernet port 25 and
Ethernet operates in either half-duplex or full-duplex mode. In full-duplex mode, frames
travel in both directions simultaneously over two channels on the same connection for an
aggregate bandwidth of twice that of half-duplex mode. Full duplex networks are very efficient since data can be sent and received simultaneously.
To set the duplex mode on an Ethernet port, use the following command.
Command Mode Description
port duplex PORTS {full | half} Bridge
Sets full-duplex or half-duplex mode on a specified
port, enter a port number.
The following is an example of setting the duplex mode on the Ethernet port 25 to halfduplex mode.
In Ethernet networking, the flow control is the process of adjusting the flow of data from
one network device to another to ensure that the receiving device can handle all of the incoming data. For this process, the receiving device normally sends a PAUSE frame to the
sending device when its buffer is full. The sending device then stops sending data for a
while. This is particularly important where the sending device is capable of sending data
much faster than the receiving device can receive it.
To enable the flow control on an Ethernet port, use the following command.
Command Mode Description
port flow-control PORTS {on |
off}
Bridge
The following is an example of enabling the flow control on the Ethernet port 25.
port 25 ---------------------------------------------------------------------
Ucast: 43 3074 24592 0 0 0
Mcast: 348025 2088 167052000 0 0 0
Bcast: 0 0 0 1349 80940 647520
SWITCH(config)#
The switch can be configured to generate a syslog message when the number of the
packets handled by CPU exceeds a specified value. This function allows system administrators to monitor the switch and network status more effectively.
To configure the switch to generate a syslog message according to the number of the
packets handled by CPU, use the following command.
Command Mode Description
Generates a syslog message according to the speci-
cpu statistics-limit {unicast |
multicast | broadcast} PORTS
<10-100>
Global
fied number of the packets handled by CPU. This is
configurable for each packet type and physical port.
unicast | multicast | broadcast: packet type
PORTS: port numbers
10-100: packet count (actual value: 1000-10000)
72 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To disable the switch to generate a syslog message according to the number of the packets handled by CPU, use the following command.
Command Mode Description
no cpu statistics-limit {unicast |
multicast | broadcast} {PORTS |
all}
no cpu statistics-limit all
{PORTS | all}
Enable
Global
Disables the switch to generate a syslog message
according to the number of the packets handled by
CPU for each packet type.
all: all physical ports
Disables the switch to generate a syslog message
according to the number of the packets handled by
CPU for all packet types.
To display a configured value to generate a syslog message according to the number of
the packets handled by CPU, use the following command.
Command Mode Description
show cpu statistics-limit
Enable
Global
Bridge
Shows a configured value to generate a syslog mes-
sage according to the number of the packets handled
by CPU.
5.2.7.3 Protocol Statistics
To enables/disables the system to collect the statistics of the protocols, use the following
command.
Command Mode Description
protocol statistics {enable | dis-
able} [arp | icmp | ip | tcp | udp]
To display the statistics of the protocol, use the following command.
Command Mode Description
show protocol statistics avg-pkt
[PORTS]
show protocol statistics total
[PORTS]
To delete the collected statistics of the protocol, use the following command.
Command Mode Description
clear protocol statistics [PORTS]
Global
Bridge
Enable
Global
Bridge
Global
Bridge
Enables/disables the system to collect the statistics of
the protocols. (ARP, ICMP, IP, TCP, UDP)
Shows the statistics of the protocol for average pack-
ets.
Shows the traffic statistics of the protocol for total
packets.
Deletes the collected statistics of the protocol.
SMC7824M/VSW73
CLI Management Guide
TigerAccess™ EE
5.2.8 Port Information
To display the port information, use the following command.
Command Mode Description
show port [PORTS] Shows a current port status, enter a port number.
show port description [PORTS]
show port module-info [PORTS]
The show port module-info command is only valid for Ethernet optical port. In case of
!
using the command on the VDSL interface, the system shows the state as Uninstalled.
The following is an example of displaying the port information for port 20 to 26.
Shows a specified port description, enter a port num-
ber.
Shows optical module (SFP) information.
74 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
5.3 VDSL Port Configuration
5.3.1 Modulation of VDSL Signal
The switch provides both Internet and telephone communication through existing telephone line with using DSL technology. DSL communication system requires technique to
convert digital signal into analog signal and return the analog signal into the digital signal.
Fig. 5.1 shows process of signal transmission in DSL system.
Fig. 5.1 Transmission in DSL System
In the above picture, Modulator converts digital signal into analog signal to be sent over
the channel. Also, the analog signal is returned into digital signal at the Demodulator.
5.3.1.1 DMT Modulation
DMT builds on some of the ideas of QAM. Imagine having more than one constellation
encoder. Each encoder receives a set of bits that are encoded using a constellation encoder as described in the previous sections. In this basis, DMT is referred as multi carrier
In DMT modulation, frequency channel is named frequency bins, bins, tone, DMT tones,
and sub-channel.
Fig. 5.2 shows process of DMT modulation.
SMC7824M/VSW75
CLI Management Guide
TigerAccess™ EE
Fig. 5.2 DMT Modulation
Meanwhile, DMT using multi carrier can control carrier about exterior noise differently
came from each frequency in detail, whereas chip implementation is more complicated
than QAM and power consumption is quite high. Also, it is possible to process many digital signals. Although its fundamental is complicated, processing speed is faster than QAM.
5.3.2 Configuring VDSL Port
You can configure profile, interleave of VDSL port. This chapter describes the following
lists.
•
Displaying Status of VDSL Port
•
Enabling VDSL Port
•
Profile of VDSL Port
•
Controlling Power according to Connection Distance
•
PSD Level
•
PSD Mask Level
•
Interleave
•
Impulse Noise Protection
•
Trellis Coded Modulation (TCM)
•
Ham-band
•
SNR Margin
•
Bitloading Per Tone
•
G.handshake Tone
76 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
5.3.2.1 Displaying Status of VDSL Port
You can check status of VDSL port and user’s configuration. It is also possible to view information of VDSL port. To check status of VDSL port and information of DMT modulation,
use the following command
Command Mode Description
show lre [PORTS] Shows VDSL port.
show lre detail-info [PORTS] Shows detailed information of VDSL line.
show lre user-mac [PORT]
show lre profile [PORTS] Shows the VDSL profile
show rate-info[PORTS] Shows the rate information of VDSL line.
show lre psd [PORTS]
Enable
Global
Bridge
The above commands shows the following information. Therefore, you can choose command according to information you need.
Shows MAC address of user connected
to VDSL ports.
Shows PSD-mask-level
Command Description
bitload Shows Bitloading Per Tone
ewl Shows Electronic Wire Length
ham-band Shows HAM Band
inp Shows Upstream / Downstream Protection
interleave Shows interleave-delay
pbo-config Shows Power Back-Off Length configuration
profile Shows Profile
psd Shows PSD
rate-info Shows rate information
snr Shows SNR Margin
Tab. 5. 1 Information displayed by Command, show lre
5.3.2.2 Enabling VDSL Port
This configuration of enabling VDSL port has different way of using with the configuration
described in “
of partner’s equipment. Therefore, although you connect to cable with VDSL port down,
Sync is not configured. To configure Sync status of VDSL port, use the following command.
Ethernet Port Configuration” Enabling VDSL port is to configure Sync status
Command Mode Description
lre PORTS up
lre PORTS down
Bridge
Configures Sync with partner’s equipment or resets
VDSL port.
Disables Sync with partner’s equipment.
Sync with the connected equipment is basically configured for VDSL port.
!
SMC7824M/VSW77
CLI Management Guide
TigerAccess™ EE
i
ble status.
5.3.2.3 Profile of VDSL Port
It is possible to configure bandwidth of up/down stream of VDSL port. To configure the
profile, use the following command.
5.3.2.4 Controlling Power according to Connection Distance
The distance of connection from switch to VDSL line may vary according to each VDSL
port. If same power is supplied to different connection distance, the power is larger than
power supplied to line connected to CPE far from switch. It may cause interruption in the
line connected to CPE far from the switch. You can control supplied power according to
distance to prevent too large power supplied to VDSL line.
SMC7824M/VSW79
CLI Management Guide
TigerAccess™ EE
To control supplied power according to VDSL line, use the following command.
Command Mode Description
lre PORTS upbo enable Bridge
Controls supplied power according to distance of VDSL
line.
i
You should control supplied power of VDSL port according to distance of VDSL line.
To disable power control according to distance of VDSL line, use the following command.
Command Mode Description
lre PORTS upbo disable Bridge
Disables power control according to distance of VDSL
line.
The following is an example of disabling power control according to distance of VDSL line.
If you control power according to VDSL line, it is applied to all ports.
You cannot configure power consumption supplied to VDSL line with power control according to the distance of line enabled. In this case, the standard to decide power consumption is the distance.
To configure power consumption supplied to VDSL line, use the following command.
Command Mode Description
lre PORTS pbo-length {1ㅣ2ㅣ3
ㅣ4ㅣ5ㅣ6ㅣ7ㅣ8ㅣ9ㅣ10}
Bridge
Configures power consumption supplied to VDSL line
according to the distance.
i
The default is “2”.
80 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To configure the power back-off length of each upstream band, use the following command.
Command Mode Description
lre PORTS band-pbo-length u0
LENGTH [u1 LENGTH]
lre PORTS band-pbo-length u0
LENGTH u1LENGTH [u2
LENGTH]
lre PORTS band-pbo-length u0
LENGTH u1LENGTH u2
LENGTH [u3LENGTH]
Bridge
Configures the power back-off length per upstream
band.
LENGTH: distance from 100m to 900m (1-10)
u1-u4: U1-U4 band configuration
The following table shows distance of 1 ~ 9 in the above command. Each variable means
as the below.
No Distance (Unit : m) No Distance (Unit : m)
1 100 6 600
2 200 7 700
3 300 8 800
4 400 9 900
5 500 10 User Definition
Tab. 5. 4 Value of PBO-Length
!
You should control supplied power of VDSL port according to distance of VDSL line.
The following is an example of configuring power consumption as 400m.
However, even though inner value of PBO-Length is already configured and user configured the most appropriate PBO-Length, inner value could be unfit according to detailed
environment To improve this point, in switch it is possible that user configure the attribute
of PBO-Length. The attribute of PBO-Length is appointed as PBO-Config, user’s default
PBO-Config is appointed as PBO-Length “10”.
To configure PBO-config, use the following command.
Command Mode Description
lre pbo-config K1[1] K1[2] K1[3] K2[1]
K2[2] K2[3]
Bridge Sets the attribute of PBO-Length.
The first value of Upstream in k1 and k2 comes under option band, the second value
comes under Upstream used for 3Band, and the third value comes under the second Upstream used for 4band.
To display PBO-Config, use the following command.
Command Mode Description
Enable
show lre pbo-config
Global
Bridge
Shows the attribute of PBO-Length.
82 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
5.3.2.5 PSD Level
Power Spectral Density (PSD) Level is configured according to the standard but PSDLevel can be configured as the frequency by the administrator. To configure PSD-Level,
use the following command.
Command Mode Description
lre PORTS psd-level { 0ㅣ1 | 2 | 3
| 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15} {PSD | default | off}
Bridge
Band Frequency (kHz) Band Frequency (kHz)
0 27 ~ 138 up/down 8 4,508 ~ 5,200 up/down
1 143 ~ 256down 9 5,208 ~ 7,000 up/down
2 261 ~ 640down 10 7,008 ~ 8,500 up/down
3 648 ~ 1,100 down 11 8,508 ~ 12,000 up/down
4 1,108 ~ 2,000down 12 12,008 ~ 16,700 up/down
5 2,008 ~ 3,000down 13 16,708 ~ 17,600 up/down
6 3,008 ~ 3,750 down 14 17,608 ~ 18,100 up/down
7 3,758 ~ 4,500up/down 15 18,108 ~ 30,000 up/down
Configures PSD value and frequency vlaue in VDSL
line.
PSD: -80dBm ~ -40dBm
Tab. 5. 5 The frequency of PSD Level per band
To display PSD level, use the following command.
Command Mode Description
Enable
show lre psd-level [PORTS]
Global
Bridge
Shows PSD level in VDSL line.
The following is an example of configuring PSD levle.
SWITCH(bridge)# lre 1 psd-level 10 -60
SWITCH(bridge)# show lre psd-level 1
-------------------------------------
PORT 1
BAND Frequency (kHz) PSD (dBm)
-------------------------------------
0 27 - 138 default
1 143 - 256 default
2 261 - 640 default
3 648 - 1100 default
4 1108 - 2000 default
5 2008 - 3000 default
6 3008 - 3750 default
7 3758 - 4500 default
8 4508 - 5200 default
9 5208 - 7000 default
10 7008 - 8500 -60.0
SMC7824M/VSW83
CLI Management Guide
TigerAccess™ EE
11 8508 - 12000 default
12 12008 - 16700 default
13 16708 - 17600 default
14 17608 - 18100 default
15 18108 - 30000 default
SWITCH(bridge)#
5.3.2.6 PSD Mask Level
To configure PSD-Level, use the following command.
If you configure PSD MASK Level of VDSL line, it is applied to all ports.
!
5.3.2.7 Interleave
There is Interleave process to correct data error before modulation digital signal into analog signal. Interleave gathers certain size of data, re-organize the gathered data, and
transmit the data divided by certain size. In the below image, you can see disperse errors
by re-organizing gathered data through Interleave.
By the way, Interleave prevents error by enhanced correction but may slow down transmit
rate because packets are gathered. Therefore you need to consider user’s condition to
configure mode. On the other hand, if you skip Interleave process, error correction will not
be done well, whereas transmit rate of data becomes faster. You can skip Interleave
process and configure it before transmitting data.
To skip Interleave process, use the following command.
Command Mode Description
lre PORTS channel fast Bridge Skips Interleave process
84 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To enable Interleave process, use the following command.
The following is an example of displaying Interleave.
The default is Interleave enabled as “slow”.
SWITCH(bridge)# show lre interleave 1-5
------------------------------------------
Port Status Channel Inter-Delay
ADM/OPR UP/DOWN
------------------------------------------
1 Up/Down Slow 2/ 2
2 Up/Down Slow 2/ 2
3 Up/Down Slow 2/ 2
4 Up/Down Slow 2/ 2
5 Up/Down Slow 2/ 2
SWITCH(bridge)#
In addition, you can configure the interval of Interleave process during modulation. This
interval is called Interleave-delay. By configuring Interleave-delay, you can prevent transmission delay caused of waiting data gathered.
To configure Interleave-delay, use the following command.
Command Mode Description
lre PORTS interleave-delay
<1-100>
lre PORTS interleave-delay
<1-100> {upㅣdown}
Bridge
Configures Interleave-delay
PORTS: VDSL port number
1-100: interleave delay value (default:2 ms)
Configures Interleave-delay with specifying Upstream
or Downstream.
i
The unit of Interleave-delay is “㎳” and the default is “2ms”.
In switch, all VDSL ports are contained in one Line-config-profile. For the ports contained
!
as the member port of Line-config-profile, it is not possible to change Interleave-delay or
SNR margin.
To change it independently, erase the member of Line-config-profile first refer to
5.3.4.1
Line config profile. If you try to configure interleave-delay of the port which is contained as
Line-config-profile member, the error message will be displayed.
SMC7824M/VSW85
CLI Management Guide
TigerAccess™ EE
To display configured interleave delay, use the following command
Command Mode Description
Enable
show lre interleave [PORTS]
Global
Bridge
Shows the configuration of interleave delay.
The following is an example of configuring Interleave-delay of port 50 as 50ms.
SWITCH(bridge)# lre5interleave-delay50
SWITCH(bridge)# show lre interleave 1-5
------------------------------------------
Port Status Channel Inter-Delay
ADM/OPR UP/DOWN
------------------------------------------
1 Up/Down Slow 2/ 2
2 Up/Down Slow 2/ 2
3 Up/Down Slow 2/ 2
4 Up/Down Slow 2/ 2
5 Up/Down Slow 50/ 50
SWITCH(bridge)#
5.3.2.8 Impulse Noise Protection
Use the following command to configure minimum protection value of port provision.
Command Mode Description
lre PORTS inp <0-255>
lre PORTS inp <0-255> { up |
down }
The unit of value is 125 usec and configured “0” as default
i
To display a configured INP, use the following command
Command Mode Description
show lre inp [PORTS]
Bridge
Enable
Global
Bridge
Configures INP
0-255: INP value (default:0)
Configures INP with specifying Upstream or Down-
stream.
Shows the configured INP in VDSL line.
5.3.2.9 Trellis Coded Modulation (TCM)
The trellis coded modulation (TCM) is a modulation scheme which allows highly efficient
transmission of information over band-limited channels such as telephone lines.
86 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To enable/disable TCM of VDSL line port, use the following command. .
To display configured TCM, use the following command.
Command Mode Description
show lre tcm [PORTS] Enable/Global/Bridge Shows the configured TCM.
5.3.2.10 Ham-band
The bandwidth that VDSL port of switch includes Ham band. It causes interruption in
VDSL line. To prevent this interruption, you can configure not to use Ham band in bandwidth.
To disable specified Ham band for a port, use the following command.
In digital and analog communication, SNR(Signal to Noise Ratio) ratio of signal divided by
noise. When the signal strength is referred as Vs and the noise strength is referred as Vn,
the formula can be 「SNR(㏈) = 20 log10(Vs/Vn)」.When the signal strength is same
88 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
with or less than the noise strength, stable communication cannot be done. Therefore,
SNT must not be minus or “0”. And, if there is this situation, you have to increase signal
strength or decrease noise strength.
Transmit rate of VDSL line depends of SNR. But, environment of line cannot be always
same. So you need to configure transmit rate of VDSL line can be decided according to
changing line environment. If noise is suddenly increased, SNR is decreased and communication becomes unstable.
Therefore you should configure transmit rate for decreased SNR when noise is suddenly
increased. Then there will not be problem with communication although noise is suddenly
increased.
Fig. 5.3 Deciding Transmit Rate according to SNR Margin
When you configure estimate SNR, the difference between estimate SNR and current
SNR is call「SNR Margin」. The switch applies the SNR margin to transmit rate In other
word, if you configure SNR margin as “6”, the difference that subtracts 6 from current
SNR will be applied to transmit rate as the above picture
In you think there will be big change of noise, configure big SNR margin. However, if you
configure too big SNR margin, transmit rate will be slow down, whereas communication is
stable.
To configure SNR margin, use the following command.
Command Mode Description
lre PORTS snr-target-margin <0-
31> [up | down]
lre PORTS snr-min-margin <0-
31> [up | down]
Bridge
Configures SNR margin of Downstream or Upstream.
0-31: SNR margin value (default:6 dB)
Configures minimum SNR margin
0-31: minimum SNR margin value (default: 5 dB)
SMC7824M/VSW89
CLI Management Guide
TigerAccess™ EE
To display SNR margin, use the following command.
Command Mode Description
show lre snr [PORTS] Enable/Global/BridgeShows the configuration of SNR margin.
The following is an example of configuring SNR margin of port 3 as “10㏈”.
The bitloading per tone command is used to fetch the table that shows bit loading, SNR,
attenuation, FEQ fine coeff, noise margin, and so on.
To display the table of each parameter in the range of tone, use the following command.
Command Mode Description
show lre pertoneinfo PORT {rx-bit-neㅣtx-bit-ne
| snr-ne | noise-margin-ne | atten-ne | feq-ne |
tx-pwr-ne | tx-gi-ne | qln-ne | coarse-feq-ne }
<0-4095> <0-4095> [graph <1-4095>]
To display the table of each parameter in the range of tone, use the following command.
Command Mode Description
show lre pertoneinfo PORT
{ block | hlog-ne | hlin-ne | hlin-
scale-ne <0-511> <0-511>
Enable
Global
Bridge
Enable
Global
Bridge
Shows the table of each parameter (bitloading, SNR,
FEQ fine coeff, noie-margin and so on) in the range of
tone.
0-511: start/ stop tone index
Shows the table of each parameter (bit-
loading, SNR, FEQ fine coeff, noie-
margin and so on) in the range of tone.
0-4095: start/ stop tone index
90 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
The following table lists the sub-commands in the Bitloading per tone command.
Sub-command Description
tx-bit-ne Get Tx Per Tone BitLoading Info Near End
snr-ne Get Rx Per Tone SNR Info Near End
noise-margin-ne Get Rx Per Tone Noise Margin Near End
feq-ne Get Rx Per Tone Current FEQ ine Coeffs Near End
tx-pwr-ne Get Tx Per Tone Tx Power Near End
tx-gi-ne Get Tx Per Tone Gi Near End
qln-ne Get Rx Per Tone Quiet Line Noise Near End
coarse-feq-ne Rx Per Tone Coarse FEQ Near End
block Get Param Block Read Far End (valid for ADSL2/2+/VDSL2 only)
hlog-ne Get Per Tone HLOG Info Near End (valid for ADSL2/2+ only)
hlin-ne Get Per Tone HLIN Info Near End
hlin-scale-ne Get Per Tone HLIN Scale Near End
Tab. 5. 8 Sub-commands in Bitloading Per Tone
5.3.2.13 G.handshake Tone
To configure G.handshake tone of each port, use the following command.
Command Mode Description
lre PORTS ghs a43 [i43] [v43]
lre PORTS ghs b43 [i43] [v43]
lre PORTS ghs none
Bridge
You can not configure A43 G.hs carrier with B43 at the same time.
i
To display the G.hs Carrier configuration of each port, use the following command.
Command Mode Description
Enable
show lre ghs [PORTS]
Global
Bridge
5.3.3 VDSL Checking Errors of VDSL Port
In switch it is possible to check times of error from VDSL port every time interval. Moreover, it is possible to check the error duration time.
Configures G.hs tone carrier of each port
a43, b43, i43, v43: A43, B43, I43, V43 Carrier Set
none: None G.hs Carrier mode
Shows G.hs carrier configuration of each port.
Checking Times of Errors
You can check how many times CRC errors, Frame loss and Signal loss are happened.
Error is counted every 15 minutes after booting. After the time is over, the number is reset
to “0” and error is counted again. In addition, error is counted by each day. It is also reset
to “0” after the day. Consequently, you can check times of error (Curr.15m) at present
SMC7824M/VSW91
CLI Management Guide
TigerAccess™ EE
time from beginning of the 15 minutes and time of error (Prev. 15m) of previous 15 minutes. Also, you can check times of error (Today) at present time from starting Today, times
of error (Yesterday) of yesterday, and total times of error from booting. The following image shows standard of error counting provided in switch.
Fig. 5.4 Counting Times of Error
To display the number of errors in VDSL port, use the following command.
Command Mode Description
show lre stat-correctable-crc PORTS
show lre stat-lof PORTSShows the numbers of Frame loss.
show lre stat-los PORTSShows the numbers of Signal loss.
show lre stat-lol PORTSShows the numbers of Link loss.
show lre stat-lpr PORTSShows the numbers of CPE's Power loss
show lre stat-crc PORTSShows the numbers of CRC errors
show lre stat-uncorrectable-crc PORTS
Enable
Global
Bridge
Shows the numbers of CRC errors that
can be correctable.
Shows the numbers of CRC errors that
can be uncorrectable.
To reset data of CRC error, Frame loss and Signal loss, use the following command.
Command Mode Description
clear lre stat-correctable-crc PORTS
clear lre stat-lof PORTS
clear lre stat-los PORTS
clear lre stat-lol PORTS
clear lre stat-lpr PORTS
clear lre stat-crc PORTS
clear lre stat-uncorrectable-crc PORTS
Enable
Global
Bridge
Resets data of error.
92 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To check CRC error, Frame losses, and Signal loss of specific port at a time, use the following command
Command Mode Description
show lre stat-count-all PORTS
show cpe stat-count-all [PORTS]
show lre total-error [PORTS] Shows the collected data of all errors.
clear stat-error [PORTS] Reset error information about Upstream
clear cpe stat-error [PORTS]
Enable
Global
Bridge
Shows data of CRC error, Frame loss, and Signal loss
at a time about Upstream
Shows data of CRC error, Frame loss, and Signal loss
at a time about Downstream
Reset error information about Downstream
The following is an example of checking all errors of port 1 to port 5 at a time.
You can check how many times each port is disconnected and how long it is disconnected. As the same way with counting times of CRC error and Frame loss of VDSL port,
it is counted every 15 minutes and each day.
To check how long have the errors in downstream of VDSL line been lasted, use the following command.
Command Mode Description
show lre stat-crc-sec [PORTS] Shows how long CRC error has been happening.
show lre stat-es-sec [PORTS]
show lre stat-lof-sec [PORTS] Shows how long Frame loss has been happened.
show lre stat-lol-sec [PORTS] Shows how long Link has been disconnected.
show lre stat-los-sec [PORTS] Shows how long Signal loss has been happening.
show lre stat-lpr-sec [PORTS]
show lre stat-ses-sec [PORTS] Shows how long server error has been happening.
show lre stat-uas-sec [PORTS] Shows how long UAS has been happening.
show lre stat-service-error
[PORTS]
Enable
Global
Bridge
Shows how long CRC, LOF. and LOS. error has been
happening.
Shows how long RX power of port has being lower than
specific voltage.
Shows how long Link has been disconnected because
of CPE turned off by user.
SMC7824M/VSW93
CLI Management Guide
TigerAccess™ EE
To display all errors that are counted during 15 minutes or one day, use the following
command
Command Mode Description
show lre pre-15m-error [PORTS]Shows the error status in previous 15 minutes.
show lre cur-15m-error [PORTS]Shows the error status in current 15 minutes.
show lre pre-day-error [PORTS] Shows the error status in previous day.
show lre cur-day-error [PORTS]
Enable
Global
Bridge
Shows the error status in current day
To reset data of CRC error, Frame loss and Signal loss, use the following command.
Command Mode Description
clear lre stat-crc-sec PORTS
clear lre stat-es-sec PORTS
clear lre stat-ses-sec PORTS
clear lre stat-lof-sec PORTS
clear lre stat-los-sec PORTS
clear lre stat-lol-sec PORTS
clear lre stat-lpr-sec PORTS
clear lre stat-uncorrectable-crc
PORTS
Enable
Global
Bridge
Resets the data of error count.
SES(Severely Errored Seconds) means how long server error has been happening, and
UAS(Unavailable Seconds) means error, which SES is more than 10 seconds.
In addition, you can check how many minutes is passed after beginning 15 minutes (15
Min Elapse) or day (Day Elapse) based on the present time of checking how many times
each port is disconnected and how long it is disconnected.
94 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
5.3.4 Config-Profile
You can make a policy configured in service port a Profile to apply to port. There are two
kinds of profiles; one applied to VDSL line and the other one configured for Alarm of
SNMP trap in case error is happened. This chapter describes the following lists.
•
Line config profile
•
Alarm config profile
5.3.4.1 Line config profile
Line config profile is a policy, which configures transmit rate of VDSL line, SNR margin,
and Interleave-delay.
This is very useful when ISPs apply graded services. They do not have to configure all
ports according to client’s grade, but just apply profile to ports.
!
In switch, all VDSL ports are contained in one Line-config-profile. For the ports contained
as the member port of Line-config-profile, it is not possible to change Interleave-delay or
SNR margin. To change it, you should delete the member of Line-config-profile first.
If you try to configure interleave-delay of the port which is included as Line-config-profile
member, the error message will be displayed.
SWITCH(bridge)# lre 5 interleave-delay 50
%VDSL Port 5 is line-config-profile DEFVAL member!
SWITCH(bridge)#
To configure Line config profile in detail, you need to open Line-config Profile mode. Use
the following command.
Command Mode Description
line-config-profile NAMEBridge
Opens line-config profile configuration mode.
NAME: Line config profile name
The following is an example of entering into Line-config Profile mode to configure line
config profile named as TEST.
SWITCH# config terminal
SWITCH(config)# bridge
SWITCH(bridge)# line-config-profile TEST
SWITCH(bridge-line-config-profile[TEST])#
Meanwhile, use the following command to exit from Line-config Profile mode
Command Mode Description
exit Line-configExits from line config profile configuration mode.
SMC7824M/VSW95
CLI Management Guide
TigerAccess™ EE
To configure the detail of Profile, Use the following command.
Command Mode Description
down-max-inter-delay <1-100>
down-slow-max-datarate <0-
100000>
down-slow-min-datarate <0-
100000>
down-target-snr-mgn <0-124>
down-snr-min-mgn <0-124>
up-max-inter-delay <1-100>Configures Interleave-delay of Upstream.
up-slow-max-datarate <0-
100000>
up-slow-min-datarate <0-
100000>
up-target-snr-mgn <0-124>
up-snr-min-mgn <0-124>
Line-config
Configures Interleave-delay of Downstream. The unit is
msec.
Configures transmit rate of Maximum Downstream. The
unit is kbps. (1000=1Mbps)
Configures transmit rate of Minimum Downstream. The
unit is kbps. (1000=1Mbps)
Configures SNR margin of Downstream. The unit is
0.25dBm. (4=1dBm)
Configures minimum SNR margin of Downstream. The
unit is 0.25dBm. (4=1dBm)
Configures transmit rate of Maximum Upstream. The
unit is kbps. (1000=1Mbps)
Configures transmit rate of Minimum Upstream. The
unit is kbps. (1000=1Mbps)
Configures SNR margin of Upstream. The unit is
0.25dBm. (4=1dBm)
Configures minimum SNR margin of Upstream. The
unit is 0.25dBm. (4=1dBm)
i
setting. The default of SNR margin is “24(6dBm)” in case of Downstream, and “32(8dBm)”
in case of Upstream.
The default of Interleave-delay is “2㎳”, and speed of service is not configured by default
i
Transmit rate should be configured using the unit of Mbps. Therefore, you can input in
terms of 10000 in actual configuration.
The following is an example of configuring Interleave of profile named TEST as 20ms and
transmit rate as 8M in case of Upstream and 10M in case of Downstream, and SNT margin as 10dBm.
SNR margin should be configured with the form of NdBm(N=integer). Therefore you have
i
to input multiple numbers of 4 to form NdBm.
96 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
To display the configuration, use the following command.
Command Mode Description
show lre line-config-profile
[PORTS]
Enable/Global/Bridge
Shows the configuration of all line config
profiles.
To enable configuration of this line-config profile, use the following command.
Command Mode Description
active Enables the profile.
no active
Line-config
Disables this profile
Unless you enable configured profiles, they will not be applied although you apply them to
!
ports.
After you configure and enable profile, if you change the configuration, then it will be
i
automatically disabled. Therefore you have to enable it with “active” whenever you
change configurations.
The following is an example of saving Profile after going back to Global configuration
mode or Enable mode.
SWITCH(config)# write memory
Building configuration...
[OK]
SWITCH(config)#
Besides, when switch has been stacking, Line config profile configured in Master will be
automatically configured in Slave. Although it is configured before stacking, Master’s configuration will be configured in Slave by finding any difference. However, you have to save
the configuration of Slave with using “write memory”. Unless you do it, the configuration
will be deleted and the above procedure will be repeated.
!
With enabled stacking, config profile of Master will be configured in Slave.
Apply Profile to port. Use the following command.
Command Mode Description
line-config-profile NAME add
PORTS
Bridge
Applies Profile to specified port.
NAME: line-config profile name
The following is an example of applying profile named TEST to port 1.
SWITCH(bridge)# line-config-profileTEST add1
SWITCH(bridge)#
SMC7824M/VSW97
CLI Management Guide
TigerAccess™ EE
To disable the application of profile in specified port, use the following command.
Command Mode Description
line-config-profile NAME del
PORTS
Bridge Disables profile in specified port.
To delete configured profile, use the following command.
Command Mode Description
no line-config-profile NAME Bridge Deletes Profile.
5.3.4.2 Alarm config profile
Alarm config profile is a configured policy, which Alarm service is provided to clients with
using SNMP trap in case of system error. It is convenient way because it is possible to
configure standard of error checking, which varies according to service type, in each port.
Alarm config profile consists of Threshold of error, which clients configure. Same as standard in
and SNMP trap is sent when it meets configured threshold.
5.3.3 VDSL Checking Errors of VDSL Port each error is checked every 15 minutes,
To configure an alarm-config profile, perform the following steps.
Step 1
To configure alarm-config profile, you need to enter into Alarm–config Profile mode. Use
the following command
Command Mode Description
alarm-config-profile NAMEBridge
Opens alarm config profile mode
NAME: alarm-config profile name
The following is an example of entering into Alarm-config Profile mode to configure alarm
config profile named TEST
SWITCH# config terminal
SWITCH(config)# bridge
SWITCH(bridge)# alarm-config-profile TEST
SWITCH(bridge-alarm-config-profile[TEST])#
Meanwhile, use “exit” to exit from Alarm-config Profile mode.
Step 2
Configures detail of Profile. Use the following command.
Command Mode Description
thresh-15min-ess <0-900>
thresh-15min-lofs <0-900>
thresh-15min-lols <0-900>
Alarm-
Config
Configures duration of CRC, LOF, and LOS. The unit is
second.
Configures threshold of duration of LOF. The unit is
second.
Configures threshold of duration of LOL. The unit is
second.
98 SMC7824M/VSW
Management Guide CLI
TigerAccess™ EE
Command Mode Description
thresh-15min-loss <0-900>
thresh-15min-sess <0-900>
thresh-15min-uass <0-900>
Alarm-
Config
Configures threshold of duration of LOS. The unit is
second.
Configures threshold of duration of SES. The unit is
second.
Configures threshold of duration of UAS. The unit is
second.
i
If the threshold is configured as “0”, it means no limit. and the default of threshold is no
limit.
The following is an example of configuring threshold of profile named TEST as 5 minutes
(300 seconds).