Smc 7824M/VSW User Guide

Management Guide CLI TigerAccess™ EE
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice.
Copyright (C) 2009 by
SMC Networks, Inc.
20 Mason
Irvine, CA 92618
All rights reserved. Printed in Taiwan
Trademarks:
SMC is a registered trademark; and EZ Switch, TigerAccess, TigerStack and TigerSwitch are trade­marks of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
SMC7824M/VSW 1
CLI Management Guide
TigerAccess™ EE
Warranty and Product Registration
To register SMC products and to review the detailed warranty statement, please refer to
the Support Section of the SMC Website at http://www.smc.com
2 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
Reason for Update
Summary: Initial release
Details:
Chapter/Section Reason for Update
All Initial release
Issue History
Issue
Number
01 05/2009 Initial release (nos 5.01 #3001)
Date of Issue Reason for Update
SMC7824M/VSW 3
CLI Management Guide
TigerAccess™ EE
Contents
1 Introduction .......................................................................................19
1.1 Audience............................................................................................... 19
1.2 Document Structure.............................................................................. 19
1.3 Document Convention .......................................................................... 20
1.4 Document Notation............................................................................... 20
1.5 Virus Protection .................................................................................... 21
1.6 CE Declaration of Conformity ............................................................... 21
2 System Overview ..............................................................................22
2.1 System Features .................................................................................. 23
3 Command Line Interface (CLI) .........................................................25
3.1 Configuration Mode .............................................................................. 25
3.1.1 Privileged EXEC View Mode...................................................................... 26
3.1.2 Privileged EXEC Enable Mode .................................................................. 26
3.1.3 Global Configuration Mode ........................................................................ 27
3.1.4 Bridge Configuration Mode ........................................................................ 27
3.1.5 DHCP Pool Configuration Mode ................................................................ 28
3.1.6 DHCP Option Configuration Mode............................................................. 28
3.1.7 DHCP Option 82 Configuration Mode........................................................ 29
3.1.8 Interface Configuration Mode..................................................................... 29
3.1.9 Rule Configuration Mode ........................................................................... 30
3.1.10 RMON Configuration Mode........................................................................ 30
3.2 Configuration Mode Overview .............................................................. 31
3.3 Useful Tips............................................................................................ 32
3.3.1 Listing Available Command........................................................................ 32
3.3.2 Calling Command History .......................................................................... 34
3.3.3 Using Abbreviation ..................................................................................... 35
3.3.4 Using Command of Privileged EXEC Enable Mode .................................. 35
3.3.5 Exit Current Command Mode .................................................................... 35
4 System Connection and IP Address................................................36
4.1 System Connection .............................................................................. 36
4.1.1 Connecting to the Console Port ................................................................. 36
4.1.2 System Login ............................................................................................. 36
4.1.3 Password for Privileged EXEC Enable Mode ............................................ 37
4.1.4 Changing Login Password ......................................................................... 38
4.1.5 Login Password Recovery Process ........................................................... 39
4.1.6 Management for System Account .............................................................. 40
4.1.6.1 Creating System Account............................................................................... 40
4.1.6.2 Security Level ................................................................................................ 40
4.1.7 Limiting Number of Users........................................................................... 43
4.1.8 Auto Log-out............................................................................................... 44
4.1.9 Telnet Access ............................................................................................. 44
4.1.10 System Rebooting ...................................................................................... 45
4.1.10.1 Manual System Rebooting............................................................................. 45
4 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
4.1.10.2 Auto System Rebooting .................................................................................46
4.2 System Authentication .......................................................................... 47
4.2.1 Authentication Method ................................................................................47
4.2.2 Authentication Interface ..............................................................................47
4.2.3 Primary Authentication Method...................................................................47
4.2.4 RADIUS Server...........................................................................................48
4.2.4.1 RADIUS Server for System Authentication ....................................................48
4.2.4.2 RADIUS Server Priority..................................................................................48
4.2.4.3 Timeout of Authentication Request ................................................................48
4.2.4.4 Frequency of Retransmit................................................................................48
4.2.5 TACACS+ Server ........................................................................................49
4.2.5.1 TACACS+ Server for System Authentication..................................................49
4.2.5.2 TACACS+ Server Priority...............................................................................49
4.2.5.3 Timeout of Authentication Request ................................................................49
4.2.5.4 Additional TACACS+ Configuration................................................................49
4.2.6 Accounting Mode ........................................................................................50
4.2.7 Displaying System Authentication...............................................................50
4.3 Configuring Interface............................................................................. 51
4.3.1 Enabling Interface .......................................................................................51
4.3.2 Assigning IP Address to Network Interface.................................................52
4.3.3 Static Route and Default Gateway..............................................................52
4.3.4 Interface Description ...................................................................................53
4.3.5 Displaying Interface ....................................................................................54
4.4 Secure Shell (SSH)...............................................................................55
4.4.1 SSH Server .................................................................................................55
4.4.1.1 Enabling SSH Server .....................................................................................55
4.4.1.2 Displaying On-line SSH Client........................................................................55
4.4.1.3 Disconnecting SSH Client ..............................................................................55
4.4.1.4 Assigning Specific Authentication Key............................................................56
4.4.1.5 Displaying Connection History of SSH Client.................................................56
4.4.2 SSH Client...................................................................................................56
4.4.2.1 Login to SSH Server ......................................................................................56
4.4.2.2 File Copy........................................................................................................56
4.4.2.3 Authentication Key .........................................................................................57
4.5 802.1x Authentication............................................................................ 58
4.5.1 802.1x Authentication..................................................................................59
4.5.1.1 Enabling 802.1x .............................................................................................59
4.5.1.2 RADIUS Server ..............................................................................................59
4.5.1.3 Authentication Mode ......................................................................................60
4.5.1.4 Authentication Port.........................................................................................61
4.5.1.5 Force Authorization ........................................................................................ 61
4.5.1.6 Interval for Retransmitting Request/Identity Packet .......................................61
4.5.1.7 Number of Requests to RADIUS Server ........................................................61
4.5.1.8 Interval of Request to RADIUS Server ...........................................................62
4.5.2 802.1x Re-Authentication............................................................................62
4.5.2.1 Enabling 802.1x Re-Authentication ................................................................62
4.5.2.2 Interval of Re-Authentication ..........................................................................63
4.5.2.3 Interval of Requesting Re-Authentication.......................................................63
4.5.2.4 802.1x Re-Authentication...............................................................................63
4.5.3 Initializing Authentication Status..................................................................64
SMC7824M/VSW 5
CLI Management Guide
TigerAccess™ EE
4.5.4 Restoring Default Value ............................................................................. 64
4.5.5 Displaying 802.1x Configuration ................................................................ 64
4.5.6 802.1x User Authentication Statistics......................................................... 64
4.5.7 Sample Configuration................................................................................. 65
5 Port Configuration ............................................................................67
5.1 Port Basic ............................................................................................. 67
5.2 Ethernet Port Configuration .................................................................. 67
5.2.1 Enabling Ethernet Port ............................................................................... 67
5.2.2 Auto-Negotiation ........................................................................................ 67
5.2.3 Transmit Rate............................................................................................. 68
5.2.4 Duplex Mode .............................................................................................. 69
5.2.5 Flow Control ............................................................................................... 70
5.2.6 Port Description.......................................................................................... 70
5.2.7 Traffic Statistics .......................................................................................... 71
5.2.7.1 Packet Statistics............................................................................................. 71
5.2.7.2 CPU Statistics................................................................................................72
5.2.7.3 Protocol Statistics ..........................................................................................73
5.2.8 Port Information.......................................................................................... 74
5.3 VDSL Port Configuration ...................................................................... 75
5.3.1 Modulation of VDSL Signal ........................................................................ 75
5.3.1.1 DMT Modulation ............................................................................................ 75
5.3.2 Configuring VDSL Port............................................................................... 76
5.3.2.1 Displaying Status of VDSL Port...................................................................... 77
5.3.2.2 Enabling VDSL Port.......................................................................................77
5.3.2.3 Profile of VDSL Port....................................................................................... 78
5.3.2.4 Controlling Power according to Connection Distance .................................... 79
5.3.2.5 PSD Level...................................................................................................... 83
5.3.2.6 PSD Mask Level ............................................................................................ 84
5.3.2.7 Interleave....................................................................................................... 84
5.3.2.8 Impulse Noise Protection ............................................................................... 86
5.3.2.9 Trellis Coded Modulation (TCM) .................................................................... 86
5.3.2.10 Ham-band ...................................................................................................... 87
5.3.2.11 SNR Margin ...................................................................................................88
5.3.2.12 Bitloading Per Tone........................................................................................ 90
5.3.2.13 G.handshake Tone......................................................................................... 91
5.3.3 VDSL Checking Errors of VDSL Port......................................................... 91
5.3.4 Config-Profile ............................................................................................. 95
5.3.4.1 Line config profile........................................................................................... 95
5.3.4.2 Alarm config profile ........................................................................................ 98
5.3.5 Configuring CPE ...................................................................................... 102
5.3.5.1 Modem Port Reset.......................................................................................102
5.3.5.2 Installing System Image of CPE .................................................................. 102
5.3.5.3 Installing CPE System Image File in Slave.................................................. 104
5.3.5.4 Configuring AGC (Auto Gain Control) ..........................................................106
5.3.5.5 Checking Length of Cable between CPE and CO .......................................107
5.3.5.6 Auto-negotiation of CPE ..............................................................................107
5.3.5.7 Transmit Rate of CPE..................................................................................107
5.3.5.8 Duplex mode of CPE ................................................................................... 107
5.3.5.9 Auto Upgrade of CPE Image .......................................................................108
6 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
5.3.5.10 Displaying CPE Status .................................................................................108
5.4 Port Mirroring ...................................................................................... 110
6 System Environment ...................................................................... 112
6.1 Environment Configuration ................................................................. 112
6.1.1 Host Name ................................................................................................ 112
6.1.2 Time and Date...........................................................................................11 2
6.1.3 Time Zone .................................................................................................113
6.1.4 Network Time Protocol (NTP) ................................................................... 113
6.1.5 Simple Network Time Protocol (SNTP).....................................................114
6.1.6 Terminal Configuration..............................................................................11 5
6.1.7 Login Banner............................................................................................. 115
6.1.8 DNS Server...............................................................................................116
6.1.9 Fan Operation ...........................................................................................117
6.1.10 Disabling Daemon Operation....................................................................11 7
6.1.11 FTP Server................................................................................................ 117
6.1.12 FTP Client address ...................................................................................11 8
6.1.13 System Threshold .....................................................................................118
6.1.13.1 CPU Load .................................................................................................... 118
6.1.13.2 Port Traffic.................................................................................................... 119
6.1.13.3 Fan Operation .............................................................................................. 119
6.1.13.4 System Temperature....................................................................................120
6.1.13.5 System Memory ...........................................................................................120
6.1.13.6 SFP Module (optional uplink port)................................................................121
6.2 Configuration Management................................................................. 123
6.2.1 Displaying System Configuration..............................................................123
6.2.2 Writing System Configuration ...................................................................123
6.2.3 Auto-Saving...............................................................................................124
6.2.4 System Configuration File.........................................................................124
6.2.5 Restoring Default Configuration................................................................125
6.3 System Management .......................................................................... 126
6.3.1 Network Connection..................................................................................126
6.3.2 IP ICMP Source Routing...........................................................................128
6.3.3 Tracing Packet Route................................................................................129
6.3.4 Displaying User Connecting to System ....................................................130
6.3.5 MAC Table.................................................................................................131
6.3.6 Running Time of System...........................................................................131
6.3.7 System Information ...................................................................................131
6.3.8 System Memory Information .....................................................................132
6.3.9 Running Process.......................................................................................132
6.3.10 Displaying System Image .........................................................................133
6.3.11 Displaying Installed OS.............................................................................133
6.3.12 Default OS.................................................................................................133
6.3.13 Switch Status.............................................................................................133
6.3.14 Tech Support Information..........................................................................134
6.3.15 System Boot Information...........................................................................134
7 Network Management.....................................................................135
7.1 Simple Network Management Protocol (SNMP) ................................. 135
7.1.1 SNMP Community.....................................................................................135
SMC7824M/VSW 7
CLI Management Guide
TigerAccess™ EE
7.1.2 Information of SNMP Agent...................................................................... 136
7.1.3 SNMP Com2sec....................................................................................... 137
7.1.4 SNMP Group............................................................................................ 137
7.1.5 SNMP View Record.................................................................................. 138
7.1.6 Permission to Access SNMP View Record .............................................. 138
7.1.7 SNMP Version 3 User .............................................................................. 139
7.1.8 SNMP Trap............................................................................................... 139
7.1.8.1 SNMP Trap Mode ........................................................................................ 139
7.1.8.2 SNMP Trap Host.......................................................................................... 140
7.1.8.3 SNMP Trap in Event Mode .......................................................................... 140
7.1.8.4 Disabling SNMP Trap...................................................................................141
7.1.8.5 Displaying SNMP Trap................................................................................. 142
7.1.9 SNMP Alarm............................................................................................. 143
7.1.9.1 Alarm Notify Activity ..................................................................................... 143
7.1.9.2 Alarm Severity Criterion............................................................................... 143
7.1.9.3 Default Alarm Severity .................................................................................144
7.1.9.4 Generic Alarm Severity ................................................................................ 144
7.1.9.5 ADVA Alarm Severity ...................................................................................146
7.1.9.6 ERP Alarm Severity ..................................................................................... 147
7.1.9.7 STP Guard Alarm Severity........................................................................... 147
7.1.9.8 Displaying SNMP Alarm Severity................................................................. 148
7.1.10 Displaying SNMP Configuration............................................................... 148
7.1.11 Disabling SNMP ....................................................................................... 148
7.2 Operation, Administration and Maintenance (OAM) ........................... 149
7.2.1 OAM Loopback ........................................................................................ 149
7.2.2 Local OAM Mode ..................................................................................... 150
7.2.3 OAM Unidirection ..................................................................................... 150
7.2.4 Remote OAM ........................................................................................... 150
7.2.5 Displaying OAM Configuration................................................................. 151
7.3 Link Layer Discovery Protocol (LLDP)................................................ 152
7.3.1 LLDP Operation ....................................................................................... 152
7.3.2 Enabling LLDP ......................................................................................... 152
7.3.3 LLDP Operation Type............................................................................... 153
7.3.4 Basic TLV ................................................................................................. 153
7.3.5 LLDP Message......................................................................................... 153
7.3.6 Reinitiating Delay ..................................................................................... 154
7.3.7 Displaying LLDP Configuration ................................................................ 154
7.4 Remote Monitoring (RMON) ............................................................... 155
7.4.1 RMON History .......................................................................................... 155
7.4.1.1 Source Port of Statistical Data ..................................................................... 156
7.4.1.2 Subject of RMON History............................................................................. 156
7.4.1.3 Number of Sample Data ..............................................................................156
7.4.1.4 Interval of Sample Inquiry ............................................................................ 157
7.4.1.5 Activating RMON History ............................................................................. 157
7.4.1.6 Deleting Configuration of RMON History .....................................................157
7.4.1.7 Displaying RMON History ............................................................................ 157
7.4.2 RMON Alarm ............................................................................................ 158
7.4.2.1 Subject of RMON Alarm............................................................................... 158
7.4.2.2 Object of Sample Inquiry.............................................................................. 158
7.4.2.3 Absolute and Delta Comparison .................................................................. 158
8 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
7.4.2.4 Upper Bound of Threshold ...........................................................................159
7.4.2.5 Lower Bound of Threshold ...........................................................................159
7.4.2.6 Standard of the First Alarm...........................................................................160
7.4.2.7 Interval of Sample Inquiry ............................................................................160
7.4.2.8 Activating RMON Alarm ...............................................................................160
7.4.2.9 Deleting Configuration of RMON Alarm........................................................161
7.4.3 RMON Event.............................................................................................161
7.4.3.1 Event Community.........................................................................................161
7.4.3.2 Event Description .........................................................................................161
7.4.3.3 Subject of RMON Event ...............................................................................162
7.4.3.4 Event Type ...................................................................................................162
7.4.3.5 Activating RMON Event ...............................................................................162
7.4.3.6 Deleting Configuration of RMON Event........................................................162
7.5 Syslog .................................................................................................163
7.5.1 Syslog Output Level..................................................................................163
7.5.2 Facility Code .............................................................................................165
7.5.3 Syslog Bind Address.................................................................................166
7.5.4 Debug Message for Remote Terminal ......................................................166
7.5.5 Disabling Syslog .......................................................................................166
7.5.6 Displaying Syslog Message ......................................................................166
7.5.7 Displaying Syslog Configuration ...............................................................167
7.6 Quality of Service(QoS) ...................................................................... 168
7.6.1 How to Operate QoS.................................................................................169
7.6.2 Packet Classification.................................................................................171
7.6.2.1 Flow Creation...............................................................................................171
7.6.2.2 Configuring Flow ..........................................................................................171
7.6.2.3 Applying and modifying Flow........................................................................174
7.6.2.4 Class Creation..............................................................................................174
7.6.3 Packet Conditioning ..................................................................................175
7.6.3.1 Policer Creation............................................................................................175
7.6.3.2 Packet Counter ............................................................................................176
7.6.3.3 Average Packet Counter ..............................................................................176
7.6.3.4 Rate-limit......................................................................................................177
7.6.3.5 Applying and modifying Policer ....................................................................178
7.6.4 Rule Action................................................................................................178
7.6.4.1 Policy Creation.............................................................................................178
7.6.4.2 Metering .......................................................................................................179
7.6.4.3 Policy Priority ...............................................................................................185
7.6.4.4 Policy Action.................................................................................................185
7.6.4.5 Marking and Remarking ...............................................................................185
7.6.4.6 Attaching a Policy to an interface.................................................................190
7.6.4.7 Applying and Modifying Policy......................................................................190
7.6.5 Displaying Rule .........................................................................................190
7.6.6 Admin Rule................................................................................................192
7.6.6.1 Creating Admin Flow for packet classification ..............................................192
7.6.6.2 Configuring Admin Flow ...............................................................................193
7.6.6.3 Applying and modifying Admin Flow.............................................................194
7.6.6.4 Class Creation..............................................................................................194
7.6.7 Admin Rule Action.....................................................................................195
7.6.7.1 Admin Policy Creation..................................................................................195
SMC7824M/VSW 9
CLI Management Guide
TigerAccess™ EE
7.6.7.2 Admin Policy Priority....................................................................................196
7.6.7.3 Admin Policy Action ..................................................................................... 196
7.6.7.4 Applying and Modifying Admin Policy .......................................................... 197
7.6.8 Displaying Admin Rule ............................................................................. 197
7.6.9 Scheduling Algorithm ............................................................................... 198
7.6.9.1 Scheduling Mode ......................................................................................... 200
7.6.9.2 Weight.......................................................................................................... 200
7.6.9.3 Maximum and Minimum Bandwidth ............................................................. 200
7.6.9.4 Maximum Buffer numbers............................................................................ 201
7.6.9.5 Queue Status...............................................................................................202
7.6.9.6 Displaying QoS ............................................................................................ 202
7.6.9.7 Weighted Random Early Detection (WRED)................................................ 203
7.7 NetBIOS Filtering................................................................................ 205
7.8 Max New Hosts .................................................................................. 206
7.9 Port Security ....................................................................................... 207
7.9.1 Port Security on Port ................................................................................ 207
7.9.2 Port Security Aging................................................................................... 208
7.9.3 Displaying Port Security........................................................................... 209
7.10 MAC Table.......................................................................................... 209
7.11 MAC Filtering...................................................................................... 210
7.11.1 Default Policy of MAC Filtering ................................................................ 210
7.11.2 Adding Policy of MAC Filter ......................................................................211
7.11.3 Deleting MAC Filter Policy ....................................................................... 212
7.11.4 Listing of MAC Filter Policy ...................................................................... 212
7.12 Address Resolution Protocol (ARP) ................................................... 213
7.12.1 ARP Table ................................................................................................ 213
7.12.1.1 Registering ARP Table ................................................................................. 213
7.12.1.2 Displaying ARP Table................................................................................... 214
7.12.2 ARP Alias ................................................................................................. 214
7.12.3 ARP Inspection......................................................................................... 215
7.12.3.1 ARP Access List ..........................................................................................215
7.12.3.2 Enabling ARP Inspection Filtering................................................................ 218
7.12.3.3 ARP Address Validation............................................................................... 218
7.12.3.4 ARP Inspection on Trust Port....................................................................... 219
7.12.3.5 ARP Inspection Log-buffer........................................................................... 219
7.12.3.6 Displaying ARP Inspection........................................................................... 220
7.12.4 Gratuitous ARP ........................................................................................ 220
7.12.5 Proxy-ARP ............................................................................................... 222
7.13 ICMP Message Control ...................................................................... 223
7.13.1 Blocking Echo Reply Message ................................................................ 224
7.13.2 Interval for Transmit ICMP Message........................................................ 224
7.14 TCP Flag Control................................................................................ 226
7.14.1 RST Configuration.................................................................................... 226
7.14.2 SYN Configuration ................................................................................... 226
7.15 Packet Dump ...................................................................................... 226
7.15.1 Packet Dump by Protocol......................................................................... 227
7.15.2 Packet Dump with Option......................................................................... 227
7.15.3 Debug Packet Dump ................................................................................ 228
7.16 sFlow Monitoring ................................................................................ 229
10 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
7.16.1 sFlow Service............................................................................................230
7.16.2 Agent IP Address ......................................................................................230
7.16.3 Enabling sFlow on Port .............................................................................231
7.16.4 Maximum IP Header Size .........................................................................231
7.16.5 Counter Interval ........................................................................................231
7.16.6 Sample Rate .............................................................................................231
7.16.7 Configuring Receiver ................................................................................232
7.16.7.1 Receiver ID mode ........................................................................................232
7.16.7.2 Collect IP address and port..........................................................................232
7.16.7.3 Maximum Datagram Size.............................................................................232
7.16.7.4 Owner Name of sFlow Receiver...................................................................232
7.16.7.5 Timeout ........................................................................................................233
7.16.8 Receiver Index ..........................................................................................233
7.16.9 Displaying sFlow .......................................................................................233
8 System Main Functions..................................................................234
8.1 Virtual Local Area Network (VLAN)..................................................... 234
8.1.1 Port-based VLAN ......................................................................................235
8.1.1.1 Creating VLAN .............................................................................................236
8.1.1.2 Specifying PVID ...........................................................................................236
8.1.1.3 Assigning Port to VLAN................................................................................236
8.1.1.4 Deleting VLAN..............................................................................................236
8.1.2 Protocol-based VLAN ...............................................................................237
8.1.3 MAC-based VLAN.....................................................................................237
8.1.4 Subnet-based VLAN .................................................................................238
8.1.5 Tagged VLAN ............................................................................................238
8.1.6 VLAN Description......................................................................................239
8.1.7 VLAN Precedence ....................................................................................240
8.1.8 Displaying VLAN Information ....................................................................240
8.1.9 QinQ..........................................................................................................241
8.1.9.1 Double Tagging Operation............................................................................242
8.1.9.2 Double Tagging Configuration......................................................................242
8.1.9.3 TPID Configuration.......................................................................................243
8.1.10 Layer 2 Isolation........................................................................................243
8.1.10.1 Shared VLAN ...............................................................................................244
8.1.11 VLAN Translation ......................................................................................246
8.1.12 Sample Configuration ...............................................................................246
8.2 Link Aggregation .................................................................................251
8.2.1 Port Trunk..................................................................................................251
8.2.1.1 Configuring Port Trunk .................................................................................251
8.2.1.2 Disabling Port Trunk.....................................................................................252
8.2.1.3 Displaying Port Trunk...................................................................................252
8.2.2 Link Aggregation Control Protocol (LACP) ...............................................252
8.2.2.1 Configuring LACP ........................................................................................253
8.2.2.2 Operation Mode ...........................................................................................254
8.2.2.3 Priority of Switch ..........................................................................................254
8.2.2.4 Manual Aggregation .....................................................................................254
8.2.2.5 BPDU Transmission Rate ............................................................................255
8.2.2.6 Administrational Key ....................................................................................255
8.2.2.7 Port Priority ..................................................................................................256
8.2.2.8 Displaying LACP Configuration ....................................................................256
SMC7824M/VSW 11
CLI Management Guide
TigerAccess™ EE
8.3 Spanning-Tree Protocol (STP)............................................................ 257
8.3.1 STP Operation ......................................................................................... 258
8.3.2 RSTP Operation....................................................................................... 262
8.3.2.1 Port States................................................................................................... 262
8.3.2.2 BPDU Policy ................................................................................................ 263
8.3.2.3 Rapid Network Convergence ....................................................................... 263
8.3.2.4 Compatibility with 802.1d............................................................................. 266
8.3.3 MSTP Operation ...................................................................................... 266
8.3.3.1 MSTP........................................................................................................... 267
8.3.4 Enabling STP Function (Required) .......................................................... 268
8.3.5 Configuring MSTP/PVSTP Mode............................................................. 269
8.3.6 STP Basic Configuration.......................................................................... 269
8.3.6.1 Path-cost Method......................................................................................... 269
8.3.6.2 Edge Ports ................................................................................................... 270
8.3.6.3 BPDU Transmit hold count........................................................................... 271
8.3.6.4 Port Priority .................................................................................................. 271
8.3.6.5 Link Type ..................................................................................................... 272
8.3.6.6 Displaying Configuration.............................................................................. 272
8.3.7 Configuring MSTP.................................................................................... 273
8.3.7.1 Root Switch.................................................................................................. 273
8.3.7.2 Path-cost...................................................................................................... 273
8.3.7.3 Port Priority .................................................................................................. 274
8.3.7.4 MST Region.................................................................................................274
8.3.7.5 Enabling MSTP configuration ......................................................................276
8.3.7.6 Displaying Configuration.............................................................................. 276
8.3.8 Configuring PVSTP .................................................................................. 277
8.3.8.1 Enabling PVSTP .......................................................................................... 277
8.3.8.2 Root Switch.................................................................................................. 278
8.3.8.3 Path-cost...................................................................................................... 278
8.3.8.4 Port Priority .................................................................................................. 279
8.3.8.5 Displaying Configuration.............................................................................. 279
8.3.9 Root Guard............................................................................................... 280
8.3.10 Restarting Protocol Migration................................................................... 281
8.3.11 Loop Back Detection................................................................................ 281
8.3.12 BPDU Configuration................................................................................. 282
8.3.12.1 Hello Time.................................................................................................... 283
8.3.12.2 Forward Delay Time..................................................................................... 283
8.3.12.3 Max Age....................................................................................................... 284
8.3.12.4 BPDU Hop Count......................................................................................... 284
8.3.12.5 BPDU Filtering ............................................................................................. 285
8.3.12.6 BPDU Guard................................................................................................285
8.3.13 Sample Configuration............................................................................... 287
8.4 Ethernet Ring Protection (ERP).......................................................... 289
8.4.1 ERP Mechanism ...................................................................................... 289
8.4.2 Loss of Test Packet (LOTP) ..................................................................... 293
8.4.3 ERP Shared Link...................................................................................... 293
8.4.4 Configuring ERP Domain......................................................................... 294
8.4.4.1 ERP Domain Name...................................................................................... 294
8.4.4.2 Primary and Secondary Port........................................................................ 294
8.4.4.3 Protected VLAN ........................................................................................... 294
8.4.4.4 Control VLAN...............................................................................................295
12 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
8.4.4.5 ERP Ring Priority .........................................................................................295
8.4.4.6 Displaying ERP Domian...............................................................................295
8.4.5 Selecting the Node....................................................................................296
8.4.6 Protected Activation ..................................................................................296
8.4.7 Manual Switch to Secondary ....................................................................296
8.4.8 Wait-to-Restore Time................................................................................297
8.4.9 Learning Disable Time ..............................................................................297
8.4.10 Test Packet Interval...................................................................................298
8.4.11 LOTP Hold Off Time ..................................................................................298
8.4.12 ERP Trap...................................................................................................299
8.4.13 Displaying ERP Configuration...................................................................299
8.5 Loop Detection....................................................................................300
8.6 Dynamic Host Configuration Protocol (DHCP) ................................... 302
8.6.1 DHCP Server ............................................................................................303
8.6.1.1 DHCP Pool Creation .................................................................................... 304
8.6.1.2 DHCP Subnet...............................................................................................304
8.6.1.3 Range of IP Address ....................................................................................304
8.6.1.4 Default Gateway...........................................................................................305
8.6.1.5 IP Lease Time ..............................................................................................305
8.6.1.6 DNS Server..................................................................................................306
8.6.1.7 Manual Binding ............................................................................................306
8.6.1.8 Domain Name ..............................................................................................307
8.6.1.9 DHCP Server Option....................................................................................307
8.6.1.10 Static Mapping..............................................................................................307
8.6.1.11 Recognition of DHCP Client.........................................................................308
8.6.1.12 IP Address Validation ...................................................................................308
8.6.1.13 Authorized ARP............................................................................................309
8.6.1.14 Prohibition of 1:N IP Address Assignment....................................................309
8.6.1.15 Ignoring BOOTP Request ............................................................................310
8.6.1.16 DHCP Packet Statistics................................................................................310
8.6.1.17 Setting DHCP Pool Size............................................................................... 311
8.6.1.18 Displaying DHCP Pool Configuration ........................................................... 311
8.6.2 DHCP Address Allocation with Option 82 .................................................311
8.6.2.1 DHCP Class Capability ................................................................................312
8.6.2.2 DHCP Class Creation ..................................................................................312
8.6.2.3 Relay Agent Information Pattern ..................................................................312
8.6.2.4 Associating DHCP Class..............................................................................313
8.6.2.5 Range of IP Address for DHCP Class ..........................................................313
8.6.3 DHCP Lease Database.............................................................................313
8.6.3.1 DHCP Database Agent.................................................................................313
8.6.3.2 Displaying DHCP Lease Status....................................................................314
8.6.3.3 Deleting DHCP Lease Database.................................................................. 314
8.6.4 DHCP Relay Agent ...................................................................................315
8.6.4.1 DHCP Helper Address..................................................................................315
8.6.4.2 Smart Relay Agent Forwarding ....................................................................316
8.6.4.3 DHCP Server ID Option ...............................................................................316
8.6.4.4 DHCP Relay Statistics..................................................................................317
8.6.5 DHCP Option ............................................................................................318
8.6.5.1 Entering DHCP Option Mode .......................................................................318
8.6.5.2 Configuring DHCP Option Format................................................................319
8.6.5.3 Deleting DHCP Option Format .....................................................................319
SMC7824M/VSW 13
CLI Management Guide
TigerAccess™ EE
8.6.5.4 Displaying DHCP option ..............................................................................319
8.6.6 DHCP Option 82 ...................................................................................... 320
8.6.6.1 Enabling DHCP Option 82 ........................................................................... 321
8.6.6.2 Option 82 Sub-Option .................................................................................. 321
8.6.6.3 Option 82 Reforwarding Policy ....................................................................322
8.6.6.4 Option 82 Trust Policy.................................................................................. 323
8.6.7 DHCP Snooping....................................................................................... 323
8.6.7.1 Enabling DHCP Snooping............................................................................ 324
8.6.7.2 DHCP Trust State......................................................................................... 324
8.6.7.3 DHCP Rate Limit ......................................................................................... 325
8.6.7.4 DHCP Lease Limit .......................................................................................325
8.6.7.5 Source MAC Address Verification ................................................................ 326
8.6.7.6 Static DHCP Snooping Binding.................................................................... 326
8.6.7.7 DHCP Snooping Database Agent ................................................................ 326
8.6.7.8 DHCP Snooping Filtering............................................................................. 327
8.6.7.9 Authorized ARP ........................................................................................... 328
8.6.7.10 DHCP Snooping with Option82.................................................................... 329
8.6.7.11 DHCP Snooping Option ............................................................................... 329
8.6.7.12 DHCP User Class ID.................................................................................... 330
8.6.7.13 Displaying DHCP Snooping Configuration................................................... 331
8.6.8 IP Source Guard ...................................................................................... 331
8.6.8.1 Enabling IP Source Guard ........................................................................... 332
8.6.8.2 Static IP Source Binding ..............................................................................332
8.6.8.3 Displaying IP Source Guard Configuration ..................................................333
8.6.9 DHCP Client............................................................................................. 334
8.6.9.1 Enabling DHCP Client.................................................................................. 334
8.6.9.2 DHCP Client ID............................................................................................334
8.6.9.3 DHCP Class ID ............................................................................................ 334
8.6.9.4 Host Name................................................................................................... 334
8.6.9.5 IP Lease Time..............................................................................................335
8.6.9.6 Requesting Option ....................................................................................... 335
8.6.9.7 Forcing Release or Renewal of DHCP Lease.............................................. 335
8.6.9.8 Displaying DHCP Client Configuration......................................................... 335
8.6.10 DHCP Filtering ......................................................................................... 336
8.6.10.1 DHCP Packet Filtering................................................................................. 336
8.6.10.2 DHCP Server Packet Filtering .....................................................................336
8.6.11 Debugging DHCP..................................................................................... 337
8.7 Single IP Management ....................................................................... 338
8.7.1 Switch Group............................................................................................ 338
8.7.2 Designating Master and Slave Switch ..................................................... 339
8.7.3 Disabling Stacking.................................................................................... 339
8.7.4 Displaying Stacking Status....................................................................... 339
8.7.5 Accessing to Slave Switch from Master Switch ....................................... 340
8.7.6 Sample Configuration............................................................................... 340
8.8 Rate Limit ........................................................................................... 342
8.9 Flood Guard........................................................................................ 343
8.9.1 MAC Flood-Guard .................................................................................... 343
8.9.2 CPU Flood-Guard .................................................................................... 344
8.9.3 Port Flood-Guard ..................................................................................... 345
8.10 Storm Control...................................................................................... 346
14 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
8.11 Jumbo Frame Capacity....................................................................... 346
8.12 Bandwidth ........................................................................................... 347
8.13 Maximum Transmission Unit (MTU).................................................... 347
9 IP Multicast ......................................................................................348
9.1 Multicast Group Membership .............................................................. 349
9.1.1 IGMP Basic ...............................................................................................349
9.1.1.1 Clearing IGMP Entry ....................................................................................350
9.1.1.2 IGMP Debug ................................................................................................350
9.1.2 IGMP Version 2 .........................................................................................351
9.1.2.1 IGMP Static Join...........................................................................................352
9.1.3 IGMP Version 3 .........................................................................................353
9.2 Multicast Functions .............................................................................354
9.2.1 Multicast Forwarding Database ................................................................354
9.2.1.1 Blocking Unknown Multicast Traffic..............................................................355
9.2.1.2 Forwarding Entry Aging................................................................................ 355
9.2.1.3 Displaying McFDB Information.....................................................................355
9.2.2 IGMP Snooping Basic...............................................................................356
9.2.2.1 Enabling IGMP Snooping.............................................................................357
9.2.2.2 IGMP Snooping Version...............................................................................357
9.2.2.3 IGMP Snooping Robustness Value ..............................................................358
9.2.3 IGMPv2 Snooping.....................................................................................358
9.2.3.1 IGMP Snooping Querier Configuration.........................................................358
9.2.3.2 IGMP Snooping Last Member Query Interval...............................................360
9.2.3.3 IGMP Snooping Immediate Leave ...............................................................361
9.2.3.4 IGMP Snooping Report Suppression ...........................................................362
9.2.3.5 IGMP Snooping S-Query Report Agency .....................................................362
9.2.3.6 Explicit Host Tracking...................................................................................363
9.2.3.7 Multicast Router Port Configuration .............................................................364
9.2.3.8 TCN Multicast Flooding................................................................................366
9.2.4 IGMPv3 Snooping.....................................................................................367
9.2.5 Displaying IGMP Snooping Information....................................................368
9.2.6 Multicast VLAN Registration (MVR)..........................................................369
9.2.6.1 Enabling MVR ..............................................................................................369
9.2.6.2 MVR Group ..................................................................................................369
9.2.6.3 Source/Receiver Port ...................................................................................370
9.2.6.4 MVR Helper Address....................................................................................370
9.2.6.5 Displaying MVR Configuration .....................................................................370
9.2.7 IGMP Filtering and Throttling ....................................................................371
9.2.7.1 IGMP Filtering ..............................................................................................371
9.2.7.2 IGMP Throttling ............................................................................................373
9.2.7.3 Displaying IGMP Filtering and Throttling......................................................373
9.2.8 Multicast-Source Trust Port.......................................................................373
10 System Software Upgrade.............................................................. 375
10.1 General Upgrade ................................................................................375
10.2 Boot Mode Upgrade............................................................................376
10.3 FTP Upgrade ......................................................................................379
11 Abbreviations.................................................................................. 381
SMC7824M/VSW 15
CLI Management Guide
TigerAccess™ EE
Illustrations
Fig. 2.1 The front view of switch................................................................................. 22
Fig. 3.1 Overview of Configuration Mode................................................................... 31
Fig. 4.1 Process of 802.1x Authentication.................................................................. 58
Fig. 4.2 Multiple Authentication Servers..................................................................... 59
Fig. 5.1 Transmission in DSL System ........................................................................ 75
Fig. 5.2 DMT Modulation ............................................................................................ 76
Fig. 5.3 Deciding Transmit Rate according to SNR Margin........................................ 89
Fig. 5.4 Counting Times of Error ................................................................................ 92
Fig. 5.5 Port Mirroring................................................................................................110
Fig. 6.1 Ping Test for Network Status ....................................................................... 128
Fig. 6.2 IP Source Routing ....................................................................................... 129
Fig. 7.1 Procedure of QoS operation........................................................................ 169
Fig. 7.2 Structure of Rule.......................................................................................... 170
Fig. 7.3 Token Bucket Meter..................................................................................... 180
Fig. 7.4 Behavior of srTCM (1) ................................................................................. 181
Fig. 7.5 Behavior of srTCM (2) ................................................................................. 181
Fig. 7.6 Bahavior of srTCM (3) ................................................................................. 182
Fig. 7.7 Behavior of trTCM (1).................................................................................. 183
Fig. 7.8 Behavior of trTCM (2).................................................................................. 183
Fig. 7.9 Behavior of trTCM (3).................................................................................. 184
Fig. 7.10 Marking and Remarking .............................................................................. 186
Fig. 7.11 Strict Priority Queuing.................................................................................. 198
Fig. 7.12 Deficit Weighted Round Robin .................................................................... 199
Fig. 7.13 WRED Packet Drop Probability................................................................... 203
Fig. 7.14 NetBIOS Filtering ........................................................................................ 205
Fig. 7.15 Proxy-ARP................................................................................................... 222
Fig. 7.16 ICMP Message Structure ............................................................................ 223
Fig. 7.17 sFlow Structure............................................................................................ 229
Fig. 7.18 sFlow Agent Diagram .................................................................................. 229
Fig. 8.1 Port-based VLAN ........................................................................................ 235
Fig. 8.2 Subnet-based VLAN.................................................................................... 238
Fig. 8.3 Example of QinQ Configuration................................................................... 241
Fig. 8.4 QinQ Frame................................................................................................. 241
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment .................... 244
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1)............... 245
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2)............... 245
Fig. 8.8 Link Aggregation.......................................................................................... 251
Fig. 8.9 Example of Loop ......................................................................................... 257
Fig. 8.10 Principle of Spanning Tree Protocol ............................................................ 258
Fig. 8.11 Root Switch ................................................................................................. 259
Fig. 8.12 Designated Switch....................................................................................... 260
Fig. 8.13 Port Priority.................................................................................................. 261
Fig. 8.14 Port State..................................................................................................... 261
Fig. 8.15 Alternate Port and Backup port ................................................................... 262
Fig. 8.16 Example of Receiving Low BPDU............................................................... 263
Fig. 8.17 Network Convergence of 802.1d................................................................. 264
Fig. 8.18 Network Convergence of 802.1w (1)........................................................... 264
Fig. 8.19 Network Convergence of 802.1w (2)........................................................... 265
Fig. 8.20 Network Convergence of 802.1w (3)........................................................... 265
16 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
Fig. 8.21 Compatibility with 802.1d (1)........................................................................266
Fig. 8.22 Compatibility with 802.1d (2)........................................................................266
Fig. 8.23 CST and IST of MSTP (1) ............................................................................267
Fig. 8.24 CST and IST of MSTP (2) ............................................................................268
Fig. 8.25 Example of PVSTP.......................................................................................277
Fig. 8.26 Root Guard...................................................................................................280
Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment........................287
Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment........................288
Fig. 8.29 ERP Operation in case of Linnk Failure.......................................................291
Fig. 8.30 Ring Protection.............................................................................................291
Fig. 8.31 Link Failure Recovery ..................................................................................292
Fig. 8.32 Ring Recovery..............................................................................................292
Fig. 8.33 Shared Link ..................................................................................................293
Fig. 8.34 DHCP Service Structure...............................................................................302
Fig. 8.35 Example of DHCP Relay Agent....................................................................315
Fig. 8.36 DHCP Option 82 Operation..........................................................................321
Fig. 8.37 DHCP Server Packet Filtering......................................................................337
Fig. 8.38 Example of Single IP management..............................................................338
Fig. 8.39 Rate Limit and Flood Guard .........................................................................343
Fig. 9.1 IGMP Snooping in the L2 network ...............................................................348
Fig. 9.2 IGMP Snooping............................................................................................356
SMC7824M/VSW 17
CLI Management Guide
TigerAccess™ EE
Tables
Tab. 1.1 Overview of Chapters.................................................................................... 19
Tab. 1.2 Command Notation of Guide Book................................................................ 20
Tab. 3.1 Main Command of Privileged EXEC View Mode .......................................... 26
Tab. 3.2 Main Command of Privileged EXEC Enable Mode....................................... 26
Tab. 3.3 Main Command of Global Configuration Mode............................................. 27
Tab. 3.4 Main Command of Bridge Configuration Mode............................................. 28
Tab. 3.5 Main Command of DHCP Pool Configuration Mode..................................... 28
Tab. 3.6 Main Command of DHCP Option Configuration Mode.................................. 29
Tab. 3.7 Main Command of DHCP Option 82 Configuration Mode............................. 29
Tab. 3.8 Main Command of Interface Configuration Mode ......................................... 30
Tab. 3.9 The Commands of Rule Configuration Mode................................................ 30
Tab. 3.10 Main Command of RMON Configuration Mode ............................................ 31
Tab. 3.11 Command Abbreviation ................................................................................. 35
Tab. 5.1 Information displayed by Command, show lre .............................................. 77
Tab. 5.2 Profile of VDSL Port ...................................................................................... 78
Tab. 5.3 Option band of VDSL Port............................................................................. 79
Tab. 5.4 Value of PBO-Length..................................................................................... 81
Tab. 5.5 The frequency of PSD Level per band .......................................................... 83
Tab. 5.6 The Value of PSD Mask Level....................................................................... 84
Tab. 5.7 Bandwidth of Ham band Frequency.............................................................. 88
Tab. 5.8 Sub-commands in Bitloading Per Tone ......................................................... 91
Tab. 5.9 NOS Download............................................................................................ 109
Tab. 6.1 World Time Zone ..........................................................................................11 3
Tab. 6.2 Options for Ping........................................................................................... 126
Tab. 6.3 Options for Ping for Multiple IP Addresses.................................................. 127
Tab. 6.4 Options for Tracing Packet Route ............................................................... 130
Tab. 7.1 ICMP Message Type ................................................................................... 223
Tab. 7.2 Mask Calculation of Default Value............................................................... 225
Tab. 7.3 Options for Packet Dump ............................................................................ 227
Tab. 8.1 Advantages and Disadvantages of Tagged VLAN ...................................... 239
Tab. 8.2 STP Path-cost (short).................................................................................. 269
Tab. 8.3 RSTP Path-cost (long) ................................................................................ 270
18 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE

1 Introduction

1.1 Audience

This manual is intended for Ethernet/IP DSLAM operators and maintenance personnel for providers of Digital Subscriber Line(DSL) and Ethernet services. This manual assumes that you are familiar with the following:
Ethernet networking technology and standards
Internet topologies and protocols
DSL technology and standards
Usage and functions of graphical user interfaces.

1.2 Document Structure

Tab. 1.1 briefly describes the structure of this document.
Chapter Description
1 Introduction Introduces the overall information of the document.
2 System Overview Introduces the switch system. It also lists the features of the system.
3 Command Line Interface (CLI) Describes how to use the Command Line Interface (CLI).
4 System Connection and IP Address Describes how to manage the system account and IP address.
5 Port Configuration Describes how to configure the Ethernet or VDSL ports.
6 System Environment
7 Network Management Describes how to configure the network management functions.
8 System Main Functions Describes how to configure the system main functions.
9 IP Multicast Describes how to configure the IP multicast functions.
10 System Software Upgrade Describes how to upgrade the system software.
11 Abbreviations
Describes how to configure the system environment and manage-
ment functions.
Lists all abbreviations and acronyms which appear in this docu-
ment.
Tab. 1. 1 Overview of Chapters
SMC7824M/VSW 19
CLI Management Guide
TigerAccess™ EE

1.3 Document Convention

This guide uses the following conventions to convey instructions and information.
Information
i
and means reader take note. Notes contain helpful suggestions or references.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury
This information symbol provides useful information when using commands to configure
!
or broke the equipment. Before you work on any equipment, be aware of the hazards in­volved with electrical circuitry and be familiar with standard practices for preventing acci­dents by making quick guide based on this guide.

1.4 Document Notation

The following table shows commands used in guide book. Please be aware of each command to use them correctly.
Notation Description
a Commands you should use as is.
NAME, PROFILE, VALUE, … Variables for which you supply values.
PORTS For entry this variable, see Section 5.1.
[ ]
< > Range of number that you can use.
{ }
| Optional variables are separated by vertical bars |.
Commands or variables that appear within square brackets [ ] are
optional.
A choice of required keywords appears in braces { }. You must se-
lect one.
Tab. 1. 2 Command Notation of Guide Book
20 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE

1.5 Virus Protection

To prevent a virus infection you may not use any software other than that which is re-
!
!
leased for the Operating System (OS based on Basis Access Integrator), Local Craft Terminal (LCT) and transmission system.
Even when exchanging data via network or external data media(e.g. floppy disks) there is a possibility of infecting your system with a virus. The occurrence of a virus in your sys­tem may lead to a loss of data and breakdown of functionality.
The operator is responsible for protecting against viruses, and for carrying out repair pro­cedures when the system is infected.
You have to do the following:
You have to check every data media (used data media as well as new ones) for virus before reading data from it.
You must ensure that a current valid virus scanning program is always available. This program has to be supplied with regular updates by a certified software.
It is recommended that you make periodic checks against viruses in your OS.
At the LCT it is recommended to integrate the virus scanning program into the startup
sequence.

1.6 CE Declaration of Conformity

The CE declaration of the product will be fulfilled if the construction and cabling is under­taken in accordance with the manual and the documents listed there in, e.g. mounting in­structions, cable lists where necessary account should be taken of project-specific docu­ments.
Deviations from the specifications or unstipulated changes during construction, e.g. the use of cable types with lower screening values can lead to violation of the CE require­ments. In such case the conformity declaration is invalidated and the responsibility passes to those who have caused the deviations.
This is a class A product. In a domestic environment this product may cause radio refer-
!
ence in which case the user may be required to take adequate measures.
SMC7824M/VSW 21
CLI Management Guide
TigerAccess™ EE

2 System Overview

The switch, which is IP VDSL, uses VDSL (Very high-data rate Digital Subscriber Line) technologies so that users can be served voice communication and data communication at the same time through existing telephone line. Since VDSL technology takes the tele­phone line, you do not need to install LAN line newly. Therefore, you can save the cost and provide advanced service for users in apartments, buildings, and hotels.
The switch supports maximum 100Mbps of upload and 100Mbps down load in case of Symmetric, and up to 50 Mbps of upload and 100 Mbps of download or 10VLR Mbps of upload 50VLR Mbps of download in case of Asymmetric.
The switch offers 24-Port VDSL2 service interface and fixed 2-Port 10/100/1000Base-T and 1-slot for option uplink module. Note – The uplink module is not used in the first re­lease.
Managed switches, as IP-VDSL of Layer 2 switch, supports VLAN, Rate limit, port trunk­ing, port mirroring, IGMP snooping, and packet filtering.
Fig. 2.1 shows the front view of the switch.
Fig. 2.1 The front view of switch
22 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE

2.1 System Features

The following introduces the main features of the VDSL2 system which provides Layer 2 switching, Ethernet switching and related functions.
Virtual Local Area Network (VLAN)
Virtual local area network (VLAN) is made by dividing one network into several logical networks. Packet cannot be transmitted and received between different VLANs. There­fore, it can prevent needless packets accumulating and strengthen security. The switch recognizes 802.1Q tagged frame and supports maximum 4096 VLANs. Port based, Pro­tocol based, MAC based and Subnet based VLANs are supported in the switch.
Quality of Service (QoS)
For the switch, QoS-based forwarding sorts traffic into a number of classes and marks the packets accordingly. Thus, different quality of service is provided to each class, which the packets belong to. The rich QoS capabilities enable network managers to protect mission­critical applications and support differentiated level of bandwidth for managing traffic con­gestion. The switch supports ingress and egress (shaping) rate limiting, and different scheduling type such as SP (Strict Priority) and DWRR (Weighted Deficit Round Robin).
IP Multicast
Because broadcasting in a LAN is restricted if possible, multicasting could be used in­stead of broadcasting by forwarding multicast packets only to the member hosts who joined multicast group. The switch provides IGMPv2 and IGMP snooping for host mem­bership management.
SNMP
Simple network management protocol (SNMP) is to manage Network Elements using TCP/IP protocol. The switch supports SNMP version 1, 2, 3 and Remote Monitoring (RMON). Network operator can use MIB also to monitor and manage the switch.
Dynamic Host Configuration Protocol (DHCP)
The switch supports Dynamic Host Configuration Protocol (DHCP) server that automati­cally assigns IP address to clients accessed to network. That means it has IP address pool, and operator can effectively utilize limited IP source by leasing temporary IP ad­dress. In layer 3 network, DHCP request packet can be sent to DHCP server via DHCP relay and option 82.
Spanning Tree Protocol (STP)
To prevent loop and preserve backup route in Layer 2 network, the switch supports span­ning tree protocol (STP) defined in IEEE 802.1D. Between STP enabled switches, a root bridge is automatically selected and the network remains in tree topology. But the recov­ery time in STP is very slow (about 30 seconds), rapid spanning tree protocol (RSTP) is also provided. IEEE 802.1w defines the recovery time as 2 seconds. If there is only one
SMC7824M/VSW 23
CLI Management Guide
TigerAccess™ EE
VLAN in the network, traditional STP works. However in more than one VLAN network, STP cannot work per VLAN. To avoid this problem, the switch supports multiple spanning tree protocol (MSTP) IEEE 802.1s.
Trunking & Link Aggregation Control Protocol (LACP)
The switch aggregates several physical interfaces into one logical port (aggregate port). Port trunk aggregates interfaces with the standard of same speed, same duplex mode, and same VLAN ID.
The switch supports link aggregation control protocol (LACP), complying with IEEE
802.3ad, which aggregates multiple links of equipments to use more enlarged bandwidth.
System Management based on CLI
It is easy for users who administer system by using telnet or console port to configure the functions for system operating through CLI. CLI is easy to configure the needed functions after looking for available commands by help menu different with UNIX.
Broadcast Storm Control
Broadcast storm control is, when too much of broadcast packets are being transmitted to network, a situation of network timeout because the packets occupy most of transmit ca­pacity. switch supports broadcast and multicast storm control, which disuses flooding packet, that exceed the limit during the time configured by user.
Outband Management Interface
The switch can connect to equipments at remote place by assigning IP address to MGMT interface. Since MGMT interface is operated regardless of status of service port, it is still possible to configure and manage equipment at remote place.
RADIUS and TACACS+
The switch supports client authentication protocol, that is RADIUS (Remote Authentica­tion Dial-In User Service) and TACACS+ (Terminal Access Controller Access Control Sys­tem Plus). Not only user IP and password registered in switch but also authentication through RADIUS server and TACACS+ server are required to access. So security of sys­tem and network management is strengthened.
Secure Shell (SSH)
Network security is getting more important because the access network has been gener­alized among numerous users. Secure shell (SSH) is a network protocol that allows es­tablishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and to allow the remote computer to authenticate the user.
24 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE

3 Command Line Interface (CLI)

The switch enables system administrators to manage the switch by providing the com­mand line interface (CLI). This user-friendly CLI provides you with a more convenient management environment.
To manage the system with the CLI, a management network environment is required. The switch can connect to the management network either directly (outband) or through the access network (inband). It can even connect using a combination of the two; for example, a cascaded switch connects inband to the cascading switch, and then from the cascading switch to the management network through the outband interface.
The switch also provides the RS232 console interface to simply access the system with a provided RJ45-to-DB9 cable.
This chapter describes a basic instruction for using the command line interface (CLI) which is used for managing the system.
Configuration Mode
Configuration Mode Overview
Useful Tips

3.1 Configuration Mode

You can configure and manage the switch with the CLI via a management network envi­ronment or the console interface.
The CLI provides the following command modes:
Privileged EXEC View Mode
Privileged EXEC Enable Mode
Global Configuration Mode
Bridge Configuration Mode
DHCP Pool Configuration Mode
DHCP Option 82 Configuration Mode
Interface Configuration Mode
Rule Configuration Mode
RMON Configuration Mode
SMC7824M/VSW 25
CLI Management Guide
TigerAccess™ EE

3.1.1 Privileged EXEC View Mode

When you log in to the switch, the CLI will start with Privileged EXEC View mode which is a read-only mode. In this mode, you can see a system configuration and information with several commands.
Tab. 3.1 shows main command of Privileged EXEC View mode.
Command Description
enable Opens Privileged EXEC Enable mode.
exit Logs out the switch.
show Shows a system configuration and information.
Tab. 3. 1 Main Command of Privileged EXEC View Mode

3.1.2 Privileged EXEC Enable Mode

To configure the switch, you need to open Privileged EXEC Enable mode with the enable command, then the system prompt will changes from SWITCH> to SWITCH#.
Command Mode Description
enable View Opens Privileged EXEC Enable mode.
You can set a password to Privileged EXEC Enable mode to enhance security. Once set- ting a password, you should enter a configured password, when you open Privileged EX- EC Enable mode.
Tab. 3.2 shows main commands of Privileged EXEC Enable mode.
Command Description
clock Sets a system time and date.
configure terminal Opens Global Configuration mode.
reload Reboots the system.
telnet Connects to a remote host through telnet.
terminal length Configures the number of lines of the current terminal.
traceroute Traces a packet route.
where Displays users accessing the system via telnet or console.
Tab. 3. 2 Main Command of Privileged EXEC Enable Mode
26 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE

3.1.3 Global Configuration Mode

In Global Configuration mode, you can configure general functions of the system. You can also open another configuration mode from this mode.
To open Global Configuration mode, enter the configure terminal command, and then the system prompt will be changed from SWITCH# to SWITCH(config)#.
Command Mode Description
configure terminal Enable Opens Global Configuration mode.
Tab. 3.3 shows main commands of Global Configuration mode.
Command Description
bridge Opens Bridge Configuration mode.
dns Sets a DNS server.
dot1x Configures 802.1X authentication.
exec-timeout Sets an auto log-out timer.
help Shows a description of the interactive help system.
hostname Sets a host name of the system.
interface Opens Interface Configuration mode to configure a specified interface.
mvr Configures MVR.
ntp Configures NTP.
passwd Sets a system password.
qos Configures QoS.
rmon-alarm Opens RMON Configuration mode to configure RMON alarm.
snmp Configures SNMP.
ssh Configures SSH.
stack Configures a system stacking.
syslog Configures a syslog.
threshold Sets a system threshold.
Tab. 3. 3 Main Command of Global Configuration Mode

3.1.4 Bridge Configuration Mode

In Bridge Configuration mode, you can configure various Layer 2 functions such as VLAN, STP, LACP, EFM OAM, etc.
To open Bridge Configuration mode, enter the bridge command, then the system prompt will be changed from SWITCH(config)# to SWITCH(bridge)#.
Command Mode Description
bridge Global Opens Bridge Configuration mode.
SMC7824M/VSW 27
CLI Management Guide
TigerAccess™ EE
Tab. 3.4 shows main commands of Bridge Configuration mode.
Command Description
lacp Configures LACP.
mac Configures a MAC table.
mirror Configures a port mirroring.
oam Configures EFM OAM.
port Configures Ethernet port.
spanning-tree Configures Spanning Tree Protocol (STP).
trunk Configures a trunk port.
vlan Configures VLAN.
Tab. 3. 4 Main Command of Bridge Configuration Mode

3.1.5 DHCP Pool Configuration Mode

In DHCP Pool Configuration mode, you can configure general functions of DHCP per each DHCP pool. The switch supports multiple DHCP environments with this pool based DHCP configuration.
To open DHCP Pool Configuration mode, enter the ip dhcp pool command, then the sys­tem prompt will be changed from SWITCH(config)# to SWITCH(config-dhcp[POOL])#.
Command Mode Description
ip dhcp pool POOL Global
To open DHCP Pool Configuration mode, use the service dhcp command in the Global
!
Configuration mode first!
Tab. 3.5 shows main commands of DHCP Pool Configuration mode.
Command Description
default-router Configures the default gateway of the pool.
dns-server Configures a DNS server.
range Configures the range of IP addresses.
Tab. 3. 5 Main Command of DHCP Pool Configuration Mode

3.1.6 DHCP Option Configuration Mode

In DHCP Option Configuration mode, you can configure DHCP option. You can define DHCP options that are carried in the DHCP communication between DHCP server and client or relay agent. A specific DHCP option can be defined by its format type, length and value.
Opens DHCP Pool Configuration mode to configure
DHCP.
28 SMC7824M/VSW
Management Guide CLI TigerAccess™ EE
To open DHCP Option Configuration mode, use the command. Then the system prompt will be changed from SWITCH(config)# to SWITCH(dhcp-opt[NAME])#.
Command Mode Description
ip dhcp option format NAME Global
Opens DHCP Option Configuration mode to configure
DHCP options.
Tab. 3.7 is the main commands of DHCP Option Configuration mode.
Command Description
attr Configures the attribute for option field in the DHCP packet.
Tab. 3. 6 Main Command of DHCP Option Configuration Mode

3.1.7 DHCP Option 82 Configuration Mode

In DHCP Option 82 Configuration mode, you can configure DHCP option 82 for DHCP re­lay agent. This feature enables network administrators to manage IP resources more effi­ciently.
To open DHCP Option 82 Configuration mode, enter the ip dhcp option82 command, then the system prompt will be changed from SWITCH(config)# to SWITCH(config­opt82)#.
Command Mode Description
ip dhcp option82 Global
Opens DHCP Option 82 Configuration mode to config-
ure DHCP option 82.
To open DHCP Option 82 Configuration mode, use the service dhcp command in the
!
Global Configuration mode first!
Tab. 3.7 is the main commands of DHCP Option 82 Configuration mode.
Command Description
policy Configures the policy for option 82 field in the DHCP packet.
system-remote-id Configures a system remote ID.
system-circuit-id Configures a system circuit ID.
trust Configures a option82 packet of policy
Tab. 3. 7 Main Command of DHCP Option 82 Configuration Mode

3.1.8 Interface Configuration Mode

In Interface Configuration mode, you can configure Ethernet interfaces. To open Interface Configuration mode, enter the interface command, then the system prompt will be
changed from SWITCH(config)# to SWITCH(config-if)#.
Command Mode Description
interface INTERFACE Global Opens Interface Configuration mode.
SMC7824M/VSW 29
Loading...
+ 357 hidden pages