Smc ES4700 Series User Manual

ES4700 Series Chassis Core Routing Switch
1
www.smc.com
Preface
ES4700 Series Chassis Core Routing Switch is a high performance routing switch
released by SMC Networks that can be deployed as the core layer device for campus and
enterprise networks, or as an aggregation device for IP metropolitan area networks
(MAN). ES4700 Series Chassis Core Routing Switch provides 4 and 10 slots, with
support for various types of line cards and can seamlessly support a variety of network
interfaces from 100Mb, 1000Mb to 10 GB Ethernet.
We are providing this manual for your better understanding, use and maintenance of
the ES4700 Series Chassis Core Routing Switch. We strongly recommend you to read
through this manual carefully before installation and configuration to avoid possible
malfunction or damage to the switch. Furthermore, we sincerely hope our products and
services satisfy you.
2
Content
CHAPTER 1 SWITCH MANAGEMENT.......................................................................... 18
1.1 MANAGEMENT OPTIONS ....................................................................................... 18
1.1.1 Out-of-band Management .............................................................................. 18
1.1.2 In-band Management ..................................................................................... 21
1.1.3 Management via Telnet................................................................................... 21
1.1.4 Management via HTTP................................................................................... 24
1.2 MANAGEMENT INTERFACE..................................................................................... 27
1.2.1 CLI Interface................................................................................................... 27
1.2.2 Configuration Modes ...................................................................................... 27
1.2.3 Configuration Syntax ...................................................................................... 30
1.2.4 Shortcut Key Support ..................................................................................... 31
1.2.5 Help function................................................................................................... 32
1.2.6 Input verification ............................................................................................. 32
1.2.7 Fuzzy match support ...................................................................................... 33
1.3 WEB MANAGEMENT.............................................................................................. 33
1.3.1 Main Page ...................................................................................................... 33
1.3.2 Module Front Panel ........................................................................................ 33
CHAPTER 2 BASIC SWITCH CONFIGURATION.......................................................... 35
2.1 COMMANDS FOR BASIC SWITCH CONFIGURATION .................................................. 35
2.1.1 Command For Basic Configuration................................................................. 35
2.2 COMMANDS FOR MAINTENANCE AND DEBUG.......................................................... 49
2.2.1 Ping ................................................................................................................ 49
2.2.2 Ping6 .............................................................................................................. 50
2.2.3 Telnet.............................................................................................................. 50
2.2.4 SSH ................................................................................................................ 53
2.2.5 Traceroute ...................................................................................................... 56
2.2.6 Traceroute6 .................................................................................................... 56
2.2.7 Show .............................................................................................................. 57
2.2.8 Debug............................................................................................................. 62
2.2.9 System log...................................................................................................... 63
2.3 CONFIGURATE SWITCH IP ADDRESSES .................................................................. 68
2.3.1 Switch IP Addresses Configuration Task List.................................................. 69
2.3.2 Commands For Configuring Switch IP............................................................ 69
2.4 SNMP CONFIGURATION ....................................................................................... 71
2.4.1 Introduce to SNMP ......................................................................................... 71
2.4.2 SNMP Configuration Task List ........................................................................ 74
3
2.4.3 Command For SNMP ..................................................................................... 76
2.4.4 Typical SNMP Configuration Examples .......................................................... 85
2.4.5 SNMP Troubleshooting Help .......................................................................... 87
2.5 SWITCH UPGRADE................................................................................................ 87
2.5.1 Switch System Files ....................................................................................... 87
2.5.2 BootROM Upgrade ......................................................................................... 88
2.5.3 FTP/TFTP Upgrade ........................................................................................ 90
2.5.4 FTP/TFTP Configuration Examples................................................................ 98
2.5.5 FTP/TFTP Troubleshooting Help .................................................................. 102
2.6 SECURITY FEATURE CONFIGURATION .................................................................. 104
2.6.1 Security Feature Introduction........................................................................ 104
2.6.2 Security Feature Configuration ..................................................................... 104
2.6.3 Commands for Security Feature................................................................... 106
2.6.4 Security Feature Example .............................................................................110
2.7 JUMBO CONFIGURATION ......................................................................................110
2.7.1 Jumbo Introduction ........................................................................................11 0
2.7.2 Jumbo Configuration Task Sequence ............................................................110
2.7.3 Jumbo Command ..........................................................................................111
2.8 SFLOW CONFIGURATION......................................................................................111
2.8.1 sFlow introduction..........................................................................................111
2.8.2 sFlow Configuration Task...............................................................................112
2.8.3 Commands For sFlow ...................................................................................113
2.8.4 sFlow Examples ............................................................................................118
2.8.5 sFlow Troubleshooting...................................................................................118
2.9 TACACS+ CONFIGURATION ................................................................................119
2.9.1 TACACS+ Introduction ..................................................................................119
2.9.2 TACACS+ Configurations ..............................................................................119
2.9.3 Commands for TACACS+............................................................................. 120
2.9.4 Typical TACACS+ Scenarios ........................................................................ 122
2.9.5 TACACS+ Troubleshooting........................................................................... 122
2.10 WEB MANAGEMENT.......................................................................................... 123
2.10.1 Switch basic configuration .......................................................................... 123
2.10.2 SNMP configuration.................................................................................... 124
2.10.3 Switch upgrade........................................................................................... 126
2.10.4 Maintenance and debug command ............................................................ 129
2.10.5 Basic introduction to switch ........................................................................ 130
2.10.6 Switch Maintenance ................................................................................... 131
2.10.7 Telnet server configuration.......................................................................... 131
4
2.10.8 Telnet server user configuration.................................................................. 132
2.10.9 Telnet security IP ........................................................................................ 132
CHAPTER 3 DEVICE MANAGEMENT ........................................................................ 133
3.1 DEVICE MANAGEMENT BRIEF .............................................................................. 133
3.2 DEVICE MANAGEMENT CONFIGURATION .............................................................. 133
3.2.1 Switch Basic Configuration........................................................................... 133
3.3 DEVICE MANAGEMENT TROUBLESHOOTING HELP................................................. 133
3.3.1 Monitor and Debug Command...................................................................... 133
3.4 CARD HOT-SWAP OPERATION............................................................................. 135
3.4.1 Card Hot-Insertion ........................................................................................ 135
3.4.2 Card Hot-Remove......................................................................................... 135
3.5 CONFIGURATION RESTORATION RULES................................................................ 136
3.6 ACTIVE-STANDB Y ALTERNATION .......................................................................... 136
3.7 COMMAND FOR DEVICE MANAGEMENT ................................................................. 137
3.7.1 debug devsm ................................................................................................ 137
3.7.2 force runcfg-sync .......................................................................................... 137
3.7.3 force switchover............................................................................................ 137
3.7.4 reset slot....................................................................................................... 137
3.7.5 runcfg-sync................................................................................................... 138
3.7.6 show fan ....................................................................................................... 138
3.7.7 show power .................................................................................................. 139
3.7.8 show slot ...................................................................................................... 139
CHAPTER 4 PORT CONFIGURATION........................................................................ 140
4.1 INTRODUCTION TO PORT..................................................................................... 140
4.2 PORT CONFIGURATION ....................................................................................... 141
4.2.1 Network Port Configuration........................................................................... 141
4.2.2 VLAN Interface Configuration....................................................................... 150
4.2.3 Network Management Port Configuration..................................................... 151
4.3 PORT MIRRORING CONFIGURATION ..................................................................... 155
4.3.1 Introduction to Port Mirroring ........................................................................ 155
4.3.2 Port Mirroring Configuration Task List........................................................... 155
4.3.3 Command For Mirroring Configuration ......................................................... 155
4.3.4 Device Mirroring Troubleshooting Help......................................................... 156
4.4 PORT CONFIGURATION EXAMPLE ........................................................................ 157
4.5 PORT TROUBLESHOOTING HELP.......................................................................... 158
4.6 WEB MANAGEMENT............................................................................................ 158
4.6.1 Ethernet port configuration ........................................................................... 158
4.6.2 Physical port configuration ........................................................................... 158
5
4.6.3 Bandwidth control ......................................................................................... 159
4.6.4 Vlan interface configuration .......................................................................... 160
4.6.5 Allocate IP address for L3 port...................................................................... 160
4.6.6 L3 port IP addr mode configuration .............................................................. 160
4.6.7 Port mirroring configuration .......................................................................... 161
4.6.8 Mirror configuration....................................................................................... 161
4.6.9 Port debug and maintenance........................................................................ 161
4.6.10 Show port information................................................................................. 161
CHAPTER 5 PORT CHANNEL CONFIGURATION ..................................................... 163
5.1 INTRODUCTION TO PORT CHANNEL...................................................................... 163
5.2 PORT CHANNEL CONFIGURATION ........................................................................ 164
5.2.1 Port Channel Configuration Task List ........................................................... 164
5.2.2 Command for port channel ........................................................................... 165
5.3 PORT CHANNEL EXAMPLE................................................................................... 171
5.4 PORT CHANNEL TROUBLESHOOTING HELP........................................................... 173
5.5 WEB MANAGEMENT............................................................................................ 174
5.5.1 LACP port group configuration ..................................................................... 174
5.5.2 LACP port configuration................................................................................ 175
CHAPTER 6 VLAN CONFIGURATION ........................................................................ 176
6.1 VLAN CONFIGURATION ...................................................................................... 176
6.1.1 Introduction to VLAN .................................................................................... 176
6.1.2 VLAN Configuration Task List ....................................................................... 177
6.1.3 Command for vlan Configuration .................................................................. 178
6.1.4 Typical VLAN Application.............................................................................. 184
6.2 GVRP CONFIGURATION...................................................................................... 186
6.2.1 Introduction to GVRP.................................................................................... 186
6.2.2 GVRP Configuration Task List ...................................................................... 186
6.2.3 Command For GVRP ................................................................................... 187
6.2.4 Typical GVRP Application............................................................................. 190
6.2.5 GVRP Troubleshooting Help......................................................................... 192
6.3 DOT1Q-TUNNEL CONFIGURATION ........................................................................ 193
6.3.1 Dot1q-tunnel Introduction ............................................................................. 193
6.3.2 Dot1q-tunnel Configuration........................................................................... 194
6.3.3 Dot1q-Tunnel Configuration Command ........................................................ 194
6.3.4 Typical Applications Of The Dot1q-tunnel ..................................................... 196
6.3.5 Dot1q-tunnel Troubleshooting....................................................................... 197
6.4 VLAN-TRANSLATION CONFIGURATION ................................................................. 198
6.4.1 VLAN-translation Introduction....................................................................... 198
6
6.4.2 Configuration Task Sequence Of VLAN-translation ...................................... 198
6.4.3 VLAN-translation Configuration Command................................................... 199
6.4.4 Typical Application Of VLAN-translation ....................................................... 201
6.4.5 VLAN-translation Troubleshooting................................................................ 202
6.5 DYNAMIC VLAN CONFIGURATION........................................................................ 202
6.5.1 Dynamic VLAN Introduction.......................................................................... 202
6.5.2 Dynamic VLAN Configuration....................................................................... 203
6.5.3 Typical Application Of The Dynamic VLAN ................................................... 209
6.5.4 Dynamic VLAN Troubleshooting................................................................... 210
6.6 VOICE VLAN CONFIGURATION .............................................................................211
6.6.1 Voice VLAN Introduction................................................................................211
6.6.2 Voice VLAN Configuration .............................................................................211
6.6.3 Typical Applications Of The Voice VLAN ...................................................... 214
6.6.4 Voice VLAN Troubleshooting........................................................................ 215
CHAPTER 7 MAC TABLE CONFIGURATION............................................................. 216
7.1 INTRODUCTION TO MAC TABLE ........................................................................... 216
7.1.1 Obtaining MAC Table.................................................................................... 216
7.1.2 Forward or Filter ........................................................................................... 218
7.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST ................................................ 219
7.3 COMMANDS FOR MAC ADDRESS TABLE CONFIGURATION ...................................... 219
7.3.1 mac-address-table........................................................................................ 219
7.3.2 show mac-address-table............................................................................... 220
7.4 TYPICAL CONFIGURATION EXAMPLES................................................................... 221
7.5 TROUBLESHOOTING HELP................................................................................... 221
7.6 MAC ADDRESS FUNCTION EXTENSION ................................................................ 222
7.6.1 MAC Address Binding................................................................................... 222
CHAPTER 8 MSTP CONFIGURATION........................................................................ 230
8.1 MSTP INTRODUCTION ........................................................................................ 230
8.1.1 MSTP Region ............................................................................................... 230
8.1.2 Port Roles..................................................................................................... 232
8.1.3 MSTP Load Balance..................................................................................... 232
8.2 MSTP CONFIGURATION TASK LIST ...................................................................... 232
8.3 COMMAND FOR MSTP........................................................................................ 236
8.3.1 abort ............................................................................................................. 236
8.3.2 exit................................................................................................................ 236
8.3.3 instance vlan................................................................................................. 237
8.3.4 name ............................................................................................................ 237
8.3.5 revision-level................................................................................................. 238
7
8.3.6 spanning-tree................................................................................................ 238
8.3.7 spanning-tree format .................................................................................... 239
8.3.8 spanning-tree forward-time........................................................................... 239
8.3.9 spanning-tree hello-time ............................................................................... 240
8.3.10 spanning-tree link-type p2p ........................................................................ 240
8.3.11 spanning-tree maxage ................................................................................ 241
8.3.12 spanning-tree max-hop............................................................................... 241
8.3.13 spanning-tree mcheck ................................................................................ 242
8.3.14 spanning-tree mode.................................................................................... 242
8.3.15 spanning-tree mst configuration ................................................................. 242
8.3.16 spanning-tree mst cost ............................................................................... 243
8.3.17 spanning-tree mst port-priority.................................................................... 244
8.3.18 spanning-tree mst priority ........................................................................... 244
8.3.19 spanning-tree portfast................................................................................. 245
8.3.20 spanning-tree digest-snooping ................................................................... 245
8.3.21 spanning-tree tcflush (global mode) ........................................................... 246
8.3.22 spanning-tree tcflush (port mode)............................................................... 246
8.4 MSTP EXAMPLE ................................................................................................ 247
8.5 MSTP TROUBLESHOOTING HELP ........................................................................ 252
8.5.1 Monitor And Debug Command ..................................................................... 252
8.6 WEB MANAGEMENT............................................................................................ 256
8.6.1 MSTP field operation .................................................................................... 256
8.6.2 MSTP port operation..................................................................................... 257
8.6.3 MSTP global control ..................................................................................... 258
8.6.4 Show MSTP setting ...................................................................................... 259
CHAPTER 9 QOS AND PBR CONFIGURATION......................................................... 261
9.1 QOS CONFIGURATION ........................................................................................ 261
9.1.1 Introduction to QoS....................................................................................... 261
9.1.2 QoS Configuration Task List ......................................................................... 266
9.1.3 Command for QoS........................................................................................ 270
9.1.4 QoS Example ............................................................................................... 280
9.1.5 QoS Troubleshooting Help ........................................................................... 282
9.2 PBR CONFIGURATION ........................................................................................ 287
9.2.1 Introduction to PBR ...................................................................................... 287
9.2.2 PBR configuration......................................................................................... 287
9.2.3 PBR examples.............................................................................................. 288
CHAPTER 10 L3 FORWARD CONFIGURATION........................................................ 290
10.1 LAYE R 3 INTERFACE ......................................................................................... 290
8
10.1.1 Introduction to Layer 3 Interface................................................................. 290
10.1.2 Layer 3 Interface Configuration Task List.................................................... 290
10.1.3 Command for Layer 3 Interface .................................................................. 291
10.2 IP CONFIGURATION .......................................................................................... 291
10.2.1 Introduction to IPv4, IPv6 ........................................................................... 291
10.2.2 IPv4 Configuration ...................................................................................... 293
10.2.3 IPv6 Configuration ...................................................................................... 294
10.2.4 IP Configuration Examples ......................................................................... 308
10.2.5 IP Troubleshooting Help ............................................................................. 313
10.3 IP FORWARDING............................................................................................... 323
10.3.1 Introduction to IP Forwarding...................................................................... 323
10.3.2 IP Route Aggregation Configuration Task ................................................... 323
10.3.3 Command for IP Route Aggregation........................................................... 324
10.4 URPF ............................................................................................................. 324
10.4.1 URPF Introduction ...................................................................................... 324
10.4.2 URPF Operation Mechanism...................................................................... 325
10.4.3 URPF Configuration Task Sequence .......................................................... 325
10.4.4 Commands For URPF ................................................................................ 326
10.4.5 URPF Troubleshooting ............................................................................... 327
10.5 ARP................................................................................................................ 327
10.5.1 Introduction to ARP..................................................................................... 327
10.5.2 ARP Configuration Task List ....................................................................... 328
10.5.3 Command for ARP Configuration ............................................................... 328
CHAPTER 11 DHCP CONFIGURATION...................................................................... 332
11.1 INTRODUCTION TO DHCP ................................................................................. 332
11.2 DHCP SERVER CONFIGURATION....................................................................... 333
11.2.1 DHCP Sever Configuration Task List .......................................................... 333
11.2.2 Commands for DHCP Server Configuration ............................................... 335
11.3 DHCP RELAY CONFIGURATION ......................................................................... 343
11.3.1 DHCP Relay Configuration Task List .......................................................... 344
11.3.2 Commands for DHCP Relay Configuration................................................. 345
11.4 DHCP CONFIGURATION EXAMPLE ..................................................................... 347
11.5 DHCP TROUBLESHOOTING HELP ...................................................................... 350
11.5.1 Commands for Monitor and Debug ............................................................. 350
11.6 WEB MANAGEMENT.......................................................................................... 353
11.6.1 DHCP server configuration ......................................................................... 353
11.6.2 DHCP debugging ........................................................................................ 358
CHAPTER 12 SNTP CONFIGURATION ...................................................................... 360
9
12.1 INTRODUCTION TO SNTP.................................................................................. 360
12.2 COMMAND FOR SNTP...................................................................................... 361
12.2.1 clock timezone............................................................................................ 361
12.2.2 sntp server.................................................................................................. 361
12.2.3 sntp poll ...................................................................................................... 362
12.2.4 debug sntp.................................................................................................. 362
12.2.5 show sntp ................................................................................................... 362
12.3 TYPICAL SNTP CONFIGURATION EXAMPLES ...................................................... 363
12.4 WEB MANAGEMENT.......................................................................................... 363
12.4.1 SNMP/NTP server configuration................................................................. 363
12.4.2 Request interval configuration .................................................................... 364
12.4.3 Time difference........................................................................................... 364
12.4.4 Show SNTP................................................................................................ 364
CHAPTER 13 PREVENT ARP, ND SPOOFING CONFIGURATION............................ 365
13.1 OVERVIEW....................................................................................................... 365
13.1.1 ARP ( Address Resolution Protocol) ........................................................... 365
13.1.2 ARP Spoofing ............................................................................................. 365
13.1.3 How to prevent void ARP/ND Spoofing for our Layer 3 Switch ................... 366
13.2 PREVENT ARP, ND SPOOFING CONFIGURATION ................................................. 366
13.2.1 Prevent ARP, ND Spoofing Configuration Task List .................................... 366
13.3 COMMANDS FOR PREVENTING ARP, ND SPOOFING ........................................... 367
13.3.1 ip arp-security updateprotect ...................................................................... 367
13.3.2 ipv6 nd-security updateprotect.................................................................... 368
13.3.3 ip arp-security learnprotect ......................................................................... 368
13.3.4 ipv6 nd learnprotect .................................................................................... 368
13.3.5 ip arp-security convert ................................................................................ 369
13.3.6 ipv6 nd-security convert.............................................................................. 369
13.3.7 clear ip arp dynamic ................................................................................... 369
13.3.8 clear ipv6 nd dynamic................................................................................. 369
13.4 PREVENT ARP, ND SPOOFING EXAMPLE ........................................................... 370
CHAPTER 14 ROUTING PROTOCOL......................................................................... 372
14.1 ROUTING PROTOCOL OVERVIEW ....................................................................... 372
14.1.1 Routing Table.............................................................................................. 373
14.2 IP ROUTING POLICY ......................................................................................... 374
14.2.1 Introduction To Routing Policy .................................................................... 374
14.2.2 IP Routing Policy Configuration Task List ................................................... 376
14.2.3 Command For Routing Policy..................................................................... 380
14.2.4 Configuration Examples ............................................................................. 392
10
14.2.5 Troubleshooting Help.................................................................................. 393
14.3 STATI C ROUTE ................................................................................................. 396
14.3.1 Introduction to Static Route......................................................................... 396
14.3.2 Introduction to Default Route...................................................................... 396
14.3.3 Static Route Configuration Task List........................................................... 397
14.3.4 Command For Static Route ........................................................................ 397
14.3.5 Configuration Examples ............................................................................. 401
14.4 RIP ................................................................................................................. 402
14.4.1 Introduction to RIP...................................................................................... 402
14.4.2 RIP Configuration Task List ........................................................................ 404
14.4.3 Command For RIP...................................................................................... 410
14.4.4 RIP Examples............................................................................................. 425
14.4.5 Troubleshooting Help Of RIP...................................................................... 428
14.5 RIPNG............................................................................................................. 435
14.5.1 Introduction to RIPng.................................................................................. 435
14.5.2 RIPng Configuration Task List .................................................................... 437
14.5.3 Commands For RIPng................................................................................ 440
14.5.4 RIPng Configuration Examples................................................................... 445
14.5.5 RIPng Troubleshooting Help....................................................................... 447
14.6 OSPF ............................................................................................................. 451
14.6.1 Introduction to OSPF .................................................................................. 451
14.6.2 OSPF Configuration Task List..................................................................... 454
14.6.3 Command For OSPF.................................................................................. 459
14.6.4 OSPF Example........................................................................................... 479
14.6.5 OSPF Troubleshooting Help....................................................................... 488
14.7 OSPFV3 ......................................................................................................... 496
14.7.1 Introduction to OSPFv3 .............................................................................. 496
14.7.2 OSPFv3 Configuration Task List................................................................. 500
14.7.3 Command For OSPFV3 ............................................................................. 503
14.7.4 OSPFv3 Examples ..................................................................................... 513
14.7.5 OSPFv3 Troubleshooting Help ................................................................... 516
14.8 BGP ............................................................................................................... 523
14.8.1 BGP Introduction ........................................................................................ 523
14.8.2 BGP Configuration Task List....................................................................... 527
14.8.3 Command For BGP .................................................................................... 540
14.8.4 Configuration Examples of BGP................................................................. 579
14.8.5 BGP Troubleshooting Help ......................................................................... 587
14.9 MBGP4+ ........................................................................................................ 597
11
14.9.1 MBGP4+ Introduction ................................................................................. 597
14.9.2 MBGP4+ Configures Mission List............................................................... 598
14.9.3 MBGP4+ Examples .................................................................................... 598
14.9.4 MBGP4+ Troubleshooting Help.................................................................. 600
CHAPTER 15 IGMP SNOOPING ................................................................................. 601
15.1 INTRODUCTION TO IGMP SNOOPING ................................................................. 601
15.2 IGMP SNOOPING CONFIGURATION TASK ........................................................... 601
15.3 COMMAND FOR IGMP SNOOPING ..................................................................... 603
15.3.1 ip igmp snooping vlan................................................................................. 603
15.3.2 ip igmp snooping vlan immediate-leave...................................................... 603
15.3.3 ip igmp snooping vlan l2-general-querier.................................................... 603
15.3.4 ip igmp snooping vlan limit.......................................................................... 604
15.3.5 ip igmp snooping vlan mrouter-port interface.............................................. 604
15.3.6 ip igmp snooping vlan mrpt......................................................................... 605
15.3.7 ip igmp snooping vlan query-interval .......................................................... 605
15.3.8 ip igmp snooping vlan query-mrsp.............................................................. 606
15.3.9 ip igmp snooping vlan query-robustness .................................................... 606
15.3.10 ip igmp snooping vlan suppression-query-time......................................... 606
15.4 IGMP SNOOPING EXAMPLE .............................................................................. 607
15.5 IGMP SNOOPING TROUBLESHOOTING HELP ...................................................... 609
15.5.1 Monitor And Debug Command ................................................................... 609
CHAPTER 16 MULTICAST VLAN................................................................................613
16.1 INTRODUCTION TO MULTICAST VLAN................................................................ 613
16.2 MULTICAST VLAN CONFIGURATION TASK .......................................................... 613
16.3 COMMANDS FOR MULTICAST VLAN .................................................................. 614
16.3.1 multicast-vlan.............................................................................................. 614
16.3.2 multicast-vlan association........................................................................... 614
16.4 EXAMPLES OF MULTICAST VLAN ...................................................................... 615
CHAPTER 17 IPV4 MULTICAST PROTOCOL ............................................................ 617
17.1 IPV4 MULTICAST PROTOCOL OVERVIEW ............................................................ 617
17.1.1 Introduction to Multicast.............................................................................. 617
17.1.2 Multicast Address ....................................................................................... 618
17.1.3 IP Multicast Packet Transmission ............................................................... 619
17.1.4 IP Multicast Application............................................................................... 620
17.2 PIM-DM.......................................................................................................... 620
17.2.1 Introduction to PIM-DM............................................................................... 620
17.2.2 PIM-DM Configuration Task List ................................................................. 622
17.2.3 Command for PIM-DM................................................................................ 623
12
17.2.4 PIM-DM Configuration Examples ............................................................... 624
17.2.5 PIM-DM Troubleshooting............................................................................ 625
17.3 PIM-SM .......................................................................................................... 628
17.3.1 Introduction to PIM-SM............................................................................... 628
17.3.2 PIM-SM Configuration Task List ................................................................. 630
17.3.3 Command For PIM-SM............................................................................... 632
17.3.4 PIM-SM Configuration Examples................................................................ 641
17.3.5 PIM-SM Troubleshooting............................................................................ 643
17.4 DVMRP .......................................................................................................... 652
17.4.1 Introduction to DVMRP............................................................................... 652
17.4.2 Configuration Task List ............................................................................... 654
17.4.3 Command For DVMRP............................................................................... 655
17.4.4 DVMRP Configuration Examples................................................................ 658
17.4.5 DVMRP TroubleShooting............................................................................ 659
17.5 ECSCM .......................................................................................................... 663
17.5.1 Introduction to ECSCM............................................................................... 663
17.5.2 ECSCM Configuration Task List ................................................................. 664
17.5.3 Command For ECSCM............................................................................... 667
17.5.4 ECSCM Configuration Examples................................................................ 672
17.5.5 ECSCM Troubleshooting............................................................................ 673
17.6 IGMP.............................................................................................................. 675
17.6.1 Introduction to IGMP................................................................................... 675
17.6.2 Configuration Task List ............................................................................... 677
17.6.3 Command For IGMP .................................................................................. 679
17.6.4 IGMP Configuration Example ..................................................................... 684
17.6.5 IGMP Troubleshooting................................................................................ 685
CHAPTER 18 IPV6 MULTICAST PROTOCOL ............................................................ 689
18.1 PIM-DM6........................................................................................................ 689
18.1.1 Introduction to PIM-DM6............................................................................. 689
18.1.2 PIM-DM Configuration Task List ................................................................. 690
18.1.3 Command for PIM-DM6.............................................................................. 691
18.1.4 PIM-DM Typical Application........................................................................ 695
18.1.5 PIM-DM Troubleshooting Help.................................................................... 696
18.2 PIM-SM6 ........................................................................................................ 699
18.2.1 Introduction to PIM-SM6............................................................................. 699
18.2.2 PIM-SM Configuration Task List ................................................................. 700
18.2.3 Command for PIM-SM................................................................................ 703
18.2.4 PIM-SM Typical Application .........................................................................711
13
18.2.5 PIM-SM Troubleshooting Help.................................................................... 713
18.3 MLD ............................................................................................................... 722
18.3.1 Introduction to MLD .................................................................................... 722
18.3.2 MLD Configuration Task List....................................................................... 723
18.3.3 Command for MLD ..................................................................................... 725
18.3.4 MLD Typical Application.............................................................................. 730
18.3.5 MLD Troubleshooting Help ......................................................................... 731
18.4 MLD SNOOPING............................................................................................... 734
18.4.1 MLD Snooping Introduction ........................................................................ 734
18.4.2 MLD Snooping Configuration Task ............................................................. 734
18.4.3 Commands For MLD Snooping Configuration ............................................ 736
18.4.4 MLD Snooping Examples ........................................................................... 742
18.4.5 MLD Snooping Troubleshooting ................................................................. 745
CHAPTER 19 ACL CONFIGURATION......................................................................... 746
19.1 INTRODUCTION TO ACL .................................................................................... 746
19.1.1 Access-list................................................................................................... 746
19.1.2 Access-group.............................................................................................. 746
19.1.3 Access-list Action and Global Default Action............................................... 747
19.2 ACL CONFIGURATION ....................................................................................... 747
19.2.1 ACL Configuration Task Sequence ............................................................. 747
19.2.2 Commands for ACL .................................................................................... 760
19.3 ACL EXAMPLE ................................................................................................. 779
19.4 ACL TROUBLESHOOTING .................................................................................. 780
19.4.1 Monitor And Debug Command ................................................................... 780
19.5 WEB MANAGEMENT.......................................................................................... 783
19.5.1 Numeric standard ACL configuration .......................................................... 784
19.5.2 Delete numeric IP ACL ............................................................................... 784
19.5.3 Configure the numeric extended ACL......................................................... 784
19.5.4 Configure and delete the standard ACL name ............................................ 786
19.5.5 Configure extended ACL name configuration ............................................. 787
19.5.6 Firewall configuration.................................................................................. 787
19.5.7 ACL port binding ......................................................................................... 787
CHAPTER 20 802.1X CONFIGURATION .................................................................... 789
20.1 INTRODUCTION TO 802.1X ................................................................................ 789
20.2 802.1X CONFIGURATION................................................................................... 790
20.2.1 802.1x Configuration Task Sequence ......................................................... 790
20.2.2 Command for 802.1x .................................................................................. 794
20.3 802.1X APPLICATION EXAMPLE ......................................................................... 803
14
20.3.1 802.1x Troubleshooting .............................................................................. 804
20.4 WEB MANAGEMENT.......................................................................................... 810
20.4.1 RADIUS client configuration ....................................................................... 810
20.4.2 802.1X configuration................................................................................... 812
CHAPTER 21 VRRP CONFIGURATION...................................................................... 816
21.1 INTRODUCTION TO VRRP................................................................................. 816
21.2 VRRP CONFIGURATION TASK LIST .................................................................... 817
21.3 COMMANDS FOR VRRP ................................................................................... 819
21.3.1 advertisement-interval ................................................................................ 819
21.3.2 circuit-failover ............................................................................................. 819
21.3.3 debug vrrp .................................................................................................. 820
21.3.4 disable ........................................................................................................ 820
21.3.5 enable......................................................................................................... 821
21.3.6 interface...................................................................................................... 821
21.3.7 preempt-mode ............................................................................................ 821
21.3.8 priority......................................................................................................... 822
21.3.9 router vrrp................................................................................................... 822
21.3.10 show vrrp.................................................................................................. 823
21.3.11 virtual-ip .................................................................................................... 823
21.4 EXAMPLE OF VRRP......................................................................................... 824
21.5 VRRP TROUBLESHOOTING ............................................................................... 825
21.6 WEB MANAGEMENT.......................................................................................... 825
21.6.1 Create VRRP Number ................................................................................ 825
21.6.2 configure VRRP Dummy IP ........................................................................ 826
21.6.3 configure VRRP Port .................................................................................. 826
21.6.4 Activate Virtual Router ................................................................................ 826
21.6.5 Configure Preemptive Mode For VRRP...................................................... 826
21.6.6 Configure VRRP Priority............................................................................. 827
21.6.7 Configure VRRP Interval ............................................................................ 827
21.6.8 Configure VRRP Circuit.............................................................................. 827
21.6.9 Configure VRRP Authentication Mode........................................................ 827
CHAPTER 22 MRPP CONFIGURATION...................................................................... 829
22.1 MRPP INTRODUCTION...................................................................................... 829
22.1.1 Conception Introduction.............................................................................. 829
22.1.2 MRPP Protocol Packet Types..................................................................... 830
22.1.3 MRPP Protocol Operation System ............................................................. 831
22.2 MRPP CONFIGURATION TASK SEQUENCE ......................................................... 832
22.3 COMMANDS FOR MRPP................................................................................... 833
15
22.3.1 clear mrpp statistics.................................................................................... 833
22.3.2 control-vlan................................................................................................. 833
22.3.3 debug mrpp ................................................................................................ 834
22.3.4 enable......................................................................................................... 834
22.3.5 fail-timer...................................................................................................... 835
22.3.6 hello-timer................................................................................................... 835
22.3.7 mrpp enable................................................................................................ 836
22.3.8 mrpp ring .................................................................................................... 836
22.3.9 node-mode ................................................................................................. 837
22.3.10 primary-port .............................................................................................. 837
22.3.11 secondary-port .......................................................................................... 837
22.3.12 show mrpp................................................................................................ 838
22.3.13 show mrpp statistics ................................................................................. 838
22.4 MRPP TYPICAL SCENARIO ................................................................................ 838
22.4.1 MRPP typical scenario 1............................................................................. 838
22.4.2 MRPP typical scenario 2............................................................................. 840
22.4.3 MRPP typical scenario 3............................................................................. 843
22.5 MRPP TROUBLESHOOTING ............................................................................... 847
CHAPTER 23 CLUSTER CONFIGURATION............................................................... 848
23.1 INTRODUCTION TO CLUSTER............................................................................. 848
23.2 CLUSTER MANAGEMENT CONFIGURATION SEQUENCE ........................................ 848
23.3 COMMANDS FOR CLUSTER ............................................................................... 851
23.3.1 cluster run................................................................................................... 851
23.3.2 cluster register timer ................................................................................... 851
23.3.3 cluster ip-pool ............................................................................................. 851
23.3.4 cluster commander ..................................................................................... 852
23.3.5 cluster member........................................................................................... 852
23.3.6 cluster auto-add enable .............................................................................. 853
23.3.7 rcommand member .................................................................................... 853
23.3.8 rcommand commander............................................................................... 854
23.3.9 cluster reset member.................................................................................. 854
23.3.10 cluster update member............................................................................. 854
23.3.11 cluster holdtime......................................................................................... 855
23.3.12 cluster heartbeat....................................................................................... 856
23.3.13 clear cluster candidate-table..................................................................... 856
23.4 EXAMPLES OF CLUSTER ADMINISTRATION ......................................................... 857
23.5 CLUSTER ADMINISTRATION TROUBLESHOOTING ................................................. 857
23.5.1 Cluster Debugging and Monitoring Command............................................ 857
16
23.5.2 Cluster Administration Troubleshooting ...................................................... 859
17

Chapter 1 Switch Management

1.1 Management Options

After purchasing the switch, the user needs to configure the switch for network
management. ES4700 series provides two management options: in-band management
and out-of-band management.

1.1.1 Out-of-band Management

Out-of-band management is the management through Console interface. Generally,
the user will use out-of-band management for the initial switch configuration, or when
in-band management is not available. For instance, the user must assign an IP address
to the switch via the Console interface to be able to access the switch through Telnet.
The procedures for managing the switch via Console interface are listed below:
Step 1: setting up the environment:
Connect with serial port
Fig 1-1 Out-of-band Management Configuration Environment
As shown in Fig 1-1, the serial port (RS-232) is connected to the switch with the
serial cable provided. The table below lists all the devices used in the connection.
Device Name Description
PC machine Has functional keyboard and RS-232, with terminal
emulator installed, such as HyperTerminal included in
Windows 9x/NT/2000/XP.
Serial port cable One end attach to the RS-232 serial port, the other end to
the Console port.
18
ES4700 series Functional Console port required.
Step 2 Entering the HyperTerminal
Open the HyperTerminal included in Windows after the connection established. The
example below is based on the HyperTerminal included in Windows XP.
1) Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
Fig 1-2 Opening HyperTerminal
2) Type a name for opening HyperTerminal, such as “Switch”.
Fig 1-3 Opening HyperTerminal
3) In the “Connecting with” drop-list, select the RS-232 serial port used by the PC, e.g.
COM1, and click “OK”.
19
Fig 1-4 Opening HyperTerminal
4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for
“Parity checksum”, “1” for stop bit and “none” for traffic control; or, you can also click
“Revert to default” and click “OK”.
Fig 1-5 Opening HyperTerminal
Step 3 Entering switch CLI interface:
Power on the switch. The following appears in the HyperTerminal windows, that is
the CLI configuration mode for ES4700 series.
ES4700 series Management Switch
20
Copyright (c) 2001-2006 by Accton Technology Corporation.
All rights reserved.
Reset chassis ... done.
Testing RAM...
134,217,728 RAM OK.
Initializing...
Attaching to file system ... done.
Loading nos.img ... done.
Starting at 0x10000...
Current time is WED APR 20 09: 37: 52 2005
ES4700 series Switch Operating System, Software Version ES4700 series 1.1.0.0,
Copyright (C) 2001-2006 by Accton Technology Corporation
http: //www.smc. com.
ES4700 series Switch
26 Ethernet/IEEE 802.3 interface(s)
Press ENTER to start session
The user can now enter commands to manage the switch. For a detailed description
for the commands, please refer to the following chapters.

1.1.2 In-band Management

In-band management refers to the management by login to the switch using
Telnet. In-band management enables management of the switch for some devices
attached to the switch. In the case when in-band management fails due to switch
configuration changes, out-of-band management can be used for configuring and
managing the switch.

1.1.3 Management via Telnet

To manage the switch with Telnet, the following conditions should be met:
1) Switch has an IP address configured
2) The host IP address (Telnet client) and the switch’s VLAN interface IP address is
in the same network segment.
3) If not 2), Telnet client can connect to an IP address of the switch via other
devices, such as a router.
ES4700 seriesis a Layer 3 switch that can be configured with several IP addresses.
The following example assumes the shipment status of the switch where only VLAN1
exists in the system.
21
The following describes the steps for a Telnet client to connect to the switch’s VLAN1
interface by Telnet.
Fig 1-6 Manage the switch by Telnet
Step 1: Configure the IP addresses for the switch
First is the configuration of host IP address. This should be within the same network
segment as the switch VLAN1 interface IP address. Suppose the switch VLAN interface
IP address 10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run
“ping 10.1.128.251” from the host and verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below.
Before in-band management, the switch must be configured with an IP address by
out-of-band management (i.e. Console mode), The configuration commands are as
follows (All switch configuration prompts are assumed to be “switch” hereafter if not
otherwise specified):
Switch>
Switch>en
Switch#config
Switch(Config)#interface vlan 1
Switch(Config-If-Vlan1)#ip address 10.1.128.251 255.255.255.0
Switch(Config-If-Vlan1)#no shutdown
Step 2: Run Telnet Client program.
Run Telnet client program included in Windows with the specified Telnet target.
22
Fig 1-7 Run telnet client program included in Windows
Step 3: Login to the switch
Login to the Telnet configuration interface. Valid login name and password are
required, otherwise the switch will reject Telnet access. This is a method to protect the
switch from unauthorized access. As a result, when Telnet is enabled for configuring and
managing the switch, username and password for authorized Telnet users must be
configured with the following command:
username <user> password {0|7} <password>.
Assume an authorized user in the switch has a username of “test”, and password of
“test”, the configuration procedure should like the following:
Switch
>en
Switch#config
Switch(Config)#username test password 0 test
Enter valid login name and password in the Telnet configuration interface, Telnet
user will be able to enter the switch’s CLI configuration interface. The commands used in
the Telnet CLI interface after login is the same as in that in the Console interface.
23
Fig 1-8 Telnet Configuration Interface

1.1.4 Management via HTTP

To manage the switch via HTTP, the following conditions should be met:
1) Switch has an IP address configured
2) The host IP address (HTTP client) and the switch’s VLAN interface IP address
are in the same network segment;
3) If 2) is not met, HTTP client should connect to an IP address of the switch via
other devices, such as a router.
Similar to management via Telnet, as soon as the host succeeds to ping an IP
address of the switch and to type the right login password, it can access the switch via
HTTP. The configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP function on the
switch.
For configuring the IP address on the switch through out-of-band management, see
the relevant chapter.
To enable the WEB configuration, users should type the CLI command ip http server in the global mode as below:
Switch
Switch#config
Switch(Config)#ip http server
>en
24
Step 2: Run HTTP protocol on the host.
Open the Web browser on the host and type the IP address of the switch. Or run
directly the HTTP protocol on the Windows. For example, the IP address of the switch is
“10.1.128.251”.
Fig 1-9 Run HTTP Protocol
When accessing a switch with IPv6 address, it is recommended to use the Firefox
browser with 1.5 or later version. For example, if the IPv6 address of the switch is
“3ffe:506:1:2::3”, enter the switch address at the address bar: http://[3ffe:506:1:2::3],
where the address should be in the square brackets.
Step 3: Logon to the switch
To logon to the HTTP configuration interface, valid login user name and password
are required; otherwise the switch will reject HTTP access. This is a method to protect
the switch from the unauthorized access. Consequently, in order to configure the switch
via HTTP, username and password for authorized HTTP users must be configured with
the following command in the global mode:
username <username> password <show_flag> <password>.
Suppose an authorized user in the switch has a username as “test”, and password
as “test”. The configuration procedure is as below:
Switch
>en
Switch#config
Switch(Config)# username test password 0 test
The Web login interface is as below:
25
Fig 1-10 Web Login Interface
Input the right username and password, and then the main Web configuration
interface is shown as below.
Fig 1-11 Main Web Configuration Interface
26

1.2 Management Interface

1.2.1 CLI Interface

CLI interface is familiar to most users. As aforementioned, out-of-band management
and Telnet login are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration
commands.Those commands are categorized according to their functions in switch
configuration and management. Each category represents a different configuration mode.
The Shell for the switch is described below:
z Configuration Modes
z Configuration Syntax
z Shortcut keys
z Help function
z Input verification
z Fuzzy match support

1.2.2 Configuration Modes

User Mode
Admin Mode
Global Mode
Interface Mode
Fig 1-12 Shell Configuration Modes
Vlan Mode
27
DHCP address pool
configuration mode
Route configuration
mode
ACL configuration
mode
1.2.2.1 User Mode
On entering the CLI interface, entering user entry system first. If as common user, it
is defaulted to User Mode. The prompt shown is “Switch>“, the symbol “>“ is the prompt
for User Mode. When disable command is run under Admin Mode, it will also return to
the User Mode.
Under User Mode, no configuration to the switch is allowed, only clock time and
version information of the switch can be queries.
1.2.2.2 Admin Mode
To enter Admin Mode sees the following: In user entry system, if as Admin user, it is
defaulted to Admin Mode. Admin Mode prompt “Switch#” can be entered under the User
Mode by running the enable command and entering corresponding access levels admin user password, if a password has been set. Or, when exit command is run under Global
Mode, it will also return to the Admin Mode. ES4700 series also provides a shortcut key
sequence "Ctrl+z”, this allows an easy way to exit to Admin Mode from any configuration
mode (except User Mode).
Under Admin Mode, when disable command is run, it will return to User Mode. When
exit command is run, it will exit the entry and enter user entry system direct. Next users
can reenter the system on entering corresponding user name and password.
Under Admin Mode, the user can query the switch configuration information,
connection status and traffic statistics of all ports; and the user can further enter the
Global Mode from Admin Mode to modify all configurations of the switch. For this reason,
a password must be set for entering Admin mode to prevent unauthorized access and
malicious modification to the switch.
1.2.2.3 Global Mode
Type the config command under Admin Mode will enter the Global Mode prompt
“Switch(Config)#”. Use the exit command under other configuration modes such as
Interface Mode, VLAN mode will return to Global Mode.
The user can perform global configuration settings under Global Mode, such as MAC
Table, Port Mirroring, VLAN creation, IGMP Snooping start, GVRP and STP, etc. And the
user can go further to Interface Mode for configuration of all the interfaces.
1.2.2.4 Interface Mode
Use the interface command under Global Mode can enter the interface mode
specified. ES4700 series provides three interface type: VLAN interface, Ethernet port and
28
port-channel, and accordingly the three interface configuration modes.
Interface Type Entry Prompt Operates Exit
VLAN
Interface
Ethernet Port Type interface
port-channel Type interface
Type interface vlan <Vlan-id>
command under
Global Mode.
ethernet <interface-list>
command under
Global Mode.
port-channel <port-channel-nu mber> command
under Global
Mode.
Switch(Config-If­Vlanx)#
Switch(Config­ethernetxx)#
Switch(Config-if­port-channelx)#
Configure
switch IPs, etc
Configure
supported
duplex mode,
speed, etc.
of Ethernet
Port.
Configure
port-channel
related
settings such
as duplex
mode, speed,
etc.
Use the exit
command to
return to
Global Mode.
Use the exit
command to
return to
Global Mode.
Use the exit
command to
return to
Global Mode.
1.2.2.5 VLAN Mode
Using the vlan <vlan-id> command under Global Mode can enter the corresponding
VLAN Mode. Under VLAN Mode the user can configure all member ports of the
corresponding VLAN. Run the exit command to exit the VLAN Mode to Global Mode.
1.2.2.6 DHCP Address Pool Mode
Type the ip dhcp pool <name> command under Global Mode will enter the DHCP
Address Pool Mode prompt “Switch(Config-<name>-dhcp)#”. DHCP address pool properties can be configured under DHCP Address Pool Mode. Run the exit command to
exit the DHCP Address Pool Mode to Global Mode.
1.2.2.7 Route Mode
Routing
Protocol
Entry Prompt Operates Exit
RIP
Routing
Type router rip
Switch(Config-Router-Rip)# Configure
RIP protocol
29
Use the
exit”
Protocol command
under
Global
Mode.
OSPF
Routing
Protocol
Type router ospf
command
under
Global
Mode.
Switch(Config-Router-Ospf)# Configure
parameters. command to
return to
Global
Mode.
Use the
OSPF
protocol
parameters.
exit”
command to
return to
Global
Mode.
1.2.2.8 ACL Mode
ACL type Entry Prompt Operates Exit
Standard IP
ACL Mode
Type
access-list ip
Switch(Config-Std-Nacl­a)#
Configure
parameters
Use the “exit”
command to
return to
Global Mode.
Use the “exit”
command to
return to
Global Mode.
Extended IP
ACL Mode
command
under Global
Mode.
Type
access-list ip
command
under Global
Mode.
Switch(Config-Ext-Nacl­b)#
for
Standard
IP ACL
Mode
Configure
parameters
for
Extended
IP ACL
Mode

1.2.3 Configuration Syntax

ES4700 series provides various configuration commands. Although all the
commands are different, they all abide by the syntax for ES4700 series configuration
commands. The general command format of ES4700 series is shown below:
cmdtxt <variable> { enum1 | … | enumN } [option] Conventions: cmdtxt in bold font indicates a command keyword; <variable> indicates a variable parameter; {enum1 | … | enumN } indicates a mandatory parameter that should be selected from the parameter set enum1~enumN; and the square bracket ([ ]) in [option] indicate an optional parameter. There may be combinations of “< >“, “{ }” and
30
Loading...
+ 829 hidden pages