ZTE CONFIDENTIAL: This document contains proprietary information of ZTE and is not to be
disclosed or used without the prior written permission of ZTE.
Due to update and improvement of ZTE products and technologies, information in this document
is subjected to change without notice.
With the exponential growth of Internet traffic, IP has globally become the first choice of
networking technology for building the new generation network infrastructure, and IPbased services are now becoming more important from networks of service providers.
Communication networks are experiencing intense evolution. To accommodate this
evolution, network carriers are taking new initiatives to build broadband IP networks that
simultaneously carry data, voice and video services.
As Ethernet switches provide broad range of services and deliver much higher
performance, they have been finding applications on increasingly more IP networks.
ZXR10 59/52 series L3 Gigabit Intelligent Switch launched by ZTE CORPORATION is
mean to fully satisfy IP routing/switching and high QoS assurance needs. This series
support complete IPv4 and IPv6 routing protocols, VLAN control, Ethernet switching,
QoS assurance mechanisms, traffic control, 802.1x, and anti-virus protection, as well as
complete service control and user management capability. These intelligent
characteristics make them all suitable to be used as L3 switches on service provider
networks, enterprise networks and campus networks that focus on service management
control and network security assurance capability.
ZXR10 5900 5200 Product Description
Specifically designed for the access and aggregation layers of broadband IP MANs and
enterprise networks, ZTE ZXR10 59/52 series mid-range/high-end all-gigabit-port
intelligent Ethernet switches provide low to medium density of Ethernet ports, making
them most suitable to be used as user-side access device for intelligent broadband
residential areas, office buildings, hotels, college campuses and enterprise networks
(government networks), or as aggregation device for medium-size networks providing
users with high-speed, efficient and high price-performance-ratio aggregation solution.
Depending on actual network requirement, they offer different combinations of optical
and electrical interfaces for aggregation, for which they are ideal network
aggregation/access devices for large enterprises, high-grade residential areas, hotel,
and college campus networks.
The features of ZXR10 59 series intelligent secure Ethernet switch are:
Carrier-Class Reliability
Providing redundancy on the physical layer, supporting power redundancy and hotswappable modules; providing redundancy on the protocol layer, and supporting the
protocols such as LACP, VRRP and route load sharing.
Wire-Speed Forwarding and Filtering
ASIC hardware switching is used to ensure the wire-speed forwarding of L2, L3 and
IPv6 packets. ASIC hardware filtering is used to ensure packets filtering on L2-L7 and
wire-speed performance of L2-L4 ACL.
Various Protocols Support
Supporting complete and advanced network protocols such as L2, L3, unicast routing,
multicast routing, IPv4, IPv6 and access authentication, keeping up with current
development of the network, and meeting the needs of the users for building advanced
Ethernet networks.
Open System Architecture, Superior Upgrade Capability
With superior upgrade capability, open system architecture is used to protect
subscribers’’ investment and meet customers’ future requirements for new features.
The features of ZXR10 52 series intelligent secure Ethernet switch are:
Carrier-Class Reliability
It provides redundancy on the physical layer, supports power redundancy and hotswappable modules, provides redundancy on the protocol layer and supports the
protocols such as LACP and routing load sharing.
Wire-Speed Forwarding and Filtering
ASIC hardware switching is used to ensure the wire-speed forwarding of L2, L3 packets.
ASIC hardware filtering is used to ensure packets filtering on L2-L7 and wire-speed
performance of L2-L4 ACL.
Rich Network Protocol Supports
Supporting most advanced network protocols such as L2, L3, unicast routing, multicast
routing, IPv4, and access authentication, keeping up with current development of the
network, and meeting the needs of the users for building advanced Ethernet networks.
Open System Architecture, Superior Upgrade Capability
With superior upgrade capability, open system architecture is used to protect
subscribers’’ investment and meet customers’ future requirements for new features.
Table 1 Basic features of ZXR10 59/52 intelligent secure Ethernet Switch
L2 protocol support Support IEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE
802.3ae, IEEE 802.3x, and IEEE 802.1p, etc.
Support IEEE 802.1d STP, IEEE802.1w RSTP, IEEE802.1s
MSTP protocols
Support IEEE 802.3ad LACP link aggregation
Support IEEE802.1Q , VLAN number: 4094
Support VLAN based upon port, protocol and subnet, and
support PVLAN
Support dual VLAN labels (SVLAN or QinQ)
L3 protocol support 59-series support RIP1/2, OSPF, BGP, IS-IS, VRRP routing
protocols.
52-series support RIP1/2 routing protocol
Support Super VLAN
59-series support IPv6
Service functions
QoS attributes Support eight priority queues
Stacking Support super expansion stacking (SES) with maximum
Power supply Power supply (AC): 100V~240V, 50Hz ~60Hz
Multicast: 59 series supports multicast routing protocols such
as IGMP, PIM-DM/SM, MSDP and MBGP, etc. 52 series
supports IGMP multicast routing protocol.
Bandwidth control: Port-, application- and flow-based
bandwidth control with the granularity of 64kbps
Authentication function: Support 802.1x and RADIUS Client
DHCP: Support DHCP Relay and DHCP Server
5928-PS supports POE,IEEE 802.3af, power <30W every port.
Max support port number 24. The whole support power 820W
L2-based priority queuing
Flow control based on L2, L 3, L4 source and destination
L4-based application flow control
support of 32
interface(electrical/CX4)
Support SNMP MIB, MIB II (RFC 1213)
Support RMONV1/V2/V3
Support port mirroring: Includes control module, feature port
and special slot
Support Console/Telnet/SSHmanagement
Power supply (DC): -57V~-40V
5952/5252 Power consumption with full configuration < 150W
5928/5228 Power consumption with full configuration <100 W
5928-PS Power consumption with full configuration <820 W
5928-FI/5228-FI Power consumption with full configuration <
100W
5224 Power consumption with full configuration 80W
Due to the rapid development of data network, NGN and 3G network, there are more
and more demands for IPv6 in the market. The worldwide research centers, carriers and
business customers are busy with the test and deployment of IPv6 network.
ZTE is an active participant in making national IPv6 standard. In 2002, ZTE achieved
“High-Performance IPv6 Forwarding Platform” project belonging to State 863 Project
Packet. From April 2nd to April 4th 2003, ZTE joined in “Global IPv6 Peek Forum 2003”
and showed its new IPv4/v6 dual-stack router and IPv6 network solution. In May 2004,
ZTE high-end router successfully passed MII (Ministry of Information Industry) IPv6
network access test. In September 2004, ZTE the first Chinese vendor got International
IPv6 Ready certificate. All the facts show that currently ZTE NGN IPv6 technology has
been in line with most International vendors.
Currently, the IPv6 protocols supported by ZTE ZXR10 59/52 series Ethernet switch
ZXR10 5900 5200 Product Description
Support IPv6 basic protocols including IPv6 protocol and ND (Neighbor Discovery)
protocol.
Support TCP6, UDP6 and Socket IPv6.
Support Telnet6, gives convenient to remote user to log in via telnet6.
Support PMTU(Path MTU Discovery) function
Provide multiple IPv6 link detection method
Provide IPv6 policy route
There’s still a long way for us to develop IPv4 technology to IPv6 technology. ZTE
ZXR10 59/52 series Ethernet switch provides rich solutions to transfer IPv4 network to
IPv6 network. The following IPv4/IPv6 transition technologies are involved:
SVLAN also named flexible QinQ is the development and enhancement of QinQ.
Compared with old QinQ which is not very flexible as it can only be implemented by
increasing outer label on the port, SVLAN based upon port and C-Tag can tag different
S-Tags as per different situations. In addition, it can keep COS of customer message
and copy 802.1p field of inner label to the outer label to keep the continuity of customer
QoS.
SVLAN has enhanced function of network user location, which enables QinQ to better
support PUPV (one VLAN per user) and PSPV (one VLAN per service). It is easy for
carrier’s operation and maintenance management. The most typical application is Triple
Play service in broadband to the home.
SVLAN can perfectly solve the problem of user location separation and service
differentiation in broadband network. It can implement operation and maintenance
management for one VLAN per user, which brings great convenience to network
management and maintenance. ZTE is always an advocator of this technology and
takes the leading position in the industry.
ZXR10 59/52 series switch supports SVLAN with the following applications and
functions:
Being able to distinguish different service VLAN at one port and tag different outer
layer label based on different service requirements.
Being able to implement coexistence of VLAN transparent transmission and QinQ
service at port. Being able to keep user label unchanged without adding new label
to user label when some VLAN packets are going through switch.
Being able to duplicate 801.1p field in user label to outer layer label to guarantee
that user’s service level is kept unchanged in QinQ network so as to keep the
consistency of QoS of user service.
In IEEE802.1ad, S-Tag is for 0x88A8-type Ethernet, and C-Tag is for 0x8100-type
Ethernet. ZTE switch supports any C-Tag and S-Tag Ethernet.
SVALN has two major applications in the network:
SVLAN is applied in user location separation and service differentiation in network and
Triple Play service in family broadband. SVALN QinQ can solve traditional 4096 VLAN
resource shortage problem so as to truly implement PUPV and PSPV.
Figure 2 shows the adoption in L2 VPN of small network, or QinQ-based Tunnel or
QinQ-based VPN.
Figure 2 User Band VLAN Tag Message
In Figure 2, when customer messages with or without inner VLAN labels reach Ingress
PE (Provider Edge) switch, they may be tagged with corresponding outer labels
according to different switch ports, and then the messages will be transferred
transparently as per S-Tag in Provider Network. Later, theses customer messages will
de-capsulate their S-Tag on Egress PE equipment and then be sent to the related CE
equipment. The advantage of using QinQ VPN is that the Tag resources in Customer
Network and Provider Network are independent from each other. So customers can
make their own VLAN resource without concerning about the VLAN conflict in passing
Provider Network.
VCT (Virtual Connection Test) designed based upon hardware detects the connection
fault. It realizes link diagnosis via TDR (Time Domain Reflection), and gives judgment on
the link faults for example open circuit, short circuit, impendence unmatched and normal
circuit. Besides, it can calculate the distance of the f ailed point of the link.
By using VCT technology, ZTE ZXR10 59/52 series Ethernet switches can carry out
remote maintenance to links to find out the open circuit, break circuit and the error for
detecting fault location is within 1 meter. Via VCT circuit, ZXR10 59/52 series Ethernet
switches can actively eliminate the incorrect customer configuration, and find out the
distance between the failed link and the equipment and port. It can locate and eliminate
most failures in network management center, which simplifies network maintenance and
reduces the costs and difficulties in network operation and maintenance.
2.4 VBS Realizes Precise User Location
VBAS (Virtual Broadband Access Server) is a query protocol used between IP-DSLAM
and BRAS.
It uses L2 end-to-end communication between BRAS and IP-DSLAM, i.e. the port
information query and responding message are directly encapsulated in L2 Ethernet
data frame, configure related DSLAM of VLAN on BAS and generates VBAS protocol in
the course of PPPoE session, that is, according to user’s VLAN, map to the
corresponding DSLAM, and BAS imitates user route label query to DSLAM actively, then
DSLAM gives BAS the route label of the responding customer. Here 59/52 series
switches are working as DSLAM device.
The implementation procedure of VBAS interaction:
User host initiates broadcasting session to generate data packet to ask for setting
up link, and wait for BAS responding.
After one or more than one BAS devices receive broadcasting, the data packets
providing by service are sent to user host if services can be provided.
Customer host selects one BAS as per a certain rule, and send unicast session to
require data packet.
When the selected BAS received the session for requiring data packet, it will
generate an exclusive Session ID, and then goes into PPP session stage after
sending data packet for confirmation to customer host.
When BAS sends data packet for confirmation, it will send VBAS request packet to
DSLAM for checking which physical port of DSLAM the MAC address of user host
comes from.
When DSLAM receives the request data packet from VBAS, it will send VBAS
responding data packet to BAS, and the relations between the MAC address and
DSLAM physical port will return.
When the user host receives the confirming data packet from the selected BAS,
PPP session will be carried on according to Session ID and BAS. Via LCP, send
request packet for ID confirmation to BAS in a point-to-point way.
BAS sends authentication request packet to its background authentication system
(e.g., Radius Server). The authentication request consists of user account,
password and the info of its physical port.
The background authentication system (e.g. Radius Server) returns the responding
packet of BAS authentication.
BAS returns responding packet of user host authentication.
If the authentication is passed, then set up PPP link, so that both sides in the
communication can implement PPP data transmission.
The VBAS protocol of ZTE ZXR10 59/52 series Ethernet switches has the following
merits:
There’s no need of hardware upgrade. With few changes, only software upgrade on
the existing IP DSLAM and BRAS is required.
Only carry out port naming to IP DSLAM instead of making complicate configuration
on BRAS, which indicates little work.
There is no need of changing the existing networking mode, which protects the
existing investment and keeps sound continuity.
The binding between user and IP DSLAM physical port can be realized, that is, user
network suffering info can be got and user port status can be grabbed in advance.
2.5 Redundant Power Supply System
ZXR10 59/52 series switches support AC/DC power supply mode. Designed with -48V
DC power supply mode and 220V AC power supply mode, it can adopt an external 12V
redundant power supply module as well. With 1+1 hot backup power supply module, it
enhances the reliability of power supply system.
2.6 ZESR Ring Protection
ZESR (ZTE Ethernet Smart Ring) designed and developed based upon EAPS principle
of RFC 3619 protocol is used to test if the ring can get through to make sure any logical
path between any two points is smooth. According to the change of the ring (on->down,
down->on), reset the port status (block, forward), so that the logical path can get
switched over quickly.
ZESR is also adaptive to multi-ring and multi-domain environment. Multiple rings
referring to different layers in network topology where each layer is one ring, and there
are two access points in the low-layer ring connecting with high-layer access ring, so
that network topology is an independent ring and the tangent part of one ring actually
looks as part of the other ring. The ring with highest level is called main ring, the others
are called access ring. Multiple domains refer to multiple protection instances on one
ring adaptive to different service VLANs standing independently with different logical
paths.
2.7 Stacking Function
ZXR10 52/59 supports SES stacking function. Stacking is a management domain
composing by some Ethernet switches connecting via stacking ports, where our main
switch and several standby switches exist. Normally daisy chain is used as shown in the
following figure:
Figure 3 Stack Example
Switches connect each other via stacking interfaces. Among devices, special protocol
message is used to control topology discovery, calculation, routing maintenance, etc.
The advantages stacking function brings to users are:
Sound Management: IRF stacking enables unified management of multiple devices.
One connection and one IP address can manage the entire Fabric, which obviously
reduces the costs.
Superior Extensibility: IRF stacking is capable of fitting different users’ demands and
guarantees smooth network extensibility, which maximally protects investment in
network upgrade.
N+1-mode backup features high reliability, which avoids single-point failure and
For single cassette switch, the system can implement the following characteristic
features:
Distributed management: in terms of management, all equipment belongs to one unit.
Administrator can control the devices via WEB, telnet, console, and SNMP. Different
devices are similar to different slots in a rack.
Distributed forwarding: instead of forwarding to the host, the message forwarding and
query can be done locally. With system redundancy, when one device breaks down,
other devices can implement normal forwarding as well.
Distributed link aggregation: support cross-device link aggregation, so that link backup
and load sharing can be implemented among devices.
2.8 Supporting IPTV
As a key technology of ZTE IPTV system, controllable multicast technology is mainly
used in broadband access network. The device (BRAS, DSLAM or Switch) realizing
multicast control policy is called multicast control point. The multicast control point
working as the ultimate point of user multicast IGMP query determine if multicast traffic
will be duplex to customer port as per related IGMP query and control policy. The closer
the multicast control point is from user, the less bandwidth the network requires. As an
important device implementing multicast control policy, the multicast control point must
support the following services: IGMP V1/V2, IGMP Snooping, IGMP Filter, IGMP Proxy,
IGMP Fast leave, MVR (Multicast VlLAN Register,), SGR(Static Group Register, static
multicast group register), UGAC(User Group Access Control, User Multicast Access
Control), and UGAR(User Group Access Record, User Multicast Access Record).
User’s authority for demanding services is controlled by binding rule and channel.
ZXR10 5900 5200 Product Description
2.9 Powerful Security Feature
ZXR10 52/59 switches provide customers with rich security features in control layer, data
layer and management layer of the devices respectively to implement overall protection.
The security mechanisms provided by these devices are:
Support MAC address table and ARP binding, MAC addresses filtering and
broadcasting suppression.
Support DHCP SNOOPING
Support CPU anti-attack (virus) protection, CPU overload/rhythm protection.
Support the feature of identifying multiple virus feature message, and filtering
LAND/BLAT/NULLScan/XmaScan/Smurf, SYN Flooding, Ping Flood, anti-DDoS
attack. Support Rood Guard of SPT, precaution against BPDU attack and ARP
attack.
Support uRPF unicast converse route inspection, precaution against pseudo
address attack.
Support OSPF/RIPv2/BGPv4 MD5 cipher text checking.
For ZXR10 59/52 series, all forwarding tables and MAC addresses are closely related,
therefore MAC management module is the most fundamental as well as the most
important functional module in the Ethernet switch, since it performs basic functions
such as managing MAC addresses learning and performs the following management
operations:
MAC address binding: A specific MAC address can be bond with one port of the
switch. After that, no dynamic learning will be performed for the MAC address, so
that the physical location of a user can be restricted and important MAC addresses
can be protected
MAC address filtering: When the switch receives packets whose source or
destination MAC address are special MAC addresses, it can drop them to order to
filter some un-welcomed users
ZXR10 5900 5200 Product Description
Number of MAC addresses restriction: The number of MAC addresses of some
ports can be restricted to control the number of users of these ports. In addition,
prevention is made at the ports when they are under DOS attack to avoid
exhaustion of system resources
MAC address freeze: For a network that runs stably, the addresses of certain
important physical ports, such as uplink ports, can be freezed, in order to prevent
network interruptions due to the use of key MAC addresses by unauthorized users
MAC address display in multiple views: The VLAN table can be shown with
statistics collection in multiple aspects, such as VLAN, port, static or dynamic etc, to
help network diagnosis and maintain network stability.
3.2 Basic VLAN
VLAN is a fundamental protocol for L2 switching equipment, which enables administrator
to divide a physical LAN into multiple VLANs. Each VLAN has a VLAN ID to identify itself
uniquely within the entire LAN. Multiple VLANs share the switching equipment and links
of the physical LAN.
Logically, each VLAN is like an independent LAN, and all network frame traffics of a
VLAN are restricted within the VLAN. Inter-VLAN access can only be done via L3
forwarding, since direct access is not possible. In this way, network performance is
improved, and total traffic in the physical LAN can be effectively decreased.
The function of the VLAN is to reduce broadcast storm on the network, and to enhance
security and allows centralized management of the network.
59/52 switches series support 802.1Q VLAN. For untagged packets, VLAN tags can be
added to them based on subnet, protocol or port, so that a great variety of VLAN
features can be supported.
In the 802.1Q VLAN protocol, a VLAN is represented by a 12-bit number, so the number
of VLANs is limited within 4096, limiting some practical applications. The 59/52 switches
series provide four kinds of extensions. The first three are QinQ, PVLAN and VLAN
Translation, and the last one is Layer-3 related Super VLAN feature.
3.3 QinQ
QinQ, also known as multi-layer VLAN tag stacking, is a visualized name for the
tunneling protocol based on 802.1Q encapsulation. Its basic idea is to encapsulate
private VLAN tag into public VLAN tag, so that packets pass through the backbone
network with two tags, offering users with a simple L2 VPN tunneling technology. The
QinQ protocol is a simple while easy-to-be-managed protocol, since it does not require
the support of particular control protocol but can be implemented via static configuration
only. It is particularly useful for the switches on the aggregation layer. By supporting
QinQ (double tags), the switches on the aggregation layer can effectively increase the
number of VLANs in the MAN.
At present, IEEE is developing a specification for VLAN stacking, that is, 802.1adProvider Bridge. The external VLAN layer is defined as Service VLAN --- SVLAN, for
which the specification is still in draft.
In the software system of the 59/52, the QinQ software function module performs static
configuration of QinQ, and perform appropriate configuration for the chipsets. In QinQ,
there are two forms of VLANs:
SVLAN (Service VLAN): VLAN defined on the backbone network
CVLAN (Customers VLAN): User-defined VLAN
The QinQ software function module adds one parameter in the VLAN table, to order to
indicate whether the VLAN is a SVLAN or CVLAN, and the bottom-layer driver interface
function is used to set the QinQ function for the chipset.
3.4 PVLAN
For the scenario where all servers are located within a subnet but they can only
communicate with their default gateways, this new VLAN feature is called Private VLAN.
In the concept of Private VLAN, there are three types of ports of the switch: Isolated Port,
Community Port and Promiscuous Port. They correspond to different VLAN types
respectively: Isolated port belongs to Isolated PVLAN, Community port belongs to
Community PVLAN, while Promiscuous VLAN represents one complete Private VLAN.
Either of the first two types of VLANs must be bound within a Primary VLAN, which a
Promiscuous Port should also be included. For Isolated PVLAN, an Isolated Port can
only communicate with a Promiscuous Port, but it cannot exchange any traffic with
another Isolated Port. For Community PVLAN, a Community Port can communicate with
not only a Promiscuous port but also with another Community Port. The Promiscuous
Port is connected to an interface of another router or L3 switch. The traffic it receives
can then be forwarded to an isolated port or Community port.
Using PVLAN can be very effective for ensuring the security of data communication in
the network. A user only needs to connect its default gateway. One PVLAN can provide
connections with L2 data communication security without multiple VLAN and IP subnet.
All the users are connected to the PVLAN, so they are connected to the default gateway,
without access between any other users in the PVLAN. The PVLAN function ensures
that the ports within one VLAN cannot communicate between each other, while traffic
can only pass through via the Trunk port. In this way, even broadcast traffic from one
user in a VLAN will not affect another user within the same VLAN.
The PVLAN can be implemented on the ZXR10 59/52 simply through static configuration.
3.5 VLAN Translation
VLAN translation is also an expansion of the VLAN function. If one port of the switch has
the VLAN translation function enabled, the incoming data streams from that port must be
tagged. The VLAN translation function looks up in the MAC-VLAN table for a new VID by
using the combination of VID contained in the tag and the port number as the index, and
then the data streams will be switched using the new VLAN. This is the process of
translation from one VLAN to another.
The VLAN translation can be implemented on the ZXR10 59/52 simply through static
configuration. However, it should be noted that if the VLAN translation function is started,
the VLANs cannot be differentiated based on MAC addresses. On the contrary, if the
VLANs are needed to be differentiated based on MAC address, VLAN translation
function should be disabled.
ZXR10 5900 5200 Product Description
3.6 Super VLAN
Super VLAN allows that hosts within same physical switching equipment belong to
different virtual broadcast domains and resides within the same IPv4 subnet with the
same default gateway. In current large-scale LAN switching environment, this
mechanism has a number of advantages over the traditional IPv4 addressing
mechanism. Its most important advantage is that it preserves address space in the IPv4
system.
Super VLAN uses the concepts of super virtual network and virtual sub-network to
perform dual-classification on the VLAN. One or multiple virtual sub-networks belong to
one super virtual network, and they will use the default gateway IP address of the super
virtual network.
The Super VLAN function is a pure software function. This function is transparent to the
Ethernet ASIC chip, which still performs data exchange according to the VLAN setting
made by the software module. Super VLAN can be implemented on the ZXR10 59/52
simply through static configuration.
3.7 Spanning Tree Protocol (STP)
STP is used to detect and eliminate loops between L2 switching functional units, and
provide redundancy links, for enhanced performance and reliability of the LAN.
This module performs the following two major functions:
Avoids network loop, prevents LAN broadcast storm due to such loop, and provides
redundant paths for backup.
Detect changes to the topology structure, and configure the spanning tree topology
again according to the change detected.
After the switch in a subnet executes STP, it will create a dynamic spanning tree
topology structure, where there will be no loop between any workstations in the LAN,
thus preventing broadcast storm. At the same time, STP also detects changes on the
topology, and creates a new spanning tree when the topology changes, providing fault
tolerance and allowing the re-configuration of the topology of the spanning tree.
According to the status information of the dynamic topology of the spanning tree, the
switch maintains and updates the MAC table, and finally implements f orwarding on the
MAC layer.
STP is designed to allow the switch to dynamically detect a loop-free (tree) of the
topology and ensure adequate connectivity, so that there is always a path between two
LANs as long as physically possible. According to the principles of graph theory, any
route graph containing nodes and connection nodes has a spanning tree of the routes
that ensure the connectivity to the destination but have no loop. Therefore, the spanning
tree algorithm and protocol can avoid loops in any dynamic topology, and can eliminate
those loops between any two workstations.
The Multiple Spanning Tree Protocol (MSTP) defined by IEEE802.1s is compatible with
the RSTP defined by IEEE802.1w and the common STP defined by IEEE802.1D.
Therefore, the spanning tree module only needs to implement the MSTP. When MSTP is
enabled, it can be forcedly set to RSTP or STP, so mixed networking applications of STP
and RSTP are supported. In addition, enabling SPT on the aggregated links and support
of STP based on ports is also supported.
ZXR10 59/52 series support STP, RSTP, and MSTP, as well as the mixed network
applications described above.
3.8 Link Aggregation
Link aggregation is the process where multiple physical links with the same media type
and same transmission rate are bundled together, and appear as one link logically. It
allows parallel physical links between switches or between switches and servers in order
to increase bandwidth. As a result, it becomes an important technology in increasing link
bandwidth and allows transmission link creation in a flexible way with good resilience. In
Gigabit Ethernet, link aggregation can be used to create multi-gigabit connections. It can
also be used to create faster logical links for Fast Ethernet. Link aggregation can provide
good link resilience, since communication can be rapidly switched over to the
operational links when one or more links fail.
ZXR10 59/52 series implements link aggregation protocol LACP defined by IEEE
802.3ad, and supports link aggregation for gigabit Ethernet port and 10GE ports.
3.9 Port Mirroring
Port mirroring can automatically mirror traffic from one port to another, so that network
administrator can take a real-time analysis of the port traffic for detecting network faults,
and offers a monitoring mechanism for network management personnel. For ZXR10
59/52 series, any port can be configured as a mirror port. Mirroring is also possible
between ports operating at different rates. It is also possible to mirror traffic from multiple
ports to one port, and mirroring can be enabled as multiple mirroring groups.
3.10 IGMP Snooping
The IGMP Snooping maintains the relationship between multicast address and VLAN by
listening to IGMP packets transmitted between the user and the router. It maps members
of a multicast group into a VLAN. After receiving multicast packets, it forwards them only
to VLAN members in that multicast group. IGMP Snooping and IGMP are similar in that
they are both used for managing and controlling multicast groups through IGMP
messages. However, they differ in that IGMP runs on the network layer, while IGMP
Snooping runs on the link layer. When the switch receives IGMP packets, IGMP
Snooping will help analyze the information contained in them, establish and maintain a
MAC multicast address table on L2.
When IGMP Snooping is enabled on the ZXR10 59/52, multicast packets will be
multicast on L2. When no IGMP Snooping is enabled, multicast packets will be
broadcast on L2.
ZXR10 5900 5200 Product Description
3.11 802.1x
802.1x is a Client/Server-based access control and authentication protocol. It is a
service which authenticates user devices connected to the system ports and determines
whether to allow users to access the system through the ports, in order to prevent
unauthorized data transfer between users and services provided by the system. Initially
access control of 802.1x only allows EAPOL frames to pass through from the user ports.
Other data are not allowed to pass through the ports unless authentication has been
done.
802.1x classifies the access point for which the authenticator system connects to LAN
into two logical ports: Controlled port and uncontrolled port. Regardless of its
authentication status, an uncontrolled port can freely exchange PDUs with other
systems. A controlled port can exchange PDUs with other systems only when its status
is authenticated. PAE is an entity that runs and authenticates related algorithms and
protocols. The authenticator PAE responds to the requests from the supplicant PAE and
provides authentication information. The authenticator PAE communicates with the
supplicant PAE, and sends the information received from the supplicant PAE to the
authentication server, which will verify this information so as to determine whether to
allow the supplicant to access its services. The authenticator PAE relies on the
authentication result to determine the status of the controlled port should be authorized
or unauthorized. The authenticator PAE performs protocols exchange with the supplicant
PAE over an uncontrolled port by using EAPOL protocol, and communicates with the
RADIUS server by using EAPOR protocol.
The 802.1x module mainly implements the following features:
Allows the authenticator PAE to perform protocol exchange via uncontrolled port
and EAPOL
Supports operation on uncontrolled port by using AuthControlledPortControl with
the parameters of ForceUnauthorized, Auto, and ForceAuthorized
Supports operation on uncontrolled port by using AdminControlledDirections and
OperControlledDirections with parameter of Both
Supports periodic re-authentication of the supplicant by using a re-authentication
timer
Supports transparent transmission of 802.1x authentication packets when no
authentication is enabled
3.12 VRRP Protocol
VRRP protocol provides, via a set of verification and election mechanism, route backup
in a multi-address access network. Mainly based on the backup of gateway equipment
of a LAN, the protocol is responsible for ensuring the non-stop network operation for
host access, in other words, it provides route next hop backup for host access. By
providing simple test and election mechanism, VRRP can implement quick
active/standby switchover when failure occurs, which is 3 to 5 seconds by default. In
addition, it does not pose any special requirements for the access host.
Due to VRRP working mechanism, all the collaborative devices in one VRRP backup
group should be in one LAN, i.e. there isn’t any inter-bridge device. As a result, in
today’s networking that VLAN is preferred, the devices in one backup group should all in
the same VLAN, but one VLAN can consist of multiple VRRP backup groups.
3.13 IPv4 Unicast Routing Protocol
3.13.1 RIP Protocol
The implementation of RIP protocol is based on using distance vector routing algorithm
over the local network. RIP protocol uses UDP packet to exchange RIP routing
information for which RIP packets are encapsulated in UDP. The routing information of
RIP messages contains the number of routing nodes (number of hop) that the route has
transverse, and routing node will decide the route for each destination network as per
this hop number. The RFC standard limits the maximum hop number as 16 and it is
suitable as the interior gateway protocol for a small AS.
The main features of ZXR10 59/52 series RIP protocol are:
It can send and receive RIP message as per protocol, in addition, it can message
verification and implement ID authentication.
Loading...
+ 53 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.