H3C S3600V2 SERIES Layer 2-Lan Switching Configuration Manual

Category
Networking
Type
Layer 2-Lan Switching Configuration Manual
H3C S3600V2 Switch Series
Layer 2
—
LAN Switching Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 2108
Document version: 6W100-20131130
Copyright © 2013, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H
3
Care, , IRF, NetPilot, Netflow,
SecEngine, SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of
Hangzhou H3C Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S3600V2 documentation set includes 10 configuration guides, which describe the software
features for the H3C S3600V2 Switch Series Release 2108, and guide you through the software
configuration procedures. These configuration guides also provide configuration examples to help you
apply software features to different network scenarios.
The Layer 2—LAN Switching Configuration Guide describes LAN switching fundamentals and
configuration. It describes how to implement flow control and load sharing, isolate uses in the same
VLAN, eliminate Layer 2 loops, divide VLANs, transmit customer network packets through the public
network, and modify VLAN tags for packets.
This preface includes:
• Audience
• Added and modified features
• Conventions
• About the H3C S3600V2 documentation set
• Obtaining documentation
• Technical support
• Documentation feedback
Audience
This documentation is intended for:
• Network planners
• Field technical support and servicing engineers
• Network administrators working with the S3600V2 series
Added and modified features
Compared to Release 2101, Release 2108 adds and modifies the following features:
Confi
g
uration
g
uide Added and modified features
Ethernet interface N/A
Loopback and null interface N/A
Bulk interface configuration Bulk interface configuration is a newly added feature
MAC address table
New features:
• Disabling MAC entry aging timer refresh based on destination MAC
Confi
g
uration
g
uide Added and modified features
address
• Enabling MAC address migration log notifying
MAC Information N/A
Ethernet link aggregation
New feature: Configuring the maximum number of Selected ports
allowed in an aggregation group
Port Isolation N/A
Spanning tree N/A
BPDU tunneling N/A
VLAN N/A
Super VLAN N/A
Isolate-user-VLAN N/A
Voice VLAN
New features:
• Enabling LLDP to automatically discover IP phones
• Configuring LLDP to advertise a specific voice VLAN
• Dynamically advertising server-assigned VLANs through LLDP
Modified feature: The number of OUI addresses that can be configured
for the voice VLAN feature was changed from 16 to 128.
GVRP N/A
QinQ N/A
VLAN mapping N/A
LLDP
Modified feature: For the LLDP-compatible CDP features, the Addresses,
Capabilities, Software Version, Platform, Duplex, MTU, and System
Name fields were added to the CDP packets sent by the switch.
Service loopback group N/A
MVRP MVRP is a newly added feature.
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Descri
p
tion
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Descri
p
tion
Boldface
Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Convention Descri
p
tion
< > Button names are inside angle brackets. For example, click <OK>.
[ ]
Window names, menu items, data table and field names are inside square brackets. For
example, pop up the [New User] window.
/ Multi-level menus are separated by forward slashes. For example, [File/Create/Folder].
Symbols
Convention Descri
p
tion
WARNING
An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
An alert that calls attention to essential information.
NOTE
An alert that contains additional or supplementary information.
TIP
An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
About the H3C S3600V2 documentation set
The H3C S3600V2 documentation set includes:
Cate
g
or
y
Documents
Pur
p
oses
Product description and
specifications
Marketing brochure Describe product specifications and benefits.
Technology white papers
Provide an in-depth description of software features
and technologies.
Hardware specifications
and installation
Compliance and safety
manuals
CE DOCs
Provide regulatory information and the safety
instructions that must be followed during installation.
Installation quick starts
Guides you through initial installation and setup
procedures to help you quickly set up your device.
Installation guides
Provides a complete guide to switch installation and
specifications.
RPS Ordering Information
for H3C Low-End Ethernet
Switches
Helps you order RPSs for switches that can work with
an RPS.
User manuals for RPSs
Describe the specifications, installation, and
replacement of RPSs.
H3C Low End Series
Ethernet Switches
Pluggable Modules
Manual
Describes the specifications of pluggable transceiver
modules.
Pluggable SFP[SFP+][XFP]
Transceiver Modules
Installation Guide
Describe the installation, and replacement of
SFP/SFP+/XFP transceiver modules.
Software configuration
Configuration guides
Describe software features and configuration
procedures.
Command references
Provide a quick reference to all available
commands.
Operations and
maintenance
Release notes
Provide information about the product release,
including the version history, hardware and software
compatibility matrix, version upgrade information,
technical support information, and software
upgrading.
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web
at http://www.h3c.com
.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents]
– Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download]
– Provides the documentation released with the
software version.
Technical support
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to inf[email protected].
We appreciate your comments.
i
Contents
Configuring Ethernet interfaces ··································································································································· 1
Ethernet interface naming conventions ··························································································································· 1
Performing general configurations ·································································································································· 1
Configuring a combo interface ······························································································································· 1
Configuring basic settings of an Ethernet interface ······························································································ 2
Shutting down an Ethernet interface ······················································································································ 3
Configuring flow control on an Ethernet interface ································································································ 3
Configuring link state change suppression on an Ethernet interface ·································································· 4
Configuring loopback testing on an Ethernet interface ························································································ 5
Configuring the link mode of an Ethernet interface ······························································································ 6
Configuring jumbo frame support ·························································································································· 6
Enabling the auto power-down function on an Ethernet interface ······································································ 7
Configuring a Layer 2 Ethernet interface ······················································································································· 7
Layer 2 Ethernet interface configuration task list ·································································································· 7
Configuring a port group ········································································································································ 8
Setting speed options for auto negotiation on an Ethernet interface ·································································· 9
Configuring storm suppression ···························································································································· 10
Setting the statistics polling interval ····················································································································· 10
Enabling loopback detection on an Ethernet interface ····················································································· 11
Setting the MDI mode of an Ethernet interface ·································································································· 13
Enabling bridging on an Ethernet interface ······································································································· 14
Testing the cable connection of an Ethernet interface ······················································································· 14
Configuring storm control on an Ethernet interface ··························································································· 15
Setting the MTU for a Layer 3 Ethernet interface ········································································································ 16
Displaying and maintaining an Ethernet interface ····································································································· 16
Configuring loopback and null interfaces ················································································································ 18
Configuring a loopback interface ································································································································ 18
Introduction to the loopback interface················································································································· 18
Configuration procedure ······································································································································ 18
Configuring a null interface ·········································································································································· 19
Introduction to the null interface ··························································································································· 19
Configuration procedure ······································································································································ 19
Displaying and maintaining loopback and null interfaces ························································································ 19
Bulk configuring interfaces ········································································································································ 21
Configuration guidelines ··············································································································································· 21
Configuration procedure ··············································································································································· 21
Configuring the MAC address table ························································································································ 22
Overview ········································································································································································· 22
How a MAC address table entry is created ······································································································· 22
Types of MAC address table entries ··················································································································· 23
MAC address table-based frame forwarding ···································································································· 23
Configuring static, dynamic, and blackhole MAC address table entries ································································ 23
Configuring a static or dynamic MAC address table entry in system view ···················································· 24
Configuring a static or dynamic MAC address table entry in interface view ················································ 24
Configuring a blackhole MAC address entry ···································································································· 24
Disabling MAC address learning on a VLAN ············································································································ 24
Configuring the aging timer for dynamic MAC address entries ··············································································· 25
ii
Disabling MAC entry aging timer refresh based on destination MAC address ····················································· 25
Application example ············································································································································· 26
Configuring the MAC learning limit on ports·············································································································· 26
Enabling MAC address roaming ·································································································································· 27
Enabling MAC address migration log notifying ········································································································· 28
Displaying and maintaining MAC address tables ····································································································· 29
MAC address table configuration example ················································································································ 29
Network requirements ··········································································································································· 29
Configuration procedure ······································································································································ 30
Configuring MAC Information ·································································································································· 31
Overview ········································································································································································· 31
Introduction to MAC Information ························································································································· 31
How MAC Information works ······························································································································ 31
Enabling MAC Information globally ···························································································································· 31
Enabling MAC Information on an interface ················································································································ 31
Configuring MAC Information mode ··························································································································· 32
Configuring the interval for sending Syslog or trap messages ················································································· 32
Configuring the MAC Information queue length ········································································································ 32
MAC Information configuration example ···················································································································· 33
Network requirements ··········································································································································· 33
Configuration procedure ······································································································································ 33
Configuring Ethernet link aggregation ····················································································································· 34
Overview ········································································································································································· 34
Basic concepts ······················································································································································· 34
Aggregating links in static mode ························································································································· 37
Aggregating links in dynamic mode ··················································································································· 38
Load-sharing criteria for link aggregation groups ····························································································· 39
Configuration restrictions and guidelines ···················································································································· 40
Ethernet link aggregation configuration task list ········································································································· 40
Configuring an aggregation group ····························································································································· 40
Configuration guidelines ······································································································································ 41
Configuring a static aggregation group ············································································································· 41
Configuring a dynamic aggregation group ······································································································· 42
Configuring an aggregate interface ···························································································································· 44
Configuring the description of an aggregate interface ····················································································· 44
Configuring the MTU of a Layer 3 aggregate interface ··················································································· 45
Enabling link state traps for an aggregate interface ························································································· 45
Limiting the number of Selected ports for an aggregation group ···································································· 46
Shutting down an aggregate interface ··············································································································· 47
Restoring the default settings for an aggregate interface ················································································· 47
Configuring load sharing for link aggregation groups ······························································································ 48
Configuring load-sharing criteria for link aggregation groups ········································································ 48
Enabling local-first load sharing for link aggregation ······················································································· 49
Enabling link-aggregation traffic redirection ··············································································································· 50
Displaying and maintaining Ethernet link aggregation ····························································································· 51
Ethernet link aggregation configuration examples ····································································································· 52
Layer 2 static aggregation configuration example ···························································································· 52
Layer 2 dynamic aggregation configuration example ······················································································ 54
Layer 3 static aggregation configuration example ···························································································· 56
Layer 3 dynamic aggregation configuration example ······················································································ 57
Configuring port isolation ·········································································································································· 59
Assigning a port to the isolation group ······················································································································· 59
Displaying and maintaining the isolation group ········································································································ 59
iii
Port isolation configuration example···························································································································· 60
Configuring spanning tree protocols ························································································································ 61
STP ··················································································································································································· 61
STP protocol packets ············································································································································· 61
Basic concepts in STP ············································································································································ 62
Calculation process of the STP algorithm ··········································································································· 63
RSTP ················································································································································································· 68
PVST ················································································································································································· 68
MSTP ················································································································································································ 68
STP, RSTP, and PVST limitations ·························································································································· 68
MSTP features ························································································································································ 68
MSTP basic concepts ············································································································································ 69
How MSTP works ·················································································································································· 73
Implementation of MSTP on devices ···················································································································· 73
Protocols and standards ················································································································································ 73
Spanning tree configuration task list ···························································································································· 74
Configuration restrictions and guidelines ··········································································································· 74
STP configuration task list ····································································································································· 74
RSTP configuration task list ··································································································································· 75
PVST configuration task list··································································································································· 76
MSTP configuration task list ································································································································· 77
Setting the spanning tree mode ···································································································································· 78
Configuring an MST region ·········································································································································· 79
Configuration restrictions and guidelines ··········································································································· 79
Configuration procedure ······································································································································ 79
Configuring the root bridge or a secondary root bridge ·························································································· 80
Configuration restrictions and guidelines ··········································································································· 80
Configuring the current device as the root bridge of a specific spanning tree ·············································· 80
Configuring the current device as a secondary root bridge of a specific spanning tree ······························ 81
Configuring the device priority ····································································································································· 81
Configuring the maximum hops of an MST region ···································································································· 81
Configuring the network diameter of a switched network ························································································· 82
Configuring spanning tree timers ································································································································· 82
Configuration restrictions and guidelines ··········································································································· 83
Configuration procedure ······································································································································ 83
Configuring the timeout factor ······································································································································ 84
Configuring the maximum port rate ····························································································································· 84
Configuring edge ports ················································································································································· 85
Configuration restrictions and guidelines ··········································································································· 85
Configuration procedure ······································································································································ 85
Configuring path costs of ports ···································································································································· 85
Specifying a standard for the device to use when it calculates the default path cost ··································· 86
Configuring path costs of ports ···························································································································· 87
Configuration example ········································································································································· 88
Configuring the port priority ········································································································································· 88
Configuring the port link type ······································································································································· 89
Configuration restrictions and guidelines ··········································································································· 89
Configuration procedure ······································································································································ 89
Configuring the mode a port uses to recognize/send MSTP packets ······································································ 89
Enabling outputting port state transition information ·································································································· 90
Enabling the spanning tree feature ······························································································································ 91
Configuration restrictions and guidelines ··········································································································· 91
Enabling the spanning tree feature (in STP/RSTP/MSTP mode) ······································································ 91
Enabling the spanning tree feature (in PVST mode) ·························································································· 91
iv
Performing mCheck ························································································································································ 92
Performing mCheck globally ································································································································ 92
Performing mCheck in interface view ················································································································· 92
Configuring Digest Snooping ······································································································································· 93
Configuration restrictions and guidelines ··········································································································· 93
Configuration procedure ······································································································································ 93
Digest Snooping configuration example ············································································································· 94
Configuring No Agreement Check ······························································································································ 95
Configuration prerequisites ·································································································································· 96
Configuration procedure ······································································································································ 96
No Agreement Check configuration example···································································································· 97
Configuring TC snooping ·············································································································································· 97
Configuration restrictions and guidelines ··········································································································· 98
Configuration procedure ······································································································································ 98
Configuring protection functions ·································································································································· 98
Configuration prerequisites ·································································································································· 98
Enabling BPDU guard ··········································································································································· 98
Enabling root guard ·············································································································································· 99
Enabling loop guard ··········································································································································· 100
Enabling TC-BPDU guard···································································································································· 101
Enabling BPDU drop ··········································································································································· 101
Displaying and maintaining the spanning tree ········································································································· 102
Spanning tree configuration examples ······················································································································ 102
MSTP configuration example ····························································································································· 102
PVST configuration example ······························································································································ 106
Configuring BPDU tunneling ··································································································································· 110
Overview ······································································································································································· 110
Background ·························································································································································· 110
BPDU tunneling implementation ························································································································· 111
Enabling BPDU tunneling ············································································································································ 112
Configuration prerequisites ································································································································ 112
Configuration restrictions and guidelines ········································································································· 113
Configuration procedure ···································································································································· 113
Configuring destination multicast MAC address for BPDUs ···················································································· 113
BPDU tunneling configuration examples ···················································································································· 114
BPDU tunneling for STP configuration example ······························································································· 114
BPDU tunneling for PVST configuration example ····························································································· 115
Configuring VLANs ················································································································································· 117
Overview ······································································································································································· 117
VLAN fundamentals············································································································································· 117
VLAN types ·························································································································································· 118
Protocols and standards ····································································································································· 119
Configuring basic VLAN settings································································································································ 119
Configuration restrictions and guidelines ········································································································· 119
Configuration procedure ···································································································································· 119
Configuring basic settings of a VLAN interface ······································································································· 120
Configuration procedure ···································································································································· 120
VLAN interface configuration example ············································································································· 121
Configuring port-based VLANs ··································································································································· 122
Introduction to port-based VLAN ······················································································································· 122
Assigning an access port to a VLAN ················································································································ 123
Assigning a trunk port to a VLAN······················································································································ 124
Assigning a hybrid port to a VLAN ··················································································································· 125
v
Port-based VLAN configuration example ·········································································································· 126
Configuring MAC-based VLANs ································································································································ 128
Introduction to MAC-based VLAN ····················································································································· 128
Configuration restrictions and guidelines ········································································································· 130
Configuration procedure ···································································································································· 131
MAC-based VLAN configuration example ······································································································· 133
Configuring protocol-based VLANs ··························································································································· 135
Introduction to protocol-based VLAN ················································································································ 135
Configuration restrictions and guidelines ········································································································· 135
Configuration procedure ···································································································································· 136
Protocol-based VLAN configuration example ··································································································· 137
Configuring IP subnet-based VLANs ·························································································································· 139
Configuration procedure ···································································································································· 139
IP subnet-based VLAN configuration example ································································································· 140
Displaying and maintaining VLAN ···························································································································· 142
Configuring a super VLAN ····································································································································· 144
Overview ······································································································································································· 144
Configuration procedure ············································································································································· 144
Displaying and maintaining super VLAN ·················································································································· 146
Super VLAN configuration example ·························································································································· 146
Configuring an isolate-user-VLAN ·························································································································· 149
Overview ······································································································································································· 149
Configuration restrictions and guidelines ·················································································································· 150
Configuration procedure ············································································································································· 150
Displaying and maintaining isolate-user-VLAN ········································································································· 151
Isolate-user-VLAN configuration example ·················································································································· 152
Network requirements ········································································································································· 152
Configuration procedure ···································································································································· 152
Verifying the configuration ································································································································· 153
Configuring a voice VLAN ····································································································································· 155
Overview ······································································································································································· 155
Methods of identifying IP phones ······························································································································· 155
OUI addresses ····················································································································································· 155
Automatically identifying IP phones through LLDP ··························································································· 156
Configuring a device to advertise voice VLAN information to IP phones ······························································ 156
How a device advertises voice VLAN information ·························································································· 156
How a device obtains voice VLAN information ······························································································· 156
IP phone access methods ············································································································································ 157
Connecting the host and the IP phone in series ······························································································· 157
Connecting the IP phone to the device separately ·························································································· 157
Configuring a voice VLAN on a port ························································································································· 157
Voice VLAN assignment modes ························································································································· 157
Security mode and normal mode of voice VLANs ··························································································· 159
Configuration prerequisites ································································································································ 160
Configuring QoS priority settings for voice traffic on an interface ································································ 160
Configuring a port to operate in automatic voice VLAN assignment mode ················································· 161
Configuring a port to operate in manual voice VLAN assignment mode ····················································· 162
Enabling LLDP to automatically discover IP phones ·································································································· 163
Configuration prerequisites ································································································································ 163
Configuration procedure ···································································································································· 164
Configuring LLDP to advertise a specific voice VLAN ······························································································ 164
Configuration guidelines ···································································································································· 164
Configuration procedure ···································································································································· 165
vi
Dynamically advertising server-assigned VLANs through LLDP ··············································································· 165
Overview ······························································································································································ 165
Example for using 802.1X to authenticate IP phones ····················································································· 165
Displaying and maintaining voice VLAN ·················································································································· 166
Voice VLAN configuration examples ························································································································· 166
Automatic voice VLAN mode configuration example ····················································································· 166
Manual voice VLAN assignment mode configuration example ····································································· 168
Configuring GVRP ··················································································································································· 171
Overview ······································································································································································· 171
GARP ···································································································································································· 171
GVRP ····································································································································································· 174
Protocols and standards ····································································································································· 174
GVRP configuration task list ········································································································································ 174
Configuring GVRP functions ········································································································································ 175
Configuration restrictions and guidelines ········································································································· 175
Configuration procedure ···································································································································· 175
Configuring the GARP timers ······································································································································ 176
Displaying and maintaining GVRP ····························································································································· 177
GVRP configuration examples ···································································································································· 177
GVRP normal registration mode configuration example ················································································· 177
GVRP fixed registration mode configuration example ···················································································· 179
GVRP forbidden registration mode configuration example ············································································ 180
Configuring QinQ ··················································································································································· 182
Overview ······································································································································································· 182
Background and benefits ···································································································································· 182
How QinQ works ················································································································································ 182
QinQ frame structure ·········································································································································· 183
Implementations of QinQ ··································································································································· 184
Protocols and standards ····································································································································· 184
QinQ configuration task list ········································································································································ 184
Configuring basic QinQ ············································································································································· 185
Enabling basic QinQ ·········································································································································· 185
Configuring VLAN transparent transmission ···································································································· 185
Configuring selective QinQ ········································································································································ 186
Configuring an outer VLAN tagging policy ····································································································· 186
Configuring an inner-outer VLAN 802.1p priority mapping ·········································································· 187
Configuring inner VLAN ID substitution ············································································································ 188
Configuring the TPID value in VLAN tags ·················································································································· 189
Configuring the CVLAN TPID ····························································································································· 190
Configuring the SVLAN TPID ······························································································································ 190
QinQ configuration examples ···································································································································· 190
Basic QinQ configuration example ··················································································································· 190
VLAN transparent transmission configuration example ·················································································· 193
Simple selective QinQ configuration example ································································································· 194
Comprehensive selective QinQ configuration example ·················································································· 197
Configuring VLAN mapping ·································································································································· 202
Overview ······································································································································································· 202
Application scenario of one-to-one and many-to-one VLAN mapping ·························································· 202
Application scenario of two-to-two VLAN mapping ························································································ 203
Concepts and terms ············································································································································ 204
VLAN mapping implementations ······················································································································· 205
VLAN mapping configuration tasks ··························································································································· 206
Configuring one-to-one VLAN mapping ···················································································································· 207
vii
Configuration prerequisites ································································································································ 207
Configuring an uplink policy ······························································································································ 207
Configuring a downlink policy ·························································································································· 207
Configuring the customer-side port ···················································································································· 208
Configuring the network-side port ····················································································································· 209
Configuring many-to-one VLAN mapping ················································································································· 209
Configuration prerequisites ································································································································ 210
Enabling DHCP snooping ··································································································································· 210
Enabling ARP detection in SVLANs ··················································································································· 210
Configuring an uplink policy ······························································································································ 210
Configuring the customer-side port ···················································································································· 211
Configuring the network-side port ····················································································································· 212
Configuring two-to-two VLAN mapping ····················································································································· 212
Configuring an uplink policy for the customer-side port ················································································· 213
Configuring an uplink policy for the network-side port ··················································································· 213
Configuring a downlink policy for the customer-side port ·············································································· 214
Configuring the customer-side port ···················································································································· 215
Configuring the network-side port ····················································································································· 215
VLAN mapping configuration examples ··················································································································· 216
One-to-one and many-to-one VLAN mapping configuration example ··························································· 216
Two-to-two VLAN mapping configuration example ························································································· 222
Configuring LLDP ····················································································································································· 225
Overview ······································································································································································· 225
Background ·························································································································································· 225
Basic concepts ····················································································································································· 225
How LLDP works ·················································································································································· 229
Protocols and standards ····································································································································· 230
LLDP configuration task list ·········································································································································· 230
Performing basic LLDP configuration ·························································································································· 230
Enabling LLDP ······················································································································································ 230
Setting the LLDP operating mode ······················································································································· 231
Setting the LLDP re-initialization delay ·············································································································· 231
Enabling LLDP polling·········································································································································· 232
Configuring the advertisable TLVs ····················································································································· 232
Configuring the management address and its encoding format ···································································· 233
Setting other LLDP parameters ···························································································································· 233
Setting an encapsulation format for LLDPDUs ·································································································· 234
Configuring CDP compatibility ··································································································································· 235
Configuration prerequisites ································································································································ 236
Configuration procedure ···································································································································· 236
Configuring LLDP trapping ·········································································································································· 237
Displaying and maintaining LLDP ······························································································································· 237
LLDP configuration examples ······································································································································ 238
Basic LLDP configuration example ····················································································································· 238
CDP-compatible LLDP configuration example ··································································································· 240
Configuring a service loopback group·················································································································· 243
Overview ······································································································································································· 243
Service types of service loopback groups ········································································································ 243
Requirements on service loopback ports ·········································································································· 243
States of service loopback ports ························································································································ 243
Configuration restrictions and guidelines ·················································································································· 244
Configuration procedure ············································································································································· 244
Displaying and maintaining service loopback groups ····························································································· 245
viii
Service loopback group configuration example ······································································································· 245
Network requirements ········································································································································· 245
Configuration procedure ···································································································································· 245
Configuring MVRP ·················································································································································· 247
Overview ······································································································································································· 247
Introduction to MRP ············································································································································· 247
MVRP registration modes ··································································································································· 249
Protocols and standards ····································································································································· 250
MVRP configuration task list ········································································································································ 250
Configuration prerequisites ········································································································································· 250
Enabling MVRP ····························································································································································· 250
Configuration restrictions and guidelines ········································································································· 250
Configuration procedure ···································································································································· 251
Configuring the MVRP registration mode ·················································································································· 251
Configuring MRP timers ··············································································································································· 252
Enabling GVRP compatibility ······································································································································ 253
Configuration restrictions and guidelines ········································································································· 253
Configuration procedure ···································································································································· 253
Displaying and maintaining MVRP ···························································································································· 253
Configuration example for MVRP in normal registration mode ·············································································· 254
Network requirements ········································································································································· 254
Configuration procedure ···································································································································· 255
Index ········································································································································································ 264
1
Configuring Ethernet interfaces
Ethernet interface naming conventions
The Ethernet interfaces on the S3600V2 switches are named in the format of interface-type A/B/C,
where the following definitions apply:
• A—Represents the ID of the switch in an IRF fabric. If the switch is not assigned to any IRF fabric, A
uses 1.
• B—Represents a slot number on the switch. It takes 0.
• C—Represents the number of an interface on a slot.
Performing general configurations
This section describes the attributes and configurations common to Layer 2 and Layer 3 Ethernet
interfaces.
• For more information about the attributes and configuration of Layer 2 Ethernet interfaces, see
"Configuring a Layer 2 Ethernet interface."
• For more information about the attributes and configuration of Layer 3 Ethernet interfaces, see
"Setting the MTU for a Layer 3 Ethernet interface."
Configuring a combo interface
A combo interface is a logical interface that comprises one optical (fiber) port and one electrical (copper)
port. The two ports share one forwarding interface, so they cannot work simultaneously. When you
enable either port, the other port is automatically disabled.
The fiber combo port and the copper combo port share one interface view, in which you can activate the
fiber or copper combo port and configure other port attributes such as the interface rate and duplex
mode.
Configuration prerequisites
Before you configure combo interfaces, complete the following tasks:
• An S3600V2 switch provides two combo interfaces. The fiber port and copper port of a combo
interface have the same port number. For more information about the combo interface numbers, see
the installation guide of a specific model.
• Use the display interface command to determine which port (fiber or copper) of the combo
interface is active. If the current port is the copper port, the output will include "Media type is
twisted pair, Port hardware type is 1000_BASE_T". If the current port is the fiber port, the output will
not include the information mentioned above. You can also use the display this command in the
view of the combo interface to view the combo interface configuration. If the combo enable fiber
command exists, the fiber port is active; if the command does not exist, the copper fiber is active.
Changing the active port of a combo interface
2
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter the Ethernet interface
view.
interface interface-type
interface-number
N/A
3. Activate the copper combo
port or fiber combo port.
combo enable { copper | fiber }
Optional.
By default, the copper combo port
is active.
Configuring basic settings of an Ethernet interface
You can set an Ethernet interface to operate in one of the following duplex modes:
• Full-duplex mode (full)—Interfaces that operate in this mode can send and receive packets
simultaneously.
• Half-duplex mode (half)—Interfaces that operate in this mode cannot send and receive packets
simultaneously.
• Auto-negotiation mode (auto)—Interfaces that operate in this mode negotiate a duplex mode with
their peers.
You can set the speed of an Ethernet interface or enable it to automatically negotiate a speed with its
peer. For a 100-Mbps or 1000-Mbps Layer 2 Ethernet interface, you can also set speed options for auto
negotiation. The two ends can select a speed only from the available options. For more information, see
"Setting speed options for auto negotiation on an Ethernet interface."
To configure an Ethernet interface:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet
interface view.
interface interface-type
interface-number
N/A
3. Set the interface
description.
description text
Optional.
By default, the description of an interface is in the format
of interface-name Interface. For example,
Ethernet1/0/1 Interface.
4. Set the duplex
mode of the
interface.
duplex { auto | full |
half }
Optional.
Fiber ports and combo interfaces do not support the half
keyword.
By default, the duplex mode is auto for Ethernet
interfaces.
5. Set the port speed.
speed { 10 | 100 | 1000
| auto }
Optional.
By default, an Ethernet interface automatically
negotiates a speed with the peer.
The 10 and 1000 keywords are not applicable to
100-Mbps fiber ports.
The 10 and 100 keywords are not applicable to GE
fiber ports and copper combo port.
3
Ste
p
Command
Remarks
6. Restore the default
settings for the
interface.
default Optional.
NOTE:
Make sure that the fiber port speed matches the speed requirement of the inserted transceiver module. For
example, after you insert a 1000-Mbps transceiver module into a fiber port, confi
g
ure the port speed with
the speed 1000 or speed auto command.
Shutting down an Ethernet interface
CAUTION:
Use this feature with caution. After you manually shut down an Ethernet interface, the Ethernet interface
cannot forward packets even if it is physically connected.
You might need to shut down and then bring up an Ethernet interface to activate some configuration
changes, for example, the speed or duplex mode changes.
To shut down an Ethernet interface or a group of Ethernet interfaces:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet
interface view or
port group view.
• Enter Ethernet interface view:
interface interface-type
interface-number
• Enter port group view:
port-group manual port-group-name
Use any command.
To shut down an Ethernet interface,
enter Ethernet interface.
To shut down all Ethernet interfaces in
a port group, enter port group view.
3. Shut down the
Ethernet interface
or interfaces.
shutdown By default, Ethernet interfaces are up.
Configuring flow control on an Ethernet interface
To avoid packet drops on a link, you can enable flow control at both ends of the link. When traffic
congestion occurs at the receiving end, the receiving end sends a flow control (Pause) frame to ask the
sending end to suspend sending packets.
Flow control is implemented by receiving and sending Pause frames on ports. Flow control can operate
in one of the following modes on an interface:
• TxRx mode (configured by using the flow-control command)—The interface can both send and
receive flow control frames.
• Rx mode (configured by using the flow-control receive enable command)—The interface can
receive, but not send flow control frames.
As shown in Figure 1, w
hen both Port A and Port B forward packets at the rate of 1000 Mbps, Port C is
congested. To avoid packet loss, enable flow control on Port A and Port B.
4
Figure 1 Flow control on ports
Configure flow control in TxRx mode on Port B and flow control in Rx mode on Port A:
• When congestion occurs on Port C, Switch B buffers frames. When the amount of buffered frames
exceeds a certain value, Switch B sends a common Pause frame out of Port B to ask Port A to
suspend sending packets. This Pause frame also tells Port A for how long it is expected to pause.
• Upon receiving the common Pause frame from Port B, Port A suspends sending packets to Port B for
a period.
• If congestion persists, Port B keeps sending common Pause frames to Port A until the congestion
condition is removed.
To handle unidirectional traffic congestion on a link, configure the flow-control receive enable command
at one end, and the flow-control command at the other. To enable both ends of the link to handle traffic
congestion, configure the flow-control command at both ends.
To enable flow control on an Ethernet interface:
Step Command Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number
N/A
3. Enable flow control.
• Enable TxRx flow control:
flow-control
• Enable Rx flow control:
flow-control receive enable
Use either command.
By default, Rx flow control is disabled
on an Ethernet interface.
Configuring link state change suppression on an Ethernet
interface
An Ethernet interface has two physical link states: up and down. Each time the physical link of an
interface goes up or comes down, the physical layer reports the change to the upper layers, and the
upper layers handle the change, resulting in increased overhead.
To prevent physical link flapping from affecting system performance, configure link change suppression
to delay the reporting of physical link state changes. When the delay expires, the interface reports any
detected change.
Link change suppression does not suppress administrative up or down events. When you shut down or
bring up an interface by using the shutdown or undo shutdown command, the interface reports the event
to the upper layers immediately.
Link-down event suppression enables an interface to suppress link-down events and start a delay timer
each time the physical link goes down. During this delay, the interface does not report the link-down
event, and the display interface brief or display interface command displays the interface state as UP. If
5
the physical link is still down when the timer expires, the interface reports the link-down event to the upper
layers.
Link-up event suppression enables an interface to suppress link-up events and start a delay timer each
time the physical link goes up. During this delay, the interface does not report the link-up event, and the
display interface brief or display interface command displays the interface state as DOWN. If the
physical link is still up when the timer expires, the interface reports the link-up event to the upper layers.
Configuring link-down event suppression
To enable an Ethernet interface to suppress link-down events:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number
N/A
3. Set a link-down event
suppression interval.
link-delay delay-time
Link-down event suppression is disabled by
default.
Configuring link-up event suppression
To configure link-up event suppression on an Ethernet interface:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number
N/A
3. Set a link-up event
suppression interval.
link-delay delay-time mode up
Link-up event suppression is disabled by
default.
NOTE:
The link-delay mode up command and the link-delay
command supersedes each other, and whichever is
configured last takes effect.
Configuring loopback testing on an Ethernet interface
If an Ethernet interface does not work correctly, you can enable loopback testing on it to identify the
problem. Loopback testing has the following types:
• Internal loopback testing—Tests all on-chip functions related to Ethernet interfaces.
• External loopback testing—Tests hardware of Ethernet interfaces. To perform external loopback
testing on an Ethernet interface, connect a loopback plug to the Ethernet interface. The switch sends
test packets out of the interface, which are expected to loop over the plug and back to the interface.
If the interface fails to receive any test packet, the hardware of the interface is faulty.
An Ethernet interface in a loopback test does not forward data traffic.
Configuration restrictions and guidelines
• On an interface administratively shut down, you can perform neither internal nor external loopback
testing.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281

H3C S3600V2 SERIES Layer 2-Lan Switching Configuration Manual

Category
Networking
Type
Layer 2-Lan Switching Configuration Manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI