H3C S5820V2 series Configuration manual

Category
Software
Type
Configuration manual

This manual is also suitable for

H3C S5830V2 & S5820V2 Switch Series
Layer 2
—
LAN Switching Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 23xx
Document version: 6W102-20150315
Copyright © 2014-2015, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , H3CS, H3CIE, H3CNE, Aolynk, , H
3
Care, , IRF, NetPilot, Netflow,
SecEngine, SecPath, SecCenter, SecBlade, Comware, ITCMM and HUASAN are trademarks of
Hangzhou H3C Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S5830V2 & S5820V2 documentation set includes 16 configuration guides. These guides
describe the software features for the H3C S5830V2 & S5820V2 Switch Series and guide you through
the software configuration procedures. These guides also provide configuration examples to help you
apply software features to different network scenarios.
The Layer 2—LAN Switching Configuration Guide describes features and tasks that help you get started
with the device, including:
• Flow control and load sharing.
• User isolation in the same VLAN and VLAN configuration.
• Layer 2 loop elimination.
• Transmission of customer network packets over the service provider network.
• VLAN tag manipulations.
This preface includes:
• Audience
• Added and modified features
• Conventions
• About the H3C S5830V2 & S5820V2 documentation set
• Obtaining documentation
• Technical support
• Documentation feedback
Audience
This documentation is intended for:
• Network planners.
• Field technical support and servicing engineers.
• Network administrators working with the S5830V2 & S5820V2 series.
Added and modified features
Release 2311P05 does not contain any changes to LAN switching features over Release 2311P04.
Release 2311P04 contains the following changes to LAN switching features over Release 2310:
Confi
g
uration
g
uide Added and modified features
Ethernet link aggregation
Added features:
• Configuring per-flow load sharing algorithm settings for Ethernet
link aggregation.
• Enabling BFD for Ethernet link aggregation.
Confi
g
uration
g
uide Added and modified features
Service loopback group Modified features: Configuring service loopback groups.
Release 2310 contains the following changes to LAN switching features over Release 2307:
Confi
g
uration
g
uide Added and modified features
MAC address table Modified features: Enabling MAC address move notifications.
VLAN mapping
Added features: Configuring many-to-one VLAN mapping in a
network with static IP address assignment.
Release 2307 contains the following changes to LAN switching features over Release 2210:
Confi
g
uration
g
uide Added and modified features
Ethernet interface
Added features:
• Configuring the expected bandwidth of an interface.
• Configuring the link mode of an Ethernet interface.
• Forcibly bringing up a fiber port.
• Displaying and clearing Ethernet statistics.
• Configuring Layer 3 Ethernet subinterfaces.
• Setting the MTU for an Ethernet interface or subinterface.
Modified features:
• Configuring the interface description.
• Displaying summary information about the specified interface or
all interfaces.
• Configuring physical state change suppression on an Ethernet
interface.
Loopback, null, and inloopback
interface
Added features:
• Configuring the expected bandwidth of an interface.
• Displaying and maintaining inloopback interfaces.
Modified features:
• Configuring the interface description.
• Displaying summary information about the specified interface or
all interfaces.
Bulk interface configuration
Added features: Displaying and maintaining bulk interface
configuration.
MAC address table
Added features:
• Enabling MAC address move notifications.
• Enabling SNMP notifications for the MAC address table.
• Configuring the MAC address table in EVB S-channel aggregate
interface view.
• Deleting unicast MAC address entries based on the RBs through
which packets leave the TRILL network.
MAC Information
Added features: Configuring the MAC Information in EVB S-channel
aggregate interface view.
Confi
g
uration
g
uide Added and modified features
Ethernet link aggregation
Added features:
• Configuring the expected bandwidth of an interface.
• Configuring Layer 3 aggregate group.
• Configuring an edge aggregate interface.
• Configuring LACP operating mode.
• Configuring Layer 3 aggregate subinterface.
• Configuring the MTU of a Layer 3 aggregate interface.
Modified features:
• Configuring the interface description.
• Displaying summary information about the specified interface or
all interfaces.
• Setting the minimum and maximum numbers of Selected ports for
an aggregation group.
Port Isolation N/A
Spanning tree
Added features:
• PVST.
• Configuring TC Snooping.
Modified features: The command stp global enable was added in the
factory defaults. When the device starts up with the default
configuration file (or factory defaults), the spanning tree feature is
enabled globally by default.
Loop detection N/A
VLAN
Added features:
• Configuring IP subnet-based VLANs.
• Configuring protocol-based VLANs.
• Configuring the expected bandwidth of a VLAN interface.
• Assigning an S-channel aggregate interface of EVB to a VLAN.
Modified features:
• The minimum MTU for a VLAN interface was changed to 128
bytes from 46 bytes.
• The VLAN or VLAN interface description was changed to a string
of 1 to 255 characters.
• Supporting to display brief information about interfaces in down
state and the down causes.
Super VLAN Super VLAN was introduced in Release 2307.
Private VLAN Private VLAN was introduced in Release 2307.
MVRP MVRP was introduced in Release 2307.
QinQ N/A
VLAN mapping N/A
PBB PBB was introduced in Release 2307.
Confi
g
uration
g
uide Added and modified features
LLDP
Added features:
• Configuring the LLDP bridge mode.
• Configuring the token bucket size for sending LLDPDUs.
• Setting the interval for fast LLDPDU transmission.
• Configuring LLDP in Layer 2 aggregate interface view, Layer 3
aggregate interface view, Layer 3 Ethernet interface view, or
management Ethernet interface view.
• Configuring LLDP to support nearest customer bridge agents and
nearest non-TPMR bridge agent.
Modified features:
• The following operating modes and interface views were added
for nearest non-TPMR bridge agents:
{ Operating modes disable, rx, and tx.
{ Interface views Layer 2 aggregate interface view, Layer 3
aggregate interface view, Layer 3 Ethernet interface view, and
management Ethernet interface view.
• The standard version for DCBX was added and became the initial
version for negotiation.
Deleted features: Setting the LLDPDU transmit delay.
Service loopback group N/A
Cut-through N/A
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Descri
p
tion
Boldface
Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Descri
p
tion
Boldface
Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Descri
p
tion
WARNING
An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
An alert that calls attention to essential information.
NOTE
An alert that contains additional or supplementary information.
TIP
An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your switch.
About the H3C S5830V2 & S5820V2
documentation set
The H3C S5830V2 & S5820V2 documentation set includes:
Cate
g
or
y
Documents
Pur
p
oses
Product description and
specifications
Marketing brochures Describe product specifications and benefits.
Hardware specifications
and installation
Compliance and safety
manual
Provides regulatory information and the safety
instructions that must be followed during installation.
Installation quick start Provides basic installation instructions.
Cate
g
or
y
Documents
Pur
p
oses
Installation guide
Provides a complete guide to hardware installation
and hardware specifications.
H3C LSWM1HFANSC &
LSWM1HFANSCB Fan
Assemblies Installation
Provides the physical views, specifications,
installation procedures, and removal procedures for
hot-swappable fan assemblies.
H3C LSVM1FANSC &
LSVM1FANSCB Fan
Assemblies Installation
Provides the physical views, specifications,
installation procedures, and removal procedures for
hot-swappable fan assemblies.
H3C SFP/SFP+/XFP
Transceiver Modules
Installation Guide
Describes the installation and replacement
procedures for SFP/SFP+/XFP transceiver modules.
H3C LSVM1AC650 &
LSVM1DC650 Power
Modules User Manual
Provides the physical views, specifications,
installation procedures, and removal procedures for
the LSVM1AC650 and LSVM1DC650 power
modules.
H3C LSVM1AC300 &
LSVM1DC300 Power
Modules User Manual
Provides the physical views, specifications,
installation procedures, and removal procedures for
the LSVM1AC300 and LSVM1DC300 power
modules.
Software configuration
Configuration guides
Describe software features and configuration
procedures.
Command references
Provide a quick reference to all available
commands.
Operations and
maintenance
MIB Companion Describes the MIBs for the software release.
Release notes
Provide information about the product release and
software upgrading.
Obtaining documentation
Access the most up-to-date H3C product documentation on the World Wide Web
at http://www.h3c.com
.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents]
—Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions]
—Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download]
—Provides the documentation released with the
software version.
Technical support
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
i
Contents
Configuring Ethernet interfaces ··································································································································· 1
Configuring a management Ethernet interface ·············································································································· 1
Ethernet interface naming conventions ··························································································································· 1
Configuring common Ethernet interface settings ··········································································································· 1
Splitting a 40-GE interface and combining 10-GE breakout interfaces ····························································· 2
Configuring basic settings of an Ethernet interface ······························································································ 3
Configuring the link mode of an Ethernet interface ······························································································ 4
Configuring jumbo frame support ·························································································································· 4
Configuring physical state change suppression on an Ethernet interface ·························································· 5
Performing a loopback test on an Ethernet interface ···························································································· 6
Configuring generic flow control on an Ethernet interface ·················································································· 6
Configuring PFC on an Ethernet interface ············································································································· 7
Enabling energy saving features on an Ethernet interface ·················································································· 8
Setting the statistics polling interval ························································································································ 9
Forcibly bringing up a fiber port ························································································································· 10
Configuring a Layer 2 Ethernet interface ···················································································································· 11
Configuring storm suppression ···························································································································· 11
Configuring storm control on an Ethernet interface ··························································································· 12
Setting the MDIX mode of an Ethernet interface ································································································ 13
Testing the cable connection of an Ethernet interface ······················································································· 14
Configuring a Layer 3 Ethernet interface or subinterface ·························································································· 15
Setting the MTU for an Ethernet interface or subinterface ················································································ 15
Displaying and maintaining an Ethernet interface ····································································································· 15
Configuring loopback, null, and inloopback interfaces ·························································································· 17
Configuring a loopback interface ································································································································ 17
Configuring a null interface ·········································································································································· 18
Configuring an inloopback interface ··························································································································· 18
Displaying and maintaining loopback, null, and inloopback interfaces ································································· 18
Bulk configuring interfaces ········································································································································ 20
Configuration guidelines ··············································································································································· 20
Configuration procedure ··············································································································································· 20
Displaying and maintaining bulk interface configuration ·························································································· 21
Configuring the MAC address table ························································································································ 22
Overview ········································································································································································· 22
How a MAC address entry is created ················································································································ 22
Types of MAC address entries ····························································································································· 23
MAC address table configuration task list ·················································································································· 23
Configuring MAC address entries································································································································ 24
Configuration guidelines ······································································································································ 24
Adding or modifying a static or dynamic MAC address entry globally ························································· 24
Adding or modifying a static or dynamic MAC address entry on an interface ············································· 25
Adding or modifying a blackhole MAC address entry ····················································································· 25
Adding or modifying a multiport unicast MAC address entry ········································································· 26
Disabling MAC address learning ································································································································· 27
Disabling global MAC address learning ············································································································ 27
Disabling MAC address learning on an interface ····························································································· 27
Disabling MAC address learning on a VLAN ···································································································· 28
ii
Configuring the aging timer for dynamic MAC address entries ··············································································· 28
Configuring the MAC learning limit on an interface·································································································· 29
Configuring the device to forward unknown frames after the MAC learning limit on an interface is reached ··· 29
Assigning MAC learning priority to an interface ······································································································· 30
Enabling MAC address synchronization ····················································································································· 31
Enable MAC address move notifications (for Release 2307) ··················································································· 32
Enable MAC address move notifications (for Release 2310 and later) ·································································· 33
Enabling ARP fast update for MAC address moves ··································································································· 34
Enabling SNMP notifications for the MAC address table ························································································· 35
Displaying and maintaining the MAC address table ································································································· 35
MAC address table configuration example ················································································································ 36
Network requirements ··········································································································································· 36
Configuration procedure ······································································································································ 37
Verifying the configuration ··································································································································· 37
Configuring MAC Information ·································································································································· 38
Enabling MAC Information ··········································································································································· 38
Configuring the MAC Information mode ····················································································································· 38
Configuring the MAC change notification interval ···································································································· 39
Configuring the MAC Information queue length ········································································································ 39
MAC Information configuration example ···················································································································· 39
Network requirements ··········································································································································· 39
Configuration guidelines ······································································································································ 40
Configuration procedure ······································································································································ 40
Configuring Ethernet link aggregation ····················································································································· 42
Basic concepts ································································································································································ 42
Aggregation group, member port, and aggregate interface ··········································································· 42
Aggregation states of member ports in an aggregation group ······································································· 43
Operational key ···················································································································································· 43
Configuration types ··············································································································································· 43
Link aggregation modes ······································································································································· 44
Aggregating links in static mode ·································································································································· 44
Choosing a reference port ··································································································································· 44
Setting the aggregation state of each member port ·························································································· 45
Aggregating links in dynamic mode ···························································································································· 45
LACP ······································································································································································· 46
How dynamic link aggregation works ················································································································ 47
Edge aggregate interface ············································································································································· 49
Load sharing modes for link aggregation groups ······································································································ 49
Ethernet link aggregation configuration task list ········································································································· 49
Configuring an aggregation group ····························································································································· 50
Configuration guidelines ······································································································································ 50
Configuring a static aggregation group ············································································································· 51
Configuring a dynamic aggregation group ······································································································· 52
Configuring an aggregate interface ···························································································································· 54
Configuring the description of an aggregate interface ····················································································· 54
Specifying ignored VLANs on a Layer 2 aggregate interface ········································································· 55
Configuring the MTU of a Layer 3 aggregate interface ··················································································· 55
Setting the minimum and maximum numbers of Selected ports for an aggregation group ·························· 55
Configuring the expected bandwidth of an aggregate interface ···································································· 56
Configuring an edge aggregate interface·········································································································· 57
Enabling BFD for an aggregation group ············································································································ 57
Shutting down an aggregate interface ··············································································································· 58
Restoring the default settings for an aggregate interface ················································································· 59
iii
Configuring load sharing for link aggregation groups ······························································································ 59
Setting load sharing modes for link aggregation groups ················································································· 59
Enabling local-first load sharing for link aggregation ······················································································· 60
Configuring per-flow load sharing algorithm settings for Ethernet link aggregation ····································· 61
Enabling link-aggregation traffic redirection ··············································································································· 61
Configuration restrictions and guidelines ··········································································································· 61
Configuration procedure ······································································································································ 62
Displaying and maintaining Ethernet link aggregation ····························································································· 62
Ethernet link aggregation configuration examples ····································································································· 63
Layer 2 static aggregation configuration example ···························································································· 63
Layer 2 dynamic aggregation configuration example ······················································································ 64
Layer 2 aggregation load sharing configuration example ··············································································· 66
Layer 2 edge aggregate interface configuration example ··············································································· 69
Layer 3 static aggregation configuration example ···························································································· 70
Layer 3 dynamic aggregation configuration example ······················································································ 71
Layer 3 edge aggregate interface configuration example ··············································································· 73
Configuring port isolation ·········································································································································· 75
Assigning a port to an isolation group ························································································································ 75
Displaying and maintaining port isolation ·················································································································· 75
Port isolation configuration example···························································································································· 76
Network requirements ··········································································································································· 76
Configuration procedure ······································································································································ 76
Verifying the configuration ··································································································································· 76
Configuring spanning tree protocols ························································································································ 78
STP ··················································································································································································· 78
STP protocol packets ············································································································································· 78
Basic concepts in STP ············································································································································ 79
Calculation process of the STP algorithm ··········································································································· 80
RSTP ················································································································································································· 86
PVST ················································································································································································· 86
MSTP ················································································································································································ 86
MSTP features ························································································································································ 87
MSTP basic concepts ············································································································································ 87
How MSTP works ·················································································································································· 91
MSTP implementation on devices ························································································································ 92
Protocols and standards ················································································································································ 92
Spanning tree configuration task lists ·························································································································· 92
STP configuration task list ····································································································································· 93
RSTP configuration task list ··································································································································· 94
PVST configuration task list··································································································································· 95
MSTP configuration task list ································································································································· 96
Setting the spanning tree mode ···································································································································· 96
Configuration restrictions and guidelines ··········································································································· 97
Configuration procedure ······································································································································ 97
Configuring an MST region ·········································································································································· 97
Configuring the root bridge or a secondary root bridge ·························································································· 98
Configuring the current device as the root bridge of a specific spanning tree ·············································· 99
Configuring the current device as a secondary root bridge of a specific spanning tree ······························ 99
Configuring the device priority ····································································································································· 99
Configuring the maximum hops of an MST region ·································································································· 100
Configuring the network diameter of a switched network ······················································································· 100
Setting spanning tree timers ········································································································································ 101
Configuration restrictions and guidelines ········································································································· 101
iv
Configuration procedure ···································································································································· 102
Setting the timeout factor ············································································································································· 102
Configuring the BPDU transmission rate ···················································································································· 103
Configuring edge ports ··············································································································································· 103
Configuration restrictions and guidelines ········································································································· 103
Configuration procedure ···································································································································· 104
Configuring path costs of ports ·································································································································· 104
Specifying a standard for the device to use when it calculates the default path cost ································· 104
Configuring path costs of ports ·························································································································· 107
Configuration example ······································································································································· 107
Configuring the port priority ······································································································································· 107
Configuring the port link type ····································································································································· 108
Configuration restrictions and guidelines ········································································································· 108
Configuration procedure ···································································································································· 108
Configuring the mode a port uses to recognize and send MSTP packets ····························································· 109
Enabling outputting port state transition information ································································································ 109
Enabling the spanning tree feature ···························································································································· 110
Enabling the spanning tree feature in STP/RSTP/MSTP mode ······································································· 110
Enabling the spanning tree feature in PVST mode··························································································· 110
Performing mCheck ······················································································································································ 111
Configuration restrictions and guidelines ········································································································· 111
Configuration procedure ···································································································································· 111
Configuring Digest Snooping ····································································································································· 112
Configuration restrictions and guidelines ········································································································· 112
Configuration procedure ···································································································································· 113
Digest Snooping configuration example ··········································································································· 113
Configuring No Agreement Check ···························································································································· 114
Configuration prerequisites ································································································································ 115
Configuration procedure ···································································································································· 115
No Agreement Check configuration example·································································································· 116
Configuring TC Snooping ··········································································································································· 116
Configuration restrictions and guidelines ········································································································· 117
Configuration procedure ···································································································································· 117
Configuring protection functions ································································································································ 118
Enabling BPDU guard ········································································································································· 118
Enabling root guard ············································································································································ 118
Enabling loop guard ··········································································································································· 119
Configuring port role restriction ························································································································· 120
Configuring TC-BPDU transmission restriction ·································································································· 120
Enabling TC-BPDU guard···································································································································· 121
Enabling BPDU drop ··········································································································································· 121
Displaying and maintaining the spanning tree ········································································································· 122
Spanning tree configuration example ························································································································ 122
Network requirements ········································································································································· 122
Configuration procedure ···································································································································· 123
Verifying the configuration ································································································································· 125
PVST configuration example ······································································································································· 126
Network requirements ········································································································································· 126
Configuration procedure ···································································································································· 127
Verifying the configuration ································································································································· 128
Configuring loop detection ····································································································································· 130
Overview ······································································································································································· 130
Loop detection mechanism ································································································································· 130
Loop detection interval ········································································································································ 131
v
Loop protection actions ······································································································································· 131
Port status auto recovery ····································································································································· 132
Loop detection configuration task list ························································································································· 132
Enabling loop detection ·············································································································································· 132
Enabling loop detection globally ······················································································································· 132
Enabling loop detection on a port ····················································································································· 132
Configuring the loop protection action ······················································································································ 133
Configuring the global loop protection action ································································································· 133
Configuring the loop protection action on a Layer 2 Ethernet interface ······················································· 133
Configuring the loop protection action on a Layer 2 aggregate interface ··················································· 133
Setting the loop detection interval ······························································································································ 134
Displaying and maintaining loop detection ·············································································································· 134
Loop detection configuration example ······················································································································· 134
Network requirements ········································································································································· 134
Configuration procedure ···································································································································· 135
Verifying the configuration ································································································································· 136
Configuring VLANs ················································································································································· 138
Overview ······································································································································································· 138
VLAN frame encapsulation ································································································································ 138
Protocols and standards ····································································································································· 139
Configuring basic VLAN settings································································································································ 139
Configuring basic settings of a VLAN interface ······································································································· 140
Configuring port-based VLANs ··································································································································· 141
Introduction to port-based VLAN ······················································································································· 141
Assigning an access port to a VLAN ················································································································ 142
Assigning a trunk port to a VLAN······················································································································ 143
Assigning a hybrid port to a VLAN ··················································································································· 144
Configuring IP subnet-based VLANs ·························································································································· 145
Introduction ·························································································································································· 145
Configuring an IP subnet-based VLAN ·············································································································· 146
Configuring protocol-based VLANs ··························································································································· 147
Introduction ·························································································································································· 147
Configuring a protocol-based VLAN ················································································································· 147
Displaying and maintaining VLANs ··························································································································· 148
VLAN configuration examples ···································································································································· 149
Port-based VLAN configuration example ·········································································································· 149
IP subnet-based VLAN configuration example ································································································· 150
Protocol-based VLAN configuration example ··································································································· 152
Configuring super VLANs ······································································································································· 156
Super VLAN configuration task list ····························································································································· 156
Creating a sub VLAN ·················································································································································· 156
Configuring a super VLAN ·········································································································································· 156
Configuring a super VLAN interface ·························································································································· 157
Displaying and maintaining super VLANs ················································································································ 158
Super VLAN configuration example ·························································································································· 158
Network requirements ········································································································································· 158
Configuration procedure ···································································································································· 158
Verifying the configuration ································································································································· 159
Configuring the private VLAN ································································································································ 161
Configuration task list ·················································································································································· 161
Configuration restrictions and guidelines ·················································································································· 162
Configuration procedure ············································································································································· 162
Displaying and maintaining the private VLAN ········································································································· 165
vi
Private VLAN configuration examples ······················································································································· 165
Private VLAN configuration example in promiscuous mode ·········································································· 165
Private VLAN configuration example in trunk promiscuous mode ································································· 168
Private VLAN configuration example in trunk promiscuous and trunk secondary modes ··························· 171
Secondary VLAN Layer 3 communication configuration example ································································ 175
Configuring MVRP ·················································································································································· 178
MRP ··············································································································································································· 178
MRP implementation ··········································································································································· 178
MRP messages ····················································································································································· 179
MRP timers···························································································································································· 180
MVRP registration modes ············································································································································ 180
Protocols and standards ·············································································································································· 181
MVRP configuration task list ········································································································································ 181
Configuration restrictions and guidelines ·················································································································· 181
Configuration prerequisites ········································································································································· 182
Enabling MVRP ····························································································································································· 182
Configuring an MVRP registration mode ··················································································································· 182
Configuring MRP timers ··············································································································································· 183
Enabling GVRP compatibility ······································································································································ 184
Displaying and maintaining MVRP ···························································································································· 184
MVRP configuration example ····································································································································· 185
Network requirements ········································································································································· 185
Configuration procedure ···································································································································· 185
Verifying the configuration ································································································································· 189
Configuring QinQ ··················································································································································· 195
Overview ······································································································································································· 195
How QinQ works ················································································································································ 195
QinQ implementations ········································································································································ 196
Protocols and standards ····································································································································· 196
Restrictions and guidelines ·········································································································································· 197
Enabling QinQ ····························································································································································· 197
Configuring transparent transmission for VLANs ······································································································ 197
Configuring the TPID in VLAN tags ···························································································································· 198
Configuring the CVLAN TPID ····························································································································· 199
Configuring the SVLAN TPID ······························································································································ 199
Setting the 802.1p priority in SVLAN tags ··············································································································· 199
Displaying and maintaining QinQ ···························································································································· 201
QinQ configuration example ······································································································································ 201
Network requirements ········································································································································· 201
Configuration procedure ···································································································································· 202
VLAN transparent transmission configuration example ··························································································· 204
Network requirements ········································································································································· 204
Configuration procedure ···································································································································· 204
Configuring VLAN mapping ·································································································································· 206
Overview ······································································································································································· 206
Application scenario of one-to-one and many-to-one VLAN mapping ·························································· 206
Application scenario of one-to-two and two-to-two VLAN mapping ······························································ 208
VLAN mapping implementations ······················································································································· 208
General configuration restrictions and guidelines ···································································································· 211
VLAN mapping configuration task list ······················································································································· 211
Configuring one-to-one VLAN mapping ···················································································································· 212
Configuring many-to-one VLAN mapping ················································································································· 213
Configuring many-to-one VLAN mapping in a network with dynamic IP address assignment ··················· 213
vii
Configuring many-to-one VLAN mapping in a network with static IP address assignment ························· 215
Configuring one-to-two VLAN mapping ···················································································································· 217
Configuring two-to-two VLAN mapping ····················································································································· 218
Displaying and maintaining VLAN mapping ············································································································ 219
VLAN mapping configuration examples ··················································································································· 219
One-to-one and many-to-one VLAN mapping configuration example ··························································· 219
One-to-two and two-to-two VLAN mapping configuration example ······························································ 225
Configuring PBB ······················································································································································ 228
Overview ······································································································································································· 228
PBB network model ············································································································································· 228
Terminology ························································································································································· 228
PBB frame format ················································································································································· 229
PBB frame forwarding ········································································································································· 231
Protocols and standards ····································································································································· 231
Feature and hardware compatibility ·························································································································· 231
PBB configuration task list ··········································································································································· 231
Enabling L2VPN ··························································································································································· 232
Creating a PBB VSI ······················································································································································ 232
Configuring the frame encapsulation type ················································································································ 232
Configuring a B-VLAN for a PBB VSI ························································································································· 233
Configuring an uplink port ·········································································································································· 233
Configuring a downlink port ······································································································································· 234
Displaying and maintaining PBB ································································································································ 234
PBB configuration example ········································································································································· 235
Network requirements ········································································································································· 235
Configuration procedures ··································································································································· 235
Verifying the configuration ································································································································· 236
Troubleshooting ···························································································································································· 236
Symptom ······························································································································································· 236
Analysis ································································································································································ 236
Solution ································································································································································· 237
Configuring LLDP ····················································································································································· 238
Overview ······································································································································································· 238
Basic concepts ····················································································································································· 238
Working mechanism ··········································································································································· 243
Protocols and standards ····································································································································· 244
LLDP configuration task list ·········································································································································· 244
Configuring LLDP basics ·············································································································································· 245
Enabling LLDP ······················································································································································ 245
Configuring the LLDP bridge mode ···················································································································· 245
Setting the LLDP operating mode ······················································································································· 246
Setting the LLDP re-initialization delay ·············································································································· 247
Enabling LLDP polling·········································································································································· 247
Configuring the advertisable TLVs ····················································································································· 247
Configuring the management address and its encoding format ···································································· 249
Setting other LLDP parameters ···························································································································· 250
Setting an encapsulation format for LLDP frames ····························································································· 251
Configuring CDP compatibility ··································································································································· 251
Configuration prerequisites ································································································································ 252
Configuration procedure ···································································································································· 252
Configuring DCBX ························································································································································ 253
DCBX configuration task list ······························································································································· 254
Enabling LLDP and DCBX TLV advertising ········································································································ 254
viii
Configuring APP parameters ······························································································································ 255
Configuring ETS parameters ······························································································································ 257
Configuring PFC parameters ······························································································································ 258
Configuring the DCBX version ··························································································································· 259
Configuring LLDP trapping and LLDP-MED trapping ································································································ 260
Displaying and maintaining LLDP ······························································································································· 261
LLDP configuration examples ······································································································································ 261
Basic LLDP configuration example ····················································································································· 261
DCBX configuration example ····························································································································· 265
Configuring service loopback groups ··················································································································· 271
Configuration procedure ············································································································································· 271
Displaying and maintaining service loopback groups ····························································································· 272
Service loopback group configuration example ······································································································· 272
Network requirements ········································································································································· 272
Configuration procedure ···································································································································· 272
Configuring cut-through Layer 2 forwarding ········································································································· 273
Index ········································································································································································ 274
1
Configuring Ethernet interfaces
The switch series supports Ethernet interfaces, management Ethernet interfaces, Console interfaces, and
USB interfaces. For the interface types and the number of interfaces supported by a switch model, see the
installation guide.
This document describes how to configure management Ethernet interfaces and Ethernet interfaces.
Configuring a management Ethernet interface
A management interface uses an RJ-45 connector. You can connect the interface to a PC for software
loading and system debugging, or connect it to a remote NMS for remote system management.
To configure a management Ethernet interface:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter management
Ethernet interface view.
interface M-GigabitEthernet
interface-number
N/A
3. (Optional.) Set the
interface description.
description text
The default setting is
M-GigabitEthernet0/0/0 Interface.
4. (Optional.) Shut down
the interface.
shutdown
By default, the management Ethernet
interface is up.
Ethernet interface naming conventions
The Ethernet interfaces are named in the format of interface type A/B/C. The letters that follow the
interface type represent the following elements:
• A—IRF member ID. If the switch is not in an IRF fabric, A is 1 by default.
• B—Card slot number. B is always 0, which indicates the interface is a fixed interface of the switch.
• C—Port index.
A 10-GE breakout interface split from a 40-GE interface is named in the format of interface type
A/B/C:D. A/B/C is the interface number of the 40-GE interface and D is the number of the 10-GE
breakout interface, which is in the range of 1 to 4. For information about splitting a 40-GE interface, see
"Splitting a 40-GE interface and combining 10-GE breakout interfaces."
Configuring common Ethernet interface settings
This section describes the settings common to Layer 2 and Layer 3 Ethernet interfaces. You can set an
Ethernet port as a Layer 3 interface by using the port link-mode route command. For more information,
see "Configuring the link mode of an Ethernet interface."
For more information about the settings specific
to Layer 2 and Layer 3 Ethernet interfaces, see "Configuring a Layer 2 Ethernet interface" a
nd
"Configuring a Layer 3 Ethernet interface or subinterface."
2
Splitting a 40-GE interface and combining 10-GE breakout
interfaces
Splitting a 40-GE QSFP+ interface into four 10-GE breakout interfaces
You can use a 40-GE QSFP+ interface as a single interface. To improve port density, reduce costs, and
improve network flexibility, you can also split a 40-GE QSFP+ interface into four 10-GE breakout
interfaces.
To split a 40-GE interface into four 10-GE breakout interfaces:
Step Command Remarks
1. Enter system view.
system-view N/A
2. Enter 40-GE interface view.
interface interface-type
interface-number
N/A
3. Split the 40-GE interface into
four 10-GE breakout
interfaces.
using tengige
By default, a 40-GE interface is not
split and operates as a single
interface.
The 10-GE breakout interfaces split
from a 40-GE interface support the
same configuration and attributes as
common 10-GE interfaces, except
that they are numbered in a different
way.
4. Reboot the device.
N/A
After creating the four 10-GE
breakout interfaces, the system
removes the 40-GE interface.
A 40-GE interface split into four
10-GE breakout interfaces must use a
dedicated 1-to-4 cable.
Combining four 10-GE breakout interfaces into a 40-GE interface
If you need higher bandwidth, you can combine the four 10-GE breakout interfaces into a 40-GE
interface.
To combine four 10-GE breakout interfaces into a 40-GE interface:
Step Command Remarks
1. Enter system view.
system-view N/A
2. Enter the view of any 10-GE
breakout interface split from a
40-GE interface.
interface interface-type
interface-number
N/A
3. Combine the four 10-GE
breakout interfaces into a
40-GE interface.
using fortygige
By default, a 40-GE interface is not
split and operates as a single
interface.
3
Step Command Remarks
4. Reboot the device.
N/A
After creating the 40-GE interface,
the system removes the four 10-GE
breakout interfaces.
After you combine the four 10-GE
breakout interfaces, replace the
dedicated 1-to-4 cable with a
dedicated 1-to-1 cable or a 40-GE
transceiver module. For more
information about the cable or
transceiver module, see the
installation guides.
Configuring basic settings of an Ethernet interface
Configuring an Ethernet interface
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter Ethernet interface
view.
interface interface-type
interface-number
N/A
3. Set the interface
description.
description text
The default setting is in the format of
interface-name Interface. For example,
Ten-GigabitEthernet1/0/1 Interface.
4. Set the duplex mode of
the Ethernet interface.
duplex { auto | full | half }
The default setting is auto for Ethernet
interfaces.
Copper ports operating at 1000 Mbps or
10 Gbps and fiber ports do not support the
half keyword.
5. Set the port speed.
speed { 10 | 100 | 1000 |
10000 | 40000 | auto }
The default setting is auto for Ethernet
interfaces.
Fiber ports do not support the 10 or 100
keyword.
6. Configure the expected
bandwidth of the
interface.
bandwidth bandwidth-value
By default, the expected bandwidth (in
kbps) is the interface baud rate divided by
1000.
7. Restore the default
settings for the Ethernet
interface.
default N/A
8. Bring up the Ethernet
interface.
undo shutdown
By default, Ethernet interfaces are in up
state.
Configuring an Ethernet subinterface
Step Command Remarks
1. Enter system view.
system-view N/A
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318

H3C S5820V2 series Configuration manual

Category
Software
Type
Configuration manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI