FoxGate S6424-S2C2 series Configuration manual

Category
Network switches
Type
Configuration manual
Content
2
Content
1. LOGGING IN ETHERNET SWITCH ........................................................... 16
1.1 Set up Configuration Environment via Console Port ................................................... 16
1.2 Set up Configuration Environment through Telnet ....................................................... 18
1.2.1 Connect PC to Ethernet Switch through Telnet ........................................................... 18
1.2.2 Telnet Ethernet Switch through Ethernet Switch ......................................................... 19
2. COMMAND LINE INTERFACE .................................................................. 21
2.1 Introduction of Command Line Interface ....................................................................... 21
2.2 Command Line Configuration Mode .............................................................................. 21
2.3 Feature and Functions of Command Line ..................................................................... 24
2.3.1 Help of Command Line ................................................................................................ 24
2.3.2 Displaying Characteristics of Command Line .............................................................. 25
2.4 Show History Command of Command Line .................................................................. 25
2.5 Common Command Line Error Messages ..................................................................... 26
2.6 Symbols in Command ...................................................................................................... 26
2.7 Parameter in Command ................................................................................................... 27
3. MANAGE USERS ...................................................................................... 28
3.1 System Default User ........................................................................................................ 28
3.2 User’s Authentication ...................................................................................................... 29
3.3 Local Authentication Configuration ............................................................................... 29
3.3.1 Add Users .................................................................................................................... 29
3.3.2 Change Password ....................................................................................................... 30
3.3.3 Modify User's Privilege Level ...................................................................................... 30
3.3.4 Delete User .................................................................................................................. 31
3.3.5 Show Users ................................................................................................................. 31
3.4 Remote Authentication Configuration ........................................................................... 32
3.4.1 Configure RADIUS to Be Remote Authentication Server ............................................ 32
3.4.2 Configure TACACS+ remote authentication ................................................................ 32
Content
3
4. ETHERNET PORT CONFIGURATION ...................................................... 34
4.1 Ethernet Port Overview .................................................................................................... 34
4.1.1 Link Type of Ethernet Ports ......................................................................................... 34
4.1.2 Configuring Default VLAN ID for Ethernet Port ........................................................... 34
4.1.3 Handling packets ......................................................................................................... 34
4.2 Configure Ethernet Port ................................................................................................... 35
4.2.1 Basic Ethernet Port Configuration ............................................................................... 35
4.3 Combo Port ....................................................................................................................... 39
4.4 Enable/Disable Ingress Filtering ..................................................................................... 39
4.5 Acceptable-Frame Type for Ethernet Port ...................................................................... 40
4.6 Enable/Disable Flow Control for Ethernet Port ............................................................. 41
4.7 Display and Debug Ethernet Port ................................................................................... 41
5. ETHERNET PORT MIRRORING CONFIGURATION ................................. 46
5.1 Configure Ethernet Port Mirroring .................................................................................. 46
5.1.1 Overview ...................................................................................................................... 46
5.1.2 Mirroring ....................................................................................................................... 46
5.1.3 Configuring port mirroring ............................................................................................ 47
5.1.4 Mirroring Configuration ................................................................................................ 47
6. CONFIGURING PORT UTILIZATION ALARM........................................... 50
6.1 Brief Introduction to Device Utilization Alarm ............................................................... 50
6.2 Configuring Device Utilization Alarm ............................................................................. 50
6.2.1 Configuring Port Utilization Alarm ................................................................................ 50
6.2.2 Configuring CPU Utilization Alarm ............................................................................... 50
6.2.3 Displaying and Debugging Device Utilization Alarm.................................................... 51
7. LINK AGGREGATION CONFIGURATION ................................................. 52
7.1 Overview ............................................................................................................................ 52
7.1.1 Introduction to Link Aggregation .................................................................................. 52
7.1.2 Introduction to LACP ................................................................................................... 53
7.1.3 Operation Key (O-Key) ................................................................................................ 53
7.1.4 Static Aggregation Group ............................................................................................. 53
7.1.5 Dynamic LACP Aggregation Group ............................................................................. 54
Content
4
7.2 Redundancy of Interconnected Device .......................................................................... 56
7.3 Load-balancing Policy ..................................................................................................... 56
7.4 Link Aggregation Configuration ..................................................................................... 56
7.4.1 Configuring a Static Aggregation Group ...................................................................... 56
7.5 Configuring a Dynamic LACP Aggregation Group ....................................................... 57
7.6 Displaying and Maintaining Link Aggregation Configuration ..................................... 58
7.7 LACP Configuration Example ......................................................................................... 59
8. PORT ISOLATION CONFIGURATION ....................................................... 64
8.1 Introduction to Port Isolation .......................................................................................... 64
8.2 Port Isolation Configuration ............................................................................................ 64
8.2.1 Port Isolation Configuration ......................................................................................... 64
8.2.2 Port-isolation Monitor and Maintenance ...................................................................... 65
8.3 Port-isolation Configuration Example ............................................................................ 65
8.3.1 Port-isolation Configuration Example .......................................................................... 65
9. VLAN CONFIGURATION ........................................................................... 66
9.1 VLAN Overview ................................................................................................................. 66
9.2 VLAN Principles ................................................................................................................ 67
9.3 802.1Q VLAN ..................................................................................................................... 68
9.3.1 VLAN Link Type of Ethernet Ports ............................................................................... 68
9.3.2 Default VLAN ............................................................................................................... 68
9.3.3 Handling Packets ......................................................................................................... 68
10. VLAN CONFIGURATION ......................................................................... 69
10.1 Default VLAN Configuration .......................................................................................... 69
10.2 Create and Modify VLAN ............................................................................................... 69
10.3 Delete Port Members from VLAN .................................................................................. 70
10.4 Delete VLAN .................................................................................................................... 70
10.5 VLAN Configuration Example ....................................................................................... 70
Content
5
11. GVRP CONFIGURATION ......................................................................... 72
11.1 Brief Introduction to GVRP ............................................................................................ 72
11.2 Configuring GVRP .......................................................................................................... 73
11.2.1 Brief Introduction to GVRP Configuration .................................................................. 73
11.2.2 Startup GVRP ............................................................................................................ 73
11.3 Configuring VLAN Forwarded by GVRP ...................................................................... 73
11.3.1 Displaying and Debugging ......................................................................................... 74
11.3.2 GVRP Configuration Examples ................................................................................. 74
12. ARP CONFIGURATION ........................................................................... 79
12.1 ARP Overview ................................................................................................................. 79
12.1.1 ARP Function ............................................................................................................. 79
12.1.2 ARP Message Format ............................................................................................... 80
12.2 Configuring ARP Attack Spoofing ................................................................................ 81
12.2.1 Brief Introduction to ARP Spoofing ............................................................................ 81
12.2.2 ARP Anti-Spoofing Protection .................................................................................... 81
12.2.3 Configuring Anti-Spoofing .......................................................................................... 82
12.2.4 Configuring ARP Packet Source MAC Address Consistency Check ........................ 83
12.2.5 Configuring Default of Anti-Spoofing ......................................................................... 83
12.2.6 Displaying and Maintain Anti-Spoofing ...................................................................... 83
12.3 Configuring against ARP Flood .................................................................................... 83
12.3.1 ARP Flood .................................................................................................................. 83
12.3.2 Configuring against ARP Flood ................................................................................. 84
12.3.3 Configuring against ARP Flood ................................................................................. 84
12.3.4 Displaying and Maintain against ARP Flood.............................................................. 85
13. IGMP SNOOPING .................................................................................... 86
13.1 Brief Introduction to IGMP Snooping ........................................................................... 86
13.2 IGMP Snooping Configuration ...................................................................................... 86
13.2.1 Brief Configuration of IGMP Snooping ...................................................................... 86
13.2.2 Enable IGMP Snooping ............................................................................................. 87
13.2.3 Configuring IGMP Snooping Timer ............................................................................ 87
13.2.4 Configuring Port Fast-Leave ...................................................................................... 87
13.2.5 Configuring Number of Multicast Group Allowed Learning ....................................... 88
13.2.6 Configuring IGMP Snooping Querier ......................................................................... 88
13.2.7 Configuring IGMP Snooping Multicast Learning Strategy ......................................... 89
13.2.8 Configuring IGMP Snooping Router-Port .................................................................. 89
13.2.9 Configuring IGMP Snooping Port Multicast VLAN .................................................... 90
13.2.10 Configuring Host Port Record MAC Functions ........................................................ 90
Content
6
13.2.11 Configuring Port of Dropped Query Packets or Not ................................................ 91
13.2.12 Configuring Port of Discarded Packets Report or Not ............................................. 91
13.2.13 Configuring Multicast Preview ................................................................................. 91
13.2.14 Configuring Profile of Black and White List ............................................................. 92
13.2.15 Displaying and Maintenance of IGMP Snooping ..................................................... 92
13.3 IGMP Snooping Configuration Examples .................................................................... 93
14. GMRP CONFIGURATION ........................................................................ 98
14.1 Brief Introduction to GMRP ........................................................................................... 98
14.2 GMRP Configuration ...................................................................................................... 98
14.2.1 Enabling GMRP ......................................................................................................... 98
14.2.2 Add Requisite Static Route Forwarded by GMRP ..................................................... 98
14.2.3 Displaying and Maintaining GMRP ............................................................................ 99
14.2.4 GMRP Configuring Examples .................................................................................... 99
15. DHCP CONFIGURATION ....................................................................... 105
15.1 DHCP Overview ............................................................................................................ 105
15.2 DHCP IP Address Assignment .................................................................................... 105
15.2.1 IP Address Assignment Policy ................................................................................. 105
15.2.2 Obtaining IP Addresses Dynamically ....................................................................... 106
15.2.3 DHCP Packet Format .............................................................................................. 107
15.3 DHCP Relay ................................................................................................................... 108
15.3.1 Usage of DHCP Relay ............................................................................................. 108
15.3.2 DHCP Relay Fundamentals .................................................................................... 109
15.4 Configure DHCP Relay .................................................................................................. 110
16. DHCP SNOOPING ................................................................................. 111
16.1 Introduction to DHCP Snooping .................................................................................. 111
16.2 DHCP Snooping Configuration .................................................................................... 111
16.3 DHCP-Snooping Security Configuration .................................................................... 112
16.3.1 Configure max clients number .................................................................................. 112
16.3.2 Configure IP-Source-Guard ...................................................................................... 112
16.4 Displaying and Debugging DHCP-Snooping .............................................................. 113
16.5 DHCP-Snooping Configuration Example .................................................................... 113
Content
7
17. DHCP OPTION 82 .................................................................................. 115
17.1 Introduction to option 82 supporting .......................................................................... 115
17.2 DHCP Option82 Configuration ..................................................................................... 115
17.2.1 Enable DHCP Option82 ............................................................................................ 115
17.2.2 Displaying and Debugging DHCP Option82 ............................................................. 116
18. ACL CONFIGURING .............................................................................. 117
18.1 Brief Introduction to ACL .............................................................................................. 117
18.1.1 Configuring Match Order .......................................................................................... 117
18.1.2 Switch Support ACL .................................................................................................. 118
18.2 Configuring Time Range ............................................................................................... 118
18.2.1 Configuration Procedure ........................................................................................... 119
18.2.2 Configuration Examples .......................................................................................... 120
18.3 Configuring Basic ACL ................................................................................................ 120
18.3.1 Configuration Procedure .......................................................................................... 121
18.3.2 Configuration Examples .......................................................................................... 121
18.4 Define Extended ACL ................................................................................................... 121
18.4.1 Configuration Procedure .......................................................................................... 122
18.4.2 Configuration Procedure .......................................................................................... 123
18.5 Define Layer 2 ACL ....................................................................................................... 124
18.5.1 Configuring Layer 2 ACL ......................................................................................... 124
18.5.2 Configuration Examples .......................................................................................... 125
18.6 Activate ACL ................................................................................................................. 125
18.6.1 Configuration Examples .......................................................................................... 125
18.6.2 Activate ACL Successfully .Active ACL Binding ....................................................... 126
18.7 Displaying and Debugging ACL .................................................................................. 126
19. STORM-CONTROL CONFIGURATION ................................................. 127
19.1 Storm-Control Overview .............................................................................................. 127
19.2 Storm-Control Configuration ...................................................................................... 127
19.2.1 Configure Storm-Control .......................................................................................... 127
19.2.2 Storm-Control Monitor and Maintenance ................................................................. 127
Content
8
20. QOS CONFIGURATION ......................................................................... 129
20.1 Brief Introduction to QoS ............................................................................................ 129
20.1.1 Traffic ....................................................................................................................... 129
20.1.2 Traffic Classification ................................................................................................. 129
20.1.3 Priority ...................................................................................................................... 130
20.1.4 Access Control List .................................................................................................. 132
20.1.5 Packet Filtration ....................................................................................................... 132
20.1.6 Flow Monitor ............................................................................................................ 132
20.1.7 Interface Speed Limitation ....................................................................................... 132
20.1.8 Redirection ............................................................................................................... 133
20.1.9 Priority Mark............................................................................................................. 133
20.1.10 Choose Interface Outputting Queue for Packet .................................................... 133
20.1.11 Queue scheduler.................................................................................................... 133
20.1.12 Cos-map Relationship of Hardware Priority Queue and Priority of IEEE802.1p
Protocol .................................................................................................................................... 134
20.1.13 Slow Mirror............................................................................................................. 134
20.1.14 Statistics Based on Flow ........................................................................................ 134
20.1.15 Copy Packet to CPU .............................................................................................. 134
20.2 QOS Configuration ....................................................................................................... 134
20.2.1 Configuring Flow Monitor ......................................................................................... 134
20.2.2 Configure Two Rate Three Color Marker ................................................................. 135
20.2.3 Configuring Interface Line Rate ............................................................................... 135
20.2.4 Configuring Packet Redirection ............................................................................... 136
20.2.5 Configuring Traffic Copy to CPU ............................................................................. 136
20.2.6 Configuring Traffic Priority ....................................................................................... 136
20.2.7 Configuring Queue-Scheduler ................................................................................. 136
20.2.8 Configuring Cos-map Relationship of Hardware Priority Queue and Priority of
IEEE802.1p Protocol ............................................................................................................... 137
20.2.9 Configuring Mapping Relationship between DSCP and 8 Priority in IEEE 802.1p . 138
20.2.10 Configuring Flow Statistic ...................................................................................... 138
20.2.11 Configuring Flow Mirror ......................................................................................... 139
20.2.12 Displaying and Maintain QoS ................................................................................ 139
21. STP CONFIGURATION .......................................................................... 140
21.1 STP Overview ................................................................................................................ 140
21.1.1 Function of STP ....................................................................................................... 140
21.1.2 Protocol Packets of STP .......................................................................................... 140
21.1.3 Basic concepts in STP ............................................................................................. 140
21.1.4 Spanning-Tree Interface States ............................................................................... 141
21.2 How STP Works ............................................................................................................ 142
21.3 Implement RSTP on Ethernet Switch ......................................................................... 148
21.4 Configure RSTP ............................................................................................................ 149
Content
9
21.4.1 RSTP Configuration Task List .................................................................................. 149
21.4.2 Enable RSTP ........................................................................................................... 150
21.4.3 Configure STP Bridge Priority ................................................................................. 150
21.4.4 Configure Time Parameter ...................................................................................... 150
21.4.5 Configure STP Path Cost ........................................................................................ 151
21.4.6 Configure STP Port Priority ..................................................................................... 151
21.4.7 Configure STP Mcheck ............................................................................................ 152
21.4.8 Configure STP Point-to-Point Mode ........................................................................ 152
21.4.9 Configure STP Portfast ............................................................................................ 152
21.4.10 Configure STP Transit Limit ................................................................................... 153
21.4.11 RSTP Monitor and Maintenance ............................................................................ 153
21.5 STP Configuration Example ........................................................................................ 153
22. CONFIGURING 802.1X .......................................................................... 160
22.1 Brief Introduction to 802.1X Configuration ................................................................ 160
22.1.1 Architecture of 802.1X ............................................................................................. 160
22.1.2 Rule of 802.1x.......................................................................................................... 162
22.2 Configuring AAA .......................................................................................................... 163
22.2.1 Configuring RADIUS Server .................................................................................... 163
22.2.2 Configuring Local User ............................................................................................ 163
22.2.3 Configuring Domain ................................................................................................. 164
22.2.4 Configuring RADIUS Features ................................................................................ 164
22.3 Configuring 802.1X ....................................................................................................... 166
22.3.1 Configuring EAP ...................................................................................................... 166
22.3.2 Enable 802.1x .......................................................................................................... 166
22.3.3 Configuring 802.1x Parameters for Port .................................................................. 167
22.3.4 Configuring Re-authentication ................................................................................. 167
22.3.5 Configuring Watch Feature ...................................................................................... 167
22.3.6 Configuring User Features ...................................................................................... 168
23. CONFIGURING MSTP ........................................................................... 169
23.1 Brief Introduction to MSTP .......................................................................................... 169
23.2 BPDU ............................................................................................................................. 169
23.2.1 Basic Concepts in MSTP ......................................................................................... 170
23.2.2 Roles of Ports .......................................................................................................... 172
23.3 Algorithm Implementation ........................................................................................... 175
23.3.1 MSTP Protocol ......................................................................................................... 175
23.3.2 Determining CIST Priority Vectors ........................................................................... 177
23.3.3 Determining MSTI Priority Vectors .......................................................................... 177
23.3.4 Determining MSTP .................................................................................................. 178
Content
10
23.3.5 Active Topology ........................................................................................................ 182
23.3.6 A topology Change .................................................................................................. 182
23.3.7 MST and SST Compatibility ..................................................................................... 183
23.4 Configuring MSTP ........................................................................................................ 183
23.4.1 Configuring MSTP Task ........................................................................................... 183
23.4.2 Enabling MSTP ........................................................................................................ 184
23.4.3 Configuring MSTP Timer Parameter Values............................................................ 184
23.4.4 Configuring MSTP Identifier .................................................................................... 185
23.4.5 Configuring MSTP Bridge Priority ............................................................................ 186
23.4.6 Configuring Port Boundary Port Status ................................................................... 186
23.4.7 Configuring Port Link Type ...................................................................................... 187
23.4.8 Configuring Path Cost ............................................................................................. 187
23.4.9 Configuring Port Priority .......................................................................................... 188
23.4.10 Configuring Root Port Protection ........................................................................... 188
23.4.11 Configuring Digest Snooping Port ......................................................................... 189
23.4.12 Configuring Port mCheck Function ....................................................................... 189
23.4.13 Configuring MSTP Instance Is Enabled................................................................. 190
23.4.14 Displaying and Maintain MSTP ............................................................................. 190
24. CONFIGURING SNTP ............................................................................ 191
24.1 Brief introduction of SNTP .......................................................................................... 191
24.1.1 SNTP Operation Mechanism ................................................................................... 191
24.2 Configuring SNTP client .............................................................................................. 191
24.2.1 List of SNTP Client Configuration ............................................................................ 191
24.2.2 Enabling SNTP Client .............................................................................................. 192
24.2.3 Modifying SNTP Client Operating Mode.................................................................. 192
24.2.4 Configuring SNTP Sever Address ........................................................................... 192
24.2.5 Modifying Broadcast Transfer Delay ....................................................................... 193
24.2.6 Configuring Multicast TTL ........................................................................................ 193
24.2.7 Configuring Interval Polling ...................................................................................... 193
24.2.8 Configuring Overtime Retransmist .......................................................................... 194
24.2.9 Configuring Valid Servers ........................................................................................ 194
24.2.10 Configuring MD5 Authentication ............................................................................ 194
24.2.11 Displaying and Maintain SNTP Client .................................................................... 195
25. SSH TERMINAL SERVICES .................................................................. 196
25.1 Introduction to SSH ...................................................................................................... 196
25.2 SSH Server Configuration ........................................................................................... 197
25.3 Log in Switch from SSH Client .................................................................................... 197
25.4 SSH Server Configuration Example ........................................................................... 198
Content
11
25.4.1 Use Default Key ....................................................................................................... 198
25.4.2 Use Loaded Key ...................................................................................................... 199
26. CONFIGURATION FILE MANAGEMENT .............................................. 201
26.1 Introduction to Configuration File .............................................................................. 201
26.2 Configuration File-Related Operations ...................................................................... 201
27. BOOTROM AND HOST SOFTWARE LOADING ................................... 204
27.1 Introduction to Loading Approaches ......................................................................... 204
27.2 Local Software Loading ............................................................................................... 204
27.2.1 Loading Software Using XMODEM through Console Port ...................................... 205
27.2.2 Loading Software Using TFTP through Ethernet Port ............................................. 207
27.2.3 Loading Software Using FTP through Ethernet Port ............................................... 208
27.3 Remote Software Loading ........................................................................................... 210
27.3.1 Remote Loading Using FTP .................................................................................... 210
27.3.2 Remote Loading Using TFTP .................................................................................. 210
28. BASIC SYSTEM CONFIGURATION & DEBUGGING ........................... 211
28.1 Basic System Configuration ........................................................................................ 211
28.2 SNMP .............................................................................................................................. 211
28.2.1 SNMP Overview ....................................................................................................... 211
28.2.2 Configuring SNMP Basic Functions ........................................................................ 213
28.2.3 Displaying SNMP ..................................................................................................... 214
28.2.4 SNMP Configuration Example ................................................................................. 215
28.3 Network Connectivity Test .......................................................................................... 216
28.3.1 Ping .......................................................................................................................... 216
28.3.2 Tracert ...................................................................................................................... 216
28.4 Device Management ..................................................................................................... 217
28.4.1 Device Management Configuration ......................................................................... 217
28.4.2 MAC address Table management ........................................................................... 217
29. ENTRIES IN A MAC ADDRESS TABLE ................................................ 220
29.2 Restarting Ethernet Switch ......................................................................................... 224
29.3 System Maintenance .................................................................................................... 224
Content
12
29.3.1 Basic Maintenance .................................................................................................. 224
29.3.2 Access-Limit Management ...................................................................................... 225
29.3.3 Telnet Client ............................................................................................................. 225
29.3.4 Cpu-Alarm ................................................................................................................ 225
29.3.5 Mail-Alarm ................................................................................................................ 226
29.3.6 Anti-Dos Attack ........................................................................................................ 226
29.3.7 Displaying System Status ........................................................................................ 226
30. LLDP CONFIGURATION ....................................................................... 228
30.1 LLDP Protocol Overview.............................................................................................. 228
30.2 Configure LLDP ............................................................................................................ 228
30.2.1 LLDP Configuration Task ......................................................................................... 228
30.2.2 Enable LLDP............................................................................................................ 229
30.2.3 Configure LLDP Hello-Time ..................................................................................... 229
30.2.4 Configure LLDP Hold-Time ...................................................................................... 229
30.2.5 Configure LLDP Packet Transferring and Receiving Mode on Port ........................ 229
30.2.6 LLDP Displaying and Debugging ............................................................................. 230
30.2.7 Configuration Example ............................................................................................ 230
31. CFM CONFIGURATION ......................................................................... 232
31.1 Brief Introduction to CFM ............................................................................................ 232
31.1.1 CFM Concepts ......................................................................................................... 232
31.1.2 CFM Main Function ................................................................................................. 232
31.2 Configuring CFM .......................................................................................................... 233
31.2.1 CFM Configuration Task List ................................................................................... 233
31.2.2 Maintain Field Configuration .................................................................................... 234
31.2.3 Configuration and Maintenance Level Domain Name ............................................. 234
31.2.4 Maintain Set Configuration ...................................................................................... 235
31.2.5 Configuration Name and Associated VLAN to Maintain Set ................................... 235
31.2.6 Configuration MEPs ................................................................................................. 235
31.2.7 Configure Remote Maintenance Endpoint .............................................................. 236
31.2.8 Configuring MIPs ..................................................................................................... 236
31.2.9 Configuration Continuity Detection .......................................................................... 236
31.2.10 Configure Loopback .............................................................................................. 237
31.2.11 Configure Link Tracking ......................................................................................... 237
31.2.12 Display and Maintenance of CFM ......................................................................... 238
32. FLEX LINKS CONFIGURATION ............................................................ 239
32.1 Flex links Overview ...................................................................................................... 239
32.1.1 Basic Concept of Flex Links .................................................................................... 239
32.1.2 Operating Mechanism of Flex Link .......................................................................... 241
Content
13
32.2 Flex Links Configuration ............................................................................................. 243
32.2.1 Flex Links Configuration Tasks ................................................................................ 243
32.2.2 Configure Flex Links group ...................................................................................... 243
32.2.3 Configure Flex Links preemption mode ................................................................... 244
32.2.4 Configure Flex Links Preemption Delay .................................................................. 244
32.2.5 Configure Flex links MMU ....................................................................................... 245
32.2.6 Flex Links Monitor and Maintenance ....................................................................... 245
33. MONITOR LINK CONFIGURATION ....................................................... 246
33.1 Monitor Link Overview ................................................................................................. 246
33.1.1 Background.............................................................................................................. 246
33.1.2 Benefits .................................................................................................................... 246
33.2 Monitor Link Implementation ...................................................................................... 247
33.2.1 Basic Concepts in Monitor Link ............................................................................... 247
33.3 Configuring Monitor Link ............................................................................................ 249
33.3.1 Monitor Link Configuration Tasks ............................................................................ 249
33.3.2 Configure Monitor Links Group ................................................................................ 249
33.3.3 Monitor Link Monitor and Maintenance ................................................................... 249
33.4 Monitor Link Configuration Example ......................................................................... 250
34. EFM CONFIGURATION ......................................................................... 256
34.1 Brief Introduction to EFM ............................................................................................ 256
34.1.1 EFM Main Function ................................................................................................. 256
34.1.2 EFM Protocol Packets ............................................................................................. 257
34.2 Configuration EFM ....................................................................................................... 257
34.2.1 EFM Configuration Task List .................................................................................... 257
34.2.2 EFM Basic Configuration ......................................................................................... 258
34.2.3 EFM Timer Parameter Configuration ....................................................................... 258
34.2.4 Configuring Remote Failure Indication .................................................................... 259
34.2.5 Configuring Link Monitoring Capabilities ................................................................. 260
34.2.6 Enabling Remote Loopback .................................................................................... 260
34.2.7 Rejecting Remote Loopback Requests Initiated by Remote ................................... 261
34.2.8 Initiating Remote Loopback Request ...................................................................... 261
34.2.9 Starting Remote Access Function MIB Variable ...................................................... 262
34.2.10 MIB Variable Access Requests Initiated by Remote ............................................. 262
34.2.11 Display and Maintenance of EFM .......................................................................... 262
35. MAC ADDRESS AUTHENTICATION CONFIGURATION ...................... 264
35.1 Mac Authentication Overview ..................................................................................... 264
Content
14
35.2 Mac Address Authentication Configuration .............................................................. 264
35.2.1 AAA-Related Configuration ...................................................................................... 264
35.2.2 Enabling Configuration ............................................................................................ 265
35.2.3 Off Assembly Line Testing Configuration ................................................................. 265
35.2.4 Silent Timer Configuration ....................................................................................... 266
35.2.5 Mac-vlan Configuration Functions ........................................................................... 266
35.2.6 Guest-vlan Configuration Functions ........................................................................ 267
35.2.7 Configuring User Features ...................................................................................... 267
36. L2TP CONFIGURATION ........................................................................ 266
36.1 L2TP Overview .............................................................................................................. 266
36.2 L2TP Configuration ...................................................................................................... 266
36.2.1 Configure L2-tunnel Packet ..................................................................................... 266
36.2.2 Advanced L2TP Configuration ................................................................................. 267
36.2.3 L2TP Monitor and Maintenance .............................................................................. 267
37. QINQ CONFIGURATION........................................................................ 268
37.1 Introduction to QinQ .................................................................................................... 268
37.1.1 Understanding QinQ ................................................................................................ 268
37.1.2 Implementations of QinQ ......................................................................................... 269
37.1.3 Modification of TPID Value of QinQ Frames............................................................ 270
37.2 Configuring QinQ ......................................................................................................... 270
37.2.1 Default QinQ Configuration ..................................................................................... 270
37.2.2 Configure BASIC QinQ ............................................................................................ 271
37.2.3 Configure Selective QinQ ........................................................................................ 271
37.3 QinQ Configuration Example: ..................................................................................... 272
38. PORT-CAR CONFIGURATION .............................................................. 275
38.1 Port-car Overview ......................................................................................................... 275
38.2 Configure Port-Car ....................................................................................................... 275
38.3 Display and Debug of Port-Car ................................................................................... 276
38.4 Port-car Configuration Example ................................................................................. 276
39. STORM-CONTROL CONFIGURATION ................................................. 277
39.1 Storm-control Overview ............................................................................................... 277
Content
15
39.2 Storm-control Configuration ....................................................................................... 277
39.2.1 Configure Storm-control ........................................................................................... 277
39.2.2 Storm-control Monitor and Maintenance ................................................................. 277
40. MLD SNOOPING .................................................................................... 278
40.1 MLD Snooping Overview ............................................................................................. 278
40.2 Configuring MLD Snooping ......................................................................................... 278
40.2.1 MLD Snooping Configuration Task List ................................................................... 278
40.2.2 Start MLD Snooping ................................................................................................ 279
40.2.3 Configuring MLD Snooping Timer ........................................................................... 279
40.2.4 Fast-leave Configuration Port .................................................................................. 279
40.2.5 Maximum Number of Learning Multicast Configuration Port ................................... 280
40.2.6 Configuring MLD Snooping Multicast Learning Strategies ...................................... 280
40.2.7 Configuring MLD-Snooping Querier ........................................................................ 281
40.2.8 Configuring Routing Port ......................................................................................... 281
40.2.9 Multicast VLAN Port Configuration .......................................................................... 282
40.2.10 Display and Maintenance of MLD Snooping ......................................................... 282
40.2.11 MLD Snooping Configuration Examples ................................................................ 283
Logging in Ethernet Switch
Chapter 1. Logging in Ethernet
Switch
This chapter describes how to connect to the switch and do the configurations. There are
ways as via console port and through telnet. It contains following sections:
Set up Configuration Environment via the Console Port
Set up Configuration Environment through Telnet
Telnet Ethernet Switch through Ethernet Switch
1.1 Set up Configuration Environment via
Console Port
Step 1:
As shown in the figure below, to set up the local configuration environment, connect the
serial port of a PC (or a terminal) to the Console port of the Ethernet switch with the Console
cable.
Console port
RS-232 Serial port
Console cable
Figure 1-1 Set up the local configuration environment via the Console port
Step 2:
Run terminal emulator (such as Hyper Terminal on Windows 9X/2000/XP/Vista) on the
Computer. Set the terminal communication parameters as follows: Set the baud rate to 9600,
data bit to 8, parity check to none, stop bit to 1, flow control to none and select the terminal
type as auto-detection.
Logging in Ethernet Switch
17
Figure 1-2 Set up new connection
Figure 1-3 Configure the port for connection
Figure 1-4 Set communication parameters
Logging in Ethernet Switch
18
Step 3:
The Ethernet switch is powered on. Display self-test information of the Ethernet switch and
prompt you to press Enter to show the command line prompt such as < > after you have
entered the correct username and password. The initial username is admin and the matched
password is admin. It is suggested modifying the initial password after the first logging in.
Please remember the modified password. If the password is forgotten, please contact us as
soon as possible. Modify password refers to Change password.
Step 4:
Input a command to configure the Ethernet switch or Configuration Mode the operation
state. Input a “?” to get an immediate help. For details of specific commands, refer to the
following chapters.
1.2 Set up Configuration Environment
through Telnet
1.2.1 Connect PC to Ethernet Switch through
Telnet
After you have correctly configured IP address of a VLAN interface for an Ethernet Switch
via Console port (the way to configure switch via console refers to Set up Configuration
Environment via the Console Port; the way to configure ip address of switch refers to 03 using
ip address command in VLAN interface mode), and make sure PC can ping the switch, then
you can telnet this Ethernet switch and configure it.
Step 1:
Authenticate the Telnet user via the Console port before the user logs in by Telnet.
Step 2:
To set up the configuration environment, connect the Ethernet port
of the PC to that of the Ethernet switch via the LAN.
W o rk s ta tio n
W o rk s ta tio n
S e rv er P C ( fo r c o n fig u rin g th e s w itc h
v ia T e lne t )
E th e r n e t p o rt
E th e rn e t
W o rk s ta tio n
W o rk s ta tio n
S e rv er P C ( fo r c o n fig u rin g th e s w itc h
v ia T e lne t )
E th e r n e t p o rt
E th e rn e t
Figure 1-5 Set up configuration environment through telnet
Logging in Ethernet Switch
19
Step 3:
Run Telnet on the PC and input the IP address of the VLAN connected to the PC port.
Figure 1-6 Run Telnet
Step 4:
The terminal displays “Username (1-32 chars):” and prompts the user
to input the login username and password. After you input the correct username and
corresponded password, it displays the command line prompt (such as < >). If the prompt
“Too many users!” appears, it indicates that too many users are connected to the Ethernet
through the Telnet at this moment. In this case, please reconnect later. At most 5 Telnet users
are allowed to log in to the series Ethernet Switches simultaneously. Default username is
admin and the password is admin. If the default password has been modified, it requires the
modified password.
Step 5: Use the corresponding commands to configure the Ethernet switch or to monitor
the running state. Enter “?” to get the immediate help. For details of specific commands, refer
to the following chapters.
Note:
When configuring the Ethernet switch via Telnet, do not modify the IP address of it
unnecessary, for the modification might cut the Telnet connection.
1.2.2 Telnet Ethernet Switch through Ethernet
Switch
Switch can be both the Telnet server and client. After a user has telnet to a switch from PC,
he or she can configure another switch through this switch via Telnet. The local switch serves
as Telnet client and the peer switch serves as Telnet server. If the ports connecting these two
switches are in a same local network, their IP addresses must be configured in the same
network segment. Otherwise, the two switches must establish a route that can reach each
other.
As shown in the figure below, after you telnet to an Ethernet switch (that is Telnet Client in
Logging in Ethernet Switch
20
Figure 1-7), you can run telnet command to log in and configure another Ethernet switch
(that is Telnet Server in Figure 1-7).
Telnet Client
PC Telnet Server
Figure 1-7 Provide Telnet Client service
Step 1:
Configure IP address for the switch (that is Telnet Client in Figure 1-7). The way to
configure switch via console refers to Set up Configuration Environment via the Console Port;
the way to configure ip address of switch refers to 03 using ip address command in VLAN
interface mode).
Step 2:
The user logs in the Telnet Client (Ethernet switch). For the login process, refer to the
section describing Connect PC to Ethernet Switch through Telnet”.
Step 3:
Perform the following operations on the Telnet Client:
#telnet A.B.C.D (A.B.C.D is the IP address of the Telnet Server.)
Step 4:
Enter the preset login password and you will see the prompt such < >. If the prompt “Too
many users!” appears, it indicates that too many users are connected to the Ethernet through
the Telnet at this moment. In this case, please connect later.
Step 5:
Use the corresponding commands to configure the Ethernet switch or Configuration Mode
it running state. Enter “?” to get the immediate help. For details of specific commands, refer to
the following chapters.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286

FoxGate S6424-S2C2 series Configuration manual

Category
Network switches
Type
Configuration manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI