Home
        WGSW-50040 - Modern Alarm Kft.
         Contents
1.                                                                                                      30 6  CHAPTER 31          CONFIGURATION                                                 2 1216                                             31 8  31 71                                            52                                                                31 8  31 1 1 Conception Introduction                                               31 8   31 1 2          Protocol Packet                                      8        31 9   31 1 3          Protocol Operation                            2002  400000  0 011000000                         31 10   31 2          CONFIGURATION TASK LIST      0s sssscesesuccccssseeeceseeeseaneseeesueuceaeanseesesuaeauanaaseseeeeuaeagassesseseanas 31 10  31 3          TYPICAL SCENARIO                                                                                                                                                                                          31 12  31 4          TROUBLESHOOTING                                                 4                 RR NR RR ORAN AR RR R4 R4 RIO AS AR RR R4          31 14  CHAPTER 32 MIRROR CONFIGURATION                                     1 1   4        11                      nnn 32 15  32 1 INTRODUCTION                                                                                                                                                                                                 
2.                                            18 1  18 1 INTRODUCTION TO DHGQCP                     aee dee ecc                      in od od in iu QU Da de in icd au ac ad is dn in          dn au Ua dn nn acad aa ae add 18 1  18 2 DHCP SERVER                                                                                         eres rers             essere nennen              18 2  18 3 DHCP CONFIGURATION                                                    nnn nnne reser                                         nenene nenene nenne 18 4    18 4 DHCP TROUBLESHOOTING         4 2     Sua                                                                      18 5    CHAPTER 19 DHCP SNOOPING CONFIGURATION                                                     19 1  19 1 INTRODUCTION TO DHCP 5                                                 19 1  19 2 DHCP SNOOPING CONFIGURATION TASK                                  44       40    2      19 2  19 3 DHCP SNOOPING TYPICAL                                            4              8             19 5  19 4 DHCP SNOOPING TROUBLESHOOTING                  19 6   19 4 1 Monitor and Debug                                                         19 6  19 4 2 DHCP Snooping Troubleshooting Help                         essen 19 6   CHAPTER 20 DHCP SNOOPING OPTION 82 CONFIGURATION                                 20 7   20 1 INTRODUCTION TO DHCP SNOOPING OPTION 82     02                  2    440  4  400           20 7  20 1 1 DHCP option 82 Message Structu
3.                               2 2 4  4  4222       1 22222   9 1                                                                                                                                                                          9 1   9 2 JUMBO CONFIGURATION TASK                                                                                                                                                                                         9 1  CHAPTER 10 VLAN CONFIGURATION                              2 4422    10 1  10 1 VLAN CONFIGURATION mm            n    10 1  10 1 1 Introdu  ction to                                                                      et bd ge ie b odas 10 1   10 1 2 VLAN Configuration Task                                                                      nnne nene 10 2    10 1 3 Typical VLAN Application                                                                    10 4    10 2            CONFIGURATION m            10 5  10 22 Introdu  ction to QVRP  x  t        ee                                             10 5  10 2 2 GVRP Configuration Task 11        2    0  200404  0   00000 ennemi nene 10 6  10 2 3 Typical GVRP Application                       sessi nnn enne 10 7  10 24 GVRP Troubleshooting                              ete coi tee veneto ere ete aee eet eese ede dd 10 8   10 3 DOT1Q TUNNEL CONFIGURATION                 ee seen nn enin nn snnm ann tn nhan                           10 8  10 3 1 Introduction to                     
4.                       12 10   CHAPTER 13 QOS                                              4 42444  4  2                    1  13 1    1337 INTRODUCTIONSTO  QOS Cm 13 1    131 1 QOS Term PE 13 1  13 1 2 Q0S Impleri  ntation    iioii ren et tr tek cen b getan Eo aa 13 2  13 1 3 Basic  QOS  Model  iier oc eot etate                                       13 2   13 2 QoS CONFIGURATION TASK LIST                                         scere cene n nenene nenene nananana nenene nananana nanenane nananana na 13 6  13 3 005                   ML                                                                                          13 10  13 4 005                                     520                                                  13 12  CHAPTER 14 FLOW BASED                                                                                   14 13  14 1 INTRODUCTION TO FLOW BASED REDIRECTION                              14 13  14 2 FLOW BASED REDIRECTION CONFIGURATION TASK SEQUENCE                                  14 13  14 3 FLOW BASED REDIRECTION                                                                   14 14  14 4 FLOW BASED REDIRECTION TROUBLESHOOTING HELP                     eren nnn 14 14  CHAPTER 15 LAYER    MANAGEMENT                                                          15 1  15 1 LAYER    MANAGEMENT INTERFACE               eene nnn nnnm suain aa aas saa          15 1  15 1 1 Introduction to Layer    Management                                          15 1   15 1 
5.                  2     00 0010                                                                                              10 8  10 3 2 Dotiq tunnel Configuration                   00    0  1                                      10 9  10 3 3 Typical Applications of the       16                                          7                     10 10  10 3 4 Dotiq tunnel Troubleshooting                        sse nennen          10 11   10 4 DYNAMIC VLAN CONFIGURATION                  eee ee nennen nennen nennen nnne nnne            nnmnnn nnmnnn nnmnnn nanenane sn nnns 10 11  10 4 1 Introduction to Dynamic                                             10 11  10 4 2 Dynamic VLAN                                                             10 12  10 4 3 Typical Application of the Dynamic              22        2   4  04040000     00000000000 10 14  10 4 4 Dynamic VLAN                                                     10 15   10 5 VOICE VLAN CONFIGURATION                           nnne nnne nnn anna snnm ann              stas ss neun            10 15  10 5 1 Introduction to Voice           2      7                        10 15  10 5 2 Voice VLAN Configuration    eene nennen nnn etre sinn nennen 10 16  10 5 3 Typical Applications of the Voice                           10 16  10 5 4 Voice VLAN Troubleshooting                                         nnne          10 17   CHAPTER 11 MAC TABLE                                                  2    1 1             11 1   11 1 INTRODUCTION 
6.                  7    77                 Handshake request packet  EAP Request Identi    Handshake response packet  EAP Response ldenti  EAPOL     Port unauthorized    port u               Figure 25 12 the Authentication Flow of 802 1x EAP Termination Mode    25 1 7 The Extension and Optimization of 802 1x    Besides supporting the port  based access authentication method specified by the protocol  devices also  extend and optimize it when implementing the EAP relay mode and EAP termination mode of 802  1x     Supports some applications in the case of which one physical port can have more than one users      There are three access control methods  the methods to authenticate users   port based  MAC based  and user based  IP address   MAC address   port        When the port based method is used  as long as the first user of this port passes the authentication   all the other users can access the network resources without being authenticated  However  once  the first user is offline  the network won t be available to all the other users       When the MAC based method is used  all the users accessing a port should be authenticated  separately  only those pass the authentication can access the network  while the others can not   When one user becomes offline  the other users will not be affected       When the user based  IP address  MAC address   port  method is used  all users can access  limited resources before being authenticated  There are two kinds of control in this meth
7.             Switch  Config If Ethernet1 1  sflow counter interval 20              Switch  Config lf Ethernet1 2  sflow counter interval 40       33 4 sFlow Troubleshooting    In configuring and using sFlow  the sFlow server may fail to run properly due to physical connection failure     33 20       wrong configuration  etc  The user should ensure the following     Ensure the physical connection is correct   Guarantee the address of the sFlow analyzer configured under global or port mode is accessible    If traffic sampling is required  the sampling rate of the interface must be configured   If statistic sampling is required  the statistic sampling interval of the interface must be configured    If the examination remains unsolved  please contact with the technical service center of our company     33 21       Chapter 34 SNTP Configuration    34 1 Introduction to SNTP    The Network Time Protocol  NTP  is widely used for clock synchronization for global computers connected to  the Internet  NTP can assess packet sending receiving delay in the network  and estimate the computer   s  clock deviation independently  so as to achieve high accuracy in network computer clocking  In most positions   NTP can provide accuracy from 1 to 50ms according to the characteristics of the synchronization source and  network route    Simple Network Time Protocol  SNTP  is the simplified version of NTP  removing the complex algorithm of  NTP  SNTP is used for hosts who do not require full NTP func
8.       They will be described in detail in the following part     Attention     The switch  as the access controlling unit of Pass through  will not check the content of a particular  EAP method  so can support all the EAP methods above and all the EAP authentication methods  that may be extended in the future    In EAP relay  if any authentication method in EAP MD5  EAP TLS  EAP TTLS and PEAP is  adopted  the authentication methods of the supplicant system and the RADIUS server should be  the same     1  EAP MD5 Authentication Method  EAP MD5 is an IETF open standard which providing the least security  since MD5 Hash function is vulnerable    to dictionary attacks   The following figure illustrated the basic operation flow of the EAP MD5 authentication method     25 7         EAPOL Authenticator EAPOR  Supplicant PAE system PAE RADIUS server  EAPOL Start  EAP Request Identity  RADIUS Access Request  EAP Response ldenti  EAP Response Identity   RADIUS Access Challenge  EAP Request MD5 Challenge  EAP Request MD5 Challenge   RADIUS Access Request  EAP Response MD5 Challenge  EAP Response MD5 Challenge     RADIUS Access Accept  EAP Success  EAP Success        Port authorized    SREE  r Expiry of the handshake  Handshake request packet     Aimer      EAP Request Identity   Handshake response packet   EAP Response Identity   EAPOL Logoff  Hort unauthorized             SM A    Figure 25 9 the Authentication Flow of 802 1x EAP MD5    2  EAP TLS Authentication Method   EAP TLS is brou
9.       interface  lt interface list gt    cpu        3  Specify flow mirror source       Command Explanation  Global Mode       monitor session  lt session gt  source     interface  lt interface list gt   access group  Specifies flow mirror source port and apply    num    rx tx both   rule  the no command deletes flow mirror  no monitor session  lt session gt  source  source port    interface  lt interface list gt   access group               num         32 3 Mirror Examples    The requirement of the configurations is shown as below  to monitor at interface 1 the data frames sent out by  interface 9 and received from interface 7  sent and received by CPU  and the data frames received by  interface 15 and matched by rule 120 The source IP address is 1 2 3 4 and the destination IP address is  5 6 7 8      Configuration guidelines   1  Configure interface 1 to be a mirror destination interface   2  Configure the interface 7 ingress and interface 9 egress to be mirrored source   3  Configure the CPU as one of the source   4  Configure access list 120     5  Configure access 120 to binding interface 15 ingress     Configuration procedure is as follows     Switch config  monitor session 4 destination interface ethernet 1 1  Switch config  monitor session 4 source interface ethernet 1 7 rx    Switch config  monitor session 4 source interface ethernet 1 9 tx    Switch config  access list 120 permit tcp 1 2 3 4 0 0 0 255 5 6 7 8 0 0 0 255                       config  monitor session 4
10.       ipv6 mid snooping vlan  lt              gt   no ipv6 mid snooping vian    vlan id      Enable MLD Snooping on specific VLAN  The  no   form of this command disables MLD Snooping on  specific VLAN        ipv6 mid snooping vlan  lt vian id gt   limit  group  lt g_limit gt    source    s limit      no ipv6 mld snooping vlan    vlan id  limit    Configure the number of the groups in which the MLD  Snooping can join  and the maximum number of  sources in each group  The  no  form of this command  restores to the default        ipv6 mid snooping vlan  lt vian id gt   I2 general querier    ipv6 mid snooping vlan  lt              gt   mrouter port interface  lt interface     name gt    no ipv6 mid snooping vian    vlan id   mrouter port interface    interface           gt     Set the VLAN level 2 general querier  which is  recommended on each segment  The  no  form of this    no ipv6 mld snooping vlan command cancels the level 2 general querier   lt vian id gt  12 general querier configuration     Configure the static mrouter port in specific vlan  The   no  form of this command cancels the mrouter port  configuration        ipv6 mid snooping vlan  lt vian id gt   mrpt  lt value gt    no ipv6 mid snooping vian    vlan id              ipv6 mid snooping vian  lt vian id gt   query interval  lt value gt    no ipv6 mid snooping vlan    vlan id  query interval    Configure the keep alive time of the mrouter port  The     no    form of this command restores to the default     Configu
11.      4 4  1 00                               nnns nnn enne 35 26   35 7 2 System Log Configuration    eee nene 35 28   35 7 3 System Log Configuration                                                                       35 29  CHAPTER 36 RELOAD SWITCH AFTER SPECIFIED TIME                                          36 1  36 1 INTRODUCE TO RELOAD SWITCH AFTER SPECIFID                        44  4  4440  1       36 1  36 2 RELOAD SWITCH AFTER SPECIFID TIME TASK 1157                   4             36 1               re                                          37 1  37 1 INTRODUCTION TO DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY CPU              37 1  37 2 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY CPU TASK LIST                          37 1                                          220050000020                 38 1  38 1 A 1 SWITCH S RJ 45 PIN     5                6                                                                                                                                         38 1  38 2    2 10 100MBPs  10 100                                    2    1                                        38 1   CHAPTER  39  GLOSSAR NY                                    I ka eria Dua x Eua aux va hw i n Va aad a RR a draw YR od a ae 39 1       Chapter 1 INTRODUTION    The PLANET WGSW 50040 is 50 Port 10 100 1000Mbps with 4 Shared SFP Managed Gigabit Switch  It  boasts a high performance switch architecture that is capable of providing non blocki
12.      7 2 Port Loopback Detection Function Configuration Task List    1  Configure the time interval of loopback detection   2  Enable the function of port loopback detection   3  Configure the control method of port loopback detection   4  Display and debug the relevant information of port loopback detection   5  Configure the loopback detection control mode  automatic recovery enabled or not     1  Configure the time interval of loopback detection       Command Explanation  Global Mode                   7 4       loopback detection interval time         Configure the time interval of loopback   lt loopback gt   lt no loopback gt   detection           no loopback detection interval time          2  Enable the function of port loopback detection       Command Explanation       Global Mode       loopback detection specified vlan   lt vian list Enable and disable the function of port  no loopback detection specified vlan loopback detection      lt vian list gt                 3   Configure the control method of port loopback detection       Command Explanation       Global Mode       loopback detection control  shutdown  A Enable and disable the function of port   block  learning   loopback detection control           no loopback detection control          4  Display and debug the relevant information of port loopback detection             Command Explanation  Global Mode   Enable the debug information of the function  debug loopback detection module of port loopback detection  
13.      any source    host source  lt              gt      s port    lt sPort gt    range  lt sPortMin gt   lt sPortMax gt         lt dlpAddr gt   lt dMask gt     any destination     host destination  lt d lpAddr gt     d port    lt dPort gt     range  lt dPortMin gt   lt dPortMax gt       ack fin psh rst urg syn   precedence   prec     tos    tos    time range  lt time range name gt      TCP  extended IP access rule  if the    Creates a numbered  numbered extended access list of  specified number does not exist   then an access list will be created  using this number        access list   num    deny   permit  udp    lt s pAdadr gt    lt sMask gt     any source    host source  lt              gt      s port    lt sPort gt    range  lt sPortMin gt   lt sPortMax gt         lt dlpAddr gt   lt dMask gt     any destination     host destination  lt d ipAddr gt     d port    lt dPort gt     range  lt dPortMin gt   lt dPortMax gt      precedence    prec     tos  lt tos gt   time range lt time range name gt      UDP  extended IP access rule  if the    Creates a numbered  numbered extended access list of  specified number does not exist   then an access list will be created  using this number           access list  lt num gt   deny   permit   eigrp   gre   igrp                          ospf    lt protocol num gt      lt slpAddr gt    lt sMask gt     any source    host source  lt              gt          Creates a numbered IP extended  IP access rule for other specific IP  protocol or all 
14.      f Set the interval of the interface to send neighbor  ipv6 nd ns interval  lt seconds gt       query message  The NO command resumes  no ipv6 nd ns interval             default value  1 second          3  Enable and disable router advertisement                      Command Explanation  Interface Configuration Mode  ipv6 nd suppress ra Forbid IPv6 Router Advertisement  The NO  no ipv6 nd suppress ra command enables IPv6 router advertisement         4  Configure Router Lifespan       Command Explanation          Interface Configuration Mode          15 3             ipv6 nd ra lifetime  lt seconds gt   no ipv6 nd ra lifetime          Configure Router advertisement Lifespan  The  NO command resumes default value  1800  seconds          5  Configure router advertisement Minimum Interval       Command    Description       Interface Configuration Mode                         Tuer    d Configure the minimum interval for router  ipv6 nd min ra interval   seconds  29  UNUS 2 E Na Z   advertisement  The NO command resumes  no ipv6 nd min ra interva     default value  200 seconds     6  Configure router advertisement Maximum Interval  Command Explanation   Interface Configuration Mode     Configure       maximum interval for router  ipv6 nd max ra interval  lt seconds gt    advertisement  The NO command resumes    no ipv6 nd max ra interval          default value  600 seconds          7  Configure prefix advertisement parameters       Command    Explanation       Interface Configur
15.      unauthorized TCP labels        28 2 3 Anti Port Cheat Function Configuration Task Sequence    1  Enable the anti port cheat function       Command Explanation       Global Mode   no  dosattack check  srcport equal dstport enable       Enable disable the prevent port cheat function        Enable disable checking IPv4 fragment  This  command has no effect when used separately   but if this function is not enabled  the switch will  not drop the IPv4 fragment packet whose    dosattack check ipv4 first fragment  enable             source port is equal to its destination port        28 2 4 Prevent TCP Fragment Attack Function Configuration    Task Sequence    1   Enable the prevent TCP fragment attack function  2   Configure the minimum permitted TCP head length of the packet                         Command Explanation   Global Mode    no  dosattack check tcp fragment Enable disable the prevent TCP fragment   enable attack function   Configure the minimum permitted TCP head  length of the packet  This command has no   dosattack check tcp header   size   effect when used separately  the user should  enable the dosattack check tcp fragment  enable        28 2       28 2 5 Prevent ICMP Fragment Attack Function Configuration  Task Sequence    1  Enable the prevent ICMP fragment attack function  2  Configure the max permitted ICMPv4 net load length  3  Configure the max permitted ICMPv6 net load length             Command Explanation  Global Mode   no  dosattack check icmp attackin
16.     command shuts down FTP server and prevents  no ftp server enable             FTP user from logging in         2  Configure FTP login username and password       Command Explanation  Global Mode    ip ftp username   username     nopassword   password  0   7        Configure FTP login username and password     this no command will delete the username and   lt password gt   password             no ip ftp username lt username gt         3  Modify FTP server connection idle time       Command Explanation       Global Mode  ftp server timeout  lt seconds gt  Set connection idle time                 3  TFTP server configuration   1  Start TFTP server       Command Explanation       Global Mode       Start TFTP server  the no command shuts down  tftp server enable  TFTP server and prevents TFTP user from    no tftp server enable s  logging in                  2  Modify TFTP server connection idle time                Command Explanation       4 19          Global Mode       tftp server retransmission timeout   Set maximum retransmission time within timeout              lt seconds gt  interval         3  Modify TFTP server connection retransmission time       Command Explanation       Global Mode       tftp server retransmission number 5   Set the retransmission time for TFTP server    lt number gt                 4 5 3 3 FTP TFTP Configuration Examples    It is the same configuration switch for IPv4 addresses and IPv6 addresses  The example only for the IPv4    addresses configura
17.     this topology is defined as QoS Domain   CoS  Class of Service  the classification information carried by Layer 2 802 1Q frames  taking 3 bits of the Tag  field in frame header  is called user priority level in the range of 0 to 7     Layer 2 802 1Q P Frame       Preamble Start frame DA SA PT   Data  FCS  delimiter    3 bits used for CoS  user priority     Figure 13 1 CoS priority  ToS  Type of Service  a one byte field carried in Layer 3 IPv4 packet header to symbolize the service type of  IP packets  Among ToS field can be IP Precedence value or DSCP value     Layer 3 IPv4 Packet    Version  te               46974       pans precedence or DSCP    Figure 13 2 ToS priority  IP Precedence  IP priority  Classification information carried in Layer 3 IP packet header  occupying 3 bits  in  the range of 0 to 7   DSCP  Differentiated Services Code Point  classification information carried in Layer 3 IP packet header     occupying 6 bits  in the range of 0 to 63  and is downward compatible with IP Precedence   MPLS TC EXP         13 1       A field of the MPLS packets means the service class  there are 3 bits  the ranging from 0 to 7    Internal Priority  The internal priority setting of the switch chip  it   s valid range relates with the chip  it   s  shortening is Int Prio or IntP      Drop Precedence  When processing the packets  firstly drop the packets with the bigger drop precedence   the ranging is 0 2 in three color algorithm  the ranging is 0 1 in dual color algorithm 
18.    2  Manual configuration       Command Explanation                VLAN Port Mode       4 5          ip address  lt ip_address gt   lt mask gt    secondary    no ip address  lt ip_address gt   lt mask gt    secondary     Configure the VLAN interface IP address  the    no  ip address   ip address     mask    secondary    command deletes VLAN interface IP address           ipv6 address   ipv6 address    prefix length gt   eui 64    no ipv6 address   ipv6 address    prefix length gt        Configure IPv6 address  including aggregation global  unicast address  local site address and local link  address  The no form command deletes IPv6  address          BOOTP configuration       Command    Explanation       VLAN Port Mode          ip bootp client enable  no ip bootp client enable       Enable the switch to be a BootP client and obtain IP  address and gateway address through BootP  negotiation  the  no ip bootp client enable   command disables the BootP client function          DHCP configuration       Command    Explanation       VLAN Port Mode          ip bootp client enable  no ip bootp client enable       Enable the switch to be a DHCP client and obtain IP  address and gateway address through DHCP  negotiation  the  no ip bootp client enable   command disables the DHCP client function        4 4 SNMP Configuration    4 4 1 Introduction to SNMP    SNMP  Simple Network Management Protocol  is a standard network management protocol widely used in  computer network management  SN
19.    24 4  24 2 ACL CONFIGURATION TASK   9                               esee nenne enne                   nnnm n nnn than sta sani      24 5  24 3 ACL EXAMPLE recits daore                                                   24 18  24 4 ACL TROUBLESHOOTING     ssccesceesseeeesseeenseeeeenesesneeenseeeenseeesnaesasneeenseaeeeaeseseaesaseaeenseaeseaeseseaeenseaeeeaees 24 22  CHAPTER 25 802 1X CONFIGURATION 3 sisiscscricccescricesenerewecescrecedesctewedeneseweceneveneseocvected 25 1  25 1 INTRODUCTION TO 802 1 X           ec eae cce                      ee eater die        25 1  25 1 1 The Authentication Structure     802                  nnns 25 1  25 1 2 The Work Mechanism     802                       25 3  25 1 3 The Encapsulation of EAPOL                                                                     25 3  25 1 4 The Encapsulation of EAP Attributes                    2  4        0   1   25 5  25 1 5 Web Authentication Proxy based on 802  1                     008          25 5  25 1 6 The Authentication Methods     802                                  25 6  25 1 7 The Extension and Optimization     802  1                    25 11  25 1 8 The Features of VLAN Allocation                     sess 25 12  25 2 802 1X CONFIGURATION TASK 115                                                    25 13  25 3 802 1X APPLICATION                                               25 16  25 3 1 Examples of Guest Vlan Applications              40 20222       0 0 0000000        25 16  25 3 2 Ex
20.    32 15  32 2 MIRROR CONFIGURATION TASK   15                                     nn nana nasa                                                 32 15    32 3 Lies DP                                                                         32 16    32 4 DEVICE MIRROR                5                                   2        4    8                  32 17  CHAPTER 33 SFLOW                                                442 2    100422221122           33 18  33 1 INTRODUCTION TO 5         0                               33 18  33 2 SFLOW CONFIGURATION TASK 115                                           33 18    3 3                             ED 33 20  33 4 SFLOW TROUBLESHOOTING                                                  sme sr                33 20  CHAPTER 34 SNTP CONFIGURATION                             euer rere eene nnn n nnn nena nana nasa anas nnn 34 22  34 1 INTROD  CTI  ON TO SNT P  aieeao c                            34 22  34 2 TYPICAL EXAMPLES OF SNTP CONFIGURATION                                           34 23  CHAPTER 35 MONITOR AND                               2222      22222 2 2          35 24  SLM cmm ERE 35 24  35 2  PINGG oxx                                               35 24  35 3 TRACEROUTE         vtec            wales        STR PEN See ere hited 35 24  BDA TRACEROUTE O EP          35 24  BOS           EE 35 25  CLAG DIA  i  e C                                          35 26  35 7 SVSTEMILOG EE LI A E E TT 35 26  35 7 1 System Log Introduction      
21.    5  Configuring a numbered standard MAC access list    6  Configuring a numbered extended MAC access list    7  Configuring a extended MAC access list based on nomenclature  a  Create a extensive MAC access list based on nomenclature  b  Specify multiple  permit  or  deny  rule entries       Exit ACL Configuration Mode    8  Configuring a numbered extended MAC IP access list    9  Configuring a extended MAC IP access list based on nomenclature  a  Create a extensive MAC IP access list based on nomenclature  b  Specify multiple  permit  or  deny  rule entries    Exit MAC IP Configuration Mode  Configuring a numbered standard IPV6 access list         10   11  Configuring a standard IPV6 access list based on nomenclature          a  Create a standard IPV6 access list based on nomenclature  b  Specify multiple permit or deny rule entries      Exit ACL Configuration Mode   2  Configuring the packet filtering function    2  Enable global packet filtering function    3  Configure default action   3  Configuring time range function    4  Create the name of the time range    b  Configure periodic time range    6  Configure absolute time range  4  Bind access list to a incoming direction of the specified port  5  Clear the filtering information of the specified port    1  Configuring access list   1  Configuring a numbered standard IP access list             Command Explanation          24 5          Global Mode          access list   num    deny   permit     lt slpAddr gt    lt sMas
22.    Configure instance parameters  Configure MSTP region parameters  Configure MSTP time parameters    Configure the fast migrate feature for MSTP    Configure the format of port packet    Configure the snooping attribute of authentication key    Configure the FLUSH mode once topology changes    1  Enable MSTP and set the running mode       Command    Explanation       Global Mode and Port Mode       spanning tree  no spanning tree    Enable Disable MSTP        Global Mode       spanning tree mode  mstp stp rstp   no spanning tree mode    Set MSTP running mode        Port Mode          spanning tree mcheck       Force port migrate to run under MSTP        12 3       2  Configure instance parameters    Command    Explanation       Global Mode       spanning tree mst  lt instance id gt  priority   lt bridge priority gt    no spanning tree mst  lt instance id gt   priority    Set bridge priority for specified instance        spanning tree priority  lt bridge priority gt   no spanning tree priority    Configure the spanning tree priority of the  switch        Port Mode       spanning tree mst   instance id   cost   lt cost gt   no spanning tree mst  lt instance id gt  cost    Set port path cost for specified instance        spanning tree mst   instance id    port priority  lt port priority gt    no spanning tree mst  lt instance id gt   port priority    Set port priority for specified instance           spanning tree mst  lt instance id gt   rootguard   no spanning tree mst  lt in
23.    exit   Switch config  radius server authentication host 10 1 1 3  Switch config  radius server accounting host 10 1 1 3  Switch config  radius server key test    Switch config  aaa accounting enable  Switch config  dot1x enable  Switch config  interface ethernet 1 2  Switch Config lf Ethernet1 2  dot1x enable  Switch Config If Ethernet1 2  dot1x port control auto  Switch Config lf Ethernet1 2  exit                             Switch config  aaa enable                          25 19       25 3 3 Examples of IPv6 Radius Application    2004 1 2 3  2  2004 1 2 3  1 Radius Server  2004 1 2 3  3    Figure 25 17 IPv6 Radius    Connect the computer to the interface 1 2 of the switch  and enable IEEE802 1x on interface1 2  Use MAC  based authentication  Configure the IP address of the switch as 2004 1 2 3  2  and connect the switch with  any interface except interface 1 2 to the RADIUS authentication server  Configure the IP address of the  RADIUS server to be 2004 1 2 3  3  Use the default ports 1812 and 1813 for authentication and accounting  respectively  Install the IEEE802 1x authentication client software on the computer  and use the client for  IEEE802 1x authentication    The detailed configurations are listed as below     Switch config  interface vlan 1   Switch Config if vian1  ipv6 address 2004 1 2 3  2 64  Switch Config if vlan1   exit   Switch config  radius server authentication host 2004 1 2 3  3  Switch config  radius server accounting host 2004 1 2 3  3  Switch con
24.   Configure trusted ports     Configure trusted          Configure automatic recovery time                nm          Display relative information of debug information and ARP scanning    1  Enable the ARP Scanning Prevention function        Command Explanation                Global configuration mode       16 1          anti arpscan enable       no anti arpscan enable    Enable or disable the ARP Scanning       Prevention function globally        2  Configure the threshold of the port based and IP based ARP Scanning Prevention       Command    Explanation       Global configuration mode       anti arpscan port based threshold   lt threshold value gt    no anti arpscan port based  threshold    Set the threshold of the port based  ARP Scanning Prevention        anti arpscan ip based threshold   lt threshold value gt   no anti arpscan ip based threshold       Set the threshold of the IP based ARP  Scanning Prevention           3  Configure trusted ports       Command    Explanation       Port configuration mode       anti arpscan trust   port    supertrust port gt   no anti arpscan trust   port         supertrust port gt     Set the trust attributes of the ports           4  Configure trusted IP       Command    Explanation       Global configuration mode       anti arpscan trust ip   ip address      lt netmask gt          anti arpscan trust ip  lt ip address gt     lt                gt         Set the trust attributes of IP           5  Configure automatic recovery time       
25.   DHCP option 82 is aimed at  strengthening the security of DHCP servers and improving the IP address configuration policy  Switch obtain  DHCP request packets include DHCPDISCOVER  DHCPREQUEST  DHCPINFORM and DHCPRELEASE    DHCP SNOOPING is addesd to option 82 by request packets  including the client s physical access port  the  access device ID and other information   to the DHCP request message from the client then forwards the  message to DHCP server  When the DHCP server which supports the option 82 function receives the  message  it will allocate an IP address and other configuration information for the client according to  preconfigured policies and the option 82 information in the message  At the same time  DHCP server can  identify all the possible DHCP attack messages according to the information in option 82 and defend against  them  DHCP SNOOPING will peel the option 82 from the reply messages it receives  and forward the reply  message to the specified port of the network access device  The application of DHCP option 82 is transparent  for the client     20 1 1 DHCP option 82 Message Structure    ADHCP message can have several option segments  option 82 is one of them  It has to be placed after other  options but before option 255  The following is its format     Code Len Agent Information Field                  4       4       4                                   8 amp 2        il   i2          i4     iN    4                       4       4       4       a      C
26.   Switch Config Vlan100  exit  Switch config  vlan 200          Switch Config Vlan200  switchport interface ethernet 1 8 10  Switch Config Vlan200  exit   Switch config  interface ethernet 1 11  Switch Config lf Ethernet1 11  switchport mode trunk  Switch Config lf Ethernet1 11  exit   Switch config         Switch B        Switch config  vlan 2       Switch Config Vlan2  switchport interface ethernet 1 2 4  Switch Config Vlan2 ztexit  Switch config  vlan 100  Switch Config Vlan100  switchport interface ethernet 1 5 7  Switch Config Vlan100  exit  Switch config  vlan 200  Switch Config Vlan200  switchport interface ethernet 1 8 10  Switch Config Vlan200  exit  Switch config  interface ethernet 1 11  Switch Config lf Ethernet1 11  switchport mode trunk  Switch Config lf Ethernet1 11  exit    10 2 GVRP Configuration    10 2 1 Introduction to GVRP    GARP  Generic Attribute Registration Protocol  can be used to dynamically distribute  populate and register  property information between switch members within a switch network  the property can be VLAN information   Multicast MAC address of the other information  As a matter of fact  GARP protocol can convey multiple  property features the switch need to populate  Various GARP applications are defined on the basis of GARP   which are called GARP application entities  and GVRP is one of them    GVRP  GARP VLAN Registration Protocol  is an application based on GARP working mechanism  It is  responsible for the maintenance of dynamic V
27.   Without removing power cable  the device will still consuming power from the power source  In the view of  Saving the Energy and reduce the unnecessary power consuming  it is strongly suggested to remove the  power connection for the device if this device is not intended to be active     Revision    PLANET 50 Port 10 100 1000Mbps with 4 Shared SFP Managed Gigabit Switch User s Manual  FOR MODEL  WGSW 50040   REVISION  1 0  AUGUST 2010    Part No  EM WGSW 50040  2081 A93200 000     CHAPTER TINTRODU TION                                                                    1 1  TeV PACKET CONTENTS         essi E clc accu deat atau          1 1  1 2 PRODUCT DESCRIPTION          5                                              1 1  1 3  PRODUCT FEATURES rn eene a deus d dua dien eden ak 1 3  1 4 PRODUCT SPECIFICATION n                                                     1 2   CHAPTER 2 INSTALLATION    ecco ccce              cocco co eee ere               cce ere ccce c 2 1  2 1 HARDWARE   DESCRIPTION 2 52  s       2 1   231 1 Switch  Front Panel  diee eee iode dice bea Header hah D edu Le T 2 1  2122 LED Indications rct Rh ree tt Pee Pare E RE REP reno toe 2 2  2423 Switch Rear         Hr Terre emet ep eto er M eerie 2 8  2 2 INSTALL THE SWITCH                       teeth                                                    2 4  2 21 Desktop Installation    rere nette e                     2 4  2 2 2  Hack Mounting      utei te ee hte e e e ebd id tea ette nde 2 5  2 2 3 Installing th
28.   lt ip addr gt                     switch through Telnet  the      command deletes  no authentication securityip  lt ip addr gt     the authorized Telnet secure address        SN UA 3 Configure the secure IPv6 address to login to the  authentication securityipv6  lt ipv6 addr gt   e Ks    switch through Telnet  the no command deletes  no authentication securityipv6  lt ipv6 addr gt              the authorized Telnet secure address        4 2          authentication ip access class    lt num std gt   lt name gt    no authentication ip access class    Binding standard IP ACL protocol to login with  Telnet SSH Web  the no form command will  cancel the binding ACL        authentication ipv6 access class    lt num std gt   lt name gt    no authentication ipv6 access class    Binding standard IPv6 ACL protocol to login with  Telnet SSH Web  the no form command will  cancel the binding ACL        authentication line  console   vty   web  login   local   radius   tacacs     no authentication line  console   vty   web   login    Configure telnet authentication mode        Admin Mode       terminal monitor  terminal no monitor       Display debug information for Telnet client login to  the switch  the no command disables the debug  information           2  Telnet to a remote host from the switch       Command    Explanation       Admin Mode    telnet   lt  p addr gt      ipv6 addr     host    hostname      lt port gt         Login to a remote host with the Telnet client  included in t
29.   packet   Set DSCP TOS  Set DSCP or TOS field of the  packet       Enter Scheduling    Figure 13 5 Policing and Remarking process    Queuing and scheduling  There are the internal priority and the drop precedence for the egress packets  the  queuing operation assigns the packets to different priority queues according to the internal priority  while the  scheduling operation perform the packet forwarding according to the priority queue weight and the drop  precedence  The following flowchart describes the operations during queuing and scheduling     13 5          Remark DSCF and 12 cos  fields of the packet  according to  Int Prio to DSCP  Int Prio to COS  mapping   1                  Remark EIP field of the  packet according to  Int Prio to EIP mapping          Select queue according  to IntPrio to Queue    mapping    Queue Number    Read the buffer value  according to the queue  remove algorithm  the  packet drop priority  and the egress queue              buffer available    Place packet into  specified queue  and  forward according to    the weight priority of  the queues    Drop packet       Figure 13 6 Queuing and Scheduling process    13 2 QoS Configuration Task List    1  Configure class          Set up a classification rule according to ACL  CoS  VLAN ID  IPv4 Precedent  DSCP  IPV6 FL to classify  the data stream  Different classes of data streams will be processed with different policies    2  Configure a policy map   After data steam classification  a policy map ca
30.   ping requests from outside network should be disabled   Configuration description    1  Create the corresponding access list    2  Configure datagram filtering    3  Bind the ACL to the related interface     24 19       The configuration steps are listed as below     Switch config  access list 3110 deny 00 12 11 23 00 00 00 00 00 00 ff ff any destination mac tcp 10 0 0 0  0 0 0 255 any destination d port 21   Switch config  access list 3110 deny any source mac 00 12 11 23 00 00 00 00 00 00 ff ff icmp any source  10 0 0 0 0 0 0 255    Switch config  firewall enable   Switch config  firewall default permit  Switch config  interface ethernet 1 10  Switch Config If Ethernet1 10  mac ip access group 3110 in  Switch Config Ethernet1 10  exit   Switch config  exit       Configuration result        Switch show firewall  Firewall Status  Enable     Firewall Default Rule  Permit     Switch show access lists  access list 3110 used 1 time s    access list 3110 deny 00 12 11 23 00 00 00 00 00 00 ft ff  any destination  mac  tcp 10 0 0 0 0 0 0 255 any destination d port 21  access list 3110 deny any source mac 00 12 11 23 00 00 00 00 00 00 ff ff icmp any source 10 0 0 0  0 0 0 255    Switch  show access group interface ethernet 1 10  interface name Ethernet1 10    MAC IP Ingress access list used is 3110  traffic statistics Disable        Scenario 4   The configuration requirement is stated as below  IPv6 protocol runs on the interface 600 of the switch  And  the IPv6 network address is 2
31.   snmp server securityip disable          Enable or disable secure IP address check function  on the NMS        4  Configure engine ID       Command    Explanation       Global Mode       snmp server engineid  lt engine string gt   no snmp server engineid          Configure user    Command    Configure the local engine ID on the switch  This  command is used for SNMP v3     Explanation       Global Mode         authPriv   authNoPriv  auth  md5   sha    lt word gt    access   lt num std gt   lt name gt      ipv6 access   lt ipv6 num std gt   lt ipv6 name gt     no snmp server user  lt user string gt   access    lt num std gt   lt name gt     ipv6 access         lt ipv6 num std gt   lt ipv6 name gt       snmp server user   use string    lt group string gt     Add a user to a SNMP group  This command is  used to configure USM for SNMP v3           6  Configure group       Command    Explanation       Global Mode       snmp server group   group string     noauthnopriv authnopriv authpriv    read    read string     write   write string     notify    notify string      access    lt num std gt   lt name gt     ipv6 access    lt ipv6 num std gt   lt ipv6 name gt      no snmp server group   group string     noauthnopriv authnopriv authpriv    access   lt num std gt   lt name gt      ipv6 access          Set the group information on the switch  This  command is used to configure VACM for SNMP v3        4 10                              lt ipv6 num std gt   lt ipv6 name gt          7  C
32.   study function on all ports of VLAN  otherwise  the port can continue its study   except special ports     26 2 The Number Limitation Function of Port  MAC in VLAN    Configuration Task Sequence    1  Enable the number limitation function of MAC on ports  2  Enable the number limitation function of MAC in VLAN    26 1    1     2     3                       3  Configure the timeout value of querying dynamic         4  Display and debug the relative information of number limitation of MAC on ports    Enable the number limitation function of MAC  gt  IP on ports    Explanation       Port configuration mode          switchport mac address dynamic  maximum   value     no switchport mac address dynamic  maximum       Enable and disable the number limitation  function of MAC on the ports        Enable the number limitation function of MAC  gt  IP in VLAN       Command    Explanation       VLAN configuration mode          vlan mac address dynamic maximum    value     no vlan mac address dynamic  maximum       Enable and disable the number limitation  function of MAC in the VLAN        Configure the timeout value of querying dynamic MAC        Command    Explanation       Global configuration mode          mac address query timeout   seconds         Configure the timeout value of querying  dynamic MAC        4   Display and debug the relative information of number limitation of MAC on ports       Command    Explanation       Admin mode       show mac address dynamic count  vlan    v
33.   the secondary port is  used to receive Hello packet sending from primary node  When the Ethernet is in health state  the  secondary port of primary node blocks other data in logical and only MRPP packet can pass  When the  Ethernet is in break state  the secondary port of primary node releases block state  and forwards data  packets   There are no difference on function between Primary port and secondary port of transfer node   The role of port is determined by user configuration  As shown Fig 31 1  Switch A E1 is primary port  E2 is  secondary port     5  Timer  The two timers are used when the primary node sends and receives MRPP protocol packet  Hello timer and  Fail Timer   Hello timer  define timer of time interval of health examine packet sending by primary node primary port   Fail timer  define timer of overtime interval of health examine packet receiving by primary node primary port   The value of Fail timer must be more than or equal to the 3 times of value of Hello timer     31 1 2 MRPP Protocol Packet Types       Packet Type Explanation       Hello packet  Health examine packet  Hello   The primary port of primary node evokes to detect ring  if the  secondary port of primary node can receive Hello packet in    configured overtime  so the ring is normal        LINK DOWN  link Down event packet  After transfer node detects Down event on port  immediately  sends LINK DOWN packet to primary node  and inform primary    node ring to fail        LINK DOWN FLUSH FDB pack
34.   time range  lt time range name gt   access rule   c  Exit extended IP ACL configuration mode  Command Explanation       Extended IP ACL Mode          exit       Exits extended name based  IP ACL configuration mode         5  Configuring a numbered standard MAC access list       Command    Explanation       Global Mode          access list lt num gt  deny permit  any source mac  ho  st source mac lt host_smac gt     lt smac gt  lt smac mask gt           no access list  lt num gt        Creates a numbered standard  MAC the  access list exists     access list  if  already  then a rule will add to the  current access list  the    no  access list     lt        gt     command deletes a          numbered standard MAC  access list    6  Creates a numbered MAC extended access list  Command Explanation       Global Mode          access listenum    deny permit   any source mac    host source mac lt host_smac gt     lt smac gt  lt smac ma  sk gt    any destination mac  host destination mac lt h  ost_dmac gt     lt dmac gt  lt dmac mask gt     untagged eth  2 tagged eth2 untagged 802 3 tagged 802 3     no access list   num         Creates a numbered MAC  if the  exists     extended access list   access list already  then a rule will add to the  current access list  the    no  access list     lt        gt     command deletes a                   numbered MAC extended  access list    7  Configuring a extended MAC access list based on nomenclature  a  Create a extensive MAC access list base
35.  1 128 251    from the host and verify the result   check for reasons if ping failed     The IP address configuration commands for VLAN1 interface are listed below  Before in band management   the switch must be configured with an IP address by out of band management  i e  Console mode   the  configuration commands are as follows  All switch configuration prompts are assumed to be    Switch     hereafter if not otherwise specified      Switch config  interface vlan 1  Switch Config if Vlan1  ip address 10 1 128 251 255 255 255 0  Switch Config if Vlan1  no shutdown       To enable the Telnet Server function  users should type the CLI command telnet server enable in the global  mode as below     Switch config   telnet server enable          Step 2  Run Telnet Client program   Run Telnet client program included in Windows with the specified Telnet target     Type the name of a program  folder  document  or  Internet resource  and Windows will open it For you     Open    telnet 10 1 128 251        Figure 3 7 Run telnet client program included in Windows    Step 3  Login to the switch    Login to the Telnet configuration interface  Valid login name and password are required  otherwise the switch  will reject Telnet access  This is a method to protect the switch from unauthorized access  As a result  when  Telnet is enabled for configuring and managing the switch  username and password for authorized Telnet  users must be configured with the following command     username   userna
36.  2 4           S 77798 ers  bag o   Tony         Figure 2 4 Place the Managed Switch on the desktop    Step3  Keep enough ventilation space between the Managed Switch and the surrounding objects        When choosing a location  please keep in mind the environmental restrictions discussed in  Chapter 1  Section 4  and Specification           Step4  Connect the Managed Switch to network devices   Connect one end of a standard network cable to the 10 100 1000 RJ 45 ports on the front of the  Managed Switch  Connect the other end of the cable to the network devices such as printer servers  workstations or  routers   etc        Connection to the Managed Switch requires UTP Category 5 network cabling with RJ 45  tips  For more information  please see the Cabling Specification in Appendix A           2 4       Step5  Supply power to the Managed Switch   Connect one end of the power cable to the Managed Switch   Connect the power plug of the power cable to a standard wall outlet   When the Managed Switch receives power  the Power LED should remain solid Green     2 2 2 Rack Mounting    To install the Managed Switch in a 19 inch standard rack  please follows the instructions described below    Step1  Place the Managed Switch on a hard flat surface  with the front panel positioned towards the front  side    Step2  Attach the rack mount bracket to each side of the Managed Switch with supplied screws attached to  the package  Figure 2 5 shows how to attach brackets to one side of the Man
37.  20 40 80 160 320 640  1280           mis qos queue  lt queue id gt  bandwidth   lt minimum bandwidth gt      lt maximum bandwidth gt        no mls qos queue  lt queue id gt  bandwidth    Set bandwidth guarantee based a port        5  Configure QoS mapping       Command    Explanation       Global Mode          mls qos map  cos dp  lt dp1   dp8 gt    dscp dscp      in dscp list   to  lt out dscp gt    dscp intp      in dscp list gt  to  lt intp gt    dscp dp   in dscp list gt     to   dp      no mls qos map  cos dp   dscp dscp      dscp intp   dscp dp     Set the priority mapping for QoS  the  no command restores the default    mapping value           13 9                   mls qos map intp dscp  lt dscp1  dscp8 gt   no mls qos map intp dscp                6  Clear accounting data of the specific ports or VLANs       Command Explanation       Interface Mode  Clear accounting data of the specified             clear mls qos statistics  interface ports or VLAN Policy Map  If there are no   lt interface name gt    vlan  lt               gt   parameters  clear accounting data of all  policy map        7  Show configuration of QoS        Command Explanation       Interface Mode       show mls qos maps  cos dp  dscp dscp   Display the configuration of QoS mapping   dscp intp   dscp dp   intp dscp     Display the classified map information of  show class map    class map name                     QoS         Display the policy map information of  show policy map   lt policy map name g
38.  5 build 6 for WinSock ready      331 User name okay  need password    230 User logged in  proceed    200 PORT Command successful    recv total   1526037   write ok   150 Opening ASCII mode data connection for nos img  1526037 bytes         226 Transfer complete         f the switch is upgrading system file or system start up file through FTP  the switch must not be  restarted until  close ftp client  or  226 Transfer complete   is displayed  indicating upgrade is  successful  otherwise the switch may be rendered unable to start  If the system file and system start up  file upgrade through FTP fails  please try to upgrade again or use the BootROM mode to upgrade     4 5 3 4 2 TFTP Troubleshooting    4 23       When upload download system file with TFTP protocol  the connectivity of the link must be ensured  i e   use  the    Ping    command to verify the connectivity between the TFTP client and server before running the TFTP  program  If ping fails  you will need to check for appropriate troubleshooting information to recover the link    connectivity     W The following is the message displays when files are successfully transferred  Otherwise  please verify  link connectivity and retry    copy    command again     nos img file length   1526021  read file ok    begin to send file  wait     file transfers complete   Close tftp client        W The following is the message displays when files are successfully received  Otherwise  please verify  link connectivity and retry    cop
39.  B and Root is blocked and  one port on Bridge D is blocked     12 1 1 1 Operations within an MSTP Region    The IST connects all the MSTP bridges in a region  When the IST converges  the root of the IST becomes the  IST master  which is the switch within the region with the lowest bridge ID and path cost to the CST root  The  IST master is also the CST root if there is only one region within the network  If the CST root is outside the  region  one of the MSTP bridges at the boundary of the region is selected as the IST master    When an MSTP bridge initializes  it sends BPDUs claiming itself as the root of the CST and the IST master   with both of the path costs to the CST root and to the IST master set to zero  The bridge also initializes all of  its MST instances and claims to be the root for all of them  If the bridge receives superior MST root information   lower bridge ID  lower path cost  and so forth  than currently stored for the port  it relinquishes its claim as the  IST master    Within a MST region  the IST is the only spanning tree instance that sends and receives BPDUs  Because the  MST BPDU carries information for all instances  the number of BPDUs that need to be processed by a switch    to support multiple spanning tree instances is significantly reduced   All MST instances within the same region share the same protocol timers  but each MST instance has its own  topology parameters  such as root switch ID  root path cost  and so forth     12 1 1 2 Operations
40.  Chapter 14 Flow based Redirection    14 1 Introduction to Flow based Redirection    Flow based redirection function enables the switch to transmit the data frames meeting some special  condition  specified by ACL  to another specified port  The fames meeting a same special condition are called  a class of flow  the ingress port of the data frame is called the source port of redirection  and the specified  egress port is called the destination port of redirection  Usually there are two kinds of application of  flow based redirection  1  connecting a protocol analyzer  for example  Sniffer  or a RMON monitor to the  destination port of redirection  to monitor and manage the network  and diagnose the problems in the network     2  Special transmission policy for a special type of data frames    The switch can only designate a single destination port of redirection for a same class of flow within a source  port of redirection  while it can designate different destination ports of redirection for different classes of flows  within a source port of redirection  The same class of flow can be applied to different source ports     14 2 Flow based Redirection Configuration Task Sequence    1  Flow based redirection configuration  2   Check the current flow based redirection configuration    1  Flow based redirection configuration       Command Explanation       Physical Interface Configuration Mode       Specify flow based redirection    access group  lt ac name gt  redirect to interf
41.  Configure the query robustness  The  no ip  igmp snooping vlan   vlan id   query robustness  command restores to the    default value        ip igmp snooping vlan  lt vlan id gt   suppression query time  lt value gt   no ip igmp snooping vlan  lt vian id gt   suppression query time    ip igmp snooping vlan  lt              static group  lt A B C D gt   source    A B C D    interface  ethernet    port channel   lt             gt    no ip igmp snooping vlan   v an id   static group   A B C D    source    A B C D    interface  ethernet    port channel   lt  FNAME gt     Configure the suppression query time  The   no ip igmp snooping vlan   vlan id   suppression query time  command restores  to the default value     Configure static group on specified port of the  VLAN  The no form of the command cancels  this configuration           ip igmp snooping vlan   v an id  report    source address  lt A B C D gt   no ip igmp snooping vlan  lt vlan id gt   report source address       Configure forwarding IGMP packet source  address  the no operation cancels the packet  source address        21 20          21 3 3 IGMP Snooping Examples    Scenario 1  IGMP Snooping function       6        Multicast router  Multicast Server 1 Multicast Server 2  Multicast port              cur Snooping    Group 1 Group 1 Group 1 Group 2    Figure 21 1 Enabling IGMP Snooping function    Example  As shown in the above figure  a VLAN 100 is configured in the switch and includes ports 1  2  6  10  and 12  Four
42.  Configuring MRPP ring  you   d better disconnected the ring  and wait for each switch configuration   then open the ring    When the MRPP ring of enabled switch is disabled on MRPP ring  it ensures the ring of the MRPP  ring has been disconnected    When there is broadcast storm on MRPP ring  it disconnects the ring firstly  and ensures if each  switch MRPP ring configuration on the ring is correct or not  if correct  restores the ring  and then  observes the ring is normal or not    In normal configuration  it still forms ring broadcast storm or ring block  please open debug function  of primary node           and used show          statistics command to observe states of primary  node and transfer node and statistics information is normal or not  and then sends results to our  Technology Service Center     31 14       Chapter 32 Mirror Configuration    32 1 Introduction to Mirror    Mirror functions include port mirror function  CPU mirror function  flow mirror function    Port mirror refers to the duplication of data frames sent received on a port to another port  The duplicated port  is referred to as mirror source port and the duplicating port is referred to as mirror destination port  A protocol  analyzer  such as Sniffer  or a RMON monitor will be connected at mirror destination port to monitor and  manage the network  and diagnose the problems in the network    CPU mirror function means that the switch exactly copies the data frames received or sent by the CPU to a  
43.  Explanation       VLAN mode       private vlan  primary   isolated    community           no private vlan    Configure current VLAN to Private VLAN   The no command deletes private VLAN        9  Set Private VLAN association       Command    Explanation       VLAN mode       private vlan association    secondary vlan list    no private vlan association          Set delete Private VLAN association        10 3                      10 1 3 Typical VLAN Application    Scenario     Switch A    Switch B    Workstatio       Figure 10 2 Typical VLAN Application Topology    The existing LAN is required to be partitioned to 3 VLANs due to security and application requirements  The  three VLANs        VLAN2  VLAN100 and VLAN20O  Those three VLANs are cross two different location A and  B  One switch is placed in each site  and cross location requirement can be met if VLAN traffic can be  transferred between the two switches     Connect the Trunk ports of both switches for a Trunk link to convey the cross switch VLAN traffic  connect all       network devices to the other ports of corresponding VLANs     In this example  port 1 and port 12 is spared and can be used for management port or for other purposes   The configuration steps are listed below     Switch A     Switch config  vlan 2  Switch Config Vlan2  switchport interface ethernet 1 2 4    Switch config  vlan 100  Switch Config Vlan100  switchport interface ethernet 1 5 7              Switch Config Vlan2  exit            10 4     
44.  It s shortening is  Drop Prec or DP    Classification  The entry action of QoS  classifying packet traffic according to the classification information  carried in the packet and ACLs    Policing  Ingress action of QoS that lays down the policing policy and manages the classified packets   Remark  Ingress action of QoS  perform allowing  degrading or discarding operations to packets according to  the policing policies    Scheduling  QoS egress action  Configure the weight for eight egress queues WRR  Weighted Round  Robin     In Profile  Traffic within the QoS policing policy range  bandwidth or burst value  is called    In Profile      Out of Profile  Traffic out the QoS policing policy range  bandwidth or burst value  is called  Out of Profile      13 1 2 QoS Implementation    To implement the switch software QoS  a general  mature reference model should be given  QoS can not  create new bandwidth  but can maximize the adjustment and configuration for the current bandwidth resource   Fully implemented QoS can achieve complete management over the network traffic  The following is as  accurate as possible a description of QoS    The data transfer specifications of IP cover only addresses and services of source and destination  and  ensure correct packet transmission using OSI layer 4 or above protocols such as TCP  However  rather than  provide a mechanism for providing and protecting packet transmission bandwidth  IP provide bandwidth  service by the best effort  This is acc
45.  LAN  VLAN     A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their  physical location or connection point in the network  A VLAN serves as a logical workgroup with no physical  barriers  allowing users to share information and resources as though located on the same LAN     XModem    A protocol used to transfer files between devices  Data is grouped in 128 byte blocks and error corrected     39 4    Q PLANET    Networking  amp  Communication    EC Declaration of Conformi       For the following equipment      Type of Product  50 Port 10 100 1000Mbps with 4 Shared SFP Managed Gigabit Switch   Model Number  WGSW 50040      Produced by    Manufacturer   s Name   Planet Technology Corp    Manufacturer   s Address  11F  No 96  Min Chuan Road   Hsin Tien  Taipei  Taiwan  R O C     is herewith confirmed to comply with the requirements set out in the Council Directive on the  Approximation of the Laws of the Member States relating to Electromagnetic Compatibility Directive  on  2004 108 EC     For the evaluation regarding the EMC  the following standards were applied     EN 55022  1998   A1 2000   A2 2003  Class A   EN 61000 3 2  2000   A2 2005 Class D   EN 61000 3 3  1955   A1 2001   A2 2005   EN 55024  1998   A1 2001   A2 2003   IEC 61000 4 2  1995   A1 1998   A2 2000   IEC 61000 4 3  2002   A1 2002           61000 4 4  2004           61000 4 5  1995      1 2000    IEC 61000 4 6  1996   A1 2000    IEC 61000 4 8  1993   A1 2000    
46.  RPF  Reverse  Path Forwarding  check  Multicast router makes use of the impressed packet source address to query Unicast  Router Table or independent Multicast Router Table to determine if the packet ingress interface is on the  shortest path from receipt site to source address  If shortest path Tree is used  then the source address is the  address of source host which sends Multicast Data Packets  if Shared Tree is used  then the source address  is the address of the root of the Shared Tree  When Multicast data packet gets to the router  if RPF check  passes  then the data packet is forwarded according to Multicast forward item  and the data packet will be  discarded else wise     21 1 4 IP Multicast Application    IP Multicast technology has effectively solved the problem of sending in single point and receiving in  multipoint  It has achieved the effective data transmission from a point to multiple points  saved a great deal of  network bandwidth and reduced network load  Making use of the Multicast property of network  some new  value added operations can be supplied conveniently  In Information Service areas such as online living  broadcast  network TV  remote education  remote medicine  real time video audio meeting  the following  applications may be supplied     1  Application of Multimedia and Streaming Media  2  Data repository  finance application  stock  etc    3  Any data distribution application of    one point to multiple points     In the situation of more an
47.  Set Aging time for BPDU messages   no spanning tree maxage       spanning tree max hop  lt hop count gt  Set Maximum number of hops of          no spanning tree max hop BPDU messages in the MSTP region           5  Configure the fast migrate feature for MSTP             Command Explanation  Port Mode  spanning tree link type p2p  fauto force true force false  Set the port link type     no spanning tree link type       Set and cancel the port to be an         boundary port  bpdufilter receives the  spanning tree portfast  bpdufilter     bpduguard   no spanning tree portfast    BPDU discarding  bpduguard receives  the BPDU will disable port  no parameter  receives the BPDU  the port becomes a  non boundary port                 6  Configure the format of MSTP                   Command Explanation  Port Mode  Configure the format of port  spanning tree format standard spanning tree packet    standard format  spanning tree format privacy is provided by IEEE  privacy is  spanning tree format auto compatible with CISCO        auto  no spanning tree format means the format is determined by  checking the received packet           7  Configure the snooping attribute of authentication key       Command Explanation       Port Mode       Set the port to use the authentication    spanning tree digest snoopin           TUE string of partner port  The no restores    no spanning tree digest snooping          to use the generated string           12 5    8  Configure the FLUSH mode once topol
48.  Task List    Enable or disable SNMP Agent server function  Configure SNMP community string   Configure IP address of SNMP management base  Configure engine ID   Configure user   Configure group   Configure view   Configuring TRAP   Enable Disable RMON    Oops eggs  icono x    1  Enable or disable SNMP Agent server function    Command Explanation  Global Mode       Enable the SNMP Agent function on the switch  the    snmp server enabled      no command disables the SNMP Agent function on    no snmp server enabled                         the switch   2  Configure SNMP community string  Command Explanation  Global Mode  snmp server community  ro rw   lt string gt  Configure the community string for the switch  the no   access   lt num std gt   lt name gt    command deletes the configured community string      ipv6 access    lt ipv6 num std gt   lt ipv6 name gt     read    read view name     write   lt write view name gt     no snmp server community  lt string gt    access   lt num std gt   lt name gt      ipv6 access    lt ipv6 num std gt   lt ipv6 name gt                   4 9       3  Configure IP address of SNMP management base          no snmp server securityip     ipv4 addr       lt ipv6 adadr gt       Command Explanation  Global Mode  snmp server securityip    lt ipv4 addr gt      Configure the secure IPv4 IPv6 address which is    ipv6 addr     allowed to access the switch on the NMS  the no    command deletes configured secure address        snmp server securityip enable
49.  This rule does not take effect  until it is applied to source IP or  VLAN MAC and port  Using the NO  form of it can delete specified rule              The last is to configure the rule to specified source IP  source VLAN MAC or specified port  It is noticeable that   due to the above situations  these rules can only be used globally in enabling IGMP SNOOPING  And if  IGMP SNOOPING is not enabled  then only source IP rule can be used under IGMP Protocol  The    configuration commands are as follows        Command    Explanation       Port Configuration Mode        no  ip multicast destination control  access group  lt 6000 7999 gt     Used to configure the rules destination    control uses to port  the NO form    cancels the configuration        Global Configuration Mode        no  ip multicast destination control   lt 1 4094 gt   lt macaddr gt  access group   lt 6000 7999 gt     Used to configure the rules destination  control uses to specify VLAN MAC  the  NO form cancels the configuration         no  ip multicast destination control    IPADDRESS M   access group   lt 6000 7999 gt           Used to configure the rules destination  control uses to specified IP address net  the NO the  configuration     mask  form cancels          21 16       3  Multicast Strategy Configuration   Multicast Strategy uses the manner of specifying priority for specified multicast data to achieve and guarantee  the effects the specific user requires  It is noticeable that multicast data can not 
50.  Timeout  6 Service Type 28 Idle Timeout  7 Framed Protocol 29 Termination Action  8 Framed IP Address 30 Called Station ld  9 Framed IP Netmask 31 Calling Station Id  10 Framed Routing 32 NAS Identifier  11 Filter Id 33 Proxy State  12 Framed MTU 34 Login LAT Service  13 Framed Compression 35 Login LAT Node  14 Login IP Host 36 Login LAT Group  15 Login Service 37 Framed AppleTalk Link  16 Login  TCP Port 38 Framed AppleTalk Network  17  unassigned  39 Framed AppleTalk Zone  18 Reply Message 40 59  reserved for accounting   19 Callback Number 60 CHAP Challenge  20 Callback Id 61 NAS Port Type  21  unassigned  62 Port Limit  22 Framed Route 63 Login LAT Port       W Length field  1 octet   the length in octets of the attribute including Type  Length and Value fields          Value field  value of the attribute whose content and format is determined by the type and length of the  attribute     30 2       30 2 RADIUS Configuration Task List    ar OU N        Enable the authentication and accounting function     Configure the RADIUS authentication key      Configure the RADIUS server      Configure the parameter of the RADIUS service     Configure the IP address of the RADIUS NAS     1  Enable the authentication and accounting function        Command    Explanation       Global Mode       aaa enable  no aaa enable    To enable the AAA authentication function   The no form of this command will disable  the AAA authentication function        aaa accounting enable  no aaa accountin
51.  VLAN is configured properly  a port will be added into  Guest VLAN  just like Auto VLAN  if there is no response message from the supplicant system after the device  sends more authentication triggering messages than the upper limit  EAP Request Identity  from the port   B        authentication server assigns an Auto VLAN  and then the port leaves Guest VLAN and joins  the assigned Auto VLAN  When the user becomes offline  the port will be allocated to the specified  Guest VLAN again   B        authentication server assigns an Auto VLAN  and then the port leaves Guest VLAN and joins  the specified VLAN  When the user becomes offline  the port will be allocated to the specified  Guest VLAN again     25 2 802 1x Configuration Task List    802 1x Configuration Task List    1  Enable IEEE 802 1x function   2  Configure web authentication agent function  3  Access management unit property configuration  1  Configure port authentication status  2  Configure access management method for the port  MAC based or port based   3  Configure expanded 802 1x function  4  Configure IPv6 passthrough function of the port   4  User access devices related property configuration  optional     1  Enable 802 1x function          Command Explanation  Global Mode  dot1x enable Enables the 802 1x function in the switch and ports  the no  no dot1x enable command disables the 802 1x function        Enables the switch force client software using private    dot1x privateclient enable aun    802 1   authe
52.  access rule         no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt    any destin  ation mac  host destination mac lt host_dmac gt     lt d  mac gt  lt dmac mask gt    untagged eth2  ethertype      protocol    protocol mask       Creates an extended  name based MAC access rule  matching untagged ethernet 2    form    this    frame  the  no    command deletes  name based extended MAC    access rule         no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt       fany destination mac  host destination mac        lt host_dmac gt     lt dmac gt  lt dmac mask gt          Creates an MAC access rule  matching 802 3 frame  the     no    form command deletes    this MAC access rule        24 10                 untagged 802 3         no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt    any destin  ation mac  host destination mac lt host_dmac gt     lt d  mac gt  lt dmac mask gt    tagged eth2  cos  lt cos val gt     lt cos bitmask gt     vlanld  lt vid value gt    lt vid mask gt        ethertype   protocol     lt protocol mask gt        Creates an MAC access rule  matching tagged ethernet 2           frame  the    no form  command deletes this MAC    access rule            no  deny permit  any source mac  host source ma  c  lt host_smac gt     lt smac gt  lt smac mask gt     fany destination mac  host destination mac   host d  mac gt     l
53.  address  lt network number gt   allocated to the address pool  The no     mask   prefix length     operation of this command cancels the  no network address    allocation address pool        default router    lt address1 gt   lt address2 gt      lt address8 gt     n    no default router    Configure default gateway for DHCP clients   The no operation cancels the default  gateway                 18 2          dns server    lt address1 gt   lt address2 gt      lt address8 gt           no dns server    Configure DNS server for DHCP clients  The    no command deletes DNS server    configuration        domain name   domain    no domain name    Configure Domain name for DHCP clients   the    no domain name  command deletes  the domain name        netbios name server    lt address1 gt   lt address2 gt      lt address8 gt                netbios name server    Configure the address for WINS server          no operation cancels the address for server        netbios node type  fb node h node m node p node   type n  umber gt     no netbios node type    Configure node type for DHCP clients  The  no operation cancels the node type for  DHCP clients        bootfile   filename    no boottfile    Configure the file to be imported for DHCP  clients on boot up  The no command  cancels this operation        next server    lt address1 gt   lt address2 gt      lt address8 gt        no next server    lt address1 gt   lt address2 gt      lt address8 gt           Configure the address of the server 
54.  and service operating networks  the service  providers should control and configure the access from user  The prevailing application of WLAN and LAN  access in telecommunication networks  in particular  make it necessary to control ports in order to implement  the user level access control  And as a result  IEEE LAN WAN committee defined a standard  which is 802 1x     to do Port Based Network Access Control  This standard has been widely used in wireless LAN and ethernet    Port Based Network Access Control  means to authenticate and control the user devices on the level of ports  of LAN access devices  Only when the user devices connected to the ports pass the authentication  can they  access the resources in the LAN  otherwise  the resources in the LAN won t be available     25 1 1 The Authentication Structure of 802 1x  The system using 802 1x has a typical Client Server structure  which contains three entities  as illustrated in  the next figure   Supplicant system  Authenticator system  and Authentication server system     Authentication  server system    Authentication  server    Supplicant system               Services offered by  Authenticator  s   EAP protocol    system   exchanges    Supplicant PAE       1 carried in  Pot     higher layer     unauthorized   protocol         LAN WLAN           Figure 25 1 The Authentication Structure of 802 1x    m        supplicant system is an entity on one end of the LAN segment  should be authenticated by the  access controllin
55.  between MST Regions    If there are multiple regions or legacy 802 1D bridges within the network  MSTP establishes and maintains the  CST  which includes all MST regions and all legacy STP bridges in the network  The MST instances combine    with the IST at the boundary of the region to become the CST    The MSTI is only valid within its MST region  An MSTI has nothing to do with MSTIs in other MST regions  The  bridges in a MST region receive the MST BPDU of other regions through Boundary Ports  They only process  CIST related information and abandon MSTI information     12 2    12 1 2 Port Roles    The MSTP bridge assigns a port role to each port which runs MSTP        CIST port roles  Root Port  Designated Port  Alternate Port and Backup Port       On top of those roles  each MSTI port has one new role  Master Port     The port roles in the CIST  Root Port  Designated Port  Alternate Port and Backup Port  are defined in the    same ways as those in the RSTP     12 1 3 MSTP Load Balance    In a MSTP region  VLANs can by mapped to various instances  That can form various topologies  Each  instance is independent from the others and each distance can have its own attributes such as bridge priority    and port cost etc  Consequently  the VLANs in different instances have their own paths  The traffic of the    VLANS are load balanced     12 2 MSTP Configuration Task List    MSTP configuration task list     1                             Enable the MSTP and set the running mode 
56.  client   configuration files or system files can be downloaded from the remote FTP TFTP servers  can be hosts or  other switches  without affecting its normal operation  And file list can also be retrieved from the server in ftp  client mode  Of course  switch can also upload current configuration files or system files to the remote  FTP TFTP servers  can be hosts or other switches   When switch operates as a FTP TFTP server  it can    provide file upload and download service for authorized FTP TFTP clients  as file list service as FTP server   Here are some terms frequently used in FTP TFTP          ROM  Short for EPROM  erasable read only memory  EPROM is repalced by FLASH memory in  switch        SDRAM  RAM memory in the switch  used for system software operation and configuration  sequence storage     BM FLASH  Flash memory used to save system file and configuration file   B System file  including system image file and boot file     B System image file  refers to the compressed file for switch hardware driver and software support  program  usually refer to as IMAGE upgrade file  In switch  the system image file is allowed to save  in FLASH only  Switch mandates the name of system image file to be uploaded via FTP in Global  Mode to be nos img  other IMAGE system files will be rejected        Boot file  refers to the file initializes the switch  also referred to as the ROM upgrade file  Large  size file can be compressed as IMAGE file   In switch  the boot file is allowed
57.  configure some network ports  he she can use the interface ethernet  lt interface list gt   command to enter the appropriate Ethernet port configuration mode  where  lt interface list gt  stands for one or  more ports  If  lt interface list gt  contains multiple ports  special characters such as     or     can be used to  separate ports      is used for discrete port numbers and     is used for consecutive port numbers  Suppose       operation should be performed on ports 2  3  4  5  the command would look like  interface ethernet 1 2 5  Port  speed  duplex mode and traffic control can be configured under Ethernet Port Mode causing the performance  of the corresponding network ports to change accordingly     6 2 Network Port Configuration Task List    1  Enter the network port configuration mode   2  Configure the properties for the network ports   1  Configure combo mode for combo ports  2  3  4  5  Configure port speed and duplex mode     2  Enable Disable ports    3     4     5     6  Configure bandwidth control   7     8     9     10    Configure port names  Configure port cable types    7  8  9  1    Configure traffic control   Enable Disable port loopback function   Configure broadcast storm control function for the switch    Configure scan port mode    1  Enter the Ethernet port configuration mode                      Command Explanation  Global Mode  interface ethernet  lt interface list gt  Enters the network port configuration mode        2  Configure the propertie
58.  configured an MRPP ring 4000  thereby constitutes a single MRPP ring     In above configuration  SWITCH A configuration is primary node of MRPP ring 4000  and configures E1 1 to    primary port  E1 2 to secondary port  Other switches are secondary nodes of MRPP ring  configures primary    port and secondary port separately     To avoid ring  it should temporarily disable one of the ports of primary node  when it enables each MRPP ring    in the whole MRPP ring  and after all of the nodes are configured  open the port     When disable MRPP ring  it needs to insure the MRPP ring doesn t have ring     SWITCH A configuration Task Sequence     Switch Config  mrpp enable  Switch Config  mrpp ring 4000  Switch mrpp ring 4000  control vlan 4000  Switch mrpp ring 4000  fail timer 18  Switch mrpp ring 4000  hello timer 5  Switch mrpp ring 4000  node mode master      Switch mrpp ring 4000  exit  Switch Config  interface ethernet 1 1  Switch config lf Ethernet1 1  mrpp ring 4000 primary port  Switch config lf Ethernet1 1  interface ethernet 1 2  Switch config If Ethernet1 2  mrpp ring 4000 secondary port  Switch config lf Ethernet1 2  exit  Switch Config                        Switch mrpp ring 4000  enable                         31 12          SWITCH B configuration Task Sequence     Switch Config  mrpp enable  Switch Config  mrpp ring 4000  Switch mrpp ring 4000  control vlan 4000    Switch mrpp ring 4000  enable  Switch mrpp ring 4000  exit    Switch config lf Ethernet1 1  mrpp ring 
59.  enable on the port       10 5 3 Typical Applications of the Voice VLAN    Scenario    A company realizes voice communication through configuring Voice VLAN  IP phone1 and IP phone2 can be  connected to any port of the switch  namely normal communication and interconnected with other switches  through the uplink port  IP phone1 MAC address is 00 30 4f 11 22 33  connect port 1 1 of the switch   IP phone2 MAC address is 00 30 4f 11 22 55  connect port 1 2 of the switch      10 16       O       IP phone1 IP phone2    Figure 10 7 VLAN typical apply topology    Configuration items Configuration Explanation       Voice VLAN Global configuration on the Switch     Configuration procedure   Switch 1        Switch config  vlan 100  Switch Config Vlan100  exit          Switch config  voice vlan vlan 100  Switch config  voice vlan mac 00 30 4f 11 22 33 mask 255 priority 5 name company  Switch config  voice vlan mac 00 30 4f 11 22 55 mask 255 priority 5 name company  Switch config  interface ethernet 1 10  Switch Config lf Ethernet1 10  switchport mode trunk        Switch Config lf Ethernet1 10  exit       10 5 4 Voice VLAN Troubleshooting    W Voice VLAN can not be applied concurrently with MAC base VLAN   W The Voice VLAN support maximum 1024 sets of voice equipments  the exceeded number of  equipments will not be supported   W The Voice VLAN on the port is enabled by default  If the configured data can no longer enter the Voice  VLAN during operation  please check if the Voice VLAN fun
60.  extensive IP ACL  nomenclature  standard IP ACL  nomenclature extensive IP ACL  digital standard IPv6 ACL  and nomenclature  standard IPv6 ACL    W Parameters of Timerange and Portrange can not be set in ACL  the type of ACL should be Permit    W The redirection port must be 1000Mb port in the flow based redirection function     14 14       Chapter 15 Layer 3 Management  Configuration    Switch only support Layer 2 forwarding  but can configure a Layer 3 management port for the communication  of all kinds of management protocols based on the IP protocol     15 1 Layer 3 Management Interface    15 1 1 Introduction to Layer 3 Management Interface    Only one layer 3 management interface can be created on switch  The Layer 3 interface is not a physical  interface but a virtual interface  Layer 3 interface is built on VLANs  The Layer 3 interface can contain one or  more layer 2 ports which belong to the same VLAN  or contain no layer 2 ports  At least one of the Layer 2  ports contained in Layer 3 interface should be in UP state for Layer 3 interface in UP state  otherwise  Layer 3  interface will be in DOWN state  The switch can use the IP addresses set in the layer 3 management interface  to communicate with the other devices via IP     15 1 2 Layer 3 Interface Configuration Task List    Layer 3 Interface Configuration Task List   1  Create Layer 3 management interface    1  Create Layer 3 Management Interface       Command Explanation       Global Mode       Creates a manage
61.  for  control the terminal access to the network  Three independent functions of Authentication  Authorization   Accounting are also available in this protocol  Compared with RADIUS  the transmission layer of TACACS   protocol is adopted with TCP protocol  further with the packet head   except for standard packet head   encryption  this protocol is of a more reliable transmission and encryption characteristics  and is more    adapted to security control   According to the characteristics of the TACACS   Version 1 78   we provide TACACS  authentication function  on the switch  when the user logs  such as telnet  the authentication of user name and password can be  carried out with TACACS      29 2 TACACS  Configuration Task List    Configure the TACACS  authentication key  Configure the TACACS  server   Configure the TACACS  authentication timeout time  Configure the IP address of the RADIUS NAS    Pn Nec    1  Configure the TACACS  authentication key       Command Explanation       Global Mode       Configure the TACACS  server key  the    tacacs server key  lt string gt  5          tacacs server key    command deletes    no tacacs server key             the key        2  Configure TACACS  server       Command Explanation       Global Mode  tacacs server authentication host    IPaddress     port   lt portNum gt          Configure the IP address  listening port  number  the value of timeout timer and the  key string of the TACACS  server  the no  form of this command deletes t
62.  for configuring and displaying the switch clock  for displaying the version  information of the switch system  etc        Command Explanation  Normal User Mode  Admin Mode          The User uses enable command to step into admin          enable      mode from normal user mode  The disable command  disable   T    is for exiting admin mode   Admin Mode  config  terminal  Enter global mode from admin mode        Various Modes       Exit current mode and enter previous mode  such as    m using this command in global mode to go back to  admin mode  and back to normal user mode from  admin mode    Except User Mode  Admin Mode    Quit current mode and return to Admin mode when not  at User Mode  Admin Mode        end       Admin Mode  clock set  lt HH MM SS gt    YYYY MM DD        Set system date and time                          show version Display version information of the switch   set default Restore to the factory default   3 Save current configuration parameters to Flash  write  Memory   reload Hot reset the switch        4 1       4 2 Telnet Management  4 2 1 Telnet    4 2 1 1 Introduction to Telnet    Telnet is a simple remote terminal protocol for remote login  Using Telnet  the user can login to a remote host  with its IP address of hostname from his own workstation  Telnet can send the user   s keystrokes to the remote  host and send the remote host output to the user   s screen through TCP connection  This is a transparent  service  as to the user  the keyboard and mon
63.  gt   no mac vlan          Configure the specified VLAN to MAC  VLAN  the  no mac vlan  command  cancels the MAC VLAN configuration of  this VLAN        3  Configure the correspondence between the MAC address and the VLAN       Command    Explanation       Global Mode       mac vlan mac   mac addrss   vlan    vlan id   priority  lt priority id gt   no mac vlan  mac  lt mac addrss gt  all           Add delete the correspondence between  the MAC address and the VLAN  namely  specified MAC address join leave  specified VLAN        4  Configure the IP subnet based VLAN function on the port       Command    Explanation       Port Mode       switchport subnet vlan enable  no switchport subnet vlan enable          Enable disable the port IP subnet base  VLAN function on the port        10 12                   5  Configure the correspondence between the IP subnet and the VLAN    Command Explanation       Global Mode  subnet vlan ip address  lt ipv4 addrss gt        Add delete the correspondence between  the IP subnet and the VLAN  namely    mask  lt subnet mask gt  vlan   vlan id      priority  lt priority id gt     yt p        specified IP subnet joins leaves specified  no subnet vlan  ip address  lt ipv4 addrss gt  VLAN    mask  lt subnet masko gt  all              6  Configure the correspondence between the Protocols and the VLAN       Command Explanation       Global Mode  protocol vlan mode  ethernetii etype         etype id   llc  dsap  lt dsap id gt  ssap         Add delete th
64.  hosts are connected to port 2  6  10  12 respectively and the multicast router is connected to port  1  As IGMP Snooping is disabled by default either in the switch or in the VLANs  If IGMP Snooping should be  enabled in VLAN 100  the IGMP Snooping should be first enabled for the switch in Global Mode and in VLAN  100 and set port 1 of VLAN 100 to be the mrouter port     The configuration steps are listed below     Switch config  ip igmp snooping    Switch config  ip igmp snooping vlan 100    Switch config  ip igmp snooping vian 100 mrouter interface ethernet 1 1       Multicast Configuration   Suppose two programs are provided in the Multicast Server using multicast address Group1 and Group2   three of four hosts running multicast applications are connected to port 2  6  10 plays program1  while the host  is connected to port 12 plays program 2    IGMP Snooping listening result    The multicast table built by IGMP Snooping in VLAN 100 indicates ports 1  2  6  10 in Group1 and ports 1  12  in Group2    All the four hosts can receive the program of their choice  ports 2  6  10 will not receive the traffic of program 2  and port 12 will not receive the traffic of program 1     Scenario 2  L2 general querier    21 21       Multicast    Server Gtoup 2        Switch A  IGMP Snooping  L2 general querier    Multicast port   Switch     z IGMP Snooping       Group 1 Group 1 Group 1 Group 2    Figure 21 2 The switches as IGMP Queries    The configuration of Switch2 is the same as the 
65.  in the same manner as for ACL  and uses  ACL number of 5000 5099  every rule number can be used to configure 10 rules  It is noticeable that these  rules are ordered  the front one is the one which is configured the earliest  Once the configured rules are  matched  the following rules won   t take effect  so rules of globally allow must be put at the end  The  commands are as follows        Command Explanation       Global Configuration Mode    no  access list  lt 5000 5099 gt    deny permit  ip    lt source gt    lt source wildcard gt    host source    source host ip    any source      lt destination gt    lt destination wildcard gt    host desti       The rule used to configure source control  This  rule does not take effect until it is applied to  specified port  Using the NO form of it can delete       specified rule   nation     lt destination host ip gt   any destinat             ion        The last is to configure the configured rule to specified port        If the rules being configured will occupy the table entries of hardware  configuring  too many rules will result in configuration failure caused by bottom table entries             being full  so we suggest user to use the simplest rules if possible        The configuration rules are as follows                       Command Explanation  Port Configuration Mode   no  ip multicast source control Used to configure the rules source control uses  access group  lt 5000 5099 gt  to port  the NO form cancels the configura
66.  lt s Pv6Addr gt              Creates a standard  name based IPV6 access  rule  the no form command  deletes the name based  standard IPV6 access rule        c  Exit name based standard IP ACL configuration mode       Command    Explanation       Standard IPV6 ACL Mode       exit       2  Configuring packet filtering function   1  Enable global packet filtering function       Exits name based standard  IPV6 ACL configuration  mode        Command    Explanation       Global Mode       firewall enable    Enables global packet  filtering function        firewall disable        2  Configure default action        Disables global packet    filtering function        Command    Explanation       Global Mode       firewall default  permit  deny           Sets default action to  firewall        3  Configuring time range function   1  Create the name of the time range       Command    Explanation       Global Mode       time range   time range name      Create a time range named  time range name        no time range   time range name            Stop the time range function  named time range name         2  Configure periodic time range       Command          Explanation       24 16                            Time range Mode       absolute periodic  Monday   Tuesday   Wednesday    Thursday   Friday   Saturday   Sunday    start time   to   Monday   Tuesday   Wednesday   Thursday   Friday      Saturday   Sunday    end time         periodic   Monday Tuesday Wednesday Thursday   Friday Satur
67.  no switchport port security lock    Lock the port  then MAC addresses  learned will be disabled  The  no  switchport port security lock  command  restores the function        switchport port security convert    Convert dynamic secure MAC addresses  learned by the port to static secure MAC  addresses        switchport port security timeout   value    no switchport port security timeout    Enable port locking timer function  the    no  switchport port security timeout   restores the default setting        switchport port security mac address    mac address     no switchport port security  mac address   mac address      Add static secure MAC address  the  no  switchport port security mac address   command deletes static secure MAC  address        Admin Mode          clear port security dynamic  address   lt                 gt    interface  lt interface id gt         Clear dynamic MAC addresses learned by  the specified port        11 6          3     MAC address binding property configuration    Command    Explanation       Port Mode       switchport port security maximum    value     no switchport port security maximum    value      Set the maximum number of secure MAC  addresses for a port  the    no switchport  port security maximum  command  restores the default value        switchport port security violation  fprotect   shutdown   no switchport port security violation       Set the violation mode for the port  the  no  switchport port security violation        command rest
68.  port 12 playing program 3     22 3       MLD Snooping interception results   The multicast table on vlan 100 shows  port1  2 and 6 arein  Multicasting Server 1  Group1     port1  10 are  in  Multicasting Server 1 Group2   and port1  12 are in  Multicasting Server 2  Group3     All the four hosts successfully receive programs they are interested in  port2  6 receives no traffic from  program2 and 3  port10 receives no traffic from program 1 and 3  and port12 receives no traffic from  program1 and 2    Scenario 2  MLD L2 general querier    Multicast Router    MLD Snooping  Query    SwitchA    Mrouter Port ET    3 1 MLD Snooping    d    SwitchB    Group 1 Group 1 Group 1 Group 2       Figure 22 2 Switch as MLD Querier Function figure    Configuration of switch B is the same as the switches in case 1  and here the switch 1 replaces the Multicast  Router in case 1  Assume the vlan 60 configured on it contains port 1  2  10  12  amongst port 1 is connected  to multicast server  port 2 to switch2  To send Query periodically  global MLD Snooping has to be enabled    while executing the mld snooping vlan 60 I2 general querier  setting the vlan 60 to a Level 2 General Querier   Configuration procedure is as follows     SwitchA config   SwitchA config  ipv6 mld snooping   SwitchA config  ipv6          snooping vlan 60  SwitchA config  ipv6          snooping vlan 60 I2 general querier  SwitchB config       SwitchB config  ipv6 mld snooping    22 4       SwitchB config  ipv6 mld snooping
69.  priorities will  go to different queues and get different bandwidth     The configuration steps are listed below   QoS configuration in SwitchA        Switch config   Switch config  access list 1 permit 192 168 1 0 0 0 0 255  Switch config  class map c1  Switch Config ClassMap c1  match access group 1  Switch Config ClassMap c1   exit  Switch config  policy map p1    Switch Config PolicyMap p1 Class c1   set ip precedence 5  Switch Config PolicyMap p1 Class c1  exit  Switch Config PolicyMap p1   exit                Switch Config PolicyMap p1  class c1           Switch config  interface ethernet 1 1       Switch Config If Ethernet1 1  service policy input p1       QoS configuration in Switch2     Switch config   Switch config  mls gos  Switch config  interface ethernet 1 1  Switch Config lf Ethernet1 1  mls qos trust cos    13 4 QoS Troubleshooting       trust cos and EXP can be used with other trust or Policy Map       trust dscp can be used with other trust or Policy Map  This configuration takes effect to IPv4 and IPv6  packets       trust exp  trust dscp and trust cos may be configured at the same time  the priority is   EXP gt DSCP gt COS        f the dynamic VLAN  mac vlan voice vian ip subnet vlan protocol vlan  is configured  then the packet  COS value equals COS value of the dynamic VLAN    W Policy map can only be bound to ingress direction  egress is not supported yet       At present  it is not recommended to use policy map      VLAN or VLAN s port     13 12      
70.  sara sarai a rara          29 1  29 2 TACACS  CONFIGURATION TASK 1116                                         61  nnn nana                           29 1  29 3 TACACS  SCENARIOS TYPICAL                                                                                                                                                       29 2  29 4 TACACS  TROUBLESHOOTING            eere nnn nn n n e                                                          E E E E              E        29 3  CHAPTER 30 RADIUS                                                                                                 30 1  30 1 INTRODUCTION TO           5                                1   7 1 4    1    11                                                      raa 30 1  30 1 1 AAA and RADIUS                                                                         30 1   30 1 2 Message structure for RADIUS                  essssssssssssseeeeeeeee nennen enne nnns entente 30 1   30 2 RADIUS CONFIGURATION TASK                                 eene                                        30 3  30 3 RADIUS TYPICAL EXAMPLES               eere enne nennen nnn nana nn nana ssa              sa sa sa sa sas asa sa sa sa sa rasa sa rara na 30 5  30 31 IPV4 Radius  Example  eite teh eb RR HERR RR REB UR RR Ren  30 5  30 3 24IPv6 RadiusExamiple      5 2 nc eee eee      ev eed festa deepest de den 30 6   30 4 RADIUS TROUBLESHOOTING                                                                                 
71.  sent by PC3  a mapping entry for MAC address 00 01 33 33 33 33 and port  1 12 is added to the MAC table     4  Now the MAC table has two dynamic entries  MAC address 00 01 11 11 11 11   port 1 5 and  00 01 33 33 33 33  port1 12     5  After the communication between PC1 and PC3  the switch does not receive any message sent  from PC1 and PC3  And the MAC address mapping entries in the MAC table are deleted after 300  seconds  The 300 seconds here is the default aging time for MAC address entry in switch  Aging  time can be modified in switch     11 2    11 1 2 Forward or Filter    The switch will forward or filter received data frames according to the MAC table  Take the above figure as an  example  assuming switch have learnt the MAC address of PC1 and PC3  and the user manually configured  the mapping relationship for PC2 and PC4 to ports  The MAC table of switch will be                             MAC Address Port number Entry added by  00 01  11 11 11 11 1 5 Dynamic learning  00 01  22 22 22 22 1 5 Static configuration  00 01  33 33 33 33 1 12 Dynamic learning  00 01 44 44 44 44 1 12 Static configuration       1  Forward data according to the MAC table  If PC1 sends a message to PC3  the switch will forward the data received on port 1 5 from port1 12    2  Filter data according to the MAC table  If PC1 sends a message to PC2  the switch  on checking the MAC table  will find PC2 and PC1 are in the  same physical segment and filter the message  i e  drop this message      T
72.  sos        zd G  Node Ring 1 Ring 2      Master Node          aa    E2  SWITCH C SWITCH D SWITCH H    Figure 31 1 MRPP Sketch Map    1  Control VLAN  Control VLAN is a virtual VLAN  only used to identify MRPP protocol packet transferred in the link  To avoid  confusion with other configured VLAN  avoids configuring control VLAN ID to be the same with other  configured VLAN ID  The different MRPP ring should configure the different control VLAN ID     2  Ethernet Ring  MRPP Ring   Ring linked Ethernet network topology   Each MRPP ring has two states   Health state  The whole ring net work physical link is connected   Break state  one or a few physical link break in ring network    3  nodes  Each switch is named after a node on Ethernet  The node has some types     31 8       Primary node  each ring has a primary node  it is main node to detect and defend    Transfer node  except for primary node  other nodes are transfer nodes on each ring    The node role is determined by user configuration  As shown Fig 31 1  Switch A is primary node of Ring 1   Switch B  Switch C  Switch D and Switch E are transfer nodes of Ring 1     4  Primary port and secondary port  The primary node and transfer node have two ports connecting to Ethernet separately  one is primary port   and another is secondary port  The role of port is determined by user configuration   Primary port and secondary port of primary node  The primary port of primary node is used to send ring health examine packet  hello 
73.  source cpu         Switch config  monitor session 4 source interface ethernet 1 15 access list 120 rx       32 16       32 4 Device Mirror Troubleshooting    If problems occur on configuring port mirroring  please check the following first for causes     Whether the mirror destination port is a member of a TRUNK group or not  if yes  modify the  TRUNK group    If the throughput of mirror destination port is smaller than the total throughput of mirror source  port s   the destination port will not be able to duplicate all source port traffic  please decrease the  number of source ports  duplicate traffic for one direction only or choose a port with greater  throughput as the destination port  Mirror destination port can not be pulled into Isolate vian  or will  affect mirror between VLAN     32 17       Chapter 33 sFlow Configuration    33 1 Introduction to sFlow    The sFlow  RFC 3176  is a protocol based on standard network export and used on monitoring the network  traffic information developed by the InMon Company  The monitored switch or router sends date to the client  analyzer through its main operations such as sampling and statistic  then the analyzer will analyze according  to the user requirements so to monitor the network    A sFlow monitor system includes  sFlow proxy  central data collector and sFlow analyzer  The sFlow proxy  collects data from the switch using sampling technology  The sFlow collector is for formatting the sample data  statistic which is to be 
74.  the first hop returns an ICMP error message to inform this packet can not be sent  due  to TTL timeout   a data packet with TTL at 2 will be sent  Also the send hop may be a TTL timeout return  but  the procedure will carries on till the data packet is sent to its destination  These procedures is for recording  every source address which returned ICMP TTL timeout message  so to describe a path the IP data packets    traveled to reach the destination   Traceroute Options and explanations of the parameters of the Traceroute command please refer to traceroute  command chapter in the command manual     35 4 Traceroute6    The Traceroute6 function is used on testing the gateways passed through by the data packets from the source    equipment to the destination equipment  to verify the accessibility and locate the network failure  The principle    35 24       of the Traceroute6 under IPv6 is the same as that under IPv4  which adopts the hop limit field of the ICMPv6  and IPv6 header  First  Traceroute6 sends an IPv6 datagram  including source address  destination address  and packet sent time  whose HOPLIMIT is set to 1  When first route on the path receives this datagram  it  minus the HOPLIMIT by 1 and the HOPLIMIT is now 0  So the router will discard this datagram and returns  with a   ICMPv6 time exceeded   message  including the source address of the IPv6 packet  all content in the  IPv6 packet and the IPv6 address of the router   Upon receiving this message  the Traceroute6 
75.  the port is bi directionally controlled  the sending and receiving of all frames is forbidden   When the port is unidirectional controlled  no frames can be received from the supplicant systems  while sending frames to the supplicant systems is allowed             At present  this kind of switch only supports unidirectional control   Note             25 2       25 1 2 The Work Mechanism of 802 1x    IEEE 802 1x authentication system uses EAP  Extensible Authentication Protocol  to implement exchange of  authentication information between the supplicant system  authenticator system and authentication server    system     Supplicant system Authenticator system RADIUS Authentication server  PAE PAE system       Figure 25 2 the Work Mechanism of 802 1x    EAP messages adopt EAPOL encapsulation format between the PAE of the supplicant system and  the PAE of the authenticator system in the environment of LAN    Between the PAE of the authenticator system and the RADIUS server  there are two methods to  exchange information  one method is that EAP messages adopt EAPOR  EAP over RADIUS   encapsulation format in RADIUS protocol  the other is that EAP messages terminate with the PAE  of the authenticator system  and adopt the messages containing RAP  Password Authentication  Protocol  or CHAP  Challenge Handshake Authentication Protocol  attributes to do the  authentication interaction with the RADIUS server    When the user pass the authentication  the authentication server system wi
76.  these severity levels are in accordance with the standard UNIX LINUX syslog                 Table 36 1 Severity of the log  information                                     Severity Value Description  emergencies 0 System is unusable  alerts 1 Action must be taken immediately  critical 2 Critical conditions  errors 3 Error conditions  warnings 4 Warning conditions  notifications 5 Normal but significant condition       35 27          informational 6    Informational messages             debugging       Debug level messages       Right now the switch can generate information of following four levels    Log information can be automatically sent to corresponding channels with regard to respective severity levels   Amongst the debugging information can only be sent to the monitor  Those with the Informational level can  only be sent to current monitor terminal  such as the information from the Telnet terminal configuration  command can only be transmitted to the Telnet terminal  Warnings information can be sent to all terminal with  also saved in the SDRAM log buffer zone  And the critical information can be save both in SDRAM and the  NVRAM  if exists  besides sent to all terminals  To check the log save in SDRAM and the NVRAM  we can use  the show logging buffered command  To clear the log save in NVRAM and SDRAM log buffer zone  we can    Restart the switch  mission abnormal are classified critical    Up down interface  topology change  aggregate port state change of the inter
77.  three methods to take control simultaneously  while since IGMP model is located at layer 3  it only    takes control over the IP address transmitting packets      The Service Oriented Priority Strategy Multicast of Security Controllable technology adopts the following  mode  for multicast data in limit range  set the priority specified by the user at the join in end so that data can  be sent in a higher priority on TRUNK port  consequently guarantee the transmission is processed in  user specified priority in the entire network     21 2 2 DCSCM Configuration Task List    1  Source Control Configuration  2  Destination Control Configuration  3   Multicast Strategy Configuration    1  Source Control Configuration  Source Control Configuration has three parts  of which the first is to enable source control  The command of  Source control is as follows        Command Explanation                Global Configuration Mode       21 14          Enable source control globally  the    no ip  multicast source control  command disables  source control globally  It is noticeable that  after  4 2 enabling source control globally  all multicast   no  ip multicast source conirol      packets are discarded by default  All source   Required          control configuration can not be processed until  that it is enabled globally  while source control  can not be disabled until all configured rules are    disabled                 he next is to configure the rule of source control  It is configured
78.  to save in ROM only   Switch mandates the name of the boot file to be boot rom        Configuration file  including start up configuration file and running configuration file  The  distinction between start up configuration file and running configuration file can facilitate the  backup and update of the configurations        Start up configuration file  refers to the configuration sequence used in switch start up  Switch  start up configuration file stores in FLASH only  corresponding to the so called configuration save   To prevent illicit file upload and easier configuration  switch mandates the name of start up  configuration file to be startup config     4 17       Running configuration file  refers to the running configuration sequence use in the switch  In  switch  the running configuration file stores in the RAM  In the current version  the running  configuration sequence running config can be saved from the RAM to FLASH by write command  or copy running config startup config command  so that the running configuration sequence  becomes the start up configuration file  which is called configuration save  To prevent illicit file  upload and easier configuration  switch mandates the name of running configuration file to be  running config     Factory configuration file  The configuration file shipped with switch in the name of factory config   Run set default and write  and restart the switch  factory configuration file will be loaded to  overwrite current start up confi
79.  vlan 100    SwitchB config  ipv6 mld snooping vlan 100 mrouter interface ethernet 1 1       Multicast configuration    Same as scenario 1   MLD Snooping interception results   Same as scenario 1    Scenario 3  To run in cooperation with layer 3 multicast protocols   WITCH which is used in Scenario 1 is replaced with ROUTER with specific configurations remains the same   And multicast and IGMP snooping configurations are the same with what it is in Scenario 1  To configure  PIM SM6 on ROUTER  and enable PIM SM6 on vlan 100  use the same PIM mode with the connected  multicast router   the configurations are listed as below     switch config  switch config  ipv6 pim multicast routing    switch config  interface vlan 100       switch config if vlan100  ipv6 pim sparse mode    MLD snooping does not distribute entries when layer 3 multicast protocol is enabled  It only does the following  tasks    B   To remove the layer 2 multicast entries    W To provide query functions to the layer 3 with vlan  S  and    as the parameters           When layer 3 MLD is disabled  re enable distributing layer 2 multicast entries     By looking up the layer    IPeMC entries  it can be found that ports can be indicated by the layer    multicast  entries  This ensures the MLD Snooping can work in cooperation with the layer 3 multicast protocols     22 1 4 MLD Snooping Troubleshooting    In configuring and using MLD Snooping  the MLD Snooping server may fail to run properly due to physical   connectio
80. 003 1 1 1  0 64  Users in the 2003 1 1 1 66  0 80 subnet should be disabled  from accessing the outside network   Configuration description    1  Create the corresponding access list    2  Configure datagram filting    3  Bind the ACL to the related interface     The configuration steps are listed as below     Switch config  ipv6 enable    Switch config  ipv6 access list 600 permit 2003 1 1 1 66  0 80 any destination  Switch config  ipv6 access list 600 deny 2003 1 1 1  0 64 any destination       24 20       Switch config  firewall enable       Switch config  firewall default permit  Switch config  interface ethernet 1 10  Switch Config If Ethernet1 10  ipv6 access group 600 in  Switch Config If Ethernet1 10  exit        Switch config  exit       Configuration result     Switch show firewall  Firewall Status  Enable   Firewall Default Rule  Permit     Switch show ipv6 access lists           access list 600 used 1 time s    ipv6 access list 600 deny 2003 1 1 1  0 64 any source  ipv6 access list 600 permit 2003 1 1 1 66  0 80 any source    Switch  show access group interface ethernet 1 10  interface name Ethernet1 10       IPv6 Ingress access list used is 600  traffic statistics Disable     Scenario 5   The configuration requirement is stated as below  The interface 1  2  5  7 belongs to vlan100  Hosts with  192 168 0 1 as its IP address should be disabled from accessing the listed interfaces   Configuration description   1  Create the corresponding access list   2  Configure d
81. 168 1 0 0 0 0 255  Switch config  class map c1       Switch Config ClassMap c1  match access group 1  Switch Config ClassMap c1   exit   Switch config  policy map p1   Switch Config PolicyMap p1  class c1  Switch Config PolicyMap p1 Class c1  policy 10000 4000 exceed action drop  Switch Config PolicyMap p1 Class c1  exit   Switch Config PolicyMap p1   exit   Switch config  interface ethernet 1 2  Switch Config lf Ethernet1 2  service policy input p1       Configuration result    An ACL name 1 is set to matching segment 192 168 1 0  Enable QoS globally  create a class map named c1   matching ACL1 in class map  create another policy map named p1 and refer to c1 in p1  set appropriate  policies to limit bandwidth and burst value  Apply this policy map on port ethernet1 2  After the above settings  done  bandwidth for packets from segment 192 168 1 0 through port ethernet 1 2 is set to 10 Mb s  with a  burst value of 4 MB  all packets exceed this bandwidth setting in that segment will be dropped     Example 3     Switch       Figure 13 7 Typical QoS topology    13 11       As shown in the figure  inside the block is a QoS domain  Switch1 classifies different traffics and assigns  different IP precedences  For example  set CoS precedence for packets from segment 192 168 1 0 to 5 on  port ethernet1 1  The port connecting to switch2 is a trunk port  In Switch2  set port ethernet 1 1 that  connecting to swtich1 to trust CoS precedence  Thus inside the QoS domain  packets of different
82. 2    Switch3 Config If Ethernet1 12  speed duplex force1000 full  Switch3 Config If Ethernet1 12  exit       6 4 Port Troubleshooting    Here are some situations that frequently occurs in port configuration and the advised solutions    W Two connected fiber interfaces won t link up if one interface is set to auto negotiation but the other to  forced speed duplex  This is determined by IEEE 802 3    W The following combinations are not recommended  enabling traffic control as well as setting multicast  limiting for the same port  setting broadcast  multicast and unknown destination unicast control as well  as port bandwidth limiting for the same port  If such combinations are set  the port throughput may fall  below the expected performance     6 3    Chapter 7 Port Loopback Detection Function  Configuration    7 1 Introduction to Port Loopback Detection Function    With the development of switches  more and more users begin to access the network through Ethernet  switches  In enterprise network  users access the network through layer 2 switches  which means urgent  demands for both internet and the internal layer 2 Interworking  When layer 2 Interworking is required  the  messages will be forwarded through MAC addressing the accuracy of which is the key to a correct  Interworking between users  In layer 2 switching  the messages are forwarded through MAC addressing   Layer 2 devices learn MAC addresses via learning source MAC address  that is  when the port receives a  messag
83. 2 Layer    Interface Configuration Task 15                                        15 1   15 2 IP CONFIGURATION m                                                  15 2  15 2 4 IP Configuration  i3  iae                 NE e E quee d tae 15 2   15 2 2  Pv6 Troubleshootlhg    2  ct tiie danas 15 5   QN a                                                15 5  15 3 1 Introduction to ARP                         24000                                    rr rrr nnn rrr nnn 15 5   15 3 2 ARP Configuration Task List  uiri tti ni eer Pe tin iE i Ee eee 15 5   15 3 3 ARP Troubleshooting                    1 0 a            enne 15 5  CHAPTER 16 ARP SCANNING PREVENTION FUNCTION CONFIGURATION            16 1  16 1 INTRODUCTION TO ARP SCANNING PREVENTION FUNCTION                  eren nnne nnn 16 1  16 2 ARP SCANNING PREVENTION CONFIGURATION TASK SEQUENCE                 444444 4 4 444  4 4    16 1  16 3 ARP SCANNING PREVENTION TYPICAL EXAMPLES                eene nnne nnn nnne aa n aaa snas 16 3  16 4 ARP SCANNING PREVENTION TROUBLESHOOTING HELP                      eene nnne nnne 16 4  CHAPTER 17 ARP GUARD CONFIGURATION                                     4           annu anna 17 1  17 1 INTRODUCTION      ARP GUARD                               Lecsceceee recen ener enne eene nsns s essere sos            17 1  17 2 ARP GUARD CONFIGURATION TASK LIST                                                                s                 17 2  CHAPTER 18 DHCP CONFIGURATION                   eee nnn nua 
84. 200000 200000 200000  Port 3 200000 200000  _   Port 4 200000 200000  8 Port 5 200000 200000       Port 6 200000 200000   amp    Port7 200000 200000       By default  the MSTP establishes a tree topology  in blue lines  rooted with SwitchA  The ports marked with     x    are in the discarding status  and the other ports are in the forwarding status     Configurations Steps   Step 1  Configure port to VLAN mapping   W Create VLAN 20  30  40  50 in Switch2  Switch3 and Switch4      Set ports 1 7 as trunk ports in Switch2 Switch3 and Switch4   Step 2  Set Switch2  Switch3 and Switch4 in the same MSTP   W Set Switch2  Switch3 and Switch4 to have the same region name as mstp      Map VLAN 20 and VLAN 30 in Switch2  Switch3 and Switch4 to Instance 3  Map VLAN 40 and VLAN  50 in Switch2  Switch3 and Switch4 to Instance 4   Step 3  Set Switch3 as the root bridge of Instance 3  Set Switch4 as the root bridge of Instance 4     Set the bridge priority of Instance         Switch3 as 0      Set the bridge priority of Instance 4      Switch4 as 0     The detailed configuration is listed below     Switch2     Switch2 config  vlan 20  Switch2 Config Vlan20  exit  Switch2 config  vlan 30    Switch2 config  vlan 40  Switch2 Config Vlan40  exit  Switch2 config  vlan 50                  Switch2 Config Vlan30  exit                12 7    Switch2 Config Vlan50  exit  Switch2 config  spanning tree mst configuration    Switch2 Config Mstp Region  name mstp  Switch2 Config Mstp Region  instance 3 vla
85. 4000 primary port  Switch config lf Ethernet1 1  interface ethernet 1 2  Switch config If Ethernet1 2  mrpp ring 4000 secondary port  Switch config lf Ethernet1 2  exit                       Switch Config  interface ethernet 1 1                 Switch Config      SWITCH C configuration Task Sequence        Switch Config  mrpp enable  Switch Config  mrpp ring 4000  Switch mrpp ring 4000 Zcontrol vlan 4000  Switch mrpp ring 4000  enable  Switch mrpp ring 4000  exit    Switch config lf Ethernet1 1  mrpp ring 4000 primary port  Switch config lf Ethernet1 1  interface ethernet 1 2  Switch config If Ethernet1 2  mrpp ring 4000 secondary port  Switch config lf Ethernet1 2  exit                       Switch Config  interface ethernet 1 1                 Switch Config      SWITCH D configuration Task Sequence     Switch Config  mrpp enable  Switch Config  mrpp ring 4000  Switch mrpp ring 4000 Zcontrol vlan 4000  Switch mrpp ring 4000  enable  Switch mrpp ring 4000  exit    Switch config lf Ethernet1 1  mrpp ring 4000 primary port  Switch config lf Ethernet1 1  interface ethernet 1 2       Switch config If Ethernet1 2  mrpp ring 4000 secondary port  Switch config lf Ethernet1 2  exit   Switch Config                     Switch Config  interface ethernet 1 1                   31 13             31 4 MRPP Troubleshooting    The normal operation of MRPP protocol depends on normal configuration of each switch on MRPP ring     otherwise it is very possible to form ring and broadcast storm    
86. 5   4 4 SNMP CONFIGURATION  m                                        4 6  4 4 1 Introduction to SNMP              ssssssssssssssessssesee eene nnne                               inneren sensns 4 6  44 2 Introduction to  MIB      trt n ea ertet e Er teta d eei rd          4 7  4 4 3 Introduction to                        4 8    4 4 4 SNMP Configuration                  esses eene enne                   nes 4 9    4 4 5 Typical SNMP Configuration Examples                         sese 4 11  4 4 6 5       Troubleshooting    2  ri          eeu Eten n Mota rag added 4 13   4 5 SWITCH  UPGRADE mee E 4 13  4 5 1 Switch System                    2  4  4       1                      entente entes sn nnns en tenens 4 13  4 5 2 BootROM Upgrade    p eere eee te ales vete ae eec uae eee y lide eR eae utes 4 14  4 5 3 FTP TETP Upgrade    nace i ep EPRRO MIR PREIS 4 16  CHAPTER 5 CLUSTER                                                     2                      5 1  5 1 INTRODUCTION TO CLUSTER NETWORK MANAGEMENT                  eeceenn enne nennen nnne tnn nnne tren tnter tret 5 1   5 2 CLUSTER NETWORK MANAGEMENT CONFIGURATION SEQUENCE                      eene nnne 5 1   5 3 EXAMPLES OF CLUSTER ADMINISTRATION                    1 4  1 12 1   1 2 21  4      1  10000 tn nnn nnns th                                             5 5   5 4 CLUSTER ADMINISTRATION                5                                4 4 1  11 00221 2 01 71 074114011    1110110000      nnn nnne sn tnnt 5 5  CHAPTER 6 POR
87. 6 1 200 10 16 1 201                                 18 4       Switch dhcp A config  dns server 10 16 1 202  Switch dhcp A config  netbios name server 10 16 1 209  Switch dhcp A config  netbios node type H node  Switch dhcp A config  exit   Switch config  ip dhcp excluded address 10 16 1 200 10 16 1 201  Switch config  ip dhcp pool B   Switch dhcp B config  network 10 16 2 0 24  Switch dhcp B config  lease 1  Switch dhcp B config  default route 10 16 2 200 10 16 2 201  Switch dhcp B config  dns server 10 16 2 202  Switch dhcp B config  option 72 ip 10 16 2 209  Switch dhcp config  exit   Switch config  ip dhcp excluded address 10 16 2 200 10 16 2 201  Switch config  ip dhcp pool A1   Switch dhcp A1 config  host 10 16 1 210  Switch dhcp A1 config  hardware address 00 03 22 23 dc ab  Switch dhcp A1  config  exit       Usage Guide  When a DHCP BOOTP client is connected to a VLAN1 port of the switch  the client can only  get its address from 10 16 1 0 24 instead of 10 16 2 0 24  This is because the broadcast packet from the  client will be requesting the IP address in the same segment of the VLAN interface after VLAN interface  forwarding  and the VLAN interface IP address is 10 16 1 2 24  therefore the IP address assigned to the client    will belong to 10 16 1 0 24    If the DHCP BOOTP client wants to have an address in 10 16 2 0 24  the gateway forwarding broadcast  packets of the client must belong to 10 16 2 0 24  The connectivity between the client gateway and the switch  m
88. B LX SFP  1000BASE LX SFP transceiver   Single mode   1310nm   10km       MGB L30 SFP  1000BASE LX SFP transceiver   Single mode   1310nm   30km       MGB L50 SFP  1000BASE LX SFP transceiver   Single mode   1310nm   50km       MGB LA10 SFP  1000BASE LX SFP transceiver   WDM Single mode   TX  1310nm  RX  1550nm   10km       MGB LB10 SFP  1000BASE LX SFP transceiver   WDM Single mode   TX  1550nm  RX  1310nm    10km        It recommends using PLANET SFPs on the Managed Switch  If you insert a SFP  transceiver that is not supported  the Managed Switch will not recognize it           Before connect the other Managed Switches  workstation or Media Converter     1     Make sure both side of the SFP transceiver are with the same media type  for example  1000Base SX   to 1000Base SX  1000Bas LX to 1000Base L X    Check the fiber optic cable type match the SFP transceiver model     gt                     to 1000Base SX SFP transceiver  use the Multi mode fiber cable with one side must be  male duplex LC connector type     gt       connect to 1000Base LX SFP transceiver  use the Single mode fiber cable with one side must    2 6       be male duplex LC connector type     Connect the fiber cable   Attach the duplex LC connector on the network cable into the SFP transceiver    Connect the other end of the cable to a device     switches with SFP installed  fiber NIC on a workstation  or a Media Converter    Check the LNK ACT LED of the SFP slot on the front of the Managed Switch  Ensure t
89. Both the ISP internet and the clients can configure their own VLAN independently   It is obvious that  the dot1q tunnel function has got following characteristics   W Applicable through simple static configuration  no complex configuration or maintenance to be needed   W Operators will only have to assign one SPVID for each user  which increases the number of concurrent  supportable users  while the users has got the ultimate freedom in selecting and managing the VLAN  IDs  select within 1 4094 at users    will    W The user network is considerably independent  When the ISP internet is upgrading their network  the  user networks do not have to change their original configuration   Detailed description on the application and configuration of dot1q tunnel will be provided in this section     10 3 2 Dot1q tunnel Configuration    Configuration Task Sequence of Dot1q Tunnel     1  Configure the dot1q tunnel function on the ports  2  Configure the type of protocol  TPID  on the ports    10 9       1  Configure the dotiq tunnel function on the ports                   Command Explanation  Port mode  dotiq tunnel enable Enter exit the dot1q tunnel mode on the  no dotiq tunnel enable ports        2  Configure the type of protocol  TPID  on the ports       Command Explanation       Port mode       dot1iq tunnel tpid    Configure the type of protocol on port    0x8100 0x9100 0x9200  lt 1 65535 gt                  10 3 3 Typical Applications of the Dot1q tunnel    Scenario    Edge switch 
90. CP Address Pool Mode to Global Mode           ACL Mode  ACL type Entry Operates Exit  Standard     ACL   Type ip access list Configure parameters   Use the exit    Mode    standard command under    Global Mode     for Standard IP ACL  Mode     command to return  to Global Mode        Extended IP ACL  Mode          Type ip access list    extanded command under    Global Mode        Configure parameters  for Extended IP ACL  Mode        Use the exit  command to return  to Global Mode           3 2 2 Configuration Syntax    Switch provides various configuration commands  Although all the commands are different  they all abide by  the syntax for Switch configuration commands  The general commands format of Switch is shown below     cmdtxt   variable    enum1        enumN    option        optionN     Conventions  cmdtxt in bold font indicates a command keyword    variable   indicates a variable parameter    enum1         enumN   indicates a mandatory parameter that should be selected from the parameter set  enum1 enumN  and the square bracket       in  option        optionN  indicate an optional parameter  There  may be combinations of     lt   gt                and         in the command line  such as   lt variable gt     enum1  lt variable gt            2    option1  option2    etc     Here are examples for some actual configuration commands   W show version  no parameters required  This is a command with only a keyword and no parameter  just  type in the command to run      vla
91. Command    Explanation       Global configuration mode       anti arpscan recovery enable  no anti arpscan recovery enable    Enable      disable the automatic  recovery function        anti arpscan recovery time  lt seconds gt        no anti arpscan recovery time    Set automatic recovery time           6  Display relative information of debug information and ARP scanning       Command    Explanation          Global configuration mode          16 2                            anti arpscan log enable Enable or disable the log function of ARP                         no anti arpscan log enable scanning prevention    anti arpscan trap enable Enable or disable the SNMP Trap function  no anti arpscan trap enable of ARP scanning prevention    show anti arpscan  trust   ip   port   Display the state of operation and  supertrust port gt    prohibited   ip   port      configuration of ARP scanning prevention   Admin Mode   debug anti arpscan   port   ip   Enable or disable the debug switch of ARP  no debug anti arpscan   port   ip   scanning prevention        16 3 ARP Scanning Prevention Typical Examples        SWITCH B    Server  192 168 1 100 24    Figure 16 1 ARP scanning prevention typical configuration example    In the network topology above  port E1 1 of SWITCH B is connected to port E1 19 of SWITCH A  the port E1 2  of SWITCH A is connected to file server  IP address is 192 168 1 100   and all the other ports of SWITCH A  are connected to common PC  The following configuration 
92. DIUS  authentication server without Ethernet1 2  IP address of the server is 10 1 1 3 and the authentication port is    defaulted at 1812  accounting port is defaulted at 1813   Configure steps as below     Switch config  interface vlan 1   Switch Config if vian1  ip address 10 1 1 2 255 255 255 0   Switch Config if vlan1   exit   Switch config  radius server authentication host 10 1 1 3   Switch config  radius server accounting host 10 1 1 3    radius server key test           aaa enable  Switch config  aaa accounting enable    Switch config    Switch config                                 30 5       30 3 2 IPv6 RadiusExample    2004 1 2 3  2  2004 1 2 3  1 Radius Server  2004 1 2 3  3    Figure 30 3 The Topology of IPv6 Radius configuration    A computer connects to a switch  of which the IP address is 2004 1 2 3  2 and connected with a RADIUS  authentication server without Ethernet1 2  IP address of the server is 2004 1 2 3  3 and the authentication port  is defaulted at 1812  accounting port is defaulted at 1813    Configure steps as below        Switch config  interface vlan 1  Switch Config if vian1  ipv6 address 2004 1 2 3  2 64  Switch Config if vlan1   exit  Switch config  radius server authentication host 2004 1 2 3  3  Switch config  radius server accounting host 2004 1 2 3  3  Switch config  radius server key test                   Switch config  aaa enable  Switch config  aaa accounting enable       30 4 RADIUS Troubleshooting    In configuring and using RADIUS  
93. FREE RESOURCE related  accessing scheme  Please refer to relative documents for details     17 1       17 2 ARP GUARD Configuration Task List    1  Configure the protected IP address       Command Explanation       Port configuration mode       arp guard       lt          gt        Configure delete ARP GUARD address  no arp guard ip  lt addr gt                 17 2       Chapter 18 DHCP Configuration    18 1 Introduction to DHCP    DHCP  RFC2131  is the acronym for Dynamic Host Configuration Protocol  It is a protocol that assigns IP  address dynamically from the address pool as well as other network configuration parameters such as default  gateway  DNS server  and default route and host image file position within the network  DHCP is the  enhanced version of BOOTP  It is a mainstream technology that can not only provide boot information for  diskless workstations  but can also release the administrators from manual recording of IP allocation and  reduce user effort and cost on configuration  Another benefit of DHCP is it can partially ease the pressure on    IP demands  when the user of an IP leaves the network that IP can be assigned to another user    DHCP is a client server protocol  the DHCP client requests the network address and configuration parameters  from the DHCP server  the server provides the network address and configuration parameters for the clients   if DHCP server and clients are located in different subnets  DHCP relay is required for DHCP packets to be  
94. IEC 61000 4 11  2004     Responsible for marking this declaration if the    Manufacturer    Authorized representative established within the EU  Authorized representative established within the EU  if applicable     Company Name  Planet Technology Corp    Company Address  11F  No 96  Min Chuan Road  Hsin Tien  Taipei  Taiwan  R O C  Person responsible for making this declaration    Name  Surname Kent Kang    Position   Title   Product Manager  th fo 2  Taiwan 1 Sep  2010    Place Date Legal Signature    PLANET TECHNOLOGY CORPORATION       e mail  sales planet com tw     http    www planet com tw  11F  No  96  Min Chuan Road  Hsin Tien  Taipei  Taiwan  R O C  Tel 886 2 2219 9518 Fax 886 2 2219 9528    
95. IP protocols  if the       24 6                   lt dlpAddr gt   lt dMask gt     any destination       tos  lt tos gt   time range lt time range name gt       host destination  lt d pAddr gt     precedence  lt prec gt      numbered extended access list of  specified number does not exist   then an access list will be created  using this number        no access list  lt num gt           Deletes a numbered extensive IP  access list         3  Configuring a standard IP access list basing on nomenclature    a  Create a name based standard IP access list       Command    Explanation       Global Mode       ip access list standard  lt name gt   no ip access list standard  lt name gt        Creates    X standard IP  access list based on  nomenclature  the         ip  access list standard   lt name gt     command deletes the  name based standard IP  access list              b  Specify multiple    permit    or    deny    rules       Command    Explanation       Standard IP ACL Mode        no   deny   permit     lt s pAddr gt   lt sMask gt      any source    host source  lt slpAddr gt          Creates a standard  name based IP access rule  the     no    form command deletes the  name based standard IP       access rule        c  Exit name based standard IP ACL configuration mode       Command    Explanation       Standard IP ACL Mode       exit       Exits name based standard IP       ACL configuration mode         4  Configuring an name based extended IP access list    a  Create an e
96. LAN register information and population of such register  information to the other switches  Switches support GVRP can receive VLAN dynamic register information  from the other switches  and update local VLAN register information according the information received  The  switch enabled GVRP can also populate their own VLAN register information to the other switches  The  populated VLAN register information includes local static information manually configured and dynamic  information learnt from the other switches  Therefore  by populating the VLAN register information  VLAN  information consistency can be achieved among all GVRP enabled switches     10 5       10 2 2 GVRP Configuration Task List    1  Configuring GARP Timer parameters       Command Explanation       Port Mode       garp timer join  lt timer value gt   no garp timer join   garp timer leave  lt timer value gt  Configure the hold  join and  no garp timer leave leave timers for GARP    garp timer hold  lt timer value gt   no garp timer hold                Global Mode  garp timer leaveall  lt timer value gt  Configure the leave all timer for  no garp timer leaveall GARP           2  Enable GVRP function                      Command Explanation  Port Mode  gvrp Enable disable the GVRP  no gvrp function on current port   Global Mode  gvrp Enable disable the GVRP  no gvrp function for the switch           10 6       10 2 3 Typical GVRP Application    Scenario        Switch B    Switch C    PC    Figure 10 3 Typical G
97. LS TLS certificate   ertificate_verify  TLS change_cipher_spec  TLCS client key exchange   TLS certificate_verity   finished TLS change_cipher_spec  TLS finished     RADIUS Access Challenge   EAP Response EAP TLS   EAP Response EAP TLS   TLS change cp er spec  TLS change cipher spec   TLS finished TLS finished     E RADIUS Access Request  EAP Response EAP TLS  EAP Response EAP TLS     RADIUS Access Accept  EAP Success  EAP Success     Figure 25 10 the Authentication Flow of 802 1x EAP TLS    3  EAP TTLS Authentication Method   EAP TTLS is a product of the cooperation of Funk Software and Certicom  It can provide an authentication as  strong as that provided by EAP TLS  but without requiring users to have their own digital certificate  The only  request is that the Radius server should have a digital certificate  The authentication of users    identity is  implemented with passwords transmitted in a safely encrypted tunnel established via the certificate of the  authentication server  Any kind of authentication request including EAP  PAP and MS CHAPV2 can be  transmitted within TTLS tunnels     4  PEAP Authentication Method   EAP PEAP is brought up by Cisco  Microsoft and RAS Security as a recommended open standard  It has long  been utilized in products and provides very good security  Its design of protocol and security is similar to that  of EAP TTLS  using a server s PKI certificate to establish a safe TLS tunnel in order to protect user    authentication     25 9       Th
98. M PLANET    Networking  amp  Communication    WGSW 50040    50 Port 10 100 1000Mbps Se  with 4 Shared SFP      Managed Gigabit Switch    N 3         jV o 1                                       Ls  wm i    _       Trademarks    Copyright    PLANET Technology Corp  2010    Contents subject to which revision without prior notice    PLANET is a registered trademark of PLANET Technology Corp  All other trademarks belong to their  respective owners     Disclaimer    PLANET Technology does not warrant that the hardware will work properly in all environments and  applications  and makes no warranty and representation  either implied or expressed  with respect to the  quality  performance  merchantability  or fitness for a particular purpose  PLANET has made every effort to  ensure that this User s Manual is accurate  PLANET disclaims liability for any inaccuracies or omissions that  may have occurred     Information in this User s Manual is subject to change without notice and does not represent a commitment on  the part of PLANET  PLANET assumes no responsibility for any inaccuracies that may be contained in this  User s Manual  PLANET makes no commitment to update or keep current the information in this User s  Manual  and reserves the right to make improvements to this User s Manual and or to the products described  in this User s Manual  at any time without notice     If you find information in this manual that is incorrect  misleading  or incomplete  we would appreciate your  c
99. MP is an evolving protocol  SNMP v1  RFC1157  is the first version of  SNMP which is adapted by vast numbers of manufacturers for its simplicity and easy implementation  SNMP  v2c is an enhanced version of SNMP v1  which supports layered network management  SNMP v3  strengthens the security by adding USM  User based Security Mode  and VACM  View based Access    Control Model      SNMP protocol provides a simple way of exchange network management information between two points in  the network  SNMP employs a polling mechanism of message query  and transmits messages through UDP   a connectionless transport layer protocol   Therefore it is well supported by the existing computer networks     SNMP protocol employs a station agent mode  There are two parts in this structure  NMS  Network    4 6                Management Station  and Agent  NMS is the workstation on which SNMP client program is running  It is the  core on the SNMP network management  Agent is the server software runs on the devices which need to be  managed  NMS manages all the managed objects through Agents  The switch supports Agent function     The communication between NMS and Agent functions in Client Server mode by exchanging standard  messages  NMS sends request and the Agent responds  There are seven types of SNMP message         Get Request  Get Response  Get Next Request  Get Bulk Request  Set Request   Trap    Inform Request    NMS sends queries to the Agent with Get Request  Get Next Request  Get Bulk 
100. MS obtains the network  management information by visiting the MIB of SNMP Agent     The switch can operate as a SNMP Agent  and supports both SNMP v1 v2c and SNMP v3  The switch  supports basic MIB Il  RMON public        and other public MID such as BRIDGE MIB  Besides  the switch  supports self defined private MIB     4 4 3 Introduction to RMON    RMON is the most important expansion of the standard SNMP  RMON is a set of MIB definitions  used to  define standard network monitor functions and interfaces  enabling the communication between SNMP  management terminals and remote monitors  RMON provides a highly efficient method to monitor actions  inside the subnets     MID of RMON consists of 10 groups  The switch supports the most frequently used group 1  2  3 and 9        Statistics  Maintain basic usage and error statistics for each subnet monitored by the Agent    B History  Record periodical statistic samples available from Statistics       Alarm  Allow management console users to set any count or integer for sample intervals and alert  thresholds for RMON Agent records           Event  A list of all events generated by RMON Agent     Alarm depends on the implementation of Event  Statistics and History display some current or history subnet  statistics  Alarm and Event provide a method to monitor any integer data change in the network  and provide  some alerts upon abnormal events  sending Trap or record in logs      4 4 4 SNMP Configuration    4 4 4 1 SNMP Configuration
101. ORD  Create delete VLAN or enter VLAN Mode  no vlan WORD          2  Set or delete VLAN name       Command Explanation       Global Mode  name   vlan name         Set or delete VLAN name              no name       3  Assigning Switch ports for VLAN       Command Explanation       VLAN Mode  switchport interface  lt interface list gt   no switchport interface   interface list               Assign Switch ports to VLAN           4  Set the Switch Port Type       Command Explanation       Port Mode       Set the current port as Trunk or Access    switchport mode  trunk   access     port                 10 2       5  Set Trunk port    Command    Explanation       Port Mode       switchport trunk allowed vian  WORD   all    add WORD   except WORD remove  WORD    no switchport trunk allowed vlan    Set delete VLAN allowed to be crossed  by Trunk  The    no    command restores  the default setting        switchport trunk native vlan  lt vilan id gt   no switchport trunk native vlan          Set delete PVID for Trunk port        6  Set Access port       Command    Explanation       Port Mode       switchport access vlan   vlan id    no switchport access vlan          Add the current port to the specified  VLAN  The  no  command restores the  default setting        T  Disable Enable VLAN Ingress Rules       Command    Explanation       Port Mode       vlan ingress enable  no vlan ingress enable          Enable Disable VLAN ingress rules        8  Configure Private VLAN       Command   
102. PE1 and PE2 of the ISP internet forward the VLAN200 300 data between CE1 and CE2 of the  client network with VLAN3  The port1 of        is connected to CE1  port10 is connected to public network  the  TPID of the connected equipment is 9100  port1 of PE2 is connected to CE2  port10 is connected to public                network   Configuration Item Configuration Explanation  VLANS3 Porti of PE1 and PE2   dotiq tunnel Porti of PE1 and PE2   tpid 9100                Configuration procedure is as follows     PE1     Switch config  vlan 3  Switch Config Vlan3  switchport interface ethernet 1 1  Switch Config Vlan3  exit   Switch config  interface ethernet 1 1  Switch Config Ethernet1 1   dot1q tunnel enable  Switch Config Ethernet1 1 3 exit  Switch Config  interface ethernet 1 10  Switch Config Ethernet1 10  switchport mode trunk  switch Config Ethernet1 10  dot1 q tunnel tpid 0  9100  Switch Config Ethernet1 10  exit   Switch Config                                   10 10       PE2     Switch config  vlan 3  Switch Config Vlan3  switchport interface ethernet 1 1  Switch Config Vlan3 ztexit   Switch Config  interface ethernet 1 1  Switch Config Ethernet1 1   dot1q tunnel enable  Switch Config Ethernet1 1   exit  Switch config  interface ethernet 1 10  Switch Config Ethernet1 10  switchport mode trunk  switch Config Ethernet1 10  dot1 g tunnel tpid 0  9100  Switch Config Ethernet1 10  exit   Switch Config                                   10 3 4 Dot1q tunnel Troubleshooting       E
103. Request and Set Request  messages  and the Agent  upon receiving the requests  replies with Get Response message  On some  special situations  like network device ports are on Up Down status or the network topology changes  Agents  can send Trap messages to NMS to inform the abnormal events  Besides  NMS can also be set to alert to  some abnormal events by enabling RMON function  When alert events are triggered  Agents will send Trap  messages or log the event according to the settings  Inform Request is mainly used for inter NMS  communication in the layered network management     USM ensures the transfer security by well designed encryption and authentication  USM encrypts the  messages according to the user typed password  This mechanism ensures that the messages can t be  viewed on transmission  And USM authentication ensures that the messages can t be changed on  transmission  USM employs DES CBC cryptography  And HMAC MD5 and HMAC SHA are used for  authentication     VACM is used to classify the users  access permission  It puts the users with the same access permission in  the same group  Users can t conduct the operation which is not authorized     4 4 2 Introduction to MIB    The network management information accessed by NMS is well defined and organized in a Management  Information Base  MIB   MIB is pre defined information which can be accessed by network management  protocols  It is in layered and structured form  The pre defined management information can be obt
104. Snooping       Command    Explanation       Global Mode       ip igmp snooping  no ip igmp snooping          Enables IGMP Snooping  The no operation  disables IGMP Snooping function        2  Configure IGMP Snooping       Command    Explanation       Global Mode       ip igmp snooping vlan  lt vlan id gt   no ip igmp snooping vlan  lt vlan id gt     Enables IGMP Snooping for specified VLAN   The no operation disables IGMP Snooping for  specified VLAN             igmp snooping vlan  lt  vian id  gt  limit   group  lt g_limit gt    source  lt s_limit gt    no      igmp snooping vlan  lt  vian id  gt  limit    Configure the max group count of vlan and  the max source count of every group  The    no  ip igmp snooping vlan   v an id   limit   command cancels this configuration        ip igmp snooping vlan   v an id   I2 general querier   no ip igmp snooping vlan   v an id   I2 general querier    Set this vlan to layer 2 general querier  It is  recommended to configure a layer 2 general  querier on a segment  The  no ip igmp  snooping vlan  lt vian id gt   I2 general querier command cancels this  configuration        ip igmp snooping vlan   vlan id   I2 general querier version  lt version gt     Configure the version number of a general  query from a layer 2 general querier             igmp snooping vlan   vlan id   I2 general querier source  lt source gt     Configure the source address of a general  query from a layer 2 general querier             igmp snooping vlan  lt vlan id g
105. SwitchB  Config lf Ethernet1 6  port group 2 mode on  SwitchB  Config If Ethernet1 6  exit          SwitchB  config  interface ethernet 1 8 10  SwitchB  Config If Port Range Zport group 2 mode on       8 4       SwitchB  Config If Port Range  exit    Configuration result    Add ports 1  2  3  4 of Switch 1 to port group 1 in order  and we can see a group in    on    mode is completely  joined forcedly  switch in other ends won   t exchange LACP BPDU to complete aggregation  Aggregation  finishes immediately when the command to add port 2 to port group 1 is entered  port 1 and port 2 aggregate  to be port channel 1  when port 3 joins port group 1  port channel 1 of port 1 and 2 are ungrouped and  re aggregate with port 3 to form port channel 1  when port 4 joins port group 1  port channel 1 of port 1  2 and  3 are ungrouped and re aggregate with port 4 to form port channel 1   It should be noted that whenever a new  port joins in an aggregated port group  the group will be ungrouped first and re aggregated to form a new  group   Now all four ports in both SwitchA and SwitchB are aggregated in            mode and become an  aggregated port respectively     8 4 Port Channel Troubleshooting    If problems occur when configuring port aggregation  please first check the following for causes    W Ensure all ports in a port group have the same properties  i e   whether they are in full duplex mode   forced to the same speed  and have the same VLAN properties  etc  If inconsistency oc
106. T                                                                            6 1  6 1 INTRODUCTION TO  PORT       2  ido ae iste dc Bae Aladin serius                                6 1   6 2 NETWORK PORT CONFIGURATION TASK 1  5                             0           6 1   6 3 PORT CONFIGURATION EXAMPLE   00                     0000  6 2   6 4 PORT                  5                   0                          6 3  CHAPTER 7 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION              7 4  7 1 INTRODUCTION TO PORT LOOPBACK DETECTION FUNCTION        2   2 cecceseeeceseeeeeeeseseeneeseaeeaeeseenaneseeseenaees 7 4   7 2 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION TASK LIST        2  2 cee eeeeeeeeeseeseeeeeseeeeneeeeseeneees 7 4   7 3 PORT LOOPBACK DETECTION FUNCTION                                                           7 6   7 4 PORT LOOPBACK DETECTION       0                                                                                 7 6  CHAPTER 8 PORT CHANNEL CONFIGURATION                                             1            8 1  8 1 INTRODUCTION TO PORT                                2  44      8  0  000  80  40                 8 1   8 2 PORT CHANNEL CONFIGURATION TASK                                              8 2   8 3 PORT CHANNEL                                          4 210111    aa            ae aa     8 3   8 4 PORT CHANNEL TROUBLESHOOTING                                    8    0                               8 5  CHAPTER 9 JUMBO                   
107. TO MAC                                                    11 1  11 11 Obtaining  MAG Table                                                          11 1  1151 2 Forward or FIlter     er cei la      tto o ee ee ae naan 11 3   11 2 MAC ADDRESS TABLE CONFIGURATION TASK                                                       11 3   11 3 TYPICAL CONFIGURATION EXAMPLES          ccessecceeessecceeeseeeeeenseaeeeenseaeseenseaeeeensaeeeenseaeeeenseaeeeenseeeeenas 11 4   11 4 MAC TABLE                5                   2 2                                     11 5   11 5 MAC ADDRESS FUNCTION                       0                         11 5  11 5 1 MAC Address Binding              202  00   0  00000000000130100 A eE Uea E                  11 5   CHAPTER 12 MSTP CONFIGURATION             cc2cceac ccu cec cea eee ru ceca eae eco ccce 12 1   12   INTRODUCTION TOMS TP            5  ater uec               ctae                 12 1  TAA                   s ti teet      title de tid etat tud 12 1  12 12  Port  holes               ee tee        vh      eene          12 3  12 1 3 MSTP Eo  d  Balarice        5    o ett aeree a teet ade i pe          12 3   12 2 MSTP CONFIGURATION TASK   5                                              12 3   PESO                                                     12 6   12 4 MSTP TROUBLESHOOTING                                                                                                                                                                          
108. The no  no debug loopback detection operation of this command will disable the    debug information        Display the state and result of the loopback  show loopback detection  interface   detection of all ports  if no parameter is      interface list    provided  otherwise  display the state and          result of the corresponding ports           5  Configure the loopback detection control mode  automatic recovery enabled or not        Command Explanation       Global Mode          Configure the loopback detection control  loopback detection control recovery      mode  automatic recovery enabled or not  or  timeout  lt 0 3600 gt           recovery time           7 5    7 3 Port Loopback Detection Function Example    SWITCH       at            Network Topology    Figure 7 1 A typical example of port loopback detection    As shown in the above configuration  the switch will detect the existence of loopbacks in the network topology   After enabling the function of loopback detection on the port connecting the switch with the outside network   the switch will notify the connected network about the existence of a loopback  and control the port on the    Switch to guarantee the normal operation of the whole network     The configuration task sequence of SWITCH     Switch config  loopback detection interval time 35 15       Switch   Switch   Switch Config If Ethernet1 1 zloopback detection control block    config  interface ethernet 1 1  Config lf Ethernet1 1  loopback detection 
109. This command is not supported by switch    lt packets gt    no cpu rx ratelimit channel   lt channel  id gt    Admin Mode          Show the information of the CPU received  show cpu rx protocol   lt protocol type gt    packets of the protocol type        debug driver  receive send   interface Turn on the showing of the CPU receiving or    lt interface name gt   all    protocol sending packet informations     lt protocol type gt   discard  all   detail              Turn off the showing of the CPU receiving or  no debug driver  receive  send              sending packet informations        37 1       Chapter 38 APPENDEX A    38 1 A 1 Switch s RJ 45 Pin Assignments    1000Mbps  1000Base T    Contact MDI MDI X  1 BI DA   BI DB    2 BI_DA  BI DB   3      DB   BI DA    4 BI DC   BI DD    5 BI DC  BI DD   6 BI DB  BI DA   7 BI DD   BI DC    8 BI DD  BI DC     Implicit implementation of the crossover function within a twisted pair cable  or at a wiring panel  while not  expressly forbidden  is beyond the scope of this standard     38 2 A 2 10 100Mbps  10 100Base TX    When connecting your 10 100Mbps Ethernet Switch to another switch  a bridge or a hub  a straight or  crossover cable is necessary  Each port of the Switch supports auto  MDI MDI X detection  That means you  can directly connect the Switch to any Ethernet devices without making a crossover cable  The following table  and diagram show the standard RJ 45 receptacle  connector and their pin assignments     RJ 45 Connector pi
110. VRP Application Topology    To enable dynamic VLAN information register and update among switches  GVRP protocol is to be configured  in the switch  Configure GVRP in Switch A  B and C  enable Switch B to learn VLAN100 dynamically so that  the two workstation connected to VLAN100 in Switch A and C can communicate with each other through  Switch B without static VLAN100 entries     Configuration Item Configuration description    VLAN100 Port 2  6 of Switch A and C     Trunk port Port 11 of Switch A and C  Port 10  11 of Switch B   Global GVRP Switch A  B  C   Port GVRP Port 11 of Switch A and C  Port 10  11 of Switch B     Connect the two workstation to the VLAN100 ports in switch A and B  connect port 11 of Switch A to port 10 of  Switch B  and port 11 of Switch B to port 11 of Switch C        The configuration steps are listed below     Switch A     Switch config   gvrp    Switch config  vlan 100  Switch Config Vlan100  switchport interface ethernet 1 2 6       10 7       Switch Config Vlan100  exit       Switch config  interface Ethernet 1 11  Switch Config lf Ethernet1 11  switchport mode trunk  Switch Config If Ethernet1 11 3  gvrp  Switch Config If Ethernet1 11 z exit       Switch B     Switch config   bridge ext gvrp  Switch config  interface ethernet 1 10  Switch Config If Ethernet1 10  switchport mode trunk  Switch Config If Ethernet1 10 2 gvrp  Switch Config If Ethernet1 10 zexit  Switch config  interface ethernet 1 11  Switch Config lf Ethernet1 11  switchport mode 
111. W4    Figure 5 1 Examples of Cluster    Configuration Procedure  1  Configure the command switch  Configuration of SW1     Switch config  cluster run                  Switch config  Switch     cluster ip pool 10 2 3 4    config  cluster commander 5526                     Switch config  cluster auto add    2  Configure the member switch  Configuration of SW2 SW4    Switch config  cluster run    5 4 Cluster Administration Troubleshooting    When encountering problems in applying the cluster admin  please check the following possible causes    W  f the command switch is correctly configured and the auto adding function  cluster auto add  is  enabled  If the ports connected the command switch and member switch belongs to the cluster vlan    W After cluster commander is enabled in VLAN1 of the command switch  please don t enable a routing  protocol  RIP  OSPF  BGP  in this VLAN in order to prevent the routing protocol from broadcasting the  private cluster addresses in this VLAN to other switches and cause routing loops    W Whether the connection between the command switch and the member switch is correct  We can use  the debug cluster packets to check if the command and the member switches can receive and process  related cluster admin packets correctly     5 5    Chapter 6 Port Configuration    6 1 Introduction to Port    Switch contain Cable ports and Combo ports  The Combo ports can be configured to as either 1000GX TX  ports or SFP Gigabit fiber ports    If the user needs to
112. ablished  Accordingly  they can configure and manage the member  switches through the commander switch  When the member switches are distributed in various physical  locations  Such as on the different floors of the same building   cluster network management has obvious  advantages  Moreover  cluster network management is an in band management  The commander switch can  communicate with member switches in existing network  There is no need to build a specific network for  network management     Cluster network management has the following features   W Save IP addresses  Simplify configuration tasks  Indifference to network topology and distance limitation  Auto detecting and auto establishing  With factory default settings  multiple switches can be managed through cluster network management    The commander switch can upgrade and configure any member switches in the cluster    5 2 Cluster Network Management Configuration Sequence    Cluster Network Management Configuration Sequence   1  Enable or disable cluster function  2  Create cluster  1  Configure private IP address pool for member switches of the cluster  2  Create or delete cluster  3  Add or remove a member switch       Configure attributes of the cluster in the commander switch  1  Enable or disable automatically adding cluster members    Set automatically added members to manually added ones  3  Set or modify the time interval of keep alive messages on switches in the cluster     Set or modify the max number of los
113. ac      host source mac lt host_smac gt     lt smac gt  lt smac ma       Creates a numbered    mac igmp extended mac ip       24 11                   sk gt     any destination mac  host destination mac   lt host_dmac gt     lt dmac gt  lt dmac mask gt   igmp     lt source gt  lt source wildcard gt   any source    host source lt source host ip gt        lt destination gt  lt destination wildcard gt   any destinati  on   host destination lt destination host ip gt       lt igmp type gt    precedence   precedence     tos      tos    time range  lt time range name gt      access rule  if the numbered  extended access list   of  specified number does not  exist  then an access list will    be created using this number        access list lt num gt  deny permit  any source mac    host source mac lt host_smac gt     lt smac gt  lt smac ma  sk gt    any destination mac  host destination mac   lt host_dmac gt     lt dmac gt  lt dmac mask gt   tcp     lt source gt  lt source wildcard gt   any source    host source lt source host ip gt     s port    lt port1 gt     range  lt sPortMin gt   lt sPortMax gt         lt destination gt  lt destination wildcard gt   any destinati  on   host destination  lt destination host ip gt     d port     lt port3 gt    range  lt sPortMin gt   lt sPortMax gt       ack fin psh rst urg syn   precedence   lt                      gt    tos     lt tos gt   time range lt time range name gt      Creates a numbered mac ip    extended               access  rule  if t
114. ace for the port  the           ethernet  lt  FNAME gt   lt IFNAME gt   access group  lt                gt        access group  lt ac iname gt  redirect redirect    command is used to             delete flow based redirection        2  Check the current flow based redirection configuration       Command Explanation  Global Mode Admin Mode          r   Display the information of  show flow based redirect  interface  ethernet     lt IFNAME gt    lt IFNAME gt       current flow based redirection          in the system port           14 13       14 3 Flow based Redirection Examples    Example    User   s request of configuration is listed as follows  redirecting the frames whose source IP is 192 168 1 111  received from port 1 to port 6  that is sending the frames whose source IP is 192 168 1 111 received from port  1 through port6     Modification of configuration     1  Set an ACL  the condition to be matched is  source IP is 192 168 1 111   2  Apply the redirection based on this flow to port 1     The following is the configuration procedure     Switch config  access list 1 permit host 192 168 1 111    Switch config  interface ethernet 1 1  Switch Config If Ethernet1 1   access group 1 redirect to interface ethernet 1 6       14 4 Flow based Redirection Troubleshooting Help    When the configuration of flow based redirection fails  please check that whether it is the following reasons  causing the problem    W The type of flow  ACL  can only be digital standard IP ACL  digital
115. ada sa              RR                      RR NR nnmnnn AR RR        nan 27 3  CHAPTER 28 SECURITY FEATURE CONFIGURATION                        cerner 28 1  28 1 INTRODUCTION TO SECURITY FEATURE                                                                                                                                                             28 1  28 2 SECURITY FEATURE CONFIGURATION                                                                                                                                                                   a 28 1  28 2 1 Prevent IP Spoofing Function Configuration Task Sequence                                               28 1   28 2 2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence               28 1   28 2 3 Anti Port Cheat Function Configuration Task                                                                        28 2   28 2 4 Prevent TCP Fragment Attack Function Configuration Task Sequence                               28 2   28 2 5 Prevent ICMP Fragment Attack Function Configuration Task Sequence                             28 3   28 3 SECURITY FEATURE                   cce inueni rernm                                        slust  tecdecsndeusavcaenocdcuedsenesvewe 28 3  CHAPTER 29 TACACS                                                     2          1      nnn nnn nana 29 1  29 1 INTRODUCTION TO            5                                          RR RR Rasa Rasa sa sa sa sa sa sa rasa sa sa
116. address list for the destination MAC address  If  any matching list entry is found  the switch will transmit the data frame via the corresponding port  or  the  switch will broadcast the data frame over the VLAN it belongs to  If the dynamically learnt MAC address  matches no transmitted data in a long time  the switch will delete it from the MAC address list   Usually the switch supports both the static configuration and dynamic study of MAC address  which means  each port can have more than one static set MAC addresses and dynamically learnt MAC addresses  and  thus can implement the transmission of data traffic between port and known MAC addresses  When a MAC  address becomes out of date  it will be dealt with broadcast  No number limitation is put on MAC address of  the ports of our current switches  every port can have several MAC addressed either by configuration or study   until the hardware list entries are exhausted  To avoid too many MAC addresses of a port  we should limit the  number of MAC addresses a port can have   To summer up  it is very meaningful to develop the number limitation function of port  MAC in VLAN  Switch  can control the number of MAC address of ports and VLAN through configuration commands    Limiting the number of dynamic MAC of ports    1  Limiting the number of dynamic MAC  If the number of dynamically learnt MAC address of VLAN by the  switch is already larger than or equal with the max number of dynamic MAC address  then shutdown the MAC  
117. ade  the configuration should like      Boot   setconfig  Host IP Address   10 1 1 1  192 168 1 2  Server IP Address   10 1 1 2  192 168 1 66    FTP 1  or TFTP 2    1  2  Network interface configure OK            Boot     Step 4    Enable FTP TFTP server in the PC  For TFTP  run TFTP server program  for FTP  run FTP server program   Before start downloading upgrade file to the switch  verify the connectivity between the server and the switch  by ping from the server  If ping succeeds  run    load    command in the BootROM mode from the switch  if it fails   perform troubleshooting to find out the cause  The following is the configuration for the system update image  file      Boot   load nos img  Loading       Loading file ok        Step 5   Execute    write nos img    in BootROM mode  The following saves the system update image file        Boot   write nos img      File nos img exists  overwrite   Y N   N      Wiritingimossimgees oe voe de E           Write nos img OK    Boot         Step 6   The following update file boot rom  the basic environment is the same as Step 4      Boot   load boot room  Loading       Loading file ok        Step 7   Execute    write boot rom  in BootROM mode  The following saves the update file      Boot   write boot rom    File boot rom exists  overwrite   Y N   N  y    Writing boot rom  Write boot rom OK    Boot         4 15       Step 8   After successful upgrade  execute run or reboot command in BootROM mode to return to CLI configuration  int
118. age  such as source IP address or source MAC IP address  with the  configured hardware address pool  If there is an entry in the address pool matching the information  source IP  address or source MAC IP address   the message will be forwarded  otherwise  dumped  The reason why  source IP based AM should be supplemented by source MAC IP based AM is that IP address of a host might  change  Only with a bound IP  can users change the IP of the host into forwarding IP  and hence enable the  messages from the host to be forwarded by the switch  Given the fact that MAC IP can be exclusively bound  with a host  it is necessary to make MAC IP bound with a host for the purpose of preventing users from    maliciously modifying host IP to forward the messages from their hosts via the switch    With the interface bound attribute of AM  network mangers can bind the IP  MAC IP  address of a legal user  to a specified interface  After that  only the messages sending by users with specified IP  MAC IP  addresses  can be forwarded via the interface  and thus strengthen the monitoring of the network security     27 2 AM Function Configuration Task List      Enable AM function     Enable AM function on an interface     Configure the forwarding IP     Configure the forwarding MAC IP     Delete all of the configured IP or MAC IP or both    Display relative configuration information of AM             Wn      1  Enable AM function       Command Explanation       Global Mode  am enable       Globall
119. aged Switch     20999  inl    1     m       Figure 2 5 Attach brackets to the Managed Switch        You must use the screws supplied with the mounting brackets  Damage caused to the  parts by using incorrect screws would invalidate the warranty        Step3  Secure the brackets tightly    Step4  Follow the same steps to attach the second bracket to the opposite side    Step5  After the brackets are attached to the Managed Switch  use suitable screws to securely attach the  brackets to the rack  as shown in Figure 2 6          Figure 2 6 Mounting WGSW 50040 in a Rack  Step6  Proceeds with the steps 4 and steps 5 of session 2 2 1 Desktop Installation to connect the network  cabling and supply power to the Managed Switch     2 5       2 2 3 Installing the SFP transceiver    The sections describe how to insert an SFP transceiver into an SFP slot     The SFP transceivers are hot pluggable and hot swappable  You can plug in and out the transceiver to from  any SFP port without having to power down the Managed Switch  As the Figure 2 7 appears        124          SFP transceiver  27    1000Base SX LX  LC Fiber    Figure 2 7 Plug in the SFP transceiver    Approved PLANET SFP Transceivers    PLANET Managed Switch supports both Single mode and Multi mode SFP transceiver  The following list of  approved PLANET SFP transceivers is correct at the time of publication     Gigabit SFP Transceiver modules       MGB SX SFP  1000BASE SX SFP transceiver   Multi mode   850nm   220m  550m       MG
120. ained from  monitored network devices  ISO ASN 1 defines a tree structure for MID  Each MIB organizes all the available  information with this tree structure  And each node on this tree contains an OID  Object Identifier  and a brief  description about the node  OID is a set of integers divided by periods  It identifies the node and can be used  to locate the node in a MID tree structure  shown in the figure below        Root          Node  2     Node  1  Node  2     Object  1  Node  1  Object  2     ObjectA 1     Figure 4 1 ASN 1 Tree Instance    In this figure  the OID of the object Ais 1 2 1 1  NMS can locate this object through this unique OID and gets  the standard variables of the object  MIB defines a set of standard variables for monitored network devices by  following this structure     If the variable information of Agent MIB needs to be browsed  the MIB browse software needs to be run on the  NMS  MIB in the Agent usually consists of public MIB and private MIB  The public MIB contains public network  management information that can be accessed by all NMS  private MIB contains specific information which  can be viewed and controlled by the support of the manufacturers     MIB I  RFC1156  is the first implemented public MIB of SNMP  and is replaced by MIB II  RFC1213   MIB II  expands           and keeps the OID of MIB tree      MIB I  MIB II contains sub trees which are called groups   Objects in those groups cover all the functional domains in network management  N
121. amples of IPv4 Radius                                    25 19  25 3 3 Examples of IPv6 Radius                                  25 20  25 3 4 802 1   Web Proxy Authentication Sample Application                                                       25 21  25 4802 1X TROUBLESHOOTING sic  seccecsesscccdessedceccdsccccdesseccecsesdecedessnacesesscccedesseacessedaceseasnncessascucceeasnaces 25 22    CHAPTER 26 THE NUMBER LIMITATION FUNCTION OF PORT  MAC IN VLAN                                                        4424 4  4  422200     26 1  26 1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF PORT  MAC IN VLAN                                 26 1  26 2 THE NUMBER LIMITATION FUNCTION OF           MAC IN VLAN CONFIGURATION TASK SEQUENCE        26 1  26 3 THE NUMBER LIMITATION FUNCTION OF PORT  MAC IN VLAN TYPICAL                                              26 3  26 4 THE NUMBER LIMITATION FUNCTION OF PORT  MAC IN VLAN TROUBLESHOOTING                             26 3   CHAPTER 27 OPERATIONAL CONFIGURATION OF AM FUNCTION                          27 1  27 1 INTRODUCTION TO AM FUNCTION                   eese neret               27 1  27 2 AM FUNCTION CONFIGURATION TASK LIST                            rennen nennen                                 27 1    27 3 AM FUNCTION EXAMPLE rerema E                                                                                                  27 3    27 4 AM FUNCTION TROUBLESHOOTING                                                      aa aa u
122. are configured      the VLAN  the ACL configuration of the VLAN will be  removed  And it can not recover if new interfaces are added to the VLAN          When the interface mode is changed from access mode to trunk mode  the ACL configured in VLAN  interface mode which is bound to physical interface will be removed  And when the interface mode is  changed from trunk mode to access mode  ACL configured in VLAN1 interface mode will be bound to  the physical interface  If binding fails  the changing will fail either       When removing a VLAN configuration  if there are any ACLs bound to the VLAN  the ACL will be    24 22       removed from all the physical interfaces belonging to the VLAN  and it will be bound to VLAN 1 ACL if  ACL is configured in VLAN1   If VLAN 1 ACL binding fails  the VLAN removal operation will fail     24 23       Chapter 25 802 1x Configuration    25 1 Introduction to 802 1x    The 802 1x protocol originates from 802 11 protocol  the wireless LAN protocol of IEEE  which is designed to  provide a solution to doing authentication when users access a wireless LAN  The LAN defined in IEEE 802  LAN protocol does not provide access authentication  which means as long as the users can access a LAN  controlling device  such as a LAN Switch   they will be able to get all the devices or resources in the LAN   There was no looming danger in the environment of LAN in those primary enterprise networks    However  along with the boom of applications like mobile office
123. ast   unknown destinations  short for broadcast    multicast    packets   and sets the allowed broadcast packet  number  the no format of this command  disables the broadcast storm control function          Configure port scan mode as interrupt or poll  port scan mode  interrupt   poll   mode  the no command restores the default  no port scan mode          port scan mode           6 3 Port Configuration Example              Switch 1 1 7          1 12 1 8 Switch 2       Switch 3    6 2    Figure 6 1 Port Configuration Example    No VLAN has been configured in the switches  default VLAN1 is used                                   Switch Port Property  Switch 1 7 Ingress bandwidth limit  150 M  Switch2 1 8 Mirror source port   1 9 100Mbps full  mirror source port   1 10 1000Mbps full  mirror destination port  Switch3 1 12 100Mbps full       The configurations are listed below   Switch1     Switch1 config  interface ethernet 1 7    Switch 1 Config lf Ethernet1 7  bandwidth control 50 both       Switch2     Switch2 config  interface ethernet 1 9   Switch2 Config If Ethernet1 9  speed duplex force 100 full   Switch2 Config lf Ethernet1 9  exit   Switch2 config  interface ethernet 1 10   Switch2 Config If Ethernet1 10   speed duplex force1000 full   Switch2 Config lf Ethernet1 10  exit   Switch2 config  monitor session 1 source interface ethernet1 8 1 9          Switch2 config  monitor session 1 destination interface ethernet 1 10    Switch3     Switch3 config  interface ethernet 1 1
124. ast IP messages  the destination MAC address it uses is the receiver s MAC  address  But in transmitting Multicast packets  the transmission destination is not a specific receiver any more   but a group with uncertain members  thus Multicast MAC address is used  Multicast MAC address is  corresponding to Multicast IP address  It is prescribed in IANA  Internet Assigned Number Authority  that the  higher 25 bits in Multicast MAC address is 0x01005e  and the lower 23bits in MAC address is the lower 23bits    21 12       in Multicast IP address   Since only 23bits out of the lower 28bits in IP Multicast address are mapped into MAC address  therefore  there are 32 IP Multicast addresses which are mapped into the same MAC address     21 1 3 IP Multicast Packet Transmission    In Multicast mode  the source host sends packets to the host group indicated by the Multicast group address  in the destination address field of IP data packet  Unlike Unicast mode  Multicast data packet must be  forwarded to a number of external interfaces to be sent to all receiver sites in Multicast mode  thus Multicast  transmission procedure is more complicated than Unicast transmission procedure    In order to guarantee that all Multicast packets get to the router via the shortest path  the receipt interface of  the Multicast packet must be checked in some certain way based on Unicast router table  this checking  mechanism is the basis for most Multicast Routing Protocol to forward in Multicast mode    
125. ata packet  leading to the denial of    the service and worse can lead to leak of sensitive data of the server    Security feature refers to applications such as protocol check which is for protecting the server from attacks  such as DoS  The protocol check allows the user to drop matched packets based on specified conditions  The  security features provide several simple and effective protections against Dos attacks while acting no  influence on the linear forwarding performance of the switch     28 2 Security Feature Configuration    28 2 1 Prevent IP Spoofing Function Configuration Task    Sequence    1   Enable the IP spoofing function        Command Explanation       Global Mode       f Enable disable the function of checking if the   no  dosattack check srcip equal dstip    enable    IP source address is the same as the             destination address        28 2 2 Prevent TCP Unauthorized Label Attack Function  Configuration Task Sequence    1   Enable the anti TCP unauthorized label attack function  2  Enable Checking IPv4 fragment function       Command Explanation       Global Mode   no  dosattack check tcp flags enable   Enable disable checking TCP label function                   28 1          Enable disable checking IPv4 fragment  This     no  dosattack check command has no effect when used separately   no  dosattack chec        but if this function is not enabled  the switch will  ipv4 first fragment enable    not drop the IPv4 fragment packet containing        
126. atagram filtering   3  Bind the ACL to the related interface     The configuration steps are listed as below     Switch  config  firewall enable   Switch  config  vlan 100   Switch  Config Vlan100  switchport interface ethernet 1 1 2 5 7  Switch  Config Vlan100  exit   Switch  config  access list 1 deny host source 192 168 0 1  Switch  config  interface vlan 100   Switch  Config if Vlan100  ip access group 1 in   Switch  Config if Vlan100  exit       Configuration result     Switch  config  show access group interface vlan 100       Interface VLAN 100     24 21       Ethernet1 1       Ingress access list used is 1  traffic statistics Disable   Ethernet1 2       Ingress access list used is 1  traffic statistics Disable     Ethernet1 5       Ingress access list used is 1  traffic statistics Disable   Ethernet1 7       Ingress access list used is 1  traffic statistics Disable        24 4 ACL Troubleshooting         Checking for entries in the ACL is done      a top down order and ends whenever an entry is matched          Default rule will be used only if no ACL is bound to the incoming direction of the port  or no ACL entry is  matched      Each ingress port can bind one MAC IP ACL  one IP ACL  one MAC ACL  one IPv6 ACL  via the  physical interface mode or Vlan interface mode           When binding four ACL and packet matching several ACL at the same time  the priority relations are as  follows in a top down order  If the priority is same  then the priority of configuration at 
127. ation Mode       ipv6 nd prefix   lt ipv6 address prefix length gt    lt valid lifetime gt     preferred lifetime    off link    no autoconfig    no ipv6 nd prefix   lt ipv6 address prefix length gt    lt valid lifetime gt      lt preferred lifetime gt   off link         no autoconfig        Configure the address prefix and advertisement  parameters of router  The NO command cancels  the address prefix of routing advertisement         8  Configure static IPv6 neighbor Entries       Command    Explanation       Interface Configuration Mode       ipv6 neighbor  lt ipv6 address gt     hardware address   interface    interface type interface number gt     Set static neighbor table entries   IPv6 address   two layer port     including    neighbor MAC address and          no ipv6 neighbor  lt ipv6 address gt        Delete neighbor table entries        15 4                          9  Delete all entries in IPv6 neighbor table    Command Explanation       Admin Mode  clear ipv6 neighbors Clear all static neighbor table entries                    15 2 2 IPv6 Troubleshooting               on off must be turned on when configuring IPv6 commands  otherwise the configuration is invalid      f the connected PC has not obtained IPv6 address  you should check the RA announcement switch   the default is turned off     15 3 ARP    15 3 1 Introduction to ARP    ARP  Address Resolution Protocol  is mainly used to resolve IP address to Ethernet MAC address  Switch  supports static ARP configurati
128. c mapping set to port 7 and port 9  respectively   The configuration steps are listed below     1   Setthe MAC address 00 01 11 11 11 11 of PC1 as a filter address        Switch config  mac address table static 00 01 11 11 11 11 discard vlan 1     2   Setthe static mapping relationship for PC2 and PC3 to port 7 and port 9  respectively   Switch config  mac address table static 00 01 22 22 22 22 interface ethernet 1 7 vlan 1       Switch config  mac address table static 00 01 33 33 33 33 interface ethernet 1 9 vlan 1    11 4 MAC Table Troubleshooting    Using the show mac address table command  a port is found to be failed to learn the MAC of a device  connected to it  Possible reasons       The connected cable is broken       Spanning Tree is enabled and the port is in    discarding    status  or the device is just connected to the  port and Spanning Tree is still under calculation  wait until the Spanning Tree calculation finishes  and  the port will learn the MAC address       If not the problems mentioned above  please check for the switch portand contact technical support  for solution     11 5 MAC Address Function Extension  11 5 1 MAC Address Binding    11 5 1 1 Introduction to MAC Address Binding    Most switches support MAC address learning  each port can dynamically learn several MAC addresses  so  that forwarding data streams between known MAC addresses within the ports can be achieved  If a MAC  address is aged  the packet destined for that entry will be broadcaste
129. can prevent ARP scanning effectively without  affecting the normal operation of the system     SWITCH A configuration task sequence     SwitchA config  anti arpscan enable  SwitchA config ztanti arpscan recovery time 3600  SwitchA config  anti arpscan trust ip 192 168 1 0 255 255 255 0  SwitchA config  interface ethernet1 2    SwitchA  Config lf Ethernet1 2  anti arpscan trust port   SwitchA  Config lf Ethernet1 2  exit   SwitchA config  interface ethernet1 19   SwitchA  Config lf Ethernet1 19  anti arpscan trust supertrust port  Switch A Config lf Ethernet1 19  exit       16 3       SWITCHB configuration task sequence     Switch B config   anti arpscan enable  SwitchB config  interface ethernet1 1    SwitchB  Config If Ethernet 1 1  anti arpscan trust port  SwitchB  Config If Ethernet 1 1 exit       16 4 ARP Scanning Prevention Troubleshooting Help    W ARP scanning prevention is disabled by default  After enabling ARP scanning prevention  users can  enable the debug switch     debug anti arpscan   to view debug information     16 4       Chapter 17 ARP GUARD Configuration    17 1 Introduction to ARP GUARD    There is serious security vulnerability in the design of ARP protocol  which is any network device  can send  ARP messages to advertise the mapping relationship between IP address and MAC address  This provides a  chance for ARP cheating  Attackers can send ARP REQUEST messages or ARP REPLY messages to  advertise a wrong mapping relationship between IP address and MAC a
130. cious user Mac BB is connected to the non trusted port 1 10  trying to  fake a DHCP Server  by sending DHCPACK     Setting DHCP Snooping on the switch will effectively detect    and block this kind of network attack     Configuration sequence is     switch    switch config   switch config  ip dhcp snooping enable  switch config  interface ethernet 1 11  switch Config If Ethernet1 11  ip dhcp snooping trust  switch Config If Ethernet1 11  exit  switch config  interface ethernet 1 12    switch Config If Ethernet1 12  exit   switch config  interface ethernet 1 1 10  switch Config Port Range  ip dhcp snooping action shutdown  switch Config Port Range                     switch Config If Ethernet1 12  ip dhcp snooping trust                19 5       19 4 DHCP Snooping Troubleshooting Help    19 4 1 Monitor and Debug Information    The    debug ip dhcp snooping    command can be used to monitor the debug information     19 4 2 DHCP Snooping Troubleshooting Help    If there is any problem happens when using DHCP Snooping function  please check if the problem is caused  by the following reasons   W Check that whether the global DHCP Snooping is enabled      If the port does not react to invalid DHCP Server packets  please check that whether the port is set as a  non trusted port of DHCP Snooping     19 6       Chapter 20 DHCP Snooping option 82  Configuration    20 1 Introduction to DHCP Snooping option 82    DHCP option 82 is the Relay Agent Information Option  its option code is 82
131. cp snooping binding enable Enable or disable DHCP SNOOPING  no ip dhcp snooping binding enable binding function           3  Enable DHCP Snooping option 82 function          Command Explanation  Global mode  ip dhcp snooping information enable Enable or disable DHCP SNOOPING  no ip dhcp snooping information enable   option 82 function              4  Configure trust ports                      Command Explanation  Admin mode  ip dhcp snooping trust Set or delete DHCP SNOOPING trust  no ip dhcp snooping trust attribute of ports        20 3 DHCP option 82 Application Examples    DHCP Client PC1       Switch1    oy       4  Vian1 eth1 3       DHCP Server    Figure 20 2 A DHCP option 82 typical application example  20 9       In the above example  layer 2 Switch1 will transmit the request message from DHCP client to DHCP serer  through enable DHCP Snooping  It will also transmit the reply message from the server to DHCP client to  finish the DHCP protocol procedure  After the DHCP SNOOPING option 82 function is enabled  the Switch1  appends the port information of accessing Switch1 to the request message from the client by option 82     The following is the configuration of Switch1 MAC address is 00 30 4f 02 33 01      Switch1 config  ip dhcp snooping enable  Switch1 config  ip dhcp snooping binding enable    Switch1 config   ip dhcp snooping information enable  Switch1  Config If Ethernet1 12  ip dhcp snooping trust       Linux ISC DHCP Server supports option 82  its configuratio
132. crosoft Office   IM  Mindjet MindManager Pro 6  9  Mozilla Firefox   e NetFrame    E  PAPAGO  R12        PictureGear Studio    gi  PLANET        Real NC     Skype   Iff  SonicStage   e Sony Notebook Setup   Ifi  Startup        Storm Codec    9  VAIO Launcher   IE  VAIO Wireless Utility        VAIO Zone    Command Prompt    ag Microsoft Office Exc     Dr eye    ft Office Pow       L gt  HD Tune    F    w  Micro       ft Offic       All Programs                  Windows Live      WinPcap       WinRAR         99  Yahoo              Accessibility           Entertainment           System Tools      J Address Book      Calculator            Communicat                   HyperTerminal      HyperTerminal         Network Connections        9 Network Setup Wizard                            Command Prompt    New Connection Wizard    Notepad XJ Remote Desktop Connection    3  y       Program Compatibility Wizard    Paint xJ Wireless Network Setup Wizard         339 Scanner and Camera Wizard     Synchronize           Windows Explorer  2        Tour Windows XP        WordPad       CH m A 2 6 2       FFO    Figure 3 2 Opening Hyper Terminal    2  Type a name for opening HyperTerminal  such as  Switch      Connection Description          New Connection    Enter a name and choose an icon for the connection     Name     Switch    Icon        Figure 3 3 Opening HyperTerminal    3 9       3  In the    Connecting using    drop list  select the RS 232 serial port used by the PC  e g  COM1  and clic
133. ction    Command Explanation    VLAN configuration mode       Configure a VLAN and enable the multicast VLAN    multicast vlan           on it  The    no multicast vlan  command disables    no multicast vlan    the multicast function on the VLAN        Associate a multicast VLAN with several VLANs     multicast vlan association   vlan list      The          form of this command deletes the related    no multicast vlan association   vlan list          VLANs associated with the multicast VLAN                 2  Configure the IGMP Snooping                         Command Explanation   Global Mode   ip igmp snooping vlan  lt vian id gt  Enable the IGMP Snooping function on the   no ip igmp snooping vlan  lt vian id gt  multicast VLAN  The  no    form of this command  disables the IGMP Snooping on the multicast  VLAN    T 4 Enable the IGMP Snooping function  The    no    form   ip igmp snooping       R    of this command disables the IGMP snooping   no ip igmp snooping     function        23 1       3  Configure the MLD Snooping    Command Explanation       Global Mode       Enable MLD Snooping on multicast VLAN     ipv6 mld snooping vlan  lt vlan id gt   the    no    form of this command disables MLD    no ipv6 mid snooping vlan  lt vian id gt       Snooping on multicast VLAN          R Enable the MLD Snooping function  The    no     ipv6 mld snooping          form of this command disables the MLD  no ipv6 mid snooping             snooping function        23 3 Multicast VLAN Exam
134. ction has been disabled on the port     10 17    Chapter 11 MAC Table Configuration    11 1 Introduction to MAC Table    MAC table is a table identifies the mapping relationship between destination MAC addresses and switch ports   MAC addresses can be categorized as static MAC addresses and dynamic MAC addresses  Static MAC  addresses are manually configured by the user  have the highest priority and are permanently effective  will  not be overwritten by dynamic MAC addresses   dynamic MAC addresses are entries learnt by the switch in  data frame forwarding  and is effective for a limited period  When the switch receives a data frame to be  forwarded  it stores the source MAC address of the data frame and creates a mapping to the destination port   Then the MAC table is queried for the destination MAC address  if hit  the data frame is forwarded in the  associated port  otherwise  the switch forwards the data frame to its broadcast domain  If a dynamic MAC  address is not learnt from the data frames to be forwarded for a long time  the entry will be deleted from the  switch MAC table     There are two MAC table operations   1  Obtain a MAC address   2  Forward or filter data frame according to the MAC table     11 1 1 Obtaining MAC Table    The MAC table can be built up statically and dynamically  Static configuration is to set up a mapping between  the MAC addresses and the ports  dynamic learning is the process in which the switch learns the mapping  between MAC addresses a
135. curi  d IPv4   IPv6   MAC   port binding    1 3          IPv4   IPv6   port binding  Support MAC filter    ARP Scanning Prevention       IEEE 802 1x Port Based network access control  AAA Authentication  TACACS  and IPv4   IPv6 over RADIUS    RFC 1213 MIB II   RFC 1215 Internet Engineering Task Force  RFC 1271 RMON   RFC 1354 IP Forwarding MIB   RFC 1493 Bridge MIB   RFC 1643 Ether like MIB   RFC  1907 SNMP v2   RFC 2011 IP ICMP MIB   RFC 2012 TCP MIB   RFC 2013 UDP MIB   RFC 2096 IP forward MIB   RFC 2233 if MIB   RFC 2452 TCP6 MIB   RFC 2454 UDP6 MIB   RFC 2465 IPv6 MIB   RFC 2466 ICMP6 MIB   RFC 2573 SnmpV3 notify   RFC 2574 SNMPV3 vacm   RFC 2674 Bridge MIB Extensions  IEEE802 1Q MIB   RFC 2674 Bridge MIB Extensions  IEEE802 1P MIB     Authentication      Standard Conformance    Regulation Compliance FCC Part 15 Class A  CE    IEEE 802 3 10Base T   IEEE 802 3u 100Base TX   IEEE 802 3z Gigabit SX LX   IEEE 802 3ab Gigabit 1000T   IEEE 802 3x Flow Control and Back pressure  Standards Compliance IEEE 802 3ad Port trunk with LACP   IEEE 802 1D Spanning tree protocol   IEEE 802 1w Rapid spanning tree protocol   IEEE 802 1s Multiple spanning tree protocol   IEEE 802 1p Class of service   IEEE 802 1Q VLAN Tagging    IEEE 802 1x Port Authentication Network Control       1 4       Chapter 2 INSTALLATION    This section describes the hardware features and installation of the Managed Switch on the desktop or rack  mount  For easier management and control of the Managed Switch  famil
136. curs  make  corrections       Some commands cannot be used on a port in port channel  such as arp  bandwidth  ip  ip forward  etc     8 5       Chapter 9 Jumbo Configuration    9 1 Introduction to Jumbo    So far the Jumbo  Jumbo Frame  has not reach a determined standard in the industry  including the format  and length of the frame   Normally frames sized within 1519 9000 should be considered jumbo frame   Networks with jumbo frames will increase the speed of the whole network by 2  to 5   Technically the Jumbo  is just a lengthened frame sent and received by the switch  However considering the length of Jumbo frames   they will not be sent to CPU  We discarded the Jumbo frames sent to CPU in the packet receiving process     9 2 Jumbo Configuration Task Sequence    1  Configure enable Jumbo function          Command Explanation  Global Mode  Enable sending receiving function of the  jumbo enable   lt mtu value gt   Jumbo frames  The no command disables  no jumbo enable sending and receiving function of the Jumbo             frames        9 1       Chapter 10 VLAN Configuration    10 1 VLAN Configuration    10 1 1 Introduction to VLAN    VLAN  Virtual Local Area Network  is a technology that divides the logical addresses of devices within the  network to separate network segments basing on functions  applications or management requirements  By  this way  virtual workgroups can be formed regardless of the physical location of the devices  IEEE  announced IEEE 802 1Q protocol 
137. d  In other words  a MAC address  learned in a port will be used for forwarding in that port  if the connection is changed to another port  the    switch will learn the MAC address again to forward data in the new port    However  in some cases  security or management policy may require MAC addresses to be bound with the  ports  only data stream from the binding MAC are allowed to be forwarded in the ports  That is to say  after a  MAC address is bound to a port  only the data stream destined for that MAC address can flow in from the  binding port  data stream destined for the other MAC addresses that not bound to the port will not be allowed  to pass through the port     11 5    11 5 1 2 MAC Address Binding Configuration Task List    1     2     Enable MAC address binding function for the ports    Lock the MAC addresses for a port    MAC address binding property configuration    Enable MAC address binding function for the ports       Command    Explanation       Port Mode          switchport port security  no switchport port security       Enable MAC address binding function for  the port and lock the port  When a port is  locked  the MAC address learning function  for the port will be disabled  the  no  switchport port security  command  disables the MAC address binding function  for the port  and restores the MAC address  learning function for the port        Lock the MAC addresses for a port       Command    Explanation       Port Mode       switchport port security lock 
138. d  In typical settings  trust ports are used to  connect DHCP SERVER or DHCP RELAY Proxy  and untrust ports are used to connect DHCP CLINET  The  switch will forward the DCHP request messages from untrust ports  but not DHCP reply ones  If any DHCP  reply messages is received from a untrust port  besides giving an alarm  the switch will also implement  designated actions on the port according to settings  such as    shutdown     or distributing a    blackhole     If  DHCP Snooping binding is enabled  the switch will save binding information  including its MAC address  IP  address  IP lease  VLAN number and port number  of each DHCP CLINET on untrust ports in DHCP snooping  binding table With such information  DHCP Snooping can combine modules like dot1x and ARP  or implement  user access control independently     Defense against Fake DHCP Server  once the switch intercepts the DHCP Server reply packets  including  DHCPOFFER  DHCPACK  and DHCPNAK     it will alarm and respond according to the situation  shutdown  the port or send Black hole    gt    Defense against DHCP over load attacks  To avoid too many DHCP messages attacking CPU  users  should limit the DHCP speed of receiving packets on trusted and non trusted ports    Record the binding data of DHCP  DHCP SNOOPING will record the binding data allocated by DHCP  SERVER while forwarding DHCP messages  it can also upload the binding data to the specified server to  backup it  The binding data is mainly used to configure th
139. d more multimedia operations in IP network  Multicast has tremendous market  potential and Multicast operation will be generalized and popularized     21 13       21 2 DCSCM    21 2 1 Introduction to DCSCM    DCSCM  Destination control and source control multicast  technology mainly includes three aspects  i e   Multicast Packet Source Controllable  Multicast User Controllable and Service Oriented Priority Strategy    Multicast     The Multicast Packet Source Controllable technology of Security Controllable Multicast technology is mainly  processed in the following manners   1  On the edge switch  if source under control multicast is configured  then only multicast data from  specified group of specified source can pass   2  For RP switch in the core of PIM SM  for REGISTER information out of specified source and  specified group  REGISTER STOP is transmitted directly and table entry is not allowed to set up    This task is implemented in PIM SM model      The implement of Multicast User Controllable technology of Security Controllable Multicast technology is  based on the control over IGMP report message sent out by the user  thus the model being controlled is  IGMP snooping and IGMP model  of which the control logic includes the following three  i e  to take control  based on VLAN MAC address transmitting packets  to take control based on IP address of transmitting  packets and to take control based on the port where messages enter  in which IGMP snooping can use the  above
140. d on nomenclature  Command Explanation  Global Mode  mac access list extended  lt name gt  Creates an extended          24 9                         no mac access list extended  lt name gt           name based MAC access rule  for other IP protocols  the    no     form command deletes this  name based extended MAC             access rule   b  Specify multiple    permit    or    deny    rule entries  Command Explanation  Extended name based MAC access rule Mode   no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt      any destination mac  host destination mac    host dmac       lt dmac gt   lt dmac mask gt     cos   lt cos val gt    lt cos bitmask gt     vlanld       vid value       vid mask    ethertype  lt protocol gt   lt protocol mask gt       Creates an extended     no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt    any destin  ation mac  host destination mac lt host_dmac gt     lt d  mac gt  lt dmac mask gt    ethertype lt protocol gt   lt protocol     mask gt        no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt    any destin  ation mac  host destination mac lt host_dmac gt     lt d  mac gt  lt dmac mask gt    vlanld lt vid value gt   lt vid mask gt       ethertype lt protocol gt   lt protocol mask gt        name based MAC access rule  matching MAC frame  the     no    form command deletes  this name based extended    MAC
141. day Sunday    daily   weekdays      weekend    start time   to   end time      Configure the time range for  the request of the week  and  every week will run by the  time range         no  absolute periodic  Monday   Tuesday    Wednesday   Thursday   Friday   Saturday   Sunday     start time   to  Monday   Tuesday   Wednesday    Thursday   Friday   Saturday   Sunday    end time             no  periodic    Monday Tuesday Wednesday Thursday   Friday Saturday Sunday    daily   weekdays      weekend    start time   to   end time         Stop the function of the time  range in the week         3  Configure absolute time range       Command    Explanation       Global Mode       absolute start   start time     start data    end    end time     end data       Configure absolute time    range            no  absolute start   start time     start data    end       Stop the function of the time                     end time     end data    range   4  Bind access list to a specific direction of the specified port   Command Explanation  Physical Port Mode  VLAN Port Mode  Physical interface mode      ip ipv6 mac mac ip  access group  lt acl name gt    in  traffic statistic   no  ip ipv6 mac mac ip  access group  lt acl name gt      in        Applies an access list to the  specified direction on the  the no command    the    port   deletes access list    bound to the port   VLAN  Applies an access list to the    interface mode     specified direction on the       24 17                   po
142. ddress  causing problems in network  communication  The danger of ARP cheating has two forms  1  PC4 sends an ARP message to advertise that  the IP address of PC2 is mapped to the MAC address of PC4  which will cause all the IP messages to PC2  will be sent to PC4  thus PC4 will be able to monitor and capture the messages to PC2  2  PC4 sends ARP  messages to advertise that the IP address of PC2 is mapped to an illegal MAC address  which will prevent  PC2 from receiving the messages to it  Particularly  if the attacker pretends to be the gateway and do ARP  cheating  the whole network will be collapsed     PC2    i is    Figure 17 1 ARP GUARD schematic diagram        PC4 PC5 PC6    We utilize the filtering entries of the switch to protect the ARP entries of important network devices from being  imitated by other devices  The basic theory of doing this is that utilizing the filtering entries of the switch to  check all the ARP messages entering through the port  if the source address of the ARP message is protected   the messages will be directly dropped and will not be forwarded    ARP GUARD function is usually used to protect the gateway from being attacked  If all the accessed PCs in  the network should be protected from ARP cheating  then a large number of ARP GUARD address should be  configured on the port  which will take up a big part of FFP entries in the chip  and as a result  might affect  other applications  So this will be improper  It is recommended that adopting 
143. ddress assignment  Support DHCP relay function  Firmware upload   download via TFTP or HTTP protocol for IPv4 and IPv6  SNTP  Simple Network Time Protocol  for IPv4 and IPv6  User Privilege levels control  Syslog server for       4 and IPv6  Four RMON groups 1  2  3  9  history  statistics  alarms  and events   Supports Ping  Trace route function for IPv4 and IPv6  Management IP for IPv4 and IPv6    1 1       1 4 Product Specification    WGSW 50040  50 Port 10 100 1000Mbps with 4 Shared SFP Managed Gigabit Switch      Hardware Specification    50 10  100 1000Base T RJ 45 Auto MDI MDI X ports   SFP   mini GBIC Slots   4 1000Base SX LX SFP interfaces  shared with Port 45 to       48     Switch Fabric    100Gbps nonblocking ______  Switch Throughput  Address Table    Share Data Buffer 0 5Mbytes    VLAN Table  ACL Table  Potquues 8    Back pressure for Half Duplex  Flow Control  IEEE 802 3x Pause Frame for Full Duplex    Jumbo Frame    System   PWR  SYS  LED Ports   TP Port 10 100 1000 Link Act  SFP Slot  On Off    Dimension  W x D x H   Wei tg 00      Management Function    System Configuration Console  Telnet  SSH  Web Browser  SNMPv1  v2c and v3    Supports the unite for IPv4   IPv6 HTTP  Supports the user IP security inspection for IPv4   IPv6 SNMP  Supports MIB and TRAP  Supports IPv4   IPv6                  Management Supports IPv4   IPv6 NTP  Supports RMOM 1  2  3  9 four group  Supports the RADIUS authentication for IPv4   IPv6 telnet user name and       password  Support
144. de  ip user private packet version two  no ip user private packet version two          To configure delete the private packet version        6  Set DES encrypted key for private packets       Command    Explanation       Globe mode       enable trustview key 0 7  lt password gt   no enable trustview key          To configure delete DES encrypted key for  private packets        7  Set helper server address       Command    Explanation       Globe mode       ip user helper address A B C D   port  lt udpport gt   source  lt ipAddr gt    secondary     no ip user helper address   secondary            Set or delete helper server address        8  Set trusted ports       Command    Explanation       Port mode       ip dhcp snooping trust  no ip dhcp snooping trust          Set or delete the DHCP snooping trust attributes  of ports        9  Enable DHCP SNOOPING binding DOT1X function       Command    Explanation          Port mode          19 3                            ip dhcp snooping binding dot1x       no ip dhcp snooping binding dot1x       Enable or disable the DHCP snooping binding  dot1x function        10   Enable or disable the DHCP SNOOPING binding USER function       Command    Explanation       Port mode       ip dhcp snooping binding  user control   no ip dhcp snooping binding  user control          Enable or disable the DHCP snooping binding  user function        11  Add static binding information       Command    Explanation       Globe mode       ip dhcp snooping b
145. e   on                          mode   no port group  lt port group number gt   3  Enter port channel configuration mode   Command Explanation  Global Mode  interface port channel Enters port channel configuration mode                 8 2                   sport channel number gt        8 3 Port Channel Examples    Scenario 1  Configuring Port Channel in LACP        SwitchA          SwitchB                   Figure 8 2 Configuring Port Channel in LACP    The switches in the description below are all switch and as shown in the figure  ports 1  2  3  4 of SwitchA are  access ports that belong to VLAN1  Add those four ports to group1 in active mode  Ports 6  8  9  10 of SwitchB  are access ports that also belong to VLAN1  Add these four ports to group2 in passive mode  All the ports  should be connected with cables     The configuration steps are listed below     SwitchA config   SwitchA  config  interface ethernet 1 1 4   SwitchA  Config lf Port Range  port group 1 mode active  SwitchA  Config lf Port Range  exit   SwitchA  config  interface port channel 1   SwitchA  Config lf Port Channel1      SwitchB config   SwitchB  config  port group 2   SwitchB  config  interface ethernet 1 6   SwitchB  Config lf Ethernet1 6  port group 2 mode passive  SwitchB  Config lf Ethernet1 6  exit   SwitchB  config  interface ethernet 1 8 10   SwitchB  Config If Port Range  port group 2 mode passive  SwitchB  Config If Port Range   exit   SwitchB  config  interface port channel 2   SwitchB  Confi
146. e RADIUS server  The following is the description of the process of these two authentication  methods  both started by the supplicant system     25 1 6 1 EAP Relay Mode    EAP relay is specified in IEEE 802 1x standard to carry EAP in other high level protocols  such as EAP over  RADIUS  making sure that extended authentication protocol messages can reach the authentication server  through complicated networks  In general  EAP relay requires the RADIUS server to support EAP attributes   EAP Message and Message Authenticator    EAP is a widely used authentication frame to transmit the actual authentication protocol rather than a special  authentication mechanism  EAP provides some common function and allows the authentication mechanisms  expected in the negotiation  which are called EAP Method  The advantage of EAP lies in that EAP mechanism  working as a base needs no adjustment when a new authentication protocol appears  The following figure    25 6       illustrates the protocol stack of EAP authentication method        Figure 25 8 the Protocol Stack of EAP Authentication Method    By now  there are more than 50 EAP authentication methods has been developed  the differences among    which are those in the authentication mechanism and the management of keys  The 4 most common EAP    authentication methods are listed as follows     EAP MD5   EAP TLS  Transport Layer Security     EAP TTLS   Tunneled Transport Layer Security    PEAP  Protected Extensible Authentication Protocol
147. e SFP transceiver                      sss eene nennen             2 6   CHAPTER    SWITCH MANAGEMENT                     2 24   2     211 11     1          3 8   3 1 MANAGEMENT OPTIONS e                                              3 8  3 1 1 Out Of Band Management            ccceccceceecceceeeeeeeeeeeeeeceaeeesaaeeseaeeseaeeesaaeeseaaeseeeeeseaeeesaeeseaeeseaees 3 8  31 2 Insband                                    teet tede rte det 3 11   23 2                            2 E                  3 16  3 2  1 Gonftiguration MODES isu  ir itte e rere re e          FREE eee a a a Re RR S 3 17  3 2 2 Configuration                                                                                                 3 19  3 2 3 Shorteut  Key SUppOLL      itx ta      Me Pee o Ete P ER MAE CELERE bn NA              3 19  3 2 4 Help FU  rnictiori s  iecit eher du e RR ERE ERE RENS        Ee teats 3 20  3 2 5 Input Verificato M                       S 3 20  3 2 6 Fuzzy Match  Support    cite ir ei citet nitet lire nin cette ten i tete Mire eed angetan de 3 21   CHAPTER 4 BASIC SWITCH CONFIGURATION                             1            4 1  4 1 BASIC CONFIGURATION m                                     4 1  4 2 TELNET MANAGE p                                                    4 2   2                    EA E E T A AT Le ti EE 4 2  CPC MS 4 3   4 3 CONFIGURATE SWITCH IP ADDRESSES                   inesse                4 5  4 3 1 Switch IP Addresses Configuration Task 115                     4 
148. e action ACTION     ACTION definition    drop   transmit   set dscp transmit   lt dscp_value gt    set prec transmit     ip precedence value     set cos transmit    cos value     set internal priority     inp value     set Drop Precedence     dp value     no policy    Configure a policy for the classified flow   The non aggregation policy command  supports the  working mode of the token bucket     three colors  Analyze  whether it is singe rate single bucket   single rate dual bucket  dual rate dual  bucket   different    set corresponding action to   The       the  configuration  Single bucket mode is    color packets     command will delete mode    supported by the specific switch        policy aggregate   aggregate policy name    no policy aggregate   lt aggregate policy name gt     Apply a policy set to classified traffic  the  no command deletes the specified  policy set           accounting  no accounting       Set statistic function for the classified  traffic  After enable this function under  the policy class map mode  add statistic  function to the traffic of the policy class  map  In single bucket mode  the  messages can only red or green when  passing police  In the print information   in profile means green and out profile  means red  In dual bucket mode  there  are three colors of messages  In the  print information  in profile means green    and out profile means red and yellow        3  Apply QoS to port or VLAN interface       Command    Explanation       Int
149. e authentication  no wait timeout   interface   interface name      requires  for all ports or a specified port              25 3 802 1x Application Example    25 3 1 Examples of Guest Vlan Applications             Note    As showed in the    server as its authentication server  Ethernet1 2  the port through which the user accesses the switch belongs  to VLAN100  the authentication server is in VLAN2  Update Server  being in VLAN10  is for the user to  download and update supplicant system software  Ethernet1 6  the port used by the switch to access the    Update server Authenticator server    E3  N10 VLAN        Figure 25 13 The Network Topology of Guest VLAN          in the figures in this session  E2 means Ethernet 1 2  E3 means Ethernet 1 3 and  E6 means Ethernet 1 6        next figure  a switch accesses the network using 802 1x authentication  with a RADIUS    Internet is in VLAN5     25 16          Update server Authenticator server       User    Figure 25 14 User Joining Guest VLAN    As illustrated in the up figure  on the switch port Ethernet1 2  the 802 1x feature is enabled  and the VLAN10  is set as the port   s Guest VLAN  Before the user gets authenticated or when the user fails to do so  port  Ethernet1 2 is added into VLAN10  allowing the user to access the Update Server     Update server Authenticator server    E3  N10 VLAN       Figure 25 15 User Being Online  VLAN Being Offline    As illustrated in the up figure  when the users become online after a success
150. e correspondence between   lt ssap id gt   snap etype  lt etype id gt   vlan       EM        the Protocols        the VLAN  namely    vlan id   priority  lt priority id gt      T specified protocol joins leaves specified  no protocol vlan  mode  ethernetii etype                              VLAN     etype id   llc  dsap  lt dsap id gt  ssap   lt ssap id gt   snap etype  lt etype id gt   all    7  Adjust the priority of the dynamic VLAN  Command Explanation   Global Mode  dynamic vlan mac vlan prefer Configure the priority of the dynamic  dynamic vlan subnet vlan prefer VLAN                 10 13       10 4 3 Typical Application of the Dynamic VLAN    Scenario    In the office network Department A belongs to VLAN100  Several members of this department often have the  need to move within the whole office network  It is also required to ensure the resource for other members of  the department to access VLAN 100  Assume one of the members is M  the MAC address of his PC is  00 30 4f 11 22 33  and similar configurations are assigned to other members     SwitchA SwitchB SwitchC                 Figure 10 5 Typical topology application of dynamic VLAN       Configuration Items Configuration Explanation  MAC based VLAN Global configuration on Switch A  Switch B  Switch C                    For example  M at E1 1 of SwitchA  then the configuration procedures are as follows   Switch A  Switch B  Switch C     switch Config  mac vlan mac 00 30 4f 11 22 33 vlan 100 priority 0    switch Con
151. e dynamic users of dot1x user based ports  Please  refer to the chapter called   dot1x configuration  to find more about the usage of dot1x use based mode    Add binding ARP  DHCP SNOOPING can add static binding ARP according to the binding data after  capturing binding data  thus to avoid ARP cheating    Add trusted users  DHCP SNOOPING can add trusted user list entries according to the parameters in  binding data after capturing binding data  thus these users can access all resources without DOT1X  authentication    Automatic Recovery  A while after the switch shut down the port or send blockhole  it should automatically  recover the communication of the port or source MAC and send information to Log Server via syslog    LOG Function  When the switch discovers abnormal received packets or automatically recovers  it should  send syslog information to Log Server    The Encryption of Private Messages  The communication between the switch and the inner network  security management system TrustView uses private messages  And the users can encrypt those messages    of version 2   Add option82 Function  It is used with dot1x dhcpoption82 authentication mode  Different option 82 will be    19 1       added in DHCP messages according to user   s authentication status     19 2 DHCP Snooping Configuration Task Sequence    9     CON 1L 40           Ex GON c    Enable DHCP Snooping  Enable DHCP Snooping binding function    Enable DHCP Snooping binding ARP function    Enable DHCP Snoopin
152. e following figure illustrates the basic operation flow of PEAP authentication method     Supplicant PAE EAPOL         RADIUS server  EAPOL Start  EAP Request ldentity    EAP Response ldentt    RADIUS Access Challenge  EAP Request PEAP Start  EAP Request PEAP Star     TLS Channg Established                    RADIUS Access Request   EAP Response ldentity     RADIUS Access Request  EAP Response Empty  EAP Response Empty        RADIUS Access Challenge  EAP Request MD5 Challenge  EAP Request MDS Challenge     RADIUS Access Request  EAP Response MD5 Password EAP Response MD5 Password    RADIUS Access Acceot    Figure 25 11 the Authentication Flow of 802 1x PEAP    25 1 6 2 EAP Termination Mode    In this mode  EAP messages will be terminated in the access control unit and mapped into RADIUS  messages  which is used to implement the authentication  authorization and fee counting  The basic  operation flow is illustrated in the next figure    In EAP termination mode  the access control unit and the RADIUS server can use PAP or CHAP    authentication method  The following figure will demonstrate the basic operation flow using CHAP  authentication method     25 10          Supplicant EAPOL Authenticator  PAE NN system PAE  EAP Request Identity  EAP Response ldentity  EAP Request MD5 Challenge    EAP Response MD5 Challenge           RADIUS Access Request    RADIUS Access Accept  CHAP Success          EAP Success              Port authorized         rExpiry of the handshake    nn Aimer
153. e from an unknown source MAC address  it will add this MAC to the receive port  so that the following  messages with a destination of this MAC can be forwarded directly  which also means learn the MAC address  once and for all to forward messages    When a new source MAC is already learnt by the layer 2 device  only with a different source port  the original  source port will be modified to the new one  which means to correspond the original MAC address with the  new port  As a result  if there is any loopback existing in the link  all MAC addresses within the whole layer 2  network will be corresponded with the port where the loopback appears  usually the MAC address will be  frequently shifted from one port to another    causing the layer 2 network collapsed  That is why it is a  necessity to check port loopbacks in the network  When a loopback is detected  the detecting device should  send alarms to the network management system  ensuring the network manager is able to discover  locate    and solve the problem in the network and protect users from a long lasting disconnected network    Since detecting loopbacks can make dynamic judgment of the existence of loopbacks in the link and tell  whether it has gone  the devices supporting port control  Such as port isolation and port MAC address  learning control  can maintain that automatically  which will not only reduce the burden of network managers  but also response time  minimizing the effect caused loopbacks to the network
154. e severity level the log information can be auto outputted to corresponding log  channel     35 7 1 1 Log Output Channel    So far the system log can be outputted the log information through four channels     Through Console port to the local console   Output the log information to remote Telnet terminal or monitor  this function is good for remote  maintenance   Assign a proper log buffer zone inside the switch  for record the log information permanently or  temporarily   Configure the log host  the log system will directly send the log information to the log host  and  save it in files to be viewed at any time    Among above log channels  users rarely use the console monitor  but will commonly choose the Telnet    35 26       terminal to monitor the system operation status  However information outputted from these channels are of  low traffic capacity and can not be recorded for later view  The other two channels   the log buffer zone and  log host channel are two important channels   SDRAM  Synchronous Dynamic Random Access Memory  and NVRAM  Non Vulnerable Random Access  Memory  is provided inside the switch as two part of the log buffer zone  The two buffer zone record the log  information in a circuit working pattern  namely when log information need to be recorded exceeds the buffer  size  the oldest log information will be erased and replaced by the new log information  information saved in  NVRAM will stay permanently while those in SDRAM will lost when the system re
155. e the sampling rate when sFlow     n        performing hardware sampling  The               command deletes the rate value        7  Configure the sFlow statistic sampling interval       Command       Explanation          33 19                            Port Mode  sflow counter interval  lt interval viaue gt  Configure the max interval when sFlow       no sflow counter interval performing statistic sampling  The    no    form of  this command deletes                33 3 sFlow Examples             LJ    SWITCH PC       Figure 33 1 sFlow configuration topology    As shown in the figure  sFlow sampling is enabled on the port 1 1 and 1 2 of the switch  Assume the sFlow  analysis software is installed on the PC with the address of 192 168 1 200  The address of the layer 3  interface on the SwitchA connected with PC is 192 168 1 100  A loopback interface with the address of  10 1 144 2 is configured on the SwitchA  sFlow configuration is as follows     Configuration procedure is as follows     Switch config   Switch  config  sflow ageng address 10 1 144 2  Switch  config  sflow destination 192 168 1 200  Switch  config  sflow priority 1   Switch  config   interface ethernet1 1   Switch  Config If Ethernet1 1  sflow rate input 10000  Switch  Config If Ethernet1 1  sflow rate output 10000    Switch  Config If Ethernet1 1  exit   Switch  config  interface ethernet1 2   Switch  Config If Ethernet1 2  sflow rate input 20000  Switch  Config If Ethernet1 2  sflow rate output 20000       
156. ed as below  The switch should drop all the 802 3 datagram with  00 12 11 23 xx xx as the source MAC address coming from interface 10   Configuration description   1  Create the corresponding access list   2  Configure datagram filtering   3  Bind the ACL to the related interface     The configuration steps are listed as below     Switch config  access list 1100 deny 00 12 11 23 00 00 00 00 00 00 ff ff any destination mac  untagged 802 3   Switch config  access list 1100 deny 00 12 11 23 00 00 00 00 00 00 ff ff any tagged 802  Switch config  firewall enable       Switch config  firewall default permit  Switch config  interface ethernet 1 10  Switch Config If Ethernet1 10  mac access group 1100 in  Switch Config lf Ethernet1 10  exit   Switch config  exit       Configuration result        Switch show firewall    Firewall Status  Enable    Firewall Default Rule  Permit   Switch  show access lists  access list 1100 used 1 time s     access list 1100 deny 00 12 11 23 00 00 00 00 00 00 ft ff  any destination mac   untagged 802 3   access list 1100 deny 00 12 11 23 00 00 00 00 00 00 ft ff   any destination mac  Switch  show access group interface ethernet 1 10  interface name Ethernet1 10    MAC Ingress access list used is 1100 traffic statistics Disable        Scenario 3   The configuration requirement is stated as below  The MAC address range of the network connected to the  interface 10 of the switch is 00 12 11 23 xx xx  and IP network is 10 0 0 0 24  FTP should be disabled and
157. eeeeeeeeeeeeeeeeeeeeeeceaeeeeaaeeeeeeeseeeesaeeesaeeeeneeeeaees 21 18  21 3 2 IGMP Snooping Configuration Task 115                                  21 19  21 3 3  IGMP  Snooping Examples onnie 2 ec eec eei deeds        ea eene a nuevo dee a        21 21  21 3 4 IGMP Snooping Troubleshooting                      sssssssesss esee 21 23   CHAPTER 22 IPV6 MULTICAST                                             1             22 1  prism BE iTere  cm 22 1   22 1 1 Introduction to MLD                                       22 1  22 1 2 MLD Snooping Configuration Task    eee nennen 22 1  22 1 3 MLD Snooping Example Sennen a A 22 3  22 1 4 MLD Snooping Troubleshooting                        sssssessseseee eene enters 22 5  CHAPTER 23 MULTICAST VLAN                   2222         22222  2              23 1    23 1 INTRODUCTIONS TO MULTICAST VLAN                                                  23 1    23 2 MULTICAST VLAN CONFIGURATION TASK 1157                  2  4  0000  00       23 1  23 3 MULTICAST VLAN                  6    20               0                      23 2  CHAPTER 24 ACE CONFIGURATION si scssisscsesceiuscesossvocetccscecstoceccasdecesecscscstecsescceactaatsc 24 4  24 1 INTRODUCTION TO                                                 24 4  24 11  ACCOSSHISE onere rtt N a                        24 4  24 1 2 ACCOSS grOUp   RR eR uate re             ance Re SPUR ERR            24 4  24 1 3 Access list Action and Global Default                    2           40  20000         
158. ege  lt privilege gt   password  0 7   lt password gt      To open the local authentication style with the following command  authentication line web login local   Privilege option must exist and just is 15  Assume an authorized user in the switch has a username of   admin   and password of    admin     the configuration procedure should like the following     Switch config  username admin privilege 15 password 0 admin  Switch config  authentication line web login local       The Web login interface of WGSW 50040 is as below     e PLANET               b Communicator    P sl        WGSW 50040    User name        Password      login    Copyright  C  2010 PLANET Technology Corporation     http   www planet com tw          Figure 3 10 Web Login Interface    3 15       Input the right username and password  and then the main Web configuration interface is shown as below                 System IP address 192 158 0 100 Current system time  SUN JAN 01 00 02 38 2006 System description  WGSW 50040         3 WGSW 50040 Client IP address 192 168 0 21             8 Switch basic confic System Version Information        Port configuration WGSW 50040 Device  Compiled Aug 12 12 20 33 2010  2  MAC address table SoftWare Version WGSW 50040_5 4 232 0  821 VLAN configuration BootRom Version WGSW 50040 1 0 9     IGMP snooping con HardWare Version RO1    Copyright  C  2010 PLANET Technology Corporation    FC ACL configuration All rights reserved    Port channel confic Uptime is 0 weeks  0 days  0 h
159. elong to VLAN3    SP networks           Customer  networks1    This port on PE1 is enabled CE2  QinQ and belong to VLAN3            Onsymmetric  connectipn Customer    On the customer port networks2    Trunk VLAN 200 300    Figure 10 4 Dot1q tunnel based Internetworking mode    As shown in above  after being enabled on the user port  dotiq tunnel assigns each user an SPVLAN  identification  SPVID   Here the identification of user is 3  Same SPVID should be assigned for the same  network user on different PEs  When packet reaches PE1 from CE1  it carries the VLAN tag 200 300 of the  user internal network  Since the dot1q tunnel function is enabled  the user port on PE1 will add on the packet  another VLAN tag  of which the ID is the SPVID assigned to the user  Afterwards  the packet will only be  transmitted in VLANS when traveling in the ISP internet network while carrying two VLAN tags  the inner tag is  added when entering PE1  and the outer is SPVID   whereas the VLAN information of the user network is  open to the provider network  When the packet reaches PE2 and before being forwarded to CE2 from the  client port on PE2  the outer VLAN tag is removed  then the packet CE2 receives is absolutely identical to the  one sent by CE1  For the user  the role the operator network plays between PE1 and PE2  is to provide a  reliable layer 2 link   The technology of Dot1q tuunel provides the ISP internet the ability of supporting many client VLANs by only  one VLAN of theirselves  
160. ended access    rule        24 14             on   host destination lt destination host ip gt        precedence   precedence    tos   tos    time range   t            me range name          c  Exit MAC IP Configuration Mode       Command Explanation          Extended name based MAC IP access Mode       f Quit extended name based  exit          MAC IP access mode            10  Configuring a numbered standard IPV6 access list       Command Explanation       Global Mode       Creates a numbered standard  IPV6 access list  if the  ipv6 access list   num    deny   permit     lt s Pv6Addr gt    access list already exists  then     lt SPrefixlen gt     any source    host source a rule will add to the current   lt slpv6Adar gt    access list  the    no  no ipv6 access list  lt num gt  access list  lt num gt   command    deletes a numbered standard  IPv6 access list                  11  Configuring a standard IPV6 access list based on nomenclature  a  Create a standard IPV6 access list based on nomenclature             Command Explanation  Global Mode  ipv6 access list standard  lt name gt  Creates    standard       no ipv6 access list standard  lt name gt  access list based on    nomenclature  the no  command delete the  name based standard IPV6          access list           b  Specify multiple permit or deny rules       Command Explanation             Standard IPV6 ACL Mode          24 15           no   deny   permit     lt sIPv6Prefix sPrefixlen gt      any source    host source 
161. ent or temporary  Some of the Multicast group addresses are assigned  Officially  they are called Permanent Multicast Group  Permanent Multicast Group keeps its IP address fixed  but its member structure can vary within  The member amount of Permanent Multicast Group can be arbitrary   even zero  The IP Multicast addresses which are not kept for use by Permanent Multicast Group can be  utilized by temporary Multicast groups   224 0 0 0 224 0 0 255 are reserved Multicast addresses  Permanent Group Address   address 224 0 0 0 is  reserved but not assigned  and other addresses are used by Routing Protocol  224 0 1 0 238 255 255 255  are Multicast addresses available to users  Temporary Group Address  and are valid in the entire domain of  the network  239 0 0 0   239 255 255 255 are local management Multicast addresses  which are valid only in  specific local domain  Frequently used reserved multicast address list is as follows    Benchmark address  reserved    224 0 0 1 Address of all hosts   224 0 0 2 Address of all Multicast Routers   224 0 0 3 Unassigned   224 0 0 4 DVMRP Router   224 0 0 5 OSPF Router   224 0 0 6 OSPF DR   224 0 0 7 ST Router   224 0 0 8 ST host   224 0 0 9 RIP 2 Router   224 0 0 10 IGRP Router   224 0 0 11 Active Agent   224 0 0 12 DHCP Server Relay Agent   224 0 0 13 All PIM Routers   224 0 0 14 RSVP Encapsulation   224 0 0 15 All CBT Routers   224 0 0 16 Specified SBM   224 0 0 17 All SBMS   224 0 0 18 VRRP   224 0 0 22 IGMP  When Ethernet transmits Unic
162. entage of packets received over time as compared to overall bandwidth     BOOTP    Boot protocol used to load the operating system for devices connected to the network     Distance Vector Multicast Routing Protocol  DVMRP     A distance vector style routing protocol used for routing multicast datagrams through the Internet  DVMRP  combines many of the features of RIP with Reverse Path Broadcasting  RPB      GARP VLAN Regisiration Protocol  GVRP     Defines a way for switches to exchange VLAN information in order to register necessary VLAN members on  ports along the Spanning Tree so that VLANs defined in each switch can work automatically over a Spanning  Tree network     Generic Attribute Registration Protocol  GARP     GARP is a protocol that can be used by endstations and switches to register and propagate multicast group  membership information in a switched environment such that multicast data frames are propagated only to  those parts of a switched LAN containing registered endstations  Formerly called Group Address Registration  Protocol     Group Attribute Registration Protocol    See Generic Attribute Registration Protocol     Generic Multicast Registration Protocol  GMRP     GMRP allows network devices to register end stations with multicast groups  GMRP requires that any  participating network devices or end stations comply with the IEEE 802 1p standard     ICMP Router Discovery    ICMP Router Discovery message is an alternative router discovery method that uses a 
163. eptable for services like Mail and FTP  but for increasing multimedia  business data and e business data transmission  this best effort method cannot satisfy the bandwidth and  low lag requirement    Based on differentiated service  QoS specifies a priority for each packet at the ingress  The classification  information is carried in Layer 3 IP packet header or Layer 2 802 1Q frame header  QoS provides same  service to packets of the same priority  while offers different operations for packets of different priority   QoS enabled switch or router can provide different bandwidth according to the packet classification  information  and can remark on the classification information according to the policing policies configured  and    may discard some low priority packets in case of bandwidth shortage    If devices of each hop in a network support differentiated service  an end to end QoS solution can be created   QoS configuration is flexible  the complexity or simplicity depends on the network topology and devices and  analysis to incoming outgoing traffic     13 1 3 Basic QoS Model    The basic QoS consists of four parts  Classification  Policing  Remark and Scheduling  where classification   policing and remark are sequential ingress actions  and Queuing and Scheduling are QoS egress actions     13 2          Figure 13 3 Basic QoS Model  Classification  Classify traffic according to packet classification information and generate internal priority and    drop precedence based t
164. er  id  lt member id gt      command is used to reset the  mac address  lt mac addr gt       member switch    In the commander switch  this  cluster update member  lt member id gt  command is used to remotely      src url     dst filename   ascii   binary        upgrade the member switch  It can  only upgrade nos img file        5 3                6  Manage cluster network with web    Command    Explanation       Global Mode       ip http server          Enable http function in commander  switch and member switch    Notice  must insure the http function  be enabled in member switch when  commander switch visiting member  switch by web  The commander  switch visit member switch via beat  member node in member cluster    topology        7  Manage cluster network with snmp       Command    Explanation       Global Mode    snmp server enable          Enable snmp server function       commander switch and member  switch    Notice  must insure the snmp server  function be enabled in member  switch when commander switch  visiting member switch by snmp  The  commander switch visit member  switch via configure character string   lt commander community gt  sw lt me  mber id gt         5 4             5 3 Examples of Cluster Administration    Scenario   The four switches SW1 SW4  amongst the SW1 is the command switch and other switches are member  switch  The SW2 and SW4 is directly connected with the command switch  SW3 connects to the command    switch through SW2   cis E      E1    S
165. erface      Boot   run  or reboot      Other commands in BootROM mode  1  DIR command  Used to list existing files in the FLASH       Boot   dir  boot rom 327 440 1900 01 01 00 00 00   SH  boot conf 83 1900 01 01 00 00 00   SH    nos img 2 431 631 1980 01 01 00 21 34       startup config 2 922 1980 01 01 00 09 14       temp img 2 431 631 1980 01 01 00 00 32            2  CONFIG RUN command  Used to set the IMAGE file to run upon system start up  and the configuration file to run upon configuration  recovery      Boot   config run  Boot File   nos img  nos img       Config File   boot conf     4 5 3 FTP TFTP Upgrade    4 5 3 1 Introduction to FTP TFTP    FTP File Transfer Protocol  TFTP Trivial File Transfer Protocol  are both file transfer protocols that belonging  to fourth layer application layer  of the TCP IP protocol stack  used for transferring files between hosts  hosts  and switches  Both of them transfer files in a client server model  Their differences are listed below    FTP builds upon TCP to provide reliable connection oriented data stream transfer service  However  it does  not provide file access authorization and uses simple authentication mechanism  transfers username and  password in plain text for authentication   When using FTP to transfer files  two connections need to be  established between the client and the server  a management connection and a data connection  A transfer  request should be sent by the FTP client to establish management connection on 
166. erface Configuration Mode          mls qos trust  cos   dscp   no mls qos trust  cos   dscp        Configure port trust  the no command  disables the current trust status of the       13 8                port        mls qos cos   lt default cos gt    no mls qos cos    Configure the default CoS value of the  port  the no command restores the  default setting        service policy input  lt policy map name gt   no service policy input  lt policy map name gt     Apply a policy map to the specified port   the no command deletes the specified  policy map applied to the port  Egress  policy map is not supported yet           Global Mode   service policy input   policy map name   vlan    vlan list     no service policy input   policy map name      vlan   vlan list      Apply a policy map to the specified  VLAN the  deletes the specified policy map applied  to the VLAN interface     interface  no command          4  Configure queue out method and weight       Command    Explanation       Interface Configuration Mode       mls qos queue algorithm  sp   wrr   wdrr   no mls qos queue algorithm    Set queue management algorithm  the  default queue management algorithm is  wrr        mls qos queue wrr weight     lt weight0  weight7 gt   no mls qos queue wrr weight    Set queue weight based a port  the default  queue weight is 12345678        mls qos queue wdrr weight     lt weight0  weight7 gt   no mls qos queue wdrr weight    Set queue weight based a port  the default  queue weight is 10
167. ess group   ip dscp   ip specified matching criterion     precedence   ipv6 access group   ipv6 dscp      ipv6 flowlabel   vlan   cos               2  Configure a policy map             Command Explanation  Global Mode  Create a policy map and enter policy  policy map   policy map name   map mode  the          policy map  no policy map   policy map name     policy map name    command    deletes the specified policy map        After a policy map is created  it can be    associated to    class  Different policy or  class  lt class map name gt   insert before i  new DSCP value can be applied to     lt class map name gt   2 l different data streams in class mode  the    no class  lt class map name gt      no command deletes the specified    class        set       dscp  lt new dscp gt    ip precedence   Assign           DSCP  CoS           lt new precedence gt  internal priority Precedence value for the classified     lt new inp gt   drop precedence  lt new dp gt   cos traffic  the no command cancels the    newly assigned value               lt new cos gt         13 7          no set  ip dscp   ip precedence internal  priority   drop precedence  cos         Single bucket mode    policy  lt bits_per_second gt    lt normal_burst_bytes gt    conform action  ACTION   exceed action ACTION      Dual bucket mode    policy  lt bits_per_second gt    lt normal_burst_bytes gt   pir  lt peak_rate_bps gt       lt maximum_burst_bytes gt     conform action ACTION   exceed action  ACTION   violat
168. est broadcast message while initializing  This request message does not have  option 82    2  DHCP SNOOPING will add the option 82 to the end of the request message it receives  and perform layer  2 forwarding  By default  the sub option 1 of option 82  Circuit ID  is the interface information of the switch  connected to the DHCP client  VLAN name and physical port name   The sub option 2 of option  82 Remote ID  is the CPU MAC address of the switch    3  After receiving the DHCP request message  the DHCP server will allocate IP address and other information    for the client according to the information and preconfigured policy in the option segment of the message   Then it will forward the reply message with DHCP configuration information and option 82 information to  DHCP SNOOPING     4  DHCP SNOOPING will peel the option 82 information from the replay message sent by DHCP server  then    the message with DHCP configuration information to perform layer 2 forwarding     20 2 DHCP Snooping option 82 Configuration Task List    1  Enable DHCP SNOOPING  2  Enable DHCP Snooping binding function    20 8           Enable DHCP Snooping option 82 binding function  4   Configure trust ports    1  Enable DHCP SNOOPING             Command Explanation   Global mode   ip dhcp snooping enable Enable or disable DHCP SNOOPING  no ip dhcp snooping enable function              2  Enable DHCP Snooping binding function                   Command Explanation   Interface configuration mode   ip dh
169. et After primary node detects ring failure or receives LINK DOWN  packet  open blocked secondary port  and then uses two ports  to send the packet  to inform each transfer node to refresh own  MAC address           LINK UP FLUSH FDB packet After primary detects ring failure to restore normal  and uses    packet from primary port  and informs each transfer node to       refresh own MAC address        31 9          31 1 3 MRPP Protocol Operation System             Link Down Alarm System   When transfer node finds themselves belonging to MRPP ring port Down  it sends link Down packet to  primary node immediately  The primary node receives link down packet and immediately releases block  state of secondary port  and sends LINK DOWN FLUSH FDB packet to inform all of transfer nodes   refreshing own MAC address forward list     2  Poll System  The primary port of primary node sends Hello packet to its neighbors timely according to configured  Hello timer   If the ring is health  the secondary port of primary node receives health detect packet  and the primary node  keeps secondary port   If the ring is break  the secondary port of primary node can t receive health detect packet when timer is over  time  The primary releases the secondary port block state  and sends LINK DOWN FLUSH FDB packet to  inform all of transfer nodes  to refresh own MAC address forward list     3  Ring Restore   After the primary node occur ring fail  if the secondary port receives Hello packet sending from p
170. face are notifications    warnings    Outputted information from the CLI command is classified informational    Information from the debugging of CLI command is classified debugging    use the clear logging command     35 7 2 System Log Configuration    System Log Configuration Task Sequence     1  Display and clear log buffer zone    2  Configure the log host output channel    1  Display and clear log buffer zone       Command    Description       Admin Mode       show logging buffered   level  critical      warnings    range  lt begin index gt   lt end index gt      Show detailed log information in  the log buffer channel           clear logging sdram       Clear log buffer zone information        2  Configure the log host output channel       Command    Description       Global Mode          logging   lt ipv4 addrs    lt ipv6 addr gt     facility   lt local numbers gt     level  lt severity gt     no logging    ipv4 addr      lt                       facility   lt local numbers        Enable the output channel of the  log host  The    no    form of this  command will disable the output at  the output channel of the log host        35 28                   Add the loghost sequence number  logging loghost sequence number for the log  the no command does    no logging loghost sequence number not include the loghost             sequence number        35 7 3 System Log Configuration Example    Example 1    When managing VLAN the IPv4 address of the switch is 100 100 100 1  and t
171. fig  exit  switch        10 14       10 4 4 Dynamic VLAN Troubleshooting    W On the switch configured with dynamic VLAN  if the two connected equipment  e g  PC  are both  belongs to the same dynamic VLAN  first communication between the two equipment may not go  through  The solution will be letting the two equipment positively send data packet to the switch  such  as ping   to let the switch learn their source MAC  then the two equipment will be able to communicate  freely within the dynamic VLAN        Figure 10 6 Dynamic VLAN Troubleshooting    10 5 Voice VLAN Configuration    10 5 1 Introduction to Voice VLAN    Voice VLAN is specially configured for the user voice data traffic  By setting a Voice VLAN and adding the  ports of the connected voice equipments to the Voice VLAN  the user will be able to configure QoS  Quality of  service  service for voice data  and improve the voice data traffic transmission priority to ensure the calling  quality     The switch can judge if the data traffic is the voice data traffic from specified equipment according to the   source MAC address field of the data packet entering the port  The packet with the source MAC address  complying with the system defined voice equipment OUI  Organizationally Unique Identifier  will be  considered the voice data traffic and transmitted to the Voice VLAN   The configuration is based on MAC address  acquiring a mechanism in which every voice equipment  transmitting information through the network has 
172. fig  radius server key test    Switch config  aaa accounting enable    Switch config  dot1x enable  Switch config  interface ethernet 1 2  Switch Config lf Ethernet1 2  dot1x enable  Switch Config If Ethernet1 2  dot1x port control auto  Switch Config lf Ethernet1 2  exit                          Switch config  aaa enable                             25 20       25 3 4 802 1x Web Proxy Authentication Sample Application        RADIUS Server  Web Server    192 168 20 88 24       eth1 1 192 168 20 20 24        eth1 2    SWITCH1  eth1 16    PC    Figure 25 18 802 1x Web Proxy Authentication    In the network topology shown as above  Ethernet 1 1 on SWITCH1 is connected to the Web server whose IP  address is 192 168 20 20 24  Ethernet 1 2 on SWITCH1 is connected to the RADIUS server whose IP  address is 192 168 20 88 24 and authentication port is 1812  PC is connected to Ethernet 1 16 on SWITCH1  through an unknown network  The Web server and the authentication server are connected to VLAN 1  while  PC is connected to VLAN 2  802 1x Web authentication can be enabled through the following configuration   The re authentication function is disabled by default  To enable this  corresponding 802 1x configuration  should be issued first     Configuration task list on SWITCH1    Switch config  dot1x enable  Switch config  dot1x web authentication enable  Switch config  dot1x web redirect http   192 168 20 20 WebSupplicant     Switch Config lf Ethernet1 16  dot1x enable  Switch Config If E
173. first is higher       Ingress IPv6 ACL      Ingress MAC IP ACL      Ingress IP ACL      Ingress MAC ACL      The number of ACLs that can be successfully bound depends on the content of the ACL bound and the  hardware resource limit  Users will be prompted if an ACL cannot be bound due to hardware resource  limitation               access list contains same filtering information but conflicting action rules  binding to the port will  fail with an error message  For instance  configuring  permit tcp any any destination  and  deny tcp any  any destination  at the same time is not permitted       Viruses such as    worm blaster    can be blocked by configuring ACL to block specific ICMP packets or  specific TCP or UDP port packet        f the physical mode of an interface is TRUNK  ACL can only be configured through physical interface  mode    WB       configured in the physical mode can only be disabled in the physical mode  Those configured in  the VLAN interface configuration mode can only be disabled in the VLAN interface mode    m When a physical interface is added into or removed from a VLAN  with the trunk interfaces as  exceptions   ACL configured in the corresponding VLAN will be bound or unbound respectively  If ACL  configured in the target VLAN  which is configured in VLAN interface mode  conflicts with existing ACL  configuration on the interface  which is configured in physical interface mode  the configuration will fail  to effect       When no physical interfaces 
174. for managing the switch via Console interface are listed below     Step 1  Setting up the environment     PC   Workstation  with  Terminal emulation software    Managed Switch                  RJ 45 Type Serial Port RJ 45 DB9 RS 232 cable Serial Port  9600 8    1    Figure 3 1 Out of band Management Configuration Environment    As shown in above  the serial port  RS 232  is connected to the switch with the serial cable provided  The  table below lists all the devices used in the connection                          Device Name Description   PC machine Has functional keyboard and RS 232  with terminal emulator  installed  such as HyperTerminal included in Windows  9x NT 2000 XP    Serial port cable One end attach to the RS 232 serial port  the other end to the  Console port    Switch Functional Console port required        Step 2  Entering the HyperTerminal  Open the HyperTerminal included in Windows after the connection established  The example below is based  on the HyperTerminal included in Windows XP    1  Click Start menu   All Programs  Accessories  Communication   HyperTerminal     3 8                Mindjet MindManager Pro 6              Windows Catalog  A Windows Update             e 3CDaemon       Agere Systems  e Avira        Dr eye       Ethereal       Kent      Internet  If 16     t E mail   Mi sol FF    ru            9  FastStone Image Viewer    e Games       Google       HD Tune       IVT BlueSoleil         Jeyo Mobile Companion   97  Joa Dial Navigator        Mi
175. forwarded to the sFlow analyzer which will analyze the sample data and perform  corresponding measure according to the result  Our switch here acts as the proxy and central data collector in  the sFlow system    We have achieved data sampling and statistic targeting physical port    Our data sample includes the IPv4 and IPv6 packets  Extensions of other types are not supported so far  As  for non IPv4 and IPv6 packet  the unity HEADER mode will be adopted following the requirements in    RFC3176  copying the head information of the packet based on analyzing the type of its protocol    The latest sFlow protocol presented by InMon Company is the version 5  Since it is the version 4 which is  realized in the RFC31 76  version conflict might exist in some case such as the structure and the packet format   This is because the version 5 has not become the official protocol  so  in order to be compatible with current  applications  we will continue to follow the RFC3176     33 2 sFlow Configuration Task List    1  Configure sFlow Collector address             Command Explanation  Global mode and Port Mode  sflow destination  lt collector address gt  Configure the IP address and port number of    lt collector port gt   the host in which the sFlow analysis software  no sflow destination is installed  As for the ports  if IP address is    configured on the port  the port configuration  will be applied  or else will be applied the  global configuration  The  no sflow  destination  comma
176. ful authentication  the  authentication server will assign VLAN5  which makes the user and Ethernet1 6 both      VLAN5  allowing the  user to access the Internet     25 17       The following are configuration steps        Using the command of show running config or show interface ethernet 1 2  users can check the  configuration of Guest VLAN  When there is no online user  no failed user authentication or no user gets  offline successfully  and more authentication triggering messages  EAP Request Identity  are sent than the  upper limit defined  users can check whether the Guest VLAN configured on the port takes effect with the  command show vlan id 100     25 18       25 3 2 Examples of IPv4 Radius Applications    10 1 1 2    10 1 1 1 Radius Server  10 1 1 3    Figure 25 16 IEEE 802 1x Configuration Example Topology    The PC is connecting to port 1 2 of the switch  IEEE 802 1x authentication is enabled on port1 2  the access  mode is the default MAC based authentication  The switch IP address is 10 1 1 2  Any port other than port 1 2  is used to connect to RADIUS authentication server  which has an IP address of 10 1 1 3  and use the default  port 1812 for authentication and port 1813 for accounting  IEEE 802 1x authentication client software is    installed on the PC and is used in IEEE 802 1x authentication   The configuration procedures are listed below     Switch config  interface vlan 1   Switch Config if vian1  ip address 10 1 1 2 255 255 255 0  Switch Config if vlan1
177. g  Moreover  because multiple  VLANs share a same MSTI  the MSTP can reduce the number of spanning tree instances  which consumes  less CPU resources and reduces the bandwidth consumption     12 1 1 MSTP Region    Because multiple VLANs can be mapped to a single spanning tree instance  IEEE 802 1s committee raises  the MST concept  The MST is used to make the association of a certain VLAN to a certain spanning tree  instance       MSTP region is composed of one or multiple bridges with the same MCID  MST Configuration Identification   and the bridged LAN  a certain bridge in the MSTP region is the designated bridge of the LAN  and the  bridges attaching to the LAN are not running STP   All the bridges in the same MSTP region have the same  MSID     MSID consists of 3 attributes     W Configuration Name  Composed by digits and letters  W Revision Level  W Configuration Digest  VLANs mapping to spanning tree instances    The bridges with the same 3 above attributes are considered as in the same MST region   When the MSTP calculates CIST in a bridged LAN  a MSTP region is considered as a bridge  See the figure  below     12 1    aad       Figure 12 1 Example of CIST and MST Region    In the above network  if the bridges are running the STP or the RSTP  one port between Bridge M and Bridge  B should be blocked  But if the bridges in the yellow range run the MSTP and are configured in the same MST  region  MSTP will treat this region as a bridge  Therefore  one port between Bridge
178. g Enable disable the prevent ICMP fragment  enable attack function        Configure the max permitted ICMPv4 net load  2      length  This command has not effect when  dosattack check icmpv4 size   size     used separately  the user have to enable the    dosattack check icmp attacking enable        Configure the max permitted ICMPv6 net load     f    length  This command has not effect when  dosattack check icmpv6 size   size    used separately  the user have to enable the    dosattack check icmp attacking enable                 28 3 Security Feature Example    Scenario    The User has follows configuration requirements  the switch do not forward data packet whose source IP  address is equal to the destination address  and those whose source port is equal to the destination port  Only  the ping command with defaulted options is allowed within the IPv4 network  namely the ICMP request packet  can not be fragmented and its net length is normally smaller than 100     Configuration procedure     Switch config   dosattack check srcip equal dstip enable  Switch config   dosattack check srcport equal dstport enable          Switch config   dosattack check ipv4 first fragment enable                Switch config   dosattack check icmp attacking enable  Switch config   dosattack check icmpV4 size 100       28 3       Chapter 29 TACACS  Configuration    29 1 Introduction to TACACS     TACACS  terminal access controller access control protocol is a protocol similar to the radius protocol
179. g enable    To enable AAA accounting  The no form of  this command will disable AAA accounting           aaa accounting update  enable disable        Enable or disable the update accounting  function        2  Configure the RADIUS authentication key        Command    Explanation       Global Mode          radius server key   string    no radius server key       To configure the encryption key for the  RADIUS server  The no form of this  command will remove the configured key        3  Configure the RADIUS server        Command    Explanation       Global Mode       radius server authentication host       IPaddress       IPv6address       port    lt portNum gt     key  lt string gt    primary    access mode  dot1x telnet     no radius server authentication host   lt  Paddress gt     Specifies the IP address and listening port  number  cipher key  whether be primary  server or not and access mode for the  RADIUS server  the no command deletes  the RADIUS authentication server           radius server accounting host      lt  Paddress gt      IPv6address       port    lt portNum gt     primary     no radius server accounting host    IPaddress         Specifies the IPv4 IPv6 address and the  port number  whether be primary server for  RADIUS accounting server  the no  command deletes the RADIUS accounting  server        30 3                4  Configure the parameter of the RADIUS service    Command    Explanation       Global Mode       radius server dead time  lt minutes gt   no 
180. g lf Port Channel2         8 3       Configuration result    Shell prompts ports aggregated successfully after a while  now ports 1  2  3  4 of Switch A form an aggregated  port named    Port Channel1     ports 6  8  9  10 of Switch B forms an aggregated port named    Port Channel2      configurations can be made in their respective aggregated port configuration mode     Scenario 2  Configuring Port Channel in ON mode     SwitchA        lt           SwitchB    Figure 8 3 Configuring Port Channel in ON mode                Example  As shown in the figure  ports 1  2  3  4 of SwitchA are access ports that belong to VLAN1  Add those  four ports to group1 in    on    mode  Ports 6  8  9  10 of SwitchB are access ports that also belong to VLAN1   add these four ports to group2 in    on    mode     The configuration steps are listed below     SwitchA config   SwitchA  config  interface ethernet 1 1   SwitchA  Config If Ethernet1 1 zport group 1 mode on  SwitchA  Config lf Ethernet1 1  exit   SwitchA  config  interface ethernet 1 2   SwitchA  Config If Ethernet1 2 zzport group 1 mode on  SwitchA  Config lf Ethernet1 2  exit   SwitchA  config  interface ethernet 1 3   SwitchA  Config If Ethernet1 3 zzport group 1 mode on  SwitchA  Config lf Ethernet1 3  exit   SwitchA  config  interface ethernet 1 4   SwitchA  Config If Ethernet1 4 zzport group 1 mode on  SwitchA  Config lf Ethernet1 4  exit    SwitchB config   SwitchB  config  port group 2   SwitchB  config  interface ethernet 1 6   
181. g option82 function  Set the private packet version   Set DES encrypted key for private packets  Set helper server address   Set trusted ports    Enable DHCP Snooping binding DOT1X function  10  Enable DHCP Snooping binding USER function  11  Adding static list entries function    12  Set defense actions    13  Set rate limitation of DHCP messages  14  Enable the debug switch    1   Enable DHCP Snooping       Command    Explanation       Globe mode       ip dhcp snooping enable  no ip dhcp snooping enable          Enable or disable the DHCP snooping function        2  Enable DHCP Snooping binding       Command    Explanation       Globe mode       ip dhcp snooping binding enable  no ip dhcp snooping binding  enable          Enable or disable the DHCP snooping binding  function        3  Enable DHCP Snooping binding ARP function    4  Enable DHCP Snooping option82 function       Command    Explanation       Globe mode       ip dhcp snooping binding arp  no ip dhcp snooping binding arp          Enable or disable the dhcp snooping binding  ARP function        19 2                   Command    Explanation       Globe mode       ip dhcp snooping information enable  no ip dhcp snooping information  enable    Enable disable DHCP Snooping option 82  function        ip dhcp snooping option82 enable  no ip dhcp snooping option82  enable          To enable delete DHCP option82 of dot1x in  access switch        5  Set the private packet version       Command    Explanation       Globe mo
182. g unit on the other end of the link  A Supplicant system usually is a user terminal  device  Users start 802 1x authentication by starting supplicant system software  A supplicant  system should support EAPOL  Extensible Authentication Protocol over LAN      25 1       The authenticator system is another entity on one end of the LAN segment to authenticate the  supplicant systems connected  An authenticator system usually is a network device supporting  802 1x protocol  providing ports to access the LAN for supplicant systems  The ports provided can  either be physical or logical    The authentication server system is an entity to provide authentication service for authenticator  systems  The authentication server system is used to authenticate and authorize users  as well as  does fee counting  and usually is a RADIUS  Remote Authentication Dial In User Service  server   which can store the relative user information  including username  password and other parameters  such as the VLAN and ports which the user belongs to     The three entities above concerns the following basic concepts  PAE of the port  the controlled ports and the    controlled direction     1  PAE    PAE  Port Access Entity  is the entity to implement the operation of algorithms and protocols     The PAE of the supplicant system is supposed to respond the authentication request from the  authenticator systems and submit user   s authentication information to the authenticator system  It  can also send authe
183. gent  is  2004 1 2 3  1  The NMS network administrative software uses SNMP protocol to obtain data from the switch   The configuration on the switch is listed below     Switch config  snmp server enable  Switch config  snmp server community rw private  config  snmp server community ro public                     Switch config  snmp server securityip 2004 1 2 3  2       The NMS can use private as the community string to access the switch with read write permission  or use  public as the community string to access the switch with read only permission     Scenario 6  NMS will receive Trap messages from the switch  Note  NMS may have community string  verification for the Trap messages  In this scenario  the NMS uses a Trap verification community string of    trap    The configuration on the switch is listed below     4 12          Switch config  snmp server host 2004 1 2 3  2 v1 trap  Switch config  snmp server enable traps       4 4 6 SNMP Troubleshooting    When users configure the SNMP  the SNMP server may fail to run properly due to physical connection failure  and wrong configuration  etc  Users can troubleshoot the problems by following the guide below    W Good condition of the physical connection       Interface and datalink layer protocol is Up  use the    show interface  command   and the connection  between the switch and host can be verified by ping  use    ping    command        The switch enabled SNMP Agent server function  use  snmp server  command    W Secure IP f
184. get a special care all along  unless the data are transmitted at TRUNK port  The configuration is very simple  it has only one command  i e   to set priority for the specified multicast  The commands are as follows        Command Explanation       Global Configuration Mode       Configure multicast strategy  specify     no  ip multicast policy  lt  PADDRESS M gt  n  priority for sources and groups in     lt IPADDRESS M gt  cos   priority       specific range  and the range is  lt 0 7 gt               21 2 3 DCSCM Configuration Examples    1  Source Control   In order to prevent an Edge Switch from putting out multicast data ad asbitsium  we configure Edge Switch so  that only the switch at port Ethernet1 5 is allowed to transmit multicast  and the data group must be 225 1 2 3   Also  switch connected up to port Ethernet1 10 can transmit multicast data without any limit  and we can make  the following configuration        EC config  access list 5000 permit ip any host 225 1 2 3  EC config  access list 5001 permit ip any any       EC config  ip multicast source control    EC Config If Ethernet1 5  ip multicast source control access group 5000             EC config  interface ethernet1 5     EC config  interface ethernet1 10       EC Config If Ethernet1 10 zip multicast source control access group 5001       2  Destination Control  We want to limit users with address in 10 0 0 0 8 network segment from entering the group of 238 0 0 0 8  so    we can make the following configurati
185. ght up by Microsoft based on EAP and TLS protocols  It uses PKI to protect the id  authentication between the supplicant system and the RADIUS server and the dynamically generated session  keys  requiring both the supplicant system and the Radius authentication server to possess digital certificate  to implement bidirectional authentication  It is the earliest EAP authentication method used in wireless LAN   Since every user should have a digital certificate  this method is rarely used practically considering the difficult  maintenance  However it is still one of the safest EAP standards  and enjoys prevailing supports from the    vendors of wireless LAN hardware and software   The following figure illustrates the basic operation flow of the EAP TLS authentication method     25 8       pen iin TIN    EAPOL Start    EAP Request identity    EAP Response ldentity    RADIUS Access Challenge  EAP Request EAP TLS Start  EAP Request EAP TLS Stan     RAD US Access Request  EAP Response EAP TLS client hello  EAP Response EAP TLS client hello        RADIUS Access Request   EAP Response Identty        RADIUS Access Challenge  EAP Response EAP TLS   EAP Response EAP TLS  TLS server_hello  TLS certificate  TLS server_hello  TLS certificate   LS server exchange  TLS certificate request   15 server exchange  TLS certificate request   TLS server hello done TLS server nelo done     EAP Response EAP TLS  RADIUS Access Request  TLS certificate  TLS client key exchange   TLS   EAP Response EAP T
186. got its unique MAC address  VLAN will trace the address  belongs to specified MAC  By This means  VLAN allows the voice equipment always belong to Voice VLAN  when relocated physically  The greatest advantage of the VLAN is the equipment can be automatically placed  into Voice VLAN according to its voice traffic which will be transmitted at specified priority  Meanwhile  when  voice equipment is physically relocated  it still belongs to the Voice VLAN without any further configuration  modification  which is because it is based on voice equipment other than switch port     10 15       10 5 2 Voice VLAN Configuration    Voice VLAN Configuration Task Sequence   1  Set the VLAN to Voice VLAN   2  Adda voice equipment to Voice VLAN  3  Enable the Voice VLAN on the port    1  Configure the VLAN to Voice VLAN       Command Explanation       Global Mode  voice vlan vlan   vlan id         Set cancel the VLAN as a Voice VLAN             no voice vlan    2  Add a Voice equipment to a Voice VLAN       Command Explanation       Global Mode  voice vlan mac  lt mac address gt  mask       mac mask  priorit riority id gt   name          s P      y Specify certain voice equipment    succus join leave the Voice VLAN  no voice vlan  mac   mac address   mask               mac mask   name  lt voice name gt   all        3  Enable the Voice VLAN of the port                   Command Explanation  Port Mode  switchport voice vlan enable Enable disable the Voice VLAN function  no switchport voice vlan
187. gregation    Maximum 8 trunk groups  up to 8 ports per trunk group             802 3ad         Link Aggregation Control Protocol     Cisco ether channel  Static Trunk   Spanning Tree Protocol    STP  IEEE 802 10  Classic Spanning Tree Protocol     RSTP  IEEE 802 1w  Rapid Spanning Tree Protocol     MSTP  IEEE 802 15  Multiple Spanning Tree Protocol  spanning tree by VLAN     Supports BPDU  amp  port guard  Port Mirroring to monitor the incoming or outgoing traffic on a particular port  many to many   Provides Port Mirror  many to 1     1 3        gt  Quality of Service    8 priority queues on all switch ports  Supports for strict priority and Weighted Round Robin  WRR  CoS policies  Traffic classification     IEEE 802 1p CoS   ToS     Pv4  IPv6 DSCP     Port Based QoS  Strict priority and Weighted Round Robin  WRR  CoS policies       Multicast    Support IGMP Snooping v1 v2 and v3  MLD v1 and v2 snooping  Querier mode support       Security    IEEE 802 1x Port Based network access authentication   MAC Based network access authentication   Build in RADIUS client to co operate with the RADIUS servers for IPv4 and IPv6  TACACS  login users access authentication   IP Based Access Control List  ACL    MAC Based Access Control List   Supports DHCP Snooping   Supports ARP Inspection       Management    Switch Management Interface    Console   Telnet Command Line Interface    Web switch management    SNMP v1  v2c  and v3 switch management    SSH secure access  BOOTP and DHCP for IP a
188. guarding the security of networks  The  user can lay down a set of rules according to some information specific to packets  each rule describes the  action for a packet with certain information matched   permit  or                 The user can apply such rules to the  incoming direction of switch ports  so that data streams in the incoming direction of specified ports must  comply with the ACL rules assigned     24 1 1 Access list    Access list is a sequential collection of conditions that corresponds to a specific rule  Each rule consist of filter  information and the action when the rule is matched  Information included in a rule is the effective combination  of conditions such as source IP  destination IP  IP protocol number and TCP port  UDP port  Access lists can  be categorized by the following criteria      Filter information based criterion  IP access list  layer 3 or higher information   MAC access list   layer 2 information   and MAC IP access list  layer 2 or layer 3 or higher         Configuration complexity based criterion  standard and extended  the extended mode allows more  specific filtering of information        Nomenclature based criterion  numbered and named   Description of an ACL should cover the above three aspects     24 1 2 Access group    When a set of access lists are created  they can be applied to traffic of incoming direction on all ports   Access group is the description to the binding of an access list to the incoming direction on a specific p
189. guration file     4 5 3 2 FTP TFTP Configuration    The configurations of switch as FTP and TFTP clients are almost the same  so the configuration procedures  for FTP and TFTP are described together in this manual     4 5 3 2 1 FTP TFTP Configuration Task List    1  FTP TFTP client configuration     1  Upload download the configuration file or system file    2  For FTP client  server file list can be checked     2  FTP server configuration     1  Start FTP server    2  Configure FTP login username and password   3  Modify FTP server connection idle time    4  Shut down FTP server    3  TFTP server configuration     1  Start TFTP server    2  Configure TFTP server connection idle time    3  Configure retransmission times before timeout for packets without acknowledgement   4  Shut down TFTP server    1  FTP TFTP client configuration   1  FTP TFTP client upload download file     2                       Explanation       Admin Mode       copy  lt source url gt   lt destination url gt    ascii   binary        FTP TFTP client upload download file              For FTP client  server file list can be checked           Admin Mode             4 18          For FTP client  server file list can be  ftp dir  lt ftpServerUrl gt  checked  FtpServerUrl format looks like  ftp     user  password  Pv4 IPv6 Address                 2  FTP server configuration   1  Start FTP server       Command Explanation       Global Mode       Start FTP server and support IPv4  IPv6  the no  ftp server enable
190. guration when relocated    The VLAN is divided by the network layer protocol  assigning different protocol to different VLANs  This is very  attractive to the network administrators who wish to organize the user by applications and services  Moreover  the user can move freely within the network while maintaining his membership  Advantage of this method  enables user to change physical position without changing their VLAN residing configuration  while the VLAN  can be divided by types of protocols which is important to the network administrators  Further  this method has    10 11       no need of added frame label to identify the VLAN which reduce the network traffic     10 4 2 Dynamic VLAN Configuration    Dynamic VLAN Configuration Task Sequence     Set the VLAN to MAC VLAN                            Adjust the priority of the dynamic VLAN    Configure the MAC based VLAN function on the port    Configure the correspondence between the MAC address and the VLAN  Configure the IP subnet based VLAN function on the port   Configure the correspondence between the IP subnet and the VLAN  Configure the correspondence between the Protocols and the VLAN    1  Configure the MAC based VLAN function on the port       Port Mode    Command Explanation       switchport mac vlan enable  no switchport mac vlan enable          Enable disable the MAC based VLAN  function on the port        2  Set the VLAN to MAC VLAN       Command    Explanation       Global Mode       mac vlan vlan  lt vian id
191. hat the SFP  transceiver is operating correctly    Check the Link mode of the SFP port if the link failed  Co works with some fiber NICs or Media  Converters  set the Link mode to    1000 Force  is needed     Remove the transceiver module   Make sure there is no network activity by consult or check with the network administrator  Or through the  management interface of the switch converter  if available  to disable the port in advance    Remove the Fiber Optic Cable gently    Turn the handle of the MGB module to horizontal    Pull out the module gently through the handle        f  transceiver  1  20    Figure 2 8 Pull out      SFP transceiver       Never pull out the module without pull the handle or the push bolts on the module   Direct pull out the module with violent could damage the module and SFP module  slot of the Managed Switch           2 7       Chapter 3 Switch Management    3 1 Management Options    After purchasing the switch  the user needs to configure the switch for network management  Switch provides  two management options  in band management and out of band management     3 1 1 Out Of Band Management    Out of band management is the management through Console interface  Generally  the user will use  out of band management for the initial switch configuration  or when in band management is not available   For instance  the user must assign an IP address to the switch via the Console interface to be able to access  the switch through Telnet    The procedures 
192. he  TACACS  authentication server      timeout  lt seconds gt    key  lt string gt     primary    no tacacs server authentication host    IPaddress                  29 1       3  Configure the TACACS  authentication timeout time                               Command Explanation  Global Mode  Configure the authentication timeout for the  tacacs server timeout  lt seconds gt  TACACS  server  the  no tacacs server  no tacacs server timeout timeout    command restores the default  configuration   4  Configure the IP address of the TACACS  NAS  Command Explanation  Global Mode  tacacs server nas ipv4   ip address   To configure the source IP address for the  no tacacs server nas ipv4 TACACS  packets for the switch                 29 3 TACACS  Scenarios Typical Examples    10 1 1 2       10 1 1 1 Tacacs Server  10 1 1 3    Figure 29 1 TACACS Configuration    A computer connects to a switch  of which the IP address is 10 1 1 2 and connected with a TACACS   authentication server  IP address of the server is 10 1 1 3 and the authentication port is defaulted at 49  set  telnet log on authentication of the switch as tacacs local  via using TACACS  authentication server to achieve  telnet user authentication     Switch config  interface vlan 1  Switch Config if vlan1  ip address 10 1 1 2 255 255 255 0  Switch Config if vlan1   exit                  Switch config  tacacs server authentication host 10 1 1 3       29 2       Switch config  tacacs server key test    Switch config  authentica
193. he IPv4 address of the remote  log server is 100 100 100 5  It is required to send the log information with a severity equal to or higher than  warnings to this log server and save in the log record equipment local1     Configuration procedure        Switch config  interface vlan 1   Switch Config if Vlan1   ip address 100 100 100 1 255 255 255 0          Switch Config if Vlan1  exit  Switch config  logging 100 100 100 5 facility local1 level warnings       Example 2    When managing VLAN the IPv6 address of the switch is 3ffe 506  1  and the IPv4 address of the remote log  server is 3ffe 506  4  It is required to send the log information with a severity equal to or higher than critical to  this log server and save the log in the record equipment local7     Configuration procedure    Switch config  interface vlan 1  Switch Config if Vlan1  ipv6 address 3ffe 506  1 64          Switch Config if Vlan1  exit  Switch config  logging 3ffe 506  4 facility local7 level critical       35 29       Chapter 36 Reload Switch after Specified  Time    36 1 Introduce to Reload Switch after Specifid Time    Reload switch after specified time is to reboot the switch without shutdown its power after a specified period of  time  usually when updating the switch version  The switch can be rebooted after a period of time instead of  immediately after its version being updated successfully     36 2 Reload Switch after Specifid Time Task List    1  Reload switch after specified time       Command Ex
194. he RADIUS protocol is the most common used protocol in  the AAA framework     30 1 2 Message structure for RADIUS    The RADIUS protocol uses UDP to deliver protocol packets  The packet format is shown as below       15 1  0   15       Attributes    Figure 30 1 Message structure for RADIUS    Code field 1 octets   is the type of the RADIUS packet  Available value for the Code field is show as below     Access Request     Access Accept     Access Reject     Accounting Request     Accounting Response         WN        Access Challenge    30 1       Identifier field  1 octet   Identifier for the request and answer packets   Length field  2 octets   The length of the overall RADIUS packet  including Code  Identifier  Length   Authenticator and Attributes    Authenticator field  16 octets   used for validation of the packets received from the RADIUS server  Or it can  be used to carry encrypted passwords  This field falls into two kinds  the Request Authenticator and the  Response Authenticator     Attribute field  used to carry detailed information about AAA  An Attribute value is formed by Type  Length  and  Value fields      Type field  1 octet   the type of the attribute value  which is shown as below                                                                                   Property Type of property Property Type of property  1 User Name 23 Framed IPX Network  2 User Password 24 State  3 CHAP Password 25 Class  4 NAS IP Address 26 Vendor Specific  5 NAS Port 27 Session
195. he classification information  For different packet types and switch configurations   classification is performed differently  the flowchart below explains this in detail     13 3       MPLS Y  packet  30     N  IP p acket ib  N  ISP  to  Int Pr io    Y  tag packet  IEC P to Ikop Prec C  S    to Int Pr io    Coxwerziom accordimrg COS to Ikop Prec  to the mclet DSCP comwerziom accordizg to the  packet COS walwe                                      Set the packet COS field  equals Int Prio    Fater the policizg flow    Figure 13 4 Classification process          Policing and remark  Each packet in classified ingress traffic is assigned an internal DSCP value and can be  policed and remarked    Policing can be performed based on the flow to configure different policies that allocate bandwidth to  classified traffic  the assigned bandwidth policy may be dual bucket dual color or dual bucket three color  The  traffic  will be assigned with different color  can be discarded or passed  for the passed packets  add the  remarking action  Remarking uses a new DSCP value of lower priority to replace the original higher level  DSCP value in the packet The following flowchart describes the operations     13 4              hether configure  policing policy    Check policing policy  is  traffic in profile     Select one or several option of the following   Set COS  Set I2 COS field of the packet   Set Int Prio  Set internal priority of the  packet   Set Drop Prec  Set drop precedence of the
196. he numbered  extended access list of    specified number does         exist  then an access list will    be created using this number        access list lt num gt  deny permit  any source mac    host source mac lt host_smac gt     lt smac gt  lt smac ma  sk gt    any destination mac  host destination mac   lt host_dmac gt     lt dmac gt  lt dmac mask gt   udp     lt source gt  lt source wildcard gt   any source    host source lt source host ip gt     s port    lt port1 gt     range  lt sPortMin gt   lt sPortMax gt         lt destination gt  lt destination wildcard gt   any destinati  on   host destination   destination host ip      d port  f  lt port3 gt    range  lt sPortMin gt   lt sPortMax gt       precedence  lt precedence gt    tos      tos    time range   time range name       Creates a numbered mac udp  extended mac ip access rule   if the numbered extended  access list of specified  number does not exist  then  an access list will be created    using this number           access list lt num gt  deny permit  any source mac    host source mac lt host_smac gt     lt smac gt  lt smac ma  sk      any destination mac  host destination mac   lt host_dmac gt     lt dmac gt  lt dmac mask gt      eigrp greligrp ip ipinip ospf   lt protocol num gt          lt source gt  lt source wildcard gt   any source        Creates a numbered    extended mac ip access rule  for other    specific                protocol      all              protocols  if the numbered    extended access list 
197. he switch           4 2 2 SSH    4 2 2 1 Introduction to SSH    SSH  Secure Shell  is a protocol which ensures a secure remote access connection to network devices  It is  based on the reliable TCP IP protocol  By conducting the mechanism such as key distribution  authentication  and encryption between SSH server and SSH client  a secure connection is established  The information  transferred on this connection is protected from being intercepted and decrypted  The switch meets the  requirements of SSH2 0  It supports SSH2 0 client software such as SSH Secure Client and putty  Users can    run the above software to manage the switch remotely     The switch presently supports RSA authentication     authentication etc     3DES cryptography protocol and SSH user password             SSH Server Configuration    4 2 2 2 SSH Server Configuration Task List       Command    Explanation       Global Mode       ssh server enable  no ssh server enable    ssh user  lt user name gt  password  0   7    lt password gt   no ssh user  lt user name gt     Enable SSH function on the switch  the    no  ssh server enable    command disables SSH  function    Configure the username and password of SSH  client software for logging on the switch  the    no  ssh user  lt user name gt     command deletes the  username        ssh server timeout  lt timeout gt   no ssh server timeout    Configure timeout value for SSH authentication   the    no ssh server timeout    command restores  the default timeout 
198. hen the type is 4  it means MD5 Challenge  like PPP CHAP protocol     contains query messages   0 7 N    Figure 25 5 the Format of Data Domain in Request and Response Packets    25 4       Identifier  to assist matching the Request and Response messages   Length  the length of the EAP packet  covering the domains of Code  Identifier  Length and Data  in byte   Data  the content of the EAP packet  depending on the Code type     25 1 4 The Encapsulation of EAP Attributes    RADIUS adds two attribute to support EAP authentication  EAP Message and Message Authenticator  Please  refer to the Introduction of RADIUS protocol in    AAA RADIUS HWTACACS operation    to check the format of  RADIUS messages     1  EAP Message   As illustrated in the next figure  this attribute is used to encapsulate EAP packet  the type code is 79  String  domain should be no longer than 253 bytes  If the data length in an EAP packet is larger than 253 bytes  the  packet can be divided into fragments  which then will be encapsulated in several EAP Messages attributes in  their original order     0 7 15          N    EAP packets    Figure 25 6 the Encapsulation of EAP Message Attribute       2  Message Authenticator   As illustrated in the next figure  this attribute is used in the process of using authentication methods like EAP  and CHAP to prevent the access request packets from being eavesdropped  Message Authenticator should  be included in the packets containing the EAP Message attribute  or the pac
199. hernet1 1  switchport nd dynamic maximum 10             Switch  Config If Ethernet1 1  switchport arp dynamic maximum 20          Switch  Config if Vlan1  vlan mac address dynamic maximum 30    26 4 The Number Limitation Function of Port  MAC in VLAN  Troubleshooting Help    The number limitation function of port  MAC in VLAN is disabled by default  if users need to limit the number of    26 3    user accessing the network  they can enable it  If the number limitation function of MAC address can not be  configured  please check whether Spanning tree  dot1x  TRUNK is running on the switch and whether the port  is configured as a MAC binding port  The number limitation function of MAC address is mutually exclusive to  these configurations  so if the users need to enable the number limitation function of MAC address on the port     they should check these functions mentioned above on this port are disabled    If all the configurations are normal  after enabling the number limitation function of port  MAC in VLAN  users  can use debug commands to debug every limitation  check the details of number limitations and judge  whether the number limitation function is correct  If there is any problem  please sent result to technical  service center     26 4       Chapter 27 Operational Configuration of AM  Function    27 1 Introduction to AM Function    AM  Access Management  means that when a switch receives an IP or ARP message  it will compare the  information extracted from the mess
200. hosting  file for importing  The no command deletes  the address of the server hosting file for  importing        option  lt code gt   ascii  lt string gt    hex    hex     ipaddress   ipaddress     no option   code      Configure the network parameter specified  by the option code  The no command  deletes the network parameter specified by  the option code        lease   days  hours  minutes    infinite    no lease    Configure the lease period allocated to  addresses in the address pool  The no  command deletes the lease period allocated  to addresses in the address pool        Global Mode          ip dhcp excluded address    low address      high address     no ip dhcp excluded address         low address      high address       Exclude the addresses in the address pool  that are not for dynamic allocation         8  Configure manual DHCP address pool parameters                   Command Explanation  DHCP Address Pool Mode  hardware address   hardware address    Specify delete the hardware address    Ethernet   IEEE802    type number     du  when assigning address manually   no hardware address       18 3                            host   address     lt mask gt    Specify delete the IP address to be   lt prefix length gt    assigned to the specified client when  no host binding address manually   client identifier  lt wnique identifier gt  Specify delete the unique ID of the user  no client identifier when binding address manually        3  Enable logging for address confl
201. hree types of frames can be forwarded by the switch   E Broadcast frame  B Multicast frame     Unicast frame  The following describes how the switch deals with all the three types of frames     B X Broadcast frame  The switch can segregate collision domains but not broadcast domains  If no  VLAN is set  all devices connected to the switch are in the same broadcast domain  When the  switch receives a broadcast frame  it forwards the frame in all ports  When VLANs are configured in  the switch  the MAC table will be adapted accordingly to add VLAN information  In this case  the  Switch will not forward the received broadcast frames in all ports  but forward the frames in all ports  in the same VLAN     B Multicast frame  When IGMP Snooping function is not enabled  multicast frames are processed in  the same way as broadcast frames  when IGMP Snooping is enabled  the switch will only forward  the multicast frames to the ports belonging to the very multicast group      m Unicast frame  When no VLAN is configured  if the destination MAC addresses        in the switch  MAC table  the switch will directly forward the frames to the associated ports  when the destination  MAC address in a unicast frame is not found in the MAC table  the switch will broadcast the unicast  frame  When VLANs are configured  the switch will forward unicast frame within the same VLAN  If  the destination MAC address is found in the MAC table but belonging to different VLANs  the switch  can only broadcast 
202. iarize yourself with its display  indicators  and ports  Front panel illustrations in this chapter display the unit LED indicators  Before  connecting any network device to the Managed Switch  please read this chapter completely     2 1 Hardware Description    2 1 1 Switch Front Panel    The unit front panel provides a simple interface monitoring the switch  Figure 2 1 shows the front panel of the  Managed Switch     WGSW 50040 Front Panel                                 Figure 2 1 WGSW 50040 front panel          Gigabit TP interface  10 100 1000Base T Copper  RJ 45 Twist Pair  Up to 100 meters        Gigabit SFP slots  1000Base SX LX mini GBIC slot  SFP  Small Form Factor Pluggable  transceiver module  From 550  meters  Multi mode fiber   up to 10 20 30 40 50 70 120 kilometers  Single mode fiber         Console Port  The console port is a RJ 45 type  RS 232 male seria port connector  It is an interface for connecting a  terminal directly  Through the console port  it provides rich diagnostic information includes IP Address  setting  factory reset  port management  link status and system setting  Users can use the attached  RS 232 cable in the package and connect to the console port on the device  After the connection  users  an run any terminal emulation program  Hyper Terminal  ProComm Plus  Telix  Winterm and so       to  enter the statup screen of the device     2 1       2 1 2 LED Indications    The front panel LEDs indicates instant status of port links  data activity  
203. icts                         Command Explanation   Global Mode  ip dhcp conflict logging Enable disable logging for DHCP address to  no ip dhcp conflict logging detect address conflicts   Admin Mode        Delete a single address conflict record or all  clear ip dhcp conflict   address   all  gt      conflict records        18 3 DHCP Configuration Examples    Scenario 1    Too save configuration efforts of network administrators and users  a company is using switch as a DHCP  server  The Admin VLAN IP address is 10 16 1 2 16  The local area network for the company is divided into  network A and B according to the office locations  The network configurations for location A and B are shown                      below    PoolA network 10 16 1 0  PoolB network 10 16 2 0    Device IP address Device IP address   Default gateway 10 16 1 200 Default gateway 10 16 1 200  10 16 1 201 10 16 1 201   DNS server 10 16 1 202 DNS server 10 16 1 202   WINS server 10 16 1 209 WWW server 10 16 1 209   WINS node type H node   Lease 3 days Lease 1day                      In location A  a machine with MAC address 00 03 22 23 dc ab is assigned with a fixed IP address of  10 16 1 210 and named as  management      Switch config  service dhcp   Switch config  interface vlan 1   Switch Config Vlan 1  ip address 10 16 1 2 255 255 0 0  Switch Config Vlan 1  exit   Switch config  ip dhcp pool A    h dhcp A config  network 10 16 1 0 24  Switch dhcp A config  lease 3  Switch dhcp A config  default route 10 1
204. ied  So in order to satisfy the new  demand from the user and realize the platforms irrelevance of the authentication client  the Web    authentication function based on 802 1x is designed for authentication    The Web authentication is still based on IEEE 802 1x authentication system  the Java Applet in internet  explorer is instead of the prior client software  the devises is layer 3 switch  authentication server is the  standardized RADIUS server  and the authentication message is loaded in the EAP message to communicate   The Ethernet frame can   t be send because of the Java Applet used in client  so EAP message can   t be  encapsulated in the Ethernet frame to send  EAP message should be loaded on the UDP protocol instead of  EAPOU  in order to achieve the authentication and communication between web client and web  authentication proxy switch  The standardized EAPOR protocol is still used between the authentication proxy  switch and authentication server     25 1 6 The Authentication Methods of 802 1x    The authentication can either be started by supplicant system initiatively or by devices  When the device  detects unauthenticated users to access the network  it will send supplicant system EAP Request Identity  messages to start authentication  On the other hand  the supplicant system can send EAPOL Start message    to the device via supplicant software    802 1 x systems supports EAP relay method and EAP termination method to implement authentication with  the remot
205. ified port  the no command restores the default setting  of allowing 1 user        dot1x max user userbased   lt number gt    no dot1x max user  userbased    Set the upper limit of the number of users allowed  accessing the specified port  only used when the access  control mode of the port is userbased  the no command is  used to reset the limit to 10 by default           dot1x guest vlan   vlanID   no dot1x guest vlan       Set the guest vlan of the specified port  the no command is  used to delete the guest vlan        3  Configure expanded 802 1x function       Command    Explanation       Global Mode          dot1x macfilter enable  no dot1x macfilter enable       Enables the 802 1x address filter function in the switch  the  no command disables the 802 1x address filter function        25 14                      dot1x accept mac   lt mac address gt   interface   lt interface name gt      no dot1x accept mac   lt mac address gt   interface   lt interface name gt       Adds 802 1x address filter table entry  the no command  deletes 802  1x filter address table entries           dot1x eapor enable       Enables the EAP relay authentication function in the          switch  the no command sets EAP local end       dotix eapor enable tu  authentication   4  Configure IPv6 passthrough function of the port  Command Explanation  Global Mode          dot1x ipv6 passthrough  no dot1x ipv6 passthrough    dot1x web authentication    ipv6 passthrough    no dot1x web authentication  ip
206. igurations on the switch except allocating an IPv6 address for the local host     4 3 Configurate Switch IP Addresses    All Ethernet ports of switch are default to Data Link layer ports and perform layer 2 forwarding  VLAN interface  represent a Layer 3 interface function which can be assigned an IP address  which is also the IP address of  the switch  All VLAN interface related configuration commands can be configured under VLAN Mode  Switch  provides three IP address configuration methods    m Manual   m BOOTP      DHCP  Manual configuration of IP address is assign an IP address manually for the switch   In BOOTP DHCP mode  the switch operates as a BOOTP DHCP client  send broadcast packets of  BOOTPRequest to the BOOTP DHCP servers  and the BOOTP DHCP servers assign the address on  receiving the request  In addition  switch can act as a DHCP server  and dynamically assign network  parameters such as IP addresses  gateway addresses and DNS server addresses to DHCP clients DHCP  Server configuration is detailed in later chapters     4 3 1 Switch IP Addresses Configuration Task List    1  Enable VLAN port mode  2  Manual configuration   3   BOOTP configuration   4   DHCP configuration    1  Enable VLAN port mode       Command Explanation       Global Mode            Create VLAN interface  layer 3 interface   the           interface vlan  lt vian id gt     interface vlan  lt vian id gt     command deletes the    VLAN interface     no interface vlan  lt vlan id gt              
207. ile is for initiating the switch  namely what we usually call the ROM update file  It can be  compressed into IMG file if it is of large size   The boot file can only be saved in the ROM in which the file    name is defined as boot rom  The update method of the system image file and the boot file is the same  The switch supplies the user with  two modes of updating  1  BootROM mode  2  TFTP and FTP update at Shell mode  This two update method    4 13       will be explained in details in following two sections     4 5 2 BootROM Upgrade    There are two methods for BootROM upgrade  TFTP and FTP  which can be selected at BootROM command  settings        cable  connection    Console cable  connection       Figure 4 2 Typical topology for switch upgrade in BootROM mode    The upgrade procedures are listed below    Step 1    As shown in the figure  a PC is used as the console for the switch  A console cable is used to connect PC to  the management port on the switch  The PC should have FTP TFTP server software installed and has the  image file required for the upgrade     Step 2   Press    ctrl b    on switch boot up until the switch enters BootROM monitor mode  The operation result is shown  below      Boot      Step 3    Under BootROM mode  run    setconfig    to set the IP address and mask of the switch under BootROM mode   server IP address and mask  and select TFTP or FTP upgrade  Suppose the switch address is 192 168 1 2   and PC address is 192 168 1 66  and select TFTP upgr
208. inding user   lt mac gt  address  lt ipAddr gt   lt mask gt   vlan   vid   interface  ethernet      ifname     no ip dhcp snooping binding user    mac   interface  ethernet           ifname      12  Set defense actions       Add delete DHCP snooping static binding list  entries        Command    Explanation       Port mode       ip dhcp snooping action   shutdown blackhole   recovery    second      no ip dhcp snooping action          Set or delete the DHCP snooping automatic  defense actions of ports        13  Set rate limitation of data transmission       Command    Explanation       Globe mode       ip dhcp snooping limit rate  lt pps gt   no ip dhcp snooping limit rate          Set rate limitation of the transmission of DHCP  snooping messages        14  Enable the debug switch       Command    Explanation       Admin mode             19 4                            debug ip dhcp snooping packet  debug ip dhcp snooping event Please refer to the chapter on system  debug ip dhcp snooping update troubleshooting    debug ip dhcp snooping binding                19 3 DHCP Snooping Typical Application    SWITCH       DHCP Client DHCPSerer  IP 1 1 1 5 DHCPACK IP  1 1 1 6              Mac BB    Figure 19 1 Sketch Map of TRUNK    As showed in the above chart  Mac AA device is the normal user  connected to the non trusted port 1 1 of the  switch  It operates via DHCP Client  IP 1 1 1 5  DHCP Server and GateWay are connected to the trusted ports  1 11 and 1 12 of the switch  the mali
209. interface1 on the switch  The IP  addresses of these 30 PCs range from 100 10 10 1 to 100 10 10 30  Considering security  the system  manager will only take user with an IP address within that range as legal ones  And the switch will only    forward data packets from legal users while dumping packets from other users   According to the requirements mentioned above  the switch can be configured as follows     Switch config  am enable  Switch config  interface ethernet1 1          Switch Config If Ethernet1 1  am port  Switch Config lf Ethernet1 1  am ip pool 10 10 10 1 10       27 4 AM Function Troubleshooting    AM function is disabled by default  and after it is enabled  relative configuration of AM can be made   Users can view the current AM configuration with  show am  command  such as whether the AM is enabled or  not  and AM information on each interface  they can also use    show am  interface  lt interface name gt         command to check the AM configuration information on a specific interface   If any operational error happens  the system will display detailed corresponding prompt     27 3       Chapter 28 Security Feature Configuration    28 1 Introduction to Security Feature    Before introducing the security features  we here first introduce the DoS  The DoS is short for Denial of  Service  which is a simple but effective destructive attack on the internet  The server under DoS attack will  drop normal user data packet due to non stop processing the attacker   s d
210. ion  the current Access port will leave the VLAN  set by the user and join Auto VLAN    Auto VLAN won t change or affect the port s configuration  But the priority of Auto VLAN is higher than that of  the user set VLAN  that is Auto VLAN is the one takes effect when the authentication is finished  while the  user set VLAN do not work until the user become offline        ga At present  Auto VLAN can only be used in the port based access control mode   Aand on the ports whose link type is Access              2  Guest VLAN   Guest VLAN feature is used to allow the unauthenticated user to access some specified resources    The user authentication port belongs to a default VLAN  Guest VLAN  before passing the 802 1x  authentication  with the right to access the resources within this VLAN without authentication  But the  resources in other networks are beyond reach  Once authenticated  the port will leave Guest VLAN  and the  user can access the resources of other networks    In Guest VLAN  users can get 802 1x supplicant system software  update supplicant system or update some  other applications  such as anti virus software  the patches of operating system   The access device will add  the port into Guest VLAN if there is no supplicant getting authenticated successfully in a certain stretch of time    because of lacking exclusive authentication supplicant system or the version of the supplicant system being    25 12       too low   Once the 802 1x feature is enabled and the Guest
211. is enabled  It only does the  following tasks    BH Remove the layer 2 multicast entries       Provide query functions to the layer 3 with vlan  S  and G as the parameters        Whenlayer 3 IGMP is disabled  re enable distributing layer 2 multicast entries     By looking up the layer 3 IPMC entries  it can be found that ports can be indicated by the layer 3 multicast  entries  This ensures the IGMP snooping can work in cooperation with the layer 3 multicast protocols     21 3 4 IGMP Snooping Troubleshooting    On IGMP Snooping function configuration and usage  IGMP Snooping might not run properly because of  physical connection or configuration mistakes  So the users should note that        Make sure correct physical connection      Activate IGMP Snooping on whole configuration mode  use ip igmp snooping       Configure IGMP Snooping at VLAN on whole configuration mode   use      igmp snooping vlan    vlan id     W          sure one VLAN is configured as L2 common checker in same mask  or make sure configured  static mrouter   WB Use show ip igmp snooping vlan   vid   command check IGMP Snooping information    21 23       Chapter 22 IPv6 Multicast Protocol    22 1 MLD Snooping    22 1 1 Introduction to MLD Snooping    MLD  the Multicast Listener Discovery Protocol  is used to realize multicasting in the IPv6  MLD is used by the  network equipments such as routers which supports multicast for multicast listener discovery  also used by  listeners looking forward to join certai
212. itor seems to be connected to the remote host directly     Telnet employs the Client Server mode  the local system is the Telnet client and the remote host is the Telnet  server  Switch can be either the Telnet Server or the Telnet client     When switch is used as the Telnet server  the user can use the Telnet client program included in Windows or  the other operation systems to login to switch  as described earlier in the In band management section  As a  Telnet server  switch allows up to 5 telnet client TCP connections     And as Telnet client  using telnet command under Admin Mode allows the user to login to the other remote  hosts  Switch can only establish TCP connection to one remote host  If a connection to another remote host is  desired  the current TCP connection must be dropped     4 2 1 2 Telnet Configuration Task List    1  Configuring Telnet Server  2  Telnet to a remote host from the switch     1  Configuration of Telnet Server       Command Explanation       Global Mode       Enable the Telnet server function in the switch  the  telnet server enable i     no telnet server enable  command disables the  no telnet server enable    Telnet function        username   user name    privilege Configure user name and password of the telnet    lt privilege gt    password  0   7   lt password gt   The no form command deletes the telnet user  no username   username   authorization             DOPO Configure the secure IP address to login to the  authentication securityip
213. k   OK      Connect To    S  Switch    Enter details for the phone number that you want to dial     Taiwan  885     Country region           Area code        Phone number             Connect using           Figure 3 4 Opening HyperTerminal       4  COM1 property appears  select    9600    for  Baud rate    8  for  Data bits    none  for    Parity checksum        1     for stop bit and  none  for traffic control  or  you can also click  Restore default  and click  OK      COM1 Properties    Port Settings          Bits per second           Data bits           Parity              Stop bits           Flow control        Apply    Figure 3 5 Opening HyperTerminal                3 10       Step 3  Entering switch CLI interface    Power on the switch  the following appears in the HyperTerminal windows  that is the CLI configuration mode  for Switch     Testing RAM     0x077C0000 RAM OK  Loading MiniBootROM     Attaching to file system        Loading nos img     done   Booting  Starting at Ox10000       Attaching to file system        FAN Test  Done All Pass     Switch gt        The user can now enter commands to manage the switch  For a detailed description for the commands   please refer to the following chapters     3 1 2 In band Management    In band management refers to the management by login to the switch using Telnet  or using HTTP  or using  SNMP management software to configure the switch  In band management enables management of the  switch for some devices attached to the 
214. k gt     any source    host source  lt              gt          Creates a numbered standard IP  access list  if the access list  already exists  then a rule will    add to the current access list              A the    no access list   no access list  lt num gt     num    command deletes a  numbered standard IP  access list     2  Configuring a numbered extensive IP access list  Command Explanation  Global Mode  access list   num    deny   permit  icmp     s pAddr     Creates    numbered ICMP     lt sMask gt     any source    host source  lt              gt        lt dlpAddr gt   lt dMask gt     any destination     host destination  lt d lpAddr gt       icmp type      lt icmp code gt     precedence  lt prec gt    tos    tos    time range   time range name       extended IP access rule  if the  numbered extended access list of  specified number does not exist   then an access list will be created  using this number        a access list   num    deny   permit  igmp     lt slpAddr gt   lt sMask gt     any source    host source    slpAddr        lt dlpAddr gt   lt dMask gt     any destination     host destination  lt dlpAddr gt      lt igmp type gt     precedence   prec     tos     tos    time range   time range name       IGMP  extended IP access rule  if the    Creates a numbered  numbered extended access list of  specified number does not exist   then an access list will be created  using this number        access list   num    deny   permit  tcp    lt slpAddr gt    lt sMask gt
215. ket will be dropped as an invalid  one     e    1 2 18 bytes         Figure 25 7 Message Authenticator Attribute    25 1 5 Web Authentication Proxy based on 802 1x    The perspective of prior 802 1x authentication system abided by IEEE 802 1 x authentication systems on  architecture  working mechanism  business processes  The client authentication pattern of prior  authentication system privately  The devices are layer 2 switch and the authentication server is RADIUS    server  EAP protocol is used for the authentication message pattern  EAPOL encapsulation is used between    25 5       client and the authentication proxy switch  that is to say  EAP message is encapsulated in the Ethernet frame  to authenticate and communicate  however  EAPOR encapsulation is used between authentication proxy  switch and authentication server  that is to say  EAP message is loaded on the Radius protocol to  authenticate and communicate  it can be also forward by the device  transmit the PAP protocol message or  CHAP protocol message based on the RADIUS protocol between the device and the RADIUS sever    In 802 1x authentication system  in order to implement the identity authentication and the network permission   user should install the authentication client software  pass client login authentication progress and then  achieve authenticated communication with DCBI server  But some customers do not want to install client  software  and they hope to authenticate by the internet explorer simplif
216. lan id    interface ethernet    portName        Display the number of dynamic MAC in  corresponding ports and VLAN        debug switchport mac count  no debug switchport mac count    All kinds of debug information when    limiting the number of MAC on ports           debug vlan mac count       no debug vlan mac count    All kinds of debug information when  limiting the number of MAC in VLAN        26 2                26 3 The Number Limitation Function of Port  MAC in VLAN  Typical Examples    switchs             EHE          PC PC PC PC PC    Figure 26 1 The Number Limitation of Port  MAC in VLAN Typical Configuration Example    In the network topology above  SWITCH B connects to many PC users  before enabling the number limitation  function of port  MAC in VLAN  if the system hardware has no other limitation  SWTICH A and SWTICH B can  get the MAC list entries of all the PC  so limiting the MAC list entry can avoid DOS attack to a certain extent   When malicious users frequently do MAC cheating  it will be easy for them to fill the MAC list entries of the    switch  causing successful DOS attacks  Limiting the MAC list entry can prevent DOS attack   On port 1 1 of SWITCH A  set the max number can be learnt of dynamic MAC address as 20  In VLAN 1  set  the max number of dynamic MAC address as 30     SWITCH A configuration task sequence     Switch  config  Zinterface ethernet 1 1  Switch  Config If Ethernet1 1  switchport mac address dynamic maximum 20    Switch  Config If Et
217. led globally  it can t be enabled on the port      The MSTP parameters co work with each other  so the parameters should meet the following  conditions  Otherwise  the MSTP may work incorrectly   2x Bridge Forward Delay  1 0 seconds   gt   Bridge Max Age  Bridge Max Age  gt   2 x Bridge Hello Time   1 0 seconds      When users modify the MSTP parameters  they have to be sure about the changes of the topologies   The global configuration is based on the bridge  Other configurations are based on the individual    instances     12 10       Chapter 13 QoS Configuration    13 1 Introduction to QoS    QoS  Quality of Service  is a set of capabilities that allow you to create differentiated services for network  traffic  thereby providing better service for selected network traffic  QoS is a guarantee for service quality of  consistent and predictable data transfer service to fulfill program requirements  QoS cannot generate extra  bandwidth but provides more effective bandwidth management according to the application requirement and  network management policy     13 1 1 QoS Terms    QoS  Quality of Service  provides a guarantee for service quality of consistent and predictable data transfer  service to fulfill program requirements  QoS cannot generate new bandwidth but provides more effective  bandwidth management according to the application requirement and network management    QoS Domain  QoS Domain supports QoS devices to form a net topology that provides Quality of Service  so
218. ll send the relative  information of the user to authenticator system  the PAE of the authenticator system will decide the  authenticated unauthenticated status of the controlled port according to the authentication result of  the RADIUS server     25 1 3 The Encapsulation of EAPOL Messages    1  The Format of EAPOL Data Packets   EAPOL is a kind of message encapsulation format defined in 802 1x protocol  and is mainly used to transmit  EAP messages between the supplicant system and the authenticator system in order to allow the  transmission of EAP messages through the LAN  In IEEE 802 Ethernet LAN environment  the format of  EAPOL packet is illustrated in the next figure  The beginning of the EAPOL packet is the Type Length domain  in MAC frames     0 7 15    PAE Ethernet Type 2    Protocol Version Type 4    Packet Body       Figure 25 3 the Format of EAPOL Data Packet    25 3       PAE Ethernet Type  Represents the type of the protocol whose value is 0x888E     Protocol Version  Represents the version of the protocol supported by the sender of EAPOL data packets     Type  represents the type of the EAPOL data packets  including     EAP Packet  whose value is 0x00   the authentication information frame  used to carry EAP  messages  This kind of frame can pass through the authenticator system to transmit EAP  messages between the supplicant system and the authentication server system    EAPOL Start  whose value is 0x01   the frame to start authentication    EAPOL Logoff  who
219. lly or dynamically on switch  the system will automatically set the port with  the smallest number to be Master Port of the Port Channel  If the spanning tree function is enabled in the  switch  the spanning tree protocol will regard Port Channel as a logical port and send BPDU frames via the  master port     Port aggregation is closely related with switch hardware  Switch allow physical port aggregation of any two  Switches  maximum 8 port groups and 8 ports in each port group are supported     Once ports are aggregated  they can be used as a normal port  Switch have a built in aggregation interface  configuration mode  the user can perform related configuration in this mode just like in the VLAN and physical  port configuration mode     8 2 Port Channel Configuration Task List    1  Create a port group in Global Mode   2  Add ports to the specified group from the Port Mode of respective ports   3  Enter port channel configuration mode     1  Creating a port group       Command Explanation       Global Mode    port group  lt port group number gt        load balance   src mac   dst mac          Creates or deletes a port group and sets the    dst src mac   src ip  dst ip dst src ip    no port group   port group number    load balance     load balance method for that group                 2  Add physical ports to the port group       Command Explanation       Port Mode    port group     port group number   mode       Adds ports to the port group and sets their   active   passiv
220. mand  execution    Tab When a string for a command or keyword is entered  the Tab can be             used to complete the command or keyword if there is no conflict        3 2 4 Help Function    There are two ways in Switch for the user to access help information  the    help    command and the                Access to Help   Usage and function       Help Under any command line prompt  type in    help    and press Enter will get a  brief description of the associated help system        eee 1  Under any command line prompt  enter         to get a command list of  the current mode and related brief description    2  Enter a     after the command keyword with a embedded space  If the  position should be a parameter  a description of that parameter type   Scope  etc  will be returned  if the position should be a keyword  then a  Set of keywords with brief description will be returned  if the output is      lt cr gt      then the command is complete  press Enter to run the  command    3  A        immediately following a string  This will display all the commands             that begin with that string        3 2 5 Input Verification    3 2 5 1 Returned Information  success    All commands entered through keyboards undergo syntax check by the Shell  Nothing will be returned if the  user entered a correct command under corresponding modes and the execution is successful     3 20       Returned Information  error                   Output error message Explanation   Unrecognized comma
221. me   privilege   privilege    password  0 7   lt password gt       To open the local authentication style with the following command  authentication line vty login local  Privilege  option must exist and just is 15  Assume an authorized user in the switch has a username of  test   and  password of    test     the configuration procedure should like the following     Switch config  username test privilege 15 password 0 test  Switch config  authentication line vty login local       Enter valid login name and password in the Telnet configuration interface  Telnet user will be able to enter the  switch s CLI configuration interface  The commands used in the Telnet CLI interface after login is the same as  that in the Console interface              Figure 3 8 Telnet Configuration Interface    3 13       3 1 2 2 Management via HTTP    To manage the switch via HTTP  the following conditions should be met   1  Switch has an IPv4 IPv6 address configured     2  The host IPv4 IPv6 address  HTTP client  and the switch   s VLAN interface IPv4 IPv6 address        in  the same network segment     3  If 2  is not met  HTTP client should connect to an IPv4 IPv6 address of the switch via other devices   such as a router     Similar to management the switch via Telnet  as soon as the host succeeds to ping ping6 an IPv4 IPv6  address of the switch and to type the right login password  it can access the switch via HTTP  The  configuration list is as below     Step 1  Configure the IP addresses fo
222. ment VLAN interface  the  interface vlan  lt vian id gt   2   no command deletes the VLAN interface  no interface vlan   vlan id      created in the switch        Set the default gateway address of switch   ip default gateway  lt ip address gt           the no command will delete    the  no ip default gateway   ip address               default gateway address        15 1       15 2 IP Configuration    15 2 1 IP Configuration    Layer    interface can be configured as IPv4 interface  IPv6 interface     15 2 1 1 IPv4 Address Configuration    IPv4 address configuration task list   1   Configure the IPv4 address of three layer interface    1  Configure the IPv4 address of three layer interface       Command    Explanation       VLAN Interface Configuration Mode       ip address  lt ip address gt    mask    secondary   no ip address    ip address    lt mask gt            VLAN  ip address    lt ip address gt   lt mask gt   command  cancels IP VLAN         address of  interface  the no    Configure    address of  interface        15 2 1 2 IPv6 Address Configuration    The configuration Task List of IPv6 is as follows   1  IPv6 basic configuration    1  Configure interface IPv6 address    2  Configure default gateway    2  IPv6 Neighbor Discovery Configuration     1  Configure DAD neighbor solicitation message number    2  3  4  5  6  7  8  9    Enable and disable router advertisement  Configure router lifespan   Configure router advertisement minimum interval  Configure router adver
223. n  distorted message attack  and DOS attack  etc    Since ARP scanning threatens the security and stability of the network with great danger  so it is very  significant to prevent it  Switch provides a complete resolution to prevent ARP scanning  if there is any host or  port with ARP scanning features is found in the segment  the switch will cut off the attack source to ensure the  security of the network    There are two methods to prevent ARP scanning  port based and IP based  The port based ARP scanning  will count the number to ARP messages received from a port in a certain time range  if the number is larger  than a preset threshold  this port will be    down     The IP based ARP scanning will count the number to ARP  messages received from an IP in the segment in a certain time range  if the number is larger than a preset  threshold  any traffic from this IP will be blocked  while the port related with this IP will not be    down     These  two methods can be enabled simultaneously  After a port or an IP is disabled  users can recover its state via    automatic recovery function   To improve the effect of the switch  users can configure trusted ports and IP  the ARP messages from which  will not be checked by the switch  Thus the load of the switch can be effectively decreased     16 2 ARP Scanning Prevention Configuration Task Sequence      Enable the ARP Scanning Prevention function      Configure the threshold of the port based and IP based ARP Scanning Prevention  
224. n  lt vian id gt   parameter values are required after the keyword   E firewall  enable   disable   user can enter firewall enable or firewall disable for this command   W snmp server community  ro   rw    string    the followings are possible   snmp server community ro   string    snmp server community rw   string      3 2 3 Shortcut Key Support    Switch provides several shortcut keys to facilitate user configuration  such as up  down  left  right and Blank  Space  If the terminal does not recognize Up and Down keys  ctrl  p and ctrl  n can be used instead                       Key s  Function  Back Space Delete a character before the cursor  and the cursor moves back   Up  7  Show previous command entered  Up to ten recently entered       3 19          commands can be shown                                      Down         Show next command entered  When use the Up key to get previously  entered commands  you can use the Down key to return to the next  command   Left           The cursor moves one character to   You can use the Left and  the left  Right key to modify an   Right           The cursor moves one character to   entered command   the right    Ctrl  p The same as Up key  1     Ctrl  n The same as Down key        Ctrl  b The same as Left key     lt        Ctrl  f The same as Right key     gt        Ctrl  z Return to the Admin Mode directly from the other configuration modes   except User Mode     Ctrl  c Break the ongoing command process  such as ping or other com
225. n 20 30  Switch2 Config Mstp Region  instance 4 vlan 40 50  Switch2 Config Mstp Region  exit  Switch2 config  interface e1 1 7  Switch2 Config Port Range  switchport mode trunk  Switch2 Config Port Range  exit  Switch2 config  spanning tree       Switch3        Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3  Switch3    config  vlan 20   Config Vlan20  exit   config  vlan 30   Config Vlan30  exit   config  vlan 40   Config Vlan40  exit   config  vlan 50   Config Vlan50  exit   config  spanning tree mst configuration  Config Mstp Region  name mstp  Config Mstp Region  instance 3 vlan 20 30  Config Mstp Region  instance 4 vlan 40 50  Config Mstp Region  exit   config  interface e1 1 7  Config Port Range  switchport mode trunk  Config Port Range  exit  config  spanning tree    I a           ee eG                    config  spanning tree mst 3 priority 0       Switch4     Switch4 config  vlan 20  Switch4 Config Vlan20  exit  Switch4 config  vlan 30  Switch4 Config Vlan30  exit  Switch4 config  vlan 40  Switch4 Config Vlan40  exit    Switch4 Config Vlan50  exit  Switch4 config  spanning tree mst configuration    Switch4 Config Mstp Region  name mstp  Switch4 Config Mstp Region  instance 3 vlan 20 30  Switch4 Config Mstp Region  instance 4 vlan 40 50  Switch4 Config Mstp Region  exit                         Switch4 config  vlan 50                      12 8    Switch4 config  inte
226. n assignment    Contact MDI MDI X  Media Dependant Media Dependant  Interface Interface Cross   1 Tx    transmit  Rx    receive    2 Tx    transmit  Rx    receive    Rx    receive  Tx    transmit   4 5 Not used   6 Rx    receive  Tx    transmit   7 8 Not used    The standard cable  RJ 45 pin assignment    38 1          The standard RJ 45 receptacle connector    There are 8 wires on a standard UTP STP cable and each wire is color coded  The following shows the pin    allocation and color of straight cable and crossover cable connection           Straight Cable                SIDE 1       7   White   Brown    8   Brown    SIDE2    Je DES HR        81 ASIDE 1   White   Orange 1   White   Orange  2   Orange 2   Orange  3   White   Green 3   White   Green  4   Blue 4   Blue   1 2 3 4 5 6 7 8 5   White   Blue 5   White   Blue  6   Green 6   Green  7   White   Brown 7   White   Brown   SIDE 2  8   Brown 8   Brown  Straight Cable SIDE 1 SIDE2         Bes MN              1   White   Orange 1   White   Green  2   Orange 2   Green  3   White   Green 3   White   Orange  4   Blue 4   Blue   1 2 3 4 5 6 7 8 5   White   Blue 5   White   Blue  6   Green 6   Orange    7   White   Brown    8   Brown       Please make sure your connected cables are with same pin assignment and color as above picture before    Figure A 1  Straight Through and Crossover Cable    deploying the cables into your network     38 2       Chapter 72 GLOSSARY       Chapter 39 GLOSSARY    Bandwidth Utilization    The perc
227. n be created to associate with the class map created  earlier and enter class mode  Then different policies  such as bandwidth limit  priority degrading assigning  new DSCP value  can be applied to different data streams  You can also define a policy set that can be  use in a policy map by several classes     13 6           Apply QoS to the ports or the VLAN interface  Configure the trust mode for ports or bind policies to ports  A policy will only take effect on a port when it is  bound to that port   The policy may be bound to the specific VLAN   4  Configure queue management algorithm  Configure queue management algorithm  such as sp  wrr  wdrr  and so on   5  Configure QoS mapping  Configure the mapping from CoS to DP  DSCP to DSCP  IntP or DP  IntP to DSCP     1  Configure class map              Command Explanation  Global Mode  Create a class map and enter class map  class map  lt class map name gt  mode  the    no class map  no class map  lt class map name gt   lt class map name gt     command deletes    the specified class map     match  access group  lt acl index or name gt     ip dscp  lt dscp list gt    ip precedence     lt ip precedence list gt    ipv6 access group Set matching criterion  classify data   lt acl index or name gt    ipv6 dscp   dscp list       stream by ACL  CoS  VLAN ID  IPv4  ipv6 flowlabel  lt flowlabel list gt    vlan Precedence  IPv6 FL or DSCP  etc  for    vlan list     cos  lt cos list gt   the class map  the no command deletes  no match  acc
228. n failure  wrong configuration  etc  The user should ensure the following           Ensure the physical connection is correct          Ensure the MLD Snooping is enabled under global mode  using ipv6 mld snooping           Ensure the MLD Snooping is configured on the vlan under global mode  using ipv6 mld snooping vlan    vlan id              Ensure there is a vlan configured as a L2 general querier  or there is a static mrouter configured in a  segment       Use command to check if the MLD snooping information is correct    22 5       Chapter 23 Multicast VLAN    23 1 Introductions to Multicast VLAN    Based on current multicast order method  when orders from users in different VLAN  each VLAN will copy a  multicast traffic in this VLAN  which is a great waste of the bandwidth  By configuration of the multicast VLAN   we add the switch port to the multicast VLAN  with the IGMP Snooping MLD Snooping functions enabled   users from different VLAN will share the same multicast VLAN  The multicast traffic only exists within a  multicast VLAN  so the bandwidth is saved  As the multicast VLAN is absolutely separated from the user  VLAN  security and bandwidth concerns can be met at the same time  after the multicast VLAN is configured   the multicast traffic will be continuously sent to the users     23 2 Multicast VLAN Configuration Task List    1   Enable the multicast VLAN function  2  Configure the IGMP Snooping  3  Configure the MLD Snooping    1  Enable the multicast VLAN fun
229. n file  etc dhcpd conf is ddns update style interim        ignore client updates     class  Switch1Vlan1Class1     match if option agent circuit id    Vlan1  Ethernet1 3  and option agent remote id 00 03 0f 02 33 01        subnet 192 168 102 0 netmask 255 255 255 0    option routers 192 168 102 2    option subnet mask 255 255 255 0    option domain name  example com cn     option domain name servers 192 168 10 3   authoritative    pool     range 192 168 102 51 192 168 102 80   default lease time 43200   12 Hours  max lease time 86400   24 Hours    allow members of  Switch1Vlan1Class1               Now  the DHCP server will allocate addresses for the network nodes from Switch1 within the range of  192 168 102 51   192 168 102 80     20 4 DHCP Snooping option 82 Troubleshooting       To implement the option 82 function of DHCP SNOOPING  the    debug ip dhcp snooping packet   command can be used during the operating procedure  including adding the option 82 information of  the request message  the option 82 information peeled by the reply message     20 10       Chapter 21 IPv4 Multicast Protocol    21 1 IPv4 Multicast Protocol Overview    This chapter will give an introduction to the configuration of IPv4 Multicast Protocol  All IPs in this chapter are  IPv4     21 1 1 Introduction to Multicast    Various transmission modes can be adopted when the destination of packet  including data  sound and video   transmission is the minority users in the network  One way is to use Unicas
230. n multicast group informing the router to receive data packets from  certain multicast address  all of which are done through MLD message exchange  First the router send an  MLD Multicast listener Query message through a multicast address which can address all the listeners   namely ff02  1   Once there is a listener who wishes to join the multicast address  it will send a MLD Multicast  listener Report back through the multicast address    MLD Snooping is namely the MLD listening  The switch restricts the multicast traffic from flooding through  MLD Snooping  and forward the multicast traffic to ports associated to multicast devices only  The switch  listens to the MLD messages between multicast routers and listeners  and maintains the multicast group  forwarding list based on the listening result  The switches forwards multicast packets according to the    multicast forwarding list  The switch realizes the MLD Snooping function while supporting MLD v2  This way  the user can acquire IPv6  multicast with the switch     22 1 2 MLD Snooping Configuration Task    1  Enable the MLD Snooping function  2  Configure the MLD Snooping    1  Enable the MLD Snooping function       Command Explanation       Global Mode       ipveimid sncovin Enable global MLD Snooping  the  no ipv6  ipv6 m      E   mld snooping    command disables the  no ipv6 mld snooping             global MLD snooping        2  Configure MLD Snooping       Command Explanation                Global Mode       22 1    
231. n the network which do  not support Multicast  but a Multicast router can encapsulate the Multicast packets into Unicast IP packets  with tunnel mode to send them to the Multicast router next to it  which will take off the Unicast IP header and  continue the Multicast transmission process  thus a big alteration of network structure is avoided  The primary  advantages of Multicast are    1  Enhance efficiency  reduce network traffic  lighten the load of server and CPU   2  Optimize performance  reduce redundant traffic   3  Distributed application  Enable Multipoint Application    21 1 2 Multicast Address    The destination address of Multicast message uses class D IP address with range from 224 0 0 0 to  239 255 255 255  D class address can not appear in the source IP address field of an IP message  In the  process of Unicast data transmission  the transmission path of a data packet is from source address routing to    destination address  and the transmission is performed with hop by hop principle  However  in IP Multicast    21 11       environment  the destination addresses is a group instead of a single one  they form a group address  All  message receivers will join in a group  and once they do  the data flowing to the group address will be sent to  the receivers immediately and all members in the group will receive the data packets  The members in a  Multicast group are dynamic  the hosts can join and leave the Multicast group at any time   Multicast group can be perman
232. nabling dotiq tunnel on Trunk port will make the tag of the data packet unpredictable which is not  required in the application  So it is not recommended to enable dot1q tunnel on Trunk port     W Configuring in port channel is not supported    W Enabled with STP MSTP is not supported    W Enabled with PVLAN is not supported     10 4 Dynamic VLAN Configuration    10 4 1 Introduction to Dynamic VLAN    The dynamic VLAN is named corresponding to the static VLAN  namely the port based VLAN   Dynamic  VLAN supported by the switch includes MAC based VLAN  IP subnet based VLAN and Protocol based VLAN   Detailed description is as follows    The MAC based VLAN division is based on the MAC address of each host  namely every host with a MAC  address will be assigned to certain VLAN  By the means  the network user will maintain his membership in his  belonging VLAN when moves from a physical location to another  As we can see the greatest advantage of  this VLAN division is that the VLAN does not have to be re configured when the user physic location change   namely shift from one switch to another  which is because it is user based  not switch port based    The IP subnet based VLAN is divided according to the source IP address and its subnet mask of every host  It  assigns corresponding VLAN ID to the data packet according to the subnet segment  leading the data packet  to specified VLAN  Its advantage is the same as that of the MAC based VLAN  the user does not have to    change confi
233. nation  lt destination host ip gt    MAC ICMP access rule     lt icmp type gt    lt icmp code gt     precedence    precedence    tos  tos    time range   time range na  me      no  deny permit  any source mac  host source ma   Creates an extended  c  lt host_smac gt     lt smac gt  lt smac mask gt    name based MAC IGMP  fany destination mac  host destination mac access rule  the  no  form   lt host_dmac gt     lt dmac gt  lt dmac mask gt   igmp command deletes this                24 13             lt source gt  lt source wildcard gt   any source    host source lt source host ip gt        lt destination gt  lt destination wildcard gt   any destinati  on   host destination  lt destination host ip gt       lt igmp type gt    precedence  lt precedence gt    tos      tos    time range  lt time range name gt      name based extended    MAC IGMP access rule         no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt     fany destination mac  host destination mac   lt host_dmac gt     lt dmac gt  lt dmac mask gt   tcp     lt source gt  lt source wildcard gt   any source    host source lt source host ip gt     s port    lt port1 gt     range  lt sPortMin gt   lt sPortMax gt         lt destination gt  lt destination wildcard gt   any destinati  on   host destination  lt destination host ip gt     d port     lt port3 gt    range  lt sPortMin gt   lt sPortMax gt       ack fin psh rst urg syn    precedence lt precedence gt   tos lt tos gt   
234. nd or illegal The entered command does not exist  or there is   parameter  error in parameter scope  type or format    Ambiguous command At least two interpretations is possible basing on  the current input    Invalid command or parameter The command is recognized  but no valid  parameter record is found    This command is not exist in The command is recognized  but this command   current mode can not be used under current mode    Please configure precursor The command is recognized  but the prerequisite   command     at first  command has not been configured        syntax error   missing    before the   Quotation marks are not used in pairs   end of command line                 3 2 6 Fuzzy Match Support    Switch shell support fuzzy match in searching command and keyword  Shell will recognize commands or  keywords correctly if the entered string causes no conflict   For example    1  For command  show interfaces status ethernet1 1     typing  sh in status ethernet1 1    will work     2  However  for command  show running config   the system will report a     Ambiguous command    error if only  show r  is entered  as Shell is unable to tell whether it is  show run  or  show  running config   Therefore  Shell will only recognize the command if  sh ru  is entered     3 21       Chapter 4 Basic Switch Configuration    4 1 Basic Configuration    Basic switch configuration includes commands for entering and exiting the admin mode  commands for  entering and exiting interface mode 
235. nd ports  and updates the MAC table regularly  In this section  we will focus on the  dynamic learning process of MAC table        Port 12    MAC 00 01 11 11 11 11 MAC 00 01 33 33 33 33    MAC 00 01 22 22 22 22                                     Figure 11 1        Table dynamic learning    The topology of the figure above  4 PCs connected to switch  where PC1 and PC2 belongs to a same physical  segment  same collision domain   the physical segment connects to port 1 5 of switch  PC3 and PC4 belongs  to the same physical segment that connects to port 1 12 of switch    The initial MAC table contains no address mapping entries  Take the communication of PC1 and PC3 as an  example  the MAC address learning process is as follow     1  When PC1 sends message to         the switch receives the source MAC address  00 01 11 11 11 11 from this message  the mapping entry of 00 01 11 11 11 11 and port 1 5 is  added to the switch MAC table     2  At the same time  the switch learns the message is destined to 00 01 33 33 33 33  as the MAC  table contains only a mapping entry of MAC address 00 01 11 11 11 11 and port1 5  and no port  mapping for 00 01 33 33 33 33 present  the switch broadcast this message to all the ports in the  switch  assuming all ports belong to the default VLAN1      3   PC3 and PC4 on port 1 12 receive the message sent by PC1  but PC4 will not reply  as the  destination MAC address is 00 01 33 33 33 33  only PC3 will reply to PC1  When port 1 12  receives the message
236. nd restores to the default             port value and deletes the IP address        33 18       2  Configure the sFlow proxy address    Command    Explanation       Global Mode       no sflow agent address       sflow agent address  lt collector address gt     Configure the source IP address applied by           the sFlow proxy  the            form of the       command deletes this address        3  Configure the sFlow proxy priority       Command    Explanation       Global Mode       sflow priority   priority vlaue    no sflow priority       Configure the priority when sFlow receives  packet from the hardware  the  no sflow       priority  command restores to the default       4  Configure the packet head length copied by sFlow       Command    Explanation       Port Mode       sflow header len   length vlaue    no sflow header len       Configure the length of the packet data head  copied in the sFlow data sampling  the    no     form of this command restores to the default       value        5  Configure the max data head length of the sFlow packet       Command    Explanation       Port Mode       sflow data len   length vlaue    no sflow data len       Configure the max length of the data packet in  sFlow  the    no    form of this command restores  to the default           6  Configure the sampling rate value       Command    Explanation       Port Mode       sflow rate  input   input rate     output    output rate  gt         no sflow rate  input   output     Configur
237. nfiguration  of all the interfaces     E Interface Mod  Use the interface command under Global Mode can enter the interface mode specified  Switch provides three  interface type  1  VLAN interface  2  Ethernet port  3  port channel  accordingly the three interface  configuration modes                          Interface Type Entry Operates Exit   VLAN Interface   Type interface vlan  lt Vilan id gt    Configure switch IPs  etc   Use the exit command   command under Global Mode  to return to Global  Mode    Ethernet Port Type interface ethernet Configure supported Use the exit command   lt interface list gt  command duplex mode  speed  etc    to return to Global  under Global Mode  of Ethernet Port  Mode    port channel Type interface port channel Configure port channel Use the exit command    port channel number  related settings such as to return to Global  command under Global Mode    duplex mode  speed  etc    Mode              B VLAN Mode  Using the vlan  lt vlan id gt  command under Global Mode can enter the corresponding VLAN Mode  Under  VLAN Mode the user can configure all member ports of the corresponding VLAN  Run the exit command  to exit the VLAN Mode to Global Mode     B DHCP Address Pool Mode  3 18       Type the ip dhcp pool  lt name gt  command under Global Mode will enter the DHCP Address Pool Mode  prompt    Switch Config  lt name gt  dhcp       DHCP address pool properties can be configured under DHCP    Address Pool Mode  Run the exit command to exit the DH
238. nfiguration to the switch is allowed  only clock time and version information of the  switch can be queries     3 17       3 2 1 2 Admin Mode    To Admin Mode sees the following  In user entry system  if as Admin user  it is defaulted to Admin Mode   Admin Mode prompt    Switch     can be entered under the User Mode by running the enable command and  entering corresponding access levels admin user password  if a password has been set  Or  when exit  command is run under Global Mode  it will also return to the Admin Mode  Switch also provides a shortcut key  sequence  Ctrl z     this allows an easy way to exit to Admin Mode from any configuration mode  except User  Mode      Under Admin Mode  the user can query the switch configuration information  connection status and traffic  statistics of all ports  and the user can further enter the Global Mode from Admin Mode to modify all  configurations of the switch  For this reason  a password must be set for entering Admin mode to prevent  unauthorized access and malicious modification to the switch     3 2 1 3 Global Mode    Type the config command under Admin Mode will enter the Global Mode prompt    Switch config       Use the  exit command under other configuration modes such as Port Mode  VLAN mode will return to Global Mode     The user can perform global configuration settings under Global Mode  such as MAC Table  Port Mirroring   VLAN creation  IGMP Snooping start and STP  etc  And the user can go further to Port Mode for co
239. ng     Switch config    Switch config  sntp server 10 1 1 1       34 23       Chapter 35 Monitor and Debug    When the users configures the switch  they will need to verify whether the configurations are correct and the  switch is operating as expected  and in network failure  the users will also need to diagnostic the problem   Switch provides various debug commands including ping  telnet  show and debug  etc  to help the users to  check system configuration  operating status and locate problem causes     35 1 Ping    Ping command is mainly used for sending ICMP query packet from the switches to remote devices  also for  check the accessibility between the switch and the remote device  Refer to the Ping command chapter in the  Command Manual for explanations of various parameters and options of the Ping command     35 2 Ping6    Ping6 command is mainly used by the switch to send ICMPv6 query packet to the remote equipment   verifying the accessibility between the switch and the remote equipment  Options and explanations of the  parameters of the Ping6 command please refer to Ping6 command chapter in the command manual     35 3 Traceroute    Traceroute command is for testing the gateways through which the data packets travel from the source device  to the destination device  so to check the network accessibility and locate the network failure    Execution procedure of the Traceroute command consists of  first a data packet with TTL at 1 is sent to the  destination address  if
240. ng switch fabric and  wire speed throughput as high as 100Gbps  Terms of    Managed Switch    means the Switches mentioned  titled in the cover page of this User   s manual     1 1 Packet Contents    Open the box of the Managed Switch and carefully unpack it  The box should contain the following items   Check the contents of your package for following parts     M WGSW 50040 Switch x1     User s Manual X1     Quick Installation Guide X1     Power Cord X1     RJ 45 to DB9 Console Cable X1     SFP Dust Caps X4     Rubber Fee X4     Two Rack mounting Brackets with X1    Attachment Screws    If any of these are missing or damaged  please contact your dealer immediately  if possible  retain the carton  including the original packing material  and use them against to repack the product in case there is a need to  return it to us for repair     1 2 Product Description    Abundant IPv6 Support   The WGSW 50040 provides IPv6 management and enterprise level secure features such as SSH  ACL   QoS and RADIUS authentication besides the IPv4 protocol supported  Supporting IPv6 management  features and also backward compatible with IPv4  the WGSW 50040 helps the enterprises to step in the IPv6  era with the lowest investment but not need to replace the network facilities while the ISP construct the IPv6  FTTx edge network     High Performance   The WGSW 50040 provides 50 10 100 1000Mbps Gigabit Ethernet ports with 4 shared Gigabit SFP slots  It  boasts a high performance switch architecture 
241. ngle Mode fiber or WDM fiber   It is well  suited for applications within the enterprise data centers and distributions     1 2       1 3 Product Features     gt  Physical Port    50 Port 10 100 1000Base T Gigabit Ethernet RJ 45  4 mini GBIC SFP slots  shared with Port 45 to Port 48  RJ 45 to DB9 console interface for Switch basic management and setup     gt  IP Stacking    Connects with stack member via both Gigabit TP SFP interface  Single IP address management  supports up to 24 units stacking together  Stacking architecture supports Chain and Ring mode     gt  Layer 2 Features    Complies with the IEEE 802 3  IEEE 802 3u  IEEE 802 3ab  IEEE 802 3z Gigabit Ethernet standard  Supports Auto negotiation and Half Duplex   Full Duplex modes for all 10Base T 100Base TX and  1000Base T ports    Supports 1000Base SX LX for all SFP interfaces    Auto MDI MDI X detection on each RJ 45 port  Prevents packet loss Flow Control              802 3x PAUSE Frame flow control for Full Duplex mode                              Flow Control in Half Duplex mode  High performance Store and Forward architecture  broadcast storm control  port loopback detect  8CKC MAC address table  automatic source address learning and ageing  Support VLAN    IEEE 802 1Q Tag based VLAN    GVRP for dynamic VLAN Management    Up to 4K VLANs groups  out of 4041 VLAN IDs    Provider Bridging  VLAN Q in Q  support  IEEE 802 1ad     Private VLAN Edge  PVE  supported    GVRP protocol for Management VLAN  Support Link Ag
242. node of MRPP ring  format  no   restores default timer value        fail timer   timer      Configure Hello packet overtime timer  sending from primary node of MRPP ring           no fail timer     format    no    restores default timer value   enable Enable MRPP ring  format    no    disables  no enable enabled MRPP ring   Port mode       mrpp ring  lt ring id gt  primary port  no mrpp ring  lt ring id gt  primary port    Specify primary port of MRPP ring        mrpp ring  lt ring id gt  secondary port  no mrpp ring  lt ring id gt  secondary port       3  Display and debug MRPP relevant information       Specify secondary port of MRPP ring        Command    Explanation       Admin Mode       debug mrpp  no debug mrpp    Disable MRPP module debug information   format    no    disable          debug  information output        show mrpp   lt ring id gt      Display MRPP ring configuration  information        show mrpp statistics   lt ring id gt      Display receiving data packet statistic  information of MRPP ring        clear mrpp statistics   lt ring id gt            Clear receiving data packet statistic  information of MRPP ring        31 11             31 3 MRPP Typical Scenario    SWITCHA    cl E1    Master Node  E2    MRPP Ring 4000    SWITCH C    SWITCH B    E2    Y    E1    SWITCH D    Figure 31 2 MRPP typical configuration scenario    The above topology often occurs on using MRPP protocol  The multi switch constitutes a single MRPP ring     all of the switches only are
243. ntication packet format  The no command will    no dot1x privateclient enable          disable this function        dot1x user free resource    Sets free access network resource for unauthorized dot1x      prefix     mask    no dot1x user free resource    user  The no command close the resource                 2  Configure Web authentication agent function       Command Explanation  Global Mode                   25 13          dot1x web authentication  enable   no dot1x web authentication  enable    Enable Web authentication agent  the no command  disable Web authentication agent           dot1x web redirect  lt URL gt   no dot1x web redirect       Set the HTTP server address for Web redirection  the no  command clears the address        1  Configure port authentication status    3  Access management unit property configuration       Command    Explanation       Port Mode          dot1x port control   auto force authorized force   unauthorized          dot1x port control       Sets the 802 1x authentication mode  the no command  restores the default setting        2  Configure port access management method       Command    Explanation       Port Mode       dot1x port method   macbased   portbased   webbased userbased  advanced    no dot1x port method    Sets the port access management method  the no  command restores MAC based access management        dot1x max user macbased   lt number gt    no dot1x max user  macbased    Sets the maximum number of access users for the  spec
244. ntication request and off line request to authenticator    The PAE of the authenticator system authenticates the supplicant systems needing to access the  LAN via the authentication server system  and deal with the authenticated unauthenticated state of  the controlled port according to the result of the authentication  The authenticated state means the  user is allowed to access the network resources  the unauthenticated state means only the EAPOL  messages are allowed to be received and sent while the user is forbidden to access network  resources     2  controlled uncontrolled ports    The authenticator system provides ports to access the LAN for the supplicant systems  These ports can be    divided into two kinds of logical ports  controlled ports and uncontrolled ports     The uncontrolled port is always in bi directionally connected status  and mainly used to transmit  EAPOL protocol frames  to guarantee that the supplicant systems can always send or receive  authentication messages    The controlled port is in connected status authenticated to transmit service messages  When  unauthenticated  no message from supplicant systems is allowed to be received    The controlled and uncontrolled ports are two parts of one port  which means each frame reaching  this port is visible on both the controlled and uncontrolled ports     3  Controlled direction    In unauthenticated status  controlled ports can be set as unidirectional controlled or bi directionally controlled     When
245. o add    Enable or disable adding newly  discovered candidate switch to the  cluster        cluster member auto to user    Change automatically added    members into manually added ones           no cluster keepalive interval    cluster keepalive interval   second         Set the keep alive interval of the  cluster                       cluster keepalive loss count   int    no cluster keepalive loss count    Set the  keep alive messages that can be    max number of lost    tolerated in the cluster        Admin mode          clear cluster nodes  nodes sn    candidate sn list     mac address   lt                        Clear nodes      the list of candidate  switches maintained by the switch        4  Configure attributes of the cluster in the candidate switch                   Command Explanation  Global Mode  cluster keepalive interval  lt second gt  Set the keep alive interval of the  no cluster keepalive interval cluster   Set the max number of lost    cluster keepalive loss count   int    no cluster keepalive loss count    5  Remote cluster network management    Command       keep alive messages that can be  tolerated in the clusters     Explanation       Admin Mode       rcommand member  lt member id gt     In the commander switch  this  command is used to configure and    manage member switches        rcommand commander    In the member switch  this command  is used to configure the commander             switch    gt     In the commander switch  this   cluster reset memb
246. od  standard  control and advanced control  The user based standard control will not restrict the access to limited  resources  which means all users of this port can access limited resources before being    25 11       authenticated  The user based advanced control will restrict the access to limited resources  only  some particular users of the port can access limited resources before being authenticated  Once  those users pass the authentication  they can access all resources     Attention  when using private supplicant systems  user based advanced control is recommended to effectively  prevent ARP cheat   The maximum number of the authenticated users can be 4000  but less than 2000 will be preferred     25 1 8 The Features of VLAN Allocation    1  Auto VLAN  Auto VLAN feature enables RADIUS server to change the VLAN to which the access port belongs  based on  the user information and the user access device information  When an 802 1x user passes authentication on  the server  the RADIUS server will send the authorization information to the device  if the RADIUS server has  enabled the VLAN assigning function  then the following attributes should be included in the Access Accept  messages    m   Tunnel Type   VLAN  13         Tunnel Medium Type   802  6       X Tunnel Private Group ID   VLANID    The VLANID here means the VID of VLAN  ranging from 1 to 4094  For example  Tunnel Private Group ID    30 means VLAN 30    When the switch receives the assigned Auto VLAN informat
247. ode  represents the sequence number of the relay agent information option  the option 82 is called so  because RFC3046 is defined as 82   Len  the number of bytes in Agent Information Field  not including the two bytes in Code segment and Len    segment     Option 82 can have several sub options  and need at least one sub option  RFC3046 defines the following    two sub options  whose formats are showed as follows   Sub  pt Len Sub option Value                                                                                   1   WN   st   52   53   54     59                                  4      4      4             Sub  pt Len Sub option Value           4       4       4       4       4                            2   N   it   i2   i3   i4     iN     4      4      4      4       4      4                            SubOpt  the sequence number of sub option  the sequence number of Circuit ID sub option is 1  the    sequence number of Remote ID sub option is 2     20 7       Len  the number of bytes in Sub option Value  not including the two bytes in SubOpt segment and Len    segment     20 1 2 option 82 Working Mechanism    DHCP Relay Agent        DHCP Client  DHCP Server    Figure 20 1 DHCP option 82 flow chart    If the DHCP SNOOPING supports option 82  the DHCP client should go through the following four steps to get  its IP address from the DHCP server  discover  offer  select and acknowledge  The DHCP protocol follows the    procedure below    1  DHCP client sends a requ
248. oduce the CLI interface and Web configuration  interface in details  Web interface is familiar with CLI interface function and will not be covered  please refer to   Snmp network management software user manual      3 16       CLI interface is familiar to most users  As aforementioned  out of band management and Telnet login are all  performed through CLI interface to manage the switch     CLI Interface is supported by Shell program  which consists of a set of configuration commands  Those  commands are categorized according to their functions in switch configuration and management  Each  category represents a different configuration mode  The Shell for the switch is described below     Configuration Modes  Configuration Syntax  Shortcut keys   Help function   Input verification    Fuzzy match support    3 2 1 Configuration Modes       User Mode         Admin Mode              Global                                            Mode    Interface Mode              o  o             zz   o        3  D  E     o  o    Route configuration  ACL configuration            a      w  o     c      m       o  X  a            Figure 3 12 Shell Configuration Modes    3 2 1 1 User Mode    On entering the CLI interface  entering user entry system first  If as common user  it is defaulted to User Mode   The prompt shown is    Switch gt      the symbol     gt     is the prompt for User Mode  When exit command is run  under Admin Mode  it will also return to the User Mode     Under User Mode  no co
249. of       24 12              host source lt source host ip gt    specified number does            lt destination gt  lt destination wildcard gt   any destinati   exist  then an access list will  on   host destination lt destination host ip gt    be created using this number    precedence  lt precedence gt    tos      tos    time range  lt time range name gt         Deletes this numbered    no access list   num   extended             access             rule         9  Configuring a extended MAC IP access list based on nomenclature  a  Create a extensive MAC IP access list based on nomenclature                               Command Explanation  Global Mode  Creates an extended  name based MAC IP access  mac ip access list extended  lt name gt  rule  the    no    form command  no mac ip access list extended  lt name gt  deletes this name based  extended MAC IP access  rule   b  Specify multiple    permit    or    deny    rule entries  Command Explanation  Extended name based MAC IP access Mode   no  deny permit    any source mac  host source mac   lt host_smac gt     lt smac gt  lt smac mask gt     fany destination mac  host destination mac Creates an extended   lt host_dmac gt     lt dmac gt  lt dmac mask gt   icmp name based MAC ICMP     lt source gt  lt source wildcard gt   any source  access rule  the    no    form   host source lt source host ip gt    command deletes this     lt destination gt  lt destination wildcard gt   any destinati   name based extended  on   host desti
250. ogy changes    Command Explanation       Global Mode       Enable  the spanning tree flush once  the topology changes    Disable  the spanning tree don   t flush  when the topology changes   spanning tree tcflush  enable  disable     Protect  the spanning tree flush not  protect     no spanning tree tcflush more than one time every ten    seconds   The no command restores to default    setting  enable flush once the                   topology changes   Port Mode  spanning tree tcflush  enable  disable  Configure the port flush mode  The no  protect  command restores to use the global  no spanning tree tcflush confiqured flush mode        12 3 MSTP Example    The following is a typical MSTP application example     Switch1       Switch3       Switch2             Switch4    Figure 12 2 Typical MSTP Application Scenario  The connections among the switches are shown in the above figure  All the switches run in the MSTP mode  by default  their bridge priority  port priority and port route cost are all in the default values  equal   The default    configuration for switches is listed below     12 6                                                                   Bridge Name Switch Switch2 Switch3 Switch4  Bridge MAC    00 00 01    00 00 02    00 00 03    00 00 04  Address  Bridge Priority 32768 32768 32768 32768  Port 1 128 128 128  Port 2 128 128 128  Port 3 128 128   gt  Port 4 128 128  5   Port 5 128 128       Porte 128 128  2 Port 7 128 128  Port 1 200000 200000 200000  Port 2 
251. omments and suggestions     FCC Warning    This equipment has been tested and found to comply with the limits for a Class A digital device  pursuant to  Part 15 of the FCC Rules  These limits are designed to provide reasonable protection against harmful  interference when the equipment is operated in a commercial environment  This equipment generates  uses   and can radiate radio frequency energy and  if not installed and used in accordance with the Instruction  manual  may cause harmful interference to radio communications  Operation of this equipment in a residential  area is likely to cause harmful interference in which case the user will be required to correct the interference at  whose own expense     CE Mark Warning    This is a Class A product  In a domestic environment  this product may cause radio interference  in which  case the user may be required to take adequate measures     WEEE Warning    To avoid the potential effects on the environment and human health as a result of the  presence of hazardous substances in electrical and electronic equipment  end users of  electrical and electronic equipment should understand the meaning of the crossed out  wheeled bin symbol  Do not dispose of WEEE as unsorted municipal waste and have to  collect such WEEE separately        Energy Saving Note of the Device  This power required device does not support Standby mode operation   For energy saving  please remove the power cable to disconnect the device from the power circuit   
252. ompatibility with electric service in most areas of the world  the Managed Switch   s power supply  automatically adjusts to line power in the range 100 240VAC and 50 60 Hz     Plug the female end of the power cord firmly into the receptalbe on the rear panel of the Managed Switch   Plug the other end of the power cord into an electric service outlet then the power will be ready        The device is a power required device  it means  it will not work till it is powered  If your  networks should active all the time  please consider using UPS  Uninterrupted Power    Supply  for your device  It will prevent you from network data loss or network downtime   Power Notice   In some area  installing a surge suppression device may also help to protect your Managed    Switch from being damaged by unregulated surge or current to the Switch or the power  adapter        2 3       2 2 Install the Switch    This section describes how to install your Managed Switch and make connections to the Managed Switch   Please read the following topics and perform the procedures in the order being presented  To install your  Managed Switch on a desktop or shelf  simply complete the following steps     2 2 1 Desktop Installation    To install the Managed Switch on desktop or shelf  please follows these steps   Step1  Attach the rubber feet to the recessed areas on the bottom of the Managed Switch   Step2  Place the Managed Switch on the desktop or the shelf near an AC power source  as shown in Figure   
253. on     15 3 2 ARP Configuration Task List    ARP Configuration Task List   1  Configure static ARP    1  Configure static ARP       Command Explanation       VLAN Port Mode    arp   ip address     mac address   Configures a static ARP entry  the       no arp   ip address   command deletes a static ARP entry                    15 3 3 ARP Troubleshooting    If ping from the switch to directly connected network devices fails  the following can be used to check the  possible cause and create a solution   W Check whether the corresponding ARP has been learned by the switch   W  f ARP has not been learned  then enabled ARP debugging information and view the sending receiving  condition of ARP packets   W Defective cable is a common cause of ARP problems and may disable ARP learning     15 5       Chapter 16 ARP Scanning Prevention  Function Configuration    16 1 Introduction to ARP Scanning Prevention Function    ARP scanning is a common method of network attack  In order to detect all the active hosts in a network  segment  the attack source will broadcast lots of ARP messages in the segment  which will take up a large  part of the bandwidth of the network  It might even do large traffic attack in the network via fake ARP  messages to collapse of the network by exhausting the bandwidth  Usually ARP scanning is just a preface of  other more dangerous attack methods  such as automatic virus infection or the ensuing port scanning   vulnerability scanning aiming at stealing informatio
254. on   Firstly enable IGMP snooping in the VLAN it is located  Here it is assumed to be in VLAN2     EC config  ip igmp snooping    EC config  ip igmp snooping vlan 2       After that  configure relative destination control access list  and configure specified IP address to use that  access list     Switch config  access list 6000 deny ip any 238 0 0 0 0 255 255 255    Switch config  access list 6000 permit ip any any       21 17       Switch config  multicast destination control    Switch config  ip multicast destination control 10 0 0 0 8 access group 6000       In this way  users of this network segment can only join groups other than 238 0 0 0 8         Multicast strategy  Server 210 1 1 1 is distributing important multicast data on group 239 1 2 3  we can configure on its join in  switch as follows     Switch config  ip multicast policy 210 1 1 1 32 239 1 2 3 32 cos 4    In this way  the multicast stream will have a priority of value 4  Usually this is pretty higher  the higher possible  one is protocol data  if higher priority is set  when there is too many multicast data  it might cause abnormal  behavior of the switch protocol  when it gets to other switches through this switch     21 2 4 DCSCM Troubleshooting    The effect of DCSCM module itself is similar to ACL  and the problems occurred are usually related to  improper configuration  Please read the descriptions above carefully  If you still can not determine the cause  of the problem  please send your configuration
255. onfigure view       Command    Explanation       Global Mode   snmp server view  lt view siring gt    lt oid string gt   include exclude   no snmp server view    view string     oid string             Configure view on the switch  This command is used  for SNMP v3        8  Configuring TRAP       Command    Explanation       Global Mode       snmp server enable traps  no snmp server enable traps    Enable the switch to send Trap message  This  command is used for SNMP v1 v2 v3        snmp server host    lt  pv4 addr gt       ipv6 addr      v1   v2c    v3  noauthnopriv    authnopriv   authpriv      user string     no snmp server host     ipv4 addr        ipv6 addr      v1   v2c    v3  noauthnopriv    authnopriv   authpriv      user string            Set the host IPv4 IPv6 address which is used to  receive SNMP Trap information  For SNMP v1 v2   this command also configures Trap community  string  for SNMP v3  this command also configures  Trap user name and security level  The  no  form of  this command cancels this IPv4 or IPv6 address        9  Enable Disable RMON       Command    Explanation       Global mode       rmon enable  no rmon enable          Enable disable RMON        4 4 5 Typical SNMP Configuration Examples    The IP address of the NMS is 1 1 1 5  the IP address of the switch  Agent  is 1 1 1 9     Scenario 1  The NMS network administrative software uses SNMP protocol to obtain data from the switch     The configuration on the switch is listed below     config  
256. or NMS  use  snmp server securityip    command  and community string  use  snmp server  community  command  are correctly configured  as any of them fails  SNMP will not be able to  communicate with NMS properly    E  f Trap function is required  remember to enable Trap  use    snmp server enable traps  command   And  remember to properly configure the target host IP address and community string for Trap  use   snmp server host  command  to ensure Trap message can be sent to the specified host    W  f RMON function is required  RMON must be enabled first  use    rmon enable  command     W Use  show snmp  command to verify sent and received SNMP messages  Use  show snmp status   command to verify SNMP configuration information  Use  debug snmp packet  to enable SNMP  debugging function and verify debug information    If users still can t solve the SNMP problems  Please contact our technical and service center     4 5 Switch Upgrade    Switch provides two ways for switch upgrade  BootROM upgrade and the TFTP FTP upgrade under Shell     4 5 1 Switch System Files    The system files includes system image file and boot file  The updating of the switch is to update the two files  by overwrite the old files with the new ones    The system image files refers to the compressed files of the switch hardware drivers  and software support  program  etc  namely what we usually call the IMG update file  The IMG file can only be saved in the FLASH  with a defined name of nos img   The boot f
257. ores the default setting        11 5 1 3 Binding MAC Address Binding Troubleshooting    Enabling MAC address binding for ports may fail in some occasions  Here are some possible causes and    solutions         f MAC address binding cannot be enabled for a port  make sure the port is not enabling port  aggregation and is not configured as a Trunk port  MAC address binding is exclusive to such  configurations  If MAC address binding is to be enabled  the functions mentioned above must be    disabled first     E  f    secure address is set as static address and deleted  that secure address will be unusable even  though it exists  For this reason  it is recommended to avoid static address for ports enabling MAC    address     11 7       Chapter 12 MSTP Configuration    12 1 Introduction to MSTP    The MSTP  Multiple STP  is a new spanning tree protocol which is based on the STP and the RSTP  It runs  on all the bridges of a bridged LAN  It calculates a common and internal spanning tree  CIST  for the  bridge LAN which consists of the bridges running the MSTP  the RSTP and the STP  It also calculates the  independent multiple spanning tree instances  MSTI  for each MST domain  MSTP domain   The MSTP   which adopts the RSTP for its rapid convergence of the spanning tree  enables multiple VLANs to be mapped  to the same spanning tree instance which is independent to other spanning tree instances  The MSTP  provides multiple forwarding paths for data traffic and enables load balancin
258. ormation when the Web Authentication Proxy based on 802 1x is opened    m If the state display of the port is not disabled when use show dot1x  that means the Web  Authentication Proxy function based on 802 1x is not close it    B     The switch of the Web Authentication Proxy based on 802 1x achieves less than 1024 users who  had authenticated simultaneity on line  If exceeds this limit will return hint information    B   When the Web Authentication is failed should check whether the dotix privateclient enable  command is enabled  if the command had been enabled  then the private authentication function  need close     25 22    Chapter 26 The Number Limitation Function  of Port  MAC in VLAN Configuration    26 1 Introduction to the Number Limitation Function of Port   MAC in VLAN    MAC address list is used to identify the mapping relationship between the destination MAC addresses and the  ports of switch  There are two kinds of MAC addresses in the list  static MAC address and dynamic MAC  address  The static MAC address is set by users  having the highest priority  will not be overwritten by  dynamic MAC address   and will always be effective  dynamic MAC address is learnt by the switch through  transmitting data frames  and will only be effective in a specific time range  When the switch receives a data  framed waiting to be transmitted  it will study the source MAC address of the data frame  build a mapping  relationship with the receiving port  and then look up the MAC 
259. ort   When an access group is created  all packets from in the incoming direction through the port will be compared    to the access list rule to decide whether to permit or deny access   The current firmware only supports ingress ACL configuration     24 1 3 Access list Action and Global Default Action    There are two access list actions and default actions     permit    or  deny   The following rules apply            access list can consist of several rules  Filtering of packets compares packet conditions to the rules   from the first rule to the first matched rule  the rest of the rules will not be processed    W Global default action applies only to IP packets in the incoming direction on the ports       Global default action applies only when packet flirter is enabled on a port and no ACL is bound to that  port  or no binding ACL matches     24 4       24 2 ACL Configuration Task List    ACL Configuration Task Sequence   1  Configuring access list    1  Configuring a numbered standard IP access list    2  Configuring a numbered extended IP access list    3  Configuring a standard IP access list based on nomenclature  a  Create a standard IP access list based on nomenclature  b  Specify multiple  permit  or  deny  rule entries   c  Exit ACL Configuration Mode    4  Configuring an extended IP access list based on nomenclature   a  Create an extensive IP access list based on nomenclature  b  Specify multiple  permit  or  deny  rule entries      Exit ACL Configuration Mode 
260. ours  2 minutes        2     DHCP configuration    2     SNTP configuration    2     QOS configuration     2     L3 forward configui         8  mp          gp gp          P               IPV6 configuration  DCSCM configuratic  MSTP configuratior    m    m       m    Authentication con    Figure 3 11 Main Web Configuration Interface       When configure the switch  the name of the switch is composed with English letters                 3 1 2 3 Manage the Switch via SNMP Network Management Software    The necessities required by SNMP network management software to manage switches   1  IP addresses are configured on the switch   2  The IP address of the client host and that of the VLAN interface on the switch it subordinates to  should be in the same segment   3  If 2  is not met  the client should be able to reach an IP address of the switch through devices like  routers   4  SNMP should be enabled     The host with SNMP network management software should be able to ping the IP address of the switch  so  that  when running  SNMP network management software will be able to find it and implement read write  operation on it  Details about how to manage switches via SNMP network management software will not be  covered in this manual  please refer to    Snmp network management software user manual      3 2 CLI Interface    The switch provides thress management interface for users  CLI  Command Line Interface  interface  Web  interface  Snmp netword management software  We will intr
261. ow to create a single high speed  logical link that combines several lower speed physical links     Remote Monitoring  RMON     RMON provides comprehensive network monitoring capabilities  It eliminates the polling required in standard  SNMP  and can set alarms on a variety of traffic conditions  including specific error types     Routing Information Protocol  RIP     The RIP protocol attempts to find the shortest route to another device by minimizing the distance vector  or  hop count  which serves as a rough estimate of transmission cost  RIP 2 is a compatible upgrade to RIP  It  adds useful capabilities for subnet routing  authentication  and multicast transmissions     Simple Network Management Protocol  SNMP     The application protocol offering network management services in the Internet suite of protocols     Serial Line Internet Protocol  SLIP     Serial Line Internet Protocol  a standard protocol for point to point connections using serial lines     Spanning Tree Protocol  STP     A technology that checks your network for any loops  A loop can often occur in complicated or back up linked  network systems  Spanning tree detects and directs data along the shortest path  maximizing the  performance and efficiency of the network     39 3    Chapter 72 GLOSSARY       Telnet    Defines a remote communication facility for interfacing to a terminal device over TCP IP   Trivial File Transfer Protocol  TFTP     A TCP IP protocol commonly used for software downloads     Virtual
262. pair of ICMP  messages on multicast links  It eliminates the need to manually configure router addresses and is  independent of any specific routing protocol     Internet Control Message Protocol  ICMP     Commonly used to send echo messages  i e   Ping  for monitoring purposes     39 1    Chapter 72 GLOSSARY       IEEE 802 1D    Specifies a general method for the operation of MAC bridges  including the Spanning Tree Protocol     IEEE 802 1Q    VLAN Tagging   Defines Ethernet frame tags which carry VLAN information  It allows switches to assign  end stations to different virtual LANs  and defines a standard way for VLANs to communicate across switched  networks     IEEE 802 3ac    Defines frame extensions for VLAN tagging     Internet Group Management Protocol  IGMP     A protocol through which hosts can register with their local router for multicast services  If there is more than  one multicast router on a given subnetwork  one of the routers is elected  querier  and assumes the  responsibility of keeping track of group membership     IGMP Snooping    Listening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast  host groups to learn IP Multicast group members     In Band Management    Management of the network from a station attached directly to the network     IP Multicast Filtering    A process whereby this switch can pass multicast traffic along to participating hosts     Layer 2    Data Link layer in the ISO 7 Layer Data Comm
263. planation       Admin mode       Reload the switch after a specified period  reload after  lt HH MM SS gt  fti  of time        Cancel the specified time period to reload  reload cancel    the switch                 36 1       Chapter 37 Debugging and Diagnosis for  Packets Received and Sent by CPU    37 1 Introduction to Debugging and Diagnosis for Packets  Received and Sent by CPU    The following commands are used to debug and diagnose the packets received and sent by CPU  and are  supposed to be used with the help of the technical support     37 2 Debugging and Diagnosis for Packets Received and Sent  by CPU Task List       Command Explanation       Global Mode       A Set the total rate of the CPU receiving  cpu rx ratelimit total   packets    ME packets  the no command sets the total  no cpu rx ratelimit total    rate of the CPU receiving packets to default   cpu rx ratelimit queue length  lt queue id gt  Set the length of the specified queue  the no   lt qlen value gt  command set the length to default        no cpu rx ratelimit queue length   lt queue id gt         cpu rx ratelimit protocol  lt protocol type gt  Set the max rate of the CPU receiving   lt packets gt  packets of the protocol type  the no  no cpu rx ratelimit protocol   lt protocol type gt   command set the max rate to default        Clear the statistics of the CPU received  clear cpu rx stat protocol   lt protocol type gt    packets of the protocol type        cpu rx ratelimit channel  lt channel id gt  
264. ples    SWITCHA SWITCHB  E10        E1A0  E1 E115 E1 20       PC2    Work Station    Figure 23 1 Function configuration of the Multicast VLAN    As shown in the figure  the multicast server is connected to the layer 3 switch switchA through port 1 1 which  belongs to the VLAN10 of the switch  The layer 3 switch switchA is connected with layer 2 switches through  the port1 10  which configured as trunk port  On the switchB the VLAN100 is configured set to contain  port1 15  and VLAN101 to contain port1 20  PC1 and PC2 are respectively connected to port 1 15 and1 20   The switchB is connected with the switchA through port1 10  which configured as trunk port  VLAN 20 is a  multicast VLAN  By configuring multicast vlan  the PC1 and PC2 will receives the multicast data from the  multicast VLAN     Following configuration is based on the IP address of the switch has been configured and all the equipment  are connected correctly     Configuration procedure    SwitchA config    SwitchA config  vlan 10  SwitchA config vlan10  switchport access ethernet 1 1       23 2          When the multicast VLAN supports the IPv6 multicast  the usage is the same with IPv4  but the difference is  using with MLD Snooping  so does not give an example     24 3       Chapter 24 ACL Configuration    24 1 Introduction to ACL    ACL  Access Control List  is an IP packet filtering mechanism employed in switches  providing network traffic  control by granting or denying access the switches  effectively safe
265. port    Flow mirror function means that the switch exactly copies the data frames received or by the specified rule of  a port to another port  The flow mirror will take effect only the specified rule is permit    A chassis switch supports at most 4 mirror destination ports  each boardcard allows a source or destination  port of a mirror session  At present  each box switch can set many mirror sessions There is no limitation on  mirror source ports  one port or several ports is allowed  When there are more than one source ports  they can  be in the same VLAN or in different VLAN  The source port and destination port can be in different VLAN     32 2 Mirror Configuration Task List    1  Specify mirror destination port  2  Specify mirror source port   CPU     3  Specify flow mirror source    1  Specify mirror destination port       Command Explanation       Global Mode    monitor session   session   destination          interface  lt interface number gt   no monitor session   sess  on    destination interface      interface number         Specifies mirror destination port  the no  command deletes mirror destination source    port        2  Specify mirror source port     CPU        Command    Explanation          Global Mode          32 15                monitor session  lt session gt  source   interface  lt interface list gt    cpu   rx  tx   both     no monitor session  lt session gt  source    Specifies mirror source port  the no    command deletes mirror source port         
266. port 21 in the server  and  negotiate a data connection through the management connection    There are two types of data connections  active connection and passive connection     In active connection  the client transmits its address and port number for data transmission to the server  the    4 16       management connection maintains until data transfer is complete  Then  using the address and port number  provided by the client  the server establishes data connection on port 20  if not engaged  to transfer data  if  port 20 is engaged  the server automatically generates some other port number to establish data connection   In passive connection  the client  through management connection  notify the server to establish a passive  connection  The server then creates its own data listening port and informs the client about the port  and the  client establishes data connection to the specified port    As data connection is established through the specified address and port  there is a third party to provide data  connection service    TFTP builds upon UDP  providing unreliable data stream transfer service with no user authentication or  permission based file access authorization  It ensures correct data transmission by sending and  acknowledging mechanism and retransmission of time out packets  The advantage of TFTP over FTP is that  itis a simple and low overhead file transfer service    Switch can operate as either FTP TFTP client or server  When switch operates as a FTP TFTP
267. r    Synchronization conditions  The switch connects to a computer by an Ethernet port  the computer is a FTP  server with an IP address of 10 1 1 1  the switch acts as a FTP client  and the IP address of the switch  management VLAN1 interface is 10 1 1 2        FTP Configuration  PC side   Start the FTP server software on the PC and set the username  Switch   and the password  Admin    Switch     4 5 3 4 FTP TFTP Troubleshooting    4 22       4 5 3 4 1 FTP Troubleshooting    When upload download system file with FTP protocol  the connectivity of the link must be ensured  i e   use  the    Ping    command to verify the connectivity between the FTP client and server before running the FTP  program  If ping fails  you will need to check for appropriate troubleshooting information to recover the link  connectivity     W The following is what the message displays when files are successfully transferred  Otherwise  please  verify link connectivity and retry    copy    command again     220 Serv U FTP Server v2 5 build 6 for WinSock ready     331 User name okay  need password    230 User logged in  proceed    200 PORT Command successful    nos img file length   1526021    read file ok   send file   150 Opening ASCII mode data connection for nos img   226 Transfer complete        close ftp client     W The following is the message displays when files are successfully received  Otherwise  please verify  link connectivity and retry    copy    command again     220 Serv U FTP Server v2
268. r the switch and start the HTTP server function on the switch   For configuring the IP address on the switch through out of band management  see the telnet management  chapter     To enable the WEB configuration  users should type the CLI command IP http server in the global mode as  below     Switch config  ip http server       Step 2  Run HTTP protocol on the host   Open the Web browser on the host and type the IP address of the switch  or run directly the HTTP protocol on  the Windows  For example  the IP address of the switch is    10 1 128 251        Type the name of a program  Folder  document  or  Internet resource  and Windows will open it For you     Open   EREIEENEGEGE J             Figure 3 9 Run HTTP Protocol    When accessing a switch with IPv6 address  it is recommended to use the Firefox browser with 1 5 or later  version  For example  if the IPv6 address of the switch is 3ffe 506 1 2  3  Input the IPv6 address of the switch  is http    3ffe 506 1 2  3  and the address should draw together with the square brackets     3 14       Step 3  Login to the switch    Login to the Web configuration interface  Valid login name and password are required  otherwise the switch  will reject HTTP access  This is a method to protect the switch from unauthorized access  As a result  when  Telnet is enabled for configuring and managing the switch  username and password for authorized Telnet  users must be configured with the following command     username  lt username gt  privil
269. radius server dead time    To configure the interval that the RADIUS  becomes available after it is down  The no  form of this command will restore the  default configuration        radius server retransmit  lt retries gt   no radius server retransmit    To configure retry times for the RADIUS  packets  The no form of this command  restores the default configuration        radius server timeout  lt seconds gt     To configure the timeout value for the    RADIUS server  The no form of this          no radius server timeout command will restore the default  configuration    radius server accounting interim update    To configure the update interval for    timeout  lt seconds gt   no radius server  accounting interim update timeout       accounting  The no form of this command  will restore the default configuration        5  Configure the IP address of the RADIUS NAS       Command    Explanation       Global Mode       radius nas ipv4  lt ip address gt   no radius nas ipv4    To configure the source IP address for the  RADIUS packets for the switch           radius nas ipv6  lt ipv6 address gt   no radius nas ipv6       To configure the source IPv6 address for  the RADIUS packets for the switch        30 4             30 3 RADIUS Typical Examples    30 3 1 IPv4 Radius Example    10 1 1 2          10 1 1 1 Radius Server  10 1 1 3    Figure 30 2 The Topology of IEEE802 1x configuration    A computer connects to a switch  of which the IP address is 10 1 1 2 and connected with a RA
270. re                      sss 20 7  20 1 2 option 82 Working MeChanisM                cccccccccecsessssececececeeseacaeceeeeeceeseeaeseceeeeeceeseuaeseeeeeeeeses 20 8   20 2 DHCP SNOOPING OPTION 82 CONFIGURATION TASK LIST                     esee eene eene nennen nennt nnn 20 8   20 3 DHCP OPTION 82 APPLICATION                8                      44    4                       20 9   20 4 DHCP SNOOPING OPTION 82 TROUBLESHOOTING                             20 10   CHAPTER 21 IPV4 MULTICAST                                                                     21 11   21 1       4 MULTICAST PROTOCOL OVERVIEW 2 0                    21 11  21 1 1 Introd  ction to Multicast     2 2  rer etta een rer nera        21 11  21  1 2 Multicast Address    edere aa iaeia dda a eed n 21 11  21 1 3 IP Multicast Packet Transmission                         48040000              21 13  24 1 4 1P M  lticast Applicatlon         rece capote a eere peu           EP RR               21 13   212 DOSOM E                                       21 14  21 2 1 Introduction to DESCM                  21 14  21 2 2 DCSCM Configuration Task List                      assesses AA A                21 14  21 2 3 DCSCM Configuration                                                                   nennen nnne nennen nes 21 17  21 2 4 DCSOM Troubleshooting                   esses entente enne nnns nnn entere enne 21 18   21   1       5               etd 21 18  21 3 1 Introduction to IGMP Snooping             cccsccceecee
271. re the query interval  The    no    form of this  command restores to the default        ipv6 mid snooping vlan  lt              gt   immediate leave   no ipv6 mid snooping vian    vlan id   immediate leave    Configure immediate leave multicast group function for  the MLD Snooping of specific VLAN  The    no    form of  immediate leave    this command cancels the    configuration        ipv6 mid snooping vlan  lt vian id gt   query mrsp  lt value gt    no ipv6 mid snooping vlan    vlan id   query mrsp    Configure the query maximum response period  The   no  form of this command restores to the default        ipv6 mid snooping vlan  lt              gt   query robustness   value    no ipv6 mid snooping vian    vlan id   query robustness    Configure the query robustness  the    no    form of this  command restores to the default        ipv6 mid snooping vlan  lt vian id gt   suppression query time  lt value gt   no ipv6 mid snooping vian    vlan id   suppression query time    Configure the suppression query time  The    no    form  of this command restores to the default       Ipv6 mid snooping vlan   vlan id        static group   X X  X X    source       Configure static group on specified port of the VLAN     The no form of the command cancels this       22 2              lt X X  X X gt   interface  ethernet   configuration   port channel   lt IFNAME gt    no ipv6 mid snooping vlan   lt               gt  static group  lt X X  X X gt    source  lt X X  X X gt   interface   e
272. resses  IP protocols  TCP UDP  IP precedence  time ranges and  ToS  Moreover  various policies can be conducted to forward the traffic  The WGSW 50040 also provides  IEEE802 1x port based access authentication  which        be deployed with RADIUS  to ensure the port level  security and block illegal users     Efficient Management   The WGSW 50040 supports IP Stacking function that helps network managers to easily configure up to 24  switches in the same series via one single IP address instead of connecting and setting each unit one by one   For efficient management  the WGSW 50040 Managed Ethernet Switch is equipped with console  WEB and  SNMP management interfaces  With its built in Web based management interface  the PLANET  WGSW 50040 offers an easy to use  platform independent management and configuration facility  The  WGSW 50040 supports standard Simple Network Management Protocol  SNMP  and can be managed via  any standard based management software  For text based management  WGSW 50040 can be accessed via  Telnet and the console port  Moreover  the WGSW 50040 offers secure remote management by supporting  SSH connection which encrypts the packet content at each session     Flexibility and Extension solution   The four mini GBIC slots built in the WGSW 50040 are compatible with 1000Base SX LX and WDM SFP   Small Form Factor Pluggable  fiber optic modules  The distance can be extended from 550 meters   Multi Mode fiber  up to above 10 20 30 40 50 70 120 kilometers  Si
273. rface e1 1 7  Switch4 Config Port Range  switchport mode trunk    Switch4 config  spanning tree             Switch4 Config Port Range  exit     Switch4 config  spanning tree mst 4 priority 0    After the above configuration  Switch1 is the root bridge of the instance 0 of the entire network  In the MSTP  region which Switch2  Switch3 and Switch4 belong to  Switch2 is the region root of the instance 0  Switch3 is  the region root of the instance 3 and Switch4 is the region root of the instance 4  The traffic of VLAN 20 and  VLAN 30 is sent through the topology of the instance 3  The traffic of VLAN 40 and VLAN 50 is sent through  the topology of the instance 4  And the traffic of other VLANs is sent through the topology of the instance 0   The port 1 in Switch2 is the master port of the instance 3 and the instance 4     The MSTP calculation generates 3 topologies  the instance 0  the instance 3 and the instance 4  marked with  blue lines   The ports with the mark    x    are in the status of discarding  The other ports are the status of  forwarding  Because the instance 3 and the instance 4 are only valid in the MSTP region  the following figure  only shows the topology of the MSTP region        Figure 12 4 The Topology Of the Instance 3 after the MSTP Calculation       Figure 12 5 The Topology Of the Instance 4 after the MSTP Calculation    12 4 MSTP Troubleshooting    W  n order to run the MSTP on the switch port  the MSTP has to be enabled globally  If the MSTP is not  enab
274. rimary  node  the ring has been restored  at the same time the primary node block its secondary port  and sends its  neighbor LINK UP Flush FDB packet    After MRPP ring port refresh UP on transfer node  the primary node maybe find ring restore after a while   For the normal data VLAN  the network maybe forms a temporary ring and creates broadcast storm  To  avoid temporary ring  transfer node finds it to connect to ring network port to refresh UP  immediately block  temporarily  only permit control VLAN packet pass   after only receiving LINK UP FLUSH FDB packet from  primary node  and releases the port block state     31 2 MRPP Configuration Task List    1  Globally enable MRPP  2  Configure MRPP ring  3  Display and debug          relevant information    1  Globally enable MRPP       Command Explanation       Global Mode  mrpp enable  no mrpp enable       Globally enable and disable MRPP                 31 10       2  Configure MRPP ring    Command    Explanation       Global Mode       mrpp ring  lt ring id gt   no mrpp ring  lt ring id gt     Create MRPP ring  The    no    command  deletes MRPP ring and its configuration        MRPP ring mode       control vlan  lt vid gt   no control vlan    Configure control VLAN ID  format  no   deletes configured control VLAN ID        node mode  master   transit     Configure node type of MRPP ring  primary  node or secondary node         hello timer  lt  timer    no hello timer    Configure Hello packet timer sending from  primary 
275. rt of VLAN  the no  command deletes the  access list bound to the port                                  of VLAN   5  Clear the filtering information of the specified port  Command Explanation  Admin Mode  clear access group statistic interface Clear the filtering information     lt interface name gt    ethernet   interface name     of the specified port        24 3 ACL Example    Scenario 1   The user has the following configuration requirement  port 1 10 of the switch connects to 10 0 0 0 24 segment   ftp is not desired for the user   Configuration description   1   Create a proper ACL  2  Configuring packet filtering function      Bind the ACL to the port    The configuration steps are listed below     Switch config  access list 110 deny tcp 10 0 0 0 0 0 0 255 any destination d port 21  Switch config  firewall enable             Switch config  firewall default permit  Switch config  interface ethernet 1 10  Switch Config If Ethernet1 10  ip access group 110 in  Switch Config lf Ethernet1 10  exit  Switch config  exit       Configuration result     Switch show firewall   Firewall status  enable    Firewall default rule  permit    Switch show access lists   access list 110 used 1 time s     access list 110 deny tcp 10 0 0 0 0 0 0 255 any destination d port 21    Switch show access group interface ethernet 1 10    interface name Ethernet1 10  the ingress acl use in firewall is 110  traffic statistics Disable        24 18       Scenario 2   The configuration requirement is stat
276. s IPv4   IPv6 SSH       1 2          The right configuration for users to adopt radius server   s shell management  Supports CLI  Console  RS 232   Telnet   Supports SNMPv1   v2c   v3   Supports Security IP safety net management function   avoid unlawful  landing at nonrestrictive area   Support Syslog server for IPv4 and IPv6   Supports TACACS     Layer2 Function    Port disable enable    Auto negotiation 10 100 1000Mbps full and half duplex mode selection   Port Configuration Flow Control disable enable    Bandwidth control on each port   Port Loopback detect    Display each port   s speed duplex mode  link status  Flow control status   Auto negotiation status     802 1Q Tagged Based VLAN  up to 4K VLAN groups  Q in Q   GVRP for VLAN Management   Private VLAN Edge  PVE  supported    Bandwidth Control TX   RX   Both    IEEE 802 3ad LACP   Static Trunk  Link Aggregation  Supports 8 groups of 8 Port trunk    8 priority queues on all switch ports       Supports for strict priority and weighted round robin  WRR  CoS policies  Traffic classification   QoS   IEEE 802 1p CoS   ToS    IPv4   IPv6 DSCP    Port Based QoS  Strict priority and Weighted Round Robin  WRR  CoS policies    IGMP Snooping IGMP  v1   v2  Snooping  IGMP Querier mode    IGMP v1  v2   v3 Snooping   IGMP Querier mode support   MLDv1   v2  MLD v1 v2 Snooping  Support Standard and Expanded ACL  IP Based ACL   MAC Based ACL  Time Based ACL    Access Control List    Up to 512 entries  6 T Support MAC   port binding  e
277. s and the effects you expect to the after sale service staff of our  company     21 3 IGMP Snooping    21 3 1 Introduction to IGMP Snooping    IGMP  Internet Group Management Protocol  is a protocol used in IP multicast  IGMP is used by multicast  enabled network device  such as a router  for host membership query  and by hosts that are joining a  multicast group to inform the router to accept packets of a certain multicast address  All those operations are  done through IGMP message exchange  The router will use a multicast address  224 0 0 1  that can address  to all hosts to send an IGMP host membership query message  If a host wants to join a multicast group  it will  reply to the multicast address of that a multicast group with an IGMP host membership reports a message    IGMP Snooping is also referred to as IGMP listening  The switch prevents multicast traffic from flooding  through IGMP Snooping  multicast traffic is forwarded to ports associated to multicast devices only  The  switch listens to the IGMP messages between the multicast router and hosts  and maintains multicast group  forwarding table based on the listening result  and can then decide to forward multicast packets according to    the forwarding table   Switch provides IGMP Snooping and is able to send a query from the switch so that the user can use switch in  IP multicast     21 18       21 3 2 IGMP Snooping Configuration Task List    1  Enable IGMP Snooping  2  Configure IGMP Snooping    1  Enable IGMP 
278. s for the Ethernet ports       Command Explanation  Port Mode  combo forced mode  copper forced            copper preferred auto   sfp forced   Sets the combo port mode  combo ports only               sfp preferred auto         6 1       shutdown   T  Enables Disables specified ports   no shutdown       name   string      Names or cancels the name of specified ports   no name         Sets the cable type for the specified port  this  mdi  auto   across   normal   command is not supported by combo port and       no mdi   fiber port of switch   speed duplex  auto   force10 half   Sets port speed and duplex mode of  force10 full   force100 half   100 1000Base TX or 100Base FX ports  The  force100 full  force100 fx   no format of this command restores the default     force1g half   force1g full  setting  i e   negotiates speed and duplex   nonegotiate  master   slave       mode automatically        tiation  onjoff  Enables Disables the auto negotiation  negotiation  on o  function of 1000Base FX ports        bandwidth control   bandwidth    both    receive   transmit     Sets or cancels the bandwidth used for    4 incoming outgoing traffic for specified ports   no bandwidth control          flow control Enables Disables traffic control function for  no flow control specified ports   loopback Enables Disables loopback test function for  no loopback specified ports        Enables the storm control function for  broadcasts  multicasts and unicasts with  rate suppression  dlf   broadc
279. sPort gt    range   sPortMin    lt sPortMax gt  Y      lt dlpAddr gt   lt dMask gt     any destination     host destination  lt dlpAddr gt     d port    lt dPort gt     range  lt dPortMin gt   lt dPortMax gt       ack fin psh rst urg syn   precedence  lt prec gt    tos      tos    time range   time range name       Creates an extended  name based TCP IP access  rule  the  no  form command  this    deletes name based    extended IP access rule         no   deny   permit  udp     s pAddr    lt sMask gt      any source    host source  lt s pAddr gt     s port      lt sPort gt    range  lt sPortMin gt   lt sPortMax gt         lt dlpAddr gt   lt dMask gt     any destination     host destination  lt dlpAddr gt     d port    lt dPort gt     range  lt dPortMin gt   lt dPortMax gt      precedence     lt prec gt    tos  lt tos gt   time range lt time range name gt      Creates an extended  name based UDP IP access  rule  the    no    form command  this    deletes name based    extended IP access rule         no   deny   permit   eigrp   gre   igrp   ipinip   ip    ospf    lt protocol num gt      lt s pAddr gt   lt sMask gt        any source    host source  lt s lpAddr gt       lt dlpAddr gt         lt dMask gt     any destination    host destination       Creates an extended  name based IP access rule  for other IP protocols  the    no       form command deletes this       24 8                             lt dlpAddr gt     precedence  lt prec gt    tos name based extended         tos  
280. se value is 0x02   the frame requesting to quit    EAPOL Key  whose value is 0x03   the key information frame    EAPOL Encapsulated ASF Alert  whose value is 0x04   used to support the Alerting messages of  ASF  Alert Standard Forum   This kind of frame is used to encapsulate the relative information of  network management such as all kinds of alerting information  terminated by terminal devices     Length  represents the length of the data  that is  the length of the    Packet Body     in byte  There will be no    following data domain when its value is 0     Packet Body  represents the content of the data  which will be in different formats according to different types     2  The Format of EAP Data Packets  When the value of Type domain in EAPOL packet is EAP Packet  the Packet Body is in EAP format   illustrated in the next figure      Figure 25 4 the Format of EAP Data Packets    Code  specifies the type of the EAP packet  There are four of them in total  Request  1   Response   2   Success  3   Failure  4       There is no Data domain in the packets of which the type is Success or Failure  and the value of the  Length domains in such packets is 4    The format of Data domains in the packets of which the type is Request and Response is illustrated  in the next figure  Type is the authentication type of EAP  the content of Type data depends on the  type  For example  when the value of the type is 1  it means Identity  and is used to query the  identity of the other side  W
281. sends another  datagram of which the HOPLIMIT is increased to 2 so to discover the second router  Plus 1 to the HOPLIMIT  every time to discover another router  the Traceroute6 repeat this action till certain datagram reaches the    destination   Traceroute6 Options and explanations of the parameters of the Traceroute6 command please refer to  traceroute6 command chapter in the command manual     35 5 Show    show command is used to display information about the system   port and protocol operation  This part  introduces the show command that displays system information  other show commands will be discussed in  other chapters           Admin Mode   show debugging Display the debugging state    show flash Display the files and the sizes saved in the flash   show history Display the recent user input history command   show memory Display content in specified memory area     MEET  Display the switch parameter configuration        validating at current operation state        Display the switch parameter configuration                 written in the Flash Memory at current operation  j   state  which is normally the configuration file    applied in next time the switch starts up              Display the VLAN port mode and the belonging  show switchport interface  ethernet     VLAN number of the switch as well as the Trunk              lt IFNAME gt         port information    Display the TCP connection status established  show tcp   currently on the switch    Display the UDP connec
282. snmp server enable  config  snmp server community rw pri    config                  config  snmp server securityip 1 1 1 5    vate     snmp server community ro public       4 11                   The NMS can use private as the community string to access the switch with read write permission  or use  public as the community string to access the switch with read only permission     Scenario 2  NMS will receive Trap messages from the switch  Note  NMS may have community string  verification for the Trap messages  In this scenario  the NMS uses a Trap verification community string of  usertrap     The configuration on the switch is listed below     Switch config  snmp server enable    Switch config  snmp server host 1 1 1 5 v1 usertrap    Switch config  snmp server enable traps       Scenario 3  NMS uses SNMP v3 to obtain information from the switch   The configuration on the switch is listed below        config  snmp server    config  snmp server group UserGroup AuthPriv read max write max notify max       Mn              config  snmp server user tester UserGroup authPriv auth     5 hellotst          config  snmp server view max 1 include       Scenario 4  NMS wants to receive the v3Trap messages sent by the switch   The configuration on the switch is listed below     Switch config  snmp server enable  Switch config  snmp server host 10 1 1 2 v3 authpriv tester   server enable traps       Scenario 5  The IPv6 address of the NMS is 2004 1 2 3  2  the IPv6 address of the switch  A
283. special vlan 1 3       If adopting the control method of block  MSTP should be globally enabled  And the correspondence between    the spanning tree instance and the VLAN should be configured     Switch config  spanning tree  Switch config  spanning tree mst configuration    Switch Config Mstp Region  instance 2 vlan 2              Switch Config Mstp Region  instance 1 vlan 1            Switch Config Mstp Region      7 4 Port Loopback Detection Troubleshooting    The function of port loopback detection is disabled by default and should only be enabled if required     7 6       Chapter 8 Port Channel Configuration    8 1 Introduction to Port Channel    To understand Port Channel  Port Group should be introduced first  Port Group is a group of physical ports in  the configuration level  only physical ports in the Port Group can take part in link aggregation and become a  member port of a Port Channel  Logically  Port Group is not a port but a port sequence  Under certain  conditions  physical ports in a Port Group perform port aggregation to form a Port Channel that has all the  properties of a logical port  therefore it becomes an independent logical port  Port aggregation is a process of  logical abstraction to abstract a set of ports  port sequence  with the same properties to a logical port  Port  Channel is a collection of physical ports and used logically as one physical port  Port Channel can be used as  a normal port by the user  and can not only add network   s bandwid
284. stance id gt   rootguard    spanning tree rootguard  no spanning tree rootguard       Configure currently port whether running  rootguard in specified instance  configure  the rootguard port can t turn to root port     Configure currently port whether running    rootguard in instance 0  configure the    rootguard port can t turn to root port        3  Configure MSTP region parameters       Command    Explanation       Global Mode       spanning tree mst configuration  no spanning tree mst configuration    Enter MSTP region mode  The no  command restores the default setting        MSTP region mode       instance   instance id   vlan   vlan list      no instance  lt instance id gt   vlan   vlan list       Create Instance and set mapping    between VLAN and Instance        name   name    no name    Set MSTP region name        revision level    evel    no revision level    Set MSTP region revision level        Quit MSTP region mode and return to          abort Global mode without saving MSTP  region configuration   Quit MSTP region mode and return to  exit Global mode with saving MSTP region       configuration        12 4          4  Configure MSTP time parameters             Command Explanation  Global Mode  spanning tree forward time  lt time gt  Set the value for switch forward delay  no spanning tree forward time time   spanning tree hello time  lt time gt  Set the Hello time for sending BPDU  no spanning tree hello time messages        spanning tree maxage  lt time gt     3
285. starts or encounter an power  failure  Information in the log buffer zone is critical for monitoring the system operation and detecting  abnormal states        the NVRAM log buffer may not exist on some switches  which only have the  SDRAM log buffer zone    It is recommended to use the system log server  By configuring the log host  on the switch  the log can be sent to the log server for future examination                 35 7 1 2 Format and Severity of the Log Information    The log information format is compatible with the BSD syslog protocol  so we can record and analyze the log  by the systlog  system log protect session  on the UNIX LINUX  as well as syslog similar applications on PC   The log information is classified into eight classes by severity or emergency procedure  One level per value  and the higher the emergency level the log information has  the smaller its value will be  For example  the  level of critical is 2  and warning is 4  debugging is leveled at 7  so the critical is higher than warnings which no  doubt is high than debugging  The rule applied in filtering the log information by severity level is that  only the  log information with level equal to or higher than the threshold will be outputted  So when the severity  threshold is set to debugging  all information will be outputted and if set to critical  only critical  alerts and    emergencies will be outputted   Follow table summarized the log information severity level and brief description       
286. switch  In the case when in band management fails due to switch    configuration changes  out of band management can be used for configuring and managing the switch     3 1 2 1 Management via Telnet    To manage the switch with Telnet  the following conditions should be met     1   2     3     Switch has an IPv4 IPv6 address configured    The host IP address  Telnet client  and the switch   s VLAN interface IPv4 IPv6 address is in the same  network segment    If 2  is not met  Telnet client can connect to an IPv4 IPv6 address of the switch via other devices   such as a router     3 11       The switch is Layer 3 switch that can be configured with several IPv4 IPv6 addresses  The following example  assumes the shipment status of the switch where only VLAN1 exists      the system  The following describes  the steps for a Telnet client to connect to the switch s VLAN1 interface by Telnet  with IPv4 address example      PC   Workstation Managed Switch  with  IE Browser            2 _ RJ 45 UTP Cable IP Address     22207 192 168 1 254         Address   192 168 1 x       Figure 3 6 Manage the switch by Telnet    Step 1  Configure the IP addresses for the switch and start the Telnet Server function on the switch    First is the configuration of host IP address  This should be within the same network segment as the switch  VLAN1 interface IP address  Suppose the switch VLAN1 interface IP address is 10 1 128 251 24  Then      possible host IP address is 10 1 128 252 24  Run    ping 10
287. switch in scenario 1  SwitchA takes the place of Multicast  Router in scenario 1  Let s assume VLAN 60 is configured in SwitchA  including ports 1  2  6  10 and 12  Port  1 connects to the multicast server  and port 2 connects to Switch2  In order to send Query at regular interval   IGMP query must enabled in Global mode             VLAN6O     The configuration steps are listed below     SwitchA config   SwitchA config  ip igmp snooping   SwitchA config ztip igmp snooping vlan 60   SwitchA config  ip igmp snooping vlan 60 L2 general querier    SwitchB config   SwitchB config  ip igmp snooping   SwitchB config  ip igmp snooping vlan 100   SwitchB config  ip igmp snooping vlan 100 mrouter interface ethernet 1 1       Multicast Configuration   The same as scenario 1   IGMP Snooping listening result   Similar to scenario 1    Scenario 3  To run in cooperation with layer 3 multicast protocols   SWITCH which is used in Scenario 1 is replaced with ROUTER with specific configurations remains the same   And multicast and IGMP snooping configurations are the same with what it is in Scenario 1  To configure    21 22       PIM SM on ROUTER  and enable PIM SM on vian 100  use the same PIM mode with the connected multicast  router     Configurations are listed as below     switch config  switch config  ip pim multicast routing    switch config  interface vlan 100       switch config if vlan100  ip pim sparse mode    IGMP snooping does not distribute entries when layer 3 multicast protocol 
288. system operation  Stack status and  system power  helps monitor and troubleshoot when needed     WGSW 50040 LED indication    LI immnmim      Figure 2 2 WGSW 50040 LED panel       Function  Lights to indicate that the Switch has power   Power is off   Lights to indicate the system diagnoses is completed   Blink to indicate boot is enable     Lights to indicate the system diagnoses is under way        Blink to indicate the system diagnoses is malfunctioning        10 100 1000Base T interfaces    LED  LNK ACT    Bg SFP interfaces    Color Function    Lights to indicate the link through that port is successfully established with  speed 1000Mbps    Green  Blink to indicate that the switch is actively sending or receiving data over that   ort    Lights to indicate the link through that port is successfully established with  speed 100Mbps or 10Mbps    Yellow  Blink to indicate that the switch is actively sending or receiving data over that  port     No flow go through the port                              Function       LED  eee s to indicate the link through that port is successfully established with  LNK ACT speed 1000Mbps     Off     flow go through the port     2 2       2 1 3 Switch Rear Panel    The rear panel of the Managed Switch indicates an AC inlet power socket  which accept input power from 100  to 240V AC  50 60Hz  Figure 2 3 shows the rear panel of these Managed Switch     WGSW 50040 Rear Panel       Figure 2 3 Rear panel of WGSW 50040       AC Power Receptacle  For c
289. t   mrouter port interface   interface  name gt   no ip igmp snooping vlan   v an id    mrouter port interface   interface  name      Configure static mrouter port of vlan  The no  form of the command  cancels this  configuration             igmp snooping vlan  lt vian id gt  mrpt   lt value  gt        ip igmp snooping vlan  lt              gt  mrpt    Configure this survive time of mrouter port   The    no      igmp snooping vlan  lt vlan id gt   mrpt  command restores the default value           ip igmp snooping vlan  lt vlan id gt        Configure this query interval  The    no ip igmp       21 19                query interval  lt value gt   no ip igmp snooping vlan  lt vlan id gt   query interval    snooping vlan  lt vian id gt  query interval   command restores the default value             igmp snooping vlan  lt vilan id gt   immediately leave   no ip igmp snooping vlan  lt vlan id gt   immediately leave    Enable the IGMP fast leave function for the  specified VLAN  the    no ip igmp snooping  vlan  lt              gt  immediate leave  command  disables the IGMP fast leave function             igmp snooping vlan   v an id   query mrsp  lt value gt         ip igmp snooping vlan   v an id   query mrsp    Configure the maximum query response  period  The    no ip igmp snooping vlan    vlan id  query mrsp  command restores to  the default value        ip igmp snooping vlan   vlan id   query robustness   value    no ip igmp snooping vlan  lt vlan id gt   query robustness   
290. t   os  oS   show mls qos  interface   lt interface id gt   Displays QoS configuration information on  olicy   queuing    vlan  lt vlan id gt  a port     13 3 QoS Example    Example 1   Enable QoS function  change the queue out weight of port ethernet 1 1 to 1 1 2 2 4 4 8 8  and set the port in  trust QoS mode without changing DSCP value  and set the default QoS value of the port to 5     The configuration steps are listed below     Switch config   Switch config  mls qos   Switch config  interface ethernet 1 1  Switch Config lf Ethernet1 1  wrr queue bandwidth 1 1 2 2 4 4 8 8  Switch Config If Ethernet1 1  mls qos trust cos                  Switch Config If Ethernet1 1  mls qos cos 5       Configuration result    When QoS enabled in Global Mode  the egress queue bandwidth proportion of port ethernet1 1 is  1 1 2 2 4 4 8 8  When packets have CoS value coming in through port ethernet1 1  it will be map to the queue  out according to the CoS value  CoS value 0 to 7 correspond to queue out 1  2  3  4  5  6  7  8  respectively  If    13 10       the incoming packet has no CoS value  it is default to 5 and will be put in queue6  All passing packets would  not have their DSCP values changed     Example 2   In port ethernet1 2  set the bandwidth for packets from segment 192 168 1 0 to 10 Mb s  with a burst value of    4 MB  all packets exceed this bandwidth setting will be dropped     The configuration steps are listed below     Switch config  Switch config  access list 1 permit 192 
291. t dmac gt  lt dmac mask gt     tagged 802 3  cos    cos val     lt cos bitmask gt     vlanld  lt vid value gt       lt vid mask gt        c  Exit ACL Configuration Mode       Creates an MAC access rule  matching tagged 802 3 frame   command    the  no  form    deletes this MAC access rule                             Command Explanation  Extended name based MAC access configure Mode  Quit the extended  exit name based        access  configure mode    8  Configuring a numbered extended MAC IP access list  Command Explanation  Global mode  access list lt num gt  deny permit   any source mac  Creates a numbered     host source mac  lt host_smac gt       lt smac gt    lt smac mask gt     any destination mac     host destination mac  lt host_dmac gt        lt dmac gt  lt dmac mask gt    icmp    lt source gt    lt source wildcard gt    any source   host source   lt source host ip gt       lt destination gt    lt destination wildcard gt     any destination     host destination  lt destination host ip gt       lt icmp type gt    lt icmp code gt     precedence   lt precedence gt    tos  lt tos gt    time range     lt time range name gt      mac icmp extended mac ip  access rule  if the numbered  extended access list       specified number does not  exist  then an access list will  be created using this number   Note  switch implement the  simple mode of MAC IP ACL   configure SrcMac  SrclP       DstMac DstIP simple mode    only           access list lt num gt  deny permit  any source m
292. t keep alive messages that can be tolerated    5 1       5  Clear the list of candidate switches maintained by the switch      Configure attributes of the cluster in the candidate switch    1  Set the time interval of keep alive messages of the cluster    2  Set the max number of lost keep alive messages that can be tolerated in the cluster      Remote cluster network management  1  Remote configuration management  2  Remotely upgrade member switch  3  Reboot member switch     Manage cluster network with web   1  Enable http     Manage cluster network with snmp   1  Enable snmp server    1  Enable or disable cluster       Command    Explanation       Global Mode       no cluster run       cluster run  key  lt  WORD    vid  lt  VID         Enable or disable cluster function in  the switch        2  Create a cluster       Command    Explanation       Global Mode       cluster ip pool   commander ip    no cluster ip pool    Configure the private IP address pool  for cluster member devices        no cluster commander    cluster commander   lt                        gt      Create or delete a cluster           mac address  lt                 gt      no cluster member  id  lt member id gt       cluster member  candidate sn   candidate sn      mac address  lt mac addr gt          member id            Add or remove a member switch        3  Configure attributes of the cluster in the commander switch       Command    Explanation       Global Mode       cluster auto add  no cluster aut
293. t mode  i e  to set up a Separate  data transmission path for each user  or  to use Broadcast mode  which is to send messages to all users in  the network  and they will receive the Broadcast messages no matter they need or not  For example  if there  are 200 users in a network who want to receive the same packet  then the traditional solution is to send this  packet for 200 times separately via Unicast to guarantee the users who need the data can get all data wanted   or send the data in the entire domain via Broadcast  Transferring the data in the whole range of network  The  users who need these data can get directly from the network  Both modes waste a great deal of valuable  bandwidth resource  and furthermore  Broadcast mode goes against the security and secrecy    The emergence of IP Multicast technology solved this problem in time  The Multicast source only sends out  the message once  Multicast Routing Protocol sets up tree routing for Multicast data packet  and then the  transferred packet just starts to be duplicated and distributed in the bifurcate crossing as far as possible  Thus    the packet can be sent to every user who needs it accurately and effectively   It should be noticed that it is not necessary for Multicast source to join in Multicast group  It sends data to  some Multicast groups  but it is not necessarily a receiver of the group itself  There can be more than one  source sending packets to a Multicast group simultaneously  There may exist routers i
294. th  but also provide link backup  Port  aggregation is usually used when the switch is connected to routers  PCs or other switches        SwitchA       SwitchB                   Figure 8 1 Port aggregation    As shown in the above  SwitchA is aggregated to a Port Channel  the bandwidth of this Port Channel is the  total of all the four ports  If traffic from SwitchA needs to be transferred to SwitchB through the Port Channel   traffic allocation calculation will be performed based on the source MAC address and the lowest bit of target  MAC address  The calculation result will decide which port to convey the traffic  If a port in Port Channel fails   the other ports will undertake traffic of that port through a traffic allocation algorithm  This algorithm is carried  out by the hardware     Switch offers two methods for configuring port aggregation  manual Port Channel creation and LACP  Link  Aggregation Control Protocol  dynamic Port Channel creation  Port aggregation can only be performed on  ports in full duplex mode     For Port Channel to work properly  member ports of the Port Channel must have the same properties as  follows     All ports are in full duplex mode   All Ports are of the same speed   All ports are Access ports and belong to the same VLAN or are all TRUNK ports  or are all Hybrid ports   If the ports are all TRUNK ports  then their    Allowed VLAN    and    Native VLAN    property should also be    8 1       the same     If Port Channel is configured manua
295. that is capable of providing non blocking switch fabric and  wire speed throughput as high as 100Gbps  which greatly simplifies the tasks of upgrading the LAN for  catering to increasing bandwidth demands     1 1       Robust Layer 2 Features    The WGSW 50040 can be programmed for basic Switch management functions such as Port speed  configuration  Port aggregation  VLAN  Spanning Tree protocol  QoS  bandwidth control and IGMP Snooping   The WGSW 50040 provides 802 1Q Tagged VLAN  Q in Q  voice VLAN and GVRP protocol  The VLAN  groups allowed on the WGSW 50040 will be maximally up to 256  By supporting port aggregation  the  WGSW 50040 allows the operation of a high speed trunk combining multiple ports  It enables up to 8 groups  of maximum 8 ports for trunking     Excellent Traffic Control    PLANET WGSW 50040 is loaded with powerful traffic management and QoS features to enhance services  offered by telecoms  The functionality includes QoS features such as wire speed Layer 4 traffic classifiers and  bandwidth limiting that are particular useful for multi tenant unit  multi business unit  Telco  or Network Service  Provide applications  It also empowers the enterprises to take full advantages of the limited network  resources and guarantees the best performance at VoIP and Video conferencing transmission     Powerful Security    The WGSW 50040 supports ACL policies comprehensively  The traffic can be classified by source destination  IP addresses  source destination MAC add
296. the RADIUS may fail to authentication due to reasons such as physical  connection failure or wrong configurations  The user should ensure the following   m First make sure good condition of the RADIUS server physical connection          Second all interface and link protocols are in the UP state  use    show interface  command        Then ensure the RADIUS key configured on the switch is in accordance with the one configured on  RADIUS server      Finally ensure to connect to the correct RADIUS server    If the RADIUS authentication problem remains unsolved  please use debug aaa and other debugging  command and copy the DEBUG message within 3 minutes  send the recorded message to the technical    30 6       server center of our company     31 7       Chapter 31 MRPP Configuration    31 1 Introduction to MRPP    MRPP  Multi layer Ring Protection Protocol   is a link layer protocol applied on Ethernet loop protection  It can  avoid broadcast storm caused by data loop on Ethernet ring  and restore communication among every node  on ring network when the Ethernet ring has a break link  MRPP is the expansion of EAPS  Ethernet link  automatic protection protocol      MRPP protocol is similar to STP protocol on function  MRPP has below characters  compare to STP protocol       1   MRPP specifically uses to Ethernet ring topology   lt 2 gt  fast convergence  less than 1 s  ideally it can reach 100 50 ms     31 1 1 Conception Introduction        SWITCHA SWITCH B SWITCH F  Master E2 SP
297. the unicast frame in the VLAN it belongs to     11 2 Mac Address Table Configuration Task List    1  Configure the MAC address aging time  2  Configure static MAC forwarding or filter entry    11 3    1  Configure the MAC aging time    Command Explanation       Global Mode  mac address table aging time Configure the MAC address aging time     0Jaging time    no mac address table aging time                   2  Configure static MAC forwarding or filter entry       Command Explanation       Global Mode   mac address table  static   blackhole   address   mac addr   vlan   vlan id  gt    interface  ethernet   portchannel         lt interface name gt         ID Configure static MAC forwarding or filter   source destination both       entry   no mac address table  static   blackhole      dynamic   address  lt                 gt    vlan    vlan id     interface  ethernet               portchannel   lt interface name gt         11 3 Typical Configuration Examples                   j      MAC 00 01 11 11 11 11 MAC 00 01 33 33 33 33    MAC 00 01 22 22 22 22 MAC 00 01 44 44 44 44    Figure 11 2 MAC Table typical configuration example    Scenario   Four PCs as shown in the above figure connect to port 1 5  gt  1 7   1 9   1 11 of switch  all the four PCs belong    11 4    to the default VLAN1  As required by the network environment  dynamic learning is enabled  PC1 holds  sensitive data and can not be accessed by any other PC that is in another physical segment  PC2 and PC3    have stati
298. thernet   port channel   lt IFNAME gt                 22 1 3 MLD Snooping Examples    Scenario 1  MLD Snooping Function    a         Multicast Router    Mrouter Port    MLD Snooping    Switch    Groupi Groupi Groupi Group2    Figure 22 1 Open the switch MLD Snooping Function figure    As shown above  the vlan 100 configured on the switch consists of ports 1  2  6  10  12  Four hosts are  respectively connected to 2  6  10  12 while the multicast router on port 1  Suppose we need MLD Snooping  on VLAN 100  however by default  the global MLD Snooping as well as the MLD Snooping on each VLAN are   therefore first we have to enable the global MLD Snooping at the same time enable the MLD Snooping on    VLAN 100  furthermore we need to set the port 1 of VLAN 100 as a mrouter port   Configuration procedure is as follows     Switch config  Switch config  ipv6 mid snooping    Switch config  ipv6 mid snooping vlan 100    Switch config  ipv6 mld snooping vlan 100 mrouter port interface ethernet 1 1       Multicast configuration    Assume there are two multicast servers  the Multicast Server 1 and the Multicast Server 2  amongst program  1 and 2 are supplied on the Multicast Server 1 while program 3 on the Multicast server 2  using group  addresses respectively the Group 1  Group 2 and Group 3  Concurrently multicast application is operating on  the four hosts  Two hosts connected to port 2 and 5 are playing program 1 while the host connected to port 10  playing program 2  and the one to
299. thernet1 16  dot1x port method webbased             Switch config  interface ethernet 1 16          25 21       25 4 802 1x Troubleshooting    It is possible that 802 1x be configured on ports and 802 1x authentication be set to auto  t switch can   t be to  authenticated state after the user runs 802 1x supplicant software  Here are some possible causes and  solutions        f 802 1x cannot be enabled for a port  make sure the port is not executing MAC binding        configured as a port aggregation  To enable the 802 1x authentication  the above functions must be  disabled           the switch is configured properly but still cannot pass through authentication  connectivity  between the switch and RADIUS server  the switch and 802 1x client should be verified  and the  port and VLAN configuration for the switch should be checked  too    WB Check the event log in the RADIUS server for possible causes  In the event log  not only  unsuccessful logins are recorded  but prompts for the causes of unsuccessful login  If the event log  indicates wrong authenticator password  radius server key parameter shall be modified  if the event  log indicates no such authenticator  the authenticator needs to be added to the RADIUS server  if  the event log indicates no such login user  the user login ID and password may be wrong and  should be verified and input again           Web Authentication Proxy based on 802 1x is disabled by default  Open the debug dot1x switch to  check debugging inf
300. time range lt ti    me range name gt      extended  MAC TCP  access rule  the    no    form  this    Creates an  name based  command deletes  name based extended    MAC TCP access rule         no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt     fany destination mac  host destination mac     host dmac        dmac    dmac mask    udp     lt source gt  lt source wildcard gt   any source    host source lt source host ip gt     s port f  lt port1 gt     range   sPortMin    lt sPortMax gt  Y      lt destination gt  lt destination wildcard gt   any destinati  on   host destination  lt destination host ip gt      d port    lt port3 gt    range   sPortMin    lt sPortMax gt       precedence   precedence     tos      tos    time range  lt time range name gt      extended  MAC UDP  access rule  the  no  form  this    Creates an  name based  command deletes  name based extended    MAC UDP access rule            no  deny permit  any source mac  host source ma  c lt host_smac gt     lt smac gt  lt smac mask gt     fany destination mac  host destination mac     host dmac        dmac    dmac mask      eigrp greligrp ip ipinip ospf   lt protocol num gt        lt source gt  lt source wildcard gt   any source    host source lt source host ip gt          lt destination gt  lt destination wildcard gt   any destinati       Creates an extended  name based access rule for  the other IP protocol  the    no     form command deletes this  name based ext
301. tion        2  Destination Control Configuration  Like source control configuration  destination control configuration also has three steps   First  enable destination control globally  Since destination control need to prevent unauthorized user from    21 15       receiving multicast data  the switch won   t broadcast the multicast data it received after configuring global  destination control  Therefore  It should be avoided to connect two or more other Layer 3 switches in the  same VLAN on a switch on which destination control is enabled  The configuration commands are as follows        Command    Explanation       Global Configuration Mode        no  multicast destination control   required         Globally enable destination control   The no operation of this command will  globally disable destination control  All  of the other configuration can only  take effect after globally enabled  The  next is configuring destination control  rules  which are similar              Next is to configure destination control rule  It is similar    6000 7999     to source control  except to use ACL No  of       Command    Explanation       Global Configuration Mode        lt source host ip gt   any source      lt destination gt         no  access list  lt 6000 7999 gt   deny permit  ip     lt source gt   lt source wildcard gt    host source     lt destination wildcard gt    host destination   lt destination host ip gt   any destination     The rule used to configure destination  control 
302. tion     10 1 1 1    Figure 4 3 Download nos img file as FTP TFTP client    Scenario 1  The switch is used as FTP TFTP client  The switch connects from one of its ports to a computer    which is a FTP TFTP server with an IP address of 10 1 1 1  the switch acts as a FTP TFTP client  the IP   address of the switch management VLAN is 10 1 1 2  Download  nos img  file in the computer to the switch   W FTP Configuration   Computer side configuration    Start the FTP server software on the computer and set the username  Switch   and the password  switch     Place the    12 30 nos img  file to the appropriate FTP server directory on the computer    The configuration procedures of the switch are listed below     Switch config  interface vlan 1  Switch Config if Vlan1  ip address 10 1 1 2 255 255 255 0    h  Switch    Config if Vlan1  no shut  Config if Vlan1  exit               4 20          Switch config  exit  Switch copy ftp    Switch switch 10 1 1 1 12_30_nos img nos im       With the above commands  the switch will have the  nos img  file in the computer downloaded to the FLASH     W TFTP Configuration  Computer side configuration   Start TFTP server software on the computer and place the  nos img  file to the appropriate TFTP server  directory on the computer   The configuration procedures of the switch are listed below     Switch config  interface vlan 1   oe            address 10 1 1 2 255 255 255 0  h Config if Vlan1  no shut   Switch Config if Vlan1  exit   Switch config  e
303. tion login vty tacacs local       29 4 TACACS  Troubleshooting    In configuring and using TACACS   the TACACS  may fail to authentication due to reasons such as physical   connection failure or wrong configurations  The user should ensure the following       First good condition of the TACACS  server physical connection           Second all interface and link protocols are in the UP state  use    show interface  command     WB     Then ensure the TACACS  key configured on the switch is in accordance with the one configured on  TACACS  server       Finally ensure to connect      the correct TACACS  server     29 3       Chapter 30 RADIUS Configuration    30 1 Introduction to RADIUS    30 1 1 AAA and RADIUS Introduction    AAA is short for Authentication  Authorization and Accounting  it provide a consistency framework for the  network management safely  According to the three functions of Authentication  Authorization  Accounting  the  framework can meet the access control for the security network  which one can visit the network device     which access level the user can have and the accounting for the network resource    RADIUS  Remote Authentication Dial in User Service   is a kind of distributed and client server protocol for  information exchange  The RADIUS client is usually used on network appliance to implement AAA in  cooperation with 802 1x protocol  The RADIUS server maintains the database for AAA  and communicates  with the RADIUS client through RADIUS protocol  T
304. tion status established  show udp   currently on the switch    Display the information of the Telnet client which  show telnet login currently establishes a Telnet connection with             the switch        35 25          show tech support    Display the operation information and the state  of each task running on the switch  It is used by  the technicians to diagnose whether the switch  operates properly        show version    Display the version of the switch           show temperature          Show CPU temperature of the switch        35 6 Debug    All the protocols switch supports have their corresponding debug commands  The users can use the    information from debug commands for troubleshooting  Debug commands for their corresponding protocols    will be introduced in the later chapters     35 7 System log    35 7 1 System Log Introduction    The system log takes all information output under it control  while making detailed catalogue  so to select the    information effectively  Combining with Debug programs  it will provide a powerful support to the network    administrator and developer in monitoring the network operation state and locating the network failures     The switch system log has following characteristics    Log output from four directions  or log channels  of the Console  Telnet terminal and monitor  log  buffer zone  and log host    The log information is classified to four level of severities by which the information will be filtered  According to th
305. tions  it is a subset of NTP  It is common practice  to synchronize the clocks of several hosts in local area network with other NTP hosts through the Internet  and  use those hosts to provide time synchronization service for other clients in LAN  The figure below depicts a  NTP SNTP application network topology  where SNTP mainly works between second level servers and  various terminals since such scenarios do not require very high time accuracy  and the accuracy of SNTP  1   to 50 ms  is usually sufficient for those services        Level 1 server    DNS server Campus users         router Campus users    Figure 34 1 Working Scenario    Switch implements SNTPv4 and supports SNTP client unicast as described in RFC2030  SNTP client  multicast and unicast are not supported  nor is the SNTP server function     34 22       34 2 Typical Examples of SNTP Configuration        SNTP NTP  SERVER    SNTP NTP  SERVER    SWITCH SWITCH SWITCH    Figure 34 2 Typical SNTP Configuration    All switches in the autonomous zone are required to perform time synchronization  which is done through two  redundant SNTP NTP servers  For time to be synchronized  the network must be properly configured  There    should be reachable route between any switch and the two SNTP NTP servers    Example  Assume the IP addresses of the SNTP NTP servers are 10 1 1 1 and 20 1 1 1  respectively  and  SNTP NTP server function  such as NTP master  is enabled  then configurations for any switch should like  the followi
306. tisement maximum interval  Configure prefix advertisement parameters  Configure static IPv6 neighbor entries   Delete all entries in IPv6 neighbor table                              Se     So Ha He re             1  IPv6 Basic Configuration   1  Configure interface IPv6 address    Configure send neighbor solicitation message interval       Command    Explanation          Global mode             15 2             ipv6 address Configure IPv6 address  including aggregatable    ipv6 address prefix length   global unicast addresses  site local addresses   eui 64  and link local addresses  The no ipv6 address     lt ipv6 address prefix length gt  cancels IPv6 address                  2  Configure default gateway       Command Explanation    Interface Configuration Mode       ipv6 default gatewa   gt  5    Configure the default IPv6 gateway address  the    eT te no command deletes the default IPv6 gateway    no ipv6 default gateway address              lt ipv6 address gt        2  IPv6 Neighbor Discovery Configuration     1  Configure DAD Neighbor solicitation Message number       Command Explanation    Interface Configuration Mode    Set the neighbor query message number sent in       ipv6 nd dad attempts  lt value gt  sequence when the interface makes duplicate  no ipv6 nd dad attempts address detection  The no command resumes    default value  1                2  Configure Send Neighbor solicitation Message Interval       Command Explanation       Interface Configuration Mode     
307. to direct the standardized VLAN implementation  and the VLAN function of    switch is implemented following IEEE 802 1Q   The key idea of VLAN technology is that a large LAN can be partitioned into many separate broadcast  domains dynamically to meet the demands     Switch Switch Switch       Figure 10 1 A VLAN network defined logically    Each broadcast domain is a VLAN  VLANs have the same properties as the physical LANs  except VLAN is a  logical partition rather than physical one  Therefore  the partition of VLANs can be performed regardless of  physical locations  and the broadcast  multicast and unicast traffic within a VLAN is separated from the other  VLANs     With the aforementioned features  VLAN technology provides us with the following convenience   W Improving network performance   Saving network resources   Simplifying network management   Lowering network cost    Enhancing network security    10 1       The switch implements VLAN and GVRP  GARP VLAN Registration Protocol  which are defined by 802 1Q   The chapter will explain the use and the configuration of VLAN and GVRP in detail     10 1 2 VLAN Configuration Task List    Create or delete VLAN   Set or delete VLAN name   Assign Switch ports for VLAN   Set the switch port type   Set Trunk port   Set Access port   Enable Disable VLAN ingress rules on ports  Configure Private VLAN   Set Private VLAN association       ON AAR OD H    1  Create or delete VLAN                Command Explanation  Global Mode  vian W
308. transferred between the DHCP client and DHCP server  The implementation of DHCP is shown below     Discover  Offer    Reauest    Ack  3S              DHCP SERVER    DHCP CLIENT    Figure 18 1 DHCP protocol interaction   Explanation    1  DHCP client broadcasts DHCPDISCOVER packets in the local subnet    2   On receiving the DHCPDISCOVER packet  DHCP server sends a DHCPOFFER packet along with IP  address and other network parameters to the DHCP client    3  DHCP client broadcast DHCPREQUEST packet with the information for the DHCP server it selected after  selecting from the DHCPOFFER packets    4  The DHCP server selected by the client sends a DHCPACK packet and the client gets an IP address and  other network configuration parameters     The above four steps finish a Dynamic host configuration assignment process  However  if the DHCP server  and the DHCP client are not in the same network  the server will not receive the DHCP broadcast packets  sent by the client  therefore no DHCP packets will be sent to the client by the server  In this case  a DHCP  relay is required to forward such DHCP packets so that the DHCP packets exchange can be completed    between the DHCP client and server    Switch can act as both a DHCP server and a DHCP relay  DHCP server supports not only dynamic IP address  assignment  but also manual IP address binding  i e  specify a specific IP address to a specified MAC address  or specified device ID over a long period  The differences and relations be
309. trunk  Switch Config lf Ethernet1 11             Switch Config lf Ethernet1 11  exit       Switch C        Switch config   gvrp        Switch config  vlan 100  Switch Config Vlan100  switchport interface ethernet 1 2 6  Switch Config Vlan100  exit   Switch config  interface ethernet 1 11  Switch Config lf Ethernet1 11  switchport mode trunk  Switch Config lf Ethernet1 11             Switch Config lf Ethernet1 11  exit    10 2 4 GVRP Troubleshooting    The GARP counter setting in for Trunk ports in both ends of Trunk link must be the same  otherwise GVRP will  not work properly  It is recommended to avoid enabling GVRP and RSTP at the same time in switch  If GVRP    is to be enabled  RSTP function for the ports must be disabled first     10 3 Dot1q tunnel Configuration    10 3 1 Introduction to Dot1q tunnel    Dot1q tunnel is also called QinQ  802 1Q in 802 1Q   which is an expansion of 802 1Q  Its dominating idea is  encapsulating the customer VLAN tag  CVLAN tag  to the service provider VLAN tag  SPVLAN tag   Carrying  the two VLAN tags the packet is transmitted through the backbone network of the ISP internet  so to provide a  simple layer 2 tunnel for the users  It is simple and easy to manage  applicable only by static configuration   and especially adaptive to small office network or small scale metropolitan area network using layer 3 switch    10 8       as backbone equipment     On the customer port  Trunk VLAN 200 300            This port on PE1 is enabled  QinQ and b
310. tween dynamic IP address  allocation and manual IP address binding are  1  IP address obtained dynamically can be different every time     18 1       manually bound IP address will be the same all the time  2  The lease period of IP address obtained  dynamically is the same as the lease period of the address pool  and is limited  the lease of manually bound  IP address is theoretically endless  3  Dynamically allocated address cannot be bound manually  4  Dynamic  DHCP address pool can inherit the network configuration parameters of the dynamic DHCP address pool of    the related segment     18 2 DHCP Server Configuration    DHCP Sever Configuration Task List   1  Enable Disable DHCP server  2  Configure DHCP Address pool   1  Create Delete DHCP Address pool   2  Configure DHCP address pool parameters   3  Configure manual DHCP address pool parameters  3  Enable logging for address conflicts    1  Enable Disable DHCP server                      Command Explanation  Global Mode  service dhcp Enable DHCP server  The no command  no service dhcp disables DHCP server        2  Configure DHCP Address pool   1  Create Delete DHCP Address pool                      Command Explanation  Global Mode  ip dhcp pool  lt name gt  Configure DHCP Address pool  The no  no ip dhcp pool  lt name gt  operation cancels the DHCP Address pool         2  Configure DHCP address pool parameters       Command Explanation  DHCP Address Pool Mode          Configure the address scope that can be    network
311. unications Protocol  This is directly related to the hardware  interface for network devices and passes traffic based on MAC addresses     Layer 3    Network layer in the ISO 7 Layer Data Communications Protocol  This layer handles the routing functions for  data moving from one open system to another     Link Aggregation  See Port Trunk     Management Information Base  MIB     An acronym for Management Information Base  It is a set of database objects that contains information about  a specific device     39 2    Chapter 72 GLOSSARY       Multicast Switching    A process whereby the switch filters incoming multicast frames for services no attached host has registered  for  or forwards them to all ports contained within the designated multicast VLAN group     Open Shortest Path First  OSPF     OSPF is a link state routing protocol that functions better over a larger network such as the Internet  as  opposed to distance vector routing protocols such as RIP  It includes features such as unlimited hop count   authentication of routing updates  and Variable Length Subnet Masks  VLSM      Out of Band Management    Management of the network from a station not attached to the network     Port Mirroring       method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer  or RMON probe  This allows data on the target port to be studied unobtrusively     Port Trunk    Defines a network link aggregation and trunking method which specifies h
312. ust be ensured for the client to get an IP address from the 10 16 2 0 24 address pool     18 4 DHCP Troubleshooting    If the DHCP clients cannot obtain IP addresses and other network parameters  the following procedures can  be followed when DHCP client hardware and cables have been verified ok        Verify the DHCP server is running  start the related DHCP server if not running         n such case  DHCP server should be examined for an address pool that is in the same segment of the  switch VLAN  such a pool should be added if not present  and  This does not indicate switch cannot  assign IP address for different segments  see solution 2 for details      W  n DHCP service  pools for dynamic IP allocation and manual binding are conflicting  i e   if command   network address  and    host    are run for a pool  only one of them will take effect  furthermore  in  manual binding  only one IP MAC binding can be configured in one pool  If multiple bindings are  required  multiple manual pools can be created and IP MAC bindings set for each pool  New  configuration in the same pool overwrites the previous configuration     18 5       Chapter 19 DHCP Snooping Configuration    19 1 Introduction to DHCP Snooping    DHCP Snooping means that the switch monitors the IP getting process of DHCP CLIENT via DHCP protocol   It prevents DHCP attacks and illegal DHCP SERVER by setting trust ports and untrust ports  And the DHCP  messages from trust ports can be forwarded without being verifie
313. v6 passthrough       Enables IPv6 passthrough function of global mode on a  switch  only applicable when access control mode is  userbased  the no operation of this command will disable  the function     Enable IPv6 passthrough function on a switch port  only  applicable when access control mode is webbased  the no  operation of this command will disable the function        4  Supplicant related property configuration       Command    Explanation       Global Mode       dot1x max req  lt count gt   no dot1x max req    Sets the number of EAP request MD5 frame to be sent  before the switch re initials authentication on no supplicant  response  the no command restores the default setting        dot1x re authentication  no dot1x re authentication    Enables periodical supplicant authentication  the no    command disables this function        dot1x timeout quiet period   lt seconds gt    no dot1x timeout  quiet period    Sets time to keep silent on port authentication failure  the  no command restores the default value        dot1x timeout re authperiod   lt seconds gt    no dot1x timeout  re authperiod    Sets the supplicant re authentication interval  the no  command restores the default setting           dot1x timeout tx period   lt seconds gt   no dot1x timeout tx period       Sets the interval for the supplicant to re transmit EAP  request identity frame  the no command restores the  default setting        25 15                      dot1x re authenticate Enables IEEE 802 1x r
314. value for SSH authentication        ssh server authentication retires   lt authentication retires gt   no ssh server authentication retries    Configure the number of times for retrying SSH  authentication  the    no ssh server  authentication retries  command restores the  default number of times for retrying SSH  authentication        ssh server host key create rsa modulus   lt moduls gt     Generate the new RSA host key on the SSH  server        Admin Mode       Display SSH debug information on the SSH client  terminal monitor side  the    no terminal monitor  command stops    terminal no monitor displaying SSH debug information on the SSH             client side        4 2 2 3 Typical SSH Server Configuration                  1   Requirement  Enable SSH server on the switch  and run SSH2 0 client software such as Secure shell client or  putty on the terminal  Log on the switch by using the username and password from the client     Configure the IP address  add SSH user and enable SSH service on the switch  SSH2 0 client can log on the  switch by using the username and password to configure the switch     Switch config  ssh server enable    Switch config  interface vlan 1  Switch Config if Vlan1  ip address 100 100 100 200 255 255 255 0             Switch Config if Vlan1  exit  Switch config   username test privilege 15 password 0 test    In IPv6 networks  the terminal should run IPv6 supporing SSH client software  such as putty6  Users should  make no modification to conf
315. xit   Switch copy tftp    10 1 1 1 12 30 nos img nos img       Scenario 2  The switch is used as FTP server  The switch operates as the FTP server and connects from one  of its ports to a computer  which is a FTP client  Transfer the  nos img  file in the switch to the computer and  save as 12 25 nos img    The configuration procedures of the switch are listed below     config  interface vlan 1  h Config if Vlan1  ip address 10 1 1 2 255 255 255 0  Config if Vlan1  no shut  Config if Vlan1  exit  config  ftp server enable  config  username Admin password 0 switch       Computer side configuration   Login to the switch with any FTP client software  with the username    Admin    and password    switch     use the  command    get nos img 12 25 nos img  to download  nos img  file from the switch to the computer     Scenario 3  The switch is used as TFTP server  The switch operates as the TFTP server and connects from  one of its ports to a computer  which is a TFTP client  Transfer the  nos img  file in the switch to the computer   The configuration procedures of the switch are listed below     config  interface vlan 1  h Config if Vilan1  ip address 10 1 1 2 255 255 255 0    Config if Vlan1  no shut  h Config if Vlan1 zexit  config  tftp server enable       4 21       Login to the switch with any TFTP client software  use the    tftp    command to download  nos img  file from the  switch to the computer     Scenario 4  Switch acts as FTP client to view file list on the FTP serve
316. xtended IP access list basing on nomenclature       Command    Explanation       Global Mode       ip access list extended  lt name gt        no ip access list extended  lt name gt     Creates an extended               access list basing on       24 7                         nomenclature  the               access list extended    name       command deletes    the name based extended IP             access list   b  Specify multiple    permit    or    deny    rules  Command Explanation  Extended IP ACL Mode   no   deny   permit  icmp    lt slpAddr gt   lt sMask gt      Creates an extended    any source    host source   s pAddr        lt dlpAddr gt     dMask      any destination    host destination    dlpAddrs      icmp type     lt icmp code gt      precedence   prec     tos      tos    time range   time range name       name based ICMP IP access  rule  the    no    form command  this    deletes name based    extended IP access rule         no   deny   permit  igmp     lt              gt   lt sMask gt      any source    host source  lt              gt       lt dlpAddr gt     dMask      any destination    host destination   lt dlpAddr gt       igmp type     precedence   prec     tos      tos    time range   time range name       Creates an extended  name based IGMP IP access  rule  the  no  form command  this    deletes name based    extended IP access rule         no   deny   permit  tcp     s pAddr    lt sMask gt      any source    host source  lt s pAddr gt     s port   f  lt 
317. y    command again        begin to receive file  wait     recv 1526037    kkkkkkkkkkkkkkkkkkkkkkkk    write ok  transfer complete    close tftp client        If the switch is upgrading system file or system start up file through TFTP  the switch must not be restarted  until    close tftp client    is displayed  indicating upgrade is successful  otherwise the switch may be rendered  unable to start  If the system file and system start up file upgrade through TFTP fails  please try upgrade again  or use the BootROM mode to upgrade     4 24       Chapter 5 Cluster Configuration    5 1 Introduction to cluster network management    Cluster network management is an in band configuration management  Unlike CLI  SNMP and Web Config  which implement a direct management of the target switches through a management workstation  cluster  network management implements a direct management of the target switches  member switches  through an  intermediate switch  commander switch   A commander switch can manage multiple member switches  As  soon as a Public IP address is configured in the commander switch  all the member switches which are  configured with private IP addresses can be managed remotely  This feature economizes public IP addresses  which are short of supply  Cluster network management can dynamically discover cluster feature enabled  switches  candidate switches   Network administrators can statically or dynamically add the candidate  switches to the cluster which is already est
318. y enable or disable AM function              no am enable       2  Enable AM function on an interface       Command Explanation                Port Mode       27 1          Enable disable AM function on the port   am port When the AM function is enabled on the  no am port port  no IP or ARP message will be             forwarded by default        3  Configure the forwarding IP       Command Explanation       Port Mode  am ip pool   ip address     num         Configure the forwarding IP of the port              no am ip pool  lt ip address gt    num         4  Configure the forwarding MAC IP                      Command Explanation  Port Mode  am mac ip pool   mac address      ip address   Configure the forwarding MAC IP of the  no am mac ip pool   mac address   port    lt ip address gt     5  Delete all of the configured IP or MAC IP or both                         Command Explanation  Global Mode  Delete MAC IP address pool or IP  no am all  ip pool mac ip pool  address pool or both pools configured by  all users   6  Display relative configuration information of AM  Command Explanation       Global Configuration Mode            Display the AM configuration information  show am  interface   interface name             of one port or all ports        27 2             27 3 AM Function Example    Internet            are    HUB2        PC1 PC2 PC30    Figure 27 1 a typical configuration example of AM function    In the topology above  30 PCs  after converged by HUB1  connect with 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Bedienungsanleitung für X-Lite und X-PRO    Newstar KVM switch, 2-port, PS/2  Giant P200A-3100/5100 User's Manual  Philips CD Soundmachine AZ105R  ダウンロード  Mode d`emploi détecteur de mouvement caméra - My  TP-LINK TL-WR843ND router  09198512 - Web Tech    Copyright © All rights reserved. 
   Failed to retrieve file