Home
        SMC TigerAccess
         Contents
1.         coooccccoccnccccnnoncnccocnnnnonnnoncnonnnnnnonnnonacnonarononons 160  7 4 2 8 Activating RMON Alarm              ccccccccseeceeeeeeeeeeeeeeeeseeeeeeseeeesaaeeeesaaeeeeseeeeesaees 160  7 4 2 9 Deleting Configuration Of RMON Alam 161  TAO RMON EVO iria E 161  TAS Event COMMON a o E E EE 161  TASZ Event Bee e srl da tein etehueaneennptles esac 161  7 4 3 3 Subject of RMON Event    162  PAO E Ee Ke 162  7 4 3 5 Activating RMON Event  162  7 4 3 6 Deleting Configuration Of RMON Event  162  e 163   Syslog Output Level    163   Fac COG EE 165   SYVSIOG BING AdArESS E 166   Debug Message for Remote Terminal           n nnnnonnnnnennnnnnnnnennnennnnenennnesennne 166  DISADIING SY re enp 166  Displaying Syslog Message    166  Displaying Syslog Configuration         oocccccccnnccconccnconoconcnnnnnnonnnnonnonanencnnnnons 167   7 6 Quality Of GericeiOo    168  How 10 Operate DO EE 169   7 0 2    Packet Classic  BEE 171  LOAI  A 171  170 2 2 gt   COMMOUMMG  FOW ts 171  7 6 2 3 Applying and modifying Elow   a 174  7 6 2 4 COassCreaton 174  7 0 3 Packet Conditioning a 175  10 31 EN Ge leede EE 175  F002  Packet COIN ta 176  7 6 3 3 Average Packet Counter            n nnnnennenennnoennenrnrrnrnrersnrensnrrrsnrrrsnrrrsnrrsnrrrsnrrrne 176    A A oie 177  7 6 3 5 Applying and modifying Policer              ccccceeeccecseeeeeseeeeeeeeeeeeseeeeeesaeeeesseeeeeaees 178  LOA RUCACION ici 178  COA WR Ge te al Oui de 178  T042  le paa AA Ad 179  TOS PONCY RAMO sai ibi iba 185  LOAA   SOUCY AC
2.        251    CLI    252       i     8 2 1 2    8 2 1 3    8 2 2    Management Guide  TigerAccess    EE    It is possible to input O to 4 as the trunk group ID and the switch supports 5 logical  aggregated ports in LACP  The group ID of port trunk and the aggregator ID of LACP  cannot have same ID     For the switch  a source destination MAC address is basically used to decide packet  route     If packets enter to logical port aggregating several ports and there is no way to decide  packet route  the packets could be gathered on particular member port so that it is not  possible to use logical port effectively  Therefore the switch is configured to decide the  way of packet route in order to classify the member ports effectively when packets enter   It is decided with source IP address  destination IP address  source MAC address  desti   nation MAC address and the user could get information of packets to decided packet  route     The port designated as a member port of port trunk is automatically deleted from existing  VLAN  Therefore  if the member port and aggregated port exist in different VLAN each  other  VLAN configuration should be changed for their aggregation     Disabling Port Trunk    To disable the configured port trunk  use the SE command        ee E a configured trunk port   no trunk  lt 0 4 gt  PORTS Bridge  0 4  trunk group ID    If a port is deleted from a logical port or the port trunk is disabled  the port will be added to  the default VLAN     Displaying P
3.        ip igmp snooping vlan VLANS immediate    Global   Enables immediate block on a VLAN   block VLANS  VLAN ID  1 4094     367    CLI    368    9 2 5    Management Guide  TigerAccess    EE    To disable IGMPv3 immediate block  use the following command   man Te ages    no ip igmp snooping immediate    l l  Disables immediate block globally   block  Global  o Ip       n i igmp snooping vlan Disables immediate block on a VLAN   VLANS immediate block VLANS  VLAN ID  1 4094   IGMPv3 immediate block is enabled by default     Displaying IGMP Snooping Information    To display a current IGMP snooping configuration  use the following command      e e re    Enable  show ip igmp snooping  vlan loba Shows a current IGMP snooping configuration   oba  VLANS  VLAN  VLAN ID  1 4094   Bridge       To display the IGMP snooping table  use the following command   show ip igmp snooping groups Shows the IGMP snooping table globally    A B C D   mac based  mac based  lists groups on a MAC address basis   Enable  show ip igmp snooping groups Global Shows the IGMP snooping table per port   oba  port  PORTS   cpu   mac based  Brid PORTS  port number  ridge  show ip igmp snooping groups Shows the IGMP snooping table per VLAN   vian VLANS  mac based  VLANS  VLAN ID  1 4094        To display the collected IGMP snooping statistics  use the following command    og rem    show ip igmp snooping stats Enable Shows the collected IGMP snooping statistics   port  PORTS   cpu  Global PORTS  port number  To cl
4.       essesenseeereeeeeeea 79  S920 SS A io sent a a a a E 83  53207 TR RER EE 84  O E 84  5 9 2 0   Impulse Nolse Protection    tada 86  5 3 2 9 Trellis Coded Modulation  TOM     86  Dia 10  Mamada A A A 87  E E SNR MAMA o a vomaneagus  88   e KEE lee Hate ren ON 90  5992 19 Ghandshake TON tala 91  5 3 3 VDSL Checking Errors of VDSL Port  91  e E   Gong Prol olla liada clara lodo 95  EE  LING CONO  profile iia A A A A 95  03 42  Alarm Contig profile  dis 98  590 CONNU CRE 102  535 1   M  dem Fort Rese terrne eer eege gie 102  5 3 5 2 Installing System Image of CHE    102  5 3 5 3 Installing CPE System Image File mGlave  cc ccccecceesseeeeeseeeeeeaeeeeeeaees 104  5 3 5 4 Configuring AGC  Auto Gain Control   106  5 3 5 5 Checking Length of Cable between CPE and CO  107  59 539060 Auto negotiation o CRE a ea i 107  9997 Mans ML RAS OU ES 107  9900     DUplex mode Ol OPE EE 107  535 9    Auto Upgrade of CPE Mage E 108    SMC7824M VSW    Management Guide CLI  TigerAccess    EE  59 5 10 Displaying  TEE 108  9 4 POT Ve e Le uti a o de cedo 110  6  System Environment wists ae 112  6 1 Environment Configuration          ccoocccccnccocnconcncnnncconoconnnonnnnnnncnnnnnnnncnnns 112  Gal e Na Mead dd 112  612    lime a  a Dalenni na ancien de cate ential E 112  Oslo  TIME ZOMCs EE 113  6 1 4 Network Time Protocol  NIT     113  6 1 5 Simple Network Time Protocol  NIT     114  646 Terminal Configuratii s  secen a aa a a eee 115  Gots  EOI Baena a ted dma tat na enacted tewacay   s 115  0 
5.       ooccccoccncccccccccnnconcnnconnnconcnonnnnononcncnannnnns 49  4 2 5 4 Additional TACACS  Confguraton  49  42 0    AACCOURUNG   ee adi 50  4 2 7 Displaying System Authentcaton     50  43  e eine ie e ie Nte Le 51  AOA     Enabling INterna Cesna a i   51  4 3 2 Assigning IP Address to Network Interface                  ccccceesseeeeeeeeeeeeeeeeeeeeaees 92  4 3 3 Static Route and Default  Gateway i cccccceccceeseeeeeeeeeeeesaeeeeesaeeeeseaees 52  4 34  Interface Eeer ege a da 53  4 3 5 Displaying Interface AAA 54  44  Secure oel  SSH estan S 55  Ae So EE 55  441 1    Enabling SSH Servar iria a Ae Bact 55  4 4 1 2 Displaying On line SSH Cent  55  4 4 1 3 Disconnecting SSH Cent    55  4 4 1 4 Assigning Specific Authentication key    56  4 4 1 5 Displaying Connection History of SSH Cent  56  BA   Son Ela EE 56  44 21 Eogimto SSH  SIENA A A ates 56  AA O EE 56  4 4 2 3 Authentication key    ENNEN 57  AS  902 1 AUtMMentica lO a sa 58  45 1    GOZAN AAN O 59  E 0 A a tet 59  E  EE EE usada 59  SN E Authenticaton ModE css ed 60  4 5 1 4 A A et ha pidetunaatatoekDeudaundeceniakaataes 61  4021 0  iP OCC AUINONnZallON a ca 61  4 5 1 6 Interval for Retransmitting Request Identity Packet           nnnnnnnnannnennnnsnnneennnnn 61  4 5 1 7 Number of Requests to RADIUS Server       occcocccccccccccccccconcnconcncnoccnnoncncnncnnnos 61  4 5 1 8 Interval of Request to RADIUS Server     ooccoccccccccnccccncccccnconcncnncnononnnnoncncnncnnnos 62  A522  SOZ  1X RE AUINENUCAUION sisi eae aorti
6.      DHCP Lease Database    DHCP Database Agent    The switch provides a feature that allows to a DHCP server automatically saves a DHCP  lease database on a DHCP database agent     The DHCP database agent should be a TFTP server  which stores a DHCP lease data   base as numerous files in the form of leasedb MAC ADDRESS  e g  leasedb 0A 31 4B 1  A 77 6A  The DHCP lease database contains a leased IP address  hardware address  etc     313    CLI    314    8 6 3 2    8 6 3 3    Management Guide  TigerAccess    EE    To specify a DHCP database agent and enable an automatic DHCP lease database back   up  use the following command      e e re    Specifies a DHCP database agent and back up inter   ip dhcp database A B C D IN  val     TERVAL A B C D  DHCP database agent address  INTERVAL  120 2147483637  unit  second     no ip dhcp database Deletes a specified DHCP database agent        Upon entering the ip dhcp database command  the back up interval will begin     To display a configuration of the DHCP database agent  use the following command      e mn    show ip dhcp database Shows a configuration of the DHCP database agent        Displaying DHCP Lease Status    To display current DHCP lease status  use the following command     a m   See    show ip dhcp lease  all   bound   Shows current DHCP lease status   abandon   offer   fixed   free  all  all IP addresses     POOL  bound  assigned IP address  Enable    Global  show ip dhcp lease detail Bridge   A B C D     abandon  illegally
7.      Therefore  the message that corresponds to 3  4  11  and 12 is chosen as  the message limiting the transmission rate     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    Tab  7 2 shows the result of mask calculation of default value     ee Status  ICMP_DEST_UNREACH  3   ICMP_SOURCE_QUENCH  4   ICMP_ECHO  8     Tab  7 2 Mask Calculation of Default Value       To configure the limited ICMP transmission time  use the following command     ne  eos    ip icmp interval rate limit  N  Global Configures a limited ICMP transmission time   oba  TERVAL INTERVAL  0 2000000000  unit  10 ms     D The default ICMP interval is 1 second  100 ms         To return to default ICMP configuration  use the following command     IN wows  Raion  ip icmp interval default Global Returns to default configuration     To display ICMP interval configuration  use the following command     CO ma a O    Enable       show ip icmp interval Global Shows ICMP interval configuration     Bridge       SMC7824M VSW 225    CLI    226    7 14    7 14 1    7 14 2    7 15    Management Guide  TigerAccess    EE    TCP Flag Control    TCP  Transmission Control Protocol  header includes six kinds of flags that are URG   ACK  PSH  RST  SYN  and FIN  For the switch  you can configure RST and SYN as the  below     RST Configuration    RST sends a message when TCP connection cannot be done to a person who tries to  make it  However  it is also possible to configure to block the message  This function will  help p
8.      na rees       cpe agc on PORTS Enables AGC in CPE     SMC7824M VSW    Management Guide  TigerAccess    EE    9 3 9 5    9 3 9 6    5 3 5 7    5 3 5 8    SMC7824M VSW    CLI    To designate AGC and configure it manually  you should designate the distance  To dis   able the configured AGC  use the following command     na e See    cpe  agc off 0   agc off 1   agc off 2   agc off 3      Disable AGC in CPE and configure the    agc off 4   agc off 5   agc off 6   agc off 7   agc   distance manually     off 8   agc off 9   agc off 10  PORTS       There can be some error in manually designated distance     Checking Length of Cable between CPE and CO    To check cable length from CO to CPE  use the following command     a Y  a  show Ire ewl PORTS Enable Global Bridge   Checks cable length from CO to CPE    Auto negotiation of CPE       To enable or disable the auto negotiation of CPE Ethernet port  use the following com   mand      e e rees    Enables the auto negotiation on CPE ethernet port   cpe nego PORTS on  Bridge  default  on     cpe   cpe nego PORTS off     cpe nego PORTS off   off   Disables the auto negotiation CPE ethernet port   the auto    Disables the auto negotiation CPE ethernet port   CPE ethernet port       Transmit Rate of CPE    To set the transmit rate of an Ethernet port of CPE  use the ee command     a the transmit rate of the CPE ethernet port to  cpe speed PORTS  10   100  Bridge  10 100 Mbps     Duplex mode of CPE       To set the duplex mode on an Ethe
9.     1cccsccsccsenssccsecsescsecnesceecsnssesennsnseesennsnaes 135  7 1 Simple Network Management Protocol  NM     135  CET SNMP COMMU IY senseless lie vines es ess 135  SMC7824M VSW 7    CLI    Management Guide  TigerAccess    EE    7 1 2 Information Of SNMP Agent  136  PALO SNMP COMZ2S6C  saunia aa 137  Fa kde TE Ei EEN 137  7 1 5 SNMP View eco    138  7 1 6 Permission to Access SNMP View Record    138  TA ONMP Versions Us rodas 139  Aso CSL Aid 139  TRST   SNMP Trap  Mode ee ee EE 139     n SONME Trap HOS ne ene ee eee eee ee ee enn ee 140  TAB     SNMP Trap in   Event Mode tee 140   Le ER RE e le e Ce BEE 141  1 1485  Displaying  SNMP Train A in 142   EE GE AAI aaa dos 143  TEST  Alarm Not PAU ds 143   1 92 Alarm Seventy Gl ctrl tas 143  7 1 9 3 Default Alarm Severity        oocccoonccccocncococononononnnnonononononnnnononnnnonnnoncnnnrnnnnnncnnnos 144  7 1 9 4 Generic Alarm Severity aicsin A 144  7 1 9 5 ADVA Alarm Severin ii 146  Tigo  EE Meat ie 147  7 1 9 7 STP Guard Alarm Gevertvy   147  7 1 9 8 Displaying SNMP Alarm Severity                ccccccccseeeeeeeeeeeseeeeeeeeeeeeseeeeeeseeeeeeas 148  7 1 10 Displaying SNMP Configuration          a  aaannaannannnnannnnnnnnnnnnnnnrnnnnennnnnrrnnrrnnni 148  Tal   Disabling oN EE 148  7 2 Operation  Administration and Maintenance  COAM   149  SE    OAWILOOPD Caio iodo 149  EE E  ocal OAM leie EEN 150  Tiza e Re e Mee seis 150  7 20     REMOS OAM tens at id is A 150  7 2 5 Displaying OAM Contouraton  isien aa a a a 151  7 3 Link
10.     A     ech II  ae  gt  Policin  gt  Marking 8 Remarking   _ Scheduling  Te Classification  p g  E Action ER IM       Rule             QoS                Fig  7 1 Procedure of QoS operation    The structure of Rule has 4 types of categories with different roles for QoS        Flow  Defines traffic classification criterias such as L3 source and destination IP  address  L2 source and destination MAC address  Ethernet type  length  Class of  Service  CoS   Differentiated Services Code Point  DSCP  and so on  A unique  name needs to be assigned to each flow     e Class  Includes more than 2 flows for the efficient traffic management in the application of  rule to this set of flows  Additionally  a unique name needs to be assigned to each    class     e Policer  Defines the packet counter  coloring  rate limit including metering function which will  be applied to specified Flow and Class  The policer adjusts how and what is to be  classified within transmitted packets       packet counter calculates the classified packets for identifying a flow       rate limit defines which packets conform to or exceed the given rate       metering uses to trigger real time traffic conditioning actions     e Policy  Configures the policy classifying the action s  to be performed if the configured rule  classification fits transmitted packet s   It cannot only include a specified Flow  Class  or Policer but also set marking remarking according to the various parameters such  as CoS and DSCP whic
11.     Disabling SNMP       To disable SNMP  use the following command      e e re       When you use the no snmp command  all configurations of SNMP will be lost     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    7 2 Operation  Administration and Maintenance  OAM     In the enterprise  Ethernet links and networks have been managed via Simple Network  Management Protocol  SNMP   Although SNMP provides a very flexible management so   lution  it is not always efficient and is sometimes inadequate to the task     First  using SNMP assumes that the underlying network is operational because SNMP re   lies on IP connectivity  however  you need management functionality even more when the  underlying network is non operational  Second  SNMP assumes every device is IP ac   cessible  This requires provisioning IP on every device and instituting an IP overlay net   work even if the ultimate end user service is an Ethernet service  This is impractical in a  carrier environment     For these reasons  carriers look for management capabilities at every layer of the network   The Ethernet layer has not traditionally offered inherent management capabilities  so the  IEEE 802 3ah Ethernet in the First Mile  EFM  task force added the Operations  Admini   stration and Maintenance  OAM  capabilities to Ethernet like interfaces  These manage   ment capabilities were introduced to provide some basic OAM function on Ethernet media     EFM OAM is complementary  not competitive  with SNMP man
12.     Tab  3 5 shows main commands of DHCP Pool Configuration mode     default router Configures the default gateway of the pool     range Configures the range of IP addresses     Tab  3 5 Main Command of DHCP Pool Configuration Mode       DHCP Option Configuration Mode    In DHCP Option Configuration mode  you can configure DHCP option  You can define  DHCP options that are carried in the DHCP communication between DHCP server and  client or relay agent  A specific DHCP option can be defined by its format type  length and  value     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    To open DHCP Option Configuration mode  use the command  Then the system prompt  will be changed from SWITCH config   to SWITCH dhcp opt NAME         e e Se       i i Opens DHCP Option Configuration mode to configure  ip dhcp option format NAME Global    DHCP options     Tab  3 7 is the main commands of DHCP Option Configuration mode        am Configures the attribute for option field in the DHCP packet     Tab 3 6 Main Command of DHCP Option Configuration Mode    DHCP Option 82 Configuration Mode    In DHCP Option 82 Configuration mode  you can configure DHCP option 82 for DHCP re   lay agent  This feature enables network administrators to manage IP resources more effi   ciently     To open DHCP Option 82 Configuration mode  enter the ip dhcp option82 command   then the system prompt will be changed from SWITCH config   to SWITCH config   opt82        e e Se           Op
13.     This chapter consists of the following sections   e ARP Table   e ARP Alias   e ARP Inspection   e Gratuitous ARP   e  Proxy ARP    ARP Table    Hosts typically have an ARP table  which is a cache of IP MAC address mappings  The  ARP Table automatically maps the IP address to the MAC address of a switch  In addition  to address information  the table shows the age of the entry in the table  the encapsula   tion method  and the switch interface  VLAN ID  where packets are forwarded     The switch saves IP MAC addresses mappings in ARP table for quick search  Referring  to the information in ARP table  packets attached IP address is transmitted to network   When configuring ARP table  it is possible to do it only in some specific interfaces     Registering ARP Table    The content of ARP table is automatically registered when the relation between MAC ad   dress and IP address has been found  The network administrator could use MAC address  of specific IP address in Network by registering on ARP table     To make specific IP address to be accorded with MAC address  use the following com   mand      e e See    Sets a static ARP entry  enter the IP address and the  arp A B C D MACADDR MAC address   MACADDR  MAC address     Global Sets a static ARP entry  enter the IP address  the MAC  arp A B C D MACADDR INTER  address and enter an interface name   FACE INTERFACE  interface name   MACADDR  MAC address        213    CLI    214    7 12 1 2    7 12 2    Management Guide  TigerAcc
14.     To delete the key value of a specified member port  use the following command      e e en           Deletes the key value of a specified member port  se   no lacp port admin key PORTS Bridge  lect the member port number     255    CLI Management Guide  TigerAccess    EE    8 2 2 7 Port Priority    To configure priority of an LACP member port  use the following command      ee e ee       lacp port priority PORTS  lt 1  Brid Sets the LACP priority of a member port  select the  ridge  65535 gt  port number   default  32768     To delete the configured port priority of the member port  use the following command   Tennent  ewe  Raton    o Deletes the configured port priority of a selected mem   no lacp port priority PORTS Bridge  ber port  select the member port number     8 2 2 8 Displaying LACP Configuration       To display a configured LACP  use the following command      e Y See    show lacp aggregator Shows the information of aggregated port     show lacp aggregator AGGRE     Shows the information of selected aggregated port   GATIONS Enable ggreg p    Global  show lacp port Brid Shows the information of member port   ridge    show lacp port PORTS Shows the information of appropriated member port     show lacp statistics Shows aggregator statistics        To reset LACP statistics information  use the following command     na e een    Enable    clear lacp statistic Global Resets the information of statistics        Bridge    256 SMC7824M VSW    Management Guide  TigerAcce
15.     With above configuration  the packets from port 2 and 4 are decided according to the pro   tocol kinds  In case the protocol is incongruous  the route is decided according to the port  based VLAN     Sample Configuration 4  Configuring QinQ    Port 10 of SWITCH 1 and port 11 of SWITCH 2 are connected to the network where dif   ferent VLANs are configured  To communicate without changing VLAN configuration of  SWITCH 1 and SWITCH 2 which communicate with PVID 10  configure it as follows     You should configure the ports connected to network communicating with PVID 11 as  Tagged VLAN port     The network  communicating  with PVID 11            Communicating with  PVID 10    Connecting to port 11 of  Switch 1 Switch 2 Switch 1        Communicating with  PVID 10  Connecting to port 10 of  Switch 1     lt  SWITCH 1  gt     SWITCH  bridge    vlan dotlq tunnel enable 10  SWITCH  bridge    vlan pvid 10 11  SWITCH  bridge    show vlan dotlq tunnel  Tag Protocol Id  lt  0x8100  d  dousle tagging port     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    Port  123456789012345678901234567890123    cher  le cuadra E sar Sa be BE taint ee ae    Ot Beier alah de ie a  SWITCH  bridge        lt  SWITCH 2  gt     SWITCH  bridge    vlan dotlq tunnel enable 11  SWITCH  bridge    vlan pvid 11 11  SWITCH  bridge    show vlan dotlq tunnel  Tag Protocol Id   0x8100  d  double  taggi  g port     Port  123456789012345678901234567890123    dtag deade reksi Ge e eg Ee A  SWITCH  bridge    
16.     e e re    ip dhcp snooping trust PORTS Blocks broadcast request packets of Egress traffic on    filter egress bcast req specified trusted port     no ip dhcp snooping trust Unblocks broadcast request packets of Egress traffic       PORTS filter egress bcast req on specified trusted port     DHCP Rate Limit    To set the number of DHCP packets per second  pps  that an interface can receive  use  the following command      e e re       ip dhcp snooping  limit rate B      Sets a rate limit for DHCP packets   unit  pps   PORTS  lt 1 255 gt   no ip dhcp snooping limit rate geck  Deletes a rate limit for DHCP packets   PORTS    Normally  the DHCP rate limit is specified to untrusted interfaces and 15 pps is recom   mended for a proper value  However  if you want to set a rate limit for trusted interfaces   keep in mind that trusted interfaces aggregate all DHCP traffic in the switch  and you will  need to adjust the rate limit to a higher value     DHCP Lease Limit    The number of entry registrations in DHCP snooping binding table can be limited  If there  are too many DHCP clients on an interface and they request IP address at the same time   it may cause IP pool exhaustion     To set the number of entry registrations in DHCP snooping binding table  use the follow   ing command     n   mn    l SC Enables a DHCP lease limit on a specified untrusted  ip dhcp snooping limit lease    ort   PORTS  lt 1 2147483637 gt  p    Global 1 2147483637  the number of entry registrations    n
17.     es e re       lacp port activity PORTS  active er Configures the operation mode of the member port   ridge    passive  E  default  active     To delete the configured operation mode of the member port  use the following command      e Y Se       S     Deletes the configured operation mode of the member  no lacp port activity PORTS Bridge A  port     Priority of Switch    In case the member ports of connected switches are configured as Active mode  LACP  system enabled   it is required to configure which switch would be a standard for it  For  this case  the user could configure the priority on switch  The following is the command of  configuring the priority of the switch in LACP function      e mees       DEE i Sets the priority of the switch in LACP function  enter  lacp system priority  lt 1 65535 gt  Bridge      the switch system priority   default  32768     To delete the priority of configured switch  use the following command     na   een       no lacp system priority Clears the priority of the configured switch     Manual Aggregation    The port configured as member port is basically configured to aggregate to LACP  How   ever  even though the configuration as member port is not released  they could operate  as independent port without being aggregated to LACP  These independent ports cannot  be configured as trunk port because they are independent from being aggregated to  LACP under the condition of being configured as member port     SMC7824M VSW    Management 
18.     show dotlx 25   Port  25    config                SystemAuthControl   Enabled  ProtocolVersion   0   PortControl   Force Authorized  PortSstatus   Unauthorized  ReauthEnabled   True   QuietPeriod  lt  T000  ReauthPeriod   1800   TxPeriod   30   PaeState   INITIALIZE    SWITCH  config       SMC7824M VSW 65    CLI Management Guide  TigerAccess    EE    The following is the example of configuring the port 25 with the MAC based authentica   tion     SWTICH  config    dotlx auth mode mac base 25  SWTICH  config    show dotlx   802 1x authentication is enabled    RADIUS Server TimeOut  1 S    RADIUS Server Retries  3    RADIUS Server   10 1 1 1  Auth key   test     802 1x   P2345678 90123456  890123456  8 90123    eT Te bain nent este pte hea EE  POr rtCAUCHSG  EE  Mac Mia Die  a de Mais  MacAuthed ld de EE  p   port based  m   mac based  a   authenticated  u   unauthenticated    SWITCH  config       66 SMC7824M VSW    Management Guide  TigerAccess    EE    3    5 1    5 2    5 2 1    5 2 2    SMC7824M VSW    CLI    Port Configuration    The switch provides maximum 24 VDSL ports including integrated splitters  In this chapter   you can find the instructions for the basic port configuration such as auto negotiation  flow  control  transmit rate  etc  Please read the following instructions carefully before you con   figure a port in the switch     This chapter contains the following sections     e Port Basic   e Ethernet Port Configuration  e VDSL Port Configuration   e Port Mirr
19.    226 Transfer complete    ftp  13661428 bytes sent in 223 26Seconds 61 19Kbytes sec    ftp gt  bye   221 Goodbye     CIAS    To upgrade the system software via the FTP server  the FTP server should be enabled on  the system  For more information  see Section 6 1 11     SMC7824M VSW    Management Guide  TigerAccess    EE    11    SMC7824M VSW    CLI    Abbreviations   AES Advanced Encryption Standard   ARP Address Resolution Protocol   CE Communaut   Europ  enne   CIDR Classless Inter Domain Routing   CLI Command Line Interface   Cos Class of Service   DA Destination Address   DHCP Dynamic Host Configuration Protocol   DSCP Differentiated Service Code Point   DSL Digital Subscriber Line   DSLAM Digital Subscriber Line Access Multiplexer  EMC Electro Magnetic Compatibility   EN Europaische Norm  European Standard    ERP Ethernet Ring Protection   FDB Filtering Data Base   FE Fast Ethernet   FTP File Transfer Protocol   GB Gigabyte   GE Gigabit Ethernet   HW Hardware   ID Identifier   IEC International Electrotechnical Commission  IEEE 802 Standards for Local and Metropolitan Area Networks  IEEE 802 1 Glossary  Network Management  MAC Bridges  and Internetworking  IEEE Institute of Electrical and Electronic Engineers  IETF Internet Engineering Task Force   IGMP Internet Group Management Protocol   IGMPv1 Internet Group Management Protocol Version 1  IGMPv2 Internet Group Management Protocol Version 2  IGMPv3 Internet Group Management Protocol Version 3  IP Internet Protocol   
20.    CLI    Fig  8 29 shows an example of ERP operation when a link failure occurs     3  Nodes detecting Link Failure  send Link Down message                            Node A Node B       N       SSES Unused Link for Traffic    Secondary             Primary    Node C RM Node    1  Secondary port of RM node is  blocking in Normal state    Fig  8 29 ERP Operation in case of Linnk Failure    After RM node receives Link Down messages from other nodes  it unblocks its secondary  port for traffic transmission with Node B directly connected to the secondary port  RM  node sends RM Link Down messages and informs the other nodes that its secondary port  begins forwarding the traffic     Fig  8 30 shows an example of a ring protection after a link failure     Node A Node B           RM Link Down          RM Link Down                   Node C RM Node    Sends RM Link Down Ack to both  ports and unblocks secondary port     Fig  8 30 Ring Protection    291    CLI    292    Management Guide  TigerAccess    EE    If Node A and Node B detect the link failure being recovered  they send Link Up message  to RM node  But these nodes keep the blocking status of the link recovered ports     Fig  8 31 shows an example of a Link Failure Recovery operation     2  Nodes adjacent to old failure  send Link Up message to RM node                            Node A Node B       Node C RM Node    Fig  8 31 Link Failure Recovery    After RM node receives Link Up message  it blocks its own secondary port  RM n
21.    CLI    IP Lease Time    To specify IP lease time that is requested to a DHCP server  use the following command         eene ee    Specifies IP lease time in the unit of  Interface second  default  3600      no ip dhcp client lease time Deletes a specified IP lease time     ip dhcp client lease time  lt 120 2147483637 gt     Requesting Option    To configure a DHCP client to request an option from a DHCP server  use the following  command        ip dhcp client request  domain   Interface Configures a DHCP client to request a specified option   name   dns     To configure a DHCP client not to request an option  use the following command      e e ee       no ip dhcp client request ee Configures a DHCP client not to request a specified  nterface   domain name   dns  option     Forcing Release or Renewal of DHCP Lease    The switch supports two independent operation  immediate release a DHCP lease for a  DHCP client and force DHCP renewal of a lease for a DHCP client     To force a release or renewal of a DHCP release for a DHCP client  use the following  command      ze e Se      release dhcp INTERFACE     release dhcp INTERFACE   INTERFACE Forces a release of a DHCP lease   Enable  renew dhcp INTERFACE Forces a renewal of a DHCP lease     Displaying DHCP Client Configuration       To display a DHCP client configuration  use the following command      e e en    Enable    show ip dhcp client INTERFACE Global Shows a configuration of DHCP client   Interface       335    CLI    3
22.    COMMAND   all   privilege dhcp pool class level   lt 0 15 gt   COMMAND   all   privilege dhcp option82 level   lt 0 15 gt   COMMAND   all     privilege dhcp class level   lt 0 15 gt   COMMAND   all     Global    Uses the specific command of Privileged EXEC View  mode in the level     Uses the specific command of Privileged EXEC Enable  mode in the level     Uses the specific command of Global Configuration  mode in the level     Uses the specific command of  nterface Configuration  mode in the level     Uses the specific command of Rule Configuration  mode in the level     Uses the specific command of Bridge Configuration  mode in the level     Uses the specific command of RMON Configuration  mode in the level     Uses the specific command of DHCP Pool Configura     tion mode in the level     Uses the specific command of DHCP Pool Class Con   figuration mode in the level     Uses the specific command of DHCP Option 82 Con   figuration mode in the level     Uses the specific command of DHCP Class Configura     tion mode in the level        The commands that are used in low level can be also used in the higher level  For exam   ple  the command in level O can be used in from level 0 to level 14     The commands should be input same as the displayed commands by show list  There   fore  it is not possible to input the commands in the bracket separately     SWITCH  show list  clear arp  clear arp IFNAME  clear cpe stat error  PORTS    clear ip arp inspection statistics  vlan VL
23.    DST MAC   ADDR   DST MAC ADDRIM   any        mac da not found    Management Guide  TigerAccess    EE    To specify a packet classifying pattern with source destination IP address or MAC ad   dress  use the following command      e e re    Classifies an IP address    A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 255  IP protocol number    Classifies an IP protocol  ICMP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address    Classifies an IP protocol  ICMP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 255  ICMP message type number   0 255  ICMP message code number    Classifies an IP protocol  TCP UDP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address    Classifies an IP protocol  TCP UDP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 65535  TCP UDP source destination port range  any  any TCP UDP source destination port    Classifies an IP protocol  TCP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 65535  TCP source destination port range   any 
24.    EE    Tech Support Information    For various reason  a system error may occur  Once the system error occurs  system  engineers try to examine the internal system information such as a system configuration   log data  memory dump  and so on to solve the problem     To reduce the effort to acquire the detail informtation of the system for a technical  suppport  the switch provides the function that generates all the system information  reflecting the current state  Using this function  you can verify all the details on a console  screen or even in the remote place via FTP TFTP     To generate the tech support information  use the following command      e e Se    tech support  all   crash info  Generates the tech support information on a console    console screen     i Generates the tech support information in the remote  tech support  all   crash info     place via FTP or TFTP  The name of the generated  remote A B C D  ftp   tftp        information file is a info   This is not changeable      In case of generating the tech support information on a console screen  the contents will  be displayed without the screen pause regardless of your terminal configuration     System Boot Information    To display the information of the last system boot  use the following command     omar e ets       show boot info Enable Global Bridge   Shows the information of the last system boot     The following is the sample output of the show boot info command after turn on with the  power switc
25.    Sample Configuration 5  Configuring Shared VLAN with FID    Configure br2  br3  br4 in the switch configured Layer 2 environment and port 24 as Up   link port is configured  To transmit untagged packet through Uplink port rightly  follow be   low configuration     Outer Network                      default                         SWITCH  bridge  SWITCH  bridge    vlan add br3 24 untagged  vlan add br4 24 untagged    SWITCH  bridge    vlan create br2  SWITCH  bridge    vlan create br3  SWITCH  bridge    vlan create br4  SWITCH  bridge    vlan del default 3 8  SWITCH  bridge    vlan add br2 3 4 untagged  SWITCH  bridge    vlan add br3 5 6 untagged  SWITCH  bridge    vlan add br4 7 8 untagged  SWITCH  bridge    vlan add br2 24 untagged                           SMC7824M VSW 249    CLI Management Guide  TigerAccess    EE         vlan create br5   SWITCH  bridge    vlan add br5 1 42 untagged       vlan fid 1 5 5           show vlan             u  untagged port  t  tagged port    Name  VID  FID   123456789012345678901234567890123    default   Ti  5  RS EEN WUUMUUUEU A  DEZA 2 5    lte eege A E EE E EE  br 3  3 5   34 OC e EE  br4   4 Sch Haken hans hts E ER NR ee e a Ee Ee ee  Best 5 5  uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu          SWITCH  bridge       250 SMC7824M VSW    Management Guide  TigerAccess    EE    8 2    8 2 1    8 2 1 1    SMC7824M VSW    CLI    Link Aggregation    Link aggregation complying with IEEE 802 3ad bundles several physical ports together to  one logical po
26.    The following is an example to change the name of CPE file into single file name after ex   iting from FTP     i   Input the port number connected to CPE which is supposed to install system image     Step 4  Install the system image file to the CPE        a A the system image file of CPE  which is con   cpe nos download PORTS Bridge  nected through a port     Step 5    To set the active OS of the CPE system  use the following command   mana    on    cpe nos active PORTS  os1    2  Bridge Sets the default OS of the system   os    To display the version of CPE system image and active OS  use the following command      e ma See    Enable Shows the version and active software image of CPE        show cpe version  PORTS  Global which is connected with a port   Bridge PORT  VDSL port number       Step 6  Reboot the CPE in which new system image file is installed     5 3 5 3 Installing CPE System Image File in Slave    With staking configured in this switch  you can install system image file in Slave after new  system image file of CPE is saved in Master RAM     To install CPE system image file in Slave  Perform the below steps     Step 1  Connect to Slave from Master     SWITCH  bridge    rcommand 2  Tey Wie  Lets load e  Connected to 127 1 0 2     Escape character is        SWITCH login  root    Password   SWITCH     104 SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Step 2  Connect to FTP of Master to bring new system image file of CPE stored in 
27.    To specify a packet classifying pattern  use the following command      e me ees    ip  A B C D   A B C D M   any    A B C D   A B C D M   any   0   255     ip  A B C D   A B C D M   any      A B C D   A B C D M   any  icmp    ip  4 B C D   A B C D M   any    A B C D   A B C D M   any  icmp    lt 0 255 gt    any    lt 0 255 gt    any     ip  4 B C D   A B C D M   any    A B C D   A B C D M   any   tcp      udp     ip  4 B C D   A B C D M   any    A B C D   A B C D M   any   tcp    udp    lt 0 65535 gt    any    lt 0   65535 gt    any     ip  4 B C D   A B C D M   any    A B C D   A B C D M   any  tcp    lt 0 65535 gt    any    lt 0 65535 gt     any   TCP FLAG   any     Admin Flow    Classifies an IP address    A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 255  IP protocol number    Classifies an IP protocol  ICMP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address    Classifies an IP protocol  ICMP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 255  ICMP message type number       0 255  ICMP message code number    Classifies an IP protocol  TCP UDP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address    Classifies an IP protocol 
28.    When there is any problem in the system  you must find what the problem is and its solu   tion  Therefore you should not only be aware of a status of the system but also verify if  the system is correctly configured     This section describes the following functions with CLI command     e     Network Connection   e IP ICMP Source Routing   e Tracing Packet Route   e Displaying User Connecting to System  e MAC Table   e Running Time of System   e System Information   e System Memory Information  e Running Process   e Displaying System Image   e Displaying Installed OS   e Default OS   e Switch Status   e Tech Support Information   e System Boot Information    Network Connection    To verify if your system is correctly connected to the network  use the ping command  For  IP network  this command transmits a message to internet control message protocol   ICMP   ICMP is an internet protocol that notifies fault situation and provides information  on the location where IP packet is received  When the ICMP echo message is received at  the location  its replying message is returned to the place where it came from     To perform a ping test to verify network status  use the following command      e e re    ping  A B C D  Performs a ping test to verify network status     The followings are the available options to perform the ping command     ml Premier  Protocol  ip  Supports ping test  The default is IP        Sends ICMP echo message by inputting IP address or host name of  Target
29.    are  optional     A choice of required keywords appears in braces      You must se          lect one     e een oncom    Optional variables are separated by vertical bars          Tab  1 2 Command Notation of Guide Book    SMC7824M VSW    Management Guide  TigerAccess    EE    1 5    A    1 6    SMC7824M VSW    CLI    Virus Protection    To prevent a virus infection you may not use any software other than that which is re   leased for the Operating System  OS based on Basis Access Integrator   Local Craft  Terminal  LCT  and transmission system     Even when exchanging data via network or external data media e g  floppy disks  there is  a possibility of infecting your system with a virus  The occurrence of a virus in your sys   tem may lead to a loss of data and breakdown of functionality     The operator is responsible for protecting against viruses  and for carrying out repair pro   cedures when the system is infected     You have to do the following    e You have to check every data media  used data media as well as new ones  for virus  before reading data from it    e You must ensure that a current valid virus scanning program is always available  This  program has to be supplied with regular updates by a certified software    e Itis recommended that you make periodic checks against viruses in your OS    e At the LCT it is recommended to integrate the virus scanning program into the startup  sequence     CE Declaration of Conformity    The CE declaration of the product 
30.   By default  it is disabled  The BPDU filter enabled port acts as if STP is disabled on the  port  This feature can be used for the ports that are usually connected to an end system  or the port that you don t want to receive and send unwanted BPDU packets  Be cautious  about using this feature on STP enabled uplink or trunk port  If the port is removed from  VLAN membership  correspond BPDU filter will be automatically deleted     To enable or disable the BPDU filtering function on the edge port  use the following com   mand      ee e rs    spanning tree edgeport bpdufil  Enables a BPDU filtering function by default on all  ter default edge ports   Bridge       no spanning tree  edgeport Disables a BPDU filtering function by default on all  bpdufilter default edge ports     BPDU Guard    BPDU guard has been designed to allow network designers to enforce the STP domain  borders and keep the active topology predictable  The devices behind the ports with STP  enabled are not allowed to influence the STP topology  This is achieved by disabling the  port upon receipt of BPDU  This feature prevents Denial of Service  DoS  attack on the  network by permanent STP recalculation  That is caused by the temporary introduction  and subsequent removal of STP devices with low  zero  bridge priority     To configure BPDU guard in the switch  perform the following procedure     Step 1  Configure the specific port as edge port      e e Se    spanning tree port PORTS  Bridge Configures the po
31.   CLI    142    7 1 8 5    Management Guide  TigerAccess    EE    an  ee    no snmp trap temp threshold   Global Disables each SNMP trap   no snmp trap dhcp lease  no snmp trap fan    no snmp trap module      no snmp trap pps control   snmp trap pps control        Displaying SNMP Trap       To display the configuration of the SNMP trap  use the following command     show snmp trap Enable Shows the configuration of SNMP trap        Global  show snmp alarm report Bridge Shows a collected alarm report based trap     The following is an example of configuring the trap v1 host  trap v2 host and inform trap  host     SWITCH  config    snmp trap host 10 1 1 1   SWITCH  config    snmp trap2 host 20 1 1 1  SWITCH  config    snmp inform trap host 30 1 1 1  SWITCH  config    show snmp trap             snmp trap mode  event    Type Host Community    inform trap host 30 1 1 1    trap2 host 2 al  trap host ERC E  Trap  List   Trap type Status  auth fail enable  cold start enable    cpu threshold enable  port threshold enable    dhcp lease enable  power enable  module enable  fan enable    temp threshold enable       mem threshold enable    SWITCH  config       SMC7824M VSW    Management Guide  TigerAccess    EE    7 1 9    7 1 9 1    7 1 9 2     gt  P    SMC7824M VSW    CLI    SNMP Alarm    The switch provides an alarm notification function  The alarm will be sent to a SNMP trap  host whenever a specific event in the system occurs through CLI  You can also set the  alarm severity on each a
32.   Enabl  ane packet type     Global    statistics total Bridge    show cpu Shows the traffic statistics of the average packet han     dled by CPU      PORTS     To delete the collected statistics of the traffic handled by CPU  use the following com   mand      e e retos    Description       Global Deletes the collected statistics of the traffic handled by  clear cpu statistics  PORTS  EN  ridge    The following is the sample output of the show cpu statistics total command with the  Ethernet port 25     SWITCH  config    show cpu statistics total 25                Port   Tx Rx   Time   pkts   bytes   bits   pkts   bytes   bits  POTG  eege ee ee ee Ge ee SS ee SS SS   Ucast  43 3074 24592 0 0 0   Mcast  348025 2088 167052000 0 0 0   Beast  0 0 0 1349 80940 647520    SWITCH  config       The switch can be configured to generate a syslog message when the number of the  packets handled by CPU exceeds a specified value  This function allows system adminis   trators to monitor the switch and network status more effectively     To configure the switch to generate a syslog message according to the number of the  packets handled by CPU  use the following command      e e re    Generates a syslog message according to the speci     ENER fied number of the packets handled by CPU  This is  cpu statistics limit  unicast      multicast   broadcast  PORTS   lt 10 100 gt     configurable for each packet type and physical port     Global      unicast   multicast   broadcast  packet type    PORT
33.   For the enhanced system security  the switch provides two authentication methods to ac   cess the switch such as Remote Authentication Dial In User Service  RADIUS  and Ter   minal Access Controller Access Control System Plus  TACACS       Authentication Method    To set the system authentication method  use the following command      e e Se    Sets a system authentication method   local  console access    login  local   remote   radius   remote  telnet SSH access    tacacs   host   all   enable   dis  radius  RADIUS authentication  able  tacacs  TACACS  authentication    Global host  nominal system authentication  default     all  all types of the authentication    no login  local   remote   radius      tacacs   host   all  Deletes a configured system authentication method     Authentication Interface       If more than 2 interfaces exist in the switch  you can set one interface to access RADIUS  or TACACS server  To set an authentication interface  use the following command      e e Se    Sets an authentication interface   radius  RADIUS authentication  tacacs  TACACS  authentication  Global INTERFACE  interface name  A B C D  source IP address  optional     no login  radius    tacacsj D ns  i Deletes a specified authentication interface   interface    Primary Authentication Method    login  radius   tacacs  interface  INTERFACE  A B C D        You can set the order of the authentication method by giving the priority to each authenti   cation method  To set the primary au
34.   Global A B C D  IP address  1 5  priority of TACACS server    login tacacs server move  A B C D  lt 1 5 gt        Timeout of Authentication Request    After the authentication request  the switch waits for the response from the TACACS   server for specified time  To specify a timeout value  use the following command      e me See         i Specifies a timeout value   login tacacs timeout  lt 1 100 gt  l  Global 1 100  timeout value for the response  default  5     no login tacacs timeout Deletes a specified timeout value     Additional TACACS  Configuration    The switch provides several additional options to configure the system authentication via  TACACS  server     TCP Port for the Authentication    To specify TCP port for the system authentication  use the following command      e e Se    login tacacs socket port Specifies TCP port for the authentication    lt 1 65535 gt  Global 1 65535  TCP port    no login tacacs socket port Deleted the configured TCP port for the authentication       49    CLI    90    4 2 6    4 2 7    Management Guide  TigerAccess    EE    Authentication Type    To select the authentication type for TACACS   use the following command      ee ee    Selects an authentication type for TACACS      login tacacs auth type  ascii   ascii  plain text    pap   chap  pap  password authentication protocol  chap  challenge handshake authentication protocol    no login tacacs auth type Deletes a specified authentication type        Priority Level    According t
35.   Host A and Host B can use Host C s MAC address as the destination  MAC address for traffic intended for Host A and Host B     ARP Inspection is a security feature that validates ARP packets in a network  It discards  ARP packets with invalid IP MAC address binding     To activate deactivate the ARP inspection function in the system  use the following com   mand      e e re    f     Activates ARP inspection on a specified VLAN   ip arp inspection vlan VLANS  Global VLANS  VLAN ID  1 4094     no ip arp inspection vlan VLANS Deactivates ARP inspection on a specified VLAN        ARP Access List    You can exclude a given range of IP addresses from the ARP inspection using ARP ac   cess lists  ARP access lists are created by the arp access list command on the Global  Configuration mode  ARP access list permits or denies the ARP packets of a given range  of IP addresses     215    CLI    216       Management Guide  TigerAccess    EE    To create delete ARP access list  ACL   use the following command      e e Se    Opens ARP ACL configuration mode and creates an    arp access list NAME ARP access list   Globa    NAME  ARP access list name    no arp access list NAME Deletes an ARP access list        After opening ARP Access List Configuration mode  the prompt changes from  SWITCH config   to SWITCH config arp acl NAME     After opening ARP ACL Configu   ration mode  a range of IP addresses can be configured to apply ARP inspection     By default  ARP Access List discards the ARP p
36.   RSTP  is  also provided  IEEE 802 1w defines the recovery time as 2 seconds  If there is only one    23    CLI    24    Management Guide  TigerAccess    EE    VLAN in the network  traditional STP works  However in more than one VLAN network   STP cannot work per VLAN  To avoid this problem  the switch supports multiple spanning  tree protocol  MSTP  IEEE 802 1s     Trunking  amp  Link Aggregation Control Protocol  LACP     The switch aggregates several physical interfaces into one logical port  aggregate port    Port trunk aggregates interfaces with the standard of same speed  same duplex mode   and same VLAN ID     The switch supports link aggregation control protocol  LACP   complying with IEEE  802 3ad  which aggregates multiple links of equipments to use more enlarged bandwidth     System Management based on CLI    It is easy for users who administer system by using telnet or console port to configure the  functions for system operating through CLI  CLI is easy to configure the needed functions  after looking for available commands by help menu different with UNIX     Broadcast Storm Control    Broadcast storm control is  when too much of broadcast packets are being transmitted to  network  a situation of network timeout because the packets occupy most of transmit ca   pacity  switch supports broadcast and multicast storm control  which disuses flooding  packet  that exceed the limit during the time configured by user     Outband Management Interface    The switch can c
37.   SACO  ERP Shared ls cet aras 293  944  Configuring ERP Doma sr 294   CAA  ERP DOMAIN NaMe ir eins 294  8 4 4 2 Primary and Secondary Port    294  GAO  Protected LAN  cales 294  8444   CONTO NV LAIN cialis 295    12 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    9445 JERP RNO PON ee dee Ee Eed 295  8 4 4 6     Displaying ERP DOM Mind See tia eg 295  8 4 5 Selecting the Node sai 296  8 4 6 Protected GEO  dia 296  8 4 7 Manual Switch to Secondary    cooccccccocccnccnoccnnononcnnonnncnnonancnnnnnnnnnconanennonanens 296  8 4 8 Wait to Restore Time           ccconccconccocncconnoconnoconccnanononconnnonannonannnnnnnonanenanonos 297  8 4 9 Learning Disable TING ui ENEE eege 297  9 4 10 Test Packet inte vaa vilesdeae a 298  SAT IN E ERR 8 ee e OM TIME EE 298  Ss ER  0  gt      PP ida 299  8 4 13 Displaying ERP Contguraton     299  G9  A A E 300  8 6 Dynamic Host Configuration Protocol  ODHCHR       ees 302  9 0 1 DACP SENET ario dd ii de 303  86l A wlio ee ne ah NA oc ea 304  EE DHCP SUUDME EE 304  90 3 RATE O e ee 304  8614     Delaull Gateway caidas ii 305  E Ee  IP Lease TIM td 305  0 0 1 0  DNS SQRVCR ee E Ee 306  SO  gt    Manta BM ueno ri a o is 306  6 05150  DOMAIN INGIIG cua aaa aaa 307  8 6 1 9 DHCP Server Option visir A ai ii 307  86 110  Statie Mappl dais o Aner e dental ON eta ia 307  8 6 1 11 Recognition of DHCP Client         ooonccccooncnccccccncccncnnononnncnnnnononnnnnnnnnnnnnnnnnnnnnnos 308  8 0  M12     IP AQUaress e le EE 308  EE tee RE 309  8 6 1 14
38.   SWITCH  config   service dhcp  SWITCH  config   ip dhcp pool sample  SWITCH  config dhcp sample         DHCP Subnet    To specify a subnet of the DHCP pool  use the following command      e Se       Specifies a subnet of the DHCP pool   network A B C D M  DHCP Pool   A B C D M  network address    no network A B C D M Deletes a specified subnet        The following is an example of specifying the subnet as 100 1 1 0 24     SWITCH  config    service dhcp   SWITCH  config    ip dhcp pool sample   SWITCH  config dhcp sample    network 100 1 1 0 24       SWITCH  config dhcp sample                  You can also specify several subnets in a single DHCP pool     Range of IP Address    To specify a range of IP addresses that will be assigned to DHCP clients  use the follow   ing command      e e re    Specifies a range of IP addresses   range A B C DA B C D  DHCP Pool   A B C D  start end IP address    no range A B C D A B C D Deletes a specified range of IP addresses        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    The following is an example for specifying the range of IP addresses     SWITCH  config    service dhcp   SWITCH  config    ip dhcp pool sample   SWITCH  config dhcp sample    network 100 1 1 0 24   SWITCH  config dhcp  sam   default router 100 1 1 254    range 100 1 1 1 100 1 1 100       le                                p    SWITCH  config dhcp sample    p      SWITCH  config dhcp sample     D You can also specify several inconsecutive ranges of IP add
39.   To display a status of the DHCP server packet filtering  use the following command      e e en    Enable  show dhcp server filter Global Show a status of the DHCP server packet filtering   Bridge       8 6 11 Debugging DHCP    To enable disable a DHCP debugging  use the eS command     debug dhcp  ffilter lease  Enables a DHCP debugging   packet   service   all   Enable    no debug dhcp poderte     lease      Disables a Disabiesa DHCP denn  Data DHCP denn   packet a   service   all        SMC7824M VSW 337    CLI    338    8 7    8 7 1    Management Guide  TigerAccess    EE    Single IP Management    It is possible to manage several switches with one IP address by using stacking  If there  is a limitation for using IP addresses and there are too many switches  which you must  manage  you can manage a number of switches with one IP address using this stacking  function     It is named One IP Management because you can easily manage various switches and  subscribers connected to the switch with this stacking function  The switch provides the  function     The following is an example of the network where stacking is configured     Switch E on    e     gt     Switch Switch                                       Master Switch        SSES   Manage with the same  IP address  Slave Switch     lt      Switch B    Slave Switch    Switch C    Fig  8 38 Example of Single IP management    A switch  which is supposed to manage the other switches in stacking is named as Mas   ter switch and 
40.   ee e See       erp domain DOMAIN ID trap  lotp   ulotp   mul  Enables the system to send ERP Trap  Se Bridge  tiple rm   rmnode reachability  message in case of the event   To disable the system to generate ERP trap message  use the following command     mane tome reten       no erp domain DOMAIN ID trap  lotp   ulotp   Brid Disables the system to generate ERP  ridge  multiple rm   rmnode reachability  S trap    The following options hold the configuration of the ability to transmit LOTP  ULOTP  Multi    ple RM or RMNode reachability Traps         lotp  Enables disables an RM node to transmit the LOTP traps        ulotp  Enables disables an RM node to transmit the ULOTP  Undirectional Loss Of  Test Packets  traps        multiple rm  Enables disables an RM node to transmit the trap in case of Multiple  RM nodes        rmnode reachability  Enables disables a normal node to transmit RMnode  Reachablility traps     Displaying ERP Configuration    To display a configuration of ERP  use the following command     na m   O    show erp  domain  lt 1 64 gt   Enable    Shows the information of ERP  Global l  show erp state   1 64  domain ID  Bridge       299    CLI Management Guide  TigerAccess    EE    8 5 Loop Detection    The loop may occur when double paths are used for the link redundancy between  switches and one sends unknown unicast or multicast packet that causes endless packet  floating on the LAN like loop topology  That superfluous traffic eventually can result in  network
41.   ip dhcp check client hardware   Prohibits assigning plural IP addresses   address  Global    ip fe o check client    Pei assino pate assigning  Pei assino pate IP addresses   fe o       Ignoring BOOTP Request    To allow a DHCP server to ignore received bootstrap protocol  BOOTP  request packets   use the following command     O eoma ra pon  ip dhcp bootp ignore S Ignores BOOTP request packets    lobal  no ip dhcp bootp ignore Permits BOOTP request packets     DHCP Packet Statistics       To display DHCP packet statistics of the DHCP server  use the following command     mana To  en  show ip dhcp server statistics Enable Shows DHCP packet statistics        Global  clear ip dhcp statistics Bridge Deletes collected DHCP packet statistics     The following is an example of displaying DHCP packet statistics     SWITCH  config    show ip dhcp server statistics          Message Recieved Error  0 0   DHCP    DISCOVER 0  DHCP REQUEST 0  DHCP DECLINE 0  DHCP RELEASE 0  DHCP INFORM 0          Message Sent Error 0 0   DHCP OFFER 0  DHCP ACK 0  DHCP NAK 0    SWITCH  config       SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 1 17    8 6 1 18    8 6 2    SMC7824M VSW    CLI    Setting DHCP Pool Size    To limit a size of DHCP pool  use the following command      ee es ee       ip dhcp max pool size  lt 1 8 gt  Global Configures a maximum size of DHCP pool     Displaying DHCP Pool Configuration    To display a DHCP pool configuration  use the following command     na e See   
42.   no system circuit    no system circuit id port type physical   port type   no system circuit id port type physical      8 6 6 3 Option 82 Reforwarding Policy    A DHCP relay agent may receive a DHCP packet from a DHCP server or another DHCP  relay agent that already contains relay information  You can specify a DHCP option 82 re   forwarding policy to be suitable for the network     To specify a DHCP option 82 reforwarding policy  use the following command      e a ee       Specifies a DHCP option 82 reforwarding policy   replace  replaces an existing DHCP option 82 informa   tion with a new one    keep  keeps an existing DHCP option 82 information  policy drop  normal   option82     Option 82  default   none  normal  DHCP packet  option82  DHCP option 82 packet    none  no DHCP packet  default     322 SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 6 4    8 6 7    SMC7824M VSW    CLI    Option 82 Trust Policy  Default Trust Policy    To specify the default trust policy for DHCP packets  use the following command      e e See       trust default  deny   permit  Option 82 Specifies the default trust policy fora DHCP packet     If you specify the default trust policy as deny  the DHCP packet that carries the informa   tion you specifies below will be permitted  and vice versa     Trusted Remote ID    To specify a trusted remote ID  use the following command     Command Mode Description    trust remote id hex HEXSTRING    trust remote id ip A B C D Option 82 Specifi
43.   show spanning tree mst  lt 1 64 gt   active  detail     show spanning tree mst  lt 1 64 gt   blockedport    show spanning tree mst  lt 1 64 gt   detail  active     show spanning tree mst  lt 1 64 gt     inconsistentports    show spanning tree mst  lt 1 64 gt   bridge    address   detail   for     ward time   hello time   id   max     age   protocol   priority  system   id        show spanning tree mst  lt 1 64 gt     root     address   cost   detail    forward time   hello time   id    max age   port   priority  system   id       show spanning tree mst  lt 1 64 gt   port PORTS H active  detail     cost   detail  active    edgeport    inconsistency   rootcost   state    priority H   show spanning tree mst con   figuration  digest    show spanning tree mst  lt 1 64 gt   summary  totals     Enable  Global  Bridge    Shows all configurations of a specific MSTP instance   1 64  MSTP instance ID number    Shows information of a specific MSTP instance on  active interface    1 64  MSTP instance ID number    detail  detailed MSTP information  as option      Shows information of the blocked ports    Shows detailed information of the specific MSTP in   stance   1 64  MSTP instance ID number     Shows information of root inconsistency state   1 64  MSTP instance ID number     Shows information of the bridge status and configura   tion of a specific MSTP instance  1 64  MSTP instance ID number     Shows the status and configuration for the root bridge  of a specifiec MSTP instance   1 
44.   use the eo command     ip arp inspection trust port EE  a trust state on a port as trusted  PORTS PORTS  port number  Global    no ip arp ee trust port  ee    Sets a trust state ona ae   as untrusted  PORTS  ae   number       To display a configured trust port of the ARP inspection  use the following command      e e Se    Enable    show ip arp inspection trust  Global Shows a configured trust port of the ARP inspection     ort PORTS  Ip Bridge       ARP Inspection Log buffer    Log buffer function shows the list of subscribers who have been used invalid fixed IP ad   dresses  This function saves the information of users who are discarded by ARP inspec   tion and generates periodic syslog messages     Log buffer function is automatically enabled with ARP inspection  If this switch receives  invalid or denied ARP packets by ARP inspection  it creates the table of entries that in   clude the information of port number  VLAN ID  source IP address  source MAC address  and time  In addition  you can specify the maximum number of entries     After one of entries is displayed as a syslog message  it is removed in the order in which  the entries appear in the list     To configure the options of log buffer function  use the following command   ee Tea  ip arp inspection log buffer Specifies the number of entries in log buffer   entries  lt 0 1024 gt  0 1024  the max  number of entries  default  32   Global entries     Sets the interval for displaying syslog messages of  ip arp inspe
45.   y   Source address or interface  172 16 157 100  Type of service  0   0   Set DF bit in 1P header   no   no   Data pattern  OxABCD     PATTERN  Oxabcd   PING 172 16 1 254  172 16 1 254  from 172 16 157 100   100 128   108 bytes from 172 16 1 254  icmp seq 1 ttl 255 time 30 4 ms  108 bytes from 172 16 1 254  icmp seq 2 ttl 255 time 11 9 ms  108 bytes from 172 16 1 254  icmp seq 3 ttl 255 time 21 9  108 bytes from 172 16 1 254  icmp seq 4 ttl 255 time 11 9 ms  108 bytes from 172 16 1 254  icmp seq 5 ttl 255 time 30 1                                                                    172  16 1 254 pind statistics           5 packets transmitted  5 received  0  packet loss  time 8050ms  rtt min avg max mdev   11 972 21 301 30 411 8 200 ms  SWITCH     IP ICMP Source Routing    C        Request    The route for general PING test    PC    Fig  6 1 Ping Test for Network Status    The following is to verify network status between 172 16 157 100 and 172 16 1 254 when  IP address of the switch is configured as 172 16 157 100     bytes of data     If you implement PING test to verify the status of network connection  ICMP request ar   rives at the final destination as the closest route according to the routing theory     SMC7824M VSW    Management Guide  TigerAccess    EE    6 3 3    SMC7824M VSW    CLI    In the above figure  if you perform ping test from PC to C  it goes through the route of  ABC   This is the general case  But  the switch can enable to perform ping test  from PC as 
46.  3   admin 2 0 0 0 0 0 O   S Feb23 0 00  keventd   admin 3 040 0 0 0 0O   SN Feb23 0 00  ksoftirqd CPug   admin 4 0 0 0 0 0 0   S Feb23 0 00  kswapd   admin 5 0 0 0 0 0 O   S Feb23 0 00  bdflush   admin 6 0 0 0 0 0 0   Feb23 0 00  kupdated   admin 7 0 0 0 0 0 0 2   gt  Feb23 0 00  mtdblockd   admin 8 0 0 0 0 0 O   S lt  Feb23 0 00  bcmDPC   admin 9 0 0 0 0 0 O   S lt  Feb23 0 29  bcmCNTR O   admin 16 0 0 0 0 0 U 2 SN Feb23 0 00  jffs2 gcd medo   admin 81 0 0 Sech 10524 5492   S Feb23 0 53  usr sbin swchd  admin 83 0 0 1 5 6756 3756   S Feb23 0 53  usr sbin nsm   Omitted   SWITCH    FTP Server    FTP server is enabled on this switch by default  But this configuration can t provide the  security serveice becaue it   s easy to access to the port of  23 by others  If the default    117    CLI    118    6 1 12    6 1 13    6 1 13 1    Management Guide  TigerAccess    EE    configuration is unnecessary on sysem  user can disable the system as FTP server     To enable disable the system of this switch as FTP server  use the following command     a ee         Enables disables the FTP server on the system   ftp server  enable   disable  Global   default  enable     If the FTP server is disabled  the system software upgrade cannot be done via FTP server     FTP Client address    You can specify several IP addresses to this switch  However  you can also specify one  IP address when this switch has access to FTP server as a client    To assign source IP address that uses when this switch
47.  3 Link Layer Discovery Protocol  LLDP     7 3 1    7 3 2    Link Layer Discovery Protocol  LLDP  is the function of transmitting data for network  management for the switches connected in LAN according to IEEE 802 1ab standard     LLDP Operation    The switch supporting LLDP transmits the management information between near  switches  The information carries the management information that can recognize the  network elements and the function  This information is saved in internal Management In   formation Base  MIB      When LLDP starts to operate  the switches send their information to near switches  If  there is some change in local status  it sends their changed information to near switch to  inform their status  For example  if the port status is disabled  it informs that the port is  disabled to near switches  And the switch that receives the information from near  switches processes LLDP frame and saves the information of the other switches  The in   formation received from other switches is aged     Enabling LLDP    To enable LLDP  use the following command   II   e O    Enables LLDP function on a port   Ildp PORTS mgmtaddr A B C D    A B C D  IP address that is given to LLDP packet  Bridge       no lldp PORTS mgmtaddr l i  Disables LLDP function   A B C D    SMC7824M VSW    Management Guide  TigerAccess    EE    7 3 3    7 3 4    7 3 5    D    SMC7824M VSW    CLI    LLDP Operation Type    If you activated LLDP on a port  configure LLDP operation type     Each LLDP op
48.  381    CLI    382    IRL  ISP  ITU  ITU T    L2  LACP  LAN  LCT  LLDP  LLID  MAC  McFDB  MFC  MTU  MVR  NE  NTP  OAM  ORL  OS  PC  PVID  Qos  QRV  RFC  RMON  RSTP  RTC  SA  SFP  SNMP    Management Guide  TigerAccess    EE    Input Rate Limiter  Internet Service Provider  International Telecommunication Union    International Telecommunication Union    Telecommunications standardization sector    Interface Unit   Layer 2   Link Aggregation Control Protocol  Local Area Network   Local Craft Terminal   Link Layer Discover Protocol  Logical Link ID   Medium Access Control  Multicast Forwarding Database  Multicast Forwarding Cache  Maximum Transmission Unit  Multicast VLAN Registration  Network Element   Network Time Protocol  Operation  Administration and Maintenance  Output Rate Limiter   Operating System   Personal Computer   Port VLAN ID   Quality of Service   Querier   s Robustness Variable  Request for Comments  Remote Monitoring   Rapid Spanning Tree Protocol  Real Time Clock   Source Address   Small Form Factor Pluggable    Simple Network Management Protocol    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    SNTP  SSH  STP  SW  TCN  TCP  TFTP  TIB  TOS  UDP  UMN  VID  VLAN  VoD  VPI  VPN  xDSL    CLI    Simple Network Time Protocol  Secure Shell   Spanning Tree Protocol  Software   Topology Change Notification  Transmission Control Protocol  Trivial FTP   Tree Information Base   Type of Service   User Datagram Protocol   User Manual   VLAN ID   Virt
49.  5 32768 gt  e  unit is second   default  30   EISE k    Default for sending LLDP message is 4 times in every 30 seconds     153    CLI    154    7 3 6    1 3 1    Management Guide  TigerAccess    EE    Reinitiating Delay    To configure the interval time of enabling LLDP frame after configuring LLDP operation  type  use the following command      e me ees    Configures the interval time of enabling LLDP frame    lldp reinitdelay  lt 1 10 gt  i from the time of configuring not to process LLDP  frame   default  2        To configure delay time of transmitting LLDP frame  use the following command   SCC      Configures delay time of transmitting LLDP frame   Ildp txdelay  lt 1 8192 gt  Bridge   default  2     Displaying LLDP Configuration       To display LLDP configuration  use the following command      e e een    show Ildp config  PORTS    Shows LLDP configuration    LLDP   Shows LLDP configuration       show lldp remote  PORTS  Show statistics for remote entries   show lldp statistics  PORTS    Shows LLDP operation and statistics     To delete an accumulated statistics on the port  use the following command     na e een    Enable  clear lldp statistics  PORTS  Global Deletes an accumulated statistics on the port        Bridge       The following is the sample output of the show Ildp config command     SWITCH  config   show lldp config 1 2    GLOBL    MsgTxInterval   30   MsgTxHold   4   gt  txTTL   120   ReInitDelay   2   TxDelay   2   PORTS active adminStat  mgmtAddress op
50.  8797 6288  Fax  65  6 238 6466   Fax 82 2 553 7202   Fax 81 45 224 2331   Fax 61 2 8875 7777   Fax 91 22 8204443    lf you are looking for further contact information  please visit www smc com  www smc   europe com  or www smc asia com        SMC    Networks    20 Mason  Irvine  CA 92618  Phone   949  679 8000       Networks    TECHNICAL SUPPORT  From U S A  and Canada  24 hours a day  7 days a week   Phn   800  SMC 4 YOU    949  679 8000  Fax   949  679 1481   English  Technical Support information available at www smc com    English For Asia Pacific   Technical Support information available at  www smc asia com    Deutsch  Technischer Support und weitere Information unter www smc com    Espanol  En www smc com Ud  podr   encontrar la informaci  n relativa a servicios  de soporte t  cnico    Francais  Informations Support Technique sur www smc com   Portugu  s  Informa    es sobre Suporte T  cnico em www smc com   Italiano  Le informazioni di supporto tecnico sono disponibili su www smc com  Svenska  Information om Teknisk Support finns tillg  ngligt p   www smc com  Nederlands  Technische ondersteuningsinformatie beschikbaar op www smc com  Polski  Informacje o wsparciu technicznym sa dostepne na www smc com     eStina  Technicka podpora je dostupna na www smc com   Magyar  M szaki tamogat informacio elerhet   on www smc com   BABAL  ARLA ai www smc pre come if    Si AS AMC  E anh IS EAR FH A E www smcnetworks com tw   222 mansamiayanmuina  a lai www smc asia com   SZ  TEN
51.  ADM OPR PBO  10 Custom  Level       1 Up Up SI St St Bei SEI  2 Up Up DA He 11  3 Up Down TE    Ohh E der  4 Up Down SCH dh bh el 11  5 Up Down Enable P S   A eet aoe e   Jil    SWITCH  bridge          If you control power according to VDSL line  it is applied to all ports     You cannot configure power consumption supplied to VDSL line with power control ac   cording to the distance of line enabled  In this case  the standard to decide power con   sumption is the distance     To configure power consumption supplied to VDSL line  use the following command      es Fee       Ire PORTS pbo length  11213 Ge Configures power consumption supplied to VDSL line  ridge  1415161718191 10  3 according to the distance   i   The default is    2        80 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    To configure the power back off length of each upstream band  use the following com   mand      e e rees    Ire PORTS band pbo length u0  LENGTH  u1 LENGTH     Ire PORTS band pbo length u0 Configures the power back off length per upstream    LENGTH ui LENGTH  u2 l band   LENGTH  LENGTH  distance from 100m to 900m  1 10     Ire PORTS band pbo length u0 u1 u4  U1 U4 band configuration    LENGTH ui LENGTH u2  LENGTH  u3 LENGTH        The following table shows distance of 1   9 in the above command  Each variable means  as the below        Tab 5 4 Value of PBO Length       You should control supplied power of VDSL port according to distance of VDSL line     The following is an exampl
52.  CLI Management Guide  TigerAccess    EE    To specify a remote ID  use the following command   om ee  system remote id hex HEXSTRING    system remote id ip A B C D  remote    system remote id ip A B C D ip A B C D Specifies a remote ID   Option 82      system remote id text STRING     remote    system remote id text STRING    text STRING  default  system MAC address       system remote id option format NAME    remote    system remote id option format NAME   option format NAME       To specify a circuit ID  use the following command     ICO E O  system circuit id PORT hex HEXSTRING    system circuit id PORT index  lt 0 65535 gt      system circuit id PORT index  lt 0 65535 gt    PORT index  lt 0 65535 gt    Specifies a circuit ID     system circuit id PORT text STRING      system circuit id PORT text STRING    PORT text STRING Option 82     default  port number   system circuit    system circuit id port type physical    port type   system circuit id port type physical         system circuit id PORT option format NAME     system circuit id PORT option format NAME   PORT option format NAME       To delete a specified remote and circuit ID  use the following command   ana een  no system remote id  no   no system remote id option format    remote    no system remote id option format   option format Deletes a specified remote and circuit  Option 82    no system circuit    no system circuit id PORT  option format    PORT   no system circuit id PORT  option format    format  ID     
53.  EE    Quality of Service QoS     The switch provides a rule and QoS feature for traffic management  The rule classifies in   coming traffic  and then processes the traffic according to user defined policies  You can  use the physical port  802 1p priority  CoS   VLAN ID  DSCP  and so on to classify incom   ing packets     You can configure the policy in order to change some data fields within a packet or to re   lay packets to a mirror monitor by a rule  QoS  Quality of Service  is one of useful func   tions to provide more reliable service for traffic flow control  It is very serviceable to pre   vent overloading and delaying or failing of sending traffic by giving priority to traffic     QoS can give priority to specific traffic by basically offering higher priority to the traffic or  lower priority to the others     When processing traffic  the traffic is usually supposed to be processed in time order like  first in  first out  This way  not processing specific traffic first  might cause undesired traffic  loss in case of traffic overloading  However  in case of overloading traffic  QOS can apply  processing order to traffic by reorganizing priorities according to its importance  By favor  of QoS  you can predict network performance in advance and manage bandwidth more  efficiently     The QoS provides the following benefits     Control over network resources    Bandwidth  delay and packet loss can be effectively controlled by QoS feature  The net   work administrator can
54.  EE EEE  HHH HH HEH HH EE EE EE HE HE EH HH EE EEE EEE HE EE EE EEE EE EE EEE  HTH HE HHT HEHE EE EE EE EH EE EE EH HE HE EEE EEE EE EE EH EE EE EEE EEE EEE EEE   HEH   done   Bytes transferred   13661822  d0767e hex     Update flash  Are you sure  y n   y    Erasing   0x01D00000   Ox0O1ID1IFFFF  Programming   0x01D00000   Ox01D1FFFE  Verifying   0x01D00000   Ox0O1ID1IFFFF    Boot gt  flashinfo  Flash Information  Bytes     Area OS size Default OS Standby 0S OS Version  osl 13661806 x e 5 01  3001  os2 13661412 4 07  1008  Boot gt     SMC7824M VSW    Management Guide  TigerAccess    EE    10 3    SMC7824M VSW    CLI    Step 4  Reboot the system with the new system software using the following command      e e Se       Reboots the system with specified system software   reboot  os1   os2  Boot l  os1   os2  the area where the system software is stored    If the new system software is a current standby OS  just exit the boot mode  then the in   terrupted system boot will be continued again with the new system software  To exit the  boot mode  use the following command      e e Se       FTP Upgrade    The system software of the switch can be upgraded using FTP  This will allow network or  system administrators to remotely upgrade the system with the familiar interface     To upgrade the system software using FTP  perform the following step by step instruction     Step 1  Connect to the switch with your FTP client software  To login the system  you can use the  system user ID and
55.  Environment  1     To transmit the untagged packet from uplink port to subscriber  a new VLAN should be  created including all subscriber ports and uplink ports  This makes the uplink ports to rec   ognize all other ports     FID helps this packet forwarding  FDB is MAC Address Table that recorded in CPU  FDB  table is made of FID  FDB Identification   Because the same FID is managed in the same  MAC table  it can recognize how to process packet forwarding  If the FID is not same  the  system cannot know the information from MAC table and floods the packets     Outer Network    4 SWITCH  bridge   show vlan  u  untagged port  t  tagged port      1 2 3 4   Name    123456789012345678901234567890123456789012  default    u    uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu  DEZA Wiese ir dey ech ca vets ein det sec ths Settee te Geer 8 K  EN   eh SECH E aa NT iaa ME ca   bra E O uk a ee  A ee Dowie AA   BES l SS SEENEN esca dsc esa go  bre     uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu                default br2                      SWITCH  bridge          Fig  8 7 Incoming Packets under Layer 2 Shared VLAN Environment  2     In conclusion  to use the switch as Layer 2 switch  user should add the uplink port to all  VLANs and create new VLAN including all ports  If the communication between each  VLAN is needed  FID should be same     SMC7824M VSW 245    CLI    246    8 1 11    8 1 12    Management Guide  TigerAccess    EE    To configure FID  use the following command      e e ees       
56.  IP address o l  destination in order to verify network status     Repeat count  5  Sends ICMP echo message as many as count  The default is 5        Datagram size  100  Ping packet size  The default is 100 bytes     Tab  6 2 Options for Ping    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    nn eee    It is considered as successful ping test if reply returns within the con     Timeout in seconds  2     figured time interval  The default is 2 seconds     Extended commands  n  Shows the additional commands  The default is no     Tab  6 2       Options for Ping  Cont      The following is an example of ping test 5 times to verify network status with IP address  172 16 1 254     SWITCH  ping  Protocol  ip   ip  Target IP address  172 16 1 254    Repeat count  b   5                                                             Datagram size  100   100   Timeout in seconds  2   2   Extended commands  n   n   PING 172 16 1 254  172 16 1 254  100 128  bytes of data   Warning  time of day goes back   394us   taking countermeasures   108 bytes from 172 16 1 254  icmp seq 1 ttl 255 time 0 058 ms  108 bytes from 172 16 1 254  icmp seq 2 ttl 255 time 0 400 ms  108 bytes from 172 16 1 254  icmp seq 3 tt1l 255 time 0 403 ms  108 bytes from 172 16 1 254  icmp seq 4 ttl 255 time 1 63 ms  108 bytes from 172 16 1 254  icmp seq 5 ttl 255 time 0 414 ms  ee E E o  ping  Statistics       5 packets transmitted  5 received  0  packet loss  time 8008ms       rtt min avg ma
57.  If you need to make many MAC filtering policies at a time  it is hard to input command  one by one  In this case  it is more convenient to save MAC filtering policies at     letc mfdb conf    and display the list of MAC filtering policy  To view the list of MAC filtering  policy at  etc mfdb conf  use the following command     n   See      mac filterlist   Bridge   Shows the list of MAC filtering policy at  etc mfdb conf        SMC7824M VSW    Management Guide  TigerAccess    EE    7 12    7 12 1    7 12 1 1    SMC7824M VSW    CLI    Address Resolution Protocol  ARP     Devices connected to IP network have two addresses  LAN address and network address   LAN address is sometimes called as a data link address because it is used in Layer 2  level  but more commonly the address is known as a MAC address  A switch on Ethernet  needs a 48 bit MAC address to transmit packets  In this case  the process of finding a  proper MAC address from the IP address is called an address resolution     On the other hand  the progress of finding the proper IP address from the MAC address is  called reverse address resolution  The switches and DSLAMs find their MAC addresses  from the IP addresses through address resolution protocol  ARP   ARP saves these ad   dresses in ARP table for quick search  Referring to the IP addresses in ARP table  the  packets containing the IP address are transmitted to network  When configuring the ARP  table  it is possible to do it only in some specific interfaces 
58.  Layer Discovery Protocol  CT DP    152  Sd  DR eene BEE 152  Liz  nelle e DR EE 152  Loa    LEDP Operation Pe Dio a 153  Fog Basic TEV oeaan ideas 153   30 ELDRE Mess AGC asii eege 153  2360  JIRCINIUAUN OG RER 154  7 3 7 Displaying LLDP Configuration         cccccocccnnoconnnncconnonononcnnonononnnnoncnnonnanonoos 154  ZA Remote Monitoring  HMON    155  Ad  RMON HISO Vs rica 155  7 4 1 1 Source Port of Statistical Data    156  7 4 1 2 Subject of RMON Histop NEE 156  TANS      NUMbDer e EE e le E EE 156  7 4 1 4     Interval of Sample Inquiry            ccccocccccccnccccnncccnnocccnncncnnnonnnonanonononononnnonacnnnos 157  TAMOS   Activating RMON HIStory inicio 157  7 4 1 6 Deleting Configuration of RMON History        c cooocccccoccncccoccnconoconononcnnnnoncnnnnos 157  7 4 1 7 Displaying RMON History csicsa a E 157  T42 AMON AGN EE 158  FAZ    SUDjECLOL RMON Alanis ereraa AA 158  7 4 2 2 Object of Sample Ingoum   cc ccccceecceeceeeeeeeeeeeeseeeeeseeeeeeseeeeeseaeeeeseeeeesaees 158  7 4 2 3 Absolute and Delta Comparison       occcccccccccncccccnccnnnncncnnonnnnnnnnnncnnnonononenaninnns 158    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    7 6 1    7 5 Syslog  7 5 1  7 5 2  7 5 3  7 5 4   ESAS  7 5 6  1 9 7    CLI   7 4 2 4 Upper Bound of Threshold             00nnnannnannnennnennnennnnnnnnnnnrnnnnnnnnrnnnrrnnrrsrrrenrene 159  7 4 2 5 Lower Bound of Threshold AAA 159  7 4 2 6 Standard of the First Alamm  160  7 4 2 7     Interval of Sample Inquiry    
59.  Prohibition of 1 N IP Address Assignment 309  8 6 1 15 Ignoring BOOTP Reouest rana aie Ta 310  86116 DHCP  Racket Ee 310  SOAAT Seting DACP POOS Zes id 311  8 6 1 18 Displaying DHCP Pool Configuration           ccccocccnccoccnncnoconcconcnnnnonnnnonanononnnoos 311  8 6 2 DHCP Address Allocation with Option 8 311  8 6 2 1 DHCP Class Capability                oooocccoocccoconcncocononononcnnononononnnnnnononnnnonaninonnnoos 312  8 622 DHGP Class Creation a a o ee 312  8 6 2 3 Relay Agent Information Pattern        oooocccccocccncccccnncnonnnnnnnononnnnnnonnnnnnnnnnnnnnnns 312  8 6 2 4  Associating  Be EE 313  8 6 2 5 Range of IP Address for DHCP Claes 313  8639  DHCP ease Database iii ios 313  6 6 95      DACP Database Ag ei EE 313  8 6 3 2 Displaying DHCP Lease Status           ooccccococonoconcncocononccnononononconononnnconanononnns 314  8 6 3 3 Deleting DHCP Lease Database          ooccccocococcconcococononccnononncnncononononcnnnnnnnnnns 314  964  DHEP Relay Agent da ee 315  S641     DACP Ee ee 315  8 6 4 2 Smart Relay Agent Forwarding          se nnsesnnsnsnennenneesrrresnrrnsrrrnsrrrnsrrresrrrrsrrren 316  9 0 4 3 DHGP Server ID  Opt iii 316  8 6 4 4 DHCP Relay Giattetce cc ecccccceccecsseeeeeeeeeeeseeeeeseeeeeeseeeeeeseeeeesaaeeeesaaeees 317  E DE ELE ere paa id 318  8 6 5 1 Entering DHCP Option Mode      ccooccccccoccnccccccncconcnncnoncncononononnnnonononnnnnnnnnnnnnos 318  8 6 5 2 Configuring DHCP Option Fommat 319  8 6 5 3 Deleting DHCP Option Format  319    SMC7824
60.  RMON  VALUE  0 2147483647    After configuring upper bound of threshold  configure to generate RMON event when ob   ject is more than configured threshold  Use the following command      e e rees    Configures to generate RMON event when object is  rising event  lt 1 65535 gt  RMON more than configured threshold   1 65535  event index       Lower Bound of Threshold    lf you need to occur alarm when object used for sample inquiry is less than lower bound  of threshold  you should configure lower bound of threshold  To configure lower bound of  threshold  use the following command      ze e Se    falling threshold VALUE RMON Configures lower bound of threshold     After configuring lower bound of threshold  configure to generate RMON event when ob   ject is less than configured threshold  Use the following command          Configures to generate RMON alarm when object is  falling event  lt 1 65535 gt  RMON l  less than configured threshold        159    CLI    160    7 4 2 6    7 4 2 7    7 4 2 8    Management Guide  TigerAccess    EE    Standard of the First Alarm    It is possible for users to configure standard when alarm is first occurred  User can select  the first point when object is more than threshold  or the first point when object is less  than threshold  or the first point when object is more than threshold or less than threshold     To configure the first RMON alarm to occur when object is less than lower bound of  threshold first  use the following command      
61.  S   Enables CPU flood guard function   ridge  no cpu flood guard disable Disables CPU flood guard function           To display a configuration of CPU flood guard  use the following command      e e re    Enable    show cpu flood guard Global Shows a configured CPU flood guard        Bridge    344 SMC7824M VSW    Management Guide  TigerAccess    EE    8 9 3    SMC7824M VSW    CLI    Port Flood Guard    A packet storm occurs unexpectedly when a large number of broadcast  unicast  or multi   cast packets are received on a port  Forwarding these packets can cause the network to  slow down or to time out  This switch provides pps control function that controls traffic for  a specified port by threshold value  If a large number of incoming packets exceed the  threshold  the traffic is discarded during specified time when pps control function enables  on this port     To set the threshold of pps control  use the following command         e e Se    Sets the threshold of port traffic    PORTS  port number  1  2  3         THRESHOLD  threshold value  the number of packets  per 1 second     pps control port PORTS  THRESHOLD  5   60   600  Global    5   60   600  time interval  unit  second     no pps control port PORTS Deletes the configured threshold of port traffic     To set the timer for blocking traffic  use the following command      e e See    Sets the time of changing the state of a blocked port to  NORMAL  If you set the interval as 10  the state of the  pps control port PORT
62.  STP   It is easy  and fast to configure new protocol  The IEEE 802 1w also supports backward compatibil   ity with IEEE 802 1d     The switch provides STP  RSTP and MSTP  For more detail description of STP and RSTP   refer to the following sections     e STP Operation   s RSTP Operation   e  MSTP Operation   e Enabling STP Function  Required   e Configuring MSTP PVSTP Mode  e STP Basic Configuration   e Configuring MSTP   e Configuring PVSTP   e Root Guard   e Restarting Protocol Migration   e Loop Back Detection   e BPDU Configuration   e Sample Configuration    STP Operation    The 802 1d STP defines port state as blocking  listening  learning  and forwarding  When  STP is configured in LAN with double paths  switches exchange their information includ   ing the bridge ID     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    It is named as BPDU  Bridge Protocol Data Unit   Switches decide port state based on  the exchanged BPDU and automatically decide an optimized path to communicate with  the root switch     Root Switch    The critical information to decide a root switch is the bridge ID  Bridge ID is composed of  two bytes priority and six bytes MAC address  The root switch is decided with the lowest  bridge ID     Switch A    Priority   8    ROOT  DP DP    Switch C  Priority   10                       Switch B  Priority   9  DP        RP   Root Port  DP   Designated Port    Switch D    Fig  8 11 Root Switch    After configuring STP  switches 
63.  Specifies EBS   sTCMonlyy      color cir BANDWIDTH  cbs BURST       To configure the meter to discard all red colored packets  use the following command      ee e re    color red action drop Configures the meter to discard red colored packets     Policer  no color red action drop Configures the meter to permit red colored packets        SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 4 3    7 6 4 4    7 6 4 5    SMC7824M VSW    CLI    Policy Priority    If rules that are more than two match the same packet then the rule having a higher prior   ity will be processed first  To set a priority for a policy  use the following command      e me See       priority  low   medium   high     i      Policy Sets a priority for a policy   default  medium   highest     Policy Action    To specify the rule action for the packets matching configured classifying patterns  use the  following command     n   O    action match deny Denies the classified packets     action match permit Permits the classified packets     Redirects the classified packets to specified port   VLANS  VLAN ID  1 4094   PORTS  port number    i f   Sends a copy of classified packets to mirror monitoring  action match mirror Policy i  port     Specifies a VLAN ID of classified packets   VLANS  VLAN ID  1 4094     action match redirect vlan  VLANS port PORTS    action match vlan VLANS    action match copy to cpu Sends classified packets to CPU     action match route next hop Specifies next hop address of classi
64.  TCP UDP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 65535  TCP UDP source destination port number  any  any TCP UDP source destination port    Classifies an IP protocol  TCP     A B C D  source destination IP address   A B C D M  source destination IP address with mask  any  any source destination IP address   0 65535  TCP source destination port number   any  any TCP source destination port   TCP FLAG  TCP flag  e g  S SYN   F FIN     any  any TCP flag       Classifies an IP header length     ip header length  lt 1 15 gt     When specifying a source and destination IP address as a packet classifying pattern  the  destination IP address must be after the source IP address     1 15  IP header length value    193    CLI    194    7 6 6 3    7 6 6 4    Management Guide  TigerAccess    EE    To delete a specified packet classifying pattern  use the following command       mn    Deletes a specified packet classifying pattern for each    Admin Flow l  no ip header length option        Applying and modifying Admin Flow    After configuring an admin flow using the above commands  apply it to the system with  the following command  If you do not apply it to the system  all specified configurations  from Admin Flow Configuration mode will be lost     To save and apply an admin flow  use the following command     se e        A       ap Admin Flow   Applies an admin flow to the system     To 
65.  The following diagram illustrates how the object instances of Agent  Sampler  Poller and  Receiver are linked together in memory when the agent is running     ae sFlow Agent  sFlow    Packet sample sFlow Device    from switch fabri Packet samples Sampler        sFlow Datagrams    sFlow    Interface counter Poller    Kernel    Fig  7 18 sFlow Agent Diagram    Each interface or module inside the switch router has an ASIC or Network Processor  which performs the packet sampling function  The packet samples and interface counter  sampling are forwarded to the central CPU where the sFlow agent is running     SMC7824M VSW 229    CLI    230    7 16 1    7 16 2    Management Guide  TigerAccess    EE    The sFlow Agent maintains linked lists of Samplers  Pollers  and Receivers  Internally  the  agent extracts the interface data of the flow sample from sFlow device  creates new flow  sampling data  You can get more specific information of flow samples including in   put output interface of sampling ingress egress packets  VLAN  priority  AS number and  so on     sFlow sampler of agent is in charge of encoding the packet samples and sending them to  the receiver     sFlow poller of the agent collects the sampling of network interface counters  The poller is  also in charge of encoding the interface counter data and sending them to the receiver     Both flow and counter samples are combined in sFlow datagrams  And sFlow receiver  encodes those samples into UDP datagrams and sends the da
66.  The following is an example of enabling the port mirroring on the port 2 and 3 with the  monitoring port 1              SWITCH  bridge    mirror enable  SWITCH  bridge    mirror monitor 1  SWITCH  bridge    mirror add 2 3  SWITCH  bridge    show mirror    Mirroring enabled   Monitor port   1   Ingress mirrored ports   SH 02  03    o  a  so Sa SS Ss So Sa  SS Se sa Sa  So Sasa Sa  Se as  Egress mirrored ports      02 US Sa Zement Se Zeen SS tae  ee  Se SS SS  ee  Se Zeie SS  ee  ee ES    SWITCH  bridge       111    CLI    112    6 1    6 1 1    Management Guide  TigerAccess    EE    System Environment    Environment Configuration    You can configure a system environment of the this switch with the following items     e Host Name   e Time and Date   e Time Zone   e Network Time Protocol  NTP   e Simple Network Time Protocol  SNTP   e Terminal Configuration   e Login Banner   s DNS Server   e Fan Operation   e Disabling Daemon Operation  e FTP Server   e FTP Client address   e System Threshold    Host Name    Host name displayed on prompt is necessary to distinguish each device connected to  network  To set a new host name  use the following command      e e e    hostname NAME Creates a host name of the switch  enter the name   Global  no hostname  NAME  Deletes a configured host name  enter the name     The following is an example of changing host name to TEST        SWITCH  config     hostname TEST  TEST  config       Time and Date    To set system time and date  use the fol
67.  VSW    CLI    Port based VLAN    The simplest implicit mapping rule is known as port based VLAN  A frame is assigned to a  VLAN based solely on the switch port on which the frame arrives  In the example de   picted in Fig  8 1  frames arriving on ports 1 through 4 are assigned to VLAN 1  frame  from ports 5 through 8 are assigned to VLAN 2  and frames from ports 9 through 12 are  assigned to VLAN 3     Stations within a given VLAN can freely communicate among themselves using either  unicast or multicast addressing  No communication is possible at the Data Link layer be   tween stations connected to ports that are members of different VLANs  Communication  among devices in separate VLANs can be accomplished at higher layers of the architec   ture  for example  by using a Network layer router with connections to two or more VLANs     Multicast traffic  or traffic destined for an unknown unicast address arriving on any port   will be flooded only to those ports that are part of the same VLAN  This provides the de   sired traffic isolation and bandwidth preservation  The use of port based VLANs effec   tively partitions a single switch into multiple sub switches  one for each VLAN     VLAN 1        NVIA       Fig  8 1 Port based VLAN    The IEEE 802 1Q based ports on the switches support simultaneous tagged and  untagged traffic  An 802 1Q port is assigned a default port VLAN ID  PVID   and all  untagged traffic is assumed to belong to the port default PVID  Thus  the ports par
68.  a DHCP class to assign IP addresses  use the follow   ing command      e e See    no ip   no ip dhcp use class   use   no ip dhcp use class   Disables the   Disables the DHCP server to use a DHCP class      Disables the DHCP server to use a DHCP class    to use a DHCP class        Enables the DHCP server to use a DHCP class to  ip dhcp use class  Global assign IP addresses     DHCP Class Creation  To create a DHCP class  use the following command      e ee    Creates a DHCP class and opens DHCP Class Con   ip dhcp class CLASS figuration mode   pal CLASS  DHCP class name    no ip dhcp class  CLASS  Deletes a created DHCP class     Relay Agent Information Pattern       To specify option 82 information for IP assignment  use the following command      ees e ee    relay information remote id ip A B C D  circuit   id  hex HEXSTRING   index  lt 0 65535 gt    text  STRING     relay information remote id hex HEXSTRING   circuit id  hex HEXSTRING   index  lt 0 65535 gt     text STRING      Specifies option 82 information for IP  assignment     relay information remote id text STRING  cir   cuit id  hex HEXSTRING   index  lt 0 65535 gt     text STRING         To delete specified option 82 information for IP assignment  use the following command     ana tem      no relay information remote id ip A DCD  cir   cuit id  hex HEXSTRING   index  lt 0 65535 gt     text STRING      no relay information remote id hex HEX   STRING  circuit id  hex HEXSTRING   index  lt 0   65535 gt    text STRIN
69.  a receiver for the group     To enable IGMP snooping S Query Report Agency  use the following command      e e re    i igm snoopin s query   H  Igmp ping SS Global Enables IGMP snooping s query report agency   report agency    SMC7824M VSW       Management Guide  TigerAccess    EE    9 2 3 6    SMC7824M VSW    CLI    To disable IGMP snooping S Query Report Agency  use the following command      e me See       no ip igmp snooping s query   Global Disables IGMP snooping s query report agency   report agency    Explicit Host Tracking    Explicit host tracking is one of the important IGMP snooping features  lt has the ability to  build the explicit tracking database by collecting the host information via the membership  reports sent by hosts  This database is used for the immediate leave for IGMPv2 hosts   the immediate block for IGMPv3 hosts  and IGMP statistics collection     To enable explicit host tracking  use the following command   es on    igm snoopin explicit   STE KR j Enables explicit host tracking globally   ai  Global  ip igmp snooping vlan VLANS Enables explicit host tracking on a VLAN   explicit tracking VLANS  VLAN ID  1 4094   To disable explicit host tracking  use the SE command     no ip igmp snooping explicit   EE RS y Disables explicit host tracking globally   tracking  Global       ip id snooping vlan Disables explicit host eee on a VLAN   VLANS id VLANS  VLAN ID eee  4094        You can also restrict the number of hosts on a port for the switch performance
70.  additional configurations  In this switch  you can configure some  parameters such as CoS  DSCP and queue for Bridge based CoS Marking     To configure Bridge based CoS Marking  use the following command      e e See    Marks 802 1p class of service for incoming packets      through a port  enter CoS value   qos mark inbound port cos port    PORTS  lt 0 7 gt  port cos  port based user priority marking for untagged  cos  lt 0     packets  0 7  CoS value    Marks DSCP field on incoming packets through a port   qos mark inbound port dscp enter DSCP value   port PORTS dscp  lt 0 63 gt  port dscp  port based DSCP marking for IP packets  0 63  dscp value    Marks a queue number on incoming packets through a  qos mark inbound port queue port     port PORTS queue  lt 0 7 gt  port queue  default queue marking       0 7  queue number    186 SMC7824M VSW    Management Guide  TigerAccess    EE    i     SMC7824M VSW    CLI    Port based user priority marking can be configured and applied to untagged packets only     To delete Bridge based CoS Marking  use the following command   SSC    no qos mark inbound port cos  Deletes CoS marking configuration of port   port PORTS  Bridge    no qos mark inbound port  A    a D Dates DCP marking conguaton ope  DSCP Dates DCP marking conguaton ope  configuration of port   po    no qos mark inbound o    EEN Queue EEN configuration of port   queue o PORTS       To display Bridge based CoS Marking  use the following command     na me See    show gos mark 
71.  address to forward ARP packets  use the following command      e me See    Permits ARP packets of all IP addresses with all MAC  addresses which have not learned before on ARP in     permit ip any mac  any   host spection table or a specific MAC address   MACADDR  any  ignores sender MAC address   host  sender host   MACADDR  sender MAC address    permit ip host A B C D mac  any ARP ACL Permits ARP packets from a specific host     host MACADDR  MACADDR  MAC address    permit ip range A B C D A B C D Permits ARP packets of a given range of IP addresses     mac any A B C D  start end IP address of sender    vee Permits ARP packets of a sender IP network ad   permit ip A B C D A mac  any      host MACADDR     dresses   A B C D A  sender IP network address       To delete the configured ranged of IP address to permit ARP packets  use the following  command     a m   See    no permit ip any mac  any   host  MACADDR  Deletes a configured range of IP address to permit  ARP packets   no oe ip host A B C D mac  any  ignores sender MAC address  oe   host MACADDR   ARP ACL    host  sender host  MACADDR  sender MAC address  A B C D  start end IP address of sender    A B C D A  sender IP network address    no pl ip range A B C D  A B  pl D mac any    no permit ip A B C D A mac aa  aa host MACADDR        By the following command  the ARP access list also refers to a DHCP snooping binding  table to permit the ARP packets for DHCP users  This reference enables the system to  permit ARP pack
72.  allowing the system to save the system con   figuration automatically  This feature prevents unsaved system configuration lost by un   expected system failure     To allow the system to save the system configuration automatically  use the following  command      e e Se       Enables auto saving with a given interval   write interval  lt 10 1440 gt  W    ae  Global 10 1440  auto saving interval  unit  minute     no write interval   write no write interval   Disables auto saving     System Configuration File    To copy a system configuration file  use the following command      e me Se    l   Copies a running configuration file   copy running config  FILENAME l KS    FILENAME  configuration file name    startup config  o  startup config  startup configuration file    i Copies a startup configuration file   copy startup config FILENAME i i l  FILENAME  configuration file name   Enable    Copies a specified configuration file to the startup con   copy FILENAME startup config figuration file   FILENAME  configuration file name    Copies a specified configuration file to another configu   copy FILENAME1 FILENAME2 ee  ration file     To back up a system configuration file using FTP or TFTP  use the following command   mm r on  copy  ftp   tftp  config upload Uploads a file to FTP or TFTP server with the name    FILENAME   startup config  configured by user   copy realan howl   tftp  config download Downloads a file from FTP or TFTP server with the  realan hong   startup config  nam
73.  an alarm for input  voltage high     Sets ADVA severity of an alarm for input       voltage low     To delete configured ADVA alarm severity  use the following command     ana tan   ee    no snmp alarm severity adva fan fail    no snmp alarm severity adva if misconfig  no snmp alarm severity adva if opt thres  no snmp alarm severity adva if rcv fail  Global    Deletes configured ADVA alarm sever   ity     no snmp alarm severity adva voltage high  no snmp alarm severity adva voltage low       146 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    7 1 9 6 ERP Alarm Severity    To set severity of an alarm for ERP  use the following command     a ee    snmp alarm severity erp   Sets severity of an alarm for loss of test packet  LOTP     domain lotp  critical   major    in ERP domain     minor   warning   intermediate     snmp alarm severity erp       WW   Sets severity of an alarm for multiple redundancy man   domain multi rm  critical   major  agers  RM  created       minor   warning   intermediate     snmp   alarm severity erp  Global   domain reach fail  critical   ma  Sets severity of an alarm for disconnection of ERP  jor   minor   warning   intermedi  domain    ate     snmp alarm severity erp   Sets severity of an alarm for loss of test packet  LOTP     domain ulotp  critical   major   l  in ERP port     minor   warning   intermediate        To delete configured severity of an alarm for ERP  use the following command      e me O    no snmp alarm severity erp    dom
74.  and en   hanced security     To specify the maximum number of hosts on a port  use the following command      e e See    ip igmp snooping explicit  Specifies the maximum number of hosts on a port   tracking max hosts port PORTS PORTS  port number    count  lt 1 256 gt  Global 1 256  maximum number of hosts  default  256     no ip igmp snooping explicit  D    i Deletes the specified maximum number of hosts  tracking max hosts port PORTS       363    CLI    364    9 2 3 7    Management Guide  TigerAccess    EE    To display the explicit tracking information  use the following command     show ip igmp snooping explicit  e BE i   i Shows the explicit host tracking information globally   tracking  show ip igmp snooping explicit  Shows the explicit host tracking information per VLAN   tracking vlan VLANS VLANS  VLAN ID  1 4094     show ip igmp snooping explicit  Shows the explicit host tracking information per port   tracking port PORTS PORTS  port number   show ip igmp snooping explicit  Shows the explicit host tracking information per group   tracking group A B C D A B C D  multicast group address    Explicit host tracking is enabled by default        Multicast Router Port Configuration    The multicast router port is the port which is directly connected to a multicast router  A  switch adds multicast router ports to the forwarding table to forward membership reports  only to those ports  Multicast router ports can be statically specified or dynamically  learned by incoming IGMP
75.  any TCP source destination port   TCP FLAG  TCP flag  e g  S SYN   F FIN     any  any TCP flag    Classifies MAC address    SRC MAC ADDR  source MAC address  DST MAC ADDR  destination MAC address  SRC DST MAC ADDR M    source destination MAC  address with mask bit   any  any source destination MAC address  ignore     Classifies destination MAC addresses learned on MAC  table     Classifies destination MAC addresses not learned on  MAC table     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    When specifying a source and destination IP address as a packet classifying pattern  the  destination IP address must be after the source IP address     To specify a packet classifying pattern with various parameters  DSCP  CoS  ToS  IP  precedence  packet length  Ethernet type  IP header   use the following command      e e Se    Classifies a DSCP value   dscp   lt 0 63 gt    any  0 63  DSCP value  any  any DSCP  ignore     Classifies an 802 1p priority   cos   lt 0 7 gt    any  0 7  802 1p priority value    any  any 802 1p priority value  ignore   Classifies all ToS field    tos   lt 0 255 gt    any  0 255  ToS value  any  any ToS value  ignore     Classifies IP precedence    ip precedence   lt 0 7 gt    any  0 7  IP precedence value  any  any IP precedence value  ignore   Classifies a packet length    This can be used only in the extension mode    21 65535  IP packet length  any  any IP packet length  ignore     length   lt 21 65535 gt    any     Classifies the Ethernet typ
76.  assigned IP address  offer  IP address being ready to be assigned  fixed  manually assigned IP address   free  remaining IP address   POOL  pool name       Deleting DHCP Lease Database    To delete a DHCP lease database  use the following command      e e ee    clear ip dhcp leasedb A B C D M Deletes a DHCP lease database a specified subnet     clear ip dhcp leasedb pool Enable Deletes a DHCP lease database of a specified DHCP  POOL Global pool     clear ip dhcp leasedb all Deletes the entire DHCP lease database        SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 4    8 6 4 1    SMC7824M VSW    CLI    DHCP Relay Agent    A DHCP relay agent is any host that forwards DHCP packets between clients and servers   The DHCP relay agents are used to forward DHCP requests and replies between clients  and servers when they are not on the same physical subnet  The DHCP relay agent for   warding is distinct from the normal forwarding of an IP router  where IP datagrams are  switched between networks somewhat transparently     By contrast  DHCP relay agents receive DHCP messages and then generate a new  DHCP message to send out on another interface  The DHCP relay agent sets the gate   way address and  if configured  adds the DHCP option 82 information in the packet and  forwards it to the DHCP server  The reply from the server is forwarded back to the client  after removing the DHCP option 82 information     DHCP Server       RA           Relay Agent 1 Relay Agent 2    SD L
77.  authenticated every regular time     However  there are some cases of implementing re authentication immediately  In the  switch  it is possible to implement re authentication immediately regardless of configured  time interval      e e See       i Performs re authentication regardless of the configured  dot1x reauthenticate PORTS Global  time interval     63    CLI    64    4 5 3    4 5 4    4 5 5    4 5 6    Management Guide  TigerAccess    EE    Initializing Authentication Status    The user can initialize the entire configuration on the port  Once the port is initialized  the  supplicants accessing to the port should be re authenticated      e e See       dot1x initialize PORTS Global Initializes the authentication status on the port     Restoring Default Value    To restore the default value of the 802 1x configuration  use the following command     dot1x default PORTS Global Restores the default value of the 802 1x configuration     Displaying 802 1x Configuration       To display 802 1x configuration  use the following command     DONT E IE  pshowdottx Enable Shows 802 1x configuration on the system     Global  show dot1x PORTS Bridge Shows 802 1x configuration on the port     802 1x User Authentication Statistics       It is possible for user to make reset state by showing and deleting the statistics of 802 1x  user authentication     To display the statistics about the process of 802 1x user authentication  use the following  command      e mee    Enable  show dot1x
78.  based on system is set to allow all packets for each port   However the basic policy can be changed for user s requests     After configuring basic policy of filtering for all packets  use the following command on  Bridge mode to show the configuration      e e Soe    mac filter default policy  deny   Brid Configures basic policy of MAC Filtering in specified  ridge  permit  PORTS S port     Enable  show mac filter default policy Global Shows the basic policy   Bridge       SMC7824M VSW    Management Guide  TigerAccess    EE    7 11 2    SMC7824M VSW    CLI    By default  basic filtering policy provided by system is configured to permit all packets in  each port     Sample Configuration  This is an example of blocking all packets in port 1 and port 3     SWTICH  bridge    mac filter default policy deny 1 3  SWTICH  bridge    show mac filter default policy  PORT POLICY   PORT POLICY  E   t Dee ee ce pr E                   1 DENY   2 DENY  3 DENY   4 PERMIT  5 PERMIT   6 PERMIT  7 PERMIT   8 PERMIT  9 PERMIT   10 PERMIT  11 PERMIT 12 PERMIT  13 PERMIT 14 PERMIT  15 PERMIT 16 PERMIT  17 PERMIT 18 PERMIT  19 PERMIT 20 PERMIT  21 PERMIT 22 PERMIT  23 PERMIT 24 PERMIT  25 PERMIT 26 PERMIT  27 PERMIT 28 PERMIT  29 PERMIT 30 PERMIT  31 PERMIT 32 PERMIT  33 PERMIT                SWITCH  config       Adding Policy of MAC Filter    You can add the policy to block or to allow some packets of specific address after config   uring the basic policy of MAC Filtering  To add this policy  use
79.  clients configure  Same as stan   dard in 5 3 3 VDSL Checking Errors of VDSL Port each error is checked every 15 minutes   and SNMP trap is sent when it meets configured threshold     To configure an alarm config profile  perform the following steps     Step 1  To configure alarm config profile  you need to enter into Alarm   config Profile mode  Use  the following command    CO m on             Opens alarm config profile mode  alarm config profile NAME Bridge      NAME  alarm config profile name    The following is an example of entering into Alarm config Profile mode to configure alarm  config profile named TEST    SWITCH  config terminal  SWITCH  config   bridge  SWITCH  bridge   alarm config profile TEST  SWITCH  bridge alarm config profile TEST             Meanwhile  use    exit    to exit from Alarm config Profile mode     Step 2  Configures detail of Profile  Use the following command      e e See    Configures duration of CRC  LOF  and LOS  The unit is    second     thresh 15min ess  lt 0 900 gt     Configures threshold of duration of LOF  The unit is  thresh 15min lofs  lt 0 900 gt  d  second     Configures threshold of duration of LOL  The unit is    thresh 15min lols  lt 0 900 gt   second        SMC7824M VSW    Management Guide CLI  TigerAccess    EE     e me See    f Configures threshold of duration of LOS  The unit is  thresh 15min loss  lt 0 900 gt  d  second     Configures threshold of duration of SES  The unit is    thresh 15min sess  lt 0 900 gt   second    
80.  config    syslog output priority locall info console  SWITCH  config    show syslog    System logger on running     info local volatile  info local non volatile  notice remote 10 1 1 1  locall info console    SWITCH  config       Facility Code    You can set a facility code of the generated syslog message to send them remote syslog  server  This code make a syslog message distinguished from others  so network adminis   trator can handle various syslog messages efficiently  Facility code is only used with sys   log messages to send to remote syslog server     To set a facility code  use the following command     a m   See       syslog local code  lt 0 7 gt  Sets a facility code   Global    Deletes a specified facility code     no   no syslog local code     no syslog local code   code    The following is an example of configuring priority of all syslog messages which is trans   mitted to remote host 10 1 1 1  as the facility code 0     SWITCH  config   syslog output err remote 10 1 1 1  SWITCH  config    syslog local code 0  SWITCH  config    show syslog    System logger on running     info local volatile  info local non volatile  err remote 10 1 1 1  local code 0    SWITCH  config       165    CLI Management Guide  TigerAccess    EE    7 5 3 Syslog Bind Address    You can specify an IP address to attach to the syslog message for its identity  To specify  the IP address to bind to a syslog message  use the following command      e e es    syslog bind address A DCD DE Specifies
81.  created SNMP view record   NEE EEN VIEW  view record name    To display a created SNMP view record  use the following command      e e een    Enable  show snmp view Global Shows a created SNMP view record        Bridge       The following is an example of creating an SNMP view record     SWITCH  config    snmp view TEST included 410  SWITCH  config    show snmp view    View List    ViewName Type SubTree   Mask    TEST included 410    SWITCH  config       Permission to Access SNMP View Record    To grant an SNMP group to access to a specific SNMP view record  use the following  command      e e re    snmp access GROUP  v1   v2c  Grants an SNMP group to access a specific SNMP  READ VIEW WRITE VIEW NO  view record   TIFY VIEW GROUP  group name    snmp access GROUP v3  no  Global Grants an SNMP version 3 group to access a specific  oba  auth   auth   priv  READ VIEW SNMP view record     WRITE VIEW NOTIFY VIEW GROUP  group name    Deletes a granted SNMP group to access a specific  no snmp access GROUP    SNMP view record     SMC7824M VSW       Management Guide  TigerAccess    EE    7 1 8 1    A    SMC7824M VSW    CLI    To display a granted SNMP group to access to a specific SNMP view record  use the fol   lowing command      e e See    Enable    Shows a granted SNMP group to access to a specific    show snmp access Global  SNMP view record        Bridge    SNMP Version 3 User    In SNMP version 3  you can register an SNMP agent as user  If you register an SNMP  version 3 user  y
82.  extract the IP subnet portion of the IP Source Address in the encapsu   lated datagram     Once it is known that a given frame carries an IP datagram belonging to a given subnet   the switch can transmit the frame as needed within the confines of the subnet to which it  belongs  If a device with a given IP address moves within the VLAN aware network  the  boundaries of its IP subnet can automatically adjust to accommodate the station   s ad   dress     VLAN 2  IP Subnet 192 168 20 0    VLAN 1  IP Subnet 192 168 10 0 VLAN 3  IP Subnet 192 168 30 0    Fig  8 2 Subnet based VLAN       To configure subnet based VLAN  use the following command     Configures subnet based VLAN   vlan subnet A B C D M VLANS Bridge  VLANS  VLAN ID  1 4094     To clear subnet based VLAN configuration  use the following command      ee e Se          no vlan subnet  4 B C D M  Clears configured VLAN based on subnet     Tagged VLAN    In a VLAN environment  a frame s association with a given VLAN is soft  the fact that a  given frame exists on some physical cable does not imply its membership in any particu   lar VLAN  VLAN association is determined by a set of rules applied to the frames by  VLAN aware stations and or switches     SMC7824M VSW    Management Guide  TigerAccess    EE    8 1 6    SMC7824M VSW    CLI    There are two methods for identifying the VLAN membership of a given frame   e Parse the frame and apply the membership rules  implicit tagging    e Provide an explicit VLAN identifier with
83.  fault  It causes superfluous data transmission and network fault     To prevent this  the switch provides the loop detecting function  The loop detecting  mechanism is as follows     The switch periodically sends the loop detecting packet to all the ports with a certain in   terval  and then if receiving the loop detecting packet sent before  the switch performs a  pre defined behavior     To enable disable the loop detection globally  use the following command      e e See    loop detect  enable   disable  Enables disables the loop detection globally        i For the detailed configuration of the loop detection  you need to issuing the loop detect  enable command first  If you do not  all the commands concerning the loop detection will  show an error message     To enable disable the loop detection on a specified port  use the following command     een ra Som  loop detect PORTS Enables the loop detection on a specified port   Bridge  no   no loop detect PORTS     no loop detect PORTS   Disables the loop detection on a specified port        To define the behavior on a specified port when a loop is occurred  use the following  command      e a Se    Enables the blocking option  This configures a speci   loop detect PORT block fied port to automatically change its state to BLOCKED  when a loop is detected on it   default  disable     Forces the state of a blocked port to change to NOR   loop detect PORT unblock  MAL   Bridge    Sets the interval of changing the state of a bloc
84.  first one are suppressed to avoid increasing the unneces   sary traffic  For an IGMP querier  it is sufficient to know that there is at least one inter   ested member for a group on the network segment     When a host is not interested in receiving the multicast traffic for a particular group any  more  it can explicitly leave the group by sending leave group messages  Upon receiving  a leave message  a querier then sends out a group specific query message to determine  if there is still any host interested in receiving the traffic  If there is no reply  the querier  stops forwarding the multicast traffic     351    CLI Management Guide  TigerAccess    EE    9 1 2 1 IGMP Static Join    When there are no more group members on a network segment or a host cannot report  its group membership using IGMP  multicast traffic is no longer transmitted to the network  segment  However  you may want to pull down multicast traffic to a network segment to  reduce the time from when an IGMP join request is made to when the requested stream  begins arriving at a host  which is called the zapping time     The IGMP static join feature has been developed to reduce the zapping time by statically  creating a virtual host that behaves like a real on a port  even if there is no group member  in the group where the port belongs  As a result  a multicast router realizes there is still  group member  allowing multicast traffic to be permanently reachable on the group     To configure the IGMP static 
85.  group list  use the following command     mm ra rem  show ip igmp static group Shows the IGMP static join group list     Enable 1 99  IP standard access list  Global 1300 1999  IP standard access list  expanded   Bridge WORD  access list name   VLANS  VLAN ID  1 4094     show ip igmp static group list    lt 1 99 gt     lt 1300 1999 gt    WORD    vlan VLAN        If you do not specify the reporter option  the IP address configured on the VLAN is used  as the source address of the membership report by default  If no IP address is configured  on the VLAN  0 0 0 0 is then used     This feature only supports an IGMPv2 host  it does not support IGMPv3 host     IGMP Version 3    IGMP version 3 provides support for the source filtering  which is to receive multicast traf   fic for a group from specific source addresses  or from except specific source addresses   allowing the Source Specific Multicast  SSM  model     The source filtering is implemented by the major revision of the membership report   IGMPv3 membership reports contain two types of the record  current state and state   change  Each record specifies the information of the filter mode and source list  The re   port can contain multiple group records  allowing reporting of full current state using fewer  packets     The switch runs IGMPv3 by default  and there are no additional IGMPv3 parameters you  need to configure  IGMPv3 snooping features are provided     IGMPv3 Messages    There are two types of IGMPv3 messages of c
86.  gt  0 20  response value  default  2     To set a validation value of timeout for the responses from an IP address for a requested  ping or ARP  use the following command      e e See    Sets a validation value of timeout for the responses in    ip dhcp  arp   ping  timeout   lt 100 5000 gt     Global the unit of millisecond   100 5000  timeout value  default  500        SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 1 13    8 6 1 14    SMC7824M VSW    CLI    Authorized ARP    The authorized ARP is to limit the lease of IP addresses to authorized users  This feature  enables a DHCP server to add ARP entries only for the IP addresses currently in lease  referring to a DHCP lease table  discarding ARP responses from unauthorized users  e g   an illegal use of a static IP address      When this feature is running  dynamic ARP learning on an interface will be disabled  since  DHCP is the only authorized component currently allowed to add ARP entries     The authorized ARP is enabled only in a DHCP server     To limit the lease of IP addresses to authorized users  use the following command      e me ees    ip dhcp authorized arp start Discards an ARP response from unauthorized user    lt 120 2147483637 gt  timeout  lt 120  start  starting time  default  3600 sec   2147483637 gt  timeout  expire time       Global  ip dhcp authorized arp  lt 120  Discards an ARP response from unauthorized user   2147483637 gt  120 2147483637  expire time    no ip dhcp authorized arp Dis
87.  has access to FTP server as a  client  use the following command      e   n mn    no no ftp bind address   no ftp bind address         ftp bind address A B C D Specifies an IP address to bind it to be the ftp client   lobal    Deletes a specified IP address as the ftp client    Please be careful that the FTP bind address is also applied to TFTP server s bind   address     System Threshold    You can configure the system with various kinds of the system threshold such as CPU  load  traffic  temperature  etc  Using this threshold  the switch generates syslog mes   sages  sends SNMP traps  or performs a relevant procedure     CPU Load    To set the threshold of CPU load  use the following command      e e een    Sets the threshold of CPU load in the unit of percent         threshold cpu  lt 21 100 gt   5   60          600    lt 20 100 gt   5   60   600   Global    21 100  CPU load high  default  50   20 100  CPU load low  5   60   600  time interval  Second     no threshold cpu Deletes the configured threshold of CPU load        SMC7824M VSW    Management Guide  TigerAccess    EE    6 1 13 2    6 1 13 3    SMC7824M VSW    CLI    To show the configured threshold of CPU load  use the following command      e e See      show epuload   show epuload Enable   Shows the configured threshold of CPU load    the   Shows the configured threshold of CPU load    threshold of CPU load        Global Shows the CPU usage every 5 seconds during current  show cpu trueload  Bridge 10 minutes     P
88.  in Interface configuration mode of Switch and enable interface using     no shutdown    command  In order to enter into Interface configuration mode  you should  enter into Interface configuration mode of VLAN to register as a switch group for stacking     The following is an example of configuring Interface of switch group as 1     SWITCH A  configure terminal   SWITCH A config   interface 1   SWITCH A interface   ip address 192 168 10 1 16  SWITCH A interface    no shutdown   SWITCH A interface             If there are several switches  rest of them are managed by IP address of Master switch   Therefore you don t need to configure IP address in Slave switch     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Step 2  Configure Switch A as Master switch  Configure VLAN to belong in the same switch group  and after registering Slave switch  configure it as a Master switch      lt Switch A     Master Switch gt     SWITCH A config   stack master  SWITCH A config   stack device default  SWITCH A config   stack add 00 d0 cb 22 00 11    Step 3  Configure VLAN in order to belong to the same switch group in Switch B registered in  Master switch as Slave switch and configure as a Slave switch      lt Switch B     Slave Switch gt     SWITCH B config   stack slave  SWITCH B config   stack device default    Step 4  Check the configuration  The information you can check in Master switch and Slave  switch is different as below      lt Switch A     Master Swit
89.  is newly connected to root   packet cannot be transmitted between the ports because state of two switches becomes  listening  and no loop is created     In this state  if root transmits BPDU to SWITCH A  SWITCH A transmits new BPDU to  SWITCH A and SWITCH C  switch C transmits new BPDU to SWITCH D  SWITCH D   which received BPDU from SWITCH C makes port connected to SWITCH C Blocking  state to prevent loop after new link     263    CLI Management Guide  TigerAccess    EE    ROOT    1  New link created    Switch A E bg   _              2  Transmit BPDU    Be NS at listening state    Switch C    3  Block to  prevent loop  BPDU Flow    Switch D        Switch B                           Fig  8 17 Network Convergence of 802 1d    This is very epochal way of preventing a loop  The matter is that communication is dis   connected during two times of BPDU Forward delay till a port connected to switch D and  SWITCH C is blocked  Then  right after the connection  it is possible to transmit BPDU al   though packet cannot be transmitted between switch A and root     ROOT         1  New link created  por    Switch A p Eug   _        2  Negotiate between  Switch A and ROOT     Traffic Blocking          Switch B Switch C       8    Switch D    Fig  8 18 Network Convergence of 802 1w  1     SWITCH A negotiates with root through BPDU  To make link between SWITCH A and root   port state of non edge designated port of SWITCH is changed to blocking  Although  SWITCH A is connected to root  loop 
90.  l Configures threshold of duration of UAS  The unit is  thresh 15min uass  lt 0 900 gt  a  second        i   If the threshold is configured as    0     it means no limit  and the default of threshold is no  limit     The following is an example of configuring threshold of profile named TEST as 5 minutes   300 seconds      thresh 15min ess 300  thresh 15min lofs 300  thresh 15min lols 300    SWITCH  bridge alarm config profile  TEST                    SWITCH  bridge alarm config profile TEST    thresh 15min loss 300    ye                  bridge alarm config profile TEST   SWITCH  bridge alarm config profile TEST   SWITCH    bridge alarm config profile TEST  thresh 15min sess 300    SWITCH  bridge alarm config profile TEST  thresh 15min uass 300                                        bridge alarm config profile TEST     To confirm the configuration  use the following command      e e See    show Ire alarm config profile Shows the configuration of alarm config  Enable Global Bridge   PORTS  profiles       The following is an example of confirming the above configuration     SWITCH  bridge alarm config profile TEST    show running config   omitted   alarm config profile TEST  thresh 15min lofs 300  thresh 15min loss 300  thresh 15min lols 300  thresh 15min ess 300   omitted   SWITCH  bridge alarm config profile  TEST          Step 3  Enables configurations  Unless you do it  they will not be applied to ports  To enable or  disable configuration of Profile  use the following com
91.  limit the bandwidth for non critical applications  such as FTP file  transfers   so that other applications have a greater amount of bandwidth available to  them     Effective use of resources    An effective use of network resources can support guaranteed bandwidth to a few critical  applications to ensure reliable application performance  QoS ensures that the most im   portant and critical traffic is transmitted immediately without starvation     Customized service    QoS helps the internet service providers provide differentiated services for their custom   ers of the network  It allocates guaranteed bandwidth to more important applications that  produce real time traffic  such as voice  video and audio     Traffic Prioritization    As you deploly QoS  it guarantees bandwidth and reduces delay time to ensure the appli   cations can transmit the packets properly by handling the traffic with higher priority than  regular traffic     SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 1    SMC7824M VSW    CLI    How to Operate QoS    QoS operation is briefly described as below     Incoming packets are classified by configured conditions  and then processed by meter   ing  packet counter and rate limiting on specific policer  After marking and remarking ac   tion  the switch transmits those classified and processed packets via a given scheduling  algorithm     Fig  7 1 shows the simple procedure of QoS operation     Outgoing    Incoming    Packets Packets  Ho Packet p 
92.  of second   default  3600     lease time max  lt 120 2147483637 gt        no lease time  default   max  Deletes specified IP lease time     SMC7824M VSW 305    CLI    306    8 6 1 6    8 6 1 7    Management Guide  TigerAccess    EE    The following is an example of setting default and maximum IP lease time     SWITCH  config    service dhcp    SWI  SWI  SWI  SWI  SWI  SWI  SWI       TCH  contigo  ip  TCH  config dhcp    dhcp pool     sample        config dhcp    TCH  config dhcp  TCH  config dhcp  TCH  config dhcp             TCH             TCH  config dhcp          DNS Server     sam     sam        sam     sam              sam    D  o 2  oe  O       D          0         D       sample   network 100 1 1 0 24  default router 100 1 1 254  range 100 1 1 1 100 1 1 100  lease time default 5000    lease time max 10000    To specify a DNS server to inform DHCP clients  use the following command      e Y ees    dns server A DC Di   A B C D2       4 B C D8     no dns server A B C D1   A B C D2       4 B C D8     no dns server all    Specifies a DNS server  Up to 8 DNS servers are pos   sible   A B C D  DNS server IP address    DHCP Pool    Deletes a specified DNS server     Deletes all the specified DNS servers        The following is an example of specifying a DNS server     SWI  SWI  SWI  SWI  SWI  SWI  SWI  SWI  SWI           TCH  config   ip  TCH  config dhep  TCH  config dhep  TCH  config dhcp  TCH  config dhcp  TCH  config dhep  TCH  config dhcep  TCH  config dhcp           sa
93.  option82 is enabled  This allows an enhanced security and  efficient ID assignment in the Layer 2 environment with a DHCP option82 field     If DHCP snooping is enabled in the system of switch  DHCP packets includes DHCP op   tion82 field by default     To enable disable the switch enabled by DHCP snooping to insert or remove DHCP op   tion82 field  use the following command      e me en       ip dhcp snooping information Enables the switch to insert DHCP option 82 field in  option forwarded DHCP packets to the DHCP server   Global    no ip dhcp snooping informa  Disables the switch not to insert DHCP option 82 field    tion option in forwarded DHCP packets to the DHCP server       DHCP Snooping Option    DHCP snooping switch may receive DHCP messages  Discover Request  with various  different options from clients  which cause DHCP server hard to manage client s inform   tion in the perspective of data consistency  That s why this function is necessay     The switch operating DHCP snooping can modify or attach an option field of the DHCP  messages  Discover Request  with a defined snooping option and can forward them to  DHCP server  The snooping option can be applied on a port basis or on entire ports  Be   fore using this function  a global DHCP option format should be created  For details of  setting the DHCP option format  refer to the 8 6 5 DHCP Option     To set a DHCP snooping option for a specifc port  use the following command     na e See        Specifies a snoopin
94.  password     Note that you must use the command line based interface FTP client software when up   grading the switch  If you use the graphic based interface FTP client software  the system  cannot recognize the upgraded software     Step 2  Set the file transfer mode to the binary mode using the following command     n   See       bin FTP Sets the file transfer mode to the binary mode     Step 3  Enable to print out the hash marks as transferring a file using the following command     mana    on  eeh   FTP Prints out the hash marks as transferring a file     Step 4  Uploads the new system software using the following command      e m   See    Uploads the system software        put FILENAME  os1   os2  FILENAME  system software file name  os1   os2  the area where the system software is stored       379    CLI    380    A    Management Guide  TigerAccess    EE    Step 5  Exit the FTP client using the following command      e e een       bye FTP Exits the FTP client     To reflect the downloaded system software  the system must restart using the reload  command  For more information  see Section 4 1 10 1     The following is an example of upgrading the system software of the switch using the FTP  provided by Microsoft Windows XP in the remote place     Microsoft Windows XP  Version 5 1 2600    C  Copyright 1985 2001 Microsoft Corp     C   gt ftp 10 27 41 91   Connected to 10 27 41 91    220 FTP Server 1 2 4  FTPD    User  10 27 41 91   none    admin   331 Password required fo
95.  port  use the following command     show port statistics avg pkt Shows the traffic statistics of the average packet for a   PORTS  specified Ethernet port     show port statistics avg pps Shows the traffic statistics per packet type for a speci    PORTS  fied Ethernet port    Enable Ke  show port statistics interface Global Shows the interface MIB counters of a specified   oba    PORTS  Ethernet port    Bridge  show port statistics rmon Shows the RMON MIB counters of a specified Ethernet   PORTS  port     show port statistics media  Shows the traffic statics per media adaptor unit of CO  adaptor  PORTS  VDSL port        The following is the sample output of the show port statistics avg pkt command with  the Ethernet port 25     SWITCH  config    show port statistics avg pkt 25                Slot Port   TX Rx  Time   pkts s   bytes s   bits s   pkts s   bytes s   bits s  DOGG  2  o Se ee a eee  5 sec 2 186 1 488 11 1106 8 848  1 min 0 60 480 3 148 1 872  10 min 0 6 48 1 15 1 184    SWITCH  config       To delete all collected statistics for an Ethernet port  use the following command      e e Se    clear port statistics  PORTS   all  Deletes all collected statistics for an Ethernet port        71    CLI    9 2 7 2    12       Management Guide  TigerAccess    EE    CPU Statistics  To display the statistics of the traffic handled by CPU  use the following command         ee a ee    show cpu statistics avg pkt   PORTS     Shows the statistics of the traffic handled by CPU per  
96.  port priority   7  PATH 2 port priority   8  PATH 1 lt  PATH 2     PATH 1 is chosen      Fig  8 13 Port Priority    Port States    Each port on a switch can be in one of five states     el Dea jy    BPDUs or timeout indicate Forwarding timer    Potential   become active expired  BPDUs   r port            should not be active    BPDUs indicate port    me should not be active sf Learning b    N indicate port EIN umer  expired    should not be active    Forwarding Ja    Disabled o                            Fig 8 14 Port State    e Blocking  a port that is enabled  but that is neither a Designated port nor a Root port  will be in  the blocking state  A blocking port will not receive or forward data frames  nor will it  transmit BPDUs  but instead it will listen for other s BPDUs to determine if and when  the port should consider becoming active in the spanning tree     e Listening  the port is still not forwarding data traffic  but is listening to BPDUs in order to  compute the spanning tree  The port is comparing its own information  path cost   Bridge Identifier  Port Identifier  with information received from other candidates and  deciding which is best suited for inclusion in the spanning tree     SMC7824M VSW 261    CLI Management Guide  TigerAccess    EE    e Learning  the port is preparing to forward data traffic  The port waits for a period of time to build  its MAC address table before actually forwarding data traffic  This time is the  forwarding delay     e Forwardin
97.  priority for specified VLAN   priority    Path cost       After deciding Root switch  you need to decide to which route you will forward the packet   To do this  the standard is path cost  Generally  path cost depends on transmission speed  of LAN interface in switch  In case the route is overload based on Path cost  it is better to  take another route     By considering the situation  the user can configure Path cost of Root port in order to des   ignate the route on ones own     To configure the path cost value for specified vlan in PVSTP  use the following command      eene See    Configures path cost to configure route  spanning tree vlan VLANS port PORTS cost on user s own      lt 1 200000000 gt  i VLANS  VLAN ID  1 4094   PORTS  port number    no spanning tree vlan VLANS port PORTS cost Deleted a configured path cost        SMC7824M VSW    Management Guide CLI  TigerAccess    EE          8 3 8 4 Port Priority  When all conditions of two routes of switch are same  the last standard to decide a route  is port priority  You can configure port priority and select a route manually   To configure a port priority for specified VLAN  use the following command    en rs rem    Configures the port priority of specific VLAN   spanning tree vlan VLANS port  Wee VLANS  VLAN ID  1 4094   PORTS port priority  lt 0 240 gt  ees  0 240  port priority in increments of 16  default 128   no spanning tree vlan VLANS Deleted the configuration port priority of specifiec  port PORTS port priori
98.  protocol  STP   Ethernet ring protection  ERP   etc     notify switches in the  topology using a topology change notification  TCN      When TCN is received  the switch where an IGMP snooping is running will flood multicast  traffic to all ports in a VLAN  since a network topology change in a VLAN may invalidate  previously learned IGMP snooping information  However  this flooding behavior is not de   sirable if the switch has many ports that are subscribed to different groups  The traffic  could exceed the capacity of the link between the switch and the end host  resulting in  packet loss  Thus  a period of multicast flooding needs to be controlled to solve such a  problem     Enabling TCN Multicast Flooding    To enable the switch to flood multicast traffic when TCN is received  use the following  command      e e Se    S   i Enables the switch to flood multicast traffic when TCN  ip igmp snooping tcn flood      is received   Global          Enables the switch to flood multicast traffic on a VLAN  ip igmp snooping tcn vlan    VLANS flood    when TCN is received   VLANS  VLAN ID  1 4094        To disable the switch to flood multicast traffic when TCN is received  use the following  command      e Se    no ip   no ip igmp snooping ten flood _ snooping tcn   no ip igmp snooping ten flood _  Disables the switch to flood multicast traffic when TCN  no ip igmp snooping ten vlan Global    VLANS flood    is received       TCN Flooding Suppression    When TCN is received  the switc
99.  queries and PIM hello packets     Static Multicast Router Port    You can statically configure Layer 2 port as the multicast router port which is directly con   nected to a multicast router  allowing a static connection to a multicast router     To specify a multicast router port  use the following command      e a O    Specifies a multicast router port globally   PORTS  port number    ip igmp snooping mrouter port     PORTS   cpu   Global cpu  CPU port    ip igmp snooping vlan VLANS Specifies a multicast router port on a VLAN   mrouter port  PORTS   cpu  VLANS  VLAN ID  1 4094   To delete a specified multicast router port  use the following command      e me See          no ip igmp snooping mrouter   port  PORTS   cpu    no ip Lomp snooping vlan Global Deletes a specified multicast router port   VLANS mrouter port  PORTS     cpu     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Multicast Router Port Learning    Multicast router ports are added to the forwarding table for every Layer 2 multicast entry   The switch dynamically learns those ports through snooping on PIM hello packets     To enable the switch to learn multicast router ports through PIM hello packets  use the fol   lowing command      e e See    ip igmp snooping mrouter learn Enables to learn multicast router ports through PIM    pim hello packets globally     Global Enables to learn multicast router ports through PIM  hello packets on a VLAN   VLANS  VLAN ID  1 4094     ip igmp s
100.  reflected into the switch        To apply the configuration to the system  use the following command     II wee  ton  apply MST config   Apllies the configuration of the region to the system     After deleting the configured configuration ID  apply it to the system using the above  command        To display the current and edited configuration on MSTP Configuation mode  use the fol   lowing command     A the current configuration as it is used to run  MSTP    MSTP    show pending     show pending     Shows the edited configuration of MSTP    the edited   Shows the edited configuration of MSTP    of MSTP     Shows all configurations of MSTP       For example  after setting the configuration ID  if you apply it to the switch with the apply  command  you can check the configuration ID with the show current command     However  if the user did not use the apply command to apply the configurations to the  switch  the configuration could be checked with the show pending command     275    CLI    276    8 3 7 5    8 3 7 6    Management Guide  TigerAccess    EE    Enabling MSTP configuration    To enable disable a MSTP daemon by applying MSTP configurations to the system  use  the following command        a a Se    spanning tree mst Enables MSTP function on the system    Bridge  no spanning tree mst Disables MSTP function on the system     Displaying Configuration    To display the configuration of MSTP  use the following command      e a See    show spanning tree mst  lt 1 64 gt   
101.  registered instead of IP address  user can do telnet  FTP   TFTP and ping command to the hosts on the domain with domain name        To search domain name  use the following command     IC rs rem  Global       It is possible to delete DNS server and domain name at the same time with the below  command     Re A Weg       Global Deletes DNS server and domain name     SMC7824M VSW    Management Guide  TigerAccess    EE    6 1 9    6 1 10    6 1 11    SMC7824M VSW    CLI    Fan Operation    For the switch  it is possible to control fan operation  To control fan operation  use the fol   lowing command      ze e See       fan operation  on   off  Global Configures fan operation     It is possible to configure to start and stop fan operation according to the system tempera   ture  To configure this  see Section 6 1 13 3     To display fan status and the temperature for fan operation  use the following command      e e en    Enable    Shows the fan status and the temperature for the fan  show status fan Global    operation   Bridge       Disabling Daemon Operation    You can disable the daemon operation unnecessarily occupying CPU  To disable certain  daemon operation  use the following command      e me See       halt PID Disables the daemon operation     You can display the PID of each running processs with the show process command     SWITCH  show process                         USER PID  SCPU SMEM VSZ RSS TTY STAT START TIME COMMAND  admin 1 Ir 0 2 1448 592  Y S Feb23 0 05 init 
102.  route database Bridge  table database     Interface Description          Enable Shows configured routing information        To specify a description on an interface  use the following command      e me O       description DESCRIPTION Specifies a description on an interface   Interface    Deletes a specified description     The following is the example of specifying a description on the interface 1     SWITCH  config   interface 1  SWITCH  config if   description sample description  SWITCH  config if   show interface 1  Interface default  Hardware is Ethernet  address is 00d0 cb00 0d83  Description  sample description  index 43 metric 1 mtu 1500  lt UP  BROADCAST  RUNNING  MULTICAST gt   VRF Binding  Not bound  Bandwidth 100m    53    CLI Management Guide  TigerAccess    EE    inet 10 27 41 91 24 broadcast 10 27 41 255  input packets 3208070  bytes 198412141  dropped 203750  multicast packets 0  input errors 12  length 0  overrun 0  CRC 0  frame 0  fifo 12  missed O  output packets 11444  bytes 4192789  dropped 0    output errors 0  aborted 0  carrier 0  fifo 0  heartbeat 0  window 0       collisions O    SWITCH  config       4 3 5 Displaying Interface    To display an interface status and configuration  use the following command      e ma See    Enable  Global Shows an interface status and configuration   Bridge INTERFACE  interface name    show interface  INTERFACE     Interface    Enable  show ip interface  INTERFACE   Global Shows brief information of interface   oba  bri
103.  send SNMP trap when a port     NODE  is disconnected from network     Configures the system to send SNMP trap when mem   snmp trap mem threshold  ory usage exceeds or falls below the threshold     Configures the system to send SNMP trap when CPU  snmp trap cpu threshold  load exceeds or falls below the threshold     Configures the system to send SNMP trap when the  snmp trap port threshold    port traffic exceeds or falls below the threshold     Configures the system to send SNMP trap when sys   snmp trap temp threshold  tem temperature exceeds or falls below the threshold     Configures the system to send SNMP trap when no  snmp trap dhcp lease     more IP address is left in the DHCP pool    Configures the system to send SNMP trap when the  snmp trap fan l   fan begins to operate or stops     Configures the system to send SNMP trap when there  snmp trap module      is any problem in module     Configures the system to send SNMP trap when the  snmp trap pps control number of packets per second exceeds or falls below  the PPS threshold        7 1 8 4 Disabling SNMP Trap    To disable the SNMP trap  use the following command     OO eom   rem  no snmp trap auth fail  no snmp no snmp trap cold start   no snmp trap cold start     Global Disables each SNMP trap     no snmp trap link up no snmp trap link up PORTS  NODE    no snmp trap link up PORTS  NODE     no snmp trap link    no snmp trap link down PORTS  NODE  PORTS   no snmp trap link down PORTS  NODE        SMC7824M VSW 141  
104.  show ip dhcp pool  POOL  Enable Shows a DHCP pool configuration        show ip dhcp pool summary Global Shows a summary of a DHCP pool configuration    POOL  Bridge POOL  pool name    The following is an example of displaying a DHCP pool configuration     SWITCH config   show ip dhcp pool summary                                Total    1 Pools    Total 0 0 00 of total  Available 0 0 00 of total  Abandon 0 0 00 of total  Bound 0 0 00 of total  Offered 0 0 00 of total  Fixed 0 0 00 of total   sample    Total 0 0 00  of the pool 0 00 of total  Available 0 0 00  of the pool 0 00 of total  Abandon 0 0 00  of the pool 0 00 of total  Bound 0 0 00  of the pool 0 00 of total  Offered 0 0 00  of the pool 0 00 of total  Fixed 0 0 00  of the pool 0 00 of total    SWITCH  config       DHCP Address Allocation with Option 82    The DHCP server provided by the switch can assign dynamic IP addresses based on  DHCP option 82 information sent by the DHCP relay agent     The information sent via DHCP option 82 will be used to identify which port the  DHCP REQUEST came in on  The feature introduces a new DHCP class capability   which is a method to group DHCP clients based on some shared characteristics other  than the subnet in which the clients reside  The DHCP class can be configured with op   tion 82 information and a range of IP addresses     311    CLI    312    8 6 2 1    8 6 2 2    8 6 2 3    Management Guide  TigerAccess    EE    DHCP Class Capability    To enable the DHCP server to use
105.  state    priority H  show spanning tree vlan VLANS Shows a summary of a specific vlan id   summary  totals  totals  the total lines of PVSTP  SMC7824M VSW 279    CLI    280    8 3 9    Management Guide  TigerAccess    EE    Root Guard    The standard STP does not allow the administrator to enforce the position of the root  bridge  as any bridge in the network with lower bridge ID will take the role of the root  bridge  Root guard feature is designed to provide a way to enforce the root bridge place   ment in the network  Even if the administrator sets the root bridge priority to zero in an ef   fort to secure the root bridge position  there is still no guarantee against bridge with prior   ity zero and a lower MAC address        Service provider Customer  Switch A y Switch B    Root Guard  Configuration    Root Switch             Fig  8 26 Root Guard    Software based bridge applications launched on PCs or other switches connected by a  customer to a service provider network can be elected as root switches  If the priority of  bridge B is zero or any value lower than that of the root bridge  device B will be elected as  a root bridge for this VLAN  As a result  network topology could be changed  This may  lead to sub optimal switching  But  by configuring root guard on switch A  no switches be   hind the port connecting to switch A can be elected as a root for the service provider s  switch network  In which case  switch A will block the port connecting switch B     To confi
106.  statistical data  use the following command      e See       Specifies a data object ID   data source NAME RMON    NAME  enters a data object ID   ex  ifindex n1 port1     Subject of RMON History    To identify a subject using RMON history  use the following command   mana    on    Identifies subject using relevant data  enter the name  owner NAME RMON   max  32 characters      Number of Sample Data       To configure the number of sample data of RMON history  use the following command      e e een    Defines a bucket count for the interval  enter the num     requested buckets  lt 1 65535 gt  ber of buckets   1 65535  bucket number  default  50        SMC7824M VSW    Management Guide  TigerAccess    EE    7 4 1 4    7 4 1 5    7 4 1 6    7 4 1 7    SMC7824M VSW    CLI    Interval of Sample Inquiry    To configure the interval of sample inquiry in terms of second  use the following command     a ee       Defines the time interval for the history  in seconds    interval  lt 1 3600 gt  RMON  enter the value   default  1800     1 sec is the minimum time which can be selected  But the minimum sampling interval  currently is 30 sec  i e   all intervals will be round up to a multiple of 30 seconds     Activating RMON History    To activate RMON history  use the following command     Command Mode Description    Before activating RMON history  check if your configuration is correct  After RMON history  is activated  you cannot change its configuration  If you need to change configura
107.  statistics PORTS Global  Bridge    Shows the statistics of 802 1x user authentication on  the port        To make reset state by deleting the statistics of 802 1x user authentication  use the fol   lowing command      e me See    ae Makes reset state by deleting the statistics of 802 1x  dot1x clear statistics PORTS Global  on the port        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    4 5 7 Sample Configuration    The following is the example of configuring the port 25 with the port based authentication  specifying the information of RADIUS server     SWTI  SWTI  SWTICH  config  SWTICH  SWTICH  802 1x authentication is enabled   RADIUS Server TimeOut  1 S   RADIUS Server Retries  3    CH   dotlx system auth control  CH  config dotlx nas port 25    dotl1x port control force authorized 25  dotlx radius server host 10 1 1 1 auth port 1812 key test                 config   show dotlx    RADIUS Server   10 1 1 1  Auth key   test     802 1x  112345678901 234567 0901234567890123    POPECE MAGS  leia dd Sear Did saa oy  jag   Wide CS VOR ER D  EEN EE  HN  E  Te le E EE  p   port based  m   mac based  a   authenticated  u   unauthenticated    SWITCH  config       The following is the example of setting the interval of requesting reauthentication to 1000  sec and the interval of reauthentication to 1800 sec     SWTICH  config    dotlx timeout quiet period 1000 25  SWTICH      dotlx timeout reauth period 1800 25  SWTICH  config    dotlx reauth enable 25   SWTICH  config
108.  system   y n     45    CLI    46    4 1 10 2    Auto System Rebooting    Management Guide  TigerAccess    EE    The switch reboots the system according to user   s configuration  There are two basis for  system rebooting  These are CPU and memory  CPU is rebooted in case CPU Load or In   terrupt Load continues for the configured time  Memory is automatically rebooted in case  memory low occurs as the configured times     To enable the auto system rebooting  use the following command      e me ees    Configures the system to restart automatically in case    auto reset cpu  lt 50 100 gt   lt 1 100 gt   TIME    auto reset memory  lt 1 120 gt   lt 1   10 gt     no auto reset  cpu   memory     an average of CPU or interrupt load exceeds the con   figured value during the user defined time    50 100  average of CPU load   1 100  average of interrupt load    Configures the system to restart automatically in case  memory low occurs as the configured value   1 120  time of memory low    1 10  count of memory low       Disables auto system rebooting     To display a current configured auto system rebooting  use the following command      e e re    show auto reset cpu Enable    Global  show auto reset memory Bridge    Shows a current configured auto system rebooting by    CPU     Shows a current configured auto system rebooting by  system memory        SMC7824M VSW    Management Guide  TigerAccess    EE    4 2    4 2 1    4 2 2    4 2 3    SMC7824M VSW    CLI    System Authentication  
109.  than one constellation  encoder  Each encoder receives a set of bits that are encoded using a constellation en   coder as described in the previous sections  In this basis  DMT is referred as multi carrier    In DMT modulation  frequency channel is named frequency bins  bins  tone  DMT tones   and sub channel     Fig  5 2 shows process of DMT modulation     19    CLI    76    9 3 2    Management Guide  TigerAccess    EE     lt  Encoder 1  gt     Bin     O  1    Bin2    es O gt    gt  o    bit input     lt  Encoder 3  gt     Bin3    Frequency  3       Fig  5 2 DMT Modulation    Meanwhile  DMT using multi carrier can control carrier about exterior noise differently  came from each frequency in detail  whereas chip implementation is more complicated  than QAM and power consumption is quite high  Also  it is possible to process many digi   tal signals  Although its fundamental is complicated  processing speed is faster than QAM     Configuring VDSL Port    You can configure profile  interleave of VDSL port  This chapter describes the following  lists    e Displaying Status of VDSL Port   e Enabling VDSL Port   e Profile of VDSL Port   e Controlling Power according to Connection Distance  e PSD Level   e PSD Mask Level   e Interleave   e Impulse Noise Protection   e Trellis Coded Modulation  TCM    e Ham band   e SNR Margin   e Bitloading Per Tone   e     G handshake Tone    SMC7824M VSW    Management Guide  TigerAccess    EE    9 3 2 1    9 3 2 2    A    SMC7824M VSW    CLI    D
110.  the IP address to bind to a syslog message   oba  no syslog bind address Deletes a specified IP address     7 5 4 Debug Message for Remote Terminal       To display a syslog debug message to a remote terminal  use the following command        ee os    terminal monitor Enables the terminal monitor function     Enable  Disables the terminal monitor function     7 5 5 Disabling Syslog    To disable the syslog  use the following command      e e See    D The syslog is basically enabled in the system        7 5 6 Displaying Syslog Message    To display the received syslog message in the system memory  use the following com   mand      e e een    Shows the received syslog messages   show syslog local  volatile   volatile  removes the syslog messages after restart   non volatile   NUMBER  non volatile  reserves the syslog messages     NUMBER  shows the last N syslog messages   Enable    show syslog local  volatile   Shows the received syslog messages in the reverse    Global  non volatile  reverse order     Bridge  show syslog  volatile   non  Shows the usage of the area where the received sys     volatile  information log messages are stored     clear syslog local  volatile   non  l    Removes the received syslog messages   volatile        166 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    The following is the sample output of displaying received syslog messages     SWITCH  show syslog local non volatile 25  Aug 28 03 33 24 system  Power A is Fault  Aug 28 03 33 35 sys
111.  the following command in  Bridge Configuration mode      e me ees    mac filter add MAC ADDRESS    Allows or blocks packet which brings a specified MAC   deny   permit    lt 1 4094 gt      address to specified port    PORTS        To show a configuration about MAC filter policy  use the following command     n   en    Enable    show mac filter Global Shows MAC filter policy     Bridge       211    CLI    212    7 11 3    7 11 4    Management Guide  TigerAccess    EE    Sample Configuration    The latest policy is recorded as number 1  The following is an example of permitting MAC  address 00 02 a5 74 9b 17 and 00 01 a7 70 01 d2 and showing table of filter policy     SWITCH  bridge    mac filter add 00 02 a5 74 9b 17 permit  SWITCH  bridge    mac filter add 00 01 a7 70 01 d2 permit  SWITCH  bridge    show mac filter          ID   MAC   ACTION          1 00 01 a7 70 01 dq2 PERMIT  2 00 02 a5 74 9b 17 PERMIT  SWITCH  bridge       The following is an example of displaying one configuration     SWITCH  bridge    show mac filter 1          ID   MAC   ACTION          L Et Steen er E El PERMIT  SWITCH  bridge       Deleting MAC Filter Policy    To delete MAC filtering policy  use the following command      e me See       mac filter del SOURCE MAC  a e  Bridge Deletes filtering policy for specified MAC address   ADDRESS    To delete MAC filtering function  use the following command      e e re    no mac filter Deletes all MAC filtering functions     Listing of MAC Filter Policy      
112.  the location of other switches connected to LAN though received BPDU  and transmit packets  Since it takes certain time to receive BPDU and find the loca   tion before transmitting packet  switches send packet at regular interval  This interval  time is named forward delay     The configuration for BPDU is applied as selected in force version  The same commands  are used for STP  RSTP  MSTP and PVSTP     SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 12 1    8 3 12 2    SMC7824M VSW    CLI    Hello Time    Hello time decides an interval time when a switch transmits BPDU  To configure hello  time  use the following command     n   See    Configures hello time to transmit the message in  MSTP   1 10  the hello time   default  2 sec     spanning tree mst hello time  lt 1   10 gt     Configures hello time to transmit the message in  spanning tree vlan VLANS hello  PVSTP per VLAN   time  lt 1 10 gt  1 10  the hello time   default  2 sec    VLANS  VLAN ID  1 4094        To delete a configured hello time  use the AAA R   command     Returns to the E hello time value of STP  RSTP  no spanning tree mst hello time  and MSTP   Bridge    no pl vlan VLANS  Returns to the atumeto deal me ene hello time value of PVSTP   pl       Forward Delay Time    It is possible to configure forward delay  which means time to take port status from listen   ing to forwarding  To configure forward delay  use the following command     nn e eos    spanning tree mst forward time Sets the forward 
113.  the network infrastructure     The point of implementing multicast is how to deliver source traffic to specific destinations  without any burden on the sources or receivers using the minimized network bandwidth   The solution is to create a group of hosts with addressing the group  and to let the net   work determine how to replicate the source traffic to the receivers  The traffic will then be  addressed to the multicast address and replicated to the multiple receivers by network  devices  Standard multicast protocols such as IGMP provide most of these capabilities     IP multicast features on the switch consist of the group membership management  Layer  2 multicast forwarding  which allows network administrators to successfully achieve the  effective and flexible multicast deployment     Fig  9 1 shows an example of the IP multicast network  In this case  the switch is config   ured only with IGMP snooping  L2 multicast forwarding feature  in the Layer 2 network     Layer 2 Network Layer 3 Network    et PPP P Hoe eeererereererereerereseeressererereeneneseeneseeseseeees  CC jr ebe RR en e Re Rees seen es Ree e eso sees Re ss es e    IGMP Join Leave    PIM Join Prune  message d message         Po  e  D  KR e e fr ed enee eg e e e e e e em er      Multicast Server       IGMP Snooping     PIM SM    Fig  9 1 IGMP Snooping in the L2 network    SMC7824M VSW    Management Guide  TigerAccess    EE    9 1    9 1 1    SMC7824M VSW    CLI    Multicast Group Membership    The most impo
114.  this process  the receiving device normally sends a PAUSE frame to the  sending device when its buffer is full  The sending device then stops sending data for a  while  This is particularly important where the sending device is capable of sending data  much faster than the receiving device can receive it     To enable the flow control on an Ethernet port  use the following command      e e een       port flow control PORTS  on   oe Enables the flow control on a specified port  enter a  ridge  off  E port number   default  off     The following is an example of enabling the flow control on the Ethernet port 25     SWITCH  bridge  show port 25    NO TYPE END STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER     25 Ethernet 2 Up Up Auto Full 1000  Off  Off Y    SWITCH  bridge    port flow control 25 on  SWITCH  bridge    show port 25    NO TYPE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER     25 Ethernet 2 Up Up Auto Full 1000 Y    SWITCH  bridge       Port Description    To specify a description of an Ethernet port  use the following command      e ees    port description PORTS Specifies a description of an Ethernet port   maximum    DESCRIPTION Bridge number of characters is 100     no port description PORTS Deletes a specified description of an Ethernet port        SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 7    9 2 7 1    SMC7824M VSW    CLI    Traffic Statistics    Packet Statistics    To display the traffic statistics of an Ethernet
115.  to agents     The following is how to configure SNMP   e SNMP Community   e Information of SNMP Agent   e SNMP Com2sec   e SNMP Group   e SNMP View Record   e Permission to Access SNMP View Record  e SNMP Version 3 User   e SNMP Trap   e SNMP Alarm   e Displaying SNMP Configuration   e Disabling SNMP    SNMP Community    Only an authorized person can access SNMP agent by configuring SNMP community  with a community name and additional information     To configure SNMP community to allow an authorized person to access  use the following  command      e e re    snmp community  ro   rw  Creates SNMP community   COMMUNITY  A B C D   OID  COMMUNITY  community name  Global       no snmp community  ro   rw   Deletes created community   COMMUNITY    You can configure up to 3 SNMP communities for each read only and read write     135    CLI    136    7 1 2    Management Guide  TigerAccess    EE    To display configured SNMP community  use the following command     a Y mn    Enable    show snmp community Global Shows created SNMP community        Bridge    The following is an example of creating 2 SNMP communities     SWITCH  config    snmp community ro public  SWITCH  config    snmp community rw private    SWITCH  config    show snmp community             Community List    Type Community Source OID  ro public  rw private    SWITCH  config       Information of SNMP Agent    You can specify the basic information of SNMP agent as administrator  location  and ad   dress that confirm its 
116.  using OAM func    unforced   forceA   forceB  Bridge i  ion   PORTS  oam remote system interval  lt 0   255 gt  PORTS  oam remote system mode   master   slave  PORTS  oam remote system reset  PORTS    7 2 5 Displaying OAM Configuration    To display OAM configuration  use the following command     rowo    Shows remote OAM variable   0 255  branch number  0 255  leaf number    show oam remote variable  lt 0   255 gt   lt 0 255 gt  PORTS    Shows remote OAM specific variable   0 255  branch number  0 255  leaf number    0 4  instance number    show oam remote variable spe   cific  lt 0 255 gt   lt 0 255 gt   lt 0 4 gt   PORTS       The following is an example of enabling OAM loopback via port 2 of the switch and per   forming remote loopback     SWITCH  bridge   oam local admin enable 2  SWITCH  bridge   oam remote loopback enable 2  SWITCH  bridge   show oam local 2   LOCAL PORT 2     item value  admin ENABLE  mode ACTIVE  mux action FORWARD  par action DISCARD  variable UNSUPPORT       SMC7824M VSW 151    CLI    152    Management Guide  TigerAccess    EE    link event   UNSUPPORT  loopback   SUPPORT  disable   uni direction   UNSUPPORT  disable     SWITCH  bridge    show oam remote 2  REMOTE PORT  2        item value  mode ACTIVE  MAC address 00 qd0 cb 27 00 94  variable UNSUPPORT  link event UNSUPPORT  loopback SUPPORT  enable   uni direction UNSUPPORT       SWITCH  bridge   oam remote loopback start 2  PORT 2   The remote DTE loopback is success   SWITCH  bridge          7
117.  without any modification   code  lt 1 254 gt  policy  lt keep   Global l  Ge replace  deletes the DHCP messages option and adds  replace  j the snooping default option if both of them are same     However  if they are different each other  replace op   tion just adds the snooping default option     no ip dhcp snooping default  Removes the DHCP snooping default option for a  option code  lt 1 254 gt  given port     DHCP User Class ID       The switch can send the packets based on the policy or value of DHCP user class ID in  the DHCP message sent by the client  The user class ID on DHCP option 77 field identi   fies the type of client sending the DHCP Discover Request message     If switch receives DHCP message from a client  it forwards the same packet to the server  with keep policy of DHCP option 77  Otherwise  it adds user class ID to the packet on the  configured port and forwards it to the server when the packet has no user class ID and  the policy of DHCP option 77 is replace  DHCP server can use DHCP option 77 field to  specify IP addresses of a particular pool based on user class ID of DHCP client     To use DHCP option 77 fucntion  DHCP snooping must be enabled in the system of  switch  In case DHCP snooping is disabled in the system  the configured DHCP option 77  is automatically deleted     To configure a user class id of DHCP option 77 on a specified port  use the following  command      e e een       ip dhcp snooping user class id Global Configures DHCP user cl
118. 0 EMC    System Memory Information    To display a system memory status  use the following command      e e See    show memory   show memory   Enable   Shows system memory information       Shows system memory information     memory information     show memory   dhcp   imi   lib   Global Shows system memory information with a specific  nsm  Bridge option        Running Process    The switch provides a function that shows information of the running processes  The in   formation with this command can be very useful to manage the switch     To display information of the running processes  use the following command     a Y en    show process Shows information of the running processes        The following is an example of displaying information of the running processes     SWITCH  show process          USER PID  SCPU SMEM VSZ Roo  ELY STAT START TIME COMMAND   admin 1 E 0 2 1448 S92 F S 20712 0105   LATE  3    admin 2 Oi 30 0 0 0 O   S 20 12 0 00  keventd    admin a Diech 0170 0 ar E SN 20 12 0 00  ksoftirqd  CPUG   admin 4 0 0 540 0 D 2 S 20 12 0 00  kswapd    admin 5 0 0 0 0 O EE  Ze S 20 12 0 00  bdflush    admin 6 0 0 0 0 0 Os 2 S 20 12 0 00  kupdated    admin 7 Oj 0 ER 0 O    S 20 12 0 00  mtdblockd   admin 8 0 0 0 0 0 0  2 SW lt  20 12 0 00  bcmDPC    admin 9 1 4 0 0 0 0O   SW lt  20 12 0 29  bcmCNTR O0   admin ER 1 4 0 0 0 O   SW lt  20 212   0229   BOmeNTR  1   admin t7 0 0 0 70 0 Ok E SWN 20212  HESE   LCE ged meda   admin 149 0 0 0 3 1784 FIG  2 S Jan01 0 00  sbin syslog
119. 1 130  Instance 3 VLAN 131 140  Region Name test             Revision  1  Router    Fig  8 28           Management Guide  TigerAccess    EE       MST Region 2   Instance 1 VLAN 170  Instance 2 VLAN 180 190  Instance 3 VLAN 191 195  Region Name test  Revision  2                MST Region 3   Instance 4 VLAN 150 160  Instance 5 VLAN 161 165  Lee eon Name   sample                Sa   sion  5  MST Region 4    Region Name   test  Revision  1             VLAN 101   200    Example of Layer 2 Network Design in MSTP Environment    The following is an example of configuring MSTP in the switch     SWI  SWI  SWI  SWI  SWI  SWI  SWI  SWI  SWI       TCH  bridge    spanning tree    TCH  bridge    spanning tree mode mst    TCH  bridge    spanning tree mst configuration  TCH  Gonfig   mst       TCH  TCH    conti    g mst       TCH  contig mst     TCH  config mst                          config mst                         instance 2 vlan 1 50  name test   revision 1   apply   exit    TCH  bridge    show spanning tree mst configuration    name    revision    instance vlans    test    51 4094  LeU    SWITCH  bridge       SMC7824M VSW    Management Guide  TigerAccess    EE    8 4    8 4 1    SMC7824M VSW    CLI    Ethernet Ring Protection  ERP     The ERP is a protection protocol for Ethernet ring topology to prevent Loop from a link  failure or recovery  It is designed to minimize the time for removing Loop within 50 milli   seconds while there is an enormous amount of traffic flow in Metro Ethe
120. 1 8 DNS oe nae en are aes 116  SE H ARQ CV AO EE 117  6 1 10 Disabling Daemon  Operation    117  GEN WR GN e EE 117  6 1 12 FTP Client Address E 118  6 1 13 System  elen ee DEE 118  ida GPU Lodi ideal 118  ORIS 2   PON Tramo ias 119  SEN KE FARO DCR EE 119  6 1 13 4 System Temperature    120  EE AN 120  6 1 13 6 SFP Module  optional uplink oort   cc ceeccceseeeeeeeeeeeeseeeeeeeseeeeeeseeeeesaees 121  6 2 Configuration Management 123  6 2 1 Displaying System Confguraton  123  6 2 2 Writing System Configuration        ccccoonncncocccnnoconnnnccnnncnnonononnononnononnncnnononons 123  p29 A e egret eee eee ee 124  6 2 4 System Configuration Eie   124  6 2 5 Restoring Default Contguraton     125  6 3 System Management    126  6 3 1 Network Connect as 126  632 IPICMP  S0  rce Routing sisi llano 128  69 3  Macing Fackel ROUE EE 129  6 3 4 Displaying User Connecting to System     oocccooncnncccccnconoconcononcnnononcnnnnnanonos 130  OSS MAC Ta      an a E E Meee ee 131  6 360 TRUANING TIME Of Syste  ii ii 131  6 027 System JEE zsa a laa eceaste  131  6 3 8 System Memory Information        cccccconnnnccconcnnononcnncnnnnnnonononnononnnnconanennnnanens 132  6 39  RUNNING Gi ee 132  6 3 10 Displaying System Mage inicio cd 133  6 3 11 Displaying Installed Oz    133  6 0 12  Default eege 133  oo ern E ltda daa 133  6 3 14 Tech Support Information            nannannnannnennnnnnnsennnennnnnrnnnrnnnrrnrrnrnrrnnrrserrene 134  6 3 15 System Boot formator DEE 134  7 Network ManagQeme nt        
121. 10  3 11  5 1  9 2  9 3  9 4  9 0  9 6  9    9 8  5 9  6 1  6 2  6 3  6 4  7 1  7 2  7 3  8 1  8 2  8 3    Management Guide  TigerAccess    EE    OVERVIEW of Ena  alista 19  Command Notation of Guide Book 20  Main Command of Privileged EXEC View Mode      occoocccccoccccccccncoccnccocononono  26  Main Command of Privileged EXEC Enable Mode           oananeennnennnnnnennnnnnnnnn 26  Main Command of Global Configuration Mode        occccoccccccccnccccnnccncnonononononos 27  Main Command of Bridge Configuration Mode        occccoccncccccnccccncccncnccononononos 28  Main Command of DHCP Pool Configuration Mode       ccococccccccncccccncccccncnnoo  28  Main Command of DHCP Option Configuration Mode 29  Main Command of DHCP Option 82 Configuration Mode 29  Main Command of Interface Configuration Mode        ooccconccconcccocnconnncconcnnnnos 30  The Commands of Rule Configuration Mode 30  Main Command of RMON Configuration Mode         ccoocccoccccocnncocccocnncncncnnnnss 31  Command Abbreviation              ccccccccccsecccceeeeeeeceeseeceeseeeeseeeeeseeeeseueesseeeesaeeeeas 35  Information displayed by Command  SNOW Ire  17  ROME OF V DSL PON iio oca 78  Option  Dand 0l VDSL POM SE 79  Value Of e ET Le d DEE 81  The frequency of PSD Level per band    83  The Value of PSD  Mask Level ricos dd 84  Bandwidth of Ham band Frequency    occcccoccncccnccnnccnnccnconononnononcnncnnnencononennnnnos 88  Sub commands in Bitloading Per TON            cccoccccccccncccccnconcncconononononononon
122. 115788 4 07  1008  CONFIG 4194304 663552 3530752  Total SITAS 136 27986802 9761934    SWITCH  reload  Do you want to save the system configuration   y nly    Do you want to reload the system   y nly  Broadcast message from admin  ttyp0   Fri Aug 18 15 15 41 2006  0000      The system is going down for reboot NOW     10 2 Boot Mode Upgrade    In case that you cannot upgrade the system software with the general upgrade procedure   you can upgrade it with the boot mode upgrade procedure  Before the boot mode up   grade  please keep in mind the following restrictions     e A terminal must be connected to the system via the console interface  To open the   N boot mode  you should press  lt S gt  key when the boot logo is shown up   e The boot mode upgrade supports TFTP only  You must set up TFTP server before  upgrading the system software in the boot mode   e  n the boot mode  the only interface you can use is MGMT interface  So the system  must be connected to the network via the MGMT interface   e All you configures in the boot mode is limited to the boot mode only     To upgrade the system software in the boot mode  perform the following step by step in   struction     Step 1  To open the boot mode  press  lt S gt  key when the boot logo is shown up     KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK    Ka Ka    Boot Loader Version 5 43 S  KR SMC networks Inc  S  Ka Ka    kk kk kk kk kk kk Ek kk kk kk kk kk kk kk Ek kk kk kk kk kk kk kk Ek kk kk kk    Press  s  ke
123. 2 2        vlan pvid 3 3  SWITCH  bridge    vlan pvid 4 4            show vlan             u  untagged port  t  tagged port    Name   VID  FID   123456789012345678901234567890123    default   IN 1   u   uuuuuuuuuuuuuuuuuuuuuuuuuuuuu  br2   2   St Lat   ons  secs  eeh Sena  Sains  a Sans  Sans  Sans  bes  PES 3   A EK  br4   4   4    O    SWITCH  bridge       Sample Configuration 2  Deleting Port based VLAN  The following is deleting br3 among configured VLAN     SWITCH  bridge   vlan del br3 3  SWITCH  bridge    exit  SWITCH  config    interface br3  SWITCH  interface    shutdown   SWITCH  interface    exit  SWITCH  config    bridge  SWITCH  bridge    no vlan br3  SWITCH  bridge    show vlan          u  untagged port  t  tagged port    Name   VID  FID   123456789012345678901234567890123    default   1   1   u    UUUUUUUuuuuuuuuuuuuuuuuuuuuuu  DEZA 2   2  DAA A P EI eee daeeecs  br4   4   4  lio o ata a o bb a Das    SWITCH  bridge       Sample Configuration 3  Configuring Protocol based VLAN  The following is an example of configuring protocol based VLAN on the port 2 and port 4     247    CLI    248    Management Guide  TigerAccess    EE    0x800 packet among 0x900 packet among  the packets entering the packets entering to  to Port 2 Port 4       SWITCH  bridge    vlan pvid 2 ethertype 0x800 5  SWITCH  bridge    vlan pvid 4 ethertype 0x900 6  SWITCH  bridge    show vlan protocol    Ethertype   VID  123456789012345678901234567890123    0x0800 AR  0x0900 O D  SWITCH  bridge   
124. 2 forwarding table for the destination address  Multicast addresses  never appear as source addresses  therefore the switch cannot dynamically learn multi   cast addresses  This multicast flooding causes unnecessary bandwidth usage and dis   carding unwanted frames on those nodes which did not want to receive the multicast  transmission  To avoid such flooding  IGMP snooping feature has been developed     The purpose of IGMP snooping is to constrain the flooding of multicast traffic at Layer 2   IGMP snooping  as implied by the name  allows a switch to snoop the IGMP transaction  between hosts and routers  and maintains the multicast forwarding table which contains  the information acquired by the snooping  When the switch receives a join request from a  host for a particular multicast group  the switch then adds a port number connected to the  host and a destination multicast group to the forwarding table entry  when the switch re   ceives a leave message from a host  it removes the entry from the table     By maintaining this multicast forwarding table  the switch dynamically forward multicast  traffic only to those interfaces that want to receive it as nominal unicast forwarding does     Multicast Packet                 2  Forward the multicast traffic  to the port on which the join  message is received    Multicast Router    1  Request the  multicast traffic    Fig  9 2 IGMP Snooping    SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 2 1    9 2 2 2    SMC7824M 
125. 20    6 1 13 4    6 1 13 5    Management Guide  TigerAccess    EE    When you set the threshold of fan operation  START TEMP must be higher than STOP   TEMP     To show the configured threshold of fan operation  use the following command      e e ee         Shows the status and configured thresh   show status fan Enable Global Bridge    old of fan operation     System Temperature    To set the threshold of system temperature  use the following command     Command Mode Description    Sets the threshold of system temperature in the unit of    threshold temp  lt  40 100 gt  centigrade    C      SE  40 100  system temperature  default  80     no threshold temp Deletes a configured threshold of system temperature        To show the configured threshold of system temperature  use the following command     nn e ets    Enable  Shows the status and configured threshold of system  show status temp Global i i  emperature   Bridge P       System Memory    To set the threshold of system memory in use  use the following command      e me Se    Sets the threshold of system memory in the unit of    threshold memory  lt 20 100 gt  percent       Global    20 100  system memory in use    no threshold memory Deletes the configured threshold of system memory        SMC7824M VSW    Management Guide  TigerAccess    EE    6 1 13 6    SMC7824M VSW       CLI    SFP Module  optional uplink port     The system module will operate depending on monitoring type of temperaturem  RX TX  power  voltage or Txb
126. 25 gt  1 25  maximum response time  default  10 seconds   ip igmp snooping vlan VLANS Global e e  i f Specifies a maximum query response time   querier max response time  lt 1   dE VLANS  VLAN ID  1 4094    gt     To delete a specified maximum query response time  use the following command      e Y See    no ip igmp snooping querier       max response time  no ip igmp snooping vlan Global Deletes a specified maximum query response time     VLANS querier max response   time       Displaying IGMP Snooping Querier Information    To display IGMP querier information and configured parameters  use the following com   mand      e e re    Enable  show ip igmp snooping  vlan ae Shows IGMP querier information and configured pa   oba  VLANS  querier  detail  rameters   Bridge       IGMP Snooping Last Member Query Interval    Upon receiving a leave message  a switch with IGMP snooping then sends out a group   specific  IGMPv2  or group source specific query  IGMPv3  message to determine if  there is still any host interested in receiving the traffic  If there is no reply  the switch stops  forwarding the multicast traffic  However  IGMP messages may get lost for various rea   sons  SO you can specify an interval to send query messages     To specify an interval to send group specific or group source specific query messages   use the following command      e e re    bn Specifies a last member query interval   ip igmp snooping last member     i 100 10000  last member query interval  query 
127. 3  00 24    GCOMPALDINITY WIT  COZ LEE 266  38 393  MOT  Operation scent ovo el is eee eee ee ee 266  o OR EE 267  8 3 4 Enabling STP Function  Required         oocccccoooccncoconcnnconononononcnnononcnnnonanonoos 268  8 3 5 Configuring MSTP PVSTP Mode    ooccccccocccccccoccnccoccocccnoconcnnonononnoncnncnnanons 269  6 9 6  STP Basic CONMNGQUPATON ci id 269  EE   Ralmecost Metu ii 269  O 270  8309    BRO  ans MU leie COMME a 271  o A Led E 271  89300 CLINI VG seat te tae ee Ee 212  9  3 0 0    Displaying COM qUe 272  93 7 e et ellene MO EE 273  o ele e EE 273  RA A 273  o ES POROY seian a Podesta cadacs  Powis uatseraamrasnts 274  0 314    MST REGION EE 274  6 3 7 0  Enabling  dE Ge ele Ee TE 276  8 3 7 6 Displaying Configuration                ccccccceecceeeeeeeeeseeeeeeeeeeeeaeeeeesaeeeesaeeeesaneeesaees 276  9 90      COMMGUMIN GP VS TR  ii iaa  277  Soo  Enab PYS TE tdi do 217  8382 RI e seca te eee ae aie tt eee es 278  o o nn a 278  9994  ROTTEN Nando ii 279  Sc    Displaying CONT UA ION as 279  839 O A SEET 280  8 3 10 Restarting Protocol Mioraton  281  90 39 11    LOOP Back Detection isena o ee 281  8 0212     BPDOU  COMNGUATION ri 282  A E e TNO EE 283  A BA E E E 283  E NK MIKAGE aa ante a a e aE a Pate  284  83124 BRDU Hop COIN o O a daa 284  99129    DROW RINGING EE 285  8 3120 DEDICA eee es ce ee ee ae a 285  8 39 19 Sample Configura ON secas ld 287   8 4 Ethernet Ring Protection  ERD     289  SAT ERP Mechanis Msc let de 289  84 2 Loss of Test Packet  LOTP EE 293
128. 36    8 6 10    8 6 10 1    8 6 10 2    Management Guide  TigerAccess    EE    DHCP Filtering    DHCP Packet Filtering    For the switch  it is possible to block the specific client with MAC address  If the MAC ad   dress blocked by administrator requests an IP address  the server does not assign IP ad   dress  This function can provide the security of DHCP server     Not to assign IP address for specific client of a port  use the following command      ze e Se    ip dhcp filter port PORTS Sua Configures a port in order not to assign IP address   oba  no ip dhcp filter port PORTS Disables DHCP packet filtering        Not to assign IP address for specific client with a specific MAC address  use the following  command      e mee        Blocks a MAC address in case of requesting IP ad   ip dhcp filter address MAC  d  ress     Global MAC ADDR  client s MAC address    no ip dhcp filter address l o  Disables DHCP MAC filtering   MAC ADDR    DHCP Server Packet Filtering    ADDR       Dynamic Host Configuration Protocol  DHCP  makes DHCP server assign IP address to  DHCP clients automatically and manage the IP address  Most ISP operators provide the  service as such a way  At this time  if a DHCP client connects with the equipment that can  be the other DHCP server such as Internet access gateway router  communication failure  might be occurred     DHCP filtering helps to operate DHCP service by blocking DHCP request which enters  through subscriber s port and goes out into uplink po
129. 64  MSTP instance ID number     Shows information of MSTP instance for specified port   1 64  MSTP instance ID number     Shows information of the region configuration   digest  MD5 digest included in the current MSTCI    Shows a summary of a specific MSTP instance   totals  the total lines of MSTP       SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 8    8 3 8 1    SMC7824M VSW    CLI    Configuring PVSTP    STP and RSPT are designed with one VLAN in the network  If a port becomes blocking  state  the physical port itself is blocked  But PVSTP  Per VLAN Spanning Tree Protocol   and PVRSTP  Per VLAN Rapid Spanning Tree Protocol  maintains spanning tree in   stance for each VLAN in the network  Because PVSTP treats each VLAN as a separate  network  it has the ability to load balance traffic by forwarding some VLANs on one trunk  and other VLANs  PVRSTP provides the same functionality as PVSTP with enhancement     VLAN 3 NN  VLAN 1  Yo  Switch A  witch D  Switch    Z           VLAN 2    Switch C       Fig  8 25 Example of PVSTP    To configure PVSTP  use the following steps     Step 1  Enable STP function using the spanning tree command     Step 2  Decide PVSTP mode using the spanning tree mode rapid pvst command     Step 3  Enable PVSTP function using the spanning tree vlan VLANS command     Step 4  Configure detail options if specific commands are required     Enabling PVSTP    To enable PVSTP function  use the following command      e e O         Activates PVSTP 
130. 7824M VSW    CLI    Configuring Interface    The Layer 2 switches only see the MAC address in an incoming packet to determine  where the packet needs to come from to and which ports should receive the packet  The  Layer 2 switches do not need IP addresses to transmit packets  However  if you want to  access to the switch from a remote place with TCP IP through SNMP or telnet  it requires  an IP address     You can enable the interface to communicate with another network device on the network  by assigning an IP address as follows    e Enabling Interface   e Assigning IP Address to Network Interface   e Static Route and Default Gateway   e Interface Description   e Displaying Interface    Enabling Interface    To assign an IP address to an interface  you need to enable the interface first  If the inter   face is not enabled  you cannot access it from a remote place  even though an IP address  has been assigned     To configure an interface  you need to open  nterface Configuration mode first  To open  Interface Configuration mode  use the following command     n   See    Global Opens Interface Configuration mode to configure a  interface  NTERFACE ae  Interface specified interface     To enable disable an interface  use the following command     IC EC O  Interface    To enable disable an interface in Global Configaration mode  use the following command     na me ees          interface noshutdown  NTER   Enables an interface   FACE Global    interface shutdown  NTERFACE Disable
131. 8   1100 default  4 1108   2000 default  5 2008   3000 default  6 3008   3750 default  d 3758   4500 default  8 4508   5200 default  9 5208   7000 default  10 7008   8500  60 0    SMC7824M VSW 83    CLI    84    9 3 2 6    9 3 2 7    Management Guide  TigerAccess    EE    ET 8508   12000 default  12 12008   16700 default  d 16708   17600 default  14 17608   18100 default  15 18108   30000 default                SWITCH  bridge       PSD Mask Level    To configure PSD Level  use the following command      eg e See       Ire PORTS psd mask level  01 1  2  3  4  5 6 Brid Configures PSD Mask Level in VDSL  ridge   7 8 9  10 11 12 13 143 S line     PSD Level is basically configured as Default     a ECG  icons O  maen  O ens Jo  ens  sons   n O so    secas    O oa  ni er e l a  Oo e f mme CI meer  nex    Tab  5 6 The Value of PSD Mask Level       If you configure PSD MASK Level of VDSL line  it is applied to all ports     Interleave    There is Interleave process to correct data error before modulation digital signal into ana   log signal  Interleave gathers certain size of data  re organize the gathered data  and  transmit the data divided by certain size  In the below image  you can see disperse errors  by re organizing gathered data through Interleave     By the way  Interleave prevents error by enhanced correction but may slow down transmit  rate because packets are gathered  Therefore you need to consider user   s condition to  configure mode  On the other hand  if you skip Int
132. 8 1 4 Subnet based VAN 238  91o  Tagged VELAN A a ee aes 238  BAO  VEAN DESCHPUON siora eege aa 239  GEN E NEAN ee En e EE 240  8 1 8 Displaying VLAN Information           ooonncnccconcncococcnnconocononononnnnnnnnnconanoncononons 240  Silo IMD 241  8 1 9 1 Double Tagging COperaton  ae aa a E a a 242  8 1 9 2 Double Tagging Configuration          ccoconcccccoccncononcnononnnnononononnnnnnononenonnnrincnnens 242  Ge     TRIDSGOMMGUIAU ON cities  catia Ee 243  SMO ay Cl 2 SO ON EE 243  E WR EN WE a WLAN wt ae ce ea ee 244  Sra VEAN TASA bee ee ey i near eo ne eet ee 246  6 1 12 Sample Contigua Mt nien ineei a a aa E E E 246  O2     EINK AO GlSC AMA nea ita 251  002 1  Geleet H ln  EE 251  8 2 1 1   Configuring Port nu 251  822 IDISADING MH OF  Ne Te 252  8 2 1 3 Displaying gl OF Gi RE 252  8 2 2 Link Aggregation Control Protocol  LACH     252  9221 EE ee te Meier 253  0 222  Operation lee 254  A EIERE edd 254  G2 24     Manual AOS Da acti iel ee a A aera eee  254  8 2 2 5  BPDU Transmission E 255  922 0  e elle tational KEY ua a aes 255  0224  PORC PONY Aere 256  8 2 2 8 Displaying LACH Configuration               cccccccccseeeeeceeeeeeaeeeeecaeeeeeeeeeeesaeeeeesaaees 256    11    CLI Management Guide  TigerAccess    EE    6 3     Spanning Tree Protocol  STP  BE 257  Sec SCHEIER  ee a eeh 258  02  HE EE eg de EE 262   8321  A a a a aie aie a iS Gees 262  A IBRD e EE 263  8 3 2 3 Rapid Network Convergence   oocccccoccccccoococonoconononcononnnnonononononnnnnnnnnnrnnonaninnnas 26
133. A A ASE www smc asia comS   VsStAlI  BHEL C  INTERNET   E mail address  techsupport smc com    Driver updates  http   www smc com index cfm action tech_support_drivers_downloads    World Wide Web  http   www smc com        20 Mason   Irvine  CA 92618   Phn   949  679 8000 e www smc com    
134. A the number of packets matching the rule in  counter  octet   packet   Policer octet unit or packet unit       Disables a packet counter function    a   Disables a packet counter function    counter function        The switch cannot display how many packets are actually dropped by rule configuration   However  you better know the number of packets that are dropped by rule configuration  even if these packets are attackable or unnecessary for the packet management  To solve  this problem  switch adds the feature that transmits the dropped packets to null port and  monitors them  These packets on null port are eventually eliminated from the network     To count a number of dropped packets  use the following command    gr eme    A   Sends the dropped packets to Null port for the packet  action match redirect blackhole Policer i  counter    To reset a collected policy counter  use the following command      e mae    Enable  clear policy counter   NAME   all  Global Resets a collected policy counter           Bridge    To display the number of packets on each rule  use the following command      e me    show class statistics   class statistics Enable   Shows a collected class counter    Shows a collected class counter  collected class counter   Ee   show policer statistics   statistics Global   Shows a collected policer counter    a collected   Shows a collected policer counter    counter       show policy statistics     show policy statistics   statistics      Shows a collected 
135. AN NAMBE     clear ip dhcp authorized arp invalid  ip dhcp leasedb A B C D M  clear ip dhcp leasedb all    clear           Omitted     SMC7824M VSW 41    CLI    42    Management Guide  TigerAccess    EE    The commands starting with the same character are applied by inputting only the starting  commands  For example  if you input show  all the commands starting with show are  applied  To delete a configured security level  use the following command     E Deletes all configured security lev   no privilege i  els     no privilege view level  lt 0 15 gt   COMMAND   all     no privilege enable level  lt 0 15 gt   COMMAND    all     no privilege configure level  lt 0 15 gt   COM   MAND   all     no privilege interface level  lt 0 15 gt   COMMAND    all     no privilege  flow   policer   policy  level  lt 0   15 gt   COMMAND   all     no privilege bridge level  lt 0 15 gt   COMMAND    all     no privilege rmon alarm level  lt 0 15 gt   COM  Global    Delete a configured security level on  MAND   all     each mode   no privilege rmon event level  lt 0 15 gt   COM     MAND   all    no privilege rmon history level  lt 0 15 gt   COM   MAND   all    no privilege dhcp pool level  lt 0 15 gt   COM   MAND   all    no privilege dhcp pool class level  lt 0 15 gt    COMMAND   all    no privilege dhcp option82 level  lt 0 15 gt    COMMAND   all     no privilege dhcp class level  lt 0 15 gt   COM   MAND   all        To display a configured security level  use the following command     show priv
136. Access List  7 12 3 2 Enabling ARP Inspection Filtering  7 12 3 3 ARP Address Validation  7 12 3 4 ARP Inspection on Trust Port  7 12 3 5 ARP Inspection Log buffer  7 12 3 6 Displaying ARP Inspection    7 12 4 Gratuitous ARP    7 12 5 Proxy ARP  7 13 ICMP Message Control    7 13 1 Blocking Echo Reply Message  7 13 2 Interval for Transmit ICMP Message    7 14 TCP Flag Control    7 14 1 RST Configuration  7 14 2 SYN Configuration  7 15 Packet Dump  7 15 1 Packet Dump by Protocol  7 15 2 Packet Dump with Option  7 15 3 Debug Packet Dump    7 16 sFlow Monitoring    Management Guide  TigerAccess    EE    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI   716 1     SFIOW SERVICE EE 230  Pi VO    PROCITE ele 230  ent E Enabling Sr IOW ON FON AR 231  7 16 4 Maximum IP Header Gre  231  CAOS OIM e EE 231  eh Sample EE 231  1 16 7 Configuring Receiver E 232  IGT    RECO ID ee EE 232  7 16 7 2 Collect IP address and port    232  LAGT  Maximum Datagram SiZe cc 232  7 16 7 4 Owner Name of sFlow Hecenver  232  LAOTI  MMS AN AAA AR 233  116 9 Receiver INdox to ciales 233  1210 9  E EE e Le e 233  8 System Main Functions     oooccoccccncccnccnnccanccanccancnnncancnancnancnnncancnanenans 234  8 1 Virtual Local Area Network  VAN   234  Ole  Gel   e Ee VEAN carac 235  Stbl   Creating VLAN WE 236  SEZ    SD SCI VIG EVID eener ee eg 236  Solio  ASSIGNING PORTO VELAN EE 236  SA     Deleting EAN EEN 236  01 2  e te ee E En VLAN dc ip ee 231  Galo   MAC Dased VIANA ias 237  
137. BAND NO     To confirm disabled Ham band  use the following command     es e ses       show Ire ham band  PORTS  Enable Global Bridge Shows disabled Ham band        You can configure plural Ham bands  up to thirteen bands  For example  if you input  band  band2  band3 in order  then three Ham bands     87    CLI Management Guide  TigerAccess    EE    The following table shows bandwidth of Ham band frequency     tenet mmm mme  e mee emeng   e me mer  SSC  mere    band20 28 000   29 100 ETSI  28 000   29 700 ANNEX F  ETSI  T1E1    Tab  5 7 Bandwidth of Ham band Frequency       The following is an example of disabling Ham band 1 and Ham band 3 of VDSL port 1  and 2     SWITCH  bridge    lre 1 2 ham band bandl band   SWITCH  bridge    show lre ham band 1 4  Port Status HAM Band  ADM OPR 1  2  3  4  5  6  7  8  9  10 11  12 13 14 15  16 17  18  19 20  21    1 HescPeser HI oth E LA Ek EG kr dd do  2 Up Down 11 131 1 1 4 4 E F t DeFa It  3 o Downe   A  Ab EZ ALR EE RE O e E cal O OS    4 UpyPown  oth tt Wh fe ot Wh  dk FE oth E kk bd  SWITCH  bridge       5 3 2 11 SNR Margin    In digital and analog communication  SNR Signal to Noise Ratio  ratio of signal divided by  noise  When the signal strength is referred as Vs and the noise strength is referred as Vn   the formula can be  SNR dB    20 log10 Vs Vn   When the signal strength is same    88 SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    with or less than the noise strength  stable communication cann
138. CH  bridge    show port 25    NO TYPE PY LD STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER   23 Ethernet 2 Up Up Auto Pul1 10   OTE OEL Y    SWITCH  bridge       Duplex Mode    Ethernet operates in either half duplex or full duplex mode  In full  duplex mode  frames  travel in both directions simultaneously over two channels on the same connection for an  aggregate bandwidth of twice that of half duplex mode  Full duplex networks are very effi   cient since data can be sent and received simultaneously     To set the duplex mode on an Ethernet port  use the following command      e e een    Sets full duplex or half duplex mode on a specified  port duplex PORTS  full   half   port  enter a port number        The following is an example of setting the duplex mode on the Ethernet port 25 to half   duplex mode     SWITCH  bridge    show port 25  NO ICE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER     25 Ethernet 2 Up Up   Aut  FullJ1000 Off  Off Y    SWITCH  bridge    port duplex 25 half  SWITCH  bridge    show port 25    NO TYPE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER     25 Ethernet 2 Up Up  Autd Half  f1000 off  Off y    SWITCH  bridge       69    CLI    70    9 2 9    9 2 6    Management Guide  TigerAccess    EE    Flow Control    In Ethernet networking  the flow control is the process of adjusting the flow of data from  one network device to another to ensure that the receiving device can handle all of the in   coming data  For
139. CH  load ftp 172 16 232 1  Connected to 172 16 232 1    220 FTP Server ready    Name  172 16 232 1 root   anonymous  331 Password required for anonymous   Password  anonymous da san com   230 User ga logged in    Remote system type is UNIX     Using binary mode to transfer files     Step 2  Store system image file as CPE of this switch by using the following command      e e Se       get FILENAME Ftp Stores system image file as CPE of this switch     To download as binary mode  input    bin    command and input    hash    command to  download as hash mark  The following exemple shows how to store CPE file     ftp gt  bin   200 Type set to I    ftp gt  hash   Hash mark printing on  1024 bytes hash mark     ftp gt  get cpe   local  cpe remote  cpe   200 PORT command successful    150 Opening BINARY mode data connection for cpe  464228 bytes    FERIA E E E E H H H H  HHH TEE HEE EE E EE HOE E E E E E E E E dd TE TE TE TE TE TE TE TE dt TE FE TE TE TE FE FE FE FE FE FE FE FE FE HE HE HE E HE H H H E E E E E E H H H    ddi HH TH dd dd HE dt dt OE OEE OEE dt SEE   226 Transfer complete    464228 bytes received in 0 secs  1600 Kbytes sec    ftp gt     Step 3  After exiting from FTP  change the name of system image file of CPE in stored in this  switch into name of configured single file     To change into the name of single file   please use the following command      e e       store cpe nos FILENAME Stores system image file in CPE     103    CLI Management Guide  TigerAccess    EE 
140. D SD  amp  LE    Subnet 1 Subnet 2        PC  DHCP Client    Fig  8 35 Example of DHCP Relay Agent    To activate deactivate the DHCP function in the system  use the following command     II   e O  service dhcp E Activates the DHCP function in the system   lobal  Deactivates the DHCP function in the system     Before configuring DHCP server or relay  you need to use the service dhcp command  first to activate the DHCP function in the system        no service dhcp    DHCP Helper Address    A DHCP client sends DHCP_DISCOVER message to a DHCP server  DHCP_DISCOVER  message is broadcasted within the network to which it is attached  If the client is on a  network that does not have any DHCP server  the broadcast is not forwarded because  the switch is configured to not forward broadcast traffic  To solve this problem  you can  configure the interface that is receiving the broadcasts to forward certain classes of  broadcast to a helper address     315    CLI    316    8 6 4 2    8 6 4 3    Management Guide  TigerAccess    EE    To specify a DHCP helper address  use the following command      e me ees    Specifies a DHCP helper address  More than one ad     ip dhcp helper address A B C D dress is possible     Interface A B C D  DHCP server address    no ip dhcp helper address 8    Deletes a specified packet forwarding address    A B C D   all     If a packet forwarding address is specified on an interface  the switch will enable a DHCP  relay agent        You can also specify an org
141. DB  If the McFDB has the information for the traffic  the switch for   wards it to the proper ports  If the McFDB does not have the information for the traffic  the  switch learns the information on the McFDB  and then floods it to all ports  If the informa   tion is not referred to forward another multicast traffic during the given aging time  it is  aged out from the McFDB     SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 1 1    9 2 1 2    9 2 1 3    SMC7824M VSW       CLI    Blocking Unknown Multicast Traffic    When certain multicast traffic comes to a port and the McFDB has no forwarding informa   tion for the traffic  the multicast traffic is flooded to all ports by default  You can configure  the switch not to flood unknown multicast traffic  To configure the switch not to flood un   known multicast traffic  use the following command         ee e ee    ip unknown multicast Configures the switch not to flood unknown multicast   port PORTS  block traffic     Global  no ip unknown multicast  port Configures the switch to flood unknown multicast traf     PORTS  block fic   default     This command should not be used for the ports to which a multicast router is attached     Forwarding Entry Aging    To specify the aging time for forwarding entries on the McFDB  use the following com   mand      e me See    Specifies the aging time for forwarding entries on the  McFDB   10 10000000  aging time  default  300     no ip mcfdb aging time Deletes the specified aging 
142. Darton    Configures the IGMP snooping version globally   ip EEN snooping version  lt 1 EEN i    1 3  IGMP snooping version  default  3   Global    Configures the IGMP snooping version on a VLAN  ip igmp snooping vlan VLANS  interface     VLANS  VLAN ID  1 4094     version  lt 1 3 gt        To delete the specified IGMP snooping version  use the following command     AO G e    no ip   no ip igmp snooping version   snooping version    ip igmp snooping vian Global Deletes the specified IGMP snooping version   VLANS version       357    CLI    358    9 2 2 3    9 2 3    9 2 3 1    Management Guide  TigerAccess    EE    IGMP Snooping Robustness Value    The robustness variable allows tuning for the expected packet loss on a network  If a  network is expected to be lossy  the robustness variable may be increased  When receiv   ing the query message that contains a certain robustness variable from an IGMP snoop   ing querier  a host returns the report message as many as the specified robustness vari   able     To configure the robustness variable  use the eS command     ip igmp snooping robustness   Configures the robustness variable   default  2   variable  lt 1 7 gt   Global    ip E snooping vlan VLANS   the robustness variable on a VLAN     E  lt 1 7 gt  VLANS  VLAN ID EE  4094        To delete a specified robustness variable  use the following command      e e een    no ip igmp snooping robust     ness variable E  Deletes a specified robustness variable     ip Fh tection Mga sno
143. E 335  8 6 9 6 Requesting Option    335  8 6 9 7 Forcing Release or Renewal of DHCP Lease 335  8 6 9 8 Displaying DHCP Client Contouraton     335  8 610  DHCP EINEN EE 336  asomo  DACP Packet Fiten WE 336  8 6 10 2 DHCP Server Packet Filtering                     occccooococococnococononoconcnnocononcnnanononnns 336  96 11 Debugging DHG EE 337  0 7  Single IP Management siii EE 338  A El e EE 338  8 7 2 Designating Master and Slave Switch    339  8 7 3 Disabling StACKING ss 339  8 7 4 Displaying otacking Status  aia 339  8 7 5 Accessing to Slave Switch from Master Switch              ccccecceessseeeeeeeeeeeens 340  8 7 6  Sample GConniquration a A Ee 340  88  Jeer cis eee 342  0 97 FOOd GUA adan 343  89T    MAC ee EE Te ia opa 343    8 9 2 CPU Flood    E A A A 344    099  POreFlOOG 6UlArC a a o ct la 345    8 10 Storm Control    SMC7824M VSW    Management Guide CLI  TigerAccess    EE    0 11  JUMDO FFame Capac ant ieia AT aE 346  PA aelnas ta heiew van cules Me catectateueateet eieladd dh eceetuceeliitel 347  8 13 Maximum Transmission Unit  MI     347  9 IFP MUNG E 348  9 1 Multicast Group Membership      occooccccccccnconcconicociconoconoconoconononcnnncnnonons 349  GE E EEN 349  tt   Clearing IGMP Eonia id 350   OTe E A Be WEE 350   AS A no O tae 351  EZT IGMP Static JOM BE 352   9 1 ele 353  diz Multicast FUNCION Sd adi Ee 304  9 2 1 Multicast Forwarding Database   354  9 2 1 1 Blocking Unknown Multicast TraffiC            oooooccccccnnnccccconnnccnnconanccnnnonanccnnnnnno
144. EPLY 1 17  ICMP_ADDRESSREPLY    6  18    Tab  7 1 ICMP Message Type    The following figure shows simple ICMP message structure     0 7 15 16 31    8 bit Type 8 bit Code 16 bit Checksum        Contents Depend on Type and Code     Fig  7 16 ICMP Message Structure    It is possible to control ICMP message through user s configuration  You can configure to  block the echo reply message to the partner who is doing ping test to device and interval  to transmit ICMP message     223    CLI    224    7 13 1    7 13 2    Management Guide  TigerAccess    EE    Blocking Echo Reply Message    It is possible to configure block echo reply message to the partner who is doing ping test  to switch  To block echo reply message  use the ee command     Blocks echo ae message to all partners who are  ip icmp ignore echo all  taking ping test to device   Global    Blocks echo aaa message to partner who is taking  ip icmp 1P icmp ignore ocho broadeast 1P icmp ignore ocho broadeast   broadcast  aaa ping test to device        To release the blocked echo reply message  use the        o command     A blocked echo reply message to all partners  no ip icmp ignore echo all  who are taking ping test to device   Global    no ip icmp ee echo broad     Releases blocked echo  eremita ron message to partner who    ee is  eremita ron broadcast ping test to device        Interval for Transmit ICMP Message    User can configure the interval for transmit ICMP message  After you configure the inter   val  ICMP messa
145. G     Deletes specified option 82 information    for IP assignment     no relay information remote id text STRING   circuit id  hex HEXSTRING   index  lt 0 65535 gt     text STRING         SMC7824M VSW    Management Guide    CLI    TigerAccess    EE    8 6 2 4    8 6 2 5    8 6 3    8 6 3 1    SMC7824M VSW    To delete specified option 82 information for IP assignment  use the following command    en e    Deletes all specified option 82 informa   no relay information remote id all  DHCP tion that contains only a remote ID   Class    Deletes all MA option 82 informa   no roman roman all MA  ion        Associating DHCP Class    To associate a DHCP class with a current DHCP pool  use the following command     mana e Jn  Associates a DHCP class with a DHCP pool and opens  class CLASS DHCP Pool Class Configuration mode   DHCP Pool   CLASS  DHCP class name  Releases an associated DHCP class from a current  DHCP pool     Range of IP Address for DHCP Class    no TS TS       To specify a range of IP addresses for a DHCP class  use the following command     n   See    Specifies a range of IP addresses     address range A B C D A B C D  DHCP Pool   A B C D  start end IP address       no address range A DCD Class D  ADOD Deletes a specified range of IP addresses     A range of IP addresses specified with the address range command is valid only for a  current DHCP pool  Even if you associate the DHCP class with another DHCP pool  the  specified range of IP addresses will not be applicable
146. Guide  TigerAccess    EE    8 2 2 5    8 2 2 6    SMC7824M VSW    CLI    To configure member port to aggregate to LACP  use the following command       Mode   freie  lacp port aggregation PORTS Configures the property of a specified member port for  ridge     aggregatable   individual  LACP   default  aggregatable        To clear aggregated to LACP of configured member port  use the following command         Deletes the configured property of a specified member  no lacp port aggregation PORTS Bridge  port for LACP     BPDU Transmission Rate       Member port transmits BPDU with its information  For the switch  it is possible to config   ure the BPDU transmission rate  use the following command     n   ees    Configures BPDU transmission rate   lacp port timeout PORTS  short   PORTS  select the port number   long  short  short timeout  1 sec    long  long timeout  30 sec  default        To delete BPDU transmission rate  use the following command     Clears BPDU transmission rate of configured member  no lacp port timeout PORTS Bridge  port  select the port number    Administrational Key       Member port of LACP has key value  All member ports in one aggregator have same key  values  To make the aggregator consisted of specified member ports  configure the differ   ent key value with the key value of another port      e e re    Configures the key value of a member port   PORTS  select the port number   1 15  key value  default  1     lacp port admin key PORTS  lt 1   15 gt    
147. HCP Option82 Sub option    Entering DHCP Option Mode    To enter the DHCP option mode  use the following command            Enters the DHCP option mode   ip dhcp option format NAME Global l  NAME  DHCP option format name    SMC7824M VSW    Management Guide CLI  TigerAccess    EE    8 6 5 2 Configuring DHCP Option Format    To configure a DHCP option format  use the following command     INTI a O    attr  lt 1 32 gt  type  lt 0 255 gt  length Sets the type  length  and value of an attribute for a     lt 1 64 gt    variable  value  hex   DHCP option    index   ip   string  VALUE attr  They can be made in a DHCP option and are applied  in order of attribute value  1 32      type  The type of a value  attr  lt 1 32 gt  type  lt 0 255 gt  length     hidden   lt 1 64 gt    variable  value   hex   index   ip   string  VALUE    length  The length of a value  It could be a fixed length by  user input or a variable length according to the actual  value length     value  The actual value of an option    attr  lt 1 32 gt  length variable value DHCP   hex   index   ip   string  VALUE Option Sets the length and value of an attribute for a DHCP    attr  lt 1 32 gt  length  lt 1 64 gt  value option    hex   index   ip   string  VALUE  attr  lt 1 32 gt  length hidden vari     able value  hex   index   ip      string  VALUE  Sets the value of an attribute for a DHCP option    attr  lt 1 32 gt  length hidden  lt 1 64 gt     value  hex   index   ip   string   VALUE    DHCP   l  no attr  lt 1 32 
148. HH EE EH HEE EH HEE EH HEE EH HH OEE EE OEE EE OEE EH EE EE  tt tH HE EH EH HE HE HE HH EE EE HH EE EEE EH EE E E E HH EE HE EH H H   ttt EH HE HEH HH HE   226 Transfer complete    464228 bytes received in 0 secs  1600 Kbytes sec    ftp gt     105    CLI    106    9 3 9 4    Management Guide  TigerAccess    EE    Step 4  Exit from FTP server     ftp gt  bye  221 Goodbye   SWITCH     Step 5  After exiting from FTP  change the name of system image file of CPE stored in this switch  into the single file name     To change into the single file name  please use the following command      e EC Se       store cpe nos FILENAME Stores system image file in CPE     The following is and example to change the name of CPE files into single file name after  exiting from FTP     ftp gt  exit   221 Goodbye    SWITCH  store cpe nos CDe  SWITCH     Input the port number connected to CPE which is supposed to install system image     Step 6  Install the system image file to the CPE      e me rees         Installs the system image file to a CPE  which is con   cpe nos download PORTS Bridge  nected through a port     Step 7  Reboot the CPE in which new system image file is installed     Configuring AGC  Auto Gain Control     AGC is the function of lengthen the communication distance  By using this function  it is  possible to communicate in 140m  Therefore  it is better to use this function in the case  the distance from CPE to the user is over 100m  To enable AGC in CPE  use the following  command
149. HO ee a diia 185  7 6 4 5 Marking and Remarking WEE 185  7 6 4 6 Attaching a Policy to an interface       ocooonccccccccncccccnnononcnnnnonononnncnnononnnnnnaninnnns 190  7 6 4 7 Applying and Modifying Polen    190  COS  DISDIAVING RUNG vai ee ee ee 190  OO    AMIA RUI as is 192  7 6 6 1 Creating Admin Flow for packet classification                ccccceeseeeeeeeeeeeeeeeeeesaees 192  16 6 2 gt     Contiguring Admin  FIOW pi 193  7 6 6 3 Applying and modifying Admin Flow  194  LOGA   Class  CIEN ii 194  LOL    AUNAR AC EE 195  TO     Admin Ge le lO ias 195    CLI    10    1 1  7 8  7 9    7 9 1    7 6 7 2 Admin Policy Priority  7 6 7 3 Admin Policy Action  7 6 7 4   Applying and Modifying Admin Policy  7 6 8 Displaying Admin Rule  7 6 9 Scheduling Algorithm  7 6 9 1 Scheduling Mode  7 6 9 2   Weght  7 6 9 3 Maximum and Minimum Bandwidth  7 6 9 4 Maximum Buffer numbers  7 6 9 5 Queue Status  7 6 9 6 Displaying QoS  7 6 9 7 Weighted Random Early Detection  WRED     NetBIOS Filtering    Max New Hosts              ccccseceeeeeeeeees  POM e EE  Port Security on Port  7 9 2 Port Security Aging  7 9 3 Displaying Port Security  7 10 MAC Table  7 11 MAC Filtering  7 11 1 Default Policy of MAC Filtering  7 11 2 Adding Policy of MAC Filter  7 11 3 Deleting MAC Filter Policy  7 11 4 Listing of MAC Filter Policy  7 12 Address Resolution Protocol  ARP   7 12 1 ARP Table  7 12 1 1 Registering ARP Table  7 12 1 2 Displaying ARP Table  7 12 2 ARP Alias    7 12 3 ARP Inspection    7 12 3 1 ARP 
150. KEY value     no dotix radius server host    Deletes a registered RADIUS server    A B C D   NAME        You can designate up to 5 RADIUS servers as authentication server     The key option is authentication information between the authenticator and RADIUS  server  The authenticator and RADIUS server must have a same key value  and you can  use alphabetic characters and numbers for the key value  The space or special character  is not allowed     To set priority to a registered RADIUS server  use the following command       e e een    dot1x radius server move   A B C D   NAME  priority PRIOR  Global Sets priority to a registered RADIUS server   ITY       Authentication Mode    You can set the authentication mode from the port based to the MAC based  To set the  authentication mode  use the following command     a Y mn    dot1x  auth mode  mac base oo  Sets the authentication mode to the MAC based        no dot1x auth mode mac base  PORTS Restores the authentication mode to the port based     Before setting the authentication mode to the MAC based  you need to set a MAC filtering  policy to deny for all the Ethernet ports  To configure a MAC filtering policy  see Section  7 11 1     SMC7824M VSW    Management Guide  TigerAccess    EE    4 5 1 4    4 5 1 5    4 5 1 6    4 5 1 7    SMC7824M VSW    CLI    Authentication Port    After configuring 802 1x authentication mode  you should select the authentication port      ee e ee    dot1x nas port PORTS Designates 802 1x authenticat
151. KKKKKKKKKKKKKKKKKKKKKKKKK           Boot Loader Version 5 43 X    SMC Networks Inc  x         KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKEK    Press  s  key to go to Boot Mode  0    Load Address  0x01000000   Image Size  Ox00bac000   Start Address  0x01000000                                   Step 1  Step 2   console ttyS0 9600 root  dev ram rw Step 3   NOS version 5 01   CPU   MPC8245 at 264 MHz   Total Memory Size   256 MB   Calibrating delay loop    175 71 BogoMIPS   INIT  version 2 85 booting    Extracting configuration  password restore to default                      Step 4    Fri  03 Nov 2006 14 10 00  0000  INIT  Entering runlevel  3  INIT  Start  UP    Password     SMC7824M VSW 39    CLI    40    4 1 6    4 1 6 1    4 1 6 2    Management Guide  TigerAccess    EE    Management for System Account    Creating System Account    For the switch  the administrator can create a system account  And it is possible to set the  security level from O to 15 to enhance the system security     To create a system account  use the A command     SS MA a system account   user add NAME DESCRIPTION  NAME  user name  Global    user peter NAME level  lt 0 15 gt   peter    Creates a     account with a security level            user name    The account of level O to level 14 without any configuring authority only can use exit and  help in Privileged EXEC View mode and cannot access to Privileged EXEC Enable mode   The account with the highest level 15 has a read write authorit
152. L Port    In switch it is possible to check times of error from VDSL port every time interval  More   over  itis possible to check the error duration time     Checking Times of Errors    You can check how many times CRC errors  Frame loss and Signal loss are happened   Error is counted every 15 minutes after booting  After the time is over  the number is reset  to    0    and error is counted again  In addition  error is counted by each day  It is also reset  to    0    after the day  Consequently  you can check times of error  Curr 15m  at present    91    CLI    92    Management Guide  TigerAccess    EE    time from beginning of the 15 minutes and time of error  Prev  15m  of previous 15 min   utes  Also  you can check times of error  Today  at present time from starting Today  times  of error  Yesterday  of yesterday  and total times of error from booting  The following im   age shows standard of error counting provided in switch         Present Time    15min 15 min    1  A section     2  B section   Yesterday  3  C section   Today   4  D section   Prev  15m    5  E section   Curr  15m       Fig  5 4 Counting Times of Error    To display the number of errors in VDSL port  use the following command    Sen rs rem    Shows the numbers of CRC errors that  show Ire stat correctable crc PORTS  can be correctable    Shows the numbers of CRC errors that  show Ire stat uncorrectable crc PORTS  can be uncorrectable     To reset data of CRC error  Frame loss and Signal loss  use the 
153. LANS PORTS tagged VLANS  VLAN ID  1 4094   PORTS  port number       VLAN Description    To specify a VLAN description  use the following command      e e en    Specifies a VLAN description     vlan description VLANS DESC VLANS  VLAN ID  1 4094   DESC  description    no vlan description VLANS Deletes a specified description        239    CLI    240    8 1 7    8 1 8    Management Guide  TigerAccess    EE    To display a specified VLAN description  use the following command     a Y mn    Enable    show vlan description Global Shows a specified VLAN description        Bridge    VLAN Precedence    To make precedence between MAC address and Subnet based VLAN  you can choose  one of both with below command      e e een    e Configure precedence between MAC based VLAN and  vlan precedence  mac   subnet  Bridge  Subnet based VLAN     Displaying VLAN Information       User can display the VLAN information about Port based VLAN  Protocol based VLAN   MAC based VLAN  Subnet based VLAN and QinQ     a Y See    show vlan Shows all VLAN configurations     show vlan VLANS Shows a configuration for specific VLAN   show vlan description Enable Shows a description for specific VLAN     Global Shows QinQ configuration    Bridge Shows VLAN based on protocol   Shows VLAN based on MAC address   Shows VLAN based on subnet        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    8 1 9 QinQ    QinQ or Double Tagging is one way for tunneling between several networks   Customer A Customer A    
154. M VSW 13    CLI    14    Management Guide  TigerAccess    EE    86594  DisplayingiDACP coria a ii 319  S6 6  DACP ODOM Sloan 320  8 6 6 1 Enabling DHCP Option Bi  321    8 6 6 2 Option    SO EE EE 321    8 6 6 3 Option 82 Reforwarding Polen    322  9664    Optiom 62 Trust le 323  0 0 7 sDACP SMGO DING EE dE EE 323  867 1  Enabling DACP SNOOP Gar ica creed alee 324  90 1 2  DRACPTruStotalOsscsdcel rio iii eeu rene 324  80 9 DHCP Rate Elan EE 325  EEN DHCP Lease D E 325  8 6 7 5 Source MAC Address Verification               ccccccseeceeceeeeeeeeeeeeeeeeeeeseeeeeeseneeesaees 326  8 6 7 6 Static DHCP Snooping Bumdumg uk 326    8 6 7 7 DHCP  8 6 7 8 DHCP    Snooping Database Agent    326  o es ecu a ede eee ieee 327    AA A ia PP a te 328    8 6 7 10 DHCP    Snooping With Opti0N8Z            ooocccoccccconccconccnonncnonoconanonnnnccnnnconaninnnans 329    8 6 7 11 DHCP Snooping Option        ooccccccccccccnccccnnccnnnconcnonncnnnnnnononnnonnnnnononononnnconenonos 329  9 06 12 DHCP User Class ID lil 330  8 6 7 13 Displaying DHCP Snooping Copnfguraton   331   9 050     IP Sousa doo 331  8 6 8 1 Enabling IP SOurce  ET te cinto iO 332  3 0 6 2    Static IP Source Binding 400000 aa 332  8 6 8 3 Displaying IP Source Guard Configuration          ccccconccccccncnconononononcnnnnancnnnnos 333   6 6 9     DHGP CNEM ee ests atin aati EE 334  90 91  Enabling DACP GIGI EE 334  320 72  DACP CID  at iia 334  90 99 DACP Class ID ER 334  9694 HostName lbn Elias 334  0695 LIP ease  TMC enee EE EE E
155. MC7824M VSW    CLI    To configure all ports as edge ports globally  use the following command   ICI EI    Configures all ports as edge ports   spanning tree edgeport default  PORTS  port number   Bridge    no spanning tree EE de     i EE Deleted a ostende prot prs  seut  edge ports   Petes conga ee prot prs  seut  all ports   default   au       To configure a specified port as edge port  use the following command     nan   eos    Configures specified port as edge port     spanning tree port PORTS edgeport enable  PORTS  port number     Disables edge port for specified port     spanning tree port PORTS edgeport disable  PORTS  port number       BPDU Transmit hold count    You can configure the BPDU burst size by changing the transmit hold count value  To  configure the transmit hold count  use the following command      e e een        Sets the number of BPDUs that can be sent before  spanning tree transmit hold     t  lt 0 20 gt  pausing for 1 second   coun      0 20  BPDU transmit hold count value  default 6     no spanning tree transmit hold  Deletes a configured transmit hold count value and       count returns to the default setting     If you change this parameter to a higher value can have a significant impact on CPU utili   zation  especially in Rapid PVST mode  We recommend that you maintain the default set   ting     Port Priority    When all conditions of two switches are same  the last standard to decide route is port   priority  It is also possible to configure po
156. MP group address    clear ip igmp group      A B C D   INTERFACE         9 1 1 2 IGMP Debug    To enable debugging of all IGMP or a specific feature of IGMP  use the following com   mand      e e re    Enables IGMP debugging   all  all IGMP  decode  IGMP decoding    debug igmp fall   decode   en   EE   encode  IGMP encoding    code   events   fsm   tib     Enable events  IGMP events  fsm  IGMP Finite State Machine  FSM   tib  IGMP Tree Information Base  TIB     no debug igmp  all   decode   l      Disables IGMP debugging   encode   events   fsm   tib     EN Tree Information Base  TIB  is the collection of state at a router that has been created by  receiving IGMP messages from local hosts        350 SMC7824M VSW    Management Guide  TigerAccess    EE    9 1 2    SMC7824M VSW    CLI    IGMP Version 2    In IGMP version 2  the new extensions such as the leave process  election of an IGMP  querier  and membership report suppression are added  New IGMP messages  the leave  group and group specific query can be used by hosts to explicitly leave groups  resulting  in great reduction of the leave latency     IGMPv2 Messages    There are three types of IGMPv2 messages of concern to the host router interaction as  shown below     e Membership query  A multicast router determines if any hosts are listening to a group by sending mem   bership queries  The membership queries have two subtypes       General query  This is used to determine if any hosts are listening to any group       Gro
157. MPv3 has the same join leave  allow block in the IGMPv3 terminology  and  query response mechanism as IGMPv2 s  Due to the major revision of the membership  report  however  leave group messages are not used for the explicit leave process any  longer  In IGMPv3 concept  membership reports with state change records are used to al   low or block multicast sources  and those with current state records are used to respond  to membership queries  Membership report suppression feature has been removed for  multicast routers to keep track of membership state per host     Multicast Functions    The switch provides various multicast functions including Layer 2 multicast forwarding   which allow you to achieve the fully effective and flexible multicast deployment     This section describes the following features   e Multicast Forwarding Database   e IGMP Snooping Basic   e IGMPv2 Snooping   e IGMPv3 Snooping   e Displaying IGMP Snooping Information   e Multicast VLAN Registration  MVR    e IGMP Filtering and Throttling    Multicast Forwarding Database    Internally  the switch forwards the multicast traffic referred to the multicast forwarding da   tabase  McFDB   The McFDB maintains multicast forwarding entries collected from multi   cast protocols and features  such as PIM  IGMP  etc     The McFDB has the same behavior as the Layer 2 FDB  When certain multicast traffic  comes to a port  the switch looks for the forwarding information  the forwarding entry  for  the traffic in the McF
158. Management Guide  TigerAccess    EE    Step 3  Download the new system software via TF TP using the following command      e e re    Downloads the system software     load  os1   os2  A B C D FILE  os1   os2  the area where the system software is stored  NAME A B C D  TFTP server address  FILENAME  system software file name       To verify the system software in the system  use the following command      e e een       To upgrade the system software in the boot mode  TFTP server must be set up first  Us   ing the load command  the system will download the new system software from the serv   er     The following is an example of upgrading the system software stored in os1 in the boot  mode     Boot gt  load est 10 27 41 82 V5924C R 5 01 x   TFTP from server 10 27 41 82  our IP address is 10 27 41 83   Filename  V5924C R 5 01 x     Load address  Oxffffe0   Loading  FEE EE HT HEHEHE HE EEE EE EH HH EE EE EH HE EH EEE EE EE EE EE EH EH OH EEE EE EHEHEHEH H  TH HE HH HEH HH EE EE EE HE EH EH HH EE OEE EE EE EE EE EE EO EEE EEE EEE EE EE EEE  HTH Ht Ht HE EHH HE EE EE EH EH HH EE OEE EEE EEE EE EE EEE EEE EEE EE EE  HEE HHH HEHE EE EE EE EE HE HE HH HH EE AA AAA  THE HH HT HEHE HE EEE EE HE EE EH HH EE EEE EE EE HE EE EE EEE EEE EE EE EE     Omitted     THE HE HH HEH HE EEE EE HE HE HE EH HH EE EEE EE EE EE EE EE EE EEE EEE EE EEE  HTH HEHE EH HE EEE EE EH HH EH HH HE EHH OEE EEE EE EE EE EH HE EE EEE EEE EE EEE  HTH HT HH EHH HE EE EE EH HH HH EH HH EE EEE EE EE EE EE HH OE EEE EEE
159. Master RAM      ze e See    load ftp DESTINATION Connects to FTP of Master     The following is an example of connecting to FTP of Master  127 1 0 1        SWITCH  config terminal   SWITCH  config   bridge   SWITCH  bridge    load ftp 127 1 0 1  Connected to 127 1 0 1    220 FTP Server 1 2 4  FTPD    Name  127 1 0 1 root   root   331 Password required for root   Password    230 User root logged in    Remote system type is UNIX    Using binary mode to transfer files   ft gt     Step 3  Store system image file as CPE of this switch by using the following command      ee on       get   get FILENAME     get FILENAME Ftp Store system image file as CPE of this switch     To download as binary mode  input    bin    command and input    hash    command to  download as hash mark  The following example shows how to store CPE file     ftp gt  cd     ftp gt  bin   200 Type set to I    ftp gt  hash   Hash mark printing on  1024 bytes hash mark     ftp gt  get cpe   200 PORT command successful    150 Opening BINARY mode data connection for cpe  464228 bytes     tH tH HE HE HE EH EE FE HH HE EH HH EE EE HEE EH HEE EH EEE EH HEE E E E OEE E E E OEE EE AA  tH TH HE FE HE HE EH HE HE HH HH EEE HH EE EH FE FE EE EH OEE EH HEE E HE FE HEE EE OEE EH OEE EH dd  tH tH HE HH EH HE HE EE HH EE EH HEE EH HH EE EH OEE EH EH OEE EE OEE EH HEE E E E OEE EE E E E E EEH  tH tH HE HE HH HE HE FE FE FE HH EEE HH EE EE HEE EH HEE EH EE EH HEE EE HEE EH OEE E E E EEE  tt tH HE HE HE HE HH HE HE HE HH HH EE EE 
160. ORTS Deletes the configured DHCP snooping filter mode     When the system is running in one of Permit and Bypass modes  the authorized ARP  function is not available        327    CLI    328    8 6 7 9    Management Guide  TigerAccess    EE    To configure the automatic change from permit mode to filter mode right after the time ex   ceeds configured time value  use the following command      e e re    Configures an automatic change from bypass mode to    ip dhcp snooping filter delay    Global filter mode after filter delay time   timer PORTS  lt 1 2147483637 gt     1 2147483637  filter delay time value       To configure the automatic change from bypass mode to filter mode when the numer of  filter enteries exceeds configured counter value  use the following command      e e re          Configures an automatic change from bypass mode to  ip dhcp snooping filter delay    counter PORTS  lt 1 2147483637 gt     Global filter mode when the filter enteries exceed the counter   1 2147483637  filter delay counter value       To delete configured filter delay timer and counter  use the following command   SCC    no ip dhcp snooping filter delay  BORIS Global Deltes a configured filter delay timer and counter     To display the status of DHCP snooping filtering  use the following command      eg me rees          show ip dhcp snooping filter Shows a DHCP snooping filter   Global    show ip dhcp snooping filter entry    Authorized ARP    Shows DHCP snooping binding entries     This fun
161. Packet Dump    The switch provides network debugging function to prevent system overhead for unknown  packet inflow  Monitoring process checks CPU load per 5 seconds  If there is more traffic  than threshold  user can capture packets using tcpdump and save it to file  You can  download the dump file with the name of file number dump after FTP connection to the  system  See the dumped packet contents with a packet analyze program     To debug packet dump  use the following command      e e See    Shows dump file according to a condition     debug packet log COUNT Enabl COUNT  packet counting  nable  VALUE TIME   lt 1 10 gt   VALUE  CPU threshold    1 10  file number       GEI Basically you can save a current configuration with the write memory command  But the  dump file will not be saved     228 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    7 16 sFlow Monitoring    sFlow is a kind of monitoring functions using sFlow packet sampling algorithm  It analyzes  the traffic characteristics of network packet flow from end to end  It also monitors the  router and switch by collecting MIB information of interface     Fig  7 17 shows sFlow structure     sFlow Agent        sFlow Collector          sFlow Datagrams    sFlow Agent     IMD Ya Yo 4o     Fig  7 17 sFlow Structure    sFlow consists of sFlow collector and sFlow agent  sFlow collector analyzes the packet  transmission and sFlow agent collects packets in flow interface statistics and sends them  to sFlow collector    
162. RITY  security name   COMMUNITY  community name    Global    Deletes a specified security name  enter the security  no snmp com2sec SECURITY name   SECURITY  security name  Enable  show snmp com2sec Global Shows a specified security name        Bridge    The following is an example of configuring SNMP com2sec     SWITCH  config    snmp com2sec TEST 10 1 1 1 PUBLIC  SWITCH  config    show snmp com2sec    Com2Sec List    SecName source Community    TEST BER Ree PUBLIC    SWITCH  config       SNMP Group    You can create an SNMP group that can access SNMP agent and its community that be   longs to a group     To create an SNMP group  use the following command     n   See    Creates SNMP group  enter the group name   snmp group GROUP  v1   v2c      GROUP  group name  v3  SECURITY    Global SECURITY  security name    no snmp group GROUP   v1   Deletes SNMP group  enter the group name   v2c   v3   SECURITY   GROUP  group name  Enable  show snmp group DER Shows a created SNMP group   oba       137    CLI    138    7 1 5    7 1 6    Management Guide  TigerAccess    EE    SNMP View Record    You can create an SNMP view record to limit access to MIB objects with object identity   OID  by an SNMP manager     To configure an SNMP view record  use the following command      e ees    Creates an SNMP view record     VIEW  view record name    snmp view VIEW  included    excluded  O D  MASK     included  includes a sub tree   Global excluded  excludes a sub tree   OID  OID number    Deletes a
163. RT A B C D MAC ADDR Configures infinite binding on DHCP snooping table     infinite  clear ip dhcp snooping binding Deletes a specified static DHCP snooping binding   PORT  A B C D   all  all  all DHCP snooping bindings    DHCP Snooping Database Agent       When DHCP snooping is enabled  the system uses the DHCP snooping binding database  to store information about untrusted interfaces  Each database entry  binding  has an IP  address  associated MAC address  lease time  interface to which the binding applies and  VLAN to which the interface belongs     To maintain the binding when reload the system  you must use DHCP snooping database  agent  If the agent is not used  the DHCP snooping binding will be lost when the switch is  rebooted  The mechanism for the database agent saves the binding in a file at a remote  location  Upon reloading  the switch reads the file to build the database for the binding   The system keeps the current file by writing to the file as the database changes     SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 7 8    i     SMC7824M VSW    CLI    To specify a DHCP database agent and enable an automatic DHCP snooping database  back up  use the following command      e e Se    Specifies a DHCP snooping database agent and back     ip dhcp snooping database up interval   A B C D INTERVAL Global A B C D  DHCP snooping database agent address  INTERVAL  120 2147483637  unit  second     no ip dhcp snooping database Deletes a specified DHCP snooping d
164. RTS S PORTS  omg port to be disabled    When you configure Double tagging on the switch  consider the below attention list     e DT and HTLS cannot be configured at the same time   If switch should operate as  DT  HTSL has to be disabled     e TPID value of all ports on switch is same    e Access Port should be configured as Untagged  and Uplink port as Tagged    e Ignore all tag information of port which comes from untagged port  Access Port     e Port with DT function should be able to configure Jumbo function also    TPID Configuration    TPID  Tag Protocol Identifier  is a kind of Tag protocol  and it indicates the currently used  tag information  User can change the TPID     By default the port which is configured as 802 1Q  0x8100  cannot work as VLAN mem   ber     Use the following command to set TPID on a QinQ port     na m   ees    vlan dot1q tunnel tpid 7P D Configures TPID     Layer 2 Isolation       Private VLAN is a kind of LAN Security function using by Cisco products  and it can be  classified to Private VLAN and Private edge  Until now  there is no standard document of  it     Private VLAN Edge    Private VLAN edge  protected port  is a function in local switch  That is  it cannot work on  between two different switches with protected ports  A protected port cannot transmit any  traffic to other protected ports     Private VLAN    Private VLAN provides L2 isolation within the same Broadcast Domain ports  That means   another VLAN is created within a VLAN  Ther
165. S  port numbers  10 100  packet count  actual value  1000 10000        SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 7 3    SMC7824M VSW    CLI    To disable the switch to generate a syslog message according to the number of the pack   ets handled by CPU  use the following command      e e Se    NC   Disables the switch to generate a syslog message  no cpu statistics limit  unicast      multicast   broadcast   PORTS    all  Enable  Global    according to the number of the packets handled by    CPU for each packet type   all  all physical ports    DEEN Disables the switch to generate a syslog message  no cpu _ statistics limit all    according to the number of the packets handled by   PORTS   all       CPU for all packet types     To display a configured value to generate a syslog message according to the number of  the packets handled by CPU  use the following command      e me en    Enable Shows a configured value to generate a syslog mes   show cpu statistics limit Global sage according to the number of the packets handled  Bridge by CPU        Protocol Statistics    To enables disables the system to collect the statistics of the protocols  use the following  command      se e en    protocol statistics  enable   dis  Global Enables disables the system to collect the statistics of  able   arp   icmp   ip   tcp   udp  Bridge the protocols   ARP  ICMP  IP  TCP  UDP   To display the statistics of the protocol  use the following command      e me See    show protoco
166. S block blocked port will be changed back to normal after 10  timer  lt 10 3600 gt  seconds   SS PORTS  port number  1  2  3        10 3600  time  unit  second     no pps control port PORTS    Disables the blocking timer option   block       To show the configuration of pps control function  use the following command     n   en    Enable    show pps control port  PORTS  Global Shows the configured of pps control     Bridge       345    CLI    346    Management Guide  TigerAccess    EE    8 10 Storm Control    8 11    The switch provides a storm control feature for mass broadcast  multicast  and destina   tion lookup failure  DLF   Generally  wrong network configuration  hardware malfunction   virus and so on cause these kinds of mass packets  Packet storm occupies most of the  bandwidth of the network  and that causes the network very unstable     To enable disable the storm control  use the following command      e e See    Enables broadcast or DLF storm control respectively in  storm control  broadcast   dif      multicast   RATE  PORTS     a port with a user defined rate     RATE  512 1024000kbps  step  512kbps  GE     no storm control  broadcast Disables broadcast  multicast or DLF storm control   PORTS    multicast   dlf  respectively        To display a configuration of the storm control  use the following command      es e See       show storm control Enable Global Bridge   Displays a configuration of the storm control     Jumbo Frame Capacity    The packet range that 
167. SMC    Networks       TigerAccess      Extended Ethernet Switch    SMC7824M VSW       Management Guide CLI  TigerAccess    EE    Information furnished by SMC Networks  Inc   SMC  is believed to be accurate and reliable  However   no responsibility is assumed by SMC for its use  nor for any infringements of patents or other rights of  third parties which may result from its use  No license is granted by implication or otherwise under any  patent or patent rights of SMC  SMC reserves the right to change specifications at any time without    notice   Copyright  C  2009 by  SMC Networks  Inc   20 Mason  Irvine  CA 92618  All rights reserved  Printed in Taiwan  Trademarks     SMC is a registered trademark  and EZ Switch  TigerAccess  TigerStack and TigerSwitch are trade   marks of SMC Networks  Inc  Other product and company names are trademarks or registered  trademarks of their respective holders     SMC7824M VSW 1    CLI Management Guide  TigerAccess    EE    Warranty and Product Registration    To register SMC products and to review the detailed warranty statement  please refer to    the Support Section of the SMC Website at http   www smc com    2 SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Reason for Update    Summary  Initial release    Details     Chapter Section Reason for Update       All Initial release    Issue History    Issue Date of Issue   Reason for Update  Number       05 2009 Initial release  nos 5 01  3001     CLI Management Gu
168. ST Bridge Sets the attribute of PBO Length   K2 2  K2 3     The first value of Upstream in k1 and k2 comes under option band  the second value  comes under Upstream used for 3Band  and the third value comes under the second Up   stream used for 4band     To display PBO Config  use the following command      e mee    Enable    show Ire pbo config Global Shows the attribute of PBO Length        Bridge    SMC7824M VSW    Management Guide CLI  TigerAccess    EE    5 3 2 5 PSD Level    Power Spectral Density  PSD  Level is configured according to the standard but PSD     Level can be configured as the frequency by the administrator  To configure PSD Level   use the following command      e e re    Ire PORTS psd level  01 1  2 3 Configures PSD value and frequency vlaue in VDSL  14 5  6  7 8 9   10  11   12   line   13   14   15   PSD   default   off  PSD   80dBm    40dBm    Frequency  kHz  Frequency  kHz     roo   aon   0   7008 8800   wom  nao el e  ooer ue  Ps f owo  oom lm SECO  Pe   oware  oom   u CTI  O   ares  wom   as REECH    Tab  5 5 The frequency of PSD Level per band       To display PSD level  use the following command     C ma me See    Enable    show Ire psd level  PORTS  Global Shows PSD level in VDSL line   Bridge       The following is an example of configuring PSD levle     SWITCH  bridge   lre 1 psd level 10  60  SWITCH  bridge   show lre psd level 1          PORT 1  BAND Frequency  kHz  PSD  dBm   0 2 S 138 default  1 143   256 default  2 261   640 default  3 64
169. STP  a root switch  is called as IST root switch  Each switch has its own bridge ID  and one of the switchs on  same LAN is chosen as a root switch by comparing with their bridge IDs  However  you  can configure the priority and make it more likely that the switch will be chosen as the root  switch  The switch having the lowest priority becomes the root switch     To configure the priority for an MSTP instance number  use the following command      e me See    Configures the priority of the switch     spanning tree mst  lt 0 64 gt  prior  0 64  MSTP instance ID number     ity  lt 0 61440 gt  0 61440  priority value in increments of 4096  default   32768     no spanning tree mst  lt 0 64 gt  Clears the Priority of the switch  enter the instance  priority number     If you configure a priority of STP or RSTP in the switch  you should configure MSTP in   stance ID number as 0        Path cost    After deciding a root swich  you need to decide to which route you will forward the packet   To do this  the standard is a path cost  By the path cost of root port  you can configure a  route manually  To configure the path cost value for specified instance number in MSTP   use the following command     mane a See    Configures path cost for specified MSTP  spanning tree mst  lt 0 64 gt  port PORTS cost  lt 1  instance number     200000000 gt  0 64  MSTP instance ID number   1 200000000  the path cost value     no spanning tree mst  lt 0 64 gt  port PORTS cost Deletes a configured path c
170. TCH  interface 1  press the arrow key 1     SWITCH  configure terminal  press the arrow key T           SWITCH  show clock  press the arrow key        The switch also provides the command that shows the commands used before up to 100  lines      e e re    Enable    show history Global Shows a command history     Bridge       SMC7824M VSW    Management Guide    CLI    TigerAccess    EE    3 3 3    3 3 4    3 3 5    SMC7824M VSW    Using Abbreviation    Several commands can be used in the abbreviated form  The following table shows some  examples of abbreviated commands     lock S a       configure terminal con te    Tab  3 11 Command Abbreviation    Using Command of Privileged EXEC Enable Mode    You can execute the commands of Privileged EXEC Enable mode as show  ping  telnet   traceroute  and so on regardless of which mode you are located on     To execute the commands of Privileged EXEC Enable mode on different mode  use the  following command     Executes the commands of a EXEC Enable  do COMMAND 4  mode     Exit Current Command Mode       To exit to the previous command mode  use the following command      men ra   n  et Exits to the previous command mode        All  2 EH existo Privileged EXEC Enable mode    If you use the exit command in Privileged EXEC Enable mode or Privileged EXEC View  mode  you will be logged out     35    CLI    36    4 1    Step 1    Step2  Step3    Management Guide  TigerAccess    EE    System Connection and IP Address    System Connection    Af
171. TP function on the switch  use the following command      e e re       To disable STP function from the system  use the following command      e e re       SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 5    8 3 6    8 3 6 1    SMC7824M VSW    CLI    Configuring MSTP PVSTP Mode    To select the spanning tree mode  use the following command      e e Se    Configures a spanning tree mode     spanning tree mode   mst   l l    mst  Multiple Spanning Tree Protocol  default   rapid pvst        rapid pvst  Per vlan Rapid STP    To delete the configured spanning tree mode  use the following command      e e res       no spanning tree mode Deleted a configured spanning tree mode     STP Basic Configuration    To configure STP  use the following steps     Step 1  Enable STP function using the spanning tree command     Step 2  Configure detail options if specific commands are required     Path cost Method    After deciding a root switch  you need to decide to which route you will forward the packet   To do this  the standard is a path cost     Generally  a path cost depends on the transmission speed of LAN interface in the switch   The following table shows the path cost according to the transmit rate of LAN interface     You can use same commands to configure STP and RSTP  but their path costs are to   tally different  Please be careful not to make mistake        Tab  8 2 STP Path cost  short     269    CLI    270    8 3 6 2    Management Guide  TigerAccess    EE    Transmi
172. TS RATE  egress   in  can configure outgoing packet or incoming packet  The    gress   unit is 64 Kbps   RATE 64 1 000 000      Clears rate configuration of a specific port by transmit   no rate PORTS  egress   ingress     ting direction     For the ingress rate limit  the flow control should be enabled on a specified port  For more  information of the flow control  see Section 5 2 5        To display a configured rate limit  use the following command      e mae    Enable    Global Shows a configured rate limit     Bridge       342 SMC7824M VSW    Management Guide  TigerAccess    EE    8 9    8 9 1    SMC7824M VSW    CLI    Flood Guard    Flood guard limits number of packets  how many packets can be transmitted  in config   ured bandwidth  whereas Rate limit controls packets through configuring width of band   width  which packets pass through  This function prevents receiving packets more than  configured amount without enlarging bandwidth      lt Flood Guard gt     Configure Flood guard to  allow packets as many as  n   per a second        1     lt Rate Limit gt     Configure Rate Limit on port                                              gt       2            3  Control         bandwidth l        n    packets  l allowed for      in a second  y       n 1 Packets      over thrown      Wi n 2 away  Bandwidth  Fig  8 39 Rate Limit and Flood Guard    MAC Flood Guard    To configure the number of packets which can be transmitted in a second  use the follow   ing command      ze 
173. VLAN 200 VLAN 641 PVID 641 VLAN 200    U U T  Tunnel Pol Tunnel Port    Trunk Port  Tunnel Pori Tunnel Port  T U U T    VLAN 201    VLAN 201  T  Tagged Customer B  Customer B U  Untagged            Ol       Fig  8 3 Example of QinQ Configuration    If QinQ is configured on the switch  it transmits packets adding another Tag to original Tag   Customer A group and customer B group can guarantee security because telecommuni   cation is done between each VLANs at Double Tagging part     Double tagging is implemented with another VLAN tag in Ethernet frame header     TPID 8100 12 bit identifier    VLAN Ethernet Frame    TPID 8100 9100 12 bit identifier TPID 8100 12 bit identifier    Ethernet Frame using 802 1Q Tunneling                   Fig  8 4 QinQ Frame    Port which connected with Service Provider is Uplink port  internal   and which connected  with customer is Access port  external      Tunnel Port    By tunnel port we mean a LAN port that is configured to offer 802 1Q tunneling support  A  tunnel port is always connected to the end customer  and the input traffic to a tunnel port  is always 802 1Q tagged traffic     SMC7824M VSW 241    CLI    242    8 1 9 1    8 1 9 2    Management Guide  TigerAccess    EE    The different customer VLANs existing in the traffic to a tunnel port shall be preserved  when the traffic is carried across the network    Trunk Port   By trunk port we mean a LAN port that is configured to operate as an inter switch link port   able of carrying doubl
174. VSW    CLI    Enabling IGMP Snooping    The switch supports forwarding tables for IGMP snooping on a VLAN basis  You can en   able IGMP snooping globally or on each VLAN respectively  By default  IGMP snooping is  globally disabled     To enable IGMP snooping  use the following command     E A ge       ip ip igmp snooping   snooping Enables   Enables IGMP snooping globally    snooping   Enables IGMP snooping globally     Global Enables IGMP snooping on a VLAN   ip igmp snooping vlan VLANS  VLANS  VLAN ID  1 4094   To disable IGMP snooping  use the following command     ee fee  ee  no ip   no ip igmp snooping   snooping Disables   Disables IGMP snooping globally    snooping Disables IGMP snooping globally      no ip igmp snooping vlan Global Disables IGMP snooping on a VLAN    VLANS VLANS  VLAN ID  1 4094     IGMP Snooping Version       The membership reports sent to the multicast router are sent based on the IGMP snoop   ing version of the interface  If you statically specify the version on a certain interface  the  reports are always sent out only with the specified version  If you do not statically specify  the version  and a version 1 query is received on the interface  the interface dynamically  sends out a version 1 report  If no version 1 query is received on the interface for the ver   sion 1 router present timeout period  400 seconds   the interface version goes back to its  default value  3      To specify the IGMP snooping version  use the following command    rem  
175. W    CLI    Deficit Weighted Round Robin  DWRR     Deficit Weighted Round Robin  DWRR  combines the advantages of DRR and WRR  scheduling algorithms  Processing the packets that have higher priority is the same way  as Strict priority queuing  DWRR provides differentiated service because it processes  packets as much as weight  The specific packet length is assigned to each queue by dif   ferent weight as the unit of byte  Each queue transmits different packets within packet  length up to  256 bytes x configured weight  bytes in one round     DWRR transmits from the queues without starving the low priority queue  because each  queue can be assigned with different weight  DWRR scheduling algorithm keeps the re   mainder of packet length from previous round and compensates for it in the next round  If  a queue is not able to send a packet because its packet size is larger than the available  bytes  then the unused bytes are credited to the next round     The process in DWRR when packets having the Queue numbers    i    Q 1  SE  lt Weight   1 Weight  3 gt   Ei    Deficit Weighted Round Robin Scheduler    Lowest priority       highest priority    Q 4                      Packet Length   256 byte x weight    Ne    Queue   1 Queue  4 Queue   7  256 x 2   512 bytes 256x1 256 bytes 256 x3   768 bytes    EE KUER    Queue 4 7   256 x 3    128   896 bytes                      Fig  7 12 Deficit Weighted Round Robin    Different queues have different weights  and the packet length assigne
176. ables the authorized ARP function     You can verify the valid and invalid list for the authorized ARP  The valid list includes the  IP addresses currently in lease  while the invalid list includes the IP addresses not in  lease  Both lists include IP addresses of a DHCP pool  but the authorized ARP only al   lows the ARP response of the IP addresses in the valid list     To display a list of valid and invalid IP addresses  use the following command    Semer an    show ip dhcp  authorized arp it    Enable Shows entries of the valid list   valid  Global  show ip dhcp authorized arp Bri ce open    lid ridge Shows entries of the invalid list   invali    To delete a list of invalid IP addresses  use the following command     a m   en    Enable  Global Deletes entries of the invalid IP addresses        clear ip dhcp authorized arp    invalid  Bridge       Prohibition of 1 N IP Address Assignment    The DHCP server may assign plural IP addresses to a single DHCP client in case of plu   ral DHCP requests from the DHCP client which has the same hardware address  Some  network devices may need plural IP addresses  but most DHCP clients like personal  computers need only a single IP address  In this case  you can configure the switch to  prohibit assigning plural IP addresses to a single DHCP client     309    CLI    310    8 6 1 15    8 6 1 16    Management Guide  TigerAccess    EE    To prohibit assigning plural IP addresses to a DHCP client  use the following command    men el Som  
177. ac BRIDGE  PORTS  Enable Shows MAC table     Global BRIDGE  bridge name  Bridge PORTS  port number    show mac count  PORTS        The following is an example of displaying a current MAC table     SWITCH  config    show mac 1 3                port mac addr permission status in use  1 00 qd0 cb 22 00 49 OK dynamic 0 02  2 BR ER e e EE Ee OK dynamic 4 95  3 00 0b 5d 51 3a a8 OK dynamic 6 05    SWITCH  config       Running Time of System    To display running time of the system  use the following command      e e See    Enable    Global Shows running time of the system     Bridge       The following is an example of displaying running time of the system     SWITCH  show uptime  10 41am up 15 days  10 55  0 users  load average  0 05  0 07  0 01  SWITCH     System Information    To display the system information  use the following command     n   en    Enable    show system Global Shows the system information        Bridge    The following is an example of displaying the system information of the switch     SWITCH  show system    131    CLI    132    6 3 8    6 3 9    Management Guide  TigerAccess    EE    SysInfo System Information     Model Name   SMC7824M VSW   Main Memory Size   256 MB   Flash Memory Size   8 MB SPANSION 29GLO64N   32 MB SPANSION 29GL256N   S W Compatibility   7  7   H W Revision   DS VD 23N B0   NOS Version i Sd   B L Version   543   H W Address 2 QO sd0 eb100 25255   PLD Version   0x02   Serial Number   RMK00981029384    Ikanos Firmware Ver   1 0 5r39IK00501
178. ach ERP domain should have  one control VLAN     To configure a control VLAN of an ERP domain  use the following command      e e Se    control vian VLAN ERP Configures a control VLAN of ERP domain     no control vlan Domain Deletes configured control VLAN of ERP domain       ERP Ring Priority    The Super Loop occurs because of a shared link s failure between two ERP rings  A do   main with higher priority  one of the RM nodes  is the only responsible for monitoring the  ports of a shared link  The control packets of a domain with lower ring priority can be  transmitted to another domain with higher priority to prevent the super loop     It means that the higher ring priority domain guarantees the detour path against a shared  link of lower ring priority domain     To specify ERP ring priority  use the following command      e e re       l a ERP Specifies ERP ring priority  ring priority  lt 1 255 gt  E Ee  Domain 1 255  ERP ring priority value  default  0     To return ERP ring priority as default  use the       command     no ring priority Configures ERP ring priority as default value  omain    Displaying ERP Domian       To display a configuration for specific ERP domain  use the following command         a a  show aa Shows modified configurations of ERP domain   Domain      Shows updated configuration of ERP domain    updated   Shows updated configuration of ERP domain    of ERP domain       Shows all of configuration of ERP domain    all of   Shows all of configuration 
179. acket  classification can be configured for each flow     e The flow name must be unique  lts size is limited to 32 significant characters    e The flow name cannot start with the alphabet    a    or    A       e The order in which the following configuration commands are entered is arbitrary    e The configuration of a flow being configured can be changed as often as wanted  until the apply command is entered     e Use the show flow profile command to display the configuration entered up to now     You cannot create the flow name which started with alphabet    a    If you try to make a flow  name started with alphabet    a     the error message will display     Configuring Flow    The packet classification criteria needs to be defined  You can classify the packets via  MAC address  IP address  Ethernet type  CoS  DSCP etc     171    CLI    172    ip  A B C D   A B C D M   any    A B C D   A B C D M   any    lt 0   255 gt      ip  4 B C D   A B C D M   any    A B C D   A B C D M   any  icmp    ip  A B C D   A B C D M   any    A B C D   A B C D M   any  icmp    lt 0 255 gt    any    lt 0 255 gt    any     ip  4 B C D   A B C D M   any    A B C D   A B C D M   any   tcp    udp     ip  4 B C D   A B C D M   any    A B C D   A B C D M   any   tcp    udp    lt 1 65535 gt    any    lt 1   65535 gt    any     ip  A B C D   A B C D M   any    A B C D   A B C D M   any  tcp    lt 1 65535 gt    any    lt 1 65535 gt     any   7CP FLAG   any     mac  SRC MAC ADDR   SRC   MAC ADDR M   any
180. ackets of all IP addresses and MAC ad   dresses     To configure the range of IP address to deny ARP packets  use the following command      e me Se    Discards all ARP packets of all IP addresses with all   MAC addresses which have not learned before on ARP  deny ip any mac  any   host inspection table or a specific MAC address  MACADDR  any  ignores sender IP MAC address   host  sender host   MACADDR  sender MAC address    deny ip host A B C D mac  any   Discards ARP packets from a specific host     host MACADDR  aay SA MACADDR  MAC address    Discards ARP packets of a given range of IP ad   deny ip range A B C D A B C D    mac any    dresses   A B C D  start end IP address of sender    Discards ARP packets of a sender IP network ad   deny ip A B C D A mac  any      host MACADDR     dresses   A B C D A  sender IP network address    To delete the configured range of IP address for discarding ARP packets  use the follow   ing command      e See    no deny ip any mac  any   host  MACADDR  Deletes a configured range of IP address to discard  ARP packets   no deny ip host A B C D mac  any  ignores sender MAC address   any   host MACADDR   ARP ACL    host  sender host  MACADDR  sender MAC address  A B C D  start end IP address of sender    A B C D A  sender IP network address    no deny ip range A B C D    A B C D mac any    no deny ip A B C D A mac  any    host MACADDR        SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    To specify the range of IP
181. action  between hosts and routers  they are using IGMP messages to report or query the group  membership     IGMP has three versions that are supported by hosts and routers  The followings are the  simple definitions of each version     e IGMP Version 1  The basic query response mechanism for the group membership management is in   troduced  Routers  however  should use the timeout based mechanism to discover  members with no longer interests in the groups since there is no leave process     e IGMP Version 2  IGMP messages such as leave group and specific group query are added for the  explicit leave process  This process greatly reduces the leave latency compared to  IGMP version 1  Unwanted and unnecessary traffic can be constrained much faster     e IGMP Version 3  The source filtering is supported  That is  hosts now can join a group with specifying  including excluding a set of sources  allowing supporting the source specific multi   cast  SSM   It also increases the multicast address capability  and enhances the se   curity from unknown multicast sources     349    CLI Management Guide  TigerAccess    EE    9 1 1 1 Clearing IGMP Entry    To clear IGMP entries  use the following command      ee ee    clear ip omg   ip clear ipigmp   Deletes all IGMP entries     Deletes the IGMP entries learned from a specified    clear ip igmp interface INTER   FACE    interface   INTERFACE  interface name    Deletes IGMP entries in a specified IGMP group      all IGMP group  A B C D  IG
182. agement in that it provides  some basic management functions at Layer 2  rather than using Layer 3 and above as  required by SNMP over an IP infrastructure  OAM provides single hop functionality in that  it works only between two directly connected Ethernet stations  SNMP can be used to  manage the OAM interactions of one Ethernet station with another     7 2 1 OAM Loopback    For OAM loopback function  both the switch and the host should support OAM function   OAM loopback function enables Loopback function from the user   s device to the host  which connected to the user   s device and operates it     To enable disable local OAM function  use the following command      e me ees       oam local admin enable PORTS ges Enables local OAM   ridge  oam local admin disable PORTS Disables local OAM     To configure loopback function of the host connected to the switch  use the following  command      e me See    oam remote loopback enable    Enables loopback function of peer device   PORTS    oam remote loopback start  PORTS    Operates loopback     oam remote loopback disable    i i i  SORTS Bridge Disables loopback function of peer device        SMC7824M VSW 149    CLI    150    7 2 2    7 2 3    7 2 4    Management Guide  TigerAccess    EE    Local OAM Mode    To configure Local OAM  use the oo command        oam local mode  active  Bridge Configures the mode of local OAM   passive  PORTS    Both request and loopback are possible for local OAM active  However  request or loop   
183. ain lotp   no snmp alarm severity erp    domain multi rm   Global Deletes configured severity of an alarm for ERP    no snmp alarm severity erp    domain reach fail   no snmp alarm severity erp    domain ulotp    7 1 9 7 STP Guard Alarm Severity       To set severity of an alarm for STP guard  use the following command      e e Se    snmp alarm severity stp bpdu   guard  critical   major   minor   Sets severity of an alarm for BPDU guard disabled     warning   intermediate     snmp alarm severity stp root     guard  critical   major   minor   Sets severity of an alarm for root guard disabled     warning   intermediate        SMC7824M VSW 147    CLI    148    7 1 9 8    7 1 10    7 1 11    Management Guide  TigerAccess    EE    To delete configured severity of alarm for STP guard  use the following command      e me ee    no snmp alarm severity stp     bpdu guard  Deletes configured severity of an alarm for STP guard   no snmp A stp     A uard       Displaying SNMP Alarm Severity  To display configured severity of alarm  use the following command      e mae    Enable  show snmp alarm severity Global Shows configured severity of alarm        Bridge    Displaying SNMP Configuration    To display all configurations of SNMP  use the following command      e mae    Enable  Global Shows all configurations of SNMP   Bridge       To deletes a recorded alarm in the system  use the following command     mm mas  pon  snmp clear alarm history Global Deletes a recorded alarm in the system 
184. al      major   minor   warning   intermediate     snmp alarm severity power fail  critical   major      minor   warning   intermediate     snmp alarm severity power remove  critical      major   minor   warning   intermediate     snmp alarm severity rmon alarm rising  criti     cal   major   minor   warning   intermediate     Description    Sets severity of an alarm for system fan  failure     Sets severity of an alarm for system  cold restart     Sets severity of an alarm for too much  broadcast     Sets severity of an alarm for CPU load  high   Sets severity of an alarm for no more IP    address left in the DHCP pool     Sets severity of an alarm for illegal  DHCP entry     Sets severity of an alarm for system fan    removed     Sets severity of an alarm for IP address  conflict     Sets severity of an alarm for system  memory usage high     Sets severity of an alarm for MAC flood  guard block     Sets severity of an alarm for Ethernet  port link down     Sets severity of an alarm for Ethernet  port removed     Sets severity of an alarm for port thread    over     Sets severity of an alarm for system    power failure     Sets severity of an alarm for system    power removed     Sets severity of an alarm for RMON    alarm rising        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    ana e ee    snmp alarm severity rmon alarm falling  criti  Sets severity of an alarm for RMON    cal   major   minor   warning   intermediate  alarm falling     snmp alarm severity sy
185. ame  owner NAME RMON   max  32 characters      Object of Sample Inquiry       To assign object used for sample inquiry  use the following command     a Y mn       sample variable M B OBJECT RMON Assigns MIB object used for sample inquiry     Absolute and Delta Comparison    There are two ways to compare with the threshold  absolute comparison and delta com   parison     e Absolute Comparison  Comparing sample data with the threshold at configured interval  if the data is more  than the threshold or less than it  alarm is occurred   e Delta Comparison  Comparing difference between current data and the latest data with the threshold  if  the data is more than the threshold or less than it  alarm is occurred     SMC7824M VSW    Management Guide  TigerAccess    EE    7 4 2 4    7 4 2 5    SMC7824M VSW    CLI    To compare object selected as sample with the threshold  use the following command      e a See       sample type absolute RMON Compares object with the threshold directly     To configure delta comparison  use the following command        Compares difference between current data and the  sample type delta RMON  latest data with the threshold     Upper Bound of Threshold    If you need to occur alarm when object used for sample inquiry is more than upper bound  of threshold  you have to configure the upper bound of threshold     To configure upper bound of threshold  use the following command     n   See       oe Configures upper bound of threshold   rising threshold VALUE
186. an be from 1 to 10 000 000 Kbits  This bandwidth is only valid for routing  information implement and it does not concern any physical bandwidth     To delete a configured bandwidth  use the following command     n   mn    Deletes configured bandwidth of interface  enter the  no bandwidth BANDWIDTH Interface    value     Maximum Transmission Unit  MTU        Maximum value for the length of the data payload can be transmitted  You can set a  maximum transmission unit  MTU  with below command     na m   See    mtu  lt 68 1500 gt  Sets a MTU size   Interface  Returns to the default MTU size        347    CLI    348    Management Guide  TigerAccess    EE    IP Multicast    IP communication provides three types of packet transmission  unicast  broadcast and  multicast  Unicast is the communication for a single source host to a single destination  host  This is still the most common transmission form in the IP network  Broadcast is the  communication for a single source host to all destination hosts on a network segment   This transmission is also widely used especially by network protocols  but it sometimes  may not be efficient for those hosts in the subnet who are not participating in the broad   cast  Multicast is the communication for a single or many source hosts to a specific group  of destination hosts  which is interested in the information from the sources  This type of  packet transmission can be deployed for a number of applications with more efficient utili   zation of
187. anizationally unique identifier  OUI  when configuring a DHCP  helper address  The OUI is a 24 bit number assigned to a company or organization for  use in various network hardware products which is a first 24 bits of a MAC address  If an  OUI is specified  a DHCP relay agent will forward DHCP_DISCOVER message to a spe   cific DHCP server according to a specified OUI     To specify a DHCP helper address with an OUI  use the following command      e me ee    Specifies a DHCP helper address with an OUI  More   than one address is possible    XX XX XX  OUI  first 24 bits of a MAC address in the  Interface form of hexadecimal    A B C D  DHCP server address    no ip dhcp oui XX XX XX 8  Deletes a specified DHCP helper address    helper address A DC OD    Smart Relay Agent Forwarding    ip dhcp oui XX XX XX helper   address A B C D       Normally  a DHCP relay agent forwards DHCP_DISCOVER message to a DHCP server  only with a primary IP address on an interface  even if there is more than one IP address  on the interface     If the smart relay agent forwarding is enabled  a DHCP relay agent will retry sending  DHCP_DISCOVER message with a secondary IP address  in case of no response from  the DHCP server     To enable the smart relay agent forwarding  use the following command     a   en    no ip dhcp smart relay       ip dhcp smart relay Enables a smart relay    nop dhcp smartrelay 1 7    Disables a smart relay     DHCP Server ID Option    In case that more than two DHCP servers a
188. ant to  receive the traffic     To configure a specified port as a multicast source trust port  use the following command    comment  wate anton    ip multicast source trust port 8 l  Specifies multicast source trust ports  PORTS  Global       no ip multicast source trust port   i  BORIC Deletes the configured multicast source trust ports    SMC7824M VSW    Management Guide  TigerAccess    EE    10    10 1     gt    gt     SMC7824M VSW    CLI    System Software Upgrade    General Upgrade    For the system enhancement and stability  new system software may be released  Using  this software  the switch can be upgraded without any hardware change  You can simply  upgrade your system software with the provided upgrade functionality via the CLI     The switch supports the dual system software functionality  which you can select applica   ble system software stored in the system according to various reasons such as the sys   tem compatibility or stability     To upgrade the system software of the switch  use the following command     n   See    Upgrades the system software of the switch via FTP or    CO ft tft os download  py  ftp   tftp  o     os1   os2     os1   os2  the area where the system software is stored       To upgrade the system software  FTP or TF TP server must be set up first  Using the copy  command  the system will download the new system software from the server     To reflect the downloaded system software  the system must restart using the reload  command  For m
189. are  permitted  When IP source guard is enabled in IP and MAC filtering mode  the DHCP  snooping option 82 must be enabled to ensure that the DHCP protocol works properly   Without option 82 data  the switch cannot locate the client host port to forward the  DHCP server reply  Instead  the DHCP server reply is dropped  and the client cannot  obtain an IP address     Enabling IP Source Guard    After configuring DHCP snooping  configure the IP source guard using the provided com   mand  When IP source guard is enabled with this option  IP traffic is filtered based on the  source IP address  The switch forwards IP traffic when the source IP address matches an  entry in the DHCP snooping binding database or a binding in the IP source binding table     To enable IP source guard  DHCP snooping needs to be enabled     To enable IP source guard with a source IP address filtering on a port  use the following  command     Enables IP source PS A with a source IP address  ip dhcp verify source PORTS  Global filtering on a port     no ip dhcp   no ip dhcp verify source PORTS   source   no ip dhcp verify source PORTS     Disables IP source guard    IP source   Disables IP source guard          To enable IP source guard with a source IP address and MAC address filtering on a port   use the following command     ip dhcp verify source port  A ee IP source guard with a source IP address and  security PORTS MAC address filtering on a port   Global    no i oe verify source port   i is S E  Dest
190. ase note that you  must input one space between the command and question mark     SWITCH  write    memory Write to NV memory    terminal Write to terminal    SWITCH  write    SMC7824M VSW 33    CLI    34    3 3 2    Management Guide  TigerAccess    EE    The switch also provides the simple instruction of calling the help string with the help  command  You can see the instruction using the command regardless of the configuration  mode     To display the instruction of calling the help string for using CLI  use the following com   mand        SO AAA Shows the instruction of calling the help string for using    Calling Command History    In case of installed command shell  you do not have to enter the command you entered  before  When you need to reuse the commands you did  use this arrow key  lt f  gt   When  you press the arrow key  the commands will be displayed in the latest order     The following is an example of calling command history after using several commands   After using these commands in order  show clock     configure terminal     interface 7      exit  press the arrow key  lt f gt  and then you will see the commands from latest one   exit     interface 7     configure terminal     show clock     SWITCH  config    exit   SWITCH  show clock   M  n  5 Ja   1970 233502 1 2  0000   SWITCH  configure terminal   SWITCH  config    interface 1   SWITCH  config if   exit   SWITCH  config    exit   SWITCH   press the arrow key 7    SWITCH  exit  press the arrow key 1   SWI
191. ass ID of DHCP option 77 per  oba  port PORT class id CLASS ID port     SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 7 13    8 6 8    SMC7824M VSW    CLI    To configure the policy of DHCP option 77 on a specified port  use the following command      e me See    Configures the policy of DHCP option 77 field for the    DHCP Request packet  default  replace   ip dhcp snooping user class id uns replace  forwards DHCP packets with user class ID  port  replace   keep  according to DHCP option 77 field format    keep  forwards DHCP packets without any user class    ID       To delete the configured user class ID of DHCP option 77 field  use the following com   mand     no ip dhcp snooping user class     Deletes a configured user class ID of a port   id port PORT class id CLASS  D    no ip dhcp snooping user class     Deletes all configured user class IDs of a port   id port PORT all       Displaying DHCP Snooping Configuration    To display DHCP snooping table  use the following command     a m   See    show ip dhcp snooping Enable Shows DHCP snooping configuration   show ip dhcp snooping binding Global Shows DHCP snooping binding entries     IP Source Guard       IP source guard is similar to DHCP snooping  This function is used on DHCP snooping  untrusted Layer 2 port  Basically  except for DHCP packets that are allowed by DHCP  snooping process  all IP traffic comes into a port is blocked  If an authorized IP address  from the DHCP server is assigned to a DHCP clie
192. assification    To classify packets by a specific admin flow for the switch  you need to open Admin Flow  Configuration mode first  To open Admin Flow Configuration mode  use the following  command      e e een    Creates an admin flow and opens Admin Flow Configu     flow admin NAME create Global ration mode        NAME  admin flow name     After opening Admin Flow    Configuration mode  the prompt changes from  SWITCH  config   to SWITCH config admin flow NAME        To delete configured admin flow or all admin flows  use the following command     nan e es    no flow admin NAME Deletes specified admin flow   Global    no flow admin all Deletes all admin flows        After opening Admin Flow Configuration mode  a flow can be configured by user  The  packet classification can be configured for each admin flow     e The admin flow name must be unique  lts size is limited to 32 significant characters   e The admin flow name cannot start with the alphabet    a    or    A      e The order in which the following configuration commands are entered is arbitrary   e The configuration of a flow being configured can be changed as often as wanted  until the apply command is entered   e Use the show flow profile admin command to display the configuration entered up    to now     SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 6 2    A    SMC7824M VSW    CLI    Configuring Admin Flow    You can classify the packets according to IP address  ICMP  TCP  UDP and IP header  length  
193. atabase agent     To request snooping binding entries from a DHCP snooping database agent  use the fol   lowing command      e e en    Requests snooping binding entries from a DHCP       ip dhcp snooping database re   new A B C D    Global snooping database agent     A B C D  DHCP snooping database agent address       The DHCP snooping database agent should be TFTP server     DHCP Snooping Filtering    If there are incoming packets to a port of switch enabled with DHCP snooping  it refers to  DHCP snooping binding table and filters these packets whether their information is regis   tered in the table or not  DHCP snooping filtering function supports three modes that are  classified into filter  bypass and permit  Filter mode permits the registered packets only  according to DHCP snooping binding table  Both permit and bypass mode permits all  packets irrespective of DHCP snooping binding table  Both modes are written the filter en   tries  but they do not filter packets  Permit mode uses a filter delay timer to be changed to  filter mode  Otherwise  bypass mode uses a filter delay counter     DHCP snooping filter mode is not available in the system that is enabled with IP source  guard function     To select one of DHCP snooping filter modes  use the following command   SCC    ip dhcp snooping filter mode Selects DHCP snooping filter mode and specifies an  PORTS   permit   bypass   filter   action by DHCP snooping binding table  Global    no ip dhcp snooping filter mode ae  S
194. ation   e DHCP Subnet   e Range of IP Address   e Default Gateway     IP Lease Time   s DNS Server   e Manual Binding   e Domain Name   e DHCP Server Option   e Static Mapping   e Recognition of DHCP Client   e IP Address Validation   e Authorized ARP   e Prohibition of 1 N IP Address Assignment  e Ignoring BOOTP Request   e DHCP Packet Statistics   e Setting DHCP Pool Size   e Displaying DHCP Pool Configuration    To activate deactivate the DHCP function in the system  use the following command      e e See       Activates the DHCP function in the system    noservicedhop      Deactivates the DHCP function in the system     no service dhcp    Before configuring DHCP server or relay  you need to use the service dhcp command  first to activate the DHCP function in the system     303    CLI    304    8 6 1 1    8 6 1 2    8 6 1 3    Management Guide  TigerAccess    EE    DHCP Pool Creation    The DHCP pool is a group of IP addresses that will be assigned to DHCP clients by  DHCP server  You can create various DHCP pools that can be configured with a different  network  default gateway and range of IP addresses  This allows the network administra   tors to effectively handle multiple DHCP environments     To create a DHCP pool  use the following command      e See      Creates a DHCP pool and opens DHCP Pool Configu   ip dhcp pool POOL  Global ration mode     no ip dhcp pool POOL Deletes a created DHCP pool        The following is an example of creating the DHCP pool as sample   
195. ays correct and there won t be any subsequent time jumps after the initial correction   Unlike NTP  SNTP usually uses just one Ethernet Time Server to calculate the time and  then it  jumps  the system time to the calculated time  It can  however  have back up  Ethernet Time Servers in case one is not available     To configure the switch in SNTP  use the following command      e e re    Specifies the IP address of the SNTP server  lt is pos   sntp SERVER1  SERVER 2     sible up to three number of servers    SERVER3     SERVER  server ID address    Global  no sntp SERVER1  SERVER 2   Disables specific SNTP server   A      Disables SNTP function  SNTP function        SMC7824M VSW    Management Guide  TigerAccess    EE    6 1 6    6 1 7    SMC7824M VSW    CLI    You can configure up to 3 servers so that you use second and third servers as backup  use in case the first server is down     To display SNTP configuration  use the following command     n   mn    Enable    Global Show SNTP configuration   Bridge       The following is to register SNTP server as 203 255 112 96 and enable it     SWITCH  config  sntp 203 255 112 96  SWITCH  config    show sntp          sntpd is running           Time Servers    Tst    2034 Zoo E          SWITCH  config       Terminal Configuration    By default  the switch is configured to display 24 lines composed by 80 characters on  console terminal  You can change the number of displayed lines by using the command   terminal length  The maximum line 
196. back is impossible for local OAM passive     OAM Unidirection    When RX is impossible in local OAM  it is possible to send the information by using TX   To enable disable the function  use the Bee command     oam local unidirection enable  Sends the information by using TX   PORTS  Bridge    oam     unidirection disable     Beste teat te maton y ug TX  to transmit the information  Beste teat te maton y ug TX  using TX             Remote OAM    To configure remote OAM  use the following command   SCC    oam remote oam admin  lt 1 2 gt   f Enables disable remote OAM    enable   disable  PORTS  Bridge  oam remote oam mode  lt 1 2 gt   l l Selects remote OAM mode    active   passive  PORTS    To display the information of peer host using OAM function  use the following command      e e re    oam remote alarm optical  lt 1 3 gt    lt 0 65535 gt  PORTS       oam remote alarm temperature   lt 0 255 gt  PORTS    oam remote alarm voltage  min   Brid Shows the information of peer host using OAM func   ridge  max   lt 0 65535 gt  PORTS   tion     oam remote electrical mode  full    half  PORTS    oam remote general autoneg  lt 1   4 gt   enable   disable  PORTS       SMC7824M VSW    Management Guide CLI  TigerAccess    EE    a m   See       oam remote general forwarding   lt 3 4 gt   enable   disable  PORTS  oam remote general speed  lt 1   4 gt   lt 0 4294967295 gt PORTS  oam remote general user  lt 1 4 gt   STRING PORTS  oam remote system interface  Shows the information of peer host
197. be  automatically configured in Slave  Although it is configured before stacking  Masters con   figuration will be configured in Slave by finding any difference  However  you have to save  the configuration of Slave with using    write memory     Unless you do it  the configuration  will be deleted and the above procedure will be repeated     With enabled stacking  config profile of Master will be configured in Slave     Apply Profile to port  Use the following command      se e See       line config profile NAME add SC Applies Profile to specified port   ridge  PORTS S NAME  line config profile name    The following is an example of applying profile named TEST to port 1     SWITCH  bridge    line config profile TEST add 1  SWITCH  bridge       97    CLI    98    9 3 4 2    Management Guide  TigerAccess    EE    To disable the application of profile in specified port  use the following command      e me see       line config profile NAME del   i EM D  Bridge Disables profile in specified port   PORTS    To delete configured profile  use the following command      e e ees       no line config profile NAME Deletes Profile     Alarm config profile    Alarm config profile is a configured policy  which Alarm service is provided to clients with  using SNMP trap in case of system error  It is convenient way because it is possible to  configure standard of error checking  which varies according to service type  in each port   Alarm config profile consists of Threshold of error  which
198. be enabled on specific port to apply WRED profile to port  To  enable WRED function and apply it to a port  use the following command      e e es    Enables WRED function on port   qos wred enable PORTS  PORTS  port number  Global    qos wred bind PORTS allan  Applies WRED profile to ports   allan  3 gt  0 3  WRED profile number       To disable WRED function  use the GE command        E WRED function   qos wred disable PORTS Global  PORTS  port number    SMC7824M VSW    Management Guide  TigerAccess    EE    1 1    SMC7824M VSW    CLI    NetBIOS Filtering    NetBIOS  Network Basic Input Output System  is a program that allows applications on  different computers to communicate within a local area network  LAN   NetBIOS is used  in Ethernet  included as part of NetBIOS Extended User Interface  NetBEUI   Resource  and information in the same network can be shared with this protocol     But the more computers are used recently  the more strong security is required  To secure  individual customer   s information and prevent information leakages in the LAN environ   men  the switch provides NetBIOS filtering function     Without NetBIOS filtering  customer s data may be opened to each other even though the  data should be kept  To keep customer   s information and prevent sharing information in  the above case  NetBIOS filtering is necessary     LAN environment for Internet Service    Es  mp ees                  86        Shared    Needs to prevent sharing  information between cu
199. ble   remark by queue Uses a Queue based L2 table       remark dscp cos     remark dscp cos   Policer   Enables the remarking configuration by external CoS  _  the   Enables the remarking configuration by external CoS    configuration by external CoS     remake   Enables the remarking configuration by traffic class  remark queue  queue     To disable the remarking function according to its different parameter  use the following  command     Y See    no remark by dscp       no remark by queue a Disables a configured remarking function by different  olicer    no remark dscp cos parameter     no remark queue       In this switch  L3 table has a higher priority than L2 table in Traffic Policing based CoS  Remarking status  L2 table has a lower priority than L3 all the time  except when user  does not select L3 table  It follows the configuration of L3 table when both L3 and L2 ta   bles are selected by user     If the remarking function is enabled in this switch  it performs according to the policy of  Traffic Policing based CoS Remarking     To remark the colored packets with CoS parameters  use the following command     ana momen    qos remark color  green   yellow   red   dscp   lt 0 63 gt  cos  lt 0 7 gt     Global    qos remark color  green   yellow   red   dscp   lt 0 63 gt  dp  lt 0 2 gt  Remarks CoS parameters according    qos remark color  green   yellow   red   dscp to DSCP value and metering configu      lt 0 63 gt  dscp  lt 0 63 gt  ration on system     0 63  DSCP fie
200. c E vette ot 62  4 5 2 1 Enabling 802 1x Re AuthenticatiON          cccoocccconcccoccnconcnonncnnonanononcnconcnconcnnnnoos 62  4 5 2 2 Interval of HRe Autbentcaton  63  4 5 2 3 Interval of Requesting HRe Autbhentcaton  63  4 5 2 4  802 1xX Re Authentication               ccooccccoonccconoccocncononcnnonocnannonannnonnconannnnanononons 63  4 5 3 Initializing Authentication Status           oooocccccconccnccnoncnononcnnnnonnnncnnanonnononcnnnnns 64    SMC7824M VSW 5    CLI    Management Guide  TigerAccess    EE    4 5 4 Restoring Default Value A 64  4 5 5 Displaying 802 1x Configuration         cooonccconnnnnccnoncncononcnnononnnonnanonconanencnnnnons 64  4 5 6 802 1x User Authentication Statistics             ccccccccccccsscecsseeeseeeeseeeeeseeeeeaes 64  4 5 7 Sample TEE ee 65  9 Port COMMOUN ATOR EEN 67  Beleg SE 67  5 2 Ethernet Port Configuration                 cccccccccseceseeeceeeeeeeeseeeseeeeseeesaeeeseeees 67  9241  Enabling Eternel e EE 67  5 22 AMO NOOO EE 67  A A A A A a re ee Re ne 68  OZ  A O 69  D220     FIOW at EE 70  02 0    PO DESCHPUON ud da o 70  A AS A A 71  5 2 1 SA n cea le Ae ees ane 71  D202  SA en 72  EC o E 73  520   POR IAO MON ss coast 74  g9   MDL POr ele el EE 75  5 3 1 Modulation of VDSL Gonal 75  Sunat    DMT Mou alo air oia 75  5 3 2 Configuring VDSL Rot  76  53 21    Displaying Status of VDSL Portu a see ene Ae 77  S 3 2 2  ENaDINO VDSL EE 77  S323 ett VO SL  PO AA A 78  5 3 2 4   Controlling Power according to Connection Distance          
201. can  include only one either Flow or Class  However  a single flow or class can belong to mul   tiple policies  Otherwise  only one policer can belong to one policy     The switch supports approximately 1000 rules which are actually running in the system as  many as policies     SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 2    7 6 2 1    7 6 2 2    SMC7824M VSW    CLI    Packet Classification    Packet classification features allow traffic to be partitioned into multiple priority levels  or  classes of service  In Flow Configuration mode  you can set packet classification criteria  via flow  which is with unique name  If you specify the value of parameters  this switch  classifies the packets corresponding to the parameters     Flow Creation    The packet classification involves a traffic descriptor to categorize a packet within a spe   cific flow for QoS handling in the network  You need to open Flow Configuration mode first  to classify the packets  To open Flow Configuration mode  use the following command      e me See       Creates a flow and opens Flow Configuration mode   flow NAME create Global  NAME  flow name     After opening Flow Configuration mode  the prompt changes from SWITCH config   to  SWITCH config flow NAME        To delete configured Flow or all Flows  use the following command     na e en       no flow NAME Deletes specified flow   Global  Deletes all flows     After opening Flow Configuration mode  a flow can be configured by user  The p
202. can be capable to accept is from 64 bytes to 1518 bytes  Therefore   packets not between these ranges will not be taken  However  the switch can accept  jumbo frame larger than 1518 bytes through user s configuration     To enable the jumbo frame capacity  use the following command      e e een       jumbo frame enable Configures to accept jumbo frame up to 9188 bytes     To disable the jumbo frame capacity  use the following command     IN em  jumbo frame disable Disables configuration to accept jumbo frame   default        To display the configuration of jumbo frame  use the following command      e mae    Enable    show jumbo frame Global Shows a configuration of jumbo frame     Bridge       SMC7824M VSW    Management Guide  TigerAccess    EE    8 12    8 13    SMC7824M VSW    CLI    The following is an example of enabling the jumbo frame capacity     SWITCH  bridge   jumbo frame enable  SWITCH  bridge    show jumbo frame    Name   Current Default  portgl 91887 1518  port02 9188  1518  porto03   9188  1518  port04 9188  1518  portos   9188  1518  EE EE   9188  1518  port07 9188  1518  port08 91887 1518  port09   9188  1518  port10 9188  1518                SEET    SWITCH  bridge       Bandwidth    Routing protocol uses bandwidth information to measure routing distance value  To con   figure bandwidth of interface  use the following command      e me See       Configures bandwidth of interface  enter the value of  bandwidth BANDWIDTH Interface  bandwidth     The bandwidth c
203. cast flood   ing by forwarding the normally broadcasted DHCP response only on the circuit indicated  in the circuit ID     DHCP Address Exhaustion    In general  a DHCP server may be extended to maintain a DHCP lease database with an  IP address  hardware address and remote ID  The DHCP server should implement poli   cies that restrict the number of IP addresses to be assigned to a single remote ID     Static Assignment    A DHCP server may use the remote ID to select the IP address to be assigned  It may  permit static assignment of IP addresses to particular remote IDs  and disallow an ad   dress request from an unauthorized remote ID     IP Spoofing    A DHCP client may associate the IP address assigned by a DHCP server in a forwarded  DHCP_ACK message with the circuit to which it was forwarded  The circuit access device  may prevent forwarding of IP packets with source IP addresses  other than  those it has  associated with the receiving circuit  This prevents simple IP spoofing attacks on the cen   tral LAN  and IP spoofing of other hosts     MAC Address Spoofing    By associating a MAC address with a remote ID  a DHCP server can prevent offering an  IP address to an attacker spoofing the same MAC address on a different remote ID     Client Identifier Spoofing    By using the agent supplied remote ID option  the untrusted and as yet unstandardized  client identifier field need not be used by the DHCP server     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    F
204. ch gt     SWITCH A config   show stack  device   default  node ID  1    node MAC address status type name porte  1 O02 gtt cb  Here HIEL   ren active SWITCH 26  2 DE EE 200311 active SWITCH 26    SWITCH A  config        lt Switch B     Slave Switch gt     SWITCH B config   show stack  device   default   node ID   2   SWITCH B config       Sample Configuration 2  Accessing from Master Switch to Slave Switch    The following is an example of accessing to Slave switch from Master switch configured  in Sample Configuration 1  If you show the configuration of Slave switch in Sample Con   figuration 1  you can recognize node number is 2     SWITCH  bridge    rcommand 2  E GR EE Sie do  Connected to 127 1 0 1   Escape character is          SWITCH login  admin  Password    SWITCH     341    CLI Management Guide  TigerAccess    EE    To disconnect  input as the below     SWITCH  exit  Connection closed by foreign host   SWITCH  bridge       8 8 Rate Limit    User can customize port bandwidth according to user   s environment  By this configuration   you can prevent a certain port to monopolize whole bandwidth so that all ports can use  bandwidth equally  Egress and ingress can be configured both to be same and to be dif   ferent     The switch can apply the rate limit with 64 Kbps unit for GE port  and support ingress po   licing and egress shaping     To set a port bandwidth  use the following command      e e Se    Sets port bandwidth  If you input egress or ingress  you    rate POR
205. cting packet  you  should disable the loop detection first using the loop detect disable command     To display a current configuration of the loop detection  use the following command     ma ra   n  show loop detect Enable Shows the brief information of the loop detection        Global Shows a current configuration of the loop detection per  show loop detect  all   PORTS  E  Bridge port     The loop detection cannot operate with LACP     301    CLI    302    8 6    Management Guide  TigerAccess    EE    Dynamic Host Configuration Protocol  DHCP     Dynamic Host Configuration Protocol  DHCP  is a TCP IP standard for simplifying the  administrative management of IP address configuration by automating address configura   tion for network clients  The DHCP standard provides for the use of DHCP servers as a  way to manage dynamic allocation of IP addresses and other relevant configuration de   tails to DHCP enabled clients on the network     Every device on a TCP IP network must have a unique IP address in order to access the  network and its resources  The IP address  together with its relevant subnet mask  identi   fies both the host computer and the subnet to which it is attached  When you move a  computer to a different subnet  the IP address must be changed  DHCP allows you to dy   namically assign an IP address to a client from a DHCP server IP address database on  the local network     The DHCP provides the following benefits     Saving Cost    Numerous users can access th
206. ction  log buffer    logs  lt 0 1024 gt  interval  lt 0   86400 gt     0 1024  the number of syslog messages per specified  interval  default  5        0 86400  interval value in second  default  1 sec     219    CLI    220    7 12 3 6    7 12 4    Management Guide  TigerAccess    EE    To delete the configured options of log buffer function  use the following command     a a mn    no ip arp inspection log buffer  Global Deletes the configured options of log buffer function    entries   logs     To display the configured log buffer function and entries    information  use the following  command      e mae    Enable  show ip arp inspection log Global Displays the configured log buffer function           Bridge    To clear all of collected entries in the list  use the following command      e   See    Enable  clear ip arp inspection log Global Clears all of collected entires in the log buffer list        Bridge    Displaying ARP Inspection    To display a status of the ARP inspection  use the following command   ICI E OO o    show ip arp inspection  vlan  Enable Shows a status of the ARP inspection   VLANS   Global  show ip arp inspection statistics SS l l  Bridge Shows collected statistics of the ARP inspection    vlan VLANS     To clear collected statistics of the ARP inspection  use the following command      e e re    Enable       clear ip arp inspection statistics   vlan VLANS     Global Clears collected statistics of the ARP inspection     Bridge       Gratuitous ARP    G
207. ction sets the time before ARP inspection starts to run  Before setting this  ARP  inspection should be enabled  ARP inspection checks validity of incoming ARP packets by  using DHCP snooping binding table and denies the ARP packets if they are not identified  in the table  However  this switch may be rebooted with any reason  then DHCP snooping  bindinge enries  which are dynamically learned from ARP packets back and forth switch  would be lost  Thus  ARP inspection should be delayed to start during some time so that  DHCP snooping table can build entries  If no time given  ARP inspection sees empty  snooping table and drop every ARP packet     To specify the ARP inspection delay time  use the following command      e e een    l l l   Configures the ARP inspection delay time  If reboot   ip dhcp snooping arp inspection    start  lt 1 2147483637 gt     ARP inspection resumes after the time you configure     Global 1 2147483637  delay time  unit  second     no ip dhcp snooping arp    i          Delete the configured ARP inspection delay time   inspection start    SMC7824M VSW       Management Guide  TigerAccess    EE    8 6 7 10    8 6 7 11    SMC7824M VSW    CLI    DHCP Snooping with Option82    In case of L2 environment  when forwarding DHCP messages to a DHCP server  a DHCP  switch can insert or remove DHCP option82 data on the DHCP messages from the clients     In case of a switch is enabled with DHCP snooping  it floods DHCP packets with DHCP  option82 field when the DHCP
208. d    0    as default    To display a configured INP  use the following command     e e see    Enable    show Ire inp  PORTS  Global Shows the configured INP in VDSL line   Bridge       Trellis Coded Modulation  TCM     The trellis coded modulation  TCM  is a modulation scheme which allows highly efficient  transmission of information over band limited channels such as telephone lines     SMC7824M VSW    Management Guide  TigerAccess    EE    9 3 2 10    A    SMC7824M VSW    CLI    To enable disable TCM of VDSL line port  use the following command      ees e See       Ire PORTS tem  enable   disable  Configures TCM  default  enable     To display configured TCM  use the following command     mana  e en  show Ire tem  PORTS  Enable Global Bridge Shows the configured TCM     Ham band       The bandwidth that VDSL port of switch includes Ham band  lt causes interruption in  VDSL line  To prevent this interruption  you can configure not to use Ham band in band   width     To disable specified Ham band for a port  use the following command     mane a ee    Ire PORTS ham band  band1   band2   band      band4   band5   band6   band7   band       band9   band10   band11   band12   band13   i Disables specified Ham band   band14   band15   band16   band17   band18     band19   band20   band21        If you configure Ham band at VDSL port  it is applied to all ports     To enable Ham band of a port  use the SE command     no Ire PORTS ham band  all    Bridge Enables disabled Ham band   
209. d  m  admin 151 0 0 0 2 1428 544   S Jan01 0 00  sbin klogd  c 1                SMC7824M VSW    Management Guide  TigerAccess    EE    6 3 10    6 3 11    6 3 12    6 3 13    SMC7824M VSW    CLI  admin 103 2 E Sech 20552  SL0Q   S 20 12 0 53  usr sbin swchd   Omitted    SWITCH        Displaying System Image    To display a current system image version  use the following command      es e   n       Enable Global Bridge   Shows a version of system image     To display a size of the current system image  use the following command      men IS  show os size Enable Global Bridge   Shows size of system image     Displaying Installed OS       To display the current usage of the system flash memory  use the followng command      e e en       Shows the current usage of the system  Enable Global Bridge  flash memory     Default OS    The switch supports the dual OS feature  You can verify the running OS in the flash  memory with the show flash command  When two system OSs are installed  you can set  one of those as the default OS  To set the default OS of the system  use the following  command      e e en       default os  os1   os2  Sets the default OS of the system   default  os1     Switch Status    To display the temperature of switch  power status  fan and external alarm status  use the  following command     nn erem    Enable  Global  Bridge    show status temp  show status connector  show external alarm       133    CLI    134    6 3 14    6 3 15    Management Guide  TigerAccess 
210. d IP AddresSS      occoocccncconccnconnconecanconcanccannones 36  dE  System CONNECCION sita iaa 36  4 1 1 Connecting to the Console bot    36  EE EE 36  4 1 3 Password for Privileged EXEC Enable Mode          nnnnnnnnnnnnnnnennensnnnnnnnnnennne 37  4 1 4    Changing Login PaSSword its idos 38  4 1 5 Login Password Recovery Process    39  4 1 6 Management for System Account    40  416 1  Creating  SYSTEM Een EE 40  ef Secuela e ao ro Aa ee 40  4 1 7 Limiting Number of Ueers E 43  AO    AUTO LODO ais 44  Ble o AM 44  4 1 10 System FREDOOUIAG EE 45  4 1 10 1 Manual System Reboo0tiNg             cccoooccccccoconococnncocononoconcnononnnconanonononcnnonanenoss 45    4 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    4 1 10 2 Auto System ReEDOOTING A 46  42 EENHEETEN 47  4 210   AUMentication  Method cites eee eee ote cai eae eles eee 47  4 2 2 Authentication Interface             ccconcccconnccccnnnccconocononononocononnncnnnnonanononannonanones 47  4 2 3 Primary Authentication Method    47  42 4  RADIUS SV o e e e LoS 48  4 2 4 1 RADIUS Server for System Authentication               ccccccceeseeeeeeeeeeeeseeeeeeseeeeeens 48  424A 2   RADIUS Server Pron  EE 48  4 2 4 3 Timeout of Authentication Request             ccccccecccceececeeeceeeeeeeceeeeseeeesaeeeeseeeeeees 48  4 2 4 4 Frequency of HRetransmm   48  M20  TAGACGOE SOU tai 49  4 2 5 1 TACACS  Server for System Authentcaton      49  4202  TACACS  Server Priority caia 49  4 2 5 3 Timeout of Authentication Request   
211. d in bytes of IP packets per second  PIR must be equal to or greater than CIR   PBS and CBS are the maximum size for each token bucket  P and C  measured in bytes   Both of them must be configured with the values equal to or greater than the size of the  largest possible IP packet in the stream     The token buckets P and C are initially full  When a packet arrives  if the tokens in the  bucket P are smaller than the size of that packet  the packet is marked red  Else  if the to   kens in the bucket C are smaller than the size of that packet  those are decremented by  the size of that packet with the yellow color marking  Else  if the tokens in the bucket C  are larger than the size of that packet  those of both bucket P and C are decremented by  the size of that packet with the green color marking     Note that in the trTCM algorithm  when a packet arrives  the availability of tokens in the  token bucket P is checked first contrary to the srTCM  the order of color marking is red   yellow green     SMC7824M VSW    Management Guide  TigerAccess    EE    CLI    The following figures show the behavior of the trTCM     Tokens are regenerated  based on PIR faster than CIR     Y Bucket P    oy a       Tokens in both buckets are  decremented by the size of  the packet    Fig  7 7    Tokens are regenerated  based on PIR faster than CIR     y Jaen P     y    PBS       L  Er  gt     Fig  7 8       Behavior of trTCM  2     SMC7824M VSW        d  De De    Behavior of trTCM  1        Toke
212. d policer  use the follow   ing command     n   See        Sets the bandwidth for classified packets belonging to  rate limit BANDWIDTH Policer eS  specified policer  unit  kbps     Rate limiting is able to use a token bucket algorithm of metering  If some traffic exceeds  the rate limit because of its burst size  you can control burst capability of incoming or out   going traffic by the token bucket size  The largest burst source can send into the network  is roughly proportional to the size of the bucket  Thus  you can reduce the token bucket  size manually to decrease the burst size of traffic  To configure the size of a token bucket  per port or queue of port  use the following command      e me See    Sets the size of a token bucket to specified port by its       qos max bucketSize port    egress   ingress   PORTS  lt 12   16380 gt     direction  unit  kbps    12 16380  the range of token bucket size in steps of 4   default  16 kbps     Global Sets the size of a token bucket to a queue of specified      port   unit  kbps   qos max bucketSize port queue    0 7  queue number  PORTS queue  lt 0 7 gt   lt 12 16380 gt     12 16380  the range of token bucket size in steps of 4   default  16 kbps        177    CLI    178    7 6 3 5    7 6 4    7 6 4 1    D    Management Guide  TigerAccess    EE    To display configured size of a token bucket  use the following command      es me Se    show qos max bucketSize port Shows the token bucket size of all ports       show qos max bucke
213. d to each queue in  its round is proportional to the relative weight of the queue among all the queues serviced  by that scheduler     The queue of number 7 has 3 weights  handles the packet length of 768 bytes at once in  its round  If the queue of number 7 was not able to send all packets in its previous round  because its last packet size was too large  the remainder of 128 bytes from is added to  the packet length for the next round  Therefore  the queue of number 7 can send the  packets up to 896 bytes of length in its next round     199    CLI    200    7 6 9 1    7 6 9 2    7 6 9 3    Management Guide  TigerAccess    EE    Scheduling Mode    To select a packet scheduling mode  use the following command     a ee    Selects SP packet scheduling mode for ports or CPU     qos scheduling mode sp sp  Strict priority queuing   PORTS   cpu    lt 0 7 gt   PORTS  port numbers  0 7  queue number    Global Selects DWRR packet scheduling mode for ports or  qos scheduling mode dwrr CPU    group0   group1   PORTS   cpu  dwrr  deficit weighted round robin    lt 0 7 gt   PORTS  port number  eg  1 2  1 10   0 7  queue number       The default scheduling mode is DWRR  And it is possible to assign a different scheduling  mode to each port     Additionally  switch assigns DWRR scheduling mode for a group  If you select DWRR  packet scheduling mode for one port as a group  all queues of this port are treated exter   nally and internally by DWRR  However  if you select SP packet scheduling m
214. delay time for all MST instances    lt 4 30 gt  4 30  forward delay time value  default  15   Sets the forward delay time of PVSTP per VLAN   VLANS  VLAN ID  1 4094   4 30  forward delay time value  default  15     spanning tree vlan VLANS for   ward time  lt 4 30 gt        To delete a configured forward delay time  use the following command   om Te  aer    no spanning tree mst forward   Returns to the default value of MSTP   time  Bridge    no EE vlan VLANS    Returns to the Reunstote geiau value o1 PVSTP per VLAN  value of PVSTP eegenen VLAN   EE       283    CLI    284    8 3 12 3    8 3 12 4    Management Guide  TigerAccess    EE    Max Age    Maximum aging time is the number of seconds a switch waits without receiving spanning   tree configuration messages before attempting a reconfiguration     To configure the maximum aging time for deleting useless messages  use the following  command      e e re    Changes the maximum aging time of route message of  MSTP   6 40  maximum aging time value  default  20 sec     spanning tree mst max age  lt 6   40 gt     Changes the maximum aging time of route message of  spanning tree vlan VLANS max  PVSTP per specified VLAN   age  lt 6 40 gt  VLANS  VLAN ID  1 4094     6 40  maximum aging time value  default  20 sec        We recommend that the maximum aging time is set less than twice of forward delay time  and more than twice of hello time     To delete a configured maximum aging time  use the following command    men E II      Retur
215. dentify subject using various data from event  To identify  subject of RMON event  use the following command      e e Se       Identifies subject of event  You can use maximum 126  owner NAME RMON characters and this subject should be same with the  subject of RMON event     Event Type    When RMON event is happened  you need to configure event type to arrange where to  send event     To configure event type  use the following command    mr een    i Configures event type as log type  Event of log type is  e lo  Mee sent to the place where the log file is made   RMON    Configures event type as trap type  Event of trap type    etm e tra  etm H is sent to SNMP administrator and PC     aa type log and trap   Configures event type as both log type and trap type         npenone none Configures none event type     Activating RMON Event    After finishing all configurations  you should activate RMON event  To activate RMON  event  use the following command     na e re       active   RMON Activates RMON event     Deleting Configuration of RMON Event    Before changing the configuration of RMON event  you should delete RMON event of the  number and configure it again     To delete RMON event  use the following command      e Y Se       no rmon event  lt 1 65535 gt  Global Delete RMON event of specified number     SMC7824M VSW    Management Guide  TigerAccess    EE    7 9    7 5 1    SMC7824M VSW    CLI    Syslog    The syslog is a function that allows the network element to generate t
216. detail  NAME     show running config   admin   All Shows all configurations of admin rules   flow   admin policy         197    CLI    198    7 6 9    Management Guide  TigerAccess    EE    Scheduling Algorithm    For the switch  it is possible to use Strict Priority Queuing and Deficit Weighted Round  Robin for a packet scheduling mode     The following sections explain how QoS can be configured   e Scheduling Mode   e Weight   e Maximum and Minimum Bandwidth   e Maximum Buffer numbers   e Queue Status   e Displaying QoS   e Weighted Random Early Detection  WRED     To process incoming packets by the queue scheduler  the switch provides the scheduling  algorithm as Strict Priority Queuing  SP  and Deficit Weighted Round Robin  DWRR      Strict Priority Queuing  SP     SPQ processes first more important data than the others  Since all data are processed by  their priority  data with high priority can be processed fast but data without low priority  might be delayed and piled up  This method has a strong point of providing the distin   guished service with a simple way  However  if the packets having higher priority enter   the packets having lower priority are not processed     The processing order in Strict Priority Queuing in case of entering  packets having the Queue numbers as below       Lowest priority    Output Scheduler    highest priority                            Fig  7 11 Strict Priority Queuing    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VS
217. dge  restore  lt 1 720 gt  j 1 720  Wait to restore time in second  To return the configured Wait to Restore Time as Default  use the EC command        no erp domain DOMAIN ID wait   Bridge Configures ERP wait to restore time as default value   to restore    Learning Disable Time    To prevent wrong MAC learning due to the remaining packets of buffer  a node does not  learn MAC addresses during the learning disable time  This parameter holds the time  in  milliseconds  during which learning is disabled after FDB flushing and can be configured  by the operator  The learning is only disabled for the protected VLAN of the domain on  the ERP ports     To configure a Learning Disable Time  use the following command     naa m   See    erp domain DOMAIN ID learning  Brid Configures ERP learning disable time   ridge  disable time  lt 0 500 gt  R 0 500  learning disabling time  unit  millisecond        297    CLI    298    8 4 10    8 4 11    Management Guide  TigerAccess    EE    To return the configured learning disable time as default  use the following command      e See       no erp domain DOMAIN ID learn   Bridge Configures ERP learning disable time as default value   ing disable time    Test Packet Interval    RM Node periodically sends    RM Test Packet    message to detect the loop  To configure  an interval to send Test Packet message of RM node  use the following command      e e een    erp domain DOMAIN ID test  Brid Specifies the interval of ERP test packet   ridge  packe
218. directly  outband  or through the  access network  inband   It can even connect using a combination of the two  for example   a cascaded switch connects inband to the cascading switch  and then from the cascading  switch to the management network through the outband interface     The switch also provides the RS232 console interface to simply access the system with a  provided RJ45 to DB9 cable     This chapter describes a basic instruction for using the command line interface  CLI   which is used for managing the system     e Configuration Mode  e Configuration Mode Overview  e Useful Tips    Configuration Mode    You can configure and manage the switch with the CLI via a management network envi   ronment or the console interface     The CLI provides the following command modes   e Privileged EXEC View Mode   e Privileged EXEC Enable Mode   e Global Configuration Mode   e Bridge Configuration Mode   e DHCP Pool Configuration Mode   e DHCP Option 82 Configuration Mode   e Interface Configuration Mode   e Rule Configuration Mode   e RMON Configuration Mode    25    CLI    26    3 1 1    3 1 2    Management Guide  TigerAccess    EE    Privileged EXEC View Mode    When you log in to the switch  the CLI will start with Privileged EXEC View mode which is  a read only mode  In this mode  you can see a system configuration and information with  several commands     Tab  3 1 shows main command of Privileged EXEC View mode     Opens Privileged EXEC Enable mode        eben   Shows a sys
219. display information of error disable recovery function  use the following command      es e See       show errdisable recovery Shows information of error disable recovery function        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    8 3 13 Sample Configuration    Backup Route    When you design layer 2 network  you must consider backup route for stable STP net   work  This is to prevent network corruption when just one additional path exits      gt        N             Switch B              lt  witch C     lt     111      gt   Switch A       Aggregation  Switch                   witch D                            Switch E    Fig  8 27 Example of Layer 2 Network Design in RSTP Environment    In ordinary case  data packets go to Root switch A through the blue path  The black ar   rows describe the routine path to the Aggregation Switch  And the dot lines are in blocking  state  But if there is a broken between Switch A and Switch B  the data from PC A should  find another route at Switch D  Switch D can send the data to Switch C and Switch E  Be   cause Switch E has shorter hop count than Switch B  the data may go through the Switch  E and A as the red line  And we can assume Switch E is also failed at the same time  In  this case  since Switch D can has the other route to Switch C  the network can be stable  than just one backup route network     SMC7824M VSW 287    CLI    288    MSTP Configuration          MST Region 1  Instance 1 VLAN 111 120  Instance 2 VLAN 12
220. displaying is 512 lines     To set the number of the lines displaying on terminal screen  use the following command      e e re         Sets the number of the lines displaying on a terminal  terminal length  lt 0 512 gt   Enable screen  enter the value     no terminal length Restores a default line displaying     Login Banner    It is possible to set system login and log out banner  Administrator can leave a message  to other users with this banner     To set system login and log out banner  use the following command      e e See    Sets a banner before login the system     banner login Global Sets a banner when successfully log in the system     banner login fail Sets a banner when failing to login the system        115    CLI    116    6 1 8    Management Guide  TigerAccess    EE    To restore a default banner  use the following command      men ra pon  no   no banner login   no banner login Global Restores a default banner     no   no banner login fail     no banner login fail         To display a current login banner  use the following command     Command Mode Description    Enable  show banner Global Shows a current login banner   Bridge    DNS Server       To set a DNS server  use the following command     Some om  dns server A B C D Sets a DNS server    Global  no dns server A B C D Removes a DNS server        To display a configured DNS server  use the following command      e See    Enable  Global Shows a configured DNS server   Bridge    If a specific domain name is
221. domain     ERP Domain Name       After ERP domain creation  you can specify its name  To specifiy ERP domain name  use  the following command     ee   en  name NAME Configures ERP domain name   noname Domain Deletes the configured ERP domain name     Primary and Secondary Port       To configure Primary Port and Secondary port of a specific domain ID  use the following  command     een EE  primary port PORT Configures primary port of an ERP domain    secondary port PORT   port   secondary port PORT   Domain Configures secondary port of an ERP domain    Primary port and secondary port should be different        To delete ERP domain ID   s primary or secondary port  use the following command     Keel  no primary  no primary port   RP Deletes primary port of an ERP domain  no secondary port Domain Deletes secondary port of an ERP domain    Protected VLAN       ERP enabled switches within same ring send receive data packets to from each other us   ing their protected VLAN     To configure a protected VLAN of an ERP domain  use the following command      e e E    no   no protected vlan  VLAN  VLAN        ege VLAN Configures a protected VLAN of ERP domain   Domain    Deletes configured protected VLAN of ERP domain    SMC7824M VSW    Management Guide  TigerAccess    EE    8 4 4 4    8 4 4 5    8 4 4 6    SMC7824M VSW    CLI    Control VLAN    RM Node periodically sends    RM Test Packet    message to detect the loop  RM Test  packet message can be transmiited by control VLAN only  E
222. e    TYPE NUM  Ethernet type field  hex  e g  0800 for  ethtype  7YPE NUM   arp   any  IPv4    arp  address resolution protocol   any  any Ethertype  ignore     ip header error Classifies the IP header error     Classifies the IP header length   ip header length  lt 1 15 gt    1 15  IP header length value    ip header error command can be used only when specifying a source and destination IP        address as a packet classifying pattern        SMC7824M VSW 173    CLI    174    7 6 2 3    7 6 2 4    Management Guide  TigerAccess    EE    To delete a specified packet classifying pattern  use the following command       mn    no ip precedence    no ethtype Deletes a specified packet classifying pattern for each  no mac da not found  no ip header length    no ip header error       Applying and modifying Flow    After configuring a flow using the above commands  apply it to the system with the follow   ing command  If you do not apply the flow to the system  all specified configurations on  Flow Configuration mode will be lost     To save and apply a flow  use the following command     man Te Tengen  apply Applies a flow to the system     To modify a flow  use the following command           flow NAME modify Global Modifies a flow  enter a flow name     You should save and apply the flow to system whenever you modify or configure the flow     Class Creation    A class is a set of flows  More than 2 flows can belong to one class  You can simply han   dle and configure the packets 
223. e  TigerAccess    EE    To configure the number of buffers per each port or queue  use the following command      e e See    Sets the total number of buffers for a port     qos max queue length port PORTS  port number  PORTS  lt 16 4080 gt  16 4080  total buffer numbers in increments of 16  de     fault  256     Sets the number of buffers for each queue of a port   PORTS  port number  0 7  queue number    qos max queue length port  PORTS queue  lt 0 7 gt   lt 16 4080 gt        To display the total number of buffers for a port and queue  use the Ge command     show oos max queue length Global EE AU the total number of buffers for a port and queue   O  port PORTS PORTS  port number    7 6 9 5 Queue Status       To display a current queue status  use the following command      e e re    Enable  show queue status   cpu   Gaba Shows a current queue status   oba  PORTS    lt 0 7 gt   0 7  queue number  Bridge       7 6 9 6 Displaying QoS    To display the configuration of QoS  use the following command     na e een    Shows the configuration of QoS for all ports     show qos PORTS   Shows the configuration of QoS per each port        202 SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 9 7    SMC7824M VSW    CLI    Weighted Random Early Detection  WRED     The switch supports Weighted Random Early Detection  WRED  which can selectively  discard lower priority traffic when the interface begins to get congested and provide dif   ferentiated performance characteristics for d
224. e  default 6 dB   Son ame Bridge    Ire PORTS snr min margin  lt 0  Configures minimum SNR margin    31 gt   up   down  0 31  minimum SNR margin value  default  5 dB        89    CLI Management Guide  TigerAccess    EE    To display SNR margin  use the following command      es e eme       show Ire snr  PORTS  Enable Global Bridge   Shows the configuration of SNR margin     The following is an example of configuring SNR margin of port 3 as    10dB        SWITCH  bridge    lre 3 snr target margin 10 down  SWITCH  bridge    show lre snr 1 5    Port Status Config SNR Target SNR Minimum  ADM OPR Margin Margin  UP DOWN UP DOWN  1 Up Down 6  6 oy ae  2 Up Down 6  6 by ZS  3 Up Down 6  10 OY ao  4 Up Down 6  6 Ge   5 Up Down 6  6 oy aap    SWITCH  bridge       5 3 2 12 Bitloading Per Tone    The bitloading per tone command is used to fetch the table that shows bit loading  SNR   attenuation  FEQ fine coeff  noise margin  and so on     To display the table of each parameter in the range of tone  use the following command     nn Y m   Y en    show Ire pertoneinfo PORT  rx bit ne   tx bit ne Enabl Shows the table of each parameter  bit   nable      snr ne   noise margin ne   atten ne   feq ne   SR loading  SNR  FEQ fine coeff  noie   oba   tx pwr ne   tx gi ne   qln ne   coarse feq ne   Brid margin and so on  in the range of tone   ridge    lt 0 4095 gt   lt 0 4095 gt   graph  lt 1 4095 gt   S 0 4095  start  stop tone index       To display the table of each parameter in the range of t
225. e  port  connected to root switch is named root port  In the above picture  port of SWITCH C con   nected to SWITCH A as Root switch is root port  There can be only one root port on  equipment     When root path costs are same  bridge ID is compared     Designated Port and Root Port    A root port is the port in the active topology that provides connectivity from the designated  switch toward the root  A designated port is a port in the active topology used to forward  traffic away from the root onto the link for which this switch is the designated switch  That  is  except root port in each switch  the selected port to communicate is a designated port   Port Priority    Meanwhile  when the path cost of two paths are same  port priority is compared  As the  below picture  suppose that two switches are connected  Since the path costs of two  paths are 100  same  their port priorities are compared and port with smaller port priority  is selected to transmit packet     All these functions are automatically performed by BPDU  which is the bridge information  exchanged between switches to activate or disable a specific port  It is also possible to  configure BPDU to change a root switch or path manually     SMC7824M VSW    Management Guide CLI  TigerAccess    EE      Path cost 100    Port priority 7    Port 1   Path 1    l pan 2      Path cost 100    Port priority 8    Port 2    Root                        path cost of PATH 1   path cost of PATH 2   100    unable to compare  PATH 1
226. e IP network with a small amount of IP resources in the  environment that most users do not have to access the IP network at the same time all  day long  This allows the network administrators to save the cost and IP resources     Efficient IP Management    By deploying DHCP in a network  this entire process is automated and centrally managed   The DHCP server maintains a pool of IP addresses and leases an address to any DHCP   enabled client when it logs on to the network  Because the IP addresses are dynamic   leased  rather than static  permanently assigned   addresses no longer in use are auto   matically returned to the pool for reallocation     DHCP Packet  J  Unicast          IP Packet     Broadcast  DHCP Server or Relay Agent                      Subnet    Der ee ee eege E       8 ep ep ep ep ep ep ep ep ep ea ep  o me    ZS PC DHCP Client    Fig  8 34 DHCP Service Structure    SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 1    D    SMC7824M VSW    CLI    The switch flexibly provides the functions as the DHCP server or DHCP relay agent ac   cording to your DHCP configuration     This chapter contains the following sections     e DHCP Server   e DHCP Address Allocation with Option 82  e DHCP Lease Database   s DHCP Relay Agent   e DHCP Option 82   e DHCP Snooping   e IP Source Guard   e DHCP Client   e DHCP Filtering   e Debugging DHCP    DHCP Server    This section describes the following DHCP server related features and configurations     e DHCP Pool Cre
227. e are three type of VLAN mode    e Promiscuous  A promiscuous port can communicate with all interfaces  including the  isolated and community ports within a PVLAN    e Isolated  An isolated port has complete Layer 2 separation from the other ports within  the same PVLAN  but not from the promiscuous ports  PVLANs block all traffic to iso   lated ports except traffic from promiscuous ports  Traffic from isolated port is for   warded only to promiscuous ports     243    CLI    default    Fig  8 5    244    8 1 10 1                               Outer Network          Management Guide  TigerAccess    EE    e Community  Community ports communicate among themselves and with their pro   miscuous ports  These interfaces are separated at Layer 2 from all other interfaces in  other communities or isolated ports within their PVLAN     The difference between Private VLAN and Private VLAN edge is that PVLAN edge guar   antees security for the ports in a VLAN using protected port and PVLAN guarantees port  security by creating sub VLAN with the three types  Promiscuous  Isolation  and Commu   nity   And because PVLAN edge can work on local switch  the isolation between two  switches is impossible     The switch provides Private VLAN function like Private VLAN edge of Cisco product  Be   cause it does not create any sub VLAN  port security is provided by port isolation  If you  want to configure Private VLAN on the switch switch  refer to Port Isolation configuration     Shared VLAN    Thi
228. e configured by user    Enable    copy eee   tftp  os upload  os1   Uploads a file to ftp or FTP server with a name of os1       eee or os2     copy E   tftp  os download Downloads a file from FTP or TFTP server with a name       E acacia   0s2  of os1 or os2     To access FTP to back up the configuration or use the backup file  you should know FTP  user ID and the password  To back up the configuration or use the file through FTP  you  can recognize the file transmission because hash function is automatically turned on     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    To delete a system configuration file  use the following command      e ma See         Enable Deletes a specified configuration file   erase config FILENAME l ep  Global FILENAME  configuration file name  To display a system configuration file  use the following command     IC E re  show startup config Enable Shows a current startup configuration     Global  show config list l Shows a list of configuration files   Bridge    6 2 5 Restoring Default Configuration       To restore a default configuration of the system  use the following command      e me See       restore factory defaults to Restores a factory default configuration   Enable    restore layer2 defaults Restores an L2 default configuration     D After restoring a default configuration  you need to restart the system to initiate     SMC7824M VSW 125    CLI    126    6 3    6 3 1    Management Guide  TigerAccess    EE    System Management 
229. e difference of between alternate port and backup port is that an alternate port can al   ternate the path of packet when there is a problem between Root switch and SWITCH C  but Backup port cannot provide stable connection in that case     BPDU Policy    In 802 1d  only root switch can generate BPDU every hello time and other swithches can   not  They can create BPDU when receiving BPDU from the root switch  However  in  802 1w not only root switch but also all the other switches forward BPDU following Hello   time  BPDU is more frequently issued than the interval the root switch exchanges  but  with 802 1w conversion to the forwarding state become faster to keep up with changing  network     By the way  when low BPDU is received from root switch or designated switch  it is im   mediately accepted  For example  suppose that root switch is disconnected to SWITCH B   Then  SWITCH B is considered to be root because of the disconnection and forwards  BPDU     However  SWITCH C recognizes root existing  so it transmits BPDU including information  of root to Bridge B  Thus  SWITCH B configures a port connected to SWITCH C as new  root port     Switch A       ROOT       New Root  Port       Low BPDU     gt     Switch B Switch C    BPDU including  Root information       Fig  8 16 Example of Receiving Low BPDU    Rapid Network Convergence    A new link is connected between SWITCH A and root  Root and SWITCH A is not directly  connected  but indirectly through SWITCH D  After SWITCH A
230. e me See       i Configures the first RMON Alarm to occur when object  startup type falling RMON l l  is less than lower bound of threshold first     To configure the first alarm to occur when object is firstly more than upper bound of  threshold  use the following command      e e re    ro Configures the first Alarm to occur when object is firstly  startup type rising RMON  more than upper bound of threshold     To configure the first alarm to occur when object is firstly more than threshold or less than  threshold  use the following command      e e re          Seck l Configures the first Alarm to occur when object is firstly  startup type rising and falling RMON  more than threshold or less than threshold     Interval of Sample Inquiry    The interval of sample inquiry means time interval to compare selected sample data with  upper bound of threshold or lower bound of threshold in terns of seconds     To configure interval of sample inquiry for RMON alarm  use the following command      e e See    i Configures interval of sample inquiry   sample interval  lt 0 65535 gt  RMON l   unit  second     Activating RMON Alarm       After finishing all configurations  you need to activate RMON alarm  To activate RMON  alarm  use the following command     CECR       SMC7824M VSW    Management Guide  TigerAccess    EE    7 4 2 9    7 4 3    7 4 3 1    7 4 3 2    SMC7824M VSW    CLI    Deleting Configuration of RMON Alarm    When you need to change a configuration of RMON alarm  you sh
231. e of configuring power consumption as 400m     SWITCH  bridge    lre 1 5 pbo length 4   SWITCH  bridge    show lre psd 1 7   Port Status Up Stream PBO Length PSD MASK  ADM OPR PBO  10 Custom  Level    Up Down Enable  Up Down Enable  Up Down Enable  Up Down Enable  Up Down Enable  Up Down Enable       ATO OO   s W N PH                      Up Down Enable    SWITCH  bridge       SMC7824M VSW 81    CLI    82    Management Guide  TigerAccess    EE    The following is an example of configuring the power consumption per upstream band of  port 1 as 100m to 400m     SWITCH  bridge    lre 1 band pbo length u0 1 ul 2 u2 3 u3 4  SWITCH  bridge    show lre psd 1 7    Port  Status Up Stream PBO Length PSD MASK  ADM OPR PBO  10 Custom  Level                1 Up Down Enable 1  2 Up Down Enable 4 4 4 4 1  3 Up Down Enable 4 4 4 4 1  4 Up Down Enable 4 4 4 4 1  5 Up Down Enable 4 4 4 4 1  6 Up Down Enable 2 2 2 2 1  7 Up Down Enable 2 2 2 2 E                   SWITCH  bridge       However  even though inner value of PBO Length is already configured and user config   ured the most appropriate PBO Length  inner value could be unfit according to detailed  environment To improve this point  in switch it is possible that user configure the attribute  of PBO Length  The attribute of PBO Length is appointed as PBO Config  user s default  PBO Config is appointed as PBO Length    10        To configure PBO config  use the following command      ze e rees       Ire pbo config K1 1  K1 2  K1 3  K2 1  e 
232. e switch     Privileged EXEC View  SWITCH gt  exit    Back to previous mode    enable    Privileged EXEC Enable  SWITCH     configure terminal    end  Back to Privileged EXEC Enable mode    Global Configuration mode  SWITCH config      ip dhcp pool POOL   POOL  pool name     DHCP Pool Configuration mode  SWITCH config dhcp POOL       ip dhcp option82    Option 82 Configuration mode  SWITCH  config opt82      rmon alarm  lt 1 65535 gt   rmon event  lt 1 65535 gt   rmon history  lt 1 65535 gt     RMON Configuration mode  SWITCH config rmonalarm N       SWITCH config rmonevent N     SWIT CH config rmonhistory N          Fig  3 1 Overview of Configuration Mode    SMC7824M VSW    interface INTERFACE  INTERFACE  interface name    Interface Configuration mode  SWITCH  config if      bridge    Bridge Configuration mode  SWITCH bridge      flow  admin  NAME create  NAME  flow name   policer NAME create  NAMEL policer name   policy  admin  NAME create  NAME  policy name     Rule Configuration mode  SWITCH config flow NAME        SWITCH  config policer NAME J    SWIT CH config policy NAME          31    CLI Management Guide  TigerAccess    EE    3 3 Useful Tips    This section describes useful tips for operating the switch with a CLI     e Listing Available Command   e Calling Command History   e Using Abbreviation   e Using Command of Privileged EXEC Enable Mode  e Exit Current Command Mode    3 3 1 Listing Available Command    To list available commands  input question mark  lt   gt  
233. e tagged traffic  A trunk port is always connected to another trunk  port on a different switch  Switching shall be performed between trunk ports and tunnels  ports and between different trunk ports     Double Tagging Operation    Step 1   If there is no SPVLAN Tag on received packet  SPVLAN Tag is added   SPVLAN Tag   TPID   Configured TPID   VID   PVID of input port    Step 2   If received packet is tagged with CVLAN  the switch transmits it to uplink port changing to  SPVLAN   CVLAN  When TPID value of received packet is same with TPID of port  it  recognizes as SPVLAN  and if not as CVLAN     Step 3  lf Egress port is Access port  Access port is configured as Untagged   remove SPVLAN  If  egress port is uplink port  transmit as it is     Step 4  The switch switch has 0x8100 TPID value as default and other values are used as hexa   decimal number     Double Tagging Configuration    Step 1  Designate the QinQ port      e e Se         Configures a qinq port   vlan dot1q tunnel enable PORTS Bridge    PORTS  qinq port to be enabled    Step 2  Configure the same PVID with the VLAN of peer network on the designated qinq port      e e Se    Configures a qinq port     vlan pvid PORTS  lt 1 4094 gt  PORTS  qinq port to be enabled  1 4094  PVID       SMC7824M VSW    Management Guide  TigerAccess    EE    8 1 9 3    8 1 10    SMC7824M VSW    CLI    To disable double tagging  use the following command     e me See       vlan dot1q tunnel disable Brid Configures a qinq port   ridge  PO
234. e the following command      e e een       passwd  NAME  Global Configures a password for created account     The following is an example of changing the current password     SWITCH  config    passwd  Changing password for admin    Enter the new password  minimum of 5  maximum of 8 characters        Please use a combination of upper and lower case letters and numbers     Enter new password  junior 95       Re enter new password  junior 95  Password changed   SWITCH  config       The password you are entering will not be shown in the screen  so please be careful not  to make a mistake     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    4 1 5 Login Password Recovery Process    To upgrade the system software in the boot mode  perform the following step by step in   struction     Step 1  After the switch is manually restarted     Start Address  0x010000000    will be  shown up     Step 2  Keep on pressing  Space Bar  key until    console ttyS0 9600 root  dev ram rw     is shown up on the screen     Step 3   Enter    password    next to    console ttyS0 9600 root  dev ram rw       Step 4   Check    password restore to default       onthe booting messages  It means that    the current password returns to the default setting     Step 4   Check    password restore to default       on the booting messages  lt means that  the current password returns to the default setting  By default setting  the password is  configured as nsn switch     KAKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK
235. ear the collected IGMP snooping statistics  use the following command      e Y See       clear ip igmp snooping stats Enable Clears the collected IGMP snooping statistics  port  PORTS   cpu  Global PORTS  port number       SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 6    9 2 6 1    9 2 6 2    SMC7824M VSW    CLI    Multicast VLAN Registration  MVR     Multicast VLAN registration  MVR  is designed for applications using multicast traffic  across an Ethernet network  MVR allows a multicast VLAN to be shared among subscrib   ers remaining in separate VLANs on the network  It guarantees the Layer 2 multicast  flooding instead of the forwarding via Layer 3 multicast  allowing to flood multicast  streams in the multicast VLAN  but to isolate the streams from the subscriber VLANs for  bandwidth and security reasons  This improves bandwidth utilization and simplifies multi   cast group management     MVR also provides the fast convergence for topology changes in the Ethernet ring based  service provider network with STP and IGMP snooping TCN  guaranteeing stable multi   cast services     MVR implemented for the switch has the following restrictions  so you must keep in mind  those  before configuring MVR     e All receiver ports must belong to the both subscriber and multicast VLANs as un   tagged    e IGMP snooping must be enabled before enabling MVR    e Asingle MVR group address cannot belong to more than two groups    e MVR and multicast routing cannot be enabled t
236. eeeeeeeeeeeeeseeeeesseeeeesaeeeeesaaeeees 371  G   en De Ae RING HING E 371  SA E ee eee ee 373  9 2 7 3 Displaying IGMP Filtering and Throttling                  o cccoooccncoonccncnoncnnonanoncnnos 373   9 2 8 Multicast Source Trust Hot    373  10 System Software Upgrade    oocooocccncconcconcconccocccncccnnonccanncanonanonanonanos 375  10 1 General Beete EE 375  10 2 Boot ee EE ele EE 376  DIETA DOE sicario ata abia eens 379  TT ADDEOVIATIONS E 381    SMC7824M VSW 15    CLI    16    Management Guide  TigerAccess    EE    Illustrations   Fig  2 1 The fr  nt view of SWITCH EE 22  Fig  3 1 Overview of Configuration Mode     oooccccocccncccoccnccconcnnconacocononnnnnnnnconconanencononens 31  Fig  4 1 Process of 802 1x Authentication                cocoooccoccccononoconnncoconnnnononnnncnnannnnnnnns 58  Fig  4 2 Multiple Authentication Servers A 59  Fig  5 1 Transmission in DSL System      ooooccccccnccnnccnoccncononnnonnnnnnnnnnnnnnnnnncnnnnnnrnncnnanennss 75  Fig  9 2 DNT Modula ON EE 76  Fig  5 3 Deciding Transmit Rate according to SNR Marom  89  Fig  5 4 Counting Mon GR EN EE 92  Fig  5 5 AA O PO PE PE OE II dese 110  Fig  6 1 Ping Test tor Network Status aia o 128  Fig  6 2 IP Source ROUINO MES 129  Fig  7 1 Procedure Of QOS operaton  169  Fig  7 2 Structure O RUG eino ua a 170  Fig  7 3 Token BUCK EE IVIGION EE 180  Fig  7 4 Behavior Ol STTECM A KEE 181  Fig  7 5 Behavior o Srl ECK EE 181  Fig  7 6 Banavior or SEEC M EE 182  Fig  7 7 Benavior Of TOM Ke EE 183  Fig  7 8 Be
237. ef  l INTERFACE  interface name  Bridge       The following is the sample output of the show ip interface brief command     SWITCH  config   show ip interface brief    Interface IP Address Status PEOTOCOL  lo unassigned up up  mgmt 10 27 41 91 up up  default unassigned up up    SWITCH  config       94 SMC7824M VSW    Management Guide  TigerAccess    EE    4 4    4 4 1    4 4 1 1    4 4 1 2    4 4 1 3    SMC7824M VSW    CLI    Secure Shell  SSH     Network security is getting more important because the access network has been gener   alized among numerous users  However  typical FTP and telnet service have big weak   ness for their security  Secure shell  SSH  is a network protocol that allows establishing a  secure channel between a local and a remote computer  It uses public key cryptography  to authenticate the remote computer and to allow the remote computer to authenticate the  user     SSH Server    The switch can be operated as SSH server  You can configure the switch as SSH server  with the following procedure     e Enabling SSH Server   e Displaying On line SSH Client   e Disconnecting SSH Client   e Assigning Specific Authentication Key   e Displaying Connection History of SSH Client    Enabling SSH Server    To enable disable SSH server  use the following command      ss e re    ssh server enable   Enables SSH server  SSH   Enables SSH server     Global  ssh server disable Disables SSH server     Displaying On line SSH Client       To display SSH clients connected t
238. effective network composition since switch is not needed     Enhanced Security    When using a shared bandwidth LAN  there is no inherent protection provided against  unwanted eavesdropping  In addition to eavesdropping  a malicious user on a shared  LAN can also induce problems by sending lots of traffic to specific targeted users or net   work as a whole  The only cure is to physically isolate the offending user  By creating  logical partitions with VLAN technology  we further enhance the protections against both  unwanted eavesdropping and spurious transmissions  As depicted in Figure  a properly  implemented port based VLAN allows free communication among the members of a  given VLAN  but does not forward traffic among switch ports associated with members of  different VLANs  That is  a VLAN configuration restricts traffic flow to a proper subnet  comprising exactly those links connecting members of the VLAN  Users can eavesdrop  only on the multicast and unknown unicast traffic within their own VLAN  presumably the  configured VLAN comprises a set of logically related users     User Mobility    By defining a VLAN based on the addresses of the member stations  we can define a  workgroup independent of the physical location of its members  Unicast and multicast  traffic  including server advertisements  will propagate to all members of the VLAN so that  they can communicate freely among themselves     SMC7824M VSW    Management Guide  TigerAccess    EE    8 1 1    SMC7824M
239. egion name  re   vision  and a VLAN map     To set the configuration ID  use the following command on MSTP Configuration mode   man Te eng    Sets the MSTP region name   name NAME  NAME  the name of MSTP region     Maps the specified vlans to an MSTP instance     instance  lt 1 64 gt  vlan VLANS MST config   1 64  select an instance ID number   VLANS  VLAN ID  1 4094     Specifies a revision number   revision oss     revision oss     65535 gt  l l o   0 65535  the MSTP configuration revision number        In case of configuring STP and RSTP  you do not need to set the configuration ID  If you  try to set configuration ID on STP or RSTP  an error message will be displayed     SMC7824M VSW    Management Guide  TigerAccess    EE    LE     SMC7824M VSW    CLI    You can create the MSTP regions without limit on the network  But the instance id num   bers of each region should not be over 64     To delete the configuration ID setting  use the following command     a ge  Deletes the name of MSTP region    Deletes part of vlan mapping  select the instance ID    number and vian id to remove from the specified in   no instance  lt 1 64 gt  vlan VLANS MST config   stance   1 64  instance ID number   VLANS  VLAN ID  1 4094     no revision Deletes the configured revision number     After configuring the configuration ID in the switch  you should apply the configuration to  the switch  After changing or deleting the configuration  you must apply it to the switch  If  not  it does not being
240. em occurs because the keepalive packet is looped back to the port that sent the  keepalive  Keepalives are sent on the switches in order to prevent loops in the network   You see this problem on the device that detects and breaks the loop  but not on the de   vice that causes the loop     To enable error disable detection for loop back cause  use the following command      See See      Enables error disable detection for loop  errdisable detect cause loopback  back cause  Bridge    Disables error disable detection for loop  no errdisable detect cause loopback  back cause       To display the status of error disable cause  use the following command     OO eom e O  show errdisable detect cause Shows status of error disable causes    To enable disable the error disable recovery function for loop back cause  use the follow   ing command      ze a ee    Enables the recovery function for loop       Disables the recovery function for loop    no errdisable recovery cause loopback  back error disable cause       errdisable recovery cause loopback  l back error disable cause  EEN B    281    CLI    282    8 3 12    i     Management Guide  TigerAccess    EE    To specify the time to recover from a specified error disable cause  use the following  command      es e Se    errdisable recovery interval Sets the interval of error disable recovery    lt 30 86400 gt  Ges 30 86400  the recovery interval  default  300 sec   ridge    no errdisable recovery inter  Deleted the con figured time for 
241. ement Guide  TigerAccess    EE    Default Alarm Severity    To set default alarm severity  use the following command     a ee    snmp alarm severity default    AT i f   Sets default alarm severity    critical   major   minor   warning Global l    l  default  minor     intermediate        Generic Alarm Severity    To set generic alarm severity  use the following command     DECI O    snmp alarm severity fan fail  critical   major    minor   warning   intermediate     snmp alarm severity cold start  critical   major      minor   warning   intermediate     snmp alarm severity broadcast over  critical      major   minor   warning   intermediate     snmp alarm severity cpu load over  critical      major   minor   warning   intermediate     snmp alarm severity dhcp lease  critical   ma   jor   minor   warning   intermediate    snmp alarm severity dhcp illegal  critical    major   minor   warning   intermediate    snmp alarm severity fan remove  critical    major   minor   warning   intermediate    snmp alarm severity ipconflict  critical   major    minor   warning   intermediate     snmp alarm severity memory over  critical      major   minor   warning   intermediate     snmp alarm severity mfgd block  critical      major   minor   warning   intermediate     snmp alarm severity port link down  critical      major   minor   warning   intermediate     snmp alarm severity port remove  critical      major   minor   warning   intermediate     snmp alarm severity port thread over  critic
242. en EBS  CBS Token  E           Tokens are decremented JL  the si f th ket  geet Petre Green Color Marking    De Ile    Fig  7 4 Behavior of srTCM  1     Tokens are regenerated Tokens are regenerated  based on CIR based on CIR  Bucket C Bucket E  E e IESSE ENEE  Token EBS    CBS Empty    If the bucket C is empty  the tokens in  the bucket E are decremented by the          size of the packet    0a ME  gt     Yellow Color Marking    Fig  7 5 Behavior of srTCM  2     181    CLI    182    Management Guide  TigerAccess    EE    Tokens are regenerated Tokens are regenerated  based on CIR based on CIR  Bucket C Bucket E  E S    AN pre orem rn eee reer ee  A  Empty EBS  CBS Empty  _ y          If both buckets are empty   a packet is marked red    ee  gt   gt     Red Color Marking       Fig  7 6 Bahavior of srTCM  3     Two Rate Three Color Marker  trTCM     The trTCM meters an IP packet stream and marks its packet the one among green  yel   low  and red using Peak Information Rate  PIR  and its associated Peak Burst Size  PBS   and Committed Information Rate  CIR  and its associated Committed Burst Size  CBS   A  packet is marked red if it exceeds the PIR  Otherwise  it is marked either yellow or green  depending on whether it exceeds or does not exceed CIR  The trTCM is useful for ingress  policing of a service  where a peak rate needs to be enforced separately from a commit   ted rate     PIR and CIR are the regenerating rate of tokens for PBS and CBS respectively  which is  measure
243. en a link is shared by two or more rings   one RM node with the highest priority is responsible to protect failures of the shared link   Two normal nodes of a shared link belong to both ERP domains  The control packets   TPs  can be transmitted from the lower priority domain to higher priority domain only     Fig  8 33 shows the example of ring interconnection using one shared link     RM Node A Node 4 RM Node B       LO  ERP Ring A SS ERP Ring B       Node 1 Node 2 Node 3    Fig  8 33 Shared Link    ERP shared link environment has the following requirements  so you should keep in mind  them before configuring ERP ring topology with a shared link     e A port adjacent to the shared link should not be blocked  It means that a shared link  that is used as the one of the secondary ports of a RM node    e lf there are two ERP domains with a single shared link  you should specify different  priority of ERP domains    e The higher priority domain should include all protected and control VLANs of the  lower priority domain to protect and manage the lower priority ring more effectively     293    CLI    294    8 4 4    8 4 4 1    8 4 4 2    8 4 4 3    Management Guide  TigerAccess    EE    Configuring ERP Domain    To realize ERP  you should fist create domain for ERP  To create the domain  use the fol   lowing command      e me See    Creates ERP domain and opens ERP domain configu     erp domain DOMAIN ID ration mode   DOMAIN ID   lt 1 64 gt     no erp domain DOMAIN ID Deletes ERP 
244. ens DHCP Option 82 Configuration mode to config   ip dhcp option82 Global    ure DHCP option 82     To open DHCP Option 82 Configuration mode  use the service dhcp command in the  Global Configuration mode first     Tab  3 7 is the main commands of DHCP Option 82 Configuration mode     C    Tab  3 7 Mam Command of DHCP Option 82 Configuration Mode       Interface Configuration Mode    In  nterface Configuration mode  you can configure Ethernet interfaces  To open Interface  Configuration mode  enter the interface command  then the system prompt will be  changed from SWITCH config   to SWITCH config if       na e een       interface INTERFACE Global Opens Interface Configuration mode     29    CLI    30    3 1 9    3 1 10    Management Guide  TigerAccess    EE    Tab  3 8 shows main commands of Interface Configuration mode     description Specifies a description     ip address Assigns IP address   Deactivates an interface   Sets MTU value     Tab  3 8 Main Command of Interface Configuration Mode       Rule Configuration Mode    The switch modifies previous Rule Configuration mode to Flow  Policer and Policy Con   figuration modes  Rule configuration mode is expanded into three different modes accord   ing to its roles for Rule mechanism  You can configure a rule for incoming or outgoing  packets  Using the function  you can handle packets classified by the rule     To open Rule Configuration mode  enter the flow  policer and policy commands  then  the system prompt will be cha
245. er   vice password encryption command  And to represent the string  password  is en   crypted  input 8 before the encrypted string     When you use the password enable command with 8 and    the string     you will make into  Privileged EXEC Enable mode with the encrypted string  Therefore  to log in the system   you should do it with the encrypted string as password that you configured after 8  In  short  according to using the 8 option or not  the next string is encrypted or not     The following is an example of configuring the password in Privileged EXEC Enable  mode as testpassword     SWITCH  configure terminal  SWITCH config   passwd enable testpassword  SWITCH  config       The following is an example of accessing after configuring a password     SWITCH login  admin  Password   SWITCH gt  enable    3     CLI    38    4 1 4    A    Management Guide  TigerAccess    EE    Password   SWITCH     To delete the configured password  use the following command      ee Y See       no passwd enable Global Deletes the password     The created password can be displayed with the show running config command  To en   crypt the password not to be displayed  use the following command     ICI anton  service password encryption Global Encrypts the system password        To disable password encryption  use the following command     mm mas  pen  no service password encryption Global Disables password encryption     Changing Login Password       To configure a password for created account  us
246. eration type works as one of the followings   e both sends and receive LLDP frame    e    tx_only only sends LLDP frame    e rx_only only receives LLDP frame    e disable does not process any LLDP frame     To configure how to operate LLDP  use the following command      e e res       lldp adminstatus PORTS  both   Brid Configures LLDP operation type   ridge  tx_only   rx_only   disable  i  default  disable   Basic TLV    LLDP is transmitted through TLV  There are mandatory TLV and optional TLV  In optional  TLV  there are basic TLV and organizationally specific TLV  Basic TLV must be in the  switch where LLDP is realized  specific TLV can be added according to the feature of the  switch     For the switch  the administrator can enable and disable basic TLV by selecting it  To en   able basic TLV by selecting it  use the following command     a    lldp PORTS  portdescription     sysname   sysdescription   Selects basic TLV that is sent in the port    syscap    no lldp PORTS  portdescription     sysname   sysdescription   Disables basic TLV configured to be sent in the port        syscap     LLDP Message    For the switch  it is possible to configure the interval time and times of sending LLDP  message  To configure the interval time and times of LLDP message  use the following  command     n   See    Configures the interval of sending LLDP message  The    Configures the periodic times of LLDP message    default  4     lldp msg txhold  lt 2 10 gt        lidp msg txinterval  lt
247. erface and fixed 2 Port 10 100 1000Base T  and 1 slot for option uplink module  Note     The uplink module is not used in the first re   lease     Managed switches  as IP VDSL of Layer 2 switch  supports VLAN  Rate limit  port trunk   ing  port mirroring  IGMP snooping  and packet filtering     Fig  2 1 shows the front view of the switch        Fig  2 1 The front view of switch    SMC7824M VSW    Management Guide  TigerAccess    EE    2 1    SMC7824M VSW    CLI    System Features    The following introduces the main features of the VDSL2 system which provides Layer 2  switching  Ethernet switching and related functions     Virtual Local Area Network  VLAN     Virtual local area network  VLAN  is made by dividing one network into several logical  networks  Packet cannot be transmitted and received between different VLANs  There   fore  it can prevent needless packets accumulating and strengthen security  The switch  recognizes 802 1Q tagged frame and supports maximum 4096 VLANs  Port based  Pro   tocol based  MAC based and Subnet based VLANs are supported in the switch     Quality of Service  QoS     For the switch  QoS based forwarding sorts traffic into a number of classes and marks the  packets accordingly  Thus  different quality of service is provided to each class  which the  packets belong to  The rich QoS capabilities enable network managers to protect mission   critical applications and support differentiated level of bandwidth for managing traffic con   gestion  The 
248. erleave process  error correction will not  be done well  whereas transmit rate of data becomes faster  You can skip Interleave  process and configure it before transmitting data     To skip Interleave process  use the following command      e e res       Ire PORTS channel fast Skips Interleave process    SMC7824M VSW    Management Guide  TigerAccess    EE     gt        SMC7824M VSW    CLI    To enable Interleave process  use the following command      en  wee rees       Ire PORTS channel slow Enables Interleave process     The default is Interleave enabled as    slow        The following is an example of displaying Interleave     SWITCH  bridge    show lre interleave 1 5       Port Status Channel Inter Delay  ADM OPR UP DOWN  1 Up Down Slow 2  2  2 Up Down Slow 2  2  3 Up Down Slow 2  2  4 Up Down Slow 2  2  5 Up Down Slow 2  2    SWITCH  bridge       In addition  you can configure the interval of Interleave process during modulation  This  interval is called Interleave delay  By configuring Interleave delay  you can prevent trans   mission delay caused of waiting data gathered     To configure Interleave delay  use the following command     mane e en    Configures Interleave delay    Ire PORTS interleave delay PORTS  VDSL port b  E port number     lt 1 100 gt     Bridge 1 100  interleave delay value  default 2 ms   Ire PORTS interleave delay Configures Interleave delay with specifying Upstream   lt 1 100 gt   up   down  or Downstream     The unit of Interleave delay is    m
249. error disable recovery       val and returns to the default setting     To display information of error disable recovery function  use the following command      men een  show errdisable recovery Shows information of error disable recovery function        To enable disable the debugging function of error disable status caused by loop back  use  the following command     nt   en      Enables the debugging for loop back error   debug errdisable loopback enable l  disable cause       l Disables the debugging for loop back error   debug errdisable loopback disable l  disable cause        E 8    BPDU Configuration    BPDU is a transmission message in LAN in order to configure  and maintain the configu   ration for STP RSTP MSTP  Switches that STP is configured exchange their information  BPDU to find the best path  MSTP BPDU is a general STP BPDU having additional MST  data on its end  MSTP part of BPDU does not rest when it is out of region     e Hello Time  Hello time is an interval of which a switch transmits BPDU  It can be configured from  1 to 10 seconds  The default is 2 seconds     e Max Age  Root switch transmits new information every time based on information from other  switches  However  if there are many switches on network  it takes lots of time to  transmit BPDU  And if network status is changed while transmitting BPDU  this infor   mation is useless  To get rid of useless information  max age should be identified  each information     e Forward Delay  Switches find
250. ery from a multicast router     To enable the IGMP snooping report suppression  use the following command    or on    ip igmp snooping report  Enables the IGMP snooping report suppression glob   suppression ally     Global Enables the IGMP snooping report suppression on a  VLAN   VLANS  VLAN ID  1 4094     ip igmp snooping vlan VLANS  report suppression       To disable the IGMP snooping report suppression  use the following command      e Se    no ip igmp snooping report     suppression  Disables the IGMP snooping report suppression     no ip igmp snooping vlan    VLANS report suppression       The IGMP snooping report suppression is supported only IGMPv1 and IGMPv2 reports   In case of an IGMPv3 report  a single membership report can contain the information for  all the groups which a host is interested in  Thus  there is no need for the report suppres   sion since the number of reports would be generally equal to the number of hosts only     IGMP Snooping S Query Report Agency    lf IGMP snooping switch receives IGMP group specific query messages from the multi   cast router  it just floods them into all of its ports  The hosts received the group specific  queries send the report messages according to their IGMP membership status  However   this switch is enabled as IGMP snooping S Query report agency  the group specific que   ries are not sent downstream  When the switch receives a group specific query  the  switch terminates the query and sends an IGMP report if there is
251. es a trusted remote ID     trust remote id text STRING       To delete a specified trusted remote ID  use the following command     nan   eos    no trust remote id hex HEXSTRING    no trust remote id ip 4 B C D Option 82 Deletes a specified trusted remote ID   no trust remote id text STRING       Trusted Physical Port  To specify a trusted physical port  use the following command      e me mn    Specifies a trusted physical port   trust port PORTS  normal   normal  DHCP packet    option82   all  option82  DHCP option 82 packet    Option 82 all  DHCP   option 82 packet    no trust port  all   PORTS   nor  Se    Deletes a specified trusted port   mal   option82   all     DHCP Snooping       For enhanced security  the switch provides the DHCP snooping feature  The DHCP  snooping filters untrusted DHCP messages and builds maintains a DHCP snooping bind   ing table  The untrusted DHCP message is a message received from outside the network   and an untrusted interface is an interface configured to receive DHCP messages from  outside the network     323    CLI    324    8 6 7 1    8 6 7 2    Management Guide  TigerAccess    EE    The DHCP snooping basically permits all the trusted messages received from within the  network and filters untrusted messages  In case of untrusted messages  all the binding  entries are recorded in a DHCP snooping binding table  This table contains a hardware  address  IP address  lease time  VLAN ID  interface  etc     It also gives you a way to different
252. ess    EE    To delete a registered IP address and MAC address or delete all the contents of ARP ta   ble  use the following command     Teoma  Mele O  no arp  A B C D  Negates a command or set sets its default    Global Negates a command or set sets its default  enter the IP  no arp A B C D INTERFACE  address and enter the interface name    Enable Deletes all the contents of ARP table     Global Deletes all the contents of ARP table  enter the inter   clear arp INTERFACE  Bridge face name     Displaying ARP Table       To display the ARP table registered in the system  use the following command      e e Se  show arp   Enable   Shows ARP table     Global Shows ARP table for specified interface  enter the in     show arp INTERFACE  Bridge terface name  default  br2              ARP Alias    Although clients are joined in the same client switch  it may be impossible to communi   cate between them for security reasons  When you need to make them communicate  each other  the switch supports ARP alias  which responses the ARP request from client  net through the concentrating switch     To register the address of client net range in ARP alias  use the following command     m   en    Registers the IP address range and MAC address in  ARP alias to make user s device response ARP re   arp alias A B C D1 A B C D2 quest    MACADDR  MACADDR  MAC address  A B C D1  start IP address  A B C D2  end IP address    Global Registers the IP address range on specified VLAN and    specifies defau
253. et ring  use the following command      e e See    erp domain DOMAIN ID manual  Unblocks a primary port and blocks a secondary port of  switch primary ERP domain as RM node  default   Bridge       erp domain DOMAIN ID manual  Blocks a primary port and unblocks a secondary port of  switch secondary ERP domain as RM node     SMC7824M VSW    Management Guide  TigerAccess    EE    8 4 8    8 4 9    SMC7824M VSW    CLI    To delete the configuration of primay secondary port   s role change  use the following  command      e e re       no erp domain DOMAIN ID man  D  s Deletes the configured primary and secondary port  ridge  ual switch S state    Wait to Restore Time    If a ports link failure is recovered on the normal node  the blocked port should be  changed to the forwarding status  However  the loop may occur when this port start to  forward the traffic before a secondary port of RM node is blocked  To prevent the loop   the normal node waits for the time until it receives RM Link Up message  Even if it does  not receive RM Link Up message  the port starts to forward the traffic     The normal node waits for real waiting timeout to forward the traffic again  The formula is  simply shown as below     Real Waiting timeout   Wait to Restore Time   3Test Packet Interval  e g  1 3 seconds   1 second    10 milliseconds x 3     To configure Wait to Restore Time  use the following command      e me ees       erp domain DOMAIN  ID wait to  Brid Configures ERP wait to restore time   ri
254. ets only for the IP addresses on the DHCP snooping binding table  The  ARP access list with the DHCP snooping allows IP communications to users authorized  by the DHCP snooping     To permit discard ARP packets for the users authorized by the DHCP snooping  use the  following command      e me See    i i   Permits ARP packets of users authorized by the DHCP  permit dhcp snoop inspection  snooping   ARP ACL    no permit dhcp snoop  Discards a configured ARP packets of users authorized    inspection by the DHCP snooping        217    CLI    Management Guide    TigerAccess    EE    218    7 12 3 2    7 12 3 3    To display the configured APR access lists  use the following command      ee e ees       show arp access list  NAME  Global Displays existing ARP access list names     Enabling ARP Inspection Filtering    To enable disable the ARP inspection filtering of a certain range of IP addresses from the  ARP access list  use the following command      e me See        l   Enables ARP inspection filtering with a configured ARP  ip arp inspection filter NAME i D  access list on specified VLAN     Global NAME  ARP access list name  no ip arp inspection filter NAME Disables ARP inspection filtering with a configured ARP  vlan VLANS access list on specified VLAN     ARP inspection actually runs in the system after the configured ARP access list applies to  specific VLAN using the ip arp inspection filter command     vlan VLANS       ARP Address Validation    The switch also provides t
255. exchange their information  The priority of SWITCH Ais 8   the priority of SWITCH B is 9 and the priority of SWITCH C is 10  In this case  SWITCH A  is automatically configured as root switch     Designated Switch    After deciding a root switch  when SWITCH A transmits packet to SWITCH C  SWITCH A  compares the exchanged BPDU to decide a path  The critical information to decide path  is path cost  Path cost depends on the transmit rate of LAN interface and path with lower  path cost is selected     The standard to decide a designated switch is total root path cost which is added with  path cost to the root switch  Path cost depends on transmit rate of switch LAN interface  and switch with lower path cost is selected to be a designated switch     259    CLI    260    Management Guide  TigerAccess    EE    Switch A  Priority   8 Root Switch  ra                                          Path cost   Path cost  50 S  Designated Es yy 100  Switch     Switch B dl E  Priority     riority   10                             gt  Path cost  100    Path cost  100             Path 1                Path 2 Switch D        PATH 1   50   100   150  PATH 2   100   100   200  PATH 1  lt  PATH 2     PATH 1 selected    Fig  8 12 Designated Switch    In case of the above picture showing SWITCH C sends packet  path cost of PATH 1 is  150 and path  cost of PATH 2 is total 200 100   100   path cost of SWITCH C to B   path   cost of SWITCH B to C   Therefore lower path cost  PATH 1 is chosen  In this cas
256. ff  Off Y  26  Ethernet 1 Up Down Auto Half 0 OLE Off X    SWITCH  config       SMC7824M VSW    Management Guide  TigerAccess    EE    9 3    9 3 1    9 3 1 1    SMC7824M VSW    CLI    VDSL Port Configuration    Modulation of VDSL Signal    The switch provides both Internet and telephone communication through existing tele   phone line with using DSL technology  DSL communication system requires technique to  convert digital signal into analog signal and return the analog signal into the digital signal   Fig  5 1 shows process of signal transmission in DSL system     TTT E a    Pritt tintin ttttttttttttttttttttttttttittttttntttittttttttttttttttttttttttttttitttttttttttittttttttttttttttiii itt ttc ttt ttc  coco occ o once anna nanacananananacananacananananananananacacanas EN        decenecensccessecscaesesacecsenscaessseeseeeanseessseeseeesseaeaesenereeeenenenDenEEOOEDOOSDEOPDDOODDDOSEDEOEDDDEDDDEAEDEOEDDEODEDEOEDOOEDDSOEDEEODESEEDESEEDEESEDOEEDESEEDSSEEDESDDSSEEDSSEDOESEDSOEEDSEEEDESEDSEDEDEOEESEEEDDEDDESEEDSESEDEEEDESEEDIESEDEEEDESEEDESEDEESEDEEEVUUUETUSYETEYERELUTINYETETEOTSULONYTTEUEUITTLTTEULTELUDINTETTSLITTETONYLISULTUTTELTEUEONUTTOVUNTIUNSSSIELESELESELIEISEEIECEECELAECCESE    Fig  5 1 Transmission in DSL System    In the above picture  Modulator converts digital signal into analog signal to be sent over  the channel  Also  the analog signal is returned into digital signal at the Demodulator     DMT Modulation    DMT builds on some of the ideas of QAM  Imagine having more
257. fied packets   A B C D A B C D     In this switch  redirect command cannot be configured when MAC filtering function is  running in the system        To delete a specified rule action  use the following command      e me See    no action   no action match permit     no action match permit       no action match redirect   action   no action match redirect   redirect     no action match mirror   action   no action match mirror   mirror Policy Deletes a specified rule action     no action match vian       action   no action match vian       vlan   no action   no action match copy to cpu     no action match copy to cpu     no action   no action match route next hop   route next    no action match route next hop      Marking and Remarking       This switch can use CoS values of packet marking or remarking to support QoS feature   Packet marking allows you to partition your network into multiple priority levels or classes    185    CLI Management Guide  TigerAccess    EE    of service     Fig  7 10 shows that 4 steps of operations can affect packet marking or remarking using  the 802 1p Class of service  CoS  bits in the Ethernet header     Packet Ingress    Bridge based CoS Marking    InLIF based CoS Marking    Ingress Processing  lt        Policy based CoS Marking       Traffic Policing based CoS Remarking       Fig  7 10 Marking and Remarking    e Bridge based CoS Marking    Generally  Bridge based CoS Marking and InLIF based CoS Marking are internally im   plemented without any
258. following command     emma ra pon  no port security PORTS Disables port security on the port     no port security PORTS mac   address  MAC ADDR   vlan Deletes a secure MAC address for the port   NAME     no port security PORTS maxi  Returns to the default number of secure MAC ad   mum dresses   default  1     no port security PORTS viola  Returns to the violation mode to the default   tion  default  shutdown     Port Security Aging       Port security aging is to set the aging time for all secure addresses on a port  Use this  feature to remove and add PCs on a secure port without manually deleting the existing  secure MAC addresses while still limiting the number of secure addresses on a port     a Se    port security PORTS aging l l  tati Enables aging for configured secure addresses   static    port security PORTS aging time Brid Configures aging time in minutes for the port  All the  ridge   lt 1 1440 gt  S secure addresses age out exactly after the time     port security PORTS aging type  A B   Configures aging type    absolute   inactivity        e absolute all the secure addresses on this port age out exactly after the time  min   utes  specified lapses and are removed from the secure address list    e inactivity the secure addresses on this port age out only if there is no data traffic  from the secure source addresses for the specified time period     To disable the configuration of port secure aging  use the following command      e e Se    no port security PORTS ag
259. following command     ena ee       clear Ire stat lol PORTS Global Resets data of error   clear Ire stat lpr PORTS Bridge  clear lre stat crc PORTS    clear ire stat uncorrectable crc PORTS       SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    To check CRC error  Frame losses  and Signal loss of specific port at a time  use the fol   lowing command     e e See    Shows data of CRC error  Frame loss  and Signal loss  show Ire stat count all PORTS  at a time about Upstream    Enable Shows data of CRC error  Frame loss  and Signal loss  show cpe stat count all  PORTS   Global at a time about Downstream    show Ire total error  PORTS  Bridge Shows the collected data of all errors   clear stat error  PORTS  Reset error information about Upstream  clear cpe stat error  PORTS  Reset error information about Downstream       The following is an example of checking all errors of port 1 to port 5 at a time     SWITCH  bridge    show lre stat count all 1 5    Port Status LOS LOF LOL CorrB1k UnCorrBlk CRE  1 Down 0 0 0 0 0 0  2 Down 0 0 0 0 0 0  3 Down 0 0 0 0 0 0  4 Down 0 0 0 0 0 0  5 Down 0 0 0 0 0 0    SWITCH  bridge       You can check how many times each port is disconnected and how long it is discon   nected  As the same way with counting times of CRC error and Frame loss of VDSL port   it is counted every 15 minutes and each day     To check how long have the errors in downstream of VDSL line been lasted  use the fol   lowing command      men es Tom  
260. function   spanning tree vlan VLANS Bridge  VLANS  VLAN ID  1 4094     21 1    CLI    278    8 3 8 2    8 3 8 3    Management Guide  TigerAccess    EE    PVSTP is activated after selecting PVSTP mode using spanning tree mode rapid pvst  command  In PVSTP  you can configure the current VLAN only  If you input VLAN that  does not exist  error message is displayed     For the switches in LAN where dual path doesn t exist  Loop does not generate even  though STP function is not configured     To disable a configured PVSTP  use the SS command        Disables a in VLAN   no spanning tree vlan VLANS Bridge VLANS  VLAN ID  1 4094     Root Switch    To establish PVSTP function  a root switch should be chosen first  Each switch has its  own bridge ID  and one of the switchs on same LAN is chosen as a root switch by com   paring with their bridge IDs  A bridge ID  consisting of the switch priority and the switch  MAC address  is associated with each instance  However  you can configure the priority  and make it more likely that the switch will be chosen as the root switch  The switch hav   ing the lowest priority becomes the root switch for that VLAN     To configure the switch priority for a VLAN  use the following command      e e ee    Configures a priority for specified VLAN   spanning tree vlan VLANS prior  VLANS  VLAN ID  1 4094   ity  lt 0 61440 gt  l 0 61440  priority value in increments of 4096  default   32768     no spanning tree vlan VLANS l     P  iorit Deletes a configured
261. g  After some time learning address  it is allowed to forward data frame  This is the  steady state for a switch port in the active spanning tree     e Disabled  When disabled  a port will neither receive nor transmit data or BPDUs  A port is in this  state because it is broken or disabled by administrator     8 3 2 RSTP Operation    STP or RSTP is configured on network where Loop can be created  However  RSTP is  more rapidly progressed than STP at the stage of reaching to the last topology  This sec   tion describes how the RSTP more improved than STP works  It contains the below sec   tions     e Port States   e BPDU Policy   e Rapid Network Convergence  e Compatibility with 802 1d    8 3 2 1 Port States    RSTP defines port states as discarding  learning  and forwarding  Blocking of 802 1d and  listening is combined into discarding  Same as STP  root port and designated port are de   cided by port state  But a port in blocking state is divided into alternate port and backup  port  An alternate port means a port blocking BPDUs of priority of high numerical value  from other switches  and a backup port means a port blocking BPDUs of priority of high  numerical value from another port of same equipment     Switch A             ROOT            Switch B Switch C    Alternate Designated    Y  lt 4 Backup  Port Port    Switch D    Fig  8 15 Alternate Port and Backup port    262 SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 2 2    8 3 2 3    SMC7824M VSW    CLI    Th
262. g above command  minimum bandwidth is implemented per each queue of port   Specifically  this switch provides a minimum maximum bandwidth guarantee to the pack   ets which match to a flow     To set a minimum maximum bandwidth allocated for each flow belonging to a policer  use  the following command      e me See    Sets a minimum bandwidth for each flow   min bandwidth BANDWIDTH e  BANDWIDTH  bandwidth in the unit of kbps  Policer       min bandwidth BANDWIDTH Sets a minimum maximum bandwidth for each flow   max bandwidth BANDWIDTH BANDWIDTH  bandwidth in the unit of kbps    To reset a minimum and maximum bandwidth allocated for each flow  use the following  command      e e een       no min max bandwidth BAND  Bai Resets a minimum maximum bandwidth for each flow   olicer  WIDTH BANDWIDTH  bandwidth in the unit of MB    The minimum and maximum bandwidth allocations for each flow support a traffic policing   Traffic policing allows that you guarantee the minimum bandwidth of traffic to be transmit   ted or received on an interface  Traffic that falls within the minimum bandwidth is transmit   ted  whereas traffic that exceeds the maximum bandwidth is dropped by a policing  mechanism     Maximum Buffer numbers    Each queue is assigned a certain amount of buffer space to store transit data  Each  queue has an upper limit on the allocated number of buffers based on the class band   width assignment of the queue and the number of queues configured     201    CLI Management Guid
263. g and Modifying Policy    After configuring a policy using the above commands  apply it to the system with the fol   lowing command  If you do not apply the policy to the system  all specified configurations  from Policy Configuration mode will be lost     To save and apply a policy  use the following command     eg AR _  apply Applies a policy to the system        To modify a policy  use the following command     ICI annem  policy NAME modify Global Modifies a policy  enter a policy name     Displaying Rule       To show a rule profile configured by user  use the follwing command     mm Te Te  show flow profile Shows a profile of flow     show policer profile Shows a profile of policer   show policy profile Shows a profile of policy        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    To dispaly a certain rule by its name or a specific rule of a certain type  use the following  command      ee e Se    show   flow   class   policer    Enable  policy    VAME  ina Shows the information relating to each rule  enter a  oba    show   flow   class   policer   rule name     Bridge  policy   detail  NAME     show running config   flow    All Shows all configurations of each rule  policer   policy         SMC7824M VSW 191    CLI    192    7 6 6    7 6 6 1    Management Guide  TigerAccess    EE    Admin Rule    For the switch  it is possible to block a specific service connection like telnet  FTP  ICMP   etc with an admin rule function     Creating Admin Flow for packet cl
264. g option format on a port   ip dhcp snooping port PORTS    opt code  DHCP option code  opt code  lt 1 254 gt  format NAME    NAME  DHCP option format name    Configures a policy against DHCP option belonging to  a DHCP message  default  replace         keep  forwards a DHCP message to DHCP server  ip dhcp snooping port PORTS    Global without any modification     opt code  lt 1 254 gt  policy  keep      lada  replace  deletes the DHCP message s option and adds  replace  E the snooping option if both of them are same  However   if they are different each other  replace option just    adds the snooping option     no ip dhcp snooping port        Removes the DHCP snooping option for a given port   PORTS opt code  lt 1 254 gt     329       CLI    330    8 6 7 12    Management Guide  TigerAccess    EE    In case there is not a DHCP snooping option for a specific port  DHCP snooping switch  finds the snooping default option  If it exists  DHCP snooping switch sends a DHCP  server DHCP messages  Discover Request  by replacing their options with the snooping  default option     To specify a DHCP server default option  use the following command      ee e ee    ip dhcp snooping default option Specifies a snooping default option format for a switch   code  lt 1 254 gt  format NAME NAME  DHCP option format name    Configures a policy against DHCP option belonging to    a DHCP message  default  replace     keep  forwards a DHCP message to DHCP server  ip dhcp snooping default option eee  l
265. g will be automatically started and login prompt will  be displayed     SWITCH login     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Step 2   When you enter a login ID at the login prompt  the password prompt will be displayed   and then enter the proper password to log in the system  By default setting  the login ID is  configured as admin with no password     SWITCH login  admin  Password   SWITCH gt     Step 3   In Privileged EXEC View mode  you can check only the configuration for the switch  To  configure and manage the switch  you should begin Privileged EXEC Enable mode  The  following is an example of beginning Privileged EXEC Enable mode     SWITCH gt  enable  SWITCH     Password for Privileged EXEC Enable Mode    You can configure a password to enhance the security for Privileged EXEC Enable mode   To configure a password for Privileged EXEC Enable mode  use the ror  command        ee  ae a password to begin Privileged EXEC En   passwd enable PASSWORD  Global aaa mode       passwd enable 8 PASSWORD     passwd enable 8 PASSWORD   8 PASSWORD   Configures an encrypted password     an encrypted password     password enable does not support encryption at default value  Therefore it shows the  string  or password  as it is when you use the show running config command  In this  case  the user s password is shown to everyone and has unsecured environment     To encrypt the password which will be shown at running config  you should use the s
266. gc off 1  4 1 0 3r29IK105012 Yes  21  Down 10 Half Disable agc off 1  5 1 0 3r29IK105012 Yes 20  Down 10 Half Disable agc off   SWITCH  config   show cpe info 1 5   No NOS Version Vendor ID Vendor STR Model Name Serial No   1 1 0 3r29IK105012 0x0000fee8 DSNW H335 OOODPW U0000346   20 Hee EZ LA OTE Ox0000fee8 DSNW H335   S ALS E LOS Oe Ox0000fee8 DSNW H335   4 1 0 3r29IK105012 0x0000fee8 DSNW H335 000DPW U0000348   O  GE EE Ox0000fee8 DSNW H335 OOODPW U0000341  SWITCH  config             108 SMC7824M VSW    Management Guide  TigerAccess    EE    D    SMC7824M VSW    CLI    NOS Version means the current image  It will be updated after resetting when you install  new image     In the above example  NOS Download is indicated as the below     INN    NO NOS is not downloaded yet       Done NOS has been successfully downloaded        NOS downloading is failed     Tab  5 9 NOS Download    109    CLI    110    9 4    Management Guide  TigerAccess    EE    Port Mirroring    Port mirroring is the function of monitoring a designated port  Here  one port to monitor is  called monitor port and a port to be monitored is called mirrored port  Traffic transmitted  from mirrored port are copied and sent to monitor port so that user can monitor network  traffic     The following is a network structure to analyze the traffic by port mirroring  lt analyzes  traffic on the switch and network status by configuring Mirrored port and Monitor port  connecting the computer  that the watch program is in
267. ge will be blocked until the configured time based on the last message is  up  For example  if you configure the interval as 1 second  ICMP will not be sent within 1  second after the last message has been sent     To configure interval to transmit ICMP message  the administrator should configure the  type of message and the interval time     Use the following command  to configure the interval for transmit ICMP message      e me See    Configures the interval for transmit ICMP message     ip icmp interval rate mask MASK Global MASK  user should input hexadecimal value until  OxFFFFFFFF  The default is 0x1818        If mask that is input as hexadecimal number is calculated as binary number    1    means     Status ON        0    means    Status OFF     In binary number  if the digit showed as    1     matches with the value of ICMP message  It means ICMP Message is selected as    Status  ON     Digit value starts from 0     For example  if hexadecimal number    8    is changed as binary number  it is  1000     In  1000  O digit is    0    and 1 digit is    0     2 digit is    0    and 3 digit is    1     The digit showed as    1     is    S and ICMP_DEST_UNREACH means ICMP value is    3     Therefore   ICMP_DEST_UNREACH is chosen the message of limiting the transmission time     Default is 0x1818  If 1818 as hexadecimal number is changed as binary number  it is  1100000011000  By calculating from O digit  3 digit  4 digit  11 digit  12 digit is    1    and it is     STATUS ON
268. gh security because of mutual authentication system     At a request of user Authentication  from user s PC EAPOL Start type of packets are  transmitted to authenticator and authenticator again requests identification  After getting  respond about identification  request to approve access to RADIUS server and be au   thenticated by checking access through user   s information     The following figure explains the process of 802 1x authentication             EAPOL   EAP over LAN          EAP over RADIUS           Q  S     Suppliant   Authenticator   Authentication Server     RADIUS  Server    EAPOL Start  EAP Request   Identity    EAP Response   Identity i RADIUS Access Request    EAP Request 7 RADIUS Access Challenge    EAP Response RADIUS Access Request    EAP Success   RADIUS Access Accept       Fig  4 1 Process of 802 1x Authentication    SMC7824M VSW    Management Guide  TigerAccess    EE    4 5 1    4 5 1 1    4 5 1 2    SMC7824M VSW    CLI    802 1x Authentication    Enabling 802 1x    To configure 802 1x  the user should enable 802 1x daemon first  To enable 802 1x dae   mon  use the following command      e e re       dot1x system auth control Enables 802 1x daemon   Global    Disables 802 1x daemon     no dot1x system auth control    RADIUS Server    As RADIUS server is registered in authenticator  authenticator also can be registered in  RADIUS server     Here  authenticator and RADIUS server need extra data authenticating each other be   sides they register each ot
269. gins to SSH server     ssh login DESTINATION  PUB   LIC KEY     Enable DESTINATION  IP address of SSH server  PUBLIC KEY  public key       File Copy    To copy a system configuration file from to SSH server  use the following command      e e en       copy  scp   sftp  config SET Downloads and uploads a file to through SSH server   nable   download   upload  FILENAME FILE  destination file name    SMC7824M VSW    Management Guide  TigerAccess    EE    4 4 2 3    SMC7824M VSW    CLI    Authentication Key    SSH client can access to server through authentication key after configuring authentica   tion key and informing it to server  It is safer to use authentication key than inputting  password every time for login  and it is also possible to connect to several SSH servers  with using one authentication key     To configure an authentication key in the switch  use the following command     Soen ra en  ssh keygen  rsa1   rsa   dsa    Global Configures an authentication key     rsa1  SSH ver  1 authentication    copy  scp   sftp  key upload rsa  SSH ver  2 authentication    FILENAME Pie dsa  SSH ver  2 authentication    FILENAME  key file name       To configure authentication key and connect to SSH server with the authentication key   perform the following procedure     Step 1  Configure the authentication key in the switch     SWITCH A config   ssh keygen dsa    Generating public private dsa key pair        Enter file in which to save the key   etc  ssh id dsa    Enter passphra
270. gt  Deletes the given attribute   Option      The value should be within 64 bytes           A hidden length variable should be set once in a single attribute     The total length of an option format cannot exceed 254 bytes        8 6 5 3 Deleting DHCP Option Format    To delete a specified DHCP option format  use the following command     III E  est  no ip dhcp option format NAME Global Deletes the given DHCP option format     8 6 5 4 Displaying DHCP option       To print a specified DHCP option format  use the following command      e e een    Enable    show ip dhcp option format Global Prints the given option format and actual raw data in  NAME  port PORTS vlan VLANS  DHCP the packet   Option       SMC7824M VSW 319    CLI    320    8 6 6    Management Guide  TigerAccess    EE    DHCP Option 82    In some networks  it is necessary to use additional information to further determine which  IP addresses to allocate  By using the DHCP option 82  a DHCP relay agent can include  additional information about itself when forwarding client originated DHCP packets to a  DHCP server  The DHCP relay agent will automatically add the circuit ID and the remote  ID to the option 82 field in the DHCP packets and forward them to the DHCP server     The DHCP option 82 resolves the following issues in an environment in which untrusted  hosts access the internet via a circuit based public network     Broadcast Forwarding    The DHCP option 82 allows a DHCP relay agent to reduce unnecessary broad
271. gt  dscp    no qos remark color  green   yellow   red    queue  lt 0 7 gt  queue       To display the status of remarking based on different color marked packets  use the fol   lowing command     conned ee    show qos remark color  green   yellow   red   Shows the configured remarking of    dscp Enable DSCP value     show qos remark color  green   yellow   red   Global Shows the configured remarking of  queue queue number        SMC7824M VSW 189    CLI    190    7 6 4 6    7 6 4 7    7 6 5    Management Guide  TigerAccess    EE    Attaching a Policy to an interface    After you configure a rule including the packet classification  policing and rule action  you  should attach a policy to an interface and to specify port or vlan in which the policy should  be applied  If you do not specify an interface for rule  rule does not work properly     To attach a policy to an interface  use the following command      e e re    Attaches the policy to a specified ingress port or any    interface binding port ingress    port    PORTS   any      PORTS  port number  interface binding vian   VLANS   Attaches the policy to a specified vlan or any vlan   any   VLANS  VLAN ID  1 4094     To detach a policy from an interface  use the eo command     no interface binding port in   Removes an attached policy from ingress port   gress  PORTS  Policy    no interface binding vlan   Removes an attached policy from vian    an attached   Removes an attached policy from vian    from vlan           Applyin
272. gure Root Guard  use the following command      e e re       spanning tree port PORTS  Bridge Configures Root Guard on the network   guard root    To delete a configured Root Guard of specified port  use the following command   mm Te ages    spanning tree port PORTS  Disables Root Guard function   guard none  Bridge       no spanning tree port PORTS Deletes a configured Root Guard  returns to default  guard configurations     SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 10    8 3 11    SMC7824M VSW    CLI    Restarting Protocol Migration    MSTP protocol has a backward compatibility  MSTP is compatible with STP and RSTP  If  some other bridge runs on STP mode and sends the BPDU version of STP or RSTP   MSTP automatically changes to STP mode  But STP mode cannot be changed to MSTP  mode automatically  If administrator wants to change network topology to MSTP mode   administrator has to clear the previously detected detected protocol manually     To prevent this  the switch provides the clear spanning tree detected protocols com   mand  If you enable this command  the switch checks STP protocol packet once again     To clear configured Restarting Protocol Migration  use the following command    men ra Som    clear spanning tree detected  SE l  Restarts protocol migration function   protocols  Bridge       clear spanning tree port PORTS Restarts protocol migration function of specified port   detected protocols PORTS  port number    Loop Back Detection    The probl
273. gured samping iena fron  sampling interval of port     a       231    CLI    232    7 16 7    7 16 7 1    7 16 7 2    7 16 7 3    7 16 7 4    Management Guide  TigerAccess    EE    Configuring Receiver    Receiver ID mode    To open sFlow receiver mode and configure this receiver in detail  use the following  command      e e re    sflow receiver  lt 1 65535 gt  Opens a specific sFlow receiver mode   Global  no sflow receiver  lt 1 65535 gt  Deletes specified sFlow receiver     Collect IP address and port       To specify IP address of sFlow collector  use the following command   SSES  Specifies IP address of sFlow collector   collect ip A B C D  Receiver A B C D  IP address of collector  default 0 0 0 0     no no collect ip   no collect ip   Deletes specified IP address of sFlow collector        To specify UDP port of sFlow collector  use the following command   SCC    Specifies UDP port of sFlow collector  collect port  lt 1 65535 gt   Receiver 1 65535  UDP port number  default 6343     no no collect port   no collect port     Deletes specified UDP port of sFlow collector      Deletes specified UDP port of sFlow collector    UDP port of sFlow collector        Maximum Datagram Size    To set the maximum datagram size of sampling packets which are transmitted through re   ceiver  use the following command      e Se    Sets the maximum datagram size of sampling packets    max datagram size  lt 256 1400 gt  that are transmitted by this receiver     eae 256 1400  maximum datagra
274. h     SWITCH  config    show boot info    POWERBOOT Say ye e    SWITCH  config       The following is the sample output of the show boot info command after rebooting with  the reload command     SWITCH  config   show boot info    SWREBOOT 2008 11 14 15 38 49    SWITCH  config       SMC7824M VSW    Management Guide  TigerAccess    EE    D    7 1    i     SMC7824M VSW    CLI    Network Management    Simple Network Management Protocol  SNMP     The simple network management protocol  SNMP  is an application layer protocol de   signed to facilitate the exchange of management information between network devices   SNMP consists of three parts  an SNMP manager  a managed device and an SNMP  agent  SNMP provides a message format for sending information between SNMP man   ager and SNMP agent  The agent and MIB reside on the switch  In configuring SNMP on  the switch  you define the relationship between the manager and the agent  According to  community  you can give right only to read or right to both read and write  The SNMP  agent has MIB variables to reply to requests from SNMP administrator  And SNMP admin   istrator can obtain data from the agent and save data in the agent  The SNMP agent gets  data from MIB  which saves information on system and network     SNMP agent sends a trap to administrator for specific cases  Trap is a warning message  to alert network status to SNMP administrator     The switch enhances access management of SNMP agent and limits the range of OID  opened
275. h determine the rule action or priority of packets     169    CLI    170       Management Guide  TigerAccess    EE        mirror transmits the classified traffic to the monitor port        redirect transmits the classified traffic to the specified port        permit allows traffic matching given characteristics        deny blocks traffic matching given characteristics        copy to cpu duplicates the profile of classified packets and sends a copy to CPU       CoS marking marks the incoming frame on port with CoS values        CoS remarking enables DSCP based L3 table  and Queue based L2 table   packets filtering     e Scheduling Algorithm  To handle traffic  you need to configure differently processing orders of traffic by using  scheduling algorithms  The switch provides       Strict Priority Queuing  SP       Deficit Weighted Round Robin  DWRR      An already applied rule can not be modified  It needs to be deleted and then created  again with changed values     Weight can be used to additionally adjust the scheduling mode per queue in DWRR  mode  Weight controls the scheduling precedence of the internal packet queues     Fig  7 1 shows the relationship of Flow  Class  Policer and Policy on basic structure of  Rule     Interface  Binding    Fig  7 2 Structure of Rule    You can simply manage more than 2 Flows through one Class  Flow or Class and Policer  can be implemented by one policy     Both Flow and Class cannot belong to one policy together  It means that one policy 
276. h where an IGMP snooping is running will flood multicast  traffic to all ports until receiving two general queries  or during two general query intervals  by default  You can also configure the switch to stop multicast flooding according to a  specified query count or query interval     To specify a query count to stop multicast flooding  use the following command   mana    on    ip igmp snooping tcn flood Specifies a query count to stop multicast flooding   query count  lt 1 10 gt  1 10  query count value  default  2   Global    no ip igmp snooping tcn flood Deletes a specified query count to stop multicast flood   query count ing        SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 4    SMC7824M VSW    CLI    To specify a query interval to stop multicast flooding  use the following command      e me See    Specifies a query interval to stop multicast flooding in    ip igmp snooping tcn flood the unit of second  An actual stop flooding interval is    query interval  lt 1 1800 gt  calculated by  query count  x  query interval      Global 1 1800  query interval value  default  125     no ip igmp snooping tcn flood Deletes a specified query interval to stop multicast  query interval flooding     TCN Flooding Query Solicitation       Typically  if a network topology change occurs  the spanning tree root switch issues a  query solicitation which is actually a global leave message with the group address 0 0 0 0   When a multicast router receives this solicitation  it 
277. havior e Ed RE RE EE 183  Fig  7 9 Seege TIEM  Snape 184  Fig  7 10     Marking and IREMA   rKING iria Ai 186  Fig  7 11 Strict Priority Oueumg  E 198  Fig  7 12 Deficit Weighted Round RODIN       cooccccccoccnccccocnnconoccnononcnncnnncnnconanenconancnnnnnos 199  Fig  7 13 WRED Packet Drop Probability                     coooooccooocccconcnccconononcncnoncncnnncnnnos 203  Fig  1 14  NetBIOS EVEN 205  IQs Or POV ARP EE 222  Fig  7 16 ICMP Message Structure E 223  IS AS A E E A A 229  Fig  7 18 SFlowAgent Diagram sesira a a RN 229  Fig  8 1 Pon  Dase VEAN EE 235  Fig  8 2 subnet based VEAN ua iaa 238  Fig  8 3 Example  Qin  CONMIGO  io 241  Fig  8 4 QQ PM a eebe 241  Fig  8 5 Outgoing Packets under Layer 2 Shared VLAN Environment                      244  Fig  8 6 Incoming Packets under Layer 2 Shared VLAN Environment  1                 245  Fig  8 7 Incoming Packets under Layer 2 Shared VLAN Environment  2                 245  Fig  8 8 Bil FAG OREO ALON NEEN 251  Fig  8 9 Sun ei E on lee EE 257  Fig  8 10 Principle of Spanning Tree Protocol              cccccccseeceeseeeeeeeeeeeeeeseeeeeeeeeeeeeenees 208  FIS e EE 259  FIGWO 12  Designated SWIC BEE 260  FIGS  ei d e le EE 261  FINO ROMS a e addees a Oe adadcuivare Matec  261  Fig  8 15 Alternate Port and Backup port    262  Fig  8 16 Example of Receiving Low BULLE 263  Fig 8 17 Network Convergence Of OO 1Id 264  Fig  8 18   Network Convergence Of GUZ Iw  264  Fig  8 19 Network Convergence Of GU Z Iw 265  Fig  8 20 Network Con
278. he ARP validation feature  Regardless of a static ARP table  the  ARP validation will discard ARP packets in the following cases     e In case a sender MAC address of ARP packet does not match a source MAC  address of Ethernet header    e In case a target MAC address of ARP reply packet does not match a destination  MAC address of Ethernet header    e In case of a sender IP address of ARP packet or target IP address is 0 0 0 0 or  255 255 255 255 or one of multicast IP addresses     To enable disable the ARP validation  use the following command     Y on    Enables the ARP validation with the following options     ip arp inspection validate  src  src mac  source MAC address     mac   dst mac   ip  dst mac  destination MAC address     Global ip  source destination IP address     no ip arp inspection validate or  Disables the ARP validation    src mac   dst mac   ip     The src mac  dst mac  and ip options can be configured together        SMC7824M VSW    Management Guide  TigerAccess    EE    7 12 3 4    7 12 3 5    SMC7824M VSW    CLI    ARP Inspection on Trust Port    The ARP inspection defines 2 trust states  trusted and untrusted  Incoming packets via  trusted ports bypass the ARP inspection process  while those via untrusted ports go  through the ARP inspection process  Normally  the ports connected to subscribers are  configured as untrusted  while the ports connected to an upper network are configured as  trusted     To set a trust state on a port for the ARP inspection
279. he event notification  and forward it to the event message collector like a syslog server  This function is enabled  as default  so even though you disable this function manually  the syslog will be enabled  again     This section contains the following contents     e Syslog Output Level   e Facility Code   e Syslog Bind Address   e Debug Message for Remote Terminal  e Disabling Syslog   e Displaying Syslog Message   e Displaying Syslog Configuration    Syslog Output Level    Syslog Output Level without a Priority    To set a syslog output level  use the following command      e me See    syslog output  emerg   alert   crit  i i i Generates a syslog message of selected level or    err   warning   notice   info        higher and forwards it to the console   debug  console    syslog output  emerg   alert   crit Generates a syslog message of selected level or      err   warning   notice   info   Global higher in the system memory   oba  debug  local  volatile   non  volatile  deletes a syslog message after restart     volatile  non volatile  reserves a syslog message     syslog output  emerg   alert   crit  Generates a syslog message of selected level or    err   warning   notice   info      higher and forwards it to a remote host   debug  remote A B C D       To disable a specified syslog output  use the following command      e e Se    no syslog output  emerg   alert    crit   err   warning   notice   info    debug  console  no syslog output  emerg   alert    crit   err   warn
280. he following command      e e Se       no vlan VI ANS Deletes VLAN  enter the VLAN ID to be deleted     When you delete a VLAN  all ports must be removed from the VLAN  the VLAN must be  empty     SMC7824M VSW    Management Guide  TigerAccess    EE    8 1 2    SMC7824M VSW    CLI    Protocol based VLAN    User can use a VLAN mapping that associates a set of processes within stations to a  VLAN rather than the stations themselves  Consider a network comprising devices sup   porting multiple protocol suites  Each device may have an IP protocol stack  an Apple Talk  protocol stack  an IPX protocol stack and so on     If we configure VLAN aware switches such that they can associate a frame with a VLAN  based on a combination of the station   s MAC source address and the protocol stack in  use  we can create separate VLANs for each set of protocol specific applications     To configure a protocol based VLAN  follow these steps     1  Configure VLAN groups for the protocols you want to use   2  Create a protocol group for each of the protocols you want to assign to a VLAN   3  Then map the protocol for each interface to the appropriate VLAN      e me See    Adds a port with a protocol based VLAN   vlan pvid PORTS ethertype PORTS  port number    ETHERTYPE VLANS ETHERTYPE  Ethernet type  e g  0x800   VLANS  VLAN ID  1 4094     no vlan pvid PORTS ethertype  Deletes a port from a protocol based VLAN    ETHERTYPE        Because Protocol Based VLAN and normal VLAN run at the same time  P
281. he following command      e e re    no ip igmp snooping immediate   leave  no ip igmp snooping port  R ee   d EZE Global Disables the IGMP snooping immediate leave     ee   immediate leave    no ip ines   snooping vlan  ines   immediate leave       Use this command with the explicit host tracking feature  see Section 9 2 3 6   If you don t   when there is more than one IGMP host belonging to a VLAN  and a certain host sends a  leave group message  the switch will remove all host entries on the forwarding table from  the VLAN  The switch will lose contact with the hosts that should remain in the forwarding  table until they send join requests in response to the switch s next general query message     361    CLI    362    9 2 3 4    9 2 3 5    Management Guide  TigerAccess    EE    IGMP Snooping Report Suppression    lf an IGMP querier sends general query messages  and hosts are still interested in the  multicast traffic  the hosts should return membership report messages  For a multicast  router  however  it is sufficient to know that there is at least one interested member for a  group on the network segment  Responding a membership report per each of group  members may unnecessarily increase the traffic on the network  only one report per  group is enough     When the IGMP snooping report suppression is enabled  a switch suppresses member   ship reports from hosts other than the first one  allowing the switch to forward only one  membership report in response to a general qu
282. hed  On the other hand  if probability is little  little amount of  packets would be dropped  Therefore complete dropping point is quickly reached  If the  probability value is 1  dropping packet would be none and the value is 15  all packets  would be discarded from the point of start queue length value is reached     Probbbility       Start End Queue Length    Fig  7 13 WRED Packet Drop Probability    In creating WRED profile  you can determine how to treat different types of traffic and as   sign packets with certain values to specific threshold via queue numbers  Additionally   WRED profile is specified to each port     203    CLI    204       Management Guide  TigerAccess    EE    To create and configure a WRED profile  use the following command      e me Se    Creates and configures a WRED profile with default    qos wred profile  lt 0 3 gt  default parameters   0 3  WRED profile number    Creates and configures a WRED profile with specific  parameters    values   0 3  WRED profile number    qos wred profile  lt 0 3 gt  threshold  0 7  queue number     lt Q 7 gt   lt 0 2 gt  start  lt 1 65535 gt  end    Global 0 2  drop precedence   lt 1 65535 gt  prob  lt 1 15 gt     1 65535  start   end queue length value  unit of 256  bytes   1 15  drop probability  Creates and configures a WRED profile with specific  qos wred profile  lt 0 3 gt  weight queue number and weight    lt 0 7 gt   lt 1 15 gt  0 7  queue number  1 15  WRED queue weight  default 9     WRED function needs to 
283. her   s IP address  The data is key and should be the same  value for each other  For the key value  every kinds of character can be used except the  space or special character     RADIUS  2 Server        Suppliant   Authenticator   Authentication Server     Authentication request RADIUS Servers    in order                      Designate as default Response  RADIUS server E    J   100 1 1 1       Fig  4 2 Multiple Authentication Servers    If you register in several servers  the authentication server starts form RADIUS server  registered as first one  then requests the second RADIUS server in case there s no re   sponse  According to the order of registering the authentication request  the authentica   tion request is tried and the server which responds to it becomes the default server from  the point of response time     99    CLI    60    4 5 1 3    Management Guide  TigerAccess    EE    After default server is designated  all requests start from the RADIUS server  If there   s no  response from default server again  the authentication request is tried for RADIUS server  designated as next one     To configure IP address of RADIUS server and key value  use the following command      e e e    dot1x radius server host Registers RADIUS server with key value and UDP port   A B C D   NAME  auth port  lt 0  of radius server   65535 gt  key KEY 0 65535  UDP port  default  1812     dot1x radius server host Global Configures IP address of RADIUS server and key   A B C D   NAME  key 
284. ias  To set the threshold of module  use the following command      e e See    threshold module  rxpower     l Sets the Diagnostics threshold of SFP module by  txpower   alarm   warning   PORTS START VALUE STOP     VALUE    RX TX power and monitors the module  The range of RX TX power  0 6 5535 mW    threshold module temper  alarm Sets the Diagnostics threshold of SFP module depend     warning  PORTS START TEMP ing on temperature and monitors the module    STOP TEMP Global The range of temperature   128   127 99 C    i Sets the Diagnostics threshold of SFP module depend   threshold module txbias  alarm        ing on txbias and monitors the module   warning  PORTS    The range of txbias  0  131 ml    Sets the Diagnostics threshold of SFP module depend   threshold module voltage  alarm      ing  PORTS ing on voltage and monitors the module  warning    The range of voltage  0 6 5535 V    To delete the threshld of module operation depending on specified monitoring type  use  the following command     na m   O    no threshold module  rxpower    voltage   txbias   txpower   tem  Global Deletes the configured threshold of SFP module        per   alarm   warning  PORTS    To display the configuration of SFP module of specific port  use the following command      e e Se    show port module info  PORTS  Displays the status of SFP module        If you insert an SFP module including Diagnostic Monitoring Interface  DMI  into ports   you can see the real time information about the ports s
285. iate between untrusted interfaces connected to the  end user and trusted interfaces connected to the DHCP server or another switch     The DHCP snooping only filters the DHCP server message such as a DHCP_OFFER or  DHCP_ACK which is received from untrusted interfaces     Enabling DHCP Snooping    To enable the DHCP snooping globally  use the following command     e e Se       ip dhcp snooping e Enables the DHCP snooping globally   lobal  no ip dhcp snooping Disables the DHCP snooping globally   default     Upon enabling the DHCP snooping  the DHCP_OFFER and DHCP_ACK messages from  all the ports will be discarded before specifying a trusted port     To enable the DHCP snooping on a VLAN  use the following command     e me ee    ip dhcp snooping vlan VI ANS Enables the DHCP snooping on a specified VLAN     no ip dhcp snooping vlan Global D  VLANS Disables the DHCP snooping on a specified VLAN     You must enable DHCP snooping globally before enabling DHCP snooping on a VLAN        DHCP Trust State    To define a state of a port as trusted or untrusted  use the following command     a E O  ip dhcp snooping trust PORTS Defines a state of a specified port as trusted        no ip dhcp snooping trust Global Defines a state of a specified port as untrusted   PORTS  default     SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 7 3    8 6 7 4    SMC7824M VSW    CLI    To discard broadcast request packets of Egress traffic on specified trusted port  use the  following command  
286. icy Configuration mode  the prompt changes from  SWITCH  config   to SWITCH config admin policy NAME        To delete configured admin policy or all admin policies  use the following command     na me on    no policy admin NAME Deletes specified admin policy   Global  no policy admin all Deletes all admin policies        After opening Admin Policy Configuration mode  an admin policy can be configured by  user  You can specify the rule action for the classified packets in each admin policy     e The admin policy name must be unique  Its size is limited to 32 significant characters    e The admin  policy name cannot start with the alphabet    a    or    A       e The order in which the following configuration commands are entered is arbitrary    e The configuration of an admin policy being configured can be changed as often as  wanted until the apply command is entered    e Use the show policy profile admin command to display the configuration entered  up to now     If you create the admin policy already  you need to include specified flow or class to spec   ify the rule action for the packets matching configured classifying patterns on flow or class     To include specific flow or class in an admin policy  use the following command   mana    on    Includes an admin flow in a specified policy   include flow NAME l  Admin  NAME admin flow name       i Policy Includes an admin class in a specified policy   include class NAME l  NAME admin class name    One admin policy cannot inc
287. ide  TigerAccess    EE    Contents  T INTOQUCUON cen 19    A nein tadalNaswMastan anmnatlanseus 19  k2 Re Le ld et 19  keet  Document Convent ON ici ai 20  14 IDOCUMENE Nola lO airada in aa 20    er e EE 21  1 6  CE Declaration Of CONO cados 21  2 ENEE ENEE 22  Z 1 System Features  cad a e dad 23  3 Command Line Interface  CLI         ccssccsssccseccssenesnseneecssensanseansssnensanes 25  Ol Congar Nee EE 25  ET   Privileged EXEC View Moda gege ege ege egen 26  3 1 2 Privileged EXEC Enable Mode        ooccccccocccccccccncococcnncconconcnnononnnnonnnnonnanonoos 26  3 1 3 Global operatioun 27  3 1 4 Bridge Configuration Mode E 27  3 1 5 DHCP Pool Configuration Mode        ccccooncccccocncncccocccononconocnanonnonanononnnannnonos 28  3 1 6 DHCP Option Configuration Mode       occcoonnccccocccncccoccnnononcnnconccnnononcnnonnnnonnos 28  3 1 7 DHCP Option 82 Configuration Mode     ooncccccocccncccoccnnccnnnnccnononcnnonnnnonnncnnnos 29  3 1 8 Interface Configuration Mode      ccooooccncccoccncccnoconconononcononcnnconaronconanenononennnonos 29  3 1 9 Rule Configuration Mode   coco 30  3 1 10 RMON Configuration Mode 30  3 2 Configuration Mode OvVervieW     ocooocccoccccocnccccccocnccononncncnnnononnnnnnconnnnonnss 31  gJ Sel    9 EE 32  3 3 1 Listing Available Commande 32  33 2 Calling Gomimand  el Ee e 34  299  USING ADOS VIA E 35  3 3 4 Using Command of Privileged EXEC Enable Mode       aaannnnnnnnnnnnnnennnnnennnn 35  3 3 5 Exit Current Command Mode AE 35  4 System Connection an
288. ifferent classes of service  It minimizes the  impact of dropping high priority traffic  WRED is based on the RED algorithm     RED  which utilizes end to end flow control of TCP  is a random packet dropping function  when traffic reaches the user designated threshold even before it reaches maximum  buffer size  If traffic usage reaches maximum buffer size  all packets can be dropped   which makes packet loss  Therefore  in order to prevent packet loss or unstable traffic  transmission  user can restrict excessive traffic over buffer size by setting up a threshold   With RED function  packet loss is reduced and stable packet transmission can be ac   quired     One of the drawbacks to implement RED function is that it randomly drops large numbers  of packets  and easy to drop high priority of packets  Unlike RED  WRED is not as ran   dom when dropping packets  WRED combines the capabilities of the RED algorithm with  the IP precedence feature to provide for preferential traffic handling of high priority pack   ets     To utilize WRED function  start queue length value  end queue length value and drop  probability are necessary  Start queue length represents the starting point of random  packet dropping  and drop probability indicates the percentage of packet dropping from  the starting point of random packet dropping to the point of complete dropping  If probabil   ity is large value  large amount of packets would be dropped  Therefore complete drop   ping point is slowly reac
289. ig  8 36 shows how the DHCP relay agent with the DHCP option 82 operates         DHCP Server    2  DHCP Request   Option82 ml 3  DHCP Respond   Option82    DHCP Relay Agent   Option 82     1  DHCP Request rl DHCP Respond           DHCP Client    D gt     Fig  8 36 DHCP Option 82 Operation    8 6 6 1 Enabling DHCP Option 82    To enable disable the DHCP option 82  use the following command      e e Se    no ip dhcp option82       ip dhcp option82 Enables the system to add the DHCP option 82 field   lobal    Disables the system to add the DHCP option 82 field     8 6 6 2 Option 82 Sub Option    The DHCP option 82 enables a DHCP relay agent to include information about itself when  forwarding client originated DHCP packets to a DHCP server  The DHCP server can use  this information to implement security and IP address assignment policies     There are 2 sub options for the DHCP option 82 information as follows       Remote ID  This sub option may be added by DHCP relay agents which terminate switched or  permanent circuits and have mechanisms to identify the remote host of the circuit   Note that  the remote ID must be globally unique     e Circuit ID  This sub option may be added by DHCP relay agents which terminate switched or  permanent circuits  It encodes an agent local identifier of the circuit from which a  DHCP client to server packet was received  It is intended for use by DHCP relay  agents in forwarding DHCP responses back to the proper circuit     SMC7824M VSW 321   
290. il  critical      major   minor   warning   intermediate     snmp alarm severity adva if misconfig  critical      major   minor   warning   intermediate     snmp alarm severity adva if opt thres  critical      major   minor   warning   intermediate     snmp alarm severity adva if rcv fail  critical      major   minor   warning   intermediate     snmp alarm severity adva if trans fault  criti     cal   major   minor   warning   intermediate     snmp alarm severity adva if sfp mismatch   critical   major   minor   warning   intermedi   ate    snmp alarm severity adva psu fail  critical      major   minor   warning   intermediate     snmp alarm severity adva temperature  critical    major   minor   warning   intermediate    snmp alarm severity adva voltage high  criti   cal   major   minor   warning   intermediate     snmp alarm severity adva voltage low  critical      major   minor   warning   intermediate     Global    Sets ADVA severity of an alarm for sys   tem temperature high     Sets ADVA severity of an alarm for    wrong configuration     Sets ADVA severity of an alarm for traf   fic threshold over for an Ethernet optical  interface     Sets ADVA severity of an alarm for fail   ure to receive packets     Sets ADVA severity of an alarm for fail   ure to transmit packets     Sets ADVA severity of an alarm for SFP  module mismatched     Sets ADVA severity of an alarm for PSU  failure     Sets ADVA severity of an alarm for sys   tem temperature high     Sets ADVA severity of
291. ilege Enable Shows a configured security level     Global  Bridge    show privilege now    Shows a security level of current mode        The following is an example of creating the system account fest having a security level  10 and test  having a security level 1 with no password     SWITCH  config    user add test0 level 0 level0user  Changing password for test0    Enter the new password  minimum of 5  maximum of 8 characters        Please use a combination of upper and lower case letters and numbers     SMC7824M VSW    Management Guide  TigerAccess    EE    4 1 7    SMC7824M VSW    CLI    Enter new password   Enter     Bad password  too short     Warning  weak password  continuing     Re enter new password   Enter    Password changed    SWITCH  config    user add testl level 1 levelluser   Changing password for testl   Enter the new password  minimum of 5  maximum of 8 characters    Please use a combination of upper and lower case letters and numbers   Enter new password   Enter     Bad password  too short     Warning  weak password  continuing    Re enter new password   Enter   Password changed    SWITCH  config   show user             User name Description Level  testo level0user 0  testl levelluser 1    SWITCH  config       The following is an example of configuring an authority of the security level O and 1     SWITCH  config    privilege view level 0 enable  SWITCH  config    privilege enable level 0 show  SWITCH          SWITCH  config    show privilege    config    
292. immediately sends out IGMP general  queries to hosts  allowing the fast convergence  You can direct the switch where an IGMP  snooping is running to send a query solicitation when TCN is received     To enable disable the switch to send a query solicitation when TCN is received  use the  following command      e e See    SE y Enables the switch to send a query solicitation when  ip igmp snooping tcn query    solicit  address A B C D     TCN is received     address  source IP address for query solicitation    no ip igmp snooping tcn query Disables the switch to send a query solicitation when  solicit  address  TCN is received     IGMPv3 Snooping       Immediate Block    IGMPv3 immediate block feature allows a host to block sources with the block latency  O   zero  by referring to the explicit tracking database  When receiving a membership report  with the state change record from a host that is no longer interested in receiving multicast  traffic from a certain source  the switch compares the source list for the host in the explicit  tracking database with the source list in the received membership report  If both are  matching  the switch removes the source entry from the list in the database  and stops  forwarding the multicast traffic to the host  a group source specific query message is not  needed for the membership leave process     To enable IGMPv3 immediate block  use the following command      men Som  ip igmp snooping immediate block Enables immediate block globally 
293. in an IP  address from a DHCP server  The configurable DHCP client functionality allows a DHCP  client to use a user specified client ID  class ID or suggested lease time when requesting  an IP address from a DHCP server  Once configured as a DHCP client  the switch cannot  be configured as a DHCP server or relay agent     Enabling DHCP Client    To configure an interface as a DHCP client  use the following command       mn       ip address dhcp Enables a DHCP client on an interface   Interface  no ip  noipaddressdhcp    noipaddressdhcp   Disables a DHCP client     DHCP Client ID  To specify a client ID  use the following command     mane tenet    ip dhcp client client id hex HEXSTRING  Specifies a client ID   ip dhcp client client id text STRING Interface    no ip dhcp client client id Deletes a specified client ID     DHCP Class ID       To specify a class ID  use the following command     O oe   eos    ip dhcp client class id hex HEXSTRING Specifies a class ID   ip dhcp client class id text STRING Interface    default  system MAC address     no ip dhcp client class id Deletes a specified class ID     Host Name       To specify a host name  use the following command      e me ee    no ip   no ip dhcp client hostname     no ip dhcp client hostname   host name       ip dhcp client host name NAME Specifies a host name   Interface    Deletes a specified host name     SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 9 5    8 6 9 6    8 6 9 7    8 6 9 8    SMC7824M VSW 
294. in the current mode  When you input  the question mark  lt   gt   you can see available commands used in this mode and variables  following after the commands     The following is the available commands on Privileged EXEC Enable mode of the switch     SWITCH       Exec commands     32       clear Reset functions   clock Manually set the system clock   configure Enter configuration mode   copy Copy from one file to another   debug Debugging functions   default os Select default OS   disconnect Disconnect user connection   enable Turn on privileged mode command   erase Erase saved configuration   exit End current mode and down to previous mode   halt Halt process   help Description of the interactive help system   no Negate a command or set its defaults   ping Send echo messages   quote Execute external command   rcommand Management stacking node   release Release the acquired address of the interface   Omitted   SWITCH     Question mark  lt   gt  will not be shown in the screen and you do not need to press   lt ENTER gt  key to display the command list     If you need to find out the list of available commands of the current mode in detail  use  the following command      e e Se    Shows available commande of the current mode     Shows available commands of the current mode with    tree structure        SMC7824M VSW    Management Guide CLI  TigerAccess    EE    The following is an example of displaying the list of available commands of Privileged  EXEC Enable mode     SWITCH  
295. in the frame itself     VLAN Tag    A VLAN tag is a predefined field in a frame that carries the VLAN identifier for that frame   VLAN tags are always applied by a VLAN    aware device  VLAN tagging provides a num   ber of benefits  but also carries some disadvantages     Advantages Disadvantages    VLAN association rules only need to be applied  Tags can only be interpreted by VLAN aware devices    once    Only edge switches need to know the VLAN as    Edge switches must strip tags before forwarding   sociation rules  frames to legacy devices or VLAN unaware domains     Core switches can get higher performance by   Insertion or removal of a tag requires recalculation of  operating on an explicit VLAN identifier  the FCS  possibly compromising frame integrity   VLAN aware end stations can further reduce the   Tag insertion may increase the length of a frame be   performance load of edge switches  yond the maximum allowed by legacy equipment     Tab  8 1 Advantages and Disadvantages of Tagged VLAN       Mapping Frames to VLAN    From the perspective the VLAN aware devices  the distinguishing characteristic of a  VLAN is the means used to map a given frame to that VLAN  In the case of tagged frame   the mapping is simple     the tag contains the VLAN identifier for the frame  and the frame  is assumed to belong to the indicated VLAN  That s all there is to it     To configure the tagged VLAN  use the following command      e e Se    Configures tagged VLAN on a port   vlan add V
296. inbound port   cos    Enable  show qos mark inbound port  Bisbal Shows the bridge based CoS marking configuration of  oba  dscp specified parameter     Bridge    show qos mark inbound port   queue       e Policy based CoS Marking    To configure Policy based CoS Marking with specified values  use the     command     a the packets with queue number   action match queue  lt 0 7 gt  Policy  0 7  GE number    ae    the packets with 802 1p class of service   action match cos  lt 0 7 gt   0 7  CoS value  Policy    Marks the packets with drop precedence   action ation match dp 02 gt  ation match dp 02 gt   lt 0 2 gt   0 2  Drop precedence value    Marks the packets with DSCP field     action aeon match asop  lt 060 gt      aeon match asop  lt 060 gt       lt 0 63 gt   0 63  DSCP value       To delete the policy based CoS marking  use the following command      e e Se    no action match queue    no action match cos Deletes the policy based marking configuration on    no action match dp specified values     no action match dscp       187    CLI    188       Management Guide  TigerAccess    EE    e Traffic Policing based CoS Remarking    Traffic Policing based CoS Remarking uses 2 types of table  DSCP based L3 table and  Queue cos based L2 table  To configure Traffic Policing based CoS Remarking  you need  to select one type of table and parameter     To select a table and enable the remarking configuration  use the following command      oer pon  remark by dscp Uses a DSCP based L3 ta
297. ing   notice   info   D    Global Deletes a specified syslog output   debug  local  volatile   non     volatile     no syslog output  emerg   alert      crit   err   warning   notice   info    debug  remote A B C D       163    CLI Management Guide  TigerAccess    EE    Syslog Output Level with a Priority  To set a user defined syslog output level with a priority  use the following command     eee Tae  eee    syslog output priority  auth  authpriv   kern   local0   local1 y    local2   local3   local4   local5   Generates a user defined syslog message with a prior     local6   local    syslog   user  ity and forwards it to the console    emerg   alert   crit   err   warning      notice   info  console    syslog output priority  auth     authpriv   kern   local0   local      l i  Generates a user defined syslog message with a prior    local2   local3   local4   local5   S  ity in the system memory    local6   local    syslog   user  Global l     l volatile  deletes a syslog message after restart    emerg   alert   crit   err   warning l        non volatile  reserves a syslog message     notice   info  local  volatile      non volatile     syslog output priority  auth     authpriv   kern   local0   local        local2   local3   local4   local5   Generates a user defined syslog message with a prior   local6   local    syslog   user  ity and forwards it to a remote host     emerg   alert   crit   err   warning     notice   info  remote A B C D       To disable a user defined sys
298. ing Disables aging for only statistically configured secure  static addresses     no port security PORTS aging Brid Disables port secure aging for all secure addresses on  ridge  time j a port     no port security PORTS aging    Returns to the default condition   absolute   type       SMC7824M VSW    Management Guide  TigerAccess    EE    7 9 3    7 10    SMC7824M VSW    CLI    Displaying Port Security    To display the information of the port security  use the following command      e e Se    Enable    show port security  PORTS  Global Shows the information of the port security        Bridge    MAC Table    A dynamic MAC address is automatically registered in the MAC table  and it is removed if  there is no access to from the network element corresponding to the MAC address during  the specified MAC aging time  On the other hand  a static MAC address is manually reg   istered by user  This will not be removed regardless of the MAC aging time before remov   ing it manually     To manage a MAC table in the system  use the following command      e e een    Specifies a static MAC address in the MAC table   NAME  bridge name   PORT  port number   MAC ADDR  MAC address    i i Specifies MAC aging time   mac aging time  lt 10 21474830 gt  GER  10 21474830  aging time  default  300     To remove the registered dynamic MAC addresses from the MAC table  use the following  command     mane   n    mac NAME PORT MAC ADDR          Clears dynamic MAC addresses  clear mac NAME PORT   PORT  p
299. interval  lt 100 10000 gt      default  1000 milliseconds   Global  ip igmp snooping vlan VLANS    Specifies a last member query interval   VLANS  VLAN ID  1 4094     last member query interval   lt 100 10000 gt        SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 3 3    SMC7824M VSW    CLI    To delete a specified an interval to send group specific or group source specific query  messages  use the following command      e e See    igmp snooping last     ina    no ip igmp snooping vlan Deletes a specified last member query interval     VLANS last member query     interval       IGMP Snooping Immediate Leave    Normally  an IGMP snooping querier sends a group specific or group source specific  query message upon receipt of a leave message from a host  If you want to set a leave  latency as 0  zero   you can omit the querying procedure  When the querying procedure  is omitted  the switch immediately removes the entry from the forwarding table for that  VLAN  and informs the multicast router     To enable the IGMP snooping immediate leave  use the following command   er Fee    igmp snooping immediate   g Enables the IGMP snooping immediate leave globally   eave    ip igmp snooping hdr a a PORTS Enables the IGMP snooping immediate leave on a port   hdr a a leave PORTS  port number    Enables the IGMP snooping immediate leave on a  VLAN   VLANS  VLAN ID  1 4094     ip igmp snooping vlan VLANS    immediate leave       To disable the IGMP snooping immediate leave  use t
300. ion of multicast services on each port   IGMP filtering controls which multicast groups a host on a port can join by associating an  IGMP profile that contains one or more IGMP groups and specifies whether an access to  the group is permitted or denied with a port  For this operation  configuring the IGMP pro   file is needed before configuring the IGMP filtering  IGMP throttling limits the maximum  number of IGMP groups that a host on a port can join     Note that both IGMP filtering and throttling control only membership reports  join mes   sages  from a host  and do not control multicast streams     IGMP Filtering  Creating IGMP Profile    You can configure an IGMP profile for IGMP filtering in IGMP Profile Configuration mode   The system prompt will be changed from SWITCH config   to SWITCH config igmp   profile N        To create modify an IGMP profile  use the Yoo command     a  A an IGMP profile   ip igmp profile  lt 1 2147483647 gt   ies 1 2147483647  IGMP profile number  oba    no ip igmp aa    Deletes a created  Sate acrened OM pone  Sate acrened OM pone   lt 1 aa       IGMP Group Range  To specify an IGMP group range to apply to IGMP filtering  use the following command      e me See    Specifies a range of IGMP groups   range A B C D  A B C D  IGMP A B C D  low multicast address  Profile A B C D  high multicast address    no range A B C D  4 B C D  Deletes a specified range of IGMP groups     A single IGMP group address is also possible        IGMP Filtering Polic
301. ion port   Global  no dot1x nas port PORTS Disables 802 1x authentication port     Force Authorization       The switch can permit the users requesting the access regardless of the authentication  from RADIUS server  For example  even though a client is authenticated from the server   it is possible to configure not to be authenticated from the server     To manage the approval for the designated port  use the following command      e e een    Configures a state of the authentication port   dot1x port control  auto   force  EA    i auto  authorization up to RADIUS server  default   authorized   force unauthorized     force authorized  force authorization  PORTS Global    force unauthorized  force unauthorization    no dot1x port control PORTS Deletes a configured authentication port state     Interval for Retransmitting Request Identity Packet       In the switch  it is possible to specify how long the device waits for a client to send back a  response identity packet after the device has sent a request identity packet  If the client  does not send back a response identity packet during this time  the device retransmits the  request identity packet     To configure the number of seconds that the switch waits for a response to a re   quest identity packet  use the following command      e me See    i i Sets reattempt interval for requesting request identity  dotix timeout tx period  lt 1  Ges  packe    Global 1 65535  retransmit interval  default  30     no dotix timeout tx pe
302. isplaying Status of VDSL Port    You can check status of VDSL port and user s configuration  It is also possible to view in   formation of VDSL port  To check status of VDSL port and information of DMT modulation   use the following command    show Ire  PORTS  Shows VDSL port   show Ire detail info  PORTS  Shows detailed information of VDSL line     show Ire profile  PORTS  Bridge Shows the VDSL profile  show rate info PORTS  Shows the rate information of VDSL line    show Ire psd  PORTS  Shows PSD mask level    Enable Shows MAC address of user connected  show Ire user mac  PORT   Global to VDSL ports        The above commands shows the following information  Therefore  you can choose com   mand according to information you need     Command Description  bitload Shows Bitloading Per Tone  Shows Electronic Wire Length  ham band Shows HAM Band  Shows Upstream   Downstream Protection  interleave Shows interleave delay  pbo config Shows Power Back Off Length configuration  Shows Profile  Shows PSD  Shows rate information    Shows SNR Margin       Tab  5 1 Information displayed by Command  show Ire    Enabling VDSL Port    This configuration of enabling VDSL port has different way of using with the configuration  described in    Ethernet Port Configuration    Enabling VDSL port is to configure Sync status  of partner   s equipment  Therefore  although you connect to cable with VDSL port down   Sync is not configured  To configure Sync status of VDSL port  use the following com   ma
303. join  use the following command      e e re    Configures the IGMP static join   A B C D  IGMP group address  VLANS  VLAN ID  1 4094   reporter  host address    ip igmp static group A B C D  vlan VLAN port PORT  reporter  A B C D     no ip igmp static group    no ip igmp static group  A B C D    vlan VLAN     no ip igmp static group A B C D Deletes the configured IGMP static join   vlan VLAN  port PORT     all addresses    no ip igmp static group A B C D  vlan VLAN port PORT reporter   A B C D         Global       To configure the IGMP static join for a range of IGMP groups by access lists  use the fol   lowing command      e e re    Configures the IGMP static join for a range of IGMP    od     groups by access lists   ip igmp static group list   lt 1 99 gt        lt 1300 1999 gt    WORD   vlan VLAN port PORT  reporter  A B C D     1 99  IP standard access list  1300 1999  IP standard access list  expanded   WORD  access list name  VLANS  VLAN ID  1 4094   reporter  host address  no ip igmp static group list   lt 1   99 gt     lt 1300 1999 gt    WORD   no ip igmp static group list   lt 1   99 gt     lt 1300 1999 gt    WORD  vlan Deletes the configured IGMP static join for a range of  VLAN  port PORT  IGMP groups      all addresses    no ip igmp static group list   lt 1   99 gt     lt 1300 1999 gt    WORD  vlan  VLAN port PORT reporter   A B C D            352 SMC7824M VSW    Management Guide  TigerAccess    EE    9 1 3    SMC7824M VSW    CLI    To display the IGMP static join
304. ked port  loop detect PORT timer  lt 0  to NORMAL  If you set the interval as O  the state of the  86400 gt  blocked port will not be changed automatically     default  600 seconds     no loop detect PORT block Disables the blocking option        To set the interval of sending the   R   packet  use the following command        loop detect PORTS period  lt 1  A  the interval of sending the loop detecting packet   Bridge  60 gt   default  30 seconds     300 SMC7824M VSW    Management Guide  TigerAccess    EE    A    SMC7824M VSW    CLI    You can also configure the source MAC address of the loop detecting packet  Normally  the system   s MAC address will be the source MAC address of the loop detecting packet   but if needed  Locally Administered Address  LAA  can be the address as well     If the switch is configured to use LAA as the source MAC address of the loop detecting  packet  the second bit of first byte of the packet will be set to 1  For example  if the  switch   s MAC address is 00 d0 cb 00 00 01  the source MAC address will be changed to  02 d0 cb 00 00 01     To select the source MAC address type of the loop detecting packet  use the following  command     n   See    Uses LAA as the source MAC address of the loop   loop detect srcmac laa  detecting packet   Bridge       Uses the system   s MAC address as the source MAC  loop detect srcmac system l  address of the loop detecting packet   default     If you would like to change the source MAC address of the loop dete
305. l    An IGMP snooping querier periodically sends general query messages to trigger mem   bership report messages from a host that wants to receive IP multicast traffic     To specify an interval to send general query messages  use the following command      e me eee    SA     Specifies an IGMP snooping query interval in the unit  ip igmp snooping querier query     interval  lt 1 1800 gt     of second   1 1800  query interval  default  125     ip igmp snooping vlan VLANS Specifies an IGMP snooping query interval on a VLAN   querier query interval  lt 1 1800 gt  VLANS  VLAN ID  1 4094        To delete a specified interval to send general query messages  use the following com   mand      e me See    no ip igmp snooping querier    query interval  Disables a specified IGMP snooping query interval   ip k  nnen Deg snooping vlan    k  nnen Deg querier query interval       IGMP Snooping Query Response Time    Membership query messages include the maximum query response time field  This field  specifies the maximum time allowed before sending a responding report  The maximum  query response time allows a router to quickly detect that there are no more hosts inter   ested in receiving multicast traffic     399    CLI    360    9 2 3 2    Management Guide  TigerAccess    EE    To specify a maximum query response time advertised in general query messages  use  the following command      e e re    ip igmp snooping querier max  Specifies a maximum query response time   response time  lt 1 
306. l statistics avg pkt Shows the statistics of the protocol for average pack      PORTS  a Leem    Global  show protocol statistics total Bridge Shows the traffic statistics of the protocol for total   PORTS  packets     To delete the collected statistics of the protocol  use the following command      e e een          Global  clear protocol statistics  PORTS  Deletes the collected statistics of the protocol   ridge       73    CLI    9 2 8    A    14    Management Guide  TigerAccess    EE    Port Information    To display the port information  use the following command     ICI EC  show port  PORTS  Shows a current port status  enter a port number     Enable  show port description  PORTS  Global    Bridge  show port module info  PORTS     Shows a specified port description  enter a port num     ber   Shows optical module  SFP  information        The show port module info command is only valid for Ethernet optical port  In case of  using the command on the VDSL interface  the system shows the state as Uninstalled     The following is an example of displaying the port information for port 20 to 26     SWITCH  config   show port 20 26                            NO LPR PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER   20  VDSL 1 Up Down Force Full 100 On  On Y  SE VDSL 1 Up Down Force Full 100 On  On Y  22S VDSL 1 Up Down Force Full 100 On  On Y  238 VDSL 1 Up Down Force Full 100 On  On Y  24  VDSL 1 Up Down Force Full 100 On  On Y  LN Ethernet 1 Up Down Auto Half 0 O
307. larm and make the alarm be shown only in case of selected se   verity or higher  This enhanced alarm notification allows system administrators to manage  the system efficiently     Alarm Notify Activity    Normally the switch is supposed to generate an alarm only when a pre defined event has  occurred such as the fan fail  system restart  temperature high  etc  However  you can  additionally configure the system to generate an alarm when any configuration parameter  has been changed via CLI     To enable disable the alarm notify activity  use the           command        snmp notify activity  enable   Global A a a the alarm notify activity   O  disable   default  disable     If you manage the system via the ACI E  the alarm notify activity should be enabled     Alarm Severity Criterion    You can set an alarm severity criterion to make an alarm be shown only in case of se   lected severity or higher  For example  if an alarm severity criterion has been set to major   you will see only an alarm whose severity is major or critical     To set an alarm severity criterion  use the following command      es e Se    snmp  alarm severity criteria l ae  Sets an alarm severity criterion      critical   major   minor   warning Global     default  warning     intermediate        The order of alarm severity is critical  gt  major  gt  minor  gt  warning  gt  intermediate     The configured alarm severity criterion is valid only in ACI E     143    CLI    144    7 1 9 3    7 1 9 4    Manag
308. ld value  0 7  CoS value    0 2  drop precedence  qos remark color  green   yellow   red   queue 0 7  queue number     lt 0 7 gt  cos  lt 0 7 gt     qos remark color  green   yellow   red   dscp   lt 0 63 gt  queue  lt 0 7 gt     qos remark color  green   yellow   red   queue   lt 0 7 gt  dp  lt 0 2 gt     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    qos remark color  green   yellow   red   queue Remarks CoS parameters according   lt 0 7 gt  dscp  lt 0 63 gt  to queue number  CoS value and    metering function configured on sys     tem     qos remark color  green   yellow   red   queue 0 7  CoS value or queue nunmber     lt 0 7 gt  queue  lt 0 7 gt  0 2  drop precedence    0 63  DSCP field value       To delete a configured Traffic Policing based CoS Remarking  use the following command     commend meee ee    no qos remark color  green   yellow   red    dscp  0 63     no qos remark color       yellow   red         lt 0 63 gt  cos    no qos remark color ino E   yellow   red     ino E  lt 0 63 gt  dp   no qos remark color        ee   yellow   red    EE  lt 0 63 gt  dscp   no qos remark color  green   yellow   red     dscp  lt 0 63 gt  queue Deletes the configured Traffic Policing   no qos remark color  green   yellow   red   based CoS Remarking   queue   lt 0 7 gt     no qos remark color  green   yellow   red     queue  lt 0 7 gt  cos   no qos remark color  green   yellow   red     queue  lt 0 7 gt  dp   no qos remark color  green   yellow   red     queue  lt 0 7 
309. le of disconnecting a user connected from a remote place     SWITCH  where   admin at ttys0 from console for 4 days 22 hours 15 minutes 24 88 seconds   admin at ttyp0 from 10 0 1 4 1670 for 4 days 17 hours 53 minutes 28 76 seconds  admin at ttypl from 147 54 140 133 49538 for 6 minutes 34 12 seconds   SWITCH  disconnect ttyp0   SWITCH  where   admin at ttys0 from console for 4 days 22 hours 15 minutes 34 88 seconds   admin at ttypl from 147 54 140 133 49538 for 6 minutes 44 12 seconds   SWITCH           System Rebooting    Manual System Rebooting    When installing or maintaining the system  some tasks require rebooting the system by  various reasons  Then you can reboot the system with a selected system OS     To restart the system manually  use the following command     es See       reload  os1   os2  Restarts the system     If you reboot the system without saving new configuration  new configuration will be de   leted  So  you have to save the configuration before rebooting  Not to make that mistake   the switch reconfirms that by displying the following message to ask if user really wants to  reboot and save configuration     If you want to save the system configuration  press  lt Y gt  key at first question  if you want  to continue to reboot the system  press  lt Y gt  key at second question     The following is an example of restarting the system with the reload command     SWITCH  reload  Do you want to save the system configuration   y n     Do you want to reload the
310. led in DMT modula   tion     This chapter describes the following lists     e Modem Port Reset   e Installing System Image of CPE   e Installing CPE System Image File in Slave   e Configuring AGC  Auto Gain Control    e Checking Length of Cable between CPE and CO  e Auto negotiation of CPE   e Transmit Rate of CPE   e Duplex mode of CPE   e Auto Upgrade of CPE Image   e Displaying CPE Status    Modem Port Reset    When connection state of this switch and network is not normal  there may be some prob   lem in modem port connection of CPE In this case  you can reset modem port of CPE  To  reset modem port of CPE  use the following command     mane   n       cpe modem reset PORTS Resets modem port of CPE     The following is an example of resetting modem port of CPE connected to port 1    SWITCH  bridge    cpe modem reset 1  SWITCH  bridge       Installing System Image of CPE    You can install system image of CPE using command in this switch  After changing the  name of system image file into that of single file which is configured in internal system   install system image file in CPE  Perform the below steps to install system image file in  CPE     Step 1  Connect to FTP to store the CPE system image file in this switch     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    To connect to FTP  please use the following command     es a O    Connects to FTP to store system image file in the sys   load ftp DESTINATION Enable  tem flash memory        SWIT
311. lized  If it happens  you d better to reconfigure the interval longer     802 1x Re Authentication    In the switch  it is possible to update the authentication status on the port periodically  To  enable re authentication on the port  you should perform the below procedure     Step 1  Enable 802 1x re authentication     Step 2  Configure the interval of re authentication     Step 3  Configure the interval of requesting re authentication in case of re authentication fails     Step 4  Execute 802 1x re authenticating regardless of the interval     Enabling 802 1x Re Authentication    To enable 802 1x re authentication using the following command     man Te  ages  dot1x reauth enable PORTS Enables 802 1x re authentication   Global  Disables 802 1x re authentication        no dot1x reauth enable PORTS    SMC7824M VSW    Management Guide  TigerAccess    EE    4 5 2 2    4 5 2 3    4 5 2 4    SMC7824M VSW    CLI    Interval of Re Authentication    RAIDIUS server contains the database about the user who has access right  The data   base is real time upgraded so it is possible for user to lose the access right by updated  database even though he is once authenticated  In this case  even though the user is ac   cessible to network  he should be authenticated once again so that the changed database  is applied to  Besides  because of various reasons for managing RADIUS server and  802 1x authentication port  the user is supposed to be re authenticated every regular time   The administ
312. llowing command      e e een    i Specifies a DHCP option format for a DHCP server   option code  lt 1 254 gt  format    code  DHCP option code  NAME DHCP Pool    NAME  DHCP option format name    no option code  lt 1 254 gt  format Removes a specified DHCP option for a DHCP server     DHCP server may not have any DHCP option that is configured in the DHCP pool mode   Then DHCP server finds the DHCP default option  If it exists  DHCP server sends DHCP  clients a DHCP reply packet  Offer ACK  with the default option information        To specify a DHCP server default option  use the following command      e me O    Specifies a DHCP default option format for a DHCP  ip dhcp default option code  lt 1  server   254 gt  format NAME code  DHCP option code  SE NAME  DHCP option format name    no ip dhcp default option code Removes a specified DHCP default option for a DHCP   lt 1 254 gt  server     Static Mapping       The switch provides a static mapping function that enables to assign a static IP address  without manually specifying static IP assignment by using a DHCP lease database in the  DHCP database agent     To perform a static mapping  use the following command     na a O    Performs a static mapping     origin file A B C D FILE A B C D  DHCP database agent address    DHCP Pool FILE  file name of DHCP lease database    no origin file Cancels a static mapping        307    CLI    308    D    8 6 1 11    8 6 1 12    Management Guide  TigerAccess    EE    For more information 
313. log output level  use the following command      ee e See    no syslog output priority  auth    authpriv   kern   local0   local       local2   local3   local4   local5    local6   local    syslog   user    emerg   alert   crit   err   warning      notice   info  console    no syslog output priority  auth     authpriv   kern   local0   local        local2   local3   local4   local5   z     Deletes a specified user defined syslog output level  local6   local7   syslog   user  Global   Se  with a priority    emerg   alert   crit   err   warning    notice   info  local  volatile      non volatile     no syslog output priority  auth    authpriv   kern   local0   local         local2   local3   local4   local5      local6   local7   syslog   user    emerg   alert   crit   err   warning      notice   info  remote A B C D       164 SMC7824M VSW    Management Guide  TigerAccess    EE    LE     7 5 2    SMC7824M VSW    CLI    The order of priority is emergency  gt  alert  gt  critical  gt  error  gt  warning  gt  notice  gt  info  gt   debug  If you set a specific level of syslog output  you will receive only a syslog message  for selected level or higher  If you want receive a syslog message for all the levels  you  need to set the level to debug     The following is an example of configuring syslog message to send all logs higher than  notice to remote host 10 1 1 1 and configuring local1 info to transmit to console     SWITCH  config    syslog output notice remote 10 1 1 1  SWITCH 
314. lowing command     ICI wenn  clock DATETIME Sets system time and date        Enable  Global Shows system time and date   Bridge    SMC7824M VSW    Management Guide  TigerAccess    EE    6 1 3    6 1 4    SMC7824M VSW    CLI    Time Zone    The switch provides three kinds of time zone  GMT  UCT and UTC  The time zone of the  switch is predefined as GMT  Greenwich Mean Time   Also you can set the time zone  where the network element belongs     To set the time zone  use the following command  refer to the below table       e  e ees    time zone TIME ZONE Sets the time zone   Global  clear time zone Resets the time zone       To display the time zone  use the following command  refer to the below table      mana TO  aten  Enable   Global  Bridge Shows the world time zone map     Tab  6 1 shows the world time zone       ae BE  ows   we      oms SS    ae NN       Tab  6 1 World Time Zone       To see a configured time zone  use the show clock command     Network Time Protocol  NTP     The network time protocol  NTP  provides a mechanism to synchronize time on com   puters across an internet  The specification for NTP is defined in RFC 1119  To en   able disable the NTP function  use the following command      e e een    ntp server SERVER1  SERVER 2  Enables NTP function with a specified NTP server    SERVER3  SERVER  server IP address  maximum 3 servers     Disables the NTP function        no ntp server SERVER1 Global Deletes a specified NTP server    SERVER2   SERVER3  SERVER  se
315. lt gateqay IP address   arp alias 4 B C D1 A B C D2 vlan VLANS  VLAN ID  1 4094   VLANS gateway GATEWAY A B C D1  start IP address  A B C D2  end IP address  GATEWAY  gateway IP address    no arp alias 4 B C D1 A B C D2 Deletes the registered IP address range of ARP alias        SMC7824M VSW    Management Guide  TigerAccess    EE    7 12 3    7 12 3 1    SMC7824M VSW    CLI    To set the aging time of gateway address in ARP alias  use the following command      e me See    Changes the aging time of registered gateway address    arp alias  aging time  lt 5  in ARP alias   2147483647 gt  5 2147483647  ARP alias gateway aging time  default   Global  300 sec           Deleted the configured aging time and returns to the  arp alias aging time    default settings     Unless you input a MAC address  the MAC address of user   s device will be used for ARP  response        To display a registered ARP alias  use the following command      e a O    Enable    show arp alias Global Shows a registered ARP alias     Bridge       ARP Inspection    ARP provides IP communication by mapping an IP address to a MAC address  However   a malicious user can attack ARP caches of systems by intercepting the traffic intended for  other hosts on the subnet  For example  Host B generates a broadcast message for all  hosts within the broadcast domain to obtain the MAC address associated with the IP ad   dress of Host A  If Host C responses with an IP address of Host A  or B  and a MAC ad   dress of Host C
316. lude both flow and class at the same time  Either admin flow  or admin class can belong to one policy     195    CLI    196    7 6 7 2    7 6 7 3    Management Guide  TigerAccess    EE    To remove flow or class from the policy  use the following command      e e See    no include flow Admin  Removes the admin flow from this policy   no include class Policy Removes the admin class from this policy     Admin Policy Priority       If rules that are more than two match the same packet then the rule having a higher prior   ity will be processed first     To set a priority for an admin access rule  use the eS command     priority  highest   high   medium  Admin  EE a priority for an admin policy   low  Policy  default  medium     Admin Policy Action       To specify the rule action  action match  for the packets matching configured classifying  patterns  use the following command      Soen E O  action match deny Admin  Denies a packet   action match permit Policy Permits a packet        To delete a specified rule action action match   use the following command      e e een    no action match deny  Deletes a specified rule action        no action match permit    To specify a rule action  no action match  for the packets not matching configured clas   sifying patterns  use the following command      e e een    no action match deny Admin    Denies a packet  a   Denies a packet     no action match permit Policy Permits a packet     To delete a specified rule action no action match   u
317. m     sam     sam       TCH  config   service dhcp    dhcp pool     sam     sam     sam              sam    ple   le               oO 0 0       D           D    sample   network 100 1 1 0 24   default router 100 1 1 254   range 100 1 1 1 100 1 1 100   lease time default 5000   lease time max 10000   dns server 200 1 1 1 200 1 1 2 200 1 1 3    If you want to specify a DNS server for all the DHCP pools  use the dns server command   For more information  see Section 6 1 8     Manual Binding    To manually assign a static IP address to a DHCP client who has a specified MAC ad     dress  use the following command      e e Se    fixed address A DCD  MAC ADDRESS    no fixed address A DCD    Assigns a static IP address to a DHCP client   A B C D  static IP address  MAC ADDRESS  MAC address    Deletes a specified static IP assignment     DHCP Pool       SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 1 8    8 6 1 9    8 6 1 10    SMC7824M VSW    CLI    Domain Name    To set a domain name  use the following command      ee e ee    domain name DOMAIN   Sets a domain name      Sets a domain name    domain name     An gem  Deletes a specified domain name     DHCP Server Option       The switch operating DHCP server can include DHCP option information in the DHCP  communication  Before using this function  a global DHCP option format should be cre   ated  For details of setting the DHCP option format  refer to the 8 6 5 DHCP Option     To specify a DHCP server option  use the fo
318. m size  default 1400     Deletes the configured maximum datagram size     Owner Name of sFlow Receiver       Owner name of specific receiver represents who is the user of this receiver  If you delete  existing owner name of receiver  all configurations including collect IP  collect port and  timeout of receiver would be also deleted     SMC7824M VSW    Management Guide  TigerAccess    EE    7 16 7 5    7 16 8    7 16 9    SMC7824M VSW    CLI    To give an owner name of receiver  use the following command     n   See    owner NAME l Gives an owner name of specific receiver   Receiver    Timeout       To set a timeout of receiver  use the following command   SCC    i Sets a timeout of receiver   timeout  lt 1 2147483647 gt  l  Receiver 1 2147483647  timeout value  default 0     Deletes configured timeout of receiver        Receiver Index    If you configure one receiver when sFlow function of specific port was already enabled in  the system  you should assign the configured receiver index of that port for transmitting  sampling packets to sFlow collector    To specify configured receiver index to port  use the following command      e e See    l Specifies a receiver index of port to transmit sampling  sflow port PORTS receiver     index  lt 1 65535 gt  packets to sFlow collector   index  lt 1     Global 1 65535  receiver ID    no sflow port PORTS receiver  ee  Se Deletes specified receiver index of port   index    Displaying sFlow       To display the current status of sFlow se
319. mand      e e Se    active Alarm  Enables this profile   no active config Disables this profile       SMC7824M VSW 99    CLI    100    Fi S      Management Guide  TigerAccess    EE    The following is an example of enabling configuration    SWITCH  bridge alarm config profile TEST    active  SWITCH  bridge alarm config profile TEST    show running config   omitted   alarm config profile TEST  thresh 15min lofs 300  thresh 15min loss 300  thresh 15min lols 300  thresh 15min ess 300    thresh 15min sess 300                thresh 15min uass 300  active   omitted   SWITCH  bridge line config profile TEST         Unless you enable configured profiles  they will not be applied although you apply them to  ports     After you configure and enable profile  if you change the configuration  then it will be  automatically disabled  Therefore you have to enable it with    active    whenever you  change configurations     Step 4  Save Profile after going back to Global configuration mode or Enable mode     SWITCH  config    write memory  Building configuration       OK   SWITCH  config          Besides  when switch is been stacking  Alarm config profile configured in Master will be  automatically configured in Slave  Although it is configured before stacking  Masters con   figuration will be configured in Slave by finding any difference  However  you have to save  the configuration of Slave with using    write memory     Unless you do it  the configuration  will be deleted and the above pr
320. mber of IGMP groups for the system  use the following com   mand      e me See    Specifies the maximum number of IGMP groups for the    ip igmp max groups system    system   count  lt 1 2147483647 gt  y    1 2147483647  number of IGMP groups    no ip igmp max groups system Deletes a specified maximum number of IGMP groups     Displaying IGMP Filtering and Throttling       To display a configuration for IGMP filtering and throttling  use the following command      e e en    Enable  show ip igmp filter  port PORTS  Global  Bridge    Shows a configuration for IGMP filtering and throttling   PORTS  port number       To display existing IGMP profiles  use the following command      e e Se    Enable    show ip igmp profile lala Shows existing IGMP profiles   oba     lt 1 2147483647 gt   Be 1 2147483647  IGMP profile number  ridge       Multicast Source Trust Port    Any port of this switch can be specified as a multicast source trust port which is regis   tered in the multicast forwarding table  Only multicast source trust ports can be received  the multicast traffic     However  the reserved multicast packets should be sent to CPU even if these packets  pass through a multicast source trust port  This feature helps the switch to distinguish be     373    CLI    374    Management Guide  TigerAccess    EE    tween general traffic receivers and multicast traffic receivers  and is a more efficient use  of system resources because it sends the multicast traffic to specic hosts which w
321. mmand      e e See    Specifies IP address of sFlow agent    sflow agent ip A B C D  Global A B C D  agent IP address  default  127 0 0 1     no sflow agent ip Deletes specified IP address of sFlow agent     Enabling sFlow on Port       To enable or disable sFlow function on a port  use the following command     SCC  sflow port PORT enable Enables sFlow function on specified port   Global  sflow port PORT disable Disables sFlow function on specified port     Maximum IP Header Size       To set the maximum IP header size of sampling packets on a port  use the following  command      e me See    Configures the maximum header size of incoming  sflow port PORTS max header     ize  lt 16 256 gt  sample packets to specific port   size      Global 16 256  maximum IP header size value  default 128     no sflow port PORTS max  Deletes configured maximum header size of sample       header size packets     Counter Interval    To set the interval to send interface counter information to sFlow poller  use the following  command     sflow port PORTS counter   Sets the interval of interface counter for port  interval  lt 1 1000 gt   Global    no sflow        PORTS counter   i        EEN EEN interval of interface counter for port  interva       Sample Rate    To set sampling interval of port  use the SS S   command     sflow port PORTS sample rate E sampling interval of port for incoming pack    lt 1 2000 gt   Global    no sflow port PORTS a     Oates contgured samping iena fron   Oates cont
322. modify an admin flow  use the following command      e e een       flow admin NAME modify Global Modifies a flow  enter an admin flow name     You should save and apply the admin flow to system using apply command whenever  you modify any configuration of the admin flow     Class Creation    One class can include several flows  You can simply handle and configure the packets on  several flows at once     To create a class including more than 2 flows  use the following command      e e een    Creates an admin class including at least 2 admin    class admin NAME flow FLOW1 flows    FLOW2   FLOWS3  NAME  admin class name  FLOW  admin flow name       To delete configured admin class or all admin classes  use the following command      e e een    no class admin all Deletes all admin classes     l Deletes specified admin class   no class admin NAME l  NAME  admin class name  Global    Removes specified admin flows from class     no class admin NAME flow  FLOW1  FLOW2   FLOW3     NAME  admin class name  FLOW  admin flow name       SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 7    7 6 7 1    A    SMC7824M VSW    CLI    Admin Rule Action    Admin Policy Creation    For the switch  you need to open Admin Policy Configuration mode first  To open Policy  Configuration mode  use the following command      e e See    Creates an admin policy and opens Admin Policy Con     policy admin NAME create Global figuration mode        NAME  admin policy name     After opening Admin Pol
323. mp trap    snmp trap host A B C D  COMMUNITY    A B C D   snmp trap host A B C D  COMMUNITY    Specifies an SNMP trap v1 host     snmp inform trap host A B C D  COMMUNITY  Specifies an SNMP inform trap host        snmp trap2 host A B C D  COMMUNITY  Global Specifies an SNMP trap v2 host     To delete a specified SNMP trap host  use the following command     no snmp trap host A B C D Deletes a specified SNMP trap v1 host     no snmp   no snmp trap2 host A B C D     no snmp trap2 host A B C D   A B C D Deletes a specified SNMP trap v2 host   Global    no snmp inform trap host We l  ABCD Deletes a specified SNMP inform trap host        If you manage the system via the ACI E  you should specify an SNMP trap v2 host with  the snmp trap2 host command     You can set maximum 16 SNMP trap hosts with inputting one by one     The following is an example of setting an SNMP trap host     SWITCH  SWITCH  config                   SNMP Trap in Event Mode    The system provides various kind of SNMP trap  but it may inefficiently work if all these  trap messages are sent very frequently  Therefore  you can select each SNMP trap sent  to an SNMP trap host     e auth fail is shown to inform wrong community is input when user trying to access  to SNMP inputs wrong community    e cold start is shown when SNMP agent is turned off and restarts again    e link up down is shown when network of port specified by user is disconnected  or  when the network is connected again    e mem threshold is shown 
324. namic routing protocol  static routes are not automatically updated and must  be manually reconfigured if the network topology changes  Static route includes destina   tion address  neighbor address  and etc  To configure a static route  use the following  command     To configure a static route  use the following command      e e re    ip route A B C D SUBNET MASK Configures a static route    GATEWAY   null    lt 1 255 gt   A B C D  destination IP prefix  Global A B C D M  destination IP prefix with mask  ip route A B C D M  GATEWAY   GATEWAY  gateway address  null    lt 1 255 gt    sre A B C D  1 255  distance value    src  binding source IP address       SMC7824M VSW    Management Guide  TigerAccess    EE    4 3 4    SMC7824M VSW    CLI    To delete a configured static route  use the following command    men rs rem    no ip route A B C D SUBNET MASK  GATEWAY    null    lt 1 255 gt    Global    Deletes a configured static route   no ip route A B C D M GD   null   lt 1     GD       To configure a default gateway  use the Sos command     ip route default  GATEWAY    Global Configures a default gateway   null    lt 1 255 gt      To delete a configure default gateway  use the following command   Teena e  Daten    no ip route default  GATEWAY    Global Deletes a default gateway   null    lt 1 255 gt      To display a configured static route  use the following command     es ee    show route A B C D  BEE    Global  l   Shows configured routing information with IP routing  show ip
325. nd      e e ee    Creates a policer and opens Policer Configuration    policer NAME create Global mode        NAME  policer name     After opening Policer Configuration mode  the prompt changes from SWITCH config   to  SWITCH config policer NAME        After opening Policer Configuration mode  a policer can be configured by user  The rate   limit  meter and packet count can be configured for each policer     e The policer name must be unique  Its size is limited to 32 significant characters   e The policer name cannot start with the alphabet    a    or    A      e The order in which the following configuration commands are entered is arbitrary   e The configuration of a polcer being configured can be changed as often as wanted  until the apply command is entered   e Use the show policer profile command to display the configuration entered up  to now     To delete configured policer or all policers  use the following command      e me ees       no policer NAME Deletes a policer  enter a policer name   Global  no policer all Deletes all policers     175    CLI    176    7 6 3 2    7 6 3 3    Management Guide  TigerAccess    EE    Packet Counter    The packet counter function provides information on the total number of packets that the  rule received and analyzed  This feature allows you to know the type of packets transmit   ted in the system according to rule configuration     To count the number of packets matching to corresponding policer  use the following  command     SS  
326. nd      e me see    Configures Sync with partner s equipment or resets    Ire PORTS u  P Bridge VDSL port        Ire PORTS down Disables Sync with partner s equipment     Sync with the connected equipment is basically configured for VDSL port     17    CLI    78    9 3 2 3       Management Guide  TigerAccess    EE    This command is used not only to enable VDSL port but also to reset it when is on unsta   ble status     Profile of VDSL Port    It is possible to configure bandwidth of up down stream of VDSL port  To configure the  profile  use the following command     OO oo ee    Ire PORTS profile vdsl1  asym100_998   sym100_100_998    normal   isdn   adsl   adsl safe   tlan    Ire PORTS profile vdsl1  asym50_998   asym50_998 4b    sym25_997   isdn   adsl   adsl safe   tlan     Ire PORTS profile vdsl1  asym50_998   asym50_998 4b        i Configures profile of VDSL  sym25_997  normal  annex m   annex a   annex b   exclude  Bridge i  port   Ire PORTS profile vdsl2  12b  12b_997   normal   isdn   adsl    adsI2     Ire PORTS profile vdsl2  12a   12a_997   17a   17a_8k   30a    8a   8b   8c   8d   normal   isdn   adsl   adsl2   annex m    annex a   annex b   exclude        Each profile provides the following bandwidth     Type    PLAN 998 Asymmetric for 6Band DMT 50 100M  not support option b  and     PLAN 998 Asymmetric for DMT 50M  PLAN 998 Asymmetric for 4Band DMT 50M Ok tone    asym100_ 998    asym50_998  VDSL 1 asym50_ 998 4b    PLAN 998 Symmetric for 6Band DMT 100 100M  not 
327. nfiguration   e Auto Saving   e System Configuration File   e Restoring Default Configuration    Displaying System Configuration    To display the current running configuration of the system  use the following command     ee  show running config Shows a configuration of the system     show running config  admin flow   admin     policy   flow   arp   bridge   dns   full   host       Shows a configuration of the system with  name   login   qos   rmon alarm   rmon event   7  the specific option   rmon history   policer   policy   snmp   syslog      time out   time zone        The following is an example to display the configuration of the syslog     SWITCH  show running config syslog   l   syslog start   syslog output info local volatile  syslog output info local non volatile        SWITCH     Writing System Configuration    If you change the configuration of the system  you need to save the changes in the sys   tem flash memory     To write a current running configuration  use the following command   IC  male neon      Writes a current running configuration in the system  write memory All a  ash memory        i i Shows a current running configuration on the terminal   write terminal Enable         alias to the show running config command     When you use the write memory command  make sure there is no key input until  OK   message appears     123    CLI    124    6 2 3    6 2 4    Management Guide  TigerAccess    EE    Auto Saving    The switch supports the auto saving feature 
328. nfigures transmit rate of Maximum Downstream  The  unit is kbps   1000 1Mbps     Configures transmit rate of Minimum Downstream  The  unit is kbps   1000 1Mbps     Configures SNR margin of Downstream  The unit is  0 25dBm   4 1dBm     Configures minimum SNR margin of Downstream  The  unit is 0 25dBm   4 1dBm     Configures Interleave delay of Upstream     Configures transmit rate of Maximum Upstream  The  unit is kbps   1000 1Mbps     Configures transmit rate of Minimum Upstream  The  unit is kbps   1000 1Mbps     Configures SNR margin of Upstream  The unit is    up target snr mgn  lt 0 124 gt   0 25dBm   4 1dBm     Configures minimum SNR margin of Upstream  The    up snr min mgn  lt 0 124 gt  GC  unit is 0 25dBm   4 1dBm        The default of Interleave delay is    2ms     and speed of service is not configured by default  setting  The default of SNR margin is    24 6dBm     in case of Downstream  and    32 8dBm      in case of Upstream     Transmit rate should be configured using the unit of Mbps  Therefore  you can input in  terms of 10000 in actual configuration     The following is an example of configuring Interleave of profile named TEST as 20ms and  transmit rate as 8M in case of Upstream and 10M in case of Downstream  and SNT mar   gin as 10dBm     SWITCH  bridge line config profile TEST  down max inter delay 20  SWITCH  bridge line config profile TEST   SWITCH         up max inter delay 20     SWITCH  bridge line config profile TEST              bridge line config p
329. nged from SWITCH config   to SWITCH config   flow NAME     SWITCH config policer NAME    and SWIT CH config policy NAME       os rem  flow NAME create Opens Flow Configuration mode     policer NAME create Global Opens Policer Configuration mode   policy NAME create Opens Policy Configuration mode        Tab  3 9 shows the commands of Rule Configuration mode     ees Classifies an IEEE 802 1p priority    maes Classifies a MAC address    action matth   Configures a rule action for classified packets     rate limit Comfigures a rate limit of classified packets  Configures a rule priority of specified policy     Tab  3 9 The Commands of Rule Configuration Mode       RMON Configuration Mode    In RMON Configuration mode  you can configure RMON alarm  RMON event and RMON  history  The switch provides three different configuration modes to configure each type of  RMON     Teoma rs rem  rmon alarm  lt 1 65535 gt   Opens RMON Configuration mode   Global      rmon event  lt 1 65535 gt     event  lt 1   rmon event  lt 1 65535 gt     1 65535  index number       rmon    rmon history  lt 1 65535 gt     lt 1   rmon history  lt 1 65535 gt       SMC7824M VSW    Management Guide  TigerAccess    EE    CLI    Tab  3 10 shows main commands of RMON Configuration mode        Shows the subject which configures each RMON and uses relevant  information     Tab  3 10 Main Command of RMON Configuration Mode    3 2 Configuration Mode Overview    Fig  3 1 shows the overview of the configuration mode for th
330. nooping vlan VLANS    mrouter learn pim       Multicast Router Port Forwarding    The multicast traffic should be forwarded to IGMP snooping membership ports and multi   cast router ports because the multicast router needs to receive muticast source informa   tion  To enable the switch to forward the traffic to multicast router ports  use the following  command     C m en    ip multicast mrouter pass  Enables to forward multicast traffic to the multicast  through router ports     no ip li mrouter pass  Disables to forward multicast traffic to the multicast       li router ports     To disable the switch to learn multicast router ports through PIM hello packets  use the  following command     a me See    no ip igmp snooping mrouter  learn pim Disables to learn multicast router ports through PIM    ip E snooping vlan hello packets   licen mrouter learn pim       Displaying Multicast Router Port    To display a current multicast router port for IGMP snooping  use the following command      e me See    Shows a current multicast router port for IGMP snoop     show ip igmp snooping mrouter l  Enable ing globally     Global Shows a current multicast router port for IGMP snoop   Bridge ing on a specified VLAN   VLANS  VLAN ID  1 4094     show ip igmp snooping vlan  VLANS mrouter       365    CLI    366    9 2 3 8    Management Guide  TigerAccess    EE    TCN Multicast Flooding    When a network topology change occurs  the protocols for a link layer topology     such as  spanning tree
331. ns are regenerated  based on CIR    Bucket C CIN    e ng 7    CBS    de    Green Color Marking    Tokens are regenerated  based on CIR    Bucket C CON    A A SO ea    4          If the bucket C is empty  the tokens in  the bucket P are decremented by the  size of the packet    IC  gt     Yellow Color Marking    183    CLI    184    Management Guide  TigerAccess    EE    Tokens are regenerated Tokens are regenerated  based on PIR faster than CIR based on CIR  Bucket P Bucket C  RS IN NA E  Empty CBS    PBS Empty    If the bucket P is empty   a packet is marked red    II ren  gt  IC  gt     Red Color Marking          Fig  7 9 Behavior of trT CM  3     To set the metering mode  use the following command      e e See      Sets the metering mode   color mode  srtcm   trtcm   blind      blind  color blind mode      aware  Policer  aware  color aware mode    In the color blind mode  the meter assumes that the packet stream is uncolored  In the  color aware mode the meter assumes that some preceding entity has pre colored the in   coming packet stream so that each packet is the one among green  yellow  and red        To specify the value for metering parameters  use the following command      e e Se    Specifies CIR and CBS   BANDWIDTH  regenerating rate of token  unit  Kbps   BURST  maximum size of token bucket  unit  byte     Policer  color pir BANDWIDTH  Specifies PIR and PBS   trTCM only   pbs BURST      color ebs BURST   ebe BURST Specifies   Specifies EBS   sTCMonlyy    srTCM  
332. ns to the default maximum aging time value of  no spanning tree mst max age  MSTP   Bridge    Returns to the default maximum aging time value of  PVSTP   VLANS  VLAN ID  1 4094     no spanning tree vlan VLANS    max age       BPDU Hop Count    In MSTP  it is possible to configure the number of hops in order to prevent BPDU from  wandering  BPDU passes the switches as the number of hops by this function     To configure the number of hops of BPDU in MSTP  use the following command      e e re      Configures the number of hops for BPDU  set the  spanning tree mst max hops  lt 1     40 gt     number of possible hops in MSTP region   1 40  the number of hops for BPDU  default 20     no spanning tree mst max hops Deletes the number of hops for BPDU in MSTP        SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 12 5    8 3 12 6    SMC7824M VSW    CLI    BPDU Filtering    BPDU filtering allows you to avoid transmitting on the ports that are connected to an end  system  If the BPDU Filter feature is enabled on the port  then incoming BPDUs will be fil   tered and BPDUs will not be sent out of the port     To enable or disable the BPDU filtering function on the port  use the following command   mana   mete   en    spanning tree port PORTS ar 8    Enables a BPDU filtering fuction on specific port   bpdufilter enable    spanning tree port PORTS    Bridge  bpdufilter disable    Disables a BPDU filtering fuction on specific port   no spanning tree port PORTS    bpdufilter     
333. nt  or if a static IP source binding is con   figured  the IP source guard restricts the IP traffic of client to those source IP addresses  configured in the binding  any IP traffic with a source IP address other than that in the IP  source binding will be filtered out  This filtering limits a host s ability to attack the network  by claiming a neighbor host s IP address     IP source guard supports the Layer 2 port only  including both access and trunk  For each  untrusted Layer 2 port  there are two levels of IP traffic security filtering     e Source IP Address Filter   IP traffic is filtered based on its source IP address  Only IP traffic with a source IP  address that matches the IP source binding entry is permitted  An IP source address  filter is changed when a new IP source entry binding is created or deleted on the port   which will be recalculated and reapplied in the hardware to reflect the IP source bind   ing change  By default  if the IP filter is enabled without any IP source binding on the  port  a default policy that denies all IP traffic is applied to the port  Similarly  when the  IP filter is disabled  any IP source filter policy will be removed from the interface     331    CLI    332    8 6 8 1    A    8 6 8 2    Management Guide  TigerAccess    EE    e Source IP and MAC Address Filter   IP traffic is filtered based on its source IP address as well as its MAC address  only IP  traffic with source IP and MAC addresses matching the IP source binding entry 
334. o SSH server  use the following command      e e Se    Enable  Global Shows SSH clients connected to SSH server   Bridge       Disconnecting SSH Client    To disconnect an SSH client connected to SSH server  use the ee command        A E SSH clients connected to SSH server   ssh disconnect PID Global  PID  SSH client number    99    CLI    96    4 4 1 4    4 4 1 5    4 4 2    4 4 2 1    4 4 2 2    Management Guide  TigerAccess    EE    Assigning Specific Authentication Key    After enabling SSH server  each client will upload its own generated authentication key   The SSH server can assign the specific key among the uploaded keys from several cli   ents     To verify an authentication key  use the following command      e e re       ssh key verify FILENAME Global Verifies a generated authentication key     If the SSH server verify the key for specific client  other clients must download the key file  from SSH server to login     Displaying Connection History of SSH Client    To display the connection history of SSH client  use the following command      e mee    Enable    Shows the connection history of SSH clients who are  show ssh history Global    connected to SSH server up to now        Bridge    SSH Client    The switch can be used as SSH client with the following procedure     e Login to SSH Server  e File Copy  e Authentication Key    Login to SSH Server    To login to SSH server after configuring the switch as SSH client  use the following com   mand      e e re    Lo
335. o a defined priority level  the user has different authority to access the system   This priority should be defined in the TACACS  server in the same way  To define the pri   ority level of user  use the following command     login tacacs priority level  min   eS ee the priority level of user  see the below infor   user   max   root  Global mation for the order of priority     no login tacacs priority level   Deletes a defined priority level    a defined   Deletes a defined priority level    level        The order of priority is root   max  gt  user  gt  min     Accounting Mode    The switch provides the accounting function of AAA  Authentication  Authorization  and  Accounting   Accounting is the process of measuring the resources a user has consumed   Typically  accounting measures the amount of system time a user has used or the amount  of data a user has sent and received     To set an accounting mode  use the following command      e e een    Sets an accounting mode   login accounting mode  none   start  measures start point only   start   stop   both  Global stop  measures stop point only   both  measures start and stop point both     no login accounting mode Deletes a configured accounting mode     Displaying System Authentication       To display a configured system authentication  use the following command     na e een    Enable  Global Shows a configured system authentication        Bridge    SMC7824M VSW    Management Guide  TigerAccess    EE    4 3    4 3 1    SMC
336. o check network status with relative   Source IP address which other side should make a response     Numeric display  n  Hop is displayed the number instead of indications or statistics     l   It is considered as successful ping test if reply returns within the con   Timeout in seconds  2    fe i  figured time interval  Default is 2 seconds     Probe count  3  Set the frequency of probing UDP packets     The TTL field is reduced by one on every hop  Set the time to trace  Maximum time to live  30  hop transmission  The number of maximum hops   Default is 30 sec   onds     Selects general UDP port to be used for performing to trace the  Port Number  33434   routes  The default is 33434     Tab  6 4 Options for Tracing Packet Route       The following is an example of tracing packet route sent to 10 1 158 158     SWITCH  traceroute 10 27 41 81   traceroute to 10 27 41 81  10 27 41 81   30 hops max  40 byte packets  1 10 27 41 81  10 27 41 81  0 623 ms 0 295 ms 0 254 ms   SWITCH     Displaying User Connecting to System    To display current users connecting to the system from a remote place or via console in   terface  use the following command      e e re    Enabl Shows current users connecting to the system from a  nable  remote place or via console interface        SMC7824M VSW    Management Guide  TigerAccess    EE    6 3 5    6 3 6    6 3 7    SMC7824M VSW    CLI    MAC Table    To display MAC table recorded in specific port  use the following command      e e re    show m
337. o ip dhcp snooping limit lease eye  Deletes a DHCP lease limit   PORTS       You can limit the number of entry registrations only for untrusted interfaces  because the  DHCP snooping binding table only contains the information for DHCP messages from un   trusted interfaces     325    CLI    326    8 6 7 5    8 6 7 6    8 6 7 7    Management Guide  TigerAccess    EE    Source MAC Address Verification    The switch can verify that the source MAC address in a DHCP packet that is received on  untrusted ports matches the client hardware address in the packet     To enable the source MAC address verification  use the following command     Enables the source MAC address veri   ip dhcp snooping verify mac address  fication   Global    Disables the source A address veri   no ip dhcp snooping nein dhep snooping very macs   mac  nein dhep snooping very macs   A    ication        Static DHCP Snooping Binding    The DHCP snooping binding table contains a hardware address  IP address  lease time   VLAN ID  and port information that correspond to the untrusted interfaces of the system     To manually specify a DHCP snooping binding entry  use the following command      e e See    Configures binding on DHCP snooping table   1 4094  VLAN ID   PORT  port number   A B C D  IP address   MAC ADDR  MAC address    ip dhcp snooping binding  lt 1   4094 gt  PORT A B C D MAC ADDR   lt 120 2147483637 gt     Global 120 2147483637  lease time  unit  second     ip dhcp snooping binding  lt 1   4094 gt  PO
338. o not  operate with MSTP have instance 0 so that they can also join BPUD exchanges  The op   eration of deciding CST root is CIST  Common  amp  Internal Spanning Tree      Legacy 802 1d CST    Switch A       Region B feu    a ae ia ie      Legacy 802 1d CST Root  amp  IST Root           E  oo Switch C         IST Root l  Region A  IST     Switch B          Switch D Switch E    Fig  8 23 CST and IST of MSTP  1     267    CLI    268    8 3 4    Management Guide  TigerAccess    EE    In CST  SWITCH A and B are operating with STP and SWITCH C  D and E are operating  with MSTP  First  in CST  CIST is established to decide a CST root  After the CST root is  decided  the closest switch to the CST root is decided as IST root of the region  Here   CST root in IST is an IST root     Legacy 802 1d CST          Switch A    Region C  IST  Region B  IST                      e WEE                                  IST Root       Instance 2 H    ST Root    Region A  IST        Instance 3    Switch D Switch E  Fig  8 24 CST and IST of MSTP  2     In the above situation  if SWITCH B operates with MSTP  it will send its BPDU to the CST  root and IST root in order to request itself to be a CST root  However  if any BPDU having  higher priority than that of SWITCH B is sent  SWITCH B cannot be a CST root     Enabling STP Function  Required     First of all  you need to enable STP function  You cannot configure any parameters re   lated to Spanning Tree Protocol without this command     To enable S
339. ocedure will be repeated     With enabled stacking  config profile of Master will be configured in Slave  it is impossible  to configure alarm config profile in Slave     Step 5  Apply Profile to port  Use the following command    mane l a O pm       alarm config profile NAME add PORTS Applies Profile to port    The following is an example of applying Profile named TEST to port 1     SWITCH  bridge   alarm config profile TEST add 1  SWITCH  bridge       SMC7824M VSW    Management Guide CLI  TigerAccess    EE    With enabled stacking  Master   s configuration is same configured in Slave  However         Master can make application to port of Slave  You should configure it in Slave  Please  save the configuration after applying to port     To disable the application of profile  use the following command      e e See       alarm config profile NAME del PORTS Disables Profile applied to port     Step 6  save the configuration     SWITCH  config   write memory  Building configuration       OK   SWITCH  config          To delete Profile  use the following command     na ee    no alarm config profile NAME Bridge Deletes Profile     SMC7824M VSW 101    CLI    102    9 3 9     gt   z    5 3 5 1    5 3 5 2    Management Guide  TigerAccess    EE    Configuring CPE    You can reset CPE used when switch and check state of CPE        PORTS    at CPE configuration command is VDSL port number connected specified CPE     The below description is only for this switch  in which module is instal
340. ode  sends RM Link UP message that informs other nodes the blocking status of secondary  port  If the nodes receives RM Link Up message  they unblocks the ports which are de   tected a Link Failure recovery  The Ethernet ring is back to normal state     Fig  8 32 shows an example of a Ring Recovery operation   Node A 2  Unblock the port Node B    recovered from Link  Failure            RM Link Up                            opges RM Link Up al    1  Sends RM Link Up Ack to both  ports and blocks secondary port    Fig  8 32 Ring Recovery    SMC7824M VSW    Management Guide  TigerAccess    EE    8 4 2    8 4 3    A    SMC7824M VSW    CLI    Loss of Test Packet  LOTP     ERP recognizes the Link Failure using Loss of Test Packet  LOTP  mechanism  RM Node  periodically sends periodic    RM Test Packet    message  The state of LOTP means that     RM Test Packet    message does not return three consecutive times to RM node through  Ethernet Ring  If RM node receives its    RM Test Packet    message through Ethernet Ring   it continues to block its secondary port     You can configure the interval for sending    RM Test Packet    message     ERP Shared Link    Sharing a link between two ERP rings allows the two nodes adjacent to the link to be  common to the two rings  Sharing one link between two rings would create a    super loop     if that link failed  To prevent the super loop  two ERP domains should have different priori   ties  This concept is called    ERP ring priority     Wh
341. ode for one  port and make one group include several queues on DWRR packet scheduling mode  this  group implements as if it is one single queue  The scheduling mode of all queues is SP   but a group including several queues operates in DWRR     Weight    To set a weight for DWRR scheduling mode  use the following command      e e ee    Sets a weight for each port and queue   qos weight  PORTS   cpu   lt 0 7 gt  PORTS  port numbers   lt 1 255 gt  0 7  queue number  Global 1 255  weight value  default  6   Sets a ratio among all queues according to configured  qos base weight PORTS  lt 1 255 gt  weight   1 255  base weight value  default  6        Maximum and Minimum Bandwidth    To set a maximum bandwidth  use the following command      e e een    Sets a maximum bandwidth for each port and queue   PORTS  port numbers   Global 0 7  queue number  BANDWIDTH  bandwidth in the unit of MB    qos max bandwidth PORTS  lt 0   7 gt   BANDWIDTH   unlimited        unlimited  unlimited bandwidth  default     SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 9 4    SMC7824M VSW    CLI    To set a minimum bandwidth  use the following command     n   See    Sets a minimum bandwidth for each port and queue     S i PORTS  port numbers  qos min bandwidth PORTS  lt 0     T gt   BANDWIDTH   unlimited     Global 0 7  queue number  BANDWIDTH  bandwidth in the unit of MB  default  0   unlimited  unlimited bandwidth       A minimum bandwidth can be set only in DWRR scheduling mode     By usin
342. of ERP domain    of ERP domain        295    CLI    296    8 4 5    8 4 6    8 4 7    Management Guide  TigerAccess    EE    Selecting the Node    To configure an ERP domain as RM Node  use the following command      e e re       erp domain DOMAIN ID mode rm Configures ERP node mode as RM node     To configure an ERP domain as normal node  use the following command   INC rr    erp domain DOMAIN ID mode    Bridge Configures ERP node mode as normal node   norma    Protected Activation       When you finish configuring specific ERP domain with Domain ID  domain name  primary  port and secondary port  you should activate the ERP domain to apply to the system  To  activate an ERP domain  use the following command     a Y mn    erp domain DOMAIN ID  Bridge Configures ERP Protected Activation   activation activate    To deactivate an ERP domain  use the following command     Je    erp domain DOMAIN ID    activation    erp  ira DOMAIN ID activa   tion  ira       Bridge Deactivates an ERP domain   default        Manual Switch to Secondary    A secondary port is supposed to be blocked as unused link for traffic while ERP runs  without any link failure  While a primary port forwards the traffic to other nodes  But you  can configure a primary port to be blocked as a secondary port role  A secondary port is  automatically changed to forward the traffic     To manually configure a primary or secondary port as an unused link that should be  blocked for traffic in normal condition of Ethern
343. of the file naming of a DHCP lease database  see Section 8 6 3 1     Recognition of DHCP Client    Normally  a DHCP server recognizes DHCP clients with a client ID  However  some  DHCP clients may not have their own client ID  In this case  you can select the recogni   tion method as a hardware address instead of a client ID     To select a recognition method of DHCP clients  use the following command      e e een       ip dhcp database key  client id   7  Global Selects a recognition method of DHCP clients  hardware address     IP Address Validation    Before assigning an IP address to a DHCP client  a DHCP server will validate if the IP  address is used by another DHCP client with a ping or ARP  If the IP address does not re   spond to a requested ping or ARP  the DHCP server will realize that the IP address is not  used then will assign the IP address to the DHCP client     To select an IP address validation method  use the following command      ee e re       ip dhcp validate  arp   ping  Global Selects an IP address validation method     You can also set a validation value of how many responses and how long waiting  time   out  for the responses from an IP address for a requested ping or ARP when a DHCP  server validates an IP address     To set a validation value of how many responses from an IP address for a requested ping  or ARP  use the following command      e e Se       ip dhcp  arp   ping  packet  lt 0  Sida Sets a validation value of how many responses   oba  20
344. ofile first     If you try to configure interleave delay of the port which is included as Line config profile  member  the error message will be displayed     SWITCH  bridge    lre 5 interleave delay 50  6VDSL Port 5 is line config profile DEFVAL member   SWITCH  bridge       To configure Line config profile in detail  you need to open Line config Profile mode  Use  the following command      e me See               Opens line config profile configuration mode   line config profile NAME Bridge        NAME  Line config profile name    The following is an example of entering into Line config Profile mode to configure line  config profile named as TEST     SWITCH  config terminal  SWITCH  config   bridge  SWITCH  bridge    line config profile TEST  SWITCH  bridge line config profile TEST             Meanwhile  use the following command to exit from Line config Profile mode     e e ees    et   Line config Exits from line config profile configuration mode        95    CLI Management Guide    TigerAccess    EE    To configure the detail of Profile  Use the following command     Command Description    down max inter delay  lt 1 100 gt     down slow max datarate  lt 0   100000 gt     down slow min datarate  lt 0   100000 gt     down target snr mgn  lt 0 124 gt     down snr min mgn  lt 0 124 gt   Line config    up max inter delay  lt 1 100 gt   up slow max datarate    100000 gt     up slow min datarate  100000 gt     Configures Interleave delay of Downstream  The unit is    MSEC     Co
345. ogether    e MVR only supports IGMPv2     Enabling MVR    To enable MVR on the system  use the following command     A TA  E    Enables MVR   Global    MVR Group       To configure MVR  you need to specify an MVR group and group address  If you specify  several MVR groups  IGMP packets from the receiver ports are sent to the source ports  belonging to the corresponding MVR group according to the group address specified in  the packets     To specify an MVR group and group address  use the following command      e e en    Specifies an MVR group and group address     mvr vlan VLAN group A B C D VLAN  VLAN ID  1 4094     Ge A B C D  IGMP group address    no mvr vlan VLAN group A B C D Deletes a specified MVR group and group address        369    CLI    370    9 2 6 3    9 2 6 4    9 2 6 5    Management Guide  TigerAccess    EE    Source Receiver Port    You need to specify the source and receiver ports for MVR  The followings are the defini   tions for the ports     e Source Port  This is connected to multicast routers or sources as an uplink port  which receives  and sends the multicast traffic  Subscribers cannot be directly connected to source  ports  All source ports belong to the multicast VLAN as tagged     e Receiver Port  This is directly connected to subscribers as a subscriber port  which should only re   ceive the multicast traffic  All receiver ports must belong to the both subscriber and  multicast VLANs as untagged for implementation reasons     To specify a port a
346. on a specified  port nego PORTS  on   off  Bridge  port  enter a port number   default  on     Auto negotiation operates only on 10 100 1000Base TX interface  You cannot enable this  function on 1000Base X optical interface     The following is an example of disabling the auto negotiation on the Ethernet port 25 and  26     SWITCH  bridge    show port 25 26    NO TYPE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER     25 Ethernet 1 Up Up Auto Full1 1000 Off Y  26 Ethernet 1 Up Up Auto Full1 1000 OLF Y  SWITCH  bridge   port nego 25 26 off   SWITCH  bridge    show port 25 26    NO TYPE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER     25 Ethernet 1 Up Up Force Full 1000 Off  26 Ethernet 1 Up Up Force Full 1000 OTE    SWITCH  bridge       Transmit Rate    To set the transmit rate of an Ethernet port  use the following command     nan   eos    Sets the transmit rate of a specified port    port speed PORTS  10   100   1000  to 10 100 1000Mbps  enter a port num   ber        Transmit rate is configurable only on 10 100 1000Base TX interface  You cannot set  transmit rate on 1000Base X optical interface     SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 4    SMC7824M VSW    CLI    The following is an example of setting transmit rate on the Ethernet port 25 to 10 Mbps     SWITCH  bridge    show port 25  NO TYPE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER   ADMIN OPER     25 Ethernet 2 Up Up Auto Full1f1000   Off  Off Y    SWITCH  bridge    port speed 25 10  SWIT
347. on several flows at once     To create a class including more than 2 flows  use the following command      e Se    Creates a class including more than 2 flows     class NAME flow FLOW1   FLOW2   FLOW3        Global NAME  class name  FLOW  flow name       SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 3    7 6 3 1    SMC7824M VSW    CLI    To delete configured class or all classes  use the following command      e me See    Deletes all classes     no class NAME flow FLOW1   FLOW2   FLOW3        Removes specified flows from class        no class NAME Global Deletes specified class  enter the class name   Removes cs tons tomase     Packet Conditioning    After defining traffic classification criteria in Flow Configuration mode  then configure how  to process the packets  The classified traffic from flow or class is being treated according  to the policer configuration  On Policer Configuration mode  a policer enforces a rate   limiting and the packet counter as well as the metering for traffic  The traffic is identified  via policers  which are used to define traffic conditions including rate limit  metering and  counter  And the policy actions for the identified traffic are created with policy  One policer  can belong to one policy     Policer Creation    To configure how to handle the classified packets according to the policer settings  you  need to create a policer and open Policer Configuration mode     To open Policer Configuration mode  use the following comma
348. onanoss 91  NOS DO Wil OA BEEN 109  World TIME ZOMG EE 113  ODTIOMS TOP PING csias a ed a tees 126  Options for Ping for Multiple IP Addresees 127  Options for Tracing Packet Route          n nannnannnennnnannnnnnnnnnnnnrnnnrnsnrrnnrrnenrrnnnee 130  ICMP Message Type cui ic ina 223  Mask Calculation of Default Value cc cccccccccceeecceeececeeeeeseeeeseeeesseeeeaees 225  Options for Packet  DUMP incas as 227  Advantages and Disadvantages of Tagged VI AN  239  SIP aun COSE SNOT NEE 269  Rod Ps Path COSt lO  EE 270    SMC7824M VSW    Management Guide CLI  TigerAccess    EE    1 Introduction    1 1 Audience    This manual is intended for Ethernet IP DSLAM operators and maintenance personnel for  providers of Digital Subscriber Line DSL  and Ethernet services  This manual assumes  that you are familiar with the following    e Ethernet networking technology and standards   e Internet topologies and protocols   e DSL technology and standards   e Usage and functions of graphical user interfaces     1 2 Document Structure    Tab  1 1 briefly describes the structure of this document     1 Introduction Introduces the overall information of the document     2 System Overview Introduces the switch system  It also lists the features of the system     3 Command Line Interface  CLI  Describes how to use the Command Line Interface  CLI    4 System Connection and IP Address   Describes how to manage the system account and IP address   5 Port Configuration Describes how to configure the Etherne
349. oncern to the host router interaction as  shown below     e Membership query   A multicast router determines if any hosts are listening to a group by sending mem    bership queries  There are three variants of the membership queries        General query  This is used to determine if any hosts are listening to any group        Group specific query  This is used to determine if any hosts are listening to a par   ticular group        Group source specific query  This is used to determine if any hosts are listening  to a particular group and source     e Version 3 membership report  This is used by hosts to report the current multicast reception state  or changes in the  multicast reception state  of their interfaces  IGMPv3 membership reports contain a  group record that is a block of fields containing information of the host s membership  in a single multicast group on the interface from which the report is sent  A single re   port may also contain multiple group records  Each group record has one of the fol   lowing information     353    CLI    354    9 2    9 2 1    Management Guide  TigerAccess    EE        Current state  This indicates the current filter mode including excluding the speci   fied multicast address        Filter mode change  This indicates a change from the current filter mode to the  other mode        Source list change  This indicates a change allowing blocking a list of the multi   cast sources specified in the record     IGMPv3 Operation    Basically  IG
350. one  use the following command      e me See      Shows the table of each parameter  bitloading  SNR   show Ire pertoneinfo PORT Enable      block   hlog ne   hlin ne   hlin  Global  scale ne  lt 0 511 gt   lt 0 511 gt  Bridge    FEQ fine coeff  noie margin and so on  in the range of    tone        0 511  start  stop tone index    90 SMC7824M VSW    Management Guide  TigerAccess    EE    9 3 2 13    9 3 3    SMC7824M VSW    CLI    The following table lists the sub commands in the Bitloading per tone command     COI EVEN  CO oaremoarn    an ne Get Rx Per Tone Quiet Line Noise Near End  Rx Per Tone Coarse FEQ Near End    Get Param Block Read Far End  valid for ADSL2 2  VDSL2 only     lane Get Per Tone HLOG Info Near End  valid for ADSL2 2  only     Get Per Tone HLIN Info Near End    Get Per Tone HLIN Scale Near End    Tab  5 8  Sub commands in Bitloading Per Tone       G handshake Tone    To configure G handshake tone of each port  use the following command     man e re    Ire PORTS ghs a43  143   v43  Configures G hs tone carrier of each port    Ire PORTS ghs b43  i43   v43  Bridge a43  b43  i143  v43  A43  B43  143  V43 Carrier Set  Ire PORTS ghs none none  None G hs Carrier mode       You can not configure A43 G hs carrier with B43 at the same time     To display the G hs Carrier configuration of each port  use the following command      e e res    Enable    show Ire ghs  PORTS  Global Shows G hs carrier configuration of each port     Bridge       VDSL Checking Errors of VDS
351. onnect to equipments at remote place by assigning IP address to MGMT  interface  Since MGMT interface is operated regardless of status of service port  it is still  possible to configure and manage equipment at remote place     RADIUS and TACACS     The switch supports client authentication protocol  that is RADIUS  Remote Authentica   tion Dial In User Service  and TACACS   Terminal Access Controller Access Control Sys   tem Plus   Not only user IP and password registered in switch but also authentication  through RADIUS server and TACACS  server are required to access  So security of sys   tem and network management is strengthened     Secure Shell  SSH     Network security is getting more important because the access network has been gener   alized among numerous users  Secure shell  SSH  is a network protocol that allows es   tablishing a secure channel between a local and a remote computer  It uses public key  cryptography to authenticate the remote computer and to allow the remote computer to  authenticate the user     SMC7824M VSW    Management Guide  TigerAccess    EE    3    3 1    SMC7824M VSW    CLI    Command Line Interface  CLI     The switch enables system administrators to manage the switch by providing the com   mand line interface  CLI   This user friendly CLI provides you with a more convenient  management environment     To manage the system with the CLI  a management network environment is required  The  switch can connect to the management network either 
352. oping vlan  besen A robustness variable       IGMPv2 Snooping    IGMP Snooping Querier Configuration    IGMP snooping querier should be used to support IGMP snooping in a VLAN where PIM  and IGMP are not configured     When the IGMP snooping querier is enabled  the IGMP snooping querier sends out peri   odic general queries that trigger membership report messages from a host that wants to  receive multicast traffic  The IGMP snooping querier listens to these membership reports  to establish appropriate forwarding     Enabling IGMP Snooping Querier    To enable the IGMP snooping querier  use the following command      es mee    ip igmp snooping querier  ad  Enables the IGMP snooping querier globally     dress A B C D  E A B C D  source address of IGMP snooping query  lobal  ip igmp snooping vlan VLANS Enables the IGMP snooping querier on a VLAN     querier  address A B C D  VLANS  VLAN ID  1 4094        SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    To disable the IGMP snooping querier  use the following command      e me See    no ip igmp snooping querier     address  Disables the IGMP snooping querier     ip Lomp snooping uae   address  source address of IGMP snooping query    VLANS querier uae         If you do not specify a source address of an IGMP snooping query  the IP address config   ured on the VLAN is used as the source address by default  If no IP address is configured  on the VLAN  0 0 0 0 is then used     IGMP Snooping Query Interva
353. ore information  see Section 4 1 10 1     The following is an example of upgrading the system software stored in os1     SWITCH  copy ftp os download osl   To exit   press Ctrl D   IP address or name of remote host  FTP   10 100 158 144   Download File Name   V5924C R 5 01 x   User Name   admin   Password    Hash mark printing on  1024 bytes hash mark     Downloading NOS   tH HH HH EEE EH HH EE EE EE HE EE EH HH HE HO EEE EE EE HE EE EE OE EEE EEE EE EE EE EE EH EHH  HH HH HH HE EEE HH EEE EE EH HE EE HH HH EH EEE EEE EE EE EE HH EH OEE EEE EE EE EH HH EHH  tH HH HH EEE EH HH EEE EE EE HH EE EH HH HH EEE EE EE EE EE EE EH EE OE EEE EE EE EE EE EH EHH  dde  dde  TEETH HH HH TH HHH HH HH HE EEE HE HH HH HH EE EE EE OHH OO EEE OO EOE EEE     Omitted     dde  dde  HH HH Ht HEHEHE HEH HH EEE EE EE HH HE EE HH HH EH EEE EE EE HE EE EE HH EE OEE EEE EE EE EE EH HH HH  HH HH HE EE EH HH EEE EE EH HH EE EE HH HH EH EEE EE EE EE EE EH HE EH OEE EEE EE EE EE EE HH HEHH  dd  HH HH THEE HEH HEE EEE EE HE HH HH HE EE HH HH EH EE EE EE EE EE EH HE EOE EEE EE EE EE HE EH HEHH  HHH HH THEE EH HH EEE EE EE HH HEE EH HH HE HH OH EEE EEE EE EE EE EH EE OEE EEE EE HE EEE EE EE HH EHH  HH HH HH HE EHH HHH EEE EE EE HE EE EH HH HE EH EEE EE EE EE EE EE HE HH HF   13661792 bytes download OK     375    CLI Management Guide  TigerAccess    EE    SWITCH  show flash    Flash Information  Bytes     Area total used free  OS1  default   running  16777216 13661822 3115394 5 01  3001  OS2 16777216 13661428 3
354. oring    Port Basic    The switch provides 24 VDSL ports for the subscriber interface and 2 fixed ports of  10 100 1000Base T Gigabit Ethernet and 1 optional module of 2 uplink ports 2 port SFP  or 1 port GE PON  amp  1 port SFP  supporting 100 1000Base X interface     Ethernet Port Configuration    Enabling Ethernet Port    To enable disable the Ethernet port  use the following command     n   Seees           Enables disables a port  enter a port number   port  enable   disable  PORTS Bridge   default  enable     The following is an example of disabling the Ethernet port 25     SWITCH  bridge   port disable 25  SWITCH  bridge    show port 25    NO TYPE PVID STATUS MODE FLOWCTRL INSTALLED   ADMIN OPER     25 Ethernet 2   Down been Auto Fully 0 Off Y    SWITCH  bridge       Auto Negotiation    Auto negotiation is a mechanism that takes control of the cable when a connection is es   tablished to a network device  Auto negotiation detects the various modes that exist in the  network device on the other end of the wire and advertises it own abilities to automatically  configure the highest performance mode of interoperation  As a standard technology  this  allows simple  automatic connection of devices that support a variety of modes from a va     67    CLI    68    9 2 3    Management Guide  TigerAccess    EE    riety of manufacturers  To enable disable the auto negotiation on an Ethernet port  use  the following command      e e re         Enables disables the auto negotiation 
355. ort Traffic    To set the threshold of port traffic  use the following command      e e een    Sets the threshold of port traffic    PORTS  port number   THRESHOLD  threshold value  unit  kbps   5   60   600  time interval  unit  second     no threshold port PORTS  rx    tx  Deletes the configured threshold of port traffic   x    The threshold of the port is set to the maximum rate of the port as a default     threshold port PORTS  THRESHOLD  5   60   600   rx    Global       To set a timer to block incoming traffic through specific port  use the following command     n   See    Set a timer to block the traffic which goes over its    threshold port PORTS block threshold     timer  lt 10 3600 gt  Global  10 3600  expire timer  unit  second     no threshold port PORTS block Deletes the configured threshold of port traffic     To show the ARK threshold of port traffic  use the Ss command        Command   Description    A  E MU the configured threshold of port  show port threshold Enable Global Bridge Ese  raffic     Fan Operation       The system fan will operate depending on measured system temperature  To set the  threshold of fan operation  use the following command      e e een    Sets the threshold of fan operation in the unit of Cel   threshold fan  START TEMP sius    C      STOP TEMP Global START TEMP  starts fan operation   default  30   STOP TEMP  stops fan operation   default  0     no threshold fan Deletes a configured threshold of fan operation        119    CLI    1
356. ort Trunk    To display a configuration of port trunk  use the following command     na e een    Enable    Global Shows a configuration for trunk        Bridge    Link Aggregation Control Protocol  LACP     Link aggregation control protocol  LACP  is the function of using wider bandwidth by ag   gregating more than two ports as a logical port as previously stated port trunk function     If the aggregated port by port trunk is in different VLAN from the VLAN where the existing  member port originally belongs to  it should be moved to VLAN where the existing mem   ber port belongs to  However  the integrated port configured by LACH is automatically  added to appropriate VLAN     SMC7824M VSW    Management Guide  TigerAccess    EE    H    8 2 2 1    SMC7824M VSW    CLI    LACP can generate up to 5 aggregators whose number value could be O to 4  The group  ID of trunk port and the aggregator number of LACP cannot be configured with the same  value     The following explains how to configure LACH    e Configuring LACP   e Operation Mode   e Priority of Switch   e Manual Aggregation   e BPDU Transmission Rate   e Administrational Key   e Port Priority   e Displaying LACP Configuration    Configuring LACP    Step 1  Activate LACP function  using the following command     n   en    Enables LACP of designated Aggregator number     lacp aggregator AGGREGA     AGGREGATIONS  select aggregator ID that should be  TIONS    enabled for LACP  valid value from 0 to 4         Step 2  Configure 
357. ort number   Clears dynamic MAC addresses   clear mac NAME PORT MAC ADDR   MAC ADDR  MAC address    209    CLI    210    7 11    7 11 1    Management Guide  TigerAccess    EE    To remove the static MAC addresses manually registered by user from the MAC table   use the following command     RS ge  Deletes static MAC addresses   no mac eg Deletes static MAC addresses  enter the bridge name   Bridge    Deletes static MAC addresses   NAME  bridge name  PORT  port number    no mac NAME PORT    Deletes a specified static MAC address   NAME  bridge name   PORT  port number   MACADDR  MAC address    no mac NAME PORT MACADDR       To display the MAC table in the switch  use the following command      e Y Se    Shows switch MAC address  selection by port number  Enable    show mac NAME  PORT  Global  Bridge     subscriber port only    NAME  bridge name  PORT  port number       There are more than a thousand of MAC addresses in MAC table  And it is difficult to find  information you need at one sight  So  the system shows a certain amount of addresses  displaying  more    on standby status  Press any key to search more  After you find the in   formation  you can go back to the system prompt without displaying the other table by  pressing  lt q gt      MAC Filtering    It is possible to forward frame to MAC address of destination  Without specific perform   ance degradation  maximum 4096 MAC addresses can be registered     Default Policy of MAC Filtering    The basic policy of filtering
358. os e guera IP source  Destos e guera       EE PORTS    Note that the IP source guard is only enabled on DHCP snooping untrusted Layer 2 port   If you try to enable this function on a trusted port  the error message will be shown up     You cannot configure IP source guard with the ip dhcp verify source and ip dhcp verify  source port security commands together     Static IP Source Binding    The IP source binding table has bindings that are learned by DHCP snooping or manually  specified with the ip dhcp verify source binding command  The switch uses the IP  source binding table only when IP source guard is enabled     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    To specify a static IP source binding entry  use the following command      e me See    Specifies a static IP source binding entry   1 4094  VLAN ID   A B C D  IP address   MAC ADDR  MAC address    no ip dhcp verify source binding ae aioe  Deletes a specified static IP source binding    A B C D   all     8 6 8 3 Displaying IP Source Guard Configuration    ip dhcp verify source binding   lt 1 4094 gt  PORT A B C D MAC     ADDR Global       To display IP source binding table  use the SEE command        show ip dhcp verify source Enable  ee Shows IP source binding entries   binding Global    SMC7824M VSW 333    CLI    334    8 6 9    8 6 9 1    8 6 9 2    8 6 9 3    8 6 9 4    Management Guide  TigerAccess    EE    DHCP Client    An interface of the switch can be configured as a DHCP client  which can obta
359. ost        2 3    CLI    274    8 3 7 3    8 3 7 4    EN    Management Guide  TigerAccess    EE    Port Priority    When all conditions of two routes of switch are same  the last standard to decide a route  is port priority  You can configure port priority and select a route manually     To configure a port priority for MSTP instance  use the following command      e e Se    Configures the port priority of MSTP instance     spanning tree mst  lt 0 64 gt  port 0 64  MSTP instance ID number  PORTS port priority  lt 0 240 gt  PORTS  port number  0 240  port priority in increments of 16  default 128     no spanning tree mst  lt 0 64 gt  Acs  hone Deletes a configured port priority of MSTP instance   port PORTS port priority    MST Region       To set the configuration ID of MST region in detail  you need to open MSTP Configuration  mode first  To open MSTP Configuration mode  use the following command      ron ra pon  spanning tree mst configuation Opens MSTP Configuration mode     After opening MSTP Configuration mode  the prompt changes from SWITCH bridge   to  SWITCH  config mst          To delete all configations from MSTP Configuration mode  use the following command     nn e netos    no spanning tree mst Deletes all configurations on MSTP Configuration  Bridge  configuation mode  returns to the default values     If MSTP is established in the switch  decide a MSTP region the switch is going to belong  to by configuring the MST configuration ID  Configuration ID contains a r
360. ot be done  Therefore   SNT must not be minus or    0     And  if there is this situation  you have to increase signal  strength or decrease noise strength     Transmit rate of VDSL line depends of SNR  But  environment of line cannot be always  same  So you need to configure transmit rate of VDSL line can be decided according to  changing line environment  If noise is suddenly increased  SNR is decreased and com   munication becomes unstable     Therefore you should configure transmit rate for decreased SNR when noise is suddenly  increased  Then there will not be problem with communication although noise is suddenly  increased     LA    SNR   24 24 6 18 Transmit Rate    SNR Margin   6      Applied to  Transmit Rate B       Fig  5 3 Deciding Transmit Rate according to SNR Margin    When you configure estimate SNR  the difference between estimate SNR and current  SNR is call  SNR Margin    The switch applies the SNR margin to transmit rate In other  word  if you configure SNR margin as    6     the difference that subtracts 6 from current  SNR will be applied to transmit rate as the above picture    In you think there will be big change of noise  configure big SNR margin  However  if you  configure too big SNR margin  transmit rate will be slow down  whereas communication is  stable     To configure SNR margin  use the following command      e e res    Ire PORTS snr target margin  lt 0  Configures SNR margin of Downstream or Upstream   31 gt   up   down  0 31  SNR margin valu
361. ot displayed on each output line    Display more information    Reduce output quantity of protocol information  Therefore  output line is shorter        Tab  7 3 Options for Packet Dump    227    CLI Management Guide  TigerAccess    EE    F FILE Receive file as filter expression  All additional expressions on command line are ig   nored     Designate the interface where the intended packets are transmitted  If not designated      i INTERFACE it automatically select a interface which has the lowest number within the system    interfaces  Loopback is excepted      r FILE Read packets from the file which created by     w    option     This is used to configure sample packet except the 68 byte default value  The 68 byte   is appropriate value for IP  ICMP  TCP and UDP  but it can truncate protocol informa    tion of Name server or NFS packets  If sample size is long  the system should take   S SNAPLEN l l l   more time to inspect and packets can be dropped for small buffer size  On the con    trary  if the sample size is small  information can be leaked as the amount  Therefore     user should adjust the size as header size of protocol     Display the selected packets by conditional expression as the intended type   rpc  Remote Procedure Call    rtp  Real time Transport Protocol    rtcp  Real time Transport Control Protocol    vat  Visual Audio Tool    wb  distributed White Board     EXPRESSION Conditional expression       Tab  7 3 Options for Packet Dump  Cont      7 15 3 Debug 
362. ou should configure it with the authentication key  To create delete an  SNMP version 3 user  use the following command     snmp user USER  md5   sha   Creates an SNMP version 3 user   AUTH_KEY  des PRIVATE _ KEY  Global    no   no shmp user USER user   no shmp user USER   Deletes a registered SNMP version 3 user    a   Deletes a registered SNMP version 3 user    SNMP version 3 user        To display a current SNMP version 3 user  use the following command      e e een    Enable    Global Displays an SNMP version 3 user     Bridge       SNMP Trap    SNMP trap is an alert message that SNMP agent notifies SNMP manager about certain  problems  If you configure the SNMP trap  the system transmits pertinent information to  network management program  In this case  trap message receivers are called a trap  host     SNMP Trap Mode    To select the SNMP trap mode  use the following command      e e een    Selects the SNMP trap mode     snmp trap mode  falarm report  j S      Global alarm report  alarm report based trap    event        event  event based trap  default     e    event    trap mode is set by default  It generates event based traps   e    alarm report    trap mode generates alarm report based traps     If you manage the system via the ACI E  you should set the SNMP trap mode to the  alarm report     139    CLI    140    7 1 8 2     s    7 1 8 3    Management Guide  TigerAccess    EE    SNMP Trap Host    To set an SNMP trap host  use the following command     ma Tae on  sn
363. ould delete an existing  RMON alarm     To delete RMON alarm  use the Ee command     A RMON history of specified number  enter the  no rmon alarm  lt 1 65535 gt  Global  value for deleting     RMON Event       RMON event identifies all operations such as RMON alarm in the switch  You can config   ure event or trap message to be sent to SNMP management server when sending RMON  alarm     You need to open RMON Event Configuration mode to configure RMON event      e me See    Opens RMON Event Configuration mode   rmon event  lt 1 65535 gt  Global  1 65535  index number    Event Community       When RMON event is happened  you need to input community to transmit SNMP trap  message to host  Community means a password to give message transmission right     To configure community for trap message transmission  use the following command      e e Se    Configures password for trap message transmission  community NAME right        NAME  community name    Event Description    It is possible to describe event briefly when event is happened  However  the description  will not be automatically made  Thus administrator should make the description     To specify a description about the current RMON event  use the following command      e e en       description DESCRIPTION RMON Specifies the description of the current RMON event     161    CLI    162    7 4 3 3    7 4 3 4    7 4 3 5    7 4 3 6    Management Guide  TigerAccess    EE    Subject of RMON Event    You need to configure event and i
364. own identity     To set the basic information of the SNMP agent  use the following command      e e Se    snmp contact NAME Sets the name of the administrator     snmp location LOCATION Sets the location of the SNMP agent     snmp agent address A DCD Sets an IP address of the SNMP agent   Global    no snmp contact  no snmp location Deletes the specified basic information for each item     no snmp agent address       The following is an example of specifying basic information of SNMP agent     SWITCH  config   snmp contact Brad  SWITCH  config    snmp location Germany  SWITCH  config       To display the basic information of the SNMP agent  use the following command     ren fede Tome  show snmp contact Enable Shows the name of the administrator     show snmp location Global Shows the location of the SNMP agent   show snmp agent address Bridge Shows the IP address of the SNMP agent        SMC7824M VSW    Management Guide  TigerAccess    EE    7 1 3    7 1 4    SMC7824M VSW    CLI    SNMP Com2sec    SNMP v2 authorizes the host to access the agent according to the identity of the host and  community name  The com2sec command specifies the mapping from the identity of the  host and community name to security name     To configure an SNMP security name  use the following command      e  e ees    Specifies the mapping from the identity of the host and    snmp com2sec SECURITY community name to security name  enter security and   A B C D   A B C D M  COMMU  community name   NITY SECU
365. pecified interface   Configures MVR   Configures NTP   Sets a system password   Configures QoS   Opens RMON Configuration mode to configure RMON alarm   Configures SNMP     emi Coes  CO ETT  COC ENT    Tab  3 3 Main Command of Global Configuration Mode    Bridge Configuration Mode    In Bridge Configuration mode  you can configure various Layer 2 functions such as VLAN   STP  LACP  EFM OAM  etc     To open Bridge Configuration mode  enter the bridge command  then the system prompt  will be changed from SWITCH  config   to SWITCH bridge         e e een    bridge Global Opens Bridge Configuration mode        217    CLI    28    Management Guide  TigerAccess    EE    Tab  3 4 shows main commands of Bridge Configuration mode     SECHER  me L  meneneen  e L  nsen    CO ECN  CO ET  Configures Spanning Tree Protocol  STP     em eres apo  CI    Tab  3 4 Main Command of Bridge Configuration Mode       DHCP Pool Configuration Mode    In DHCP Pool Configuration mode  you can configure general functions of DHCP per  each DHCP pool  The switch supports multiple DHCP environments with this pool based  DHCP configuration     To open DHCP Pool Configuration mode  enter the ip dhcp pool command  then the sys   tem prompt will be changed from SWITCH config   to SWITCH config dhcp POOL         e e en      Opens DHCP Pool Configuration mode to configure  ip dhcp pool POOL Global DHCP    To open DHCP Pool Configuration mode  use the service dhcp command in the Global  Configuration mode first    
366. policy counter  a collected   Shows a collected policy counter  counter        Average Packet Counter    After this switch is running on octet counter mode using counter octet command  you  can collect and analyze the statistics of packets measured in bits per second     To enable disable the system to display the statistics of packets measured during current  5 seconds  1 minute and 10 minutes in bits per second  use the following command     SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 3 4    SMC7824M VSW    CLI    n   See    Enables the system to display the statistics of packets  average packet counter octet  measured in bps   Policer    Disables the system to display the statistics of packets  no average o average mengen o average mengen       measured in bps     To display average packet counter configuration on policy  use the following command      e me See    Shows the name of policies that are enabled average  show policy average packet    RANGE    packet counter function  RANGE  index of average packet counter  1 50     Enable Shows specified policy that is enabled average packet   show policy average packet    name NAME    Global counter function    NAME  policy name  Shows the names of all policies that are enabled aver   show policy average packet  age packet counter function    Rate limit       You can configure the rate limit in kbps unit for the classified packets and control the  bandwidth  To set the bandwidth of classified packets in specifie
367. port  is assured the full bandwidth of the port     Port Security on Port    Step 1  Enable port security on the port      e e See       port security PORTS Enables port security on the port     Step 2  Set the maximum number of secure MAC addresses for the port     na e en    port security PORTS maximum Brid Sets the maximum number of secure MAC addresses  ridge   lt 1 16384 gt  S for the port   default  1     Step 3  Set the violation mode and the action to be taken     na m   en          port security PORTS violation Brid Selects a violation mode   ridge   shutdown   protect   restrict   gt   default  shutdown     When configuring port security  note that the following information about port security vio    lation modes    e protect drops packets with unknown source addresses until you remove a sufficient  number of secure MAC addresses to drop below the maximum value    e restrict drops packets with unknown source addresses until you remove a sufficient  number of secure MAC addresses to drop below the maximum value and causes the  Security Violation counter to increment    e shutdown puts the interface into the error disabled state immediately and sends an  SNMP trap notification     207    CLI    208    7 9 2    Management Guide  TigerAccess    EE    Step 4  Enter a secure MAC address for the port      e e re       port security PORTS mac   Bridge Sets a secure MAC address for the port   address MAC ADDR vlan NAME    To disable the configuration of port secure  use the 
368. privilege enable level 1 configure terminal                           Command Privilege Level Configuration    Node All Level Command   EXEC  ENABLE  1 configure terminal  EXEC  VIEW  0 enable   EXEC  ENABLE  0 show    3 entry s  found     SWITCH  config       In the above configuration  as level O  it is possible to use only show command in Privi   leged EXEC Enable mode  however as level 1  it is possible to use not only the com   mands in level 1 but also time configuration commands in Privileged EXEC Enable mode  and accessing commands to Global Configuration mode     Limiting Number of Users    For the switch  you can limit the number of users accessing the switch through both con   sole interface and telnet  In case of using the system authentication with RADIUS or TA   CACS   a configured number includes the number of users accessing the switch via the  authentication server     43    CLI    44    4 1 8    4 1 9    Management Guide  TigerAccess    EE    To set the number of users accessing the switch  use the following command      e me ees       Sets the number of users accessing the switch   login connect  lt 1 8 gt   Global Default  8    no   no login connect   no login connect   Deletes a configured value   i a   Deletes a configured value   i value     Auto Log out    For security reasons of the switch  if no command is entered within the configured inactiv   ity time  the user is automatically logged out of the system  Administrator can configure  the inactivity 
369. profile  In  this event  a meter might be used to trigger real time traffic conditioning actions  e g   marking  policing  or shaping      Typical parameters of a traffic profile are     e Committed Information Rate  CIR   e Peak Information Rate  PIR    e Committed Burst Size  CBS    e Excess Burst Size  EBS    e Peak Burst Size  PBS     179    CLI    180    Management Guide  TigerAccess    EE    A typical meter measures the rate at which traffic stream passes it  Its rate estimation de   pends upon the flow state kept by the meter  There is a time constraint during which if the  flow state is transferred from the old switch to the new switch  then it is effective in esti   mating the rate at the new switch as if though no transfer of flow has happened     The switch provides Token Bucket  srT CM and trTCM  meters     Token Bucket    The token bucket is a control mechanism that transmits traffic by tokens in the bucket   The tokens are consumed by transmitting traffic and regenerated at the given rate  If all  tokens in the bucket are consumed out  traffic cannot be transmitted any more  a flow can  transmit traffic up to its peak burst rate  The transmitting cost and regenerating rate of to   kens are configurable     Tokens are regenerated  at a given rate  CIR  PIR     CBS  EBS Token  PBS    Packet consumes  tokens in the bucket JL Forwarding  GE  ES Dee    Fig  7 3 Token Bucket Meter    Single Rate Three Color Marker  srTCM     The srTCM meters an IP packet stream and ma
370. r admin    Password    230 User admin logged in    ftp gt  bin   200 Type set to I    ftp gt  hash   Hash mark printing On ftp   2048 bytes hash mark    ftp gt  put V5924C R 5 01 x esl   200 PORT command successful    150 Opening BINARY mode data connection for osl    HHH EH HE HHH HH EE HE HE HH EE EEE EH EE EEE HH EEE EE HEE HE HH EE EEE HH EE EE EH HEE EE EH EEE EEE EE HE  tH tH HE EH HH EE HE EE HH EE EE EH EE EE HH EE EEE EH EE EE HH EE EE HEE EEE HH EE EE EH EEE EEE EE HE  tH TH HE HH HH EE EE HH EE EEE EH EE EEE HH EE EEE HH EE EE HH EE EEE HH EE EE HH OEE EEE EH EEE EEE EE HE  Ht H EH HE THE EH EE EEE HH EE EEE EH EE EEE HH EE EE EH EE EE HH EE EEE HH EE EE EH HEE EE EH EEE EEE EEE  tH tH HE HH HEH EE HE HEE HH EE EEE EH EE EE HH EE EEE HH EE EE HH EE EEE HH EE EE HH EE EE EH EE EE EE EE HE  HHH TEE HEE HH EH HEH HEE HOE HOE HOE dd dd EE E E HE HE E E E E E E E E dd dd EE dt d     Omitted     tH tH HE HH HH EE HE HH EE EE EH EE EEE HH EE EEE EH EE HE HH EE EEE HH EE EE HH EE EEE HH EEE EEE EEE  tH TH HE EE HH EE HE HE HH EE EEE HEE EEE HH EE EEE EH EE EE HH EE EEE HH EE EE HH EE EEE EH EEE EEE EEE  tH tH HE HH HH EE HE HH EE EE EH EE EEE HH EE EEE EH EE EEE HH EE EE HH EE EE EH HEE EEE EH EEE EEE EEE  tH EH HEE HEE HH EE HE EE HH EE EEE HH EE EEE HH EE HE HH EE EE HH EE EEE HH EE EEE HH OEE EEE EE EEE EEE EEE  tt H EH HE HEH HH EE HE EE HH EE EE EH EE EEE HH EE EE EH EE EE HH EE EEE HH EE EEE HH EE EEE HE EEE EEE EEE  Hit it it Ht tt eH tt HO HH ooo EE HE EE a a a Eee
371. rator of the switch can configure a term of re authentication     To configure a term of re authentication  use the following command   man Te  ares    dot1x timeout reauth period  lt 1   Sets the period between re authentication attempts   4294967295 gt  PORTS  Global    no dot1x timeout reauth      e    EEN the EEN between re authentication attempts       e       Interval of Requesting Re Authentication    When the authenticator sends request identity packet for re authentication and no re   sponse is received from the suppliant for the number of seconds  the authenticator re   transmits the request to the suppliant  In the switch  you can set the number of seconds  that the authenticator should wait for a response to request identity packet from the sup   pliant before retransmitting the request     To set reattempt interval for requesting request identity packet  use the following com   mand      e e Se    i i i Sets reattempt interval for requesting request identity  dot1x timeout quiet period  lt 1     packet   65535 gt  PORTS    Global 1 65535  reattempt interval  default  30     no dotix timeout quiet period  Disables the interval for requesting identity   PORTS    802 1x Re Authentication       In Section 4 5 2 2  it is described even though the user is accessible to network  he  should be authenticated so that the changed database is applied to  Besides  because of  various reasons managing RADIUS server and 802 1x authentication port  the user is  supposed to be re
372. ratuitous ARP is a broadcast packet like an ARP request  It containing IP address and  MAC address of gateway  and the network is accessible even though IP addresses of  specific host s gateway are repeatedly assigned to the other     Configure Gratuitous ARP interval and transmission count using following commands   And configure transmission delivery start in order to transmit Gratuitous ARP after ARP    reply     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Gratuitous ARP is transmitted after some time from transmitting ARP reply      e me See    Configures a gratuitous ARP     arp patrol TIME COUNT  TIME  TIME  transmit interval  Se COUNT  transmit count    no arp patrol Disables a gratuitous ARP        The following is an example of configuring the transmission interval as 10 sec and trans   mission times as 4 and showing it     SWITCH  config    arp patrol 10 4  SWITCH  config    show running config  Building configuration      Current configuration     hostname SWITCH   Omitted     arp patrol 10 4       no snmp       SWITCH  config       221    CLI    222    7 12 5       Management Guide  TigerAccess    EE    Proxy ARP    The switch supports Proxy Address Resolution Protocol  Proxy ARP is the technique in  which one host  usually a router  answers ARP requests intended for another machine  By     faking    its identity  the router accepts responsibility for routing packets to the    real    desti   nation  Proxy ARP can help the switche
373. rd Profile Tone disable Option  ADM OPR mode Band   1 Up Down VDSL2 17A NORMAL ANNEX A   2 Up Down VDSL2 17A NORMAL ANNEX A   3 Up Down VDSL2 17A NORMAL ANNEX A   4 Up Down VDSL2 17A NORMAL ANNEX A   5 Up Down VDSL2 17A NORMAL ANNEX A                         5 3 2 4 Controlling Power according to Connection Distance    The distance of connection from switch to VDSL line may vary according to each VDSL  port  If same power is supplied to different connection distance  the power is larger than  power supplied to line connected to CPE far from switch  It may cause interruption in the  line connected to CPE far from the switch  You can control supplied power according to  distance to prevent too large power supplied to VDSL line     SMC7824M VSW 79    CLI Management Guide  TigerAccess    EE    To control supplied power according to VDSL line  use the following command      e e rees       Controls supplied power according to distance of VDSL  Ire PORTS upbo enable Bridge i  ine     i   You should control supplied power of VDSL port according to distance of VDSL line     To disable power control according to distance of VDSL line  use the following command   O em EC O o        Disables power control according to distance of VDSL  Ire PORTS upbo disable Bridge i  ine     The following is an example of disabling power control according to distance of VDSL line        SWITCH  bridge   lre 1 3 upbo disable  SWITCH  bridge   show lre psd 1 5    Port Status Up Stream PBO Length PSD MASK 
374. re    mac flood guard PORTS    Description    Limits the number of packets which can be transmitted   lt 1 6000 gt     no mac flood guard  PORTS     to the port for 1 second     Disables a configured flood guard     To display a configuration of flood guard  use the following command     mana To  on  show mac flood guard Enable Shows a configured flood guard     Global  show mac flood guard macs  Bridge    Bridge          Shows a blocked MAC address     343    CLI Management Guide  TigerAccess    EE    8 9 2 CPU Flood Guard    To specify the number of broadcast packets which are transmitted in CPU  use the follow   ing command     Command   Mode   Description  cpu flood guard PORTS Limits the number of broadcast packets which are     lt 1 6000 gt  Bridge transmitted to CPU for 1 second    no cpu flood guard  PORTS  Disables a configured cpu flood guard       To set the timer of limiting packet numbers that are incoming to CPU  use the following  command      e e See    Sets the time for protecting from incoming broadcast  cpu flood guard PORTS timer     lt 10 3600 gt     packets     10 3600  time value  default  60 seconds        To allow a specified port to be received the broadcast packet flooding manually  use the  following command      e e een      Limits the number of packets which can be transmitted  cpu flood guard PORTS unblock Bridge  to the port for 1 second     To enable or disable CPU flood guard function  use the following command     SCC  cpu flood guard enable
375. re connected to one DHCP relay agent  if the  relay agent is supposed to broadcast the DHCP_DISCOVER message sent from a DHCP  client to all connected DHCP servers  and then the servers will return DHCP_OFFER    SMC7824M VSW    Management Guide  TigerAccess    EE    8 6 4 4    SMC7824M VSW    CLI    message  The relay agent  however  will forward only one DHCP_OFFER message of the  responses from the servers to the DHCP client  The DHCP client will try to respond to the  server which sent the DHCP_OFFER with DHCP_REQUEST message  but the relay  agent broadcasts it to all the DHCP servers again     To prevent the unnecessary broadcast like this  you can configure a DHCP relay agent to  aware the server ID  This will allow the DHCP relay agent to forward DHCP_REQUEST  message to only one DHCP server with the unicast form under the multiple server envi   ronment     To enable disable a DHCP relay agent to recognize the DHCP server ID option in the for   warded DHCP_REQUEST message  use the     command     no ip dhcp   no ip dhcp relay aware server id_  aware server    no ip dhcp relay aware server id_  Disables the   Disables the DHCP server ID recognition option    server ID   Disables the DHCP server ID recognition option    option        Enables the system to recognize the a A server ID  ip dhcp relay aware server id  Global in the DHCP_REQUEST message     DHCP Relay Statistics    To display DHCP relay statistics  use the following command      ess e Se    show ip dhcp relay 
376. resses in a single DHCP pool   e g  100 1 1 1 to 100 1 1 62 and 100 1 1 129 to 100 1 1 190     When specifying a range of IP address  the start IP address must be prior to the end IP        address     8 6 1 4 Default Gateway    To specify a default gateway of the DHCP pool  use the following command   mana    on    default router 4 B C D1 Specifies a default gateway of the DHCP pool    A B C D2       4 B C D8  A B C D  default gateway IP address  DHCP Pool    no default router 4 B C D1   A B C D2       4 B C D8     no default router all    The following is an example of specifying the default gateway 100 1 1 254     Deletes a  Ones a peca efe    Ones a peca efe   gateway     Deletes all the   Deletes all the specified default gateways      Deletes all the specified default gateways    gateways        SWITCH  config    service dhcp   SWITCH  config    ip dhcp pool sample   SWITCH  config dhcp sample    network 100 1 1 0 24  SWITCH  config dhcp sample    default router 100 1 1 254  SWITCH  config dhcp sample                  8 6 1 5 IP Lease Time    Basically  the DHCP server leases an IP address in the DHCP pool to DHCP clients   which will be automatically returned to the DHCP pool when it is no longer in use or ex   pired by IP lease time     To specify IP lease time  use the following command     nan   eos    Sets default IP lease time in the unit of  second   default  3600     lease time default  lt 120 2147483637 gt     DHCP Pool   Sets maximum IP lease time in the unit 
377. revent that hackers can find impossible connections     To configure not to send the message that informs TCP connection cannot be done  use  the following command      e e Se    Configures to block the message that informs TCP    ip tcp ignore rst unknown l  Global connection cannot be done        no ip tcp ignore rst unknown Disables the unknown RST ignoring     SYN Configuration    SYN sets up TCP connection  The switch transmits cookies with SYN to a person who  tries to make TCP connection  And only when transmitted cookies are returned  it is pos   sible to permit TCP connection  This function prevents connection overcrowding because  of accessed users who are not using and helps the other users use service     To permit connection only when transmitted cookies are returned after sending cookies  with SYN  use the following command      e e See    Permits only when transmitted cookies are returned    Disables configuration to permit only when transmitted    no ip tcp syncookies       ip tcp syncookies l l l  after sending cookies with SYN   ern      cookies are returned after sending cookies with SYN     Packet Dump    Failures in network can be occurred by certain symptom  Each symptom can be traced to  one or more problems by using specific troubleshooting tools  The switch switch provides  the debug command to dump packet  Use debug commands only for problem isolation   Do not use it to monitor normal network operation  The debug commands produce a large  amount of p
378. riod  Disables the interval for requesting identity   PORTS    Number of Requests to RADIUS Server    65535 gt  PORTS       After 802 1x authentication configured as explained above and the user tries to connect  with the port  the process of authentication is progressed among user   s PC and the  equipment as authenticator and RADIUS server  It is possible to configure how many  times the device which will be authenticator requests for authentication to RADIUS server     61    CLI    62    4 5 1 8    4 5 2    4 5 2 1    Management Guide  TigerAccess    EE    To configure times of authentication request in the switch  please use the command in  Global mode      e e Se    Configure times of authentication request to RADIUS    dot1x radius server retries  lt 1   10 gt     Global server        1 10  retry number  default  3     Interval of Request to RADIUS Server    For the switch  it is possible to set the time for the retransmission of packets to check  RADIUS server  If there   s a response from other packets  the switch waits for a response  from RADIUS server during the configured time before resending the request      e e re    dot1x radius server timeout  lt 1  Global Configures the interval of request to RADIUS server   O  120 gt  1 120  interval  default  1        You should consider the distance from the server for configuring the interval of requesting  the authentication to RADIUS server  If you configure the interval too short  the authenti   cation couldn t be rea
379. rks its packet the one among green  yel   low  and red using Committed Information Rate  CIR  and two associated burst sizes   Committed Burst Size  CBS  and Excess Burst Size  EBS   A packet is marked green if it  does not exceed the CBS  yellow if it exceeds the CBS  but not the EBS  and red other   wise  The srTCM is useful for ingress policing of a service  where only the length  not the  peak rate  of the burst determines service eligibility     CIR is the regenerating rate of tokens measured in bytes of IP packets per second  CBS  and EBS are the maximum size for each token bucket  C and E  measured in bytes  Both  token buckets share the common rate CIR  At least one of them  CBS and EBS  must be  configured  and it is recommended that the value is larger than or equal to the size of the  largest possible IP packet in the stream     The token buckets C and E are initially full  When a packet arrives  the tokens in the  bucket C are decremented by the size of that packet with the green color marking  If no    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    more tokens to transmit a packet remain in the bucket C  then the tokens in the bucket E  are decremented by the size of that packet with the yellow color marking  If both buckets  are empty  a packet is marked red     The following figures show the behavior of the srTCM        Tokens are regenerated Tokens are regenerated  based on CIR based on CIR  CA Mama C Bucket E CON  E E SE St  Tok
380. rned on  max new hosts system VALUE the system for a second   VALUE  maximum MAC number  lt 1 2147483646 gt        To delete configured max new hosts  use the   command     A A the number of MAC addresses that can be  no max new hosts  PORTS    rene  Se  earned on the po  Bridge    EE the number of MAC addresses that can be  no max new  amarres atom amarres atom  learned on the EE       To display configured max new hosts  use the following command      e mae    Enable    show max new hosts Global Shows the configured Max new hosts     Bridge       SMC7824M VSW    Management Guide  TigerAccess    EE    7 9    7 9 1    SMC7824M VSW    CLI    If MAC that already counted disappears before passing 1 second and starts learning  again  it is not counted  In case the same MAC is detected on the other port also  it is not  counted again  For example  if MAC that was learned on port 1 is detected on port 2  it is  supposed that MAC moved to the port 2  So  it is deleted from the port 1 and learned on  the port 2 but it is not counted     Port Security    You can use the port security feature to restrict input to an interface by limiting and identi   fying MAC addresses of the PCs that are allowed to access the port  When you assign  secure MAC addresses to a secure port  the port does not forward packets with source  addresses outside the group of defined addresses  If you limit the number of secure MAC  addresses to one and assign a single secure MAC address  the PC attached to that 
381. rnet network     It is a unique robustness functionality  which runs on every network element involved in  the ring configurations  It means that each system is active part of the ring protection  mechanism  Therefore  it guarantees to switch over towards a new topology after link or  system failure within 50 milliseconds     ERP Mechanism    The purpose of Ethernet Ring Protection  ERP  is to prevent the Loop by performing the  Redundancy Manager Node  RM Node  to detect a link failure and recover from it  An  Ethernet ring consists of one or more ERP domains  ERP domain is an identifier of a sin   gle ring topology to be controlled by ERP mechanism  A node is one of the switches on  the ERP ring  Each switch is configured as either RM node or normal node  RM node is  responsible for keeping an open loop whenever all nodes and links are operating correctly   One ERP domain should have one RM node  Normal nodes are responsible to inform RM  node of Link failures recovery     Both RM node and normal node have a primary and secondary port  You need to specify  primary and secondary port which is directly connected to the node within an Ethernet  ring  A secondary port of RM node is blocked as unused link for traffic while it runs without  the link failure detection     ERP Operation    If a link failure occurs  the normal nodes adjacent to the failure block their ports that de   tecting the link failure and send Link Down message to RM node  After RM node receives  Link Down me
382. rnet port of CPE  use the                       command        EE full duplex or half duplex mode on Ethernet port of  cpe duplex PORTS  full   half  Bridge    107    CLI Management Guide  TigerAccess    EE    5 3 5 9 Auto Upgrade of CPE Image    To upgrade the CPE image automatically  use the following command      ee ee    Enables the auto upgrading of CPE image for specific    cpe auto upgrade enable  h310      target model   h320   h330   h335  VERSION Bridge    VERSION  source cpe version  ex  0 0 0r0     cpe auto upgrade disable Disables the auto upgrading of CPE image     5 3 5 10 Displaying CPE Status       You can check state of CPE connected to VDSL port  To display status of CPE  use the  following command      Sen os  show cpe  PORTS  Shows state of CPE  show cpe ethernet  PORTS  Show the configurations of CPE Ethernet ports     Enable  show cpe info  PORTS  Siobal Shows detailed H W information of CPE  oba  show cpe version  PORTS  Bridge Shows the version and active software image of CPE     show cpe auto upgrade    Shows the status of auto upgrading of CPE    PORTS        The following is an example of checking state of CPE connected to port 1 5     SWITCH  config   show cpe 1 5    No NOS Version NOS Ethernet Status  Download Link Speed Duplex Loopback Agc                                           1 1 0 3r29IK105012 Yes 21  Down 10 Half Disable agc off 1  2 1 0 3r29IK105012 Yes 21  Down 10 Half Disable age ott   3 1 0 3r29IK105012 Yes 21  Down 10 Half Disable a
383. rocessor overhead     SMC7824M VSW    Management Guide  TigerAccess    EE    7 15 1    7 15 2    SMC7824M VSW    CLI    Packet Dump by Protocol    You can see packets about BOOTPS  DHCP  ARP and ICMP using the following com   mand      se ee    debug packet  interface INTERFACE   port  PORTS  protocol  bootps   dhcp   arp   icmp  Shows packet dump by protocol    src ip A B C D   dest ip A B C D     debug packet  interface  NTERFACE   port  PORTS  host  src ip A B C D   dest ip A B C D  Shows host packet dump      src port  lt 1 65535 gt    dest port  lt 1 65535 gt     debug packet  interface  NTERFACE   port   PORTS  host  src port  lt 1 65535 gt    dest port Shows host packet dump    lt 1 65535 gt     debug packet  interface INTERFACE   port    PORTS  multicast  src ip A B C D   dest ip Shows multicast packet dump   A B C D     Enable       Packet Dump with Option    You can verify packets with tcpdump options using the following command     Some re re  debug packet OPTION Shows packet dump using options        Tab  7 3 shows the options for packet dump     Buffer output data in line  This is useful when other application tries to receive data  from tcpdump     em Do not translate all address  e g  port  host address   NO   When output host name  do not print domain     Do not run packet matching code optimizer  This option is used to find bug in opti     mizer    Interface is not remained in promiscuous mode    Output TCP sequence number not relative but absolute  Time is n
384. rofile TEST  down slow max datarate 8000  up slow max datarate 10000  SWITCH  bridge line config profile TEST  down target snr mgn 40    SWITCH  bridge line config profile TEST  up target snr mgn 40                      Se Ho SHE HEHE SH SHR                      SWITCH  bridge line config profile TEST     SNR margin should be configured with the form of NdBm N integer   Therefore you have  to input multiple numbers of 4 to form NdBm     H    96 SMC7824M VSW    Management Guide  TigerAccess    EE      A    SMC7824M VSW    CLI    To display the configuration  use the following command      e e ee       show Ire  line config profile e Shows the configuration of all line config  Enable Global Bridge   PORTS  profiles     To enable configuration of this line config profile  use the following command     na e ees    no active       active Enables the profile   Line config    Disables this profile    Unless you enable configured profiles  they will not be applied although you apply them to  ports     After you configure and enable profile  if you change the configuration  then it will be  automatically disabled  Therefore you have to enable it with    active    whenever you  change configurations     The following is an example of saving Profile after going back to Global configuration  mode or Enable mode     SWITCH  config   write memory  Building configuration       OK   SWITCH  config          Besides  when switch has been stacking  Line config profile configured in Master will 
385. rotocol Based   VLAN operates only matched situation comparing below two cases    1  When Untagged Frame comes in and matches with Protocol VLAN Table  tags PVID  which configured on Protocol VLAN  But in no matched situation  tags PVID which  configured on and operates VLAN    2  When Tagged Frame comes in and VID is 0  it switches by Protocol VLAN Table  But  if VID is not O  it switches by normal VLAN Table     MAC based VLAN    The switch can assign a frame to a VLAN based on the source MAC address in the re   ceived frames  Using this  all frames emitted by a given end station will be assigned to  the same VLAN  regardless of the port on which the frame arrives  This is useful for mo   bility application     To configure a MAC based VLAN  follow these steps     1  Create VLAN groups for the MAC addresses you want to use   2  Map the MAC address to the appropriate VLAN      e a See    Adds a specified MAC address to a MAC based VLAN   MAC ADDR  MAC address of end station  Bridge VLANS  VLAN ID  1 4094     Deletes a specified MAC address from a specified  no vlan macbase MAC ADDR  MAC address    237    vlan macbase MAC ADDR    VLANS       CLI    238    8 1 4    8 1 5    Management Guide  TigerAccess    EE    Subnet based VLAN    An IP address contains two parts  a subnet identifier and a station identifier  The switch   performs two operations to create IP subnet based VLANs    e Parse the protocol type to determine if the frame encapsulates an IP datagram    e Examine and
386. rt as Edge port   edgeport enable       285    CLI    286    Management Guide  TigerAccess    EE    Step 2  Enable BPDU guard function on edge port or specific port  use the following command      e e re    spanning tree edgeport  Enables BPDU Guard function on edge ports  bpduguard default  Bridge       spanning tree port PORTS a  Enables BPDU Guard function on specified port  bpduguard enable    To disable BPDU guard function on edge port or specific port  use the following command   ee an    no spanning tree edgeport  Disables BPDU Guard function of edge ports  default   bpduguard default    spanning tree port PORTS Brid   ridge  bpduguard disable Disables BPDU Guard function of specified port   de   no spanning tree port PORTS fault     bpduguard       However  BPDU Guard can be corrupted by unexpected cause  In this case  the edge  port is blocked immediately and remains at this state until user recovers it  To prevent this  problem  the switch provides error disable recovery function for BPDU guard cause   When an edge port is down for BPDU packet which came from other switch  the port is  recovered automatically after configured time     To enable the recovery function for BPDU guard error disable cause  use the following  command      e e Se    errdisable recovery cause Enables the recovery function for BPDU guard error   bpduguard disable cause    Bridge  no errdisable recovery cause Disables the recovery function for BPDU guard error   bpduguard disable cause    To 
387. rt or the other subscriber s port and  DHCP reply which enters to the subscriber s port     In the Fig  8 37  server A has the IP area from 192 168 10 1 to 192 168 10 10  Suppose a  user connects with client 3 that can be DHCP server to A in order to share IP address  from 10 1 1 1 to 10 1 1 10     Here  if client 1 and client 2 are not blocked from client 3 of DHCP server  client 1 and cli   ent 2 will request and receive IP from client 3 so that communication blockage will be oc   curred  Therefore  the filtering function should be configured between client 1 and client 3   client 2 and client 3 in order to make client 1 and client 2 receive ID without difficulty from  DHCP server A     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    DHCP Server A    192 168 10 1 192 1  68 10 10 IP assigned  Client 3 i  Request Fom The equipment that can    Client 1 2 is be a DHCP server  transmitted to  Client 3    IP assigned by  Client 3 not by  DHCP sever A    To prevent IP assignment  from Client 3  DHCP filtering   is needed for the port                                               10 1 1 1    10 1 1 10  IP assigned                          Client 1 Client 2    Fig  8 37 DHCP Server Packet Filtering    To enable the DHCP server packet filtering  use the following command      e me O    dhcp server filter PORTS Enables the DHCP server packet filtering   Bridge  no   no dhep server filter PORTS     no dhcp server filter PORTS   Disables the DHCP server packet filtering      
388. rt priority so that user can configure route manu   ally  To configure the port priority  use the following command      e e Se    Configures port priority     spanning tree port PORTS port   PORTS  port number    priority  lt 0 240 gt     Bridge 0 240  port priority in increments of 16  default  128     no spanning tree port PORTS SC  S   Deleted a configured port priority   port priority       2 1    CLI Management Guide  TigerAccess    EE    8 3 6 5 Link Type    A port that operates in full duplex is assumed to be point to point link type  while a half   duplex is considered as a shared port       To configure the link type of port  use the following command     a Y mn    Specifies a link type for a designated port    spanning tree port PORTS link  PORTS  port number  type  point to point   shared  point to point  full duplex  shared  half duplex       To delete a configured link type of port  use the following command     INC E O  no spanning tree port PORTS link type   Deletes a configured link type    a   Deletes a configured link type    link type     8 3 6 6 Displaying Configuration       To display the configurations of STP  use the following command     ana e on    Enable  show spanning tree Global Shows all configurations of STP  Bridge  Shows STP information on active inter     h ing tree active  detail  ee  show spanning tree active  detai  j a detail  detailed STP information  as    option      show spanning tree blockedport Shows information of the blocked port
389. rt so that you can get enlarged bandwidth        Bandwidth  with 1 port                Enlarged bandwidth  with many ports                ke     A logical port that can be made by  aggregating a number of the ports        Fig  8 8 Link Aggregation    The switch supports two kinds of link aggregation as port trunk and LACP  There s a little  difference in these two ways  In case of port trunking  it is quite troublesome to set the  configuration manually and the rate to adjust to the network environment changes when  connecting to the switch using logical port  On the other hand  in case of LACP  once you  specify LACP member ports between the switches  the ports will be automatically aggre   gated by LACP without manually configuring the aggregated ports     Port Trunk    Port trunking enables you to dynamically group the similarly configured interfaces into a  single logical link  aggregate port  to increase bandwidth  while reducing the traffic con   gestion     Configuring Port Trunk    To create a logical port by aggregating the ports  use the following command    gr   n    Adds a port to the aggregation group   trunk  lt 0 4 gt  PORTS H ggreg group  0 4  trunk group ID    Selects the distribution mode for a specified aggrega   tion group   trunk distmode   srcdstip   srcdstmac  refers to source MAC address and destina     srcdstmac   srcdstl4   tion MAC address     srcdstip  refers to source and destination IP address   srcdstl4  refers to source and destination TCP UDP 
390. rtant implementation of the multicast is the group membership manage   ment  The multicast group membership allows a router to know which host is interested in  receiving the traffic from a certain multicast group and to forward the multicast traffic cor   responding to the group to that host  Even if there is more than one host interested in the  group  the router forwards only one copy of the traffic stream to minimize the use of net   work bandwidth     Internet Group Management Protocol  IGMP  is a protocol used by routers and hosts to  manage the multicast group membership  Using IGMP  hosts express an interest in a cer   tain multicast group  and routers maintain the multicast group membership database by  collecting the interests from the hosts     IGMP Basic    Internet Group Management Protocol  IGMP  manages the host membership in multicast  groups  The hosts inform a neighboring multicast router that they are interested in receiv   ing the traffic from a certain multicast group by sending the membership report  join a  group   The router then forwards the multicast traffic corresponding to the report to the  hosts     A multicast router called as a querier is responsible for keeping track of the membership  state of the multicast groups by sending periodic general query messages to current in   terested hosts  If there are no responses to the query from the hosts for a given time   leave a group   the router then stops forwarding the traffic  During the above trans
391. rval  and 50 statistical data stored in one port  It also allows you to configure the time  interval to take the sample and the number of samples you want to save     To open RMON Configuration mode  use the following command      e me See         Opens RMON Configuration mode   rmon history  lt 1 65535 gt  Global i  1 65535  index number    The following is an example of opening RMON Configuration mode with index number 5     SWITCH  config   rmon history 5  SWITCH  config rmonhistory 5       155    CLI    156    7 4 1 1    7 4 1 2    7 4 1 3    Management Guide  TigerAccess    EE    Input a question mark  lt   gt  at the system prompt in RMON Configuration mode if you  want to list available commands     The following is an example of listing available commands in RMON Configuration mode     SWITCH  config rmonhistory 5         RMON history configuration commands              active Activate the history   data source Set data source name for the ethernet port   do To run exec commands in config mode   exit End current mode and down to previous mode   help Description of the interactive help system   interval Define the time interval for the history   owner Assign the owner who define and is using the history  resources   requested buckets Define the bucket count for the interval   show Show running system information   write Write running configuration to memory or terminal    SWITCH  config rmonhistory 5        Source Port of Statistical Data    To specify a source port of
392. rver IP address    113    CLI    114    6 1 5    Management Guide  TigerAccess    EE    To display a configured NTP  use the following command     a a mn    Enable    Global Shows a configured NTP function   Bridge       To synchronize the system clock  the system periodically sends the NTP message to the  NTP server  You can configure the system to bind the IP address to the message which  allows the NTP server to recognize your system     To bind the IP address to the NTP message  use the following command      e mee    Specifies the IP address to be bound to the NTP mes   Global Sage     no ntp bind address Deletes a specified IP address     Simple Network Time Protocol  SNTP     ntp bind address A B C D       NTP  Network Time Protocol  and SNTP  Simple Network Time Protocol  are the same  TCP IP protocol in that they use the same UDP time packet from the Ethernet Time  Server message to compute accurate time  The basic difference in the two protocols is  the algorithms being used by the client in the client server relationship     The NTP algorithm is much more complicated than the SNTP algorithm  NTP normally  uses multiple time servers to verify the time and then controls the rate of adjustment or  slew rate of the PC which provides a very high degree of accuracy  The algorithm deter   mines if the values are accurate by identifying time server that doesn t agree with other  time servers  It then speeds up or slows down the PC s drift rate so that the PC s time is  alw
393. rvice  agent IP address  receiver ID and so on   use the following command      e me See       Enable  Shows the information of sFlow   Global    233    CLI    234    8 1    Management Guide  TigerAccess    EE    System Main Functions    Virtual Local Area Network  VLAN     The first step in setting up your bridging network is to define VLAN on your switch  VLAN  is a bridged network that is logically segmented by customer or function  Each VLAN con   tains a group of ports called VLAN members  On the VLAN network  packets received on  a port are forwarded only to the ports that belong to the same VLAN as the receiving port   Network devices in different VLANs cannot communicate with one another without a  Layer 3 switching device to route traffic between the VLANs  VLAN reduces the amount  of broadcast traffic so that flow control could be realized  It also has security benefits by  completely separating traffics between different VLANs     Enlarged Network Bandwidth    Users belonged in each different VLAN can use more enlarged bandwidth than no VLAN  composition because they do not receive unnecessary Broadcast information  A properly  implemented VLAN will restrict multicast and unknown unicast traffic to only those links  necessary to only those links necessary to reach members of the VLAN associated with  that multicast  or unknown unicast  traffic     Cost Effective Way    When you use VLAN to prevent unnecessary traffic loading because of broadcast  you  can get cost 
394. s      show spanning tree detail  active     spanning tree detail   show spanning tree detail  active     Shows detailed information of STP     Shows information of root inconsistency  show spanning tree inconsistentports en  state     show spanning tree bridge    address   detail   l l l      Shows information of the bridge status  forward time   hello time   id   max age   proto  l l  Wie   and configuration  col   priority  system id        show spanning tree root    address   cost   l l  i i i i Shows the status and configuration for  detail   forward time   hello time   id   max age   l  K     the root bridge   port   priority  system id        show spanning tree port PORTS    active  de  Se    l   l Shows STP information of specified  tail    cost   detail  active    edgeport   inconsis  S  port     tency   rootcost   state   priority       Shows a summary of STP   show spanning tree summary  totals  totals  the total lines of STP       272 SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 7    8 3 7 1    8 3 7 2    SMC7824M VSW    CLI    Configuring MSTP    To configure MSTP  use the following steps     Step 1  Enable STP function using the spanning tree command     Step 2  Select a MSTP mode using the spanning tree mode mst command     Step 3  Configure detail options if specific commands are required     Step 4    Enable a MSTP daemon using the spanning tree mst command     Root Switch    To establish MSTP function  a root switch should be chosen first  In M
395. s     While the existing STP is a protocol to prevent a loop in a LAN domain  MSTP establishes  STP per VLAN in order to realize routing suitable to VLAN environment  It does not need  to calculate all STPs for several VLANs so that traffic overload could be reduced  By re   ducing unnecessary overload and providing multiple transmission routes for data forward   ing  it realizes load balancing and provides many VLANs through Instances     MSTP    In MSTP  VLAN is classified to groups with same configuration ID  Configuration ID is  composed of revision name  region name and VLAN instance mapping  Therefore  to  have same configuration ID  all of these tree conditions should be the same  VLAN classi   fied with same configuration ID is called an MST region  In a region  there is only one  STP so that it is possible to reduce the number of STP comparing to PVSTP  There   s no  limitation for region in a network environment but it is possible to generate Instances up to  64  Therefore instances can be generated from 1 to 64  Spanning tree which operates in  each region is IST  Internal Spanning Tree   CST is applied by connecting each span   ning tree of region  Instance O means that there is not any Instance generated from  grouping VLAN  that is  it does not operate as MSTP  Therefore Instance O exists on all  the ports of the equipment  After starting MSTP  all the switches in CST exchange BPDU  and CST root which is decided by comparing their BPDU  Here  the switches that d
396. s    EE     gt    gt     7 6 4 2    SMC7824M VSW    CLI    e The policy name cannot start with the alphabet    a    or    A       e The order in which the following configuration commands are entered is arbitrary    e The configuration of a policy being configured can be changed as often as wanted  until the apply command is entered    e Use the show policy profile command to display the configuration entered up to  now     lf you already create the policy  you need to include specified flow or class and policer to  specify the rule action for the packets matching configured classifying patterns on flow or  class and policer     To include specific flow or class and policer in policy  use the following command   EC      Includes specified flow in policy   include flow NAME  NAME flow name    i   Includes specified class in policy   include class NAME Policy   NAME class name    i Includes specified policer in policy   include policer NAME l   NAME policer name    One policy is not able to include both flow and class at the same time  Either flow or class  can belong to one policy        Only one policer can belong to one policy     To remove flow or class  policer from the policy  use the following command      e me See    no include flow Removes the flow from policy     no include class Policy Removes the class from policy     no include policer Removes the policer from policy        Metering    Meters measure the temporal state of a flow or a set of flows against a traffic 
397. s    and the default is    2ms           In switch  all VDSL ports are contained in one Line config profile  For the ports contained  as the member port of Line config profile  it is not possible to change Interleave delay or  SNR margin     To change it independently  erase the member of Line config profile first refer to 5 3 4 1  Line config profile  If you try to configure interleave delay of the port which is contained as  Line config profile member  the error message will be displayed     85    CLI    86    9 3 2 8    9 3 2 9    Management Guide  TigerAccess    EE    To display configured interleave delay  use the following command    ICI O O o    Enable    show Ire interleave  PORTS  Global Shows the configuration of interleave delay     Bridge       The following is an example of configuring Interleave delay of port 50 as 50ms     SWITCH  bridge    lre 5 interleave delay 50  SWITCH  bridge    show lre interleave 1 5    Port Status Channel Inter Delay  ADM OPR UP DOWN   1 Up Down Slow 2  2   2 Up Down Slow 2  2   3 Up Down Slow 2  2   4 Up Down Slow 2  2   5 Up Down Slow 507  30       SWITCH  bridge       Impulse Noise Protection    Use the following command to configure minimum protection value of port provision   mm Te eg    Configures INP  Ire PORTS inp  lt 0 255 gt   0 255  INP value  default 0   Bridge    Ire PORTS inp  lt 0 255 gt  AS  up      down AS     A academe INP with specifying Upstream or Down     A academe       The unit of value is 125 usec and configure
398. s 355  9 2 1 2 Forwarding Entry AGING E 355  9 2 1 3 Displaying McFDB Intormmaton  nn 355   92 2 IGMP  eeler 356  922 1 Enabling 1SMP S5RO0OPNO  3d is 357  9 2 2 2 IGMP Snooping Version            neeneneenensenensrrensrrersrrensrrersrrersrrersrrensnrersrrersrrerne 357  9 2 2 3 IGMP Snooping Robustness Value AAA 358   9 2 3  IGMPV2  SNOODING siria a A EA 358  9 2 3 1 IGMP Snooping Querier Confguraton     358  9 2 3 2 IGMP Snooping Last Member Query Intenval reren 360  9 2 3 3 IGMP Snooping Immediate Leave       ooccccconccnccccccncnoccnnonononcnnnnonononcnnnnnncnnnnns 361  9 2 3 4 IGMP Snooping Report Suppression        occcccccncccccncoccnconcnonocnnnoncnonncnonononnnons 362  9 2 3 5 IGMP Snooping S Query Report Agency    oocccccoccccccoccnccnnccnccnnconononcnnnnnncnnnnas 362  230     IEXPIGICFIOST tee  ee mein tat 363  9 2 3 7 Multicast Router Port Configuration         cccooccccconccnccocnncononononnncnnononcnnonnononnos 364  9 2 3 8    TEN Multicast FIOOGING aeur eaan eege ege ee 366   O24 IGMPVS SAOOPING EE 367  9 2 5 Displaying IGMP Snooping Information            oooccccooccnccconcnnoconnnncnnnoncnnonons 368  9 2 6 Multicast VLAN Registration  MV     369  SSC   eben eege 369  J202  A Rec ce ere ee ee RO arn ree eee 369  9 263    DOUE REC NE POM ee ee ee eee 370   9 2 60A  MYR e ee e elle EE 370  9 2 6 5 Displaying MVR Configuration        occccooncccccccnccnoconononnnnononononnnnonononnncnnarnnnnnoos 370   9 2 7 IGMP Filtering and Throttling                cc ccecceccs
399. s an interface     The following is an example of enabling the interface 1        SWITCH  configure terminal  SWITCH  config   interface 1  SWITCH  config if   no shutdown  SWITCH  config if            51    CLI    92    4 3 2    4 3 3    Management Guide  TigerAccess    EE    To display if an interface is enabled  use the show running config command     Assigning IP Address to Network Interface    After enabling an interface  assign an IP address  To assign an IP address to a network  interface  use the following command     nd es en  ip address A B C D M secondary    no   no ip address A B C D M_     no ip address A B C D M   A B C D M Interface   Clears an IP address assigned to an interface    an IP address   Clears an IP address assigned to an interface    to an interface     no ip address A B C D M secon  Clears a secondary IP address assigned to an inter   dary face     no ip   no ip address dhcp     no ip address dhcp     Stops assigning an IP address from a DHCP server  _  assigning an IP   Stops assigning an IP address from a DHCP server  _  from a DHCP server        The ip address dhcp command is for configuring an interface as a DHCP client  For the  detail of configuring a DHCP client  see Section 8 6 9     To display an assigned IP address  use the following command     ee  Shows an IP address assigned to an interface     Static Route and Default Gateway       The static route is a predefined route to a specific network and or device such as a host   Unlike a dy
400. s chapter is only for Layer 2 switch operation  Because there is no routing information  in Layer 2 switch  each VLAN cannot communicate  Especially  the uplink port should re   ceive packets from all VLANs  Therefore when you configure the switch as Layer 2 switch   the uplink ports must be included in all VLANs     SWITCH  bridge    show vlan  u  untagged port  t  tagged port    default   1   1  lu    uUuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu  HE2 2   2   is da a ck Me o ao o ao ee  BEI eg 3  LA Mle a es d RI e AA  br4   4   4   a ar rata  EE Be seve  ice ee e  ie Te  eee ee See  BESA 5  5  lar a a  aaae ke e G Be ege od RS e eg       SWITCH  bridge       Outgoing Packets under Layer 2 Shared VLAN Environment    As above configuration with untagged packet  if an untagged packet comes into port 1  it  is added with tag 1 for PVID 1  And the uplink port 24 is also included in the default  VLAN  it can transmit to port 24     However a problem can be occurred for coming down untagged packets to uplink ports  If  an untagged packet comes to uplink ports from outer network  the system does not know  which PVID it has and where should it forward     SMC7824M VSW    Management Guide CLI    Outer Network    4    TigerAccess    EE           Untagged packets comes from the uplink ports  The  packets should be forwarded to br3  but the system  cannot know which PVID added to the packet                 default  lt x                      Fig  8 6 Incoming Packets under Layer 2 Shared VLAN
401. s its ARP table     From now on Host A will forward all the packets that it wants to reach Host D to the MAC  address of switch  Since the switch knows how to reach Host D  the router forwards the  packet to Host D  The ARP cache on the hosts in Subnet A is populated with the MAC  address of the switch for all the hosts on Subnet B  Hence  all packets destined to Subnet  B are sent to the router  The switch forwards those packets to the hosts in Subnet B     SMC7824M VSW    Management Guide  TigerAccess    EE    7 13    SMC7824M VSW       CLI    To enable or disable Proxy ARP on Interface configuration mode  use the following com   mand      e e Se       ip proxy arp Enables proxy ARP at specified interface  nterface    no ip proxy arp Disables the configured proxy ARP from the interface     ICMP Message Control    ICMP stands for Internet Control Message Protocol  When it is impossible to transmit data  or configure route for data  IC MP sends error message about it to host  The first 4 bytes  of all ICMP messages are same  but the other parts are different ac cording to type field  value and code field value  There are fifteen values of field to distinguish each different  ICMP message  and code field value helps to distinguish each type in detail     The following table shows explanation for fifteen values of IC MP message type     SS    Type  ICMP_ECHOREPLY  ICMP_SOURCE_QUENCH  ICMP_ECHO  ICMP_PARAMETERPROB  ICMP_TIMESTAMPREPLY    3   4 5  11   12 13   14 15   ICMP_INFO_R
402. s on a subnet reach remote subnets without con   figuring routing or a default gateway     aa H LL   AAA  114 A    os    Host A     Host B  172 16 10 100 16  br1 172 16 10 99 24    172 16 10 200 24    br2 172 16 20 99 24    pn m a    Sg ee 1 4     eee ee    Host C Host D  172 16 20 100 24 172 16 20 200 24    Fig  7 15 Proxy ARP    As shown in the diagram above  Host A has a  16 subnet mask  What this means is that  Host A believes that it is directly connected to all of network 172 16 0 0  When Host A  needs to communicate with any switches if believes are directly connected  it will send an  ARP request to the destination  Therefore  when Host A needs to send a packet to Host D   Host A believes that Host D is directly connected  so it sends an ARP request to Host D     Host A needs the MAC address of Host D to reach Host D  Therefore  Host A broadcasts  an ARP request on Subnet A  including the switch s Br1 interface  but does not reah Host  D  This switch does not forward broadcasts by default  Since the switch knows that the  target address  Host D   s IP address  is on another subnet and can reach Host D  it will  reply with its own MAC address to Host A     The Proxy ARP reply that switch sends to Host A  The proxy ARP reply packet is encap   sulated in an Ethernet frame with its MAC address as the source address and Host A s  MAC address as the destination address  The ARP replies are always unicast to the  original requester  On receiving this ARP reply  Host A update
403. s the source or receiver port  use the following command     a Y ee    mvr port PORTS type  receiver   Specifies an MVR port   source  Global PORTS  port number    no mvr port PORTS Deletes a specified MVR port     MVR Helper Address       When being in a different network from an MVR group s  a multicast router sends the mul   ticast traffic to each MVR group  In such an environment  when an IGMP packet from a  subscriber is transmitted to the multicast router via the MVR group  multicast VLAN inter   face   the source address of the IGMP packet may not match the network address of the  MVR group  In this case  the multicast router normally discards the IGMP packet  To  avoid this behavior  you can configure the switch to replace the source address with a  specified helper address  The helper address must belong to the MVR group   s network     To specify an MVR helper address to replace a source address of an IGMP packet  use  the following command      e e ee    Specifies an MVR helper address     mvr vlan VLAN helper A GC VLAN  VLAN ID  1 4094   Ge A B C D  helper address    no mvr vlan VLAN helper Deletes a specified MVR helper address     Displaying MVR Configuration       To display an MVR configuration  use the following command     na e en    Enable l    Global  show mvr vlan VLANS       SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 7    9 2 7 1    SMC7824M VSW    CLI    IGMP Filtering and Throttling    IGMP filtering and throttling control the distribut
404. se  empty for no passphrase    networks  Enter same passphrase again networks    Your identification has been saved in  etc  ssh id dsa        Your public key has been saved in  etc  ssh id_dsa pub    The key fingerprint is   d9 26 8e 3d fa 06 31 95 f8 fe f0 59 24 42 47 7e root switch  SWITCH A config       Step 2  Copy the generated authentication key to SSH server     Step 3  Connect to SSH server with the authentication key     SWITCH A contfig   ssh login 172 16 209 10  Enter passphrase for key   etc  ssh id dsa   networks  SWITCH B     57    CLI    98    4 5    Management Guide  TigerAccess    EE    802 1x Authentication    To enhance security and portability of network management  there are two ways of au   thentication based on MAC address and port based authentication which restrict clients  attempting to access to port     Port based authentication  802 1x  is used to authenticate the port self to access without  users    count to access the network     802 1x authentication adopts EAP  Extensible Authentication Protocol  structure  In EAP  system  there are EAP MD5  Message Digest 5   EAP TLS  Transport Level Security    EAP SRP  Secure Remote Password   EAP TTLS  Tunneled TLS  and the switch sup   ports EAP MD5 and EAP TLS  Accessing with user s ID and password  EAP MD5 is 1   way Authentication based on the password  EAP TLS accesses through the mutual au   thentication system of server authentication and personal authentication and it is possible  to guarantee hi
405. se the following command      e een       no no action match deny    Deletes a specified rule action   no no action match permit       SMC7824M VSW    Management Guide  TigerAccess    EE    7 6 7 4    7 6 8    SMC7824M VSW    CLI    Applying and Modifying Admin Policy    After configuring an admin policy using the above commands  apply it to the system with  the following command  If you do not apply this policy to the system  all specified configu   rations from Admin Policy Configuration mode will be lost     To save and apply an admin policy  use the   S   command     Admin   apply Applies an admin policy to the system   Policy    To modify an admin policy  use the GT command     E    E an admin policy   policy admin NAME modify Global  NAME  admin policy name     Displaying Admin Rule          To show an admin rule profile configured by user  use the follwing command     na me See      show flow profile admin   flow    show flow profile admin   admin   Admin Flow   Flow   Shows a profile of admin flow    a   Shows a profile ofadminflow    of admin flow     aa  show policy profile admin Shows a profile of admin policy   olicy    The following command can be used to show a certain rule by its name  all rules of a cer   tain type  or all rules at once sorted by a rule type      e me See    show   flow   class   policy         Enable  admin  NAME  ae Shows the information relating to each rule  enter an  oba    show   flow   class   policy   admin rule name     Bridge  admin 
406. show Ire stat crc sec  PORTS  Shows how long CRC error has been happening    Shows how long CRC  LOF  and LOS  error has been  show Ire stat es sec  PORTS   happening     show Ire stat lof sec  PORTS  Shows how long Frame loss has been happened   show Ire stat lol sec  PORTS  Shows how long Link has been disconnected   Enable  show Ire stat los sec  PORTS  Global Shows how long Signal loss has been happening   oba    Shows how long RX power of port has being lower than  show Ire stat Ipr sec  PORTS  Bridge S g RX p p g  specific voltage     show Ire stat ses sec  PORTS  Shows how long server error has been happening  show Ire stat uas sec  PORTS  Shows how long UAS has been happening       show Ire stat service error Shows how long Link has been disconnected because   PORTS  of CPE turned off by user     93    CLI    94    Management Guide  TigerAccess    EE    To display all errors that are counted during 15 minutes or one day  use the following    show Ire pre 15m error  PORTS  Shows the error status in previous 15 minutes     command    show Ire cur 15m error  PORTS  enable Shows the error status in current 15 minutes   Global   show Ire pre day error  PORTS  Bridge Shows the error status in previous day    show Ire cur day error  PORTS  Shows the error status in current day       To reset data of CRC error  Frame loss and Signal loss  use the following command     mana e  on  clear Ire stat crc sec PORTS    clear Ire stat los sec PORTS Global Resets the data of error coun
407. show list  clear arp  lear arp IFNAME  lear cpe stat error  PORTS    lear ip arp inspection statistics  vlan VLAN NAME   lear ip dhcp authorized arp invalid  lear ip dhcp leasedb A B C D M  lear ip dhcp leasedb all  lear ip dhcp leasedb pool POOL  lear ip dhcp relay statistics  lear ip dhcp statistics  lear ip igm  lear ip igmp group    lear ip igmp group A B C D  group A B C D IFNAME    interface IFNAME    lear ip igm    5  D mm ro    lear ip igm             lear ip igmp snooping stats port  PORTS cpul    lear ip kernel route   lear ip mcfdb    vlan VLAN    lear ip mcfdb vlan VLAN group A B C D source A B C D  lear ip route kernel   lear lacp statistic   lldp statistics  PORTES    lear lre error stat all  PORTS         O  Vu  B       QQ  4 tz 0 00 000 Et  0  GD Et ft ELL Er Et E JE       SC HERE  gt   i Press the  lt ENTER gt  key to skip to the next list     In case that the switch installed command shell  you can find out commands starting with  a specific alphabet  Input the first letter and question mark without space  The following is  an example of finding out the commands starting    s    in Privileged EXEC Enable mode of    the switch   SWITCH  s   show Show running system information  ssh Configure secure shell  SWITCH  s    Also  it is possible to view variables you should input following after commands  After in   putting the command you need  make one space and input a question mark  The follow   ing is an example of viewing variables after the write command  Ple
408. ss    EE    8 3    SMC7824M VSW    CLI    Spanning Tree Protocol  STP     The local area network  LAN   which is composed of double paths like token ring  has the  advantage that it is possible to access in case of disconnection with one path  However  there is another problem called a loop when you always use the double paths     The loop may occur when double paths are used for the link redundancy between  switches and one sends unknown unicast or multicast packet that causes endless packet  floating on the LAN like loop topology  That superfluous traffic eventually can result in  network fault  It causes superfluous data transmission and network fault         Switch A    Fig  8 9 Example of Loop    The spanning tree protocol  STP  is the function to prevent the loop in LAN with more  than two paths and to utilize the double paths efficiently  It is defined in IEEE 802 1d  If  the STP is configured in the system  there is no loop since it chooses more efficient path  of them and blocks the other path  In other words  when SWITCH C in the below figure  sends packet to SWITCH B  path 1 is chosen and path 2 is blocked     257    CLI    258    8 3 1    Management Guide  TigerAccess    EE    Q    PC B       VLAN 1    Kik Qo         Switch D         Path 2          witch C    Fig  8 10 Principle of Spanning Tree Protocol    Meanwhile  the rapid spanning tree protocol  RSTP  defined in IEEE 802 1w dramatically  reduces the time of network convergence on the spanning tree protocol 
409. ssages from the normal nodes  it unblocks its secondary port for traffic  transmission  RM node responds to those messages using RM Link Down message  which informs the other nodes that its secondary port has been unblocked     If the link failure is recovered  the normal nodes send Link Up message to RM node  And  they keep the blocking status of those failed ports  If the blocked ports of the normal  nodes start to forward right after a Link Failure is recovered  a temporary loop can occur     If RM node receives Link Up message  it blocks its own secondary port and sends RM  Link UP message which informs the nodes of the secondary port   s blocking status  If the  nodes receive RM Link Up message  they unblocks the ports which are detected a Link  Failure recovery  The Ethernet ring is back to normal state     289    CLI    290    Management Guide  TigerAccess    EE    ERP Messages    There are five types of ERP messages of concern to the RM node Normal node interac   tion in ERP ring as shown below     e Normal Node messages  The following messages are sent by the normal nodes to inform RM node of their link  changes       Link Down  A normal node sends Link Down messages detecting its link failure       Link Up  A normal node sends Link Up messages detecting its link recovery     e RM Node messages  A RM node is in charge of protecting the Ethernet ring  It sends periodic Test Packet  messages to normal nodes and receives Link Down Up message from those nodes  to detect 
410. stalled  to the port configured as  Monitor port            Mirrored Ports 1 2 3                   Monitor Port              lt  Monitoring    Fig  5 5 Port Mirroring    To configure port mirroring  designate mirrored ports and monitor port  Then enable port  mirroring function  Monitor port should be connected to the watch program installed PC   You can designate only one monitor port but many mirrored ports for one switch     Step 1  Activate the port mirroring  using the following command     Y mn       Step 2  Designate the monitor port  use the following command      e e een       mirror monitor  PORTS   cpu  Designates the monitor port     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    Step 3  Designate the mirrored ports  use the following command      e e re    Designates the mirrored ports     mirror add PORTS  ingress      ingress  ingress traffic  egress        egress  egress traffic    Step 4  To delete and modify the configuration  use the following command      ren ECO rem    no mirror monitor   mirror   no mirror monitor     Deletes a designated monitor port    a   Deletes a designated monitor port    monitor port   mirror del PORTS  ingress Bridge  Deletes a port from the mirrored port   egress     Step 5  To disable monitoring function  use the following command      e e See          To display a configured port mirroring  use the following command     n   mn    Enable    Global Shows a configured port mirroring     Bridge      
411. statistics all Enable   Shows DHCP relay statistics for all the interfaces    DHCP   Shows DHCP relay statistics for all the interfaces    statistics for all the interfaces     show ip dhcp relay statistics Global    Shows DHCP relay statistics for a specified VLAN   vlan VLANS Bridge    To delete collected DHCP relay statistics  use the following command      e e en    Enable       clear ip dhcp relay statistics Global Deletes collected DHCP relay statistics     Bridge       317    CLI    318    8 6 5    8 6 5 1    Management Guide  TigerAccess    EE    DHCP Option    This function enables administrators to define DHCP options that are carried in the DHCP  communication between DHCP server and client or relay agent  The following indicates  the format of the DHCP options field     DHCP Option Format    1 byte 1 byte or variable 64 bytes    A code identifies each DHCP option  It can be expressed in value O to 255 by user con   figuration and some of them are predefined in the standards   128   254 is site specific  A  length can be variable according to value or can be fixed  A value contains actual informa   tion such an IP address  string  or index  which is inserted into the DHCP packet     Administrators can configure a DHCP option format in DHCP Option mode  which is glob   ally used over the DHCP functions  The DHCP option format can be applied in other  DHCP software modules and the following figure indicates it             DHCP Server Option  DHCP Snooping Option    D
412. stem restart  critical   Sets severity of an alarm for system    major   minor   warning   intermediate  restart     snmp alarm severity module remove  critical   Sets severity of an alarm for module    major   minor   warning   intermediate  removed     snmp alarm severity temperature high  critical Sets severity of an alarm for system    major   minor   warning   intermediate  temperature high        To delete configured alarm severity  use the following command     mane a ee    no snmp alarm severity fan fail   no snmp alarm severity cold start   no snmp alarm severity broadcast over   no snmp alarm severity cpu load over   no snmp alarm severity dhcp lease   no snmp alarm severity dhcp illegal   no snmp alarm severity fan remove   no snmp alarm severity ipconflict   no snmp alarm severity memory over   no snmp alarm severity mfgd block  Global Deletes configured alarm severity    no snmp alarm severity port link down    no snmp alarm severity port remove    no snmp alarm severity port thread over    no snmp alarm severity power fail    no snmp alarm severity power remove   no snmp alarm severity rmon alarm rising  no snmp alarm severity rmon alarm falling  no snmp alarm severity system restart   no snmp alarm severity module remove    no snmp alarm severity temperature high       SMC7824M VSW 145    CLI Management Guide  TigerAccess    EE    7 1 9 5 ADVA Alarm Severity    To set ADVA alarm severity  use the following command      eene ee    snmp alarm severity adva fan fa
413. stomers                   Fig  7 14 NetBIOS Filtering    To enable disable NetBIOS filtering  use the following command     netbios filter PORTS AS Configures NetBIOS filtering to a specified port   Bridge      no netbios filter PORTS   netbios filter PORTS Disables NetBIOS filtering from a specified port        To display a configuration of NetBIOS filtering  use the following command      e e Se    Enable    show netbios filter Global Shows a configuration of NetBIOS filtering     Bridge       205    CLI    206    Management Guide  TigerAccess    EE    The following is an example of configuring NetBIOS filtering in port 1 2 and showing it     SWITCH  bridge    netbios filter 1 2  SWITCH  bridge    show netbios filter    o enable   disable    SWITCH  bridge       7 8 Max New Hosts    For the switch  you have to lock the port like MAC filtering before configuring max hosts   In case of ISPs  it is possible to arrange a billing plan for each user by using this configu   ration     Max new host is to limit the number of users by configuring the number of MAC ad   dresses that can be learned on the system and on the port for a second  The number of  MAC addresses that can be learned on the system has the priority     To configure max new hosts  use the following command      e e Se    The number of MAC addresses that can be learned on  max new hosts PORTS VALUE the port for a second     VALUE  maximum MAC number  lt 1 2147483646 gt     The number of MAC addresses that can be lea
414. support option b  and     PLAN 997 Symmetric for DMT 50M    sym100 100 998    sym25_997    N  Di    PLAN 998 Asymmetric for 4Band 12a   12a_997 PLAN 997 Asymmetric for 5Band 12a   17a PLAN 998 Asymmetric for 5Band 17a   17a_8k PLAN 998 Asymmetric for 5Band 17a  tone space  8k    30a PLAN 998 Asymmetric for 6Band 30a   VDSL 2 12b PLAN 998 Asymmetric for 4Band 12b  not support option band    12b 997 PLAN 997 Asymmetric for 4Band 12b  not support option band   PLAN 998 Asymmetric for 3Band 8a  PLAN 998 Asymmetric for 3Band 8b  not support option band   PLAN 998 Asymmetric for 3Band 8c  PLAN 998 Asymmetric for 3Band 8d    Tab  5 2 Profile of VDSL Port    O    SMC7824M VSW    Management Guide CLI  TigerAccess    EE    i   The default pofile of VDSL port is  30a      h Configuration for Profile of VDSL port is applied to all the ports     The following table shows the option band types of VDSL port     Uses 6 to 32 tone in annex A environment in the direction of upstream  Option Uses 32 to 64 tone in annex B environment in the direction of upstream  Band Uses 6 to 64 tone in annex M environment in the direction of upstream  Excludes option band    Tab  5 3 Option band of VDSL Port       To display the configured Ire profile  use the following command      es e e       show Ire profile Enable Global Bridge   Displays the configured Ire profile    The following is an example of displaying the configured Ire profile    SWITCH  bridge    show lre profile 1 8          Port Status Standa
415. switch supports ingress and egress  shaping  rate limiting  and different  scheduling type such as SP  Strict Priority  and DWRR  Weighted Deficit Round Robin      IP Multicast    Because broadcasting in a LAN is restricted if possible  multicasting could be used in   stead of broadcasting by forwarding multicast packets only to the member hosts who  joined multicast group  The switch provides IGMPv2 and IGMP snooping for host mem   bership management     SNMP    Simple network management protocol  SNMP  is to manage Network Elements using  TCP IP protocol  The switch supports SNMP version 1  2  3 and Remote Monitoring   RMON   Network operator can use MIB also to monitor and manage the switch     Dynamic Host Configuration Protocol  DHCP     The switch supports Dynamic Host Configuration Protocol  DHCP  server that automati   cally assigns IP address to clients accessed to network  That means it has IP address  pool  and operator can effectively utilize limited IP source by leasing temporary IP ad   dress  In layer 3 network  DHCP request packet can be sent to DHCP server via DHCP  relay and option 82     Spanning Tree Protocol  STP     To prevent loop and preserve backup route in Layer 2 network  the switch supports span   ning tree protocol  STP  defined in IEEE 802 1D  Between STP enabled switches  a root  bridge is automatically selected and the network remains in tree topology  But the recov   ery time in STP is very slow  about 30 seconds   rapid spanning tree protocol
416. t   clear Ire stat lol sec PORTS Bridge    clear Ire stat lpr sec PORTS    clear Ire stat uncorrectable crc  PORTS       SES Severely Errored Seconds  means how long server error has been happening  and  UAS Unavailable Seconds  means error  which SES is more than 10 seconds     In addition  you can check how many minutes is passed after beginning 15 minutes  15  Min Elapse  or day  Day Elapse  based on the present time of checking how many times  each port is disconnected and how long it is disconnected     SMC7824M VSW    Management Guide  TigerAccess    EE    9 3 4    9 3 4 1    SMC7824M VSW    CLI    Config Profile    You can make a policy configured in service port a Profile to apply to port  There are two  kinds of profiles  one applied to VDSL line and the other one configured for Alarm of  SNMP trap in case error is happened  This chapter describes the following lists     e Line config profile  e Alarm config profile    Line config profile    Line config profile is a policy  which configures transmit rate of VDSL line  SNR margin   and Interleave delay     This is very useful when ISPs apply graded services  They do not have to configure all  ports according to client   s grade  but just apply profile to ports     In switch  all VDSL ports are contained in one Line config profile  For the ports contained  as the member port of Line config profile  it is not possible to change Interleave delay or  SNR margin  To change it  you should delete the member of Line config pr
417. t Rate  bps     Tab  8 3 RSTP Path cost  long        To decide the path cost calculation method  use the following command      e e res    spanning tree pathcost method Selects the method for calculating a RSTP path cost   long long  32 bits of RSTP path cost  IEEE 802 1D 2004      Bridge  spanning tree pathcost method Selects the method for calculating a STP path cost   short short  16bits of STP path cost  IEEE 802 1D 1998      To delete a configured method for caculating the path cost and return the configuration to  the default  use the following command      e e See    spanning tree   pathcost Deletes the configured method of path cost   default   Bridge  method short     When the route decided by path cost gets overloading  you would better take another  route  Considering these situations  it is possible to configure the path cost of root port so  that user can configure a route manually           To configure the path cost  use the following command      e e een    Configures path cost to configure route   PORTS  port number   1 200000000  the path cost value     spanning tree port PORTS cost   lt 1 200000000 gt     no spanning tree port PORTS Deletes the configured path cost  enter the port num     cost ber        Edge Ports    Edge ports are defined that the ports are connected to a nonbridging device  There are no  switches or spanning tree bridges directly connected to the edge port     SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 6 3    8 3 6 4    S
418. t interval  lt 10 500 gt  S 10 500  packet interval  unit  millisecond   To delete the specified interval of ERP test packet interval  use the Ge command           no erp domain DOMAIN ID test   Bridge Deletes the specified interval of ERP test packet   packet interval    LOTP Hold Off Time    It is necessary to prevent lower priority rings to trigger protection because of loss of test  packets before the protection of the higher priority ring and transmission of test packets  over this ring     LOTP hold off time determines the hold off time for ERP switching in case of detection of  LOTP  This parameter provides independence between ERP rings  Hold off time for LOTP  triggered ERP delays ERP switching if a ring protection of this domain is also provided by  other higher priority rings  LOTP Hold Off Time value depends on the ring priority of ERP  rings     To specify LOTP hold off time  use the following command      e e re    Configures LOTP hold off time    erp domain DOMAIN ID hold off     ti  lt 1 20000 gt  1 20000  ERP hold off time  default  O ms  unit  milli   ime  lt 1     second        To configure LOTP hold off time as default  use the following command      e e See       no erp domain DOMAIN ID hold  i      SH Bridge Configures LOTP hold off time as default value  off time    SMC7824M VSW    Management Guide  TigerAccess    EE    8 4 12    8 4 13    SMC7824M VSW    CLI    ERP Trap    To enable the system to generate ERP trap message  use the following command    
419. t or VDSL ports     Describes how to configure the system environment and manage   6 System Environment  ment functions     7 Network Management Describes how to configure the network management functions   8 System Main Functions Describes how to configure the system main functions    9 IP Multicast Describes how to configure the IP multicast functions    10 System Software Upgrade Describes how to upgrade the system software     KE Lists all abbreviations and acronyms which appear in this docu   11 Abbreviations  ment        Tab  1 1 Overview of Chapters    SMC7824M VSW 19    CLI    20    1 3    1 4    Management Guide  TigerAccess    EE    Document Convention    This guide uses the following conventions to convey instructions and information     Information    This information symbol provides useful information when using commands to configure  and means reader take note  Notes contain helpful suggestions or references     Warning    This warning symbol means danger  You are in a situation that could cause bodily injury  or broke the equipment  Before you work on any equipment  be aware of the hazards in   volved with electrical circuitry and be familiar with standard practices for preventing acci   dents by making quick guide based on this guide     Document Notation    The following table shows commands used in guide book  Please be aware of each  command to use them correctly     Notation   scription O  DREES    Commands or variables that appear within square brackets  
420. tSize port  Global    Shows the token bucket size of each queue for port  queue PORTS    Applying and modifying Policer    After configuring a policer using the above commands  apply it to the system with the fol   lowing command  If you do not apply the policer to the system  all specified configurations  on Policer Configuration mode will be lost  To save and apply a policer  use the following  command     mana    on  apply Applies a policer to the system        To modify a policer  use the following command     na e een    policer NAME modify Global Modifies a policer  enter a policer name     Rule Action       Policy Creation    To configure a policy  you need to open Policy Configuration mode first  To open Policy  Configuration mode  use the following command      e e Se    f Creates a policy and opens Policy Configuration mode   policy NAME create Global l  NAME  policy name     After opening Policy Configuration mode  the prompt changes from SWITCH config   to  SWITCH config policy NAME           To delete configured policy or all policies  use the following command      e e re    no policy all       no policy NAME Deletes a policy  enter a policy name   Global    Deletes all policies     After opening Policy Configuration mode  a policy can be configured by user  The rule  priority and rule action s  can be configured for each policy     e The policy name must be unique  lts size is limited to 32 significant characters     SMC7824M VSW    Management Guide  TigerAcces
421. tTLVs  1  disable Tx lt   gt RX   none    2  disable Tx lt   gt RX   none      SWITCH  config       SMC7824M VSW    Management Guide  TigerAccess    EE    7 4    7 4 1    SMC7824M VSW    CLI    Remote Monitoring  RMON     Remote Monitoring  RMON  is a function to monitor communication status of devices  connected to Ethernet at remote place  While SNMP can give information only about the  device mounting an SNMP agent  RMON gives network status information about overall  segments including devices  Thus  user can manage network more effectively  For in   stance  in case of SNMP it is possible to be informed traffic about certain ports but  through RMON you can monitor traffics occurred in overall network  traffics of each host  connected to segment  and the current status of traffic between hosts     Since RMON processes quite lots of data  its processor share is very high  Therefore   administrator should take intensive care to prevent performance degradation and not to  overload network transmission caused by RMON  There are nine RMON MIB groups de   fined in RFC 1757  Statistics  History  Alarm  Host  Host Top N  Matrix  Filter  Packet Cap   ture and Event  The switch supports two MIB groups of them  most basic ones  Statistics   only for uplink ports  and History     RMON History    RMON history is periodical sample inquiry of statistical data about each traffic occurred in  Ethernet port  Statistical data of all ports are pre configured to be monitored at 30 minute  inte
422. tagrams over the network  to the sFlow collector     There are three parts of sFlow agent as shown below     s sFlow Agent  One agent can hold multiple samplers and pollers  but each sampler and poller points  to only one receiver       Sampler  This is used to collect packet samples for each interface       Poller  This is used to collect counter samples for each interface       Receiver  This is used to encode the flow and counter samples into UDP data   grams     sFlow implementation of the switch has the following restrictions  so you should keep in  mind those before configuring sFlow     e sFlow service must be enabled by service sflow command before enabling sFlow  function    e sFlow sampling of specified port would not be perfomed unless you enable sFlow  function for each port using sflow port PORTS enable command    e sFlow sampling would not be performed when sample rate or counter interval or re   ceiver index is 0     sFlow Service    After you enable sFlow service using the following command  the sampling and polling of  sFlow interface just start to run in the system     Enable or disable sFlow service globally  use the following command     na e een    service sflow Enables sFlow service globally   Global    no service sflow    Disables sFlow service globally        Agent IP Address    SMC7824M VSW    Management Guide  TigerAccess    EE    7 16 3    7 16 4    7 16 5    7 16 6    SMC7824M VSW    CLI    To specify IP address of sFlow agent  use the following co
423. tch registered in Master Switch as Slave Switch  To des   ignate Slave switch  use the following command      e e See  oe     Seis the ewitch as a slave switch     Disabling Stacking       To disable stacking  use the following command      e e en    Displaying Stacking Status       To display the status of stacking  use the following command     mana   een    Enable    Global Shows a configuration of stacking     Bridge       339    CLI    340    8 7 5    8 7 6    Management Guide  TigerAccess    EE    Accessing to Slave Switch from Master Switch    After configuring all stacking configurations  it is possible to configure and mange by ac   cessing to Slave switch from Master switch     To access to Slave switch from Master switch  use the following command in Bridge Con   figuration mode      es res       Accesses to a slave switch   rcommand NODE Enable  NODE  node number    NODE means node ID from configuring stacking in Slave switch  If you input the above  command in Master switch  Telnet connected to Slave switch is displayed and it is possi   ble to configure Slave switch using DSH command  If you use the exit command in Telnet   the connection to Slave switch is down     Sample Configuration    Sample Configuration 1  Configuring Stacking    The following is a stacking configuration by designating SWITCH A as a master and  SWITCH B as a slave     Switch A  Master Switch       Manages with the  same IP address    Switch B  Slave Switch       Step 1   Assign IP address
424. te of port  listening and learning are not needed  These negotiations use BPDU     Compatibility with 802 1d    RSTP internally includes STP  so it has compatibility with 802 1d  Therefore  RSTP can  recognize BPDU of STP  But  STP cannot recognize BPDU of RSTP  For example  as   sume that SWITCH A and SWITCH B are operated as RSTP and SWITCH A is connected  to SWITCH C as designated switch  Since SWITCH C  which is 802 1d ignores RSTP  BPDU  it is interpreted that switch C is not connected to any switch or segment     Switch A Switch C  Switch B        Fig  8 21 Compatibility with 802 1d  1     However  SWITCH A converts a port received BPDU into RSTP of 802 1d because it can  read BPDU of SWITCH C  Then SWITCH C can read BPDU of SWITCH A and accepts  SWITCH A as designated switch     Switch A Switch B Switch C   802 1w   802 1w   802 1d     STP BPDU    Fig  8 22 Compatibility with 802 1d  2     MSTP Operation    To operate the network more efficiently  the switch uses MSTP  Multiple Spanning  Tree  Protocol   It constitutes the network with VLAN subdividing existing LAN domain logically  and configure the route by VLAN or VLAN group instead of existing routing protocol     SMC7824M VSW    Management Guide  TigerAccess    EE    8 3 3 1    SMC7824M VSW    CLI    Here explains how MSTP PVSTP differently operates on the LAN  Suppose to configure  100 VLANs from SWITCH A to B and C  In case of STP  there is only one STP on all the  VLANs and it does not provide multiple instance
425. tem  Power is Ok  Aug 28 03 33 39 system  Power is Fault  Aug 28 03 36 01 system  Power is Ok  Aug 28 03 36 02 system  Power is Fault             A   A   A   A  Aug 28 03 43 09 system  Power A is Ok  Aug 28 03 43 10 system  Power A is Fault  Aug 28 04 09 36 system  Power A is Ok  Aug 28 04 09 37 system  Power A is Fault  Aug 28 04 10 55 system  Power A is Ok  Aug 28 04 10 55 system  Power A is Fault  Aug 28 04 11 03 system  Power A is Ok  Aug 28 04 11 03 system  Power A is Fault  Aug 28 04 16 21 system  Power A is Ok  Aug 28 04 16 21 system  Power A is Fault  Aug 28 04 16 27 system  Power A is Ok  Aug 28 04 16 34 system  Power A is Fault  Aug 28 04 19 14 system  Power A is Ok  Aug 28 04 19 15 system  Power A is Fault  Aug 28 06 14 12 system  Power A is Ok  Aug 28 06 14 13 system  Power A is Fault                   Aug 28 11 52 03 login 222   admin login on  ttyp0  from  10 100 158 158   Aug 28 11 54 21 proftpd 234   localhost  10 100 158 158 10 100 158 158      USER admin  Login successful    Aug 28 11 54 23 proftpd 234   localhost  10 100 158 158 10 100 158 158        Logout successful    Aug 28 11 54 42 proftpd 235   localhost  10 100 158 158 10 100 158 158      Logout successful    SWITCH     7 5 7 Displaying Syslog Configuration    To display the configuration of the syslog  use the following command     O ma wa O    Enable    show syslog Global Shows the configuration of the syslog     Bridge       SMC7824M VSW 167    CLI    168    7 6    Management Guide  TigerAccess   
426. tem configuration and information     Tab  3 1 Main Command of Privileged EXEC View Mode    Privileged EXEC Enable Mode    To configure the switch  you need to open Privileged EXEC Enable mode with the enable  command  then the system prompt will changes from SWITCH gt  to SWITCH      e e es    enable View Opens Privileged EXEC Enable mode     You can set a password to Privileged EXEC Enable mode to enhance security  Once set   ting a password  you should enter a configured password  when you open Privileged EX   EC Enable mode     Tab  3 2 shows main commands of Privileged EXEC Enable mode     terminal length Configures the number of lines of the current terminal   traceroute Traces a packet route   Displays users accessing the system via telnet or console        Tab 3 2 Main Command of Privileged EXEC Enable Mode    SMC7824M VSW    Management Guide  TigerAccess    EE    3 1 3    3 1 4    SMC7824M VSW       CLI    Global Configuration Mode    In Global Configuration mode  you can configure general functions of the system  You can  also open another configuration mode from this mode     To open Global Configuration mode  enter the configure terminal command  and then  the system prompt will be changed from SWITCH  to SWITCH  config       es  e ees       configure terminal Opens Global Configuration mode     Tab  3 3 shows main commands of Global Configuration mode     CO ENT  CO ESTACA  COM ELOTE  CAT ENT  Frase    interface Opens Interface Configuration mode to configure a s
427. ter installing the system  the switch is supposed to examine that each port is rightly  connected to network and management PC  You can connect to the system to configure  and manage the switch  This section provides instructions how to change password for  system connection and how to connect to the system through telnet as the following order   e Connecting to the Console Port   e System Login   e Password for Privileged EXEC Enable Mode   e Changing Login Password   e Login Password Recovery Process   e Management for System Account   e   Limiting Number of Users   e Auto Log out   e Telnet Access     System Rebooting    Connecting to the Console Port    To begin setup  you must connect the Console to the RJ45 Console port  To connect the  cable  perform the following steps     Attach the RJ45 connector on the cable to the RJ45 connector on the console port of the  switch     Connect the other end of the cable to one of the serial ports on your workstation     Open your terminal emulation software and configure the COM port settings to which you  have connected the cable  The settings should be set to match the default settings for the  switch  which are    e 9600 bps   e 8 data bits   e 1 stop bit   e No parity   e No flow control    System Login  After installing the switch  finally make sure that each port is correctly connected to PC for    network and management  And then  turn on the power and boot the system as follows     Step 1  When you turn on the switch  bootin
428. the entry to IGMP snooping table when it exists  dhcp snoop binding eee on the DHCP snooping binding table   oba    no ip igmp filter port PORTS Adds the entry to IGMP snooping table irrespective of  permit dhcp snoop binding DHCP snooping binding table     To allow or discard IGMP messages by message type on a port  use the following com   mand      e e See    ip igmp filter port PORTS packet          type  reportv1   reportv2   re  Filters the specified IGMP messages on a port     portv3   query   leave   all   Global  no ip igmp filter port PORTS    packet    type  reportv1   reportv2    Disables filtering the specified IGMP messages on a    port          reportv3   query   leave   all     SMC7824M VSW    Management Guide  TigerAccess    EE    9 2 7 2    9 2 7 3    9 2 8    SMC7824M VSW       CLI    IGMP Throttling    You can configure the maximum number of multicast groups that a host on a port can join   To specify the maximum number of IGMP groups per port  use the following command        C ma See    Specifies the maximum number of IGMP groups that    ip igmp max groups port PORTS hosts on specific port can join   count  lt 1 2147483647 gt  PORTS  port number    1 2147483647  number of IGMP groups  Global    ip igmp max groups port all Specifies the maximum number of IGMP groups that    count  lt 1 2147483647 gt  hosts on all ports can join     no ip igmp max groups port 8 i  Deletes a specified maximum number of IGMP groups    PORTS   all     To specify the maximum nu
429. the link failure or recovery       Test Packet  TP   This is used to determine if any loops occur in the Ethernet ring       RM Link Down  This is used to inform the normal nodes of unblocking status of its  secondary port caused by link failure       RM Link Up  This is used to inform the normal nodes of re blocking status of its  secondary port caused by link recovery     ERP implementation of the switch has the following restrictions  so you should keep in  mind those before configuring ERP     e ERP can not be configured with STP  If ERP is enabled in the system  STP is  automatically disabled    e Aprimary and secondary port number should not be same    e ERP mechanism should be used for Ethernet Ring topology only     If the link failure occurs  the nodes adjacent  Node A 4 B  to the failure detect their state  and send Link Down message to RM node  If an intermediate node  Node C  between  RM node and a node adjacent to link failure receives Link Down message  it starts to per   form Forwarding Database  FDB  Flushing  FDB Flushing consists in erasing in the for   warding database of the switch all MAC entries of the protected VLANs that are for   warded to the ring ports  The Flushing of FDB is always followed by a period with learning  disabled  To prevent wrong MAC learning due to the remaining packets in the buffer  a  node does not learn MAC addresses during a configured learning disable time     SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW 
430. the other switches managed by Master switch are named as Slave switch   Regardless of installed place or connection state  Master switch can check and manage  all Slave switches     It is possible to configure stacking function for switches from 2 to 16     Switch Group    You should configure all the switches configured with stacking function to be in the same  VLAN  To configure the switches as a switch group which belongs in the same VLAN  use  the following command      e e Se       stack device NAME Global Configures device name or VID     SMC7824M VSW    Management Guide  TigerAccess    EE    LE     8 7 2    8 7 3    8 7 4    SMC7824M VSW    CLI    For managing the stacking function  the port connecting Master switch and Slave switch  must be in the same VLAN     Designating Master and Slave Switch    Designate Master switch using the following command      e e res    stack master   Global Sets the switch as a master switch     After designating Master switch  register Slave switch for Master switch  To register Slave  switch or delete the registered Slave switch  use the following command     na m   en    stack add MACADDR   DE  Registers slave switch   SCRIPTION  Global MACADDR  MAC address         stack del MAC ADDR   del MAC ADDR   Deletes slave swith    slave switch        To make stacking operate well  it is required to enable the interface of Slave switch  The  switches in different VLANs cannot be added to the same switch group     You should designate Slave swi
431. the physical port that is a member of aggregated port  To configure the member  port  use the following command     IC EC O  Configures physical port that is member port of aggre   lacp port PORTS Bridge gator  select the port number s  that should be enabled  for LACP     To disable LACP and delete the configuration of LACP  use the following command      e e een    Disables LACP for designated Aggregator number        no lacp aggregator AGGREGA  l  select the aggregator ID that should be disabled for    Bridge LACH    Deletes member port of Aggregator  select the port  no lacp port PORTS  number s  that should be disabled for LACP     TIONS       253    CLI    254    8 2 2 2    8 2 2 3    8 2 2 4    Management Guide  TigerAccess    EE    Operation Mode    After configuring the member port  configure the LACP operation mode of the member  port  This defines the operation way for starting LACP operation  You can select the op   eration mode between the active and passive mode     The active mode allows the system to start LACP operation regardless of other con   nected devices  On the other hand  the passive mode allows the system to start LACP  operation only when receiving LACP messages from other connected devices     In case of an LACP connection between 2 switches  if the member ports of both switches  are configured as the passive mode  the link between the switches cannot be established     To configure the operation mode of the member port  use the following command  
432. the route of  A E D C       e              Reply Request    yl     Sc  PING test to C Gester       N     EL    D    O    Fig  6 2 IP Source Routing  To perform ping test as the route which the manager designated  use the following steps     Step 1  Enable IP source routing function from the equipment connected to PC which the PING  test is going to be performed     To enable disable IP source routing in the switch  use the following command      e e Se       Enable IP source routing function   Global    no ip icmp source route Disable IP source routing function     Step 2  Perform the ping test from PC as the designate route with the ping command     Tracing Packet Route    You can discover the routes that packets will actually take when traveling to their destina   tions  To do this  the traceroute command sends probe datagrams and displays the  round trip time for each node     129    CLI    130    6 3 4    Management Guide  TigerAccess    EE    If the timer goes off before a response comes in  an asterisk     is printed on the screen     Semer pon  traceroute  DESTINATION   Traces packet routes through the network   Enable    traceroute ip DESTINATION  traceroute icmp DESTINATION    The followings are the configurable options to trace the routes     DESTINATION  IP address or host name       Items Description    Protocol  ip  Supports ping test  Default is IP   Sends ICMP echo message by inputting IP address or host name of  Target IP address BN i    destination in order t
433. thentication method  use the following command     e e Se    Sets a system authentication method     local  console access    login  local   remote   radius   Global remote  telnet SSH access  oba  tacacs   host  primary radius  RADIUS authentication    tacacs  TACACS  authentication  host  nominal system authentication  default        47    CLI    48    4 2 4    4 2 4 1    4 2 4 2    4 2 4 3    4 2 4 4    Management Guide  TigerAccess    EE    RADIUS Server    RADIUS Server for System Authentication    To add delete a RADIUS server for system authentication  use the following command      e e Se    Adds a RADIUS server with its information   login radius server A DCD A B C D  IP address    KEY  auth_port PORT acct_port KEY  authentication key value  PORT  ES auth_port  authentication port  optional     acct_port  accounting port  optional     no login radius server  4 B C D  Deletes an added RADIUS server     You can add up to 5 RADIUS servers        RADIUS Server Priority    To specify the priority of a registered RADIUS server  use the following command      e See    Specifies a priority of RADIUS server   Global A B C D  IP address  1 5  priority of RADIUS server    login radius server move  A B C D  lt 1 5 gt        Timeout of Authentication Request    After an authentication request  the switch waits for a response from a RADIUS server for  specified time  To specify a timeout value  use the following command      e e Se    Specifies a timeout value   login radius timeo
434. ticipat   ing in the VLANs accept packets bearing VLAN tags and transmit them to the port VLAN  ID     The below functions are explained   e Creating VLAN   e Specifying PVID   e Assigning Port to VLAN   e Deleting VLAN    235    CLI    8 1 1 1    8 1 1 2    8 1 1 3    8 1 1 4    236    Management Guide  TigerAccess    EE    Creating VLAN    To configure VLAN on user   s network  use the following command      ee ee      Creates new VLAN by assigning VLAN ID   vlan create VLANS Bridge i i i  VLANS  VLAN ID  1 4094  multiple entries possible        The variable VLANS is a particular set of bridged interfaces  The frames are bridged only  among interfaces in the same VLAN     Specifying PVID    By default  PVID 1 is specified to all ports  You can also configure a PVID  To configure a  PVID in a port  use the following command      e e re    Configures a PVID     vlan pvid PORTS PVIDS PORTS  port numbers  PVIDS  PVID  1 4094  multiple entries possible        Assigning Port to VLAN    To assign a port to VLAN  use the following command      e mee    Assigns a port to VLAN   VLANS  VLAN ID  1 4094   PORTS  port number    vlan add VLANS PORTS  tagged    untagged     Deletes associated ports from specified VLAN   vlan del VLANS PORTS VLANS  VLAN ID  1 4094   PORTS  port number to be deleted       When you assign several ports to VLAN  you have to enter each port separated by a  comma without space or use dash mark     to arrange port range     Deleting VLAN    To delete VLAN  use t
435. time for forwarding entries     To specify the maximum number of forwarding entries on the McFDB  use the following  command      e me See    Specifies the maximum number of forwarding entries  on the McFDB   Global 256 65535  number of entries  default  5000     SR Deletes the specified maximum number of forwarding  no ip mcfdb aging limit S  entries     Displaying McFDB Information    ip mcfdb aging time     lt 10 10000000 gt  Global       ip mcfdb aging limit   lt 256 65535 gt        To display McFDB information  use the following command     n   See      Shows the current aging time and maximum number of  show ip mcfdb    forwarding entries   Enable    Shows the current forwarding entries   VLAN  VLAN ID  1 4094   A B C D  multicast group address    show ip mcfdb aging entry  vlan Global  VLAN   group A B C D   mac  Bridge  based   detail     mac based  lists entries on a MAC address basis       355    CLI    356    9 2 2    Management Guide  TigerAccess    EE    To clear multicast forwarding entries  use the following command      e e See    Clears multicast forwarding entries   clear ip mcfdb      vlan VLAN     all forwarding entries  Enable VLAN  VLAN ID  1 4094     Global Clears a specified forwarding entry     clear ip mcfdb vlan VLAN group    roup  multicast grou  A B C D source A B C D JOU group    source  multicast source       IGMP Snooping Basic    Layer 2 switches normally flood multicast traffic within the broadcast domain  since it has  no entry in the Layer 
436. timer     To enable auto log out function  use the following command      e e een    Enables auto log out     exec timeout  lt 1 35791 gt    lt 0 59 gt   1 35791  time unit in minutes  by default 10 minutes     Global 0 59  time unit in seconds       exec timeout 0 Disables auto log out        To display a configuration of auto logout function  use the following command      e mae    show exec timeout Shows a configuration of auto logout function        The following is an example of configuring auto log out function as 60 seconds and view   ing the configuration     SWITCH  config    exec timeout 60  SWITCH  config    show exec timeout  Log out time   60 seconds   SWITCH  config       Telnet Access    To connect to a remote host via telnet  use the following command      e e Se       Connects to a remote host   telnet DESTINATION  TCP PORT  Enable  DESTINATION  IP address or host name    In case of telnet connection  you need to wait for the  OK  message  when you save a  system configuration  Otherwise  all changes will be lost when the telnet session is dis   connected     SMC7824M VSW    Management Guide  TigerAccess    EE    4 1 10    4 1 10 1    SMC7824M VSW    CLI    SWITCH  write memory   OK   SWITCH     The system administrator can disconnect users connected from remote place  To discon   nect a user connected through telnet  use the following command      ss  e ees       disconnect 77 Y NUMBER Disconnects a user connected through telnet     The following is an examp
437. tion  you  need to delete the RMON history and configure it again     Deleting Configuration of RMON History    When you need to change a configuration of RMON history  you should delete an existing  RMON history     To delete an RMON history  use the following command     n   en       Deletes the RMON history of specified number  enter  no rmon history  lt 1 65535 gt  Global  the value for deleting     Displaying RMON History  To display an RMON history  use the following command      e e See       show  running config rmon   i All Shows a configured RMON history   history    Always the last values will be displayed but no more than the number of the granted  buckets     157    CLI    158    7 4 2    7 4 2 1    7 4 2 2    7 4 2 3    Management Guide  TigerAccess    EE    The following is an example of displaying RMON history     SWITCH  config rmonhistory 5    show running config rmon history  l   rmon history y   owner test   data source ifindex hdlcl   interval 60   requested buckets 25   active    SWITCH  config rmonhistory 5        RMON Alarm    You need to open RMON Alarm Configuration mode first to configure RMON alarm      e e Se       Opens RMON Alarm Configuration mode   rmon alarm  lt 1 65535 gt  Global  1 65535  index number    Subject of RMON Alarm    You need to configure RMON alarm and identify subject using many kinds of data from  alarm  To identify subject of alarm  use the following command      e e een    Identifies subject using relevant data  enter the n
438. ty VLAN  8 3 8 5 Displaying Configuration  To display the configuration after configuring PVSTP  use the following command    en re eme  Enable l l 8 l  l Shows all configurations of a specific vlan id   show spanning tree vlan VLANS Global  l VLANS  VLAN ID  1 4094   Bridge  S Shows information of a specific vlan id on active inter   show spanning tree vlan VLANS f  ace   active  detail  l l l l l  detail  detailed PVSTP information  as option    show spanning tree vlan VLANS      Shows information of the blocked ports  blockedport  show spanning tree vlan VLANS Shows detailed information of the specific vlan id   detail  active  VLANS  VLAN ID  1 4094   show spanning tree vlan VLANS Shows information of root inconsistency state   inconsistentports VLANS  VLAN ID  1 4094   show spanning tree vlan VLANS  bridge    address   detail   for  Shows information of the bridge status and configura   ward time   hello time   id   max  tion of a specific vlan id  age   protocol   priority  system  VLANS  VLAN ID  1 4094   id      show spanning tree vlan VLANS  root     address   cost   detail   Shows the status and configuration for the root bridge  forward time   hello time   id   of a specifiec vlan id   max age   port   priority  system  VLANS  VLAN ID  1 4094   id      show spanning tree vlan VLANS  port PORTS    active  detail    i l D  i f Shows information of vlan id for specified port   cost   detail  active    edgeport      l VLANS  VLAN ID  1 4094   inconsistency   rootcost  
439. ual Local Area Network  Video on Demand   Virtual Path Identifier   Virtual Private Network    Any form of DSL    383    CLI Management Guide  TigerAccess    EE    384 SMC7824M VSW    FOR TECHNICAL SUPPORT  CALL     From U S A  and Canada  24 hours a day  7 days a week    800  SMC 4 YOU   949  679 8000  Fax   949  679 1481    From Europe  Contact details can be found on  www smc com    INTERNET    E mail addresses   techsu    Driver updates     ort smc com    http   www smc com index cfm action tech support drivers downloads    World Wide Web   http   www smc com    FOR LITERATURE OR ADVERTISING RESPONSE  CALL     U S A  and Canada   Spain    UK    France    Italy    Benelux    Central Europe   Nordic    Eastern Europe     Sub Saharian Africa     North West Africa   CIS    PRC    Taiwan    Asia Pacific   Korea    Japan    Australia    India      800  SMC 4 YOU   34 91 352 00 40   44  0  1932 866553   33  0  41 38 32 32   39  0  335 5708602   31 33 455 72 88    49  0  89 92861 0   46  0  868 70700   34  93 477 4920   216 712 36616    34 93 477 4920    7  095  7893573   86 10 6235 4958   886 2 8797 8006    65  6 238 6556   82 2 553 0860   81 45 224 2332   61 2 8875 7887   91 22 8204437     Fax  949  679 1481  Fax 34 93 477 3774   Fax 44  0  118 974 8701  Fax 33  0  41 38 01 58  Fax 39 02 739 14 17  Fax 31 33 455 73 30  Fax 49  0  89 92861 230  Fax 46  0  887 62 62  Fax 34 93 477 3774   Fax 216 71751415   Fax 34 93 477 3774   Fax 7  095  789 35 73  Fax 86 10 6235 4962  Fax 886 2
440. uch as transceiver type  length   connector type  and vendor information of the SFP  However  you might not want to see  DMI polling information because it may result in CPU overload to collect DMI data via VC  interface     To enable or disable collecting DMI information from SFP mouldes  use the following  command      e e een       i i Specifies whether to collect DMI information from SFP  module dmi  enable   disable  Global ae  modules     121    CLI          122    Management Guide  TigerAccess    EE    This module DMI command is enabled by default  Thus  if you don t want to get DMI in   formation  configure this setting as disable     If disabled  the switch does not show DMI information of the SFP ports when using the  show port module info command     To display the configuration of DMI module  use the following command     CECR    Enable    show module dmi Global Displays the configuration result of DMI module     Bridge       This is an example of disabling the DMI module and displaying the setting result     SWITCH  config   module dmi disable  SWITCH  config    show module dmi    module diagnotics monitor dmi    disable  SWITCH  config       SMC7824M VSW    Management Guide  TigerAccess    EE    6 2    6 2 1    6 2 2    A    SMC7824M VSW    CLI    Configuration Management    You can verify if the system configurations are correct and save them in the system  This  section contains the following functions     e Displaying System Configuration  e Writing System Co
441. up specific query  This is used to determine if any hosts are listening to a par   ticular group     e Version 2 membership report  This is used by hosts to join a group  unsolicited  or to respond to membership que   ries  solicited        Leave group  This is used to explicitly leave a group     IGMPv2 Operation    An IGMP querier is the only router that sends membership query messages for a network  segment  In IGMP version 2  the querier is a router with the lowest IP address on the  subnet  If the router hears no queries during the timeout period  it becomes the querier     A host joins multicast groups by sending unsolicited membership report messages indi   cating its wish to receive multicast traffic for those groups  indicating that the host wants  to become a member of the groups      The querier sends general query messages periodically to discover which multicast  groups have members on the attached networks of the router  The messages are ad   dressed to the all hosts multicast group  which has the address of 224 0 0 1 with a time   to live  TTL  value of 1  If hosts do not respond to the received query messages for the  maximum response time advertised in the messages  a multicast router discovers that no  local hosts are members of a multicast group  and then stops forwarding multicast traffic  onto the local network from the source for the group     When hosts respond to membership queries from an IGMP querier  membership reports  from the hosts other than the
442. ut  lt 1 100 gt   Global 1 100  timeout value for a response  default  5     no no login radius timeout   no login radius timeout   timeout   Deletes a specified timeout value    a   Deletes a specified timeout value    timeout value        Frequency of Retransmit    In case of no response from a RADIUS server  the switch is supposed to retransmit an  authentication request  To set the frequency of retransmitting an authentication request   use the following command      e e een    Sets the frequency of retransmit   login radius retransmit  lt 1 10 gt   Global 1 10  frequency count  default  3     no   no login radius retransmit     no login radius retransmit   retransmit   Deletes a specified frequency count    a specified   Deletes a specified frequency count    count        SMC7824M VSW    Management Guide  TigerAccess    EE    4 2 5    4 2 5 1    4 2 5 2    4 2 5 3    4 2 5 4    SMC7824M VSW    CLI    TACACS  Server    TACACS  Server for System Authentication    To add delete the TACACS  server for system authentication  use the following command      e me See    Adds a TACACS  server with its information     login tacacs server A B C D KEY A B C D  IP address    Sie KEY  authentication key value    no login tacacs server  A B C D  Deletes an added TACACS  server     You can add up to 5 TACACS  servers        TACACS  Server Priority    To specify the priority of a registered TACACS  server  use the following command      e e Se    Specifies the priority of TACACS  server 
443. vergence of GU Z Iw 265    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig   Fig     8 21  8 22  8 23  8 24  8 25  8 26  8 27  8 28  8 29  8 30  8 31  8 32  8 33  8 34  8 35  8 36  8 37  8 38  8 39  9 1   9 2    CLI  Compatibility with  602 10 isis 266  Compatibility with  G02 V4 2  EE 266  Co anes To SW By  EE 267  CSrandISTO MSTP Z  EE 268  A en ao oe een ee 217  ROO Sad o as ce 280  Example of Layer 2 Network Design in RSTP Environment  287  Example of Layer 2 Network Design in MSTP Emronment 288  ERP Operation in case of Linnk Failure               ooccccoccncccccncccncnconnnononcncnononos 291  FRING  PROTO e DEE 291  Link Failure Recovery KENNEN ENEE 292  RNO RECOVE EE 292  A EEN 293  DHCP   t 302  Example of DHCP Relay Agent    315  DACP Option  2 Opera sia A tenes 321  DHCP Server Packet klterng    337  Example of Single IP Management      cooocnccncccnccccccnnccnoconcnnnconononcnncnnanencnnonens 338  Rate Limit and Flood Guard    343  IGMP Snooping in the L2 network         ooooncccoccncccccccnconoccncnoncononnnnoncnnanoncnnonons 348  IGMP SNOODIN riada 356    CLI    18    Tables    Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab   Tab     1 1  1 2  3 1  3 2  3 3  3 4  3 5  3 6  3    3 8  3 9  3 
444. vian fid VLANS FID Configures FID     VLAN Translation    VLAN Translation is simply an action of Rule  This function is to translate the value of  specific VLAN ID which classified by Rule  The switch makes Tag adding PVID on  Untagged packets  and use Tagged Packet as it is  That is  all packets are tagged in the  Switch  and VLAN Translation is to change the VLAN ID value of Tagged Packet in the  Switch  This function is to adjust traffic flow by changing the VLAN ID of packet     Step 1  Open Rule Configuration mode using the flow NAME create command   See Section 7 6 2 1     Step 2  Classify the packet that VLAN Translation will be applied by flow   See Section 7 6 2 2     Step 3  Designate the VLAN ID that will be changed in the first step by the match vlan  lt 1 4094 gt   command     Step 4  Open Bridge Configuration mode using the bridge command     Step 5  Add the classified packet to VLAN members of the VLAN ID that will be changed     Sample Configuration    Sample Configuration 1  Configuring Port based VLAN  The following is assigning br2  br3  and br4 to port 2  port 3  and port 4                 SWITCH  bridge    vlan create br2   SWITCH  bridge    vlan create br    SWITCH  bridge    vlan create br4   SWITCH  bridge    vlan del default 2 4  SWITCH  bridge    vlan add br2 2 untagged  SWITCH  bridge    vlan add br3 3 untagged  SWITCH  bridge    vlan add br3 3 untagged    SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI         vlan pvid 
445. when memory usage exceeds the threshold specified by  user  Also  when memory usage falls below the threshold  the trap message will be  shown to notify it    e cpu threshold is shown when CPU utilization exceeds the threshold specified by  user  Also  when CPU load falls below the threshold  trap message will be shown to  notify it    e port threshold is shown when the port traffic exceeds the threshold configured by  user  Also  when port traffic falls below the threshold  trap message will be shown    e temp threshold is shown when the system temperature exceeds the thresh old con     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    figured by user  Also  when system temperature falls below the threshold  trap mes   sage will be shown    e dhcp lease is shown when no more IP address is left in the DHCP pool  Even if this  occurs only in one DHCP pool of several pools  this trap message will be shown    e Tan module is shown when there is any status change of fan and module     il The system is configured to send all the SNMP traps by default     To enable the SNMP trap  use the following command      e e Se    i Configures the system to send SNMP trap when SNMP  snmp trap auth fail O A  authentication is fail     Configures the system to send SNMP trap when SNMP  snmp trap cold start  agent restarts     snmp trap link up PORTS Configures the system to send SNMP trap when a port   NODE  is connected to network     snmp trap link down PORTS Configures the system to
446. will be fulfilled if the construction and cabling is under   taken in accordance with the manual and the documents listed there in  e g  mounting in   structions  cable lists where necessary account should be taken of project specific docu   ments     Deviations from the specifications or unstipulated changes during construction  e g  the  use of cable types with lower screening values can lead to violation of the CE require   ments  In such case the conformity declaration is invalidated and the responsibility  passes to those who have caused the deviations     This is a class A product  In a domestic environment this product may cause radio refer   ence in which case the user may be required to take adequate measures     21    CLI    22    Management Guide  TigerAccess    EE    System Overview    The switch  which is IP VDSL  uses VDSL  Very high data rate Digital Subscriber Line   technologies so that users can be served voice communication and data communication  at the same time through existing telephone line  Since VDSL technology takes the tele   phone line  you do not need to install LAN line newly  Therefore  you can save the cost  and provide advanced service for users in apartments  buildings  and hotels     The switch supports maximum 100Mbps of upload and 100Mbps down load in case of  Symmetric  and up to 50 Mbps of upload and 100 Mbps of download or 10VLR Mbps of  upload 50VLR Mbps of download in case of Asymmetric     The switch offers 24 Port VDSL2 service int
447. will not be created because SWITCH A is blocked to    264 SMC7824M VSW    Management Guide CLI  TigerAccess    EE    SWITCH Band C  In this state  BPDU form root is transmitted to SWITCH B and C    through SWITCH A  To configure forwarding state of SWITCH A  SWITCH A negotiates  with SWITCH B and SWITCH C     ROOT    3  Forwarding  Switch A   7  wem       _    3  Negotiate between e  Switch A and Switch B Sy     Traffic Blocking     Fig 8 19 Network Convergence of 802 1w  2                emm         3  Negotiate between  Switch A and Switch C    Switch B Switch C          Switch D    SWITCH B has only edge designated port  Edge designated does not cause loop  so it is  defined in 802 1w to be changed to forwarding state  Therefore  SWITCH B does not  need to block specific port to forwarding state of SWITCH A  However since SWITCH C  has a port connected to SWITCH D  you should make blocking state of the port     ROOT           Switch A      4  Forwarding state 4  Forwarding stat    Switch B         Switch C    a    4  Block to make Forwarding  state of Switch A    Switch D    Fig  8 20 Network Convergence of 802 1w  3     SMC7824M VSW 265    CLI    266    8 3 2 4    8 3 3    Management Guide  TigerAccess    EE    It is same with 802 1d to block the connection of SWITCH D and SWITCH C  However   802 1w does not need any configured time to negotiate between switches to make for   warding state of specific port  So it is very fast progressed  During progress to forwarding  sta
448. x mdev   0 058 0 581 1 632 0 542 ms    SWITCH     When multiple IP addresses are assigned to the switch  sometimes you need to verify the  connection status between the specific IP address and network status     In this case  use the same process as ping test and then input the followings after ex   tended commands  It is possible to verify the connection between specific IP address and  network using the following command     The following is the information to use ping test for multiple IP addresses     nn A ee      Designates the address where the relative device should respond in  Source address or interface l  source ip address     T f ice  0  The service filed of QoS  Quality Of Service  in Layer 3 application  It  e of service  0       is possible to designate the priority for IP Packet     Decides whether Don   t Fragment  DB  bit is applied to Ping packet or  not  Default is no  If the user choose    yes     when the packets pass    Set DF bit in IP header   no     through the segment compromised with the smaller data unit  it pre   vents the packet to be Fragment  Therefore there could be error mes   sage     Data pattern  0xABCD  Configures data pattern  Default is OxABCD     Tab  6 3       Options for Ping for Multiple IP Addresses    127    CLI    128    6 3 2    Management Guide  TigerAccess    EE    SWITCH  ping   Protocol  ip     Target IP address  172 16 1 254   Repeat count  5   5   Datagram size  100   100   Timeout in seconds  2   2   Extended commands  n 
449. y     To delete the created account  use the following command     ICI   e O  user del NAME Global Delete the created account        To display a created account  use the following command      e e re    Enable  Global Shows a created account        Bridge    Security Level    For the switch  it is possible to configure the security level from O to 15 for a system ac   count  The level 15  as the highest level  has a read write authority  The administrator can  configure from level O to level 14  The administrator decides which level user uses which  commands in which level  As the basic right from level O to level 14  it is possible to use  exit and help command in Privileged EXEC View mode and it is not possible to access to  Privileged EXEC Enable mode     SMC7824M VSW    Management Guide CLI  TigerAccess    EE    To define the security level and its authority  use the following command     Command Description    privilege view level  lt 0 15 gt    COMMAND   all     privilege enable level  lt 0 15 gt    COMMAND   all     privilege configure level  lt 0 15 gt    COMMAND   all     privilege interface level  lt 0 15 gt    COMMAND   all    privilege  flow   policer   policy   level  lt 0 15 gt   COMMAND   all   privilege bridge level  lt 0 15 gt    COMMAND   all    privilege rmon alarm level   lt 0 15 gt   COMMAND   all   privilege rmon event level   lt 0 15 gt   COMMAND   all   privilege rmon history level   lt 0 15 gt   COMMAND   all   privilege dhcp pool level    lt 0 15 gt
450. y    To specify an action to permit or deny an access to an IGMP group range  use the follow   ing command      e e re       IGMP   permit   deny  Specifies an action for an IGMP group range   rofile    371    CLI    372    Management Guide  TigerAccess    EE    Enabling IGMP Filtering    To enable IGMP filtering for a port  a configured IGMP profile needs to be applied to the  port     To apply an IGMP profile to ports to enable IGMP filtering  use the following command      e e ees    Applies an IGMP profile to ports  PORTS  port number  1 2147483647  IGMP profile number    no ip igmp filter port PORTS Releases an applied IGMP profile     ip igmp filter port PORTS profile     lt 1 2147483647 gt        Before enabling IGMP filtering  please keep in mind the following restrictions     e Plural IGMP profiles cannot be applied to a single port    e IGMP snooping must be enabled before enabling IGMP filtering    e To delete a created IGMP profile  all ports where the profile applied must be released   e IGMP filtering only supports IGMPv2     By the following command  this switch can permit or deny the IGMP packets by referring  to its DHCP snooping binding table  This reference enables the system to permit IGMP  messages only when the source IP address and MAC address of host have identified  from the DHCP snooping binding table     To permit discard IGMP packets for the hosts authorized by the DHCP snooping  use the  following command     ip igmp filter port PORTS permit Adds 
451. y to go to Boot Mode  0  Boots    Step 2  To enable the MGMT interface to communicate with TFTP server  you need to configure a  proper IP address  subnet mask and gateway on the interface     376 SMC7824M VSW    Management Guide  TigerAccess    EE    SMC7824M VSW    CLI    To configure an IP address  use the following command      e e See    ip A B C D B Configures an IP address   oot  ip Shows a currently configured IP address        To configure a subnet mask  use the following command      ze me See    netmask A DCD Configures a subnet mask   e g  255 255 255 0     Boot  netmask   Shows a currently configured subnet mask     To configure a default gateway  use the following command      Sen re en  gateway A DCD E Configures a default gateway   oot  gateway Shows a currently configured default gateway           To display a configured IP address  subnet mask and gateway  use the following com   mand        ae a a currently configured IP address  subnet mask  00  and gateway     The configured IP address  subnet mask and gateway on the MGMT interface are limited  to the boot mode only     The following is an example of configuring an IP address  subnet mask and gateway on  the MGMT interface in the boot mode     Boot  ip 10 27 41 83  Boot gt  netmask 255 255 255 0  Boot gt  gateway 10 27 41 254    Boot gt  show       IP   10 27 41 83  GATEWAY   110 27 41 254  NETMASK   12557255725590   MAC   00 dqd0 cb 00 0d 83  MAC1   ffef fef fefie RE EE  Boot gt     377    CLI    378    
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
WAZA 26号 - 富士テクノソリューションズ  DS41  MANUEL D`UTILISATION PARAPENTE: MAGIC  DeLOCK Riser PCIe x16  Repeatable data entRy with eid, no weighing oR dRafting - Tru-Test      HP Universal Port Replicator  1 安全に使用するために はじめに 2 ゲーム紹介 3 操作方法 4 1Pと2Pの    Copyright © All rights reserved. 
   Failed to retrieve file