PowerFlow 2 10G - MN
PowerFlow 2 10G - MN
INSTALLATION AND
PowerFlow-2-10G
Industrial 10G Core Switch
Demarcation/Aggregation Device
Version 1.0
PowerFlow-2-10G
Industrial 10G Core Switch
Version 1.0
Installation and Operation Manual
Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the PowerFlow-2-
10G and any software components contained therein are proprietary products of RAD protected
under international copyright law and shall be and remain solely with RAD.
The PowerFlow-2-10G product name is owned by RAD. The PowerFlow-2-10G product name is
owned by RAD. No right, license, or interest to such trademark is granted hereunder, and you
agree that no such right, license, or interest shall be asserted by you with respect to such
trademark. RAD products/technologies are protected by registered patents. To review specifically
which product is covered by which patent, please see ipr.rad.com. The RAD name, logo,
logotype, and the product names MiNID, Optimux, Airmux, IPmux, and MiCLK are registered
trademarks of RAD Data Communications Ltd. All other trademarks are the property of their
respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
PowerFlow-2-10G. You are prohibited from, and shall not, directly or indirectly, develop, market,
distribute, license, or sell any product that supports substantially similar functionality as the
PowerFlow-2-10G, based on or derived in any way from the PowerFlow-2-10G. Your undertaking
in this paragraph shall survive the termination of this Agreement.
This Agreement is effective upon your opening of the PowerFlow-2-10G package and shall
continue until terminated. RAD may terminate this Agreement upon the breach by you of any
term hereof. Upon such termination by RAD, you agree to return to RAD the PowerFlow-2-10G
and all copies and portions thereof.
For further information contact RAD at the address below or contact your local distributor.
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the PowerFlow-2-10G to be delivered
hereunder shall be free of defects in material and workmanship under normal use and service for
a period of twelve (12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the PowerFlow-2-10G, and in no
event shall RAD's liability exceed the purchase price of the PowerFlow-2-10G.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to PowerFlow-2-10G and for ensuring that replacements and other adjustments required
in connection with the said warranties are satisfactory.
Software components in the PowerFlow-2-10G are provided "as is" and without warranty of any
kind. RAD disclaims all warranties including the implied warranties of merchantability and fitness
for a particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the PowerFlow-2-
10G shall not exceed the sum paid to RAD for the purchase of the PowerFlow-2-10G. In no event
shall RAD be liable for any indirect, incidental, consequential, special, or exemplary damages or
lost profits, even if RAD has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal waste at
the end of its life cycle. Upon termination of the unit’s use, customers should
provide for its collection for reuse, recycling or other form of environmentally
conscientious disposal.
ii PowerFlow-2-10G
Installation and Operation Manual Front Matter
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates
potential safety hazards regarding product operation or maintenance to
operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable will be attached near
the optical transmitter. The laser warning symbol may be also attached.
Warning Please observe the following precautions:
• Before turning on the equipment, make sure that the fiber optic cable is
intact and is connected to the transmitter.
• Do not attempt to adjust the laser drive current.
• Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
• The use of optical devices with the equipment will increase eye hazard.
• Use of controls, adjustments or performing procedures other than those
specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of
this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this product. No installation, adjustment, maintenance or repairs
should be performed by either the operator or the user.
PowerFlow-2-10G iii
Front Matter Installation and Operation Manual
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
iv PowerFlow-2-10G
Installation and Operation Manual Front Matter
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
PowerFlow-2-10G v
Front Matter Installation and Operation Manual
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Attention Pour réduire les risques s’incendie, utiliser seulement des conducteurs de
télécommunications 26 AWG ou de section supérieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
vi PowerFlow-2-10G
Installation and Operation Manual Front Matter
PowerFlow-2-10G vii
Front Matter Installation and Operation Manual
Symboles de sécurité
Ce symbole peut apparaitre sur l'équipement ou dans le texte. Il indique des
risques potentiels de sécurité pour l'opérateur ou le personnel de service,
quant à l'opération du produit ou à sa maintenance.
Avertissement
viii PowerFlow-2-10G
Installation and Operation Manual Front Matter
Certains produits peuvent être équipés d'une diode laser. Dans de tels cas,
Français
une étiquette indiquant la classe laser ainsi que d'autres avertissements, le
cas échéant, sera jointe près du transmetteur optique. Le symbole
d'avertissement laser peut aussi être joint.
Avertissement
Veuillez observer les précautions suivantes :
• Avant la mise en marche de l'équipement, assurez-vous que le câble de
fibre optique est intact et qu'il est connecté au transmetteur.
• Ne tentez pas d'ajuster le courant de la commande laser.
• N'utilisez pas des câbles ou connecteurs de fibre optique cassés ou sans
terminaison et n'observez pas directement un rayon laser.
• L'usage de périphériques optiques avec l'équipement augmentera le
risque pour les yeux.
• L'usage de contrôles, ajustages ou procédures autres que celles
spécifiées ici pourrait résulter en une dangereuse exposition aux
radiations.
ATTENTION : Le rayon laser peut être invisible !
Les utilisateurs pourront, dans certains cas, insérer leurs propres émetteurs-récepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas être tenue responsable de
tout dommage pouvant résulter de l'utilisation d'émetteurs-récepteurs non conformes. Plus
particulièrement, les utilisateurs sont avertis de n'utiliser que des produits approuvés par
l'agence et conformes à la réglementation locale de sécurité laser pour les produits laser de
classe 1.
Respectez toujours les précautions standards de sécurité durant l'installation, l'opération et la
maintenance de ce produit. Seul le personnel de service qualifié et autorisé devrait effectuer
l'ajustage, la maintenance ou les réparations de ce produit. Aucune opération d'installation,
d'ajustage, de maintenance ou de réparation ne devrait être effectuée par l'opérateur ou
l'utilisateur.
PowerFlow-2-10G ix
Front Matter Installation and Operation Manual
Connexion d'alimentation CC
Sauf s'il en est autrement spécifié dans le manuel, l'entrée CC de l'équipement est flottante par
rapport à la mise à la terre. Tout pôle doit être mis à la terre en externe.
A cause de la capacité de courant des systèmes à alimentation CC, des précautions devraient
être prises lors de la connexion de l'alimentation CC pour éviter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isolée de toute source de courant CA (secteur) et que
l'installation est conforme à la réglementation locale.
La capacité maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
bâtiment devrait avoir une capacité élevée de rupture et devrait fonctionner sur courant de
court-circuit dépassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des câbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'équipement et fixez-le
en position OFF. Lors de la connexion de câbles d'alimentation CC, connectez d'abord le
conducteur de mise à la terre à la borne correspondante, puis le pôle positif et en dernier, le
pôle négatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapté et approuvé devrait être intégré à l'installation du
bâtiment.
Le disjoncteur devrait déconnecter simultanément les deux pôles si l'alimentation en courant CC
est flottante.
x PowerFlow-2-10G
Contents
Chapter 1. Introduction
1.1 Overview .............................................................................................................................. 1-1
1.2 Product Description .............................................................................................................. 1-1
PowerFlow-2-10G .............................................................................................................. 1-2
1.3 PowerFlow-2 Features ......................................................................................................... 1-2
1.4 Product Specifications .......................................................................................................... 1-3
PowerFlow-2-10G i
Table of Contents Installation and Operation Manual
ii PowerFlow-2-10G
Installation and Operation Manual Table of Contents
PowerFlow-2-10G iii
Table of Contents Installation and Operation Manual
3.9.11.7 (config)# erps <group> sub port0 interface <port_type> <port0> { { port1
interface <port_type> <port1> } | { interconnect <major_ring_id> [ virtual-channel ] } } . 56
3.9.11.8 (config)# erps <group> topology-change propagate ........................................ 57
3.9.11.9 (config)# erps <group> version { 1 | 2 } ........................................................... 57
3.9.11.10 (config)# erps <group> vlan { none | [ add | remove ] <vlans> } ..................... 58
3.9.12 (config-if)# excessive-restart ................................................................................... 58
3.9.13 (config-if)# flowcontrol { on | off } .......................................................................... 59
3.9.14 (config)# gvrp .......................................................................................................... 59
3.9.14.1 (config)# gvrp .................................................................................................. 59
3.9.14.2 (config)# gvrp max-vlans .................................................................................. 60
3.9.14.3 (config)# gvrp time .......................................................................................... 60
3.9.14.4 (config-if)# gvrp ............................................................................................... 61
3.9.15 (config)# hostname ................................................................................................. 62
3.9.16 (config)# interface ................................................................................................... 62
3.9.16.1(config)# interface ( <port_type> [ <plist> ] ) ................................................... 62
3.9.16.2 (config)# interface vlan .................................................................................... 63
3.9.17 (config)# ip .............................................................................................................. 64
3.9.17.1 (config)# ip arp inspection ............................................................................... 64
3.9.17.2 (config)# ip arp inspection entry interface ........................................................ 64
3.9.17.3 (config)# ip arp inspection translate ................................................................. 65
3.9.17.4 (config)# ip arp inspection vlan ........................................................................ 65
3.9.17.5 (config)# ip arp inspection vlan <in_vlan_list> logging ....................................... 66
3.9.17.6 (config)# ip dhcp excluded-address.................................................................. 66
3.9.17.7 (config)# ip dhcp pool ...................................................................................... 67
3.9.17.8 (config)# ip dhcp relay ..................................................................................... 79
3.9.17.9 (config)# ip dhcp relay information circuit-id format ........................................ 79
3.9.17.10 (config)# ip dhcp relay information option ..................................................... 80
3.9.17.11 (config)# ip dhcp relay information policy {drop | keep |replace} .................... 80
3.9.17.12 (config)# ip dhcp relay information remote-id ............................................... 81
3.9.17.13 (config)# ip dhcp relay information remote-id format .................................... 81
3.9.17.14 (config)# ip dhcp server ................................................................................. 82
3.9.17.15 (config)# ip dhcp snooping ............................................................................ 82
3.9.17.16 (config)# ip dhcp snooping vlan ..................................................................... 83
3.9.17.17 (config)# ip dns proxy .................................................................................... 83
3.9.17.18 (config)# ip helper-address ............................................................................ 84
3.9.17.19 (config)# ip http secure-server ...................................................................... 84
3.9.17.20 (config)# ip http secure-redirect .................................................................... 85
3.9.17.21 (config)# ip igmp host-proxy .......................................................................... 85
3.9.17.22 (config)# ip igmp snooping ............................................................................ 86
3.9.17.23 (config)# ip igmp snooping vlan ..................................................................... 86
3.9.17.24 (config)# ip igmp ssm-range .......................................................................... 87
3.9.17.25 (config)# ip igmp unknown-flooding .............................................................. 87
3.9.17.26 (config)# ip name-server ................................................................................ 87
3.9.17.27 (config)# ip route........................................................................................... 88
3.9.17.28 (config)# ip routing ........................................................................................ 89
3.9.17.29 (config)# ip source binding interface .............................................................. 89
3.9.17.30 (config)# ip ssh .............................................................................................. 90
3.9.17.31 (config)# ip verify source ............................................................................... 91
3.9.17.32 (config)# ip verify source translate ................................................................ 91
3.9.17.33 (config-if)# ip arp inspection check-type ....................................................... 91
3.9.17.34 (config-if)# ip arp inspection check-vlan ........................................................ 92
3.9.17.35 (config-if)# ip arp inspection logging .............................................................. 92
3.9.17.36 (config-if)# ip arp inspection trust .................................................................. 92
3.9.17.37 (config-if)# ip dhcp snooping trust ................................................................ 93
iv PowerFlow-2-10G
Installation and Operation Manual Table of Contents
PowerFlow-2-10G v
Table of Contents Installation and Operation Manual
vi PowerFlow-2-10G
Installation and Operation Manual Table of Contents
PowerFlow-2-10G vii
Table of Contents Installation and Operation Manual
viii PowerFlow-2-10G
Installation and Operation Manual Table of Contents
PowerFlow-2-10G ix
Table of Contents Installation and Operation Manual
x PowerFlow-2-10G
Installation and Operation Manual Table of Contents
PowerFlow-2-10G xi
Table of Contents Installation and Operation Manual
xii PowerFlow-2-10G
Chapter 1
Introduction
1.1 Overview
In this chapter we will introduce the various PowerFlow-2-10G models available
for Fast Ethernet, Gigabit Ethernet and 10Gig Ethernet. These models can be
mounted in a 19” rack. Chapter 2 will describe the mounting and installation
methods. All the models in this series utilize almost identical management
interfaces, whether using serial console and CLI (command line interface)
commands, Telnet, SSH, HTTP (Web GUI) or SNMP (Simple Network Management
Protocol). Chapter 4 will detail all of the configuration settings by using an easy
to point and click Web interface which can be accessed from any available web
browser.
This chapter details the features of each model in this series. Basically, the
models have three input power types:
• Redundant 48VDC
• Redundant AC power
PowerFlow-2-10G
PowerFlow-2-10G is an Industrial grade core switch for commercial temperature
range of -10°C to +60°C. There are 24 100/1000M SFP with 4 GbE Combo ports
and 4 10GbE SFP+. PowerFlow-2-10G offers three type of power supply on the
rear panel. Users can choose 2 AC powers, 2 DC powers or the combination of
one AC and one DC power. On the rear panel, a 3-pin Alarm Relay terminal block
is also provided to notify alarm events when programmable events occur. See
below for overview for front panel and rear panel.
IEEE 802.3x for full duplex mode, back pressure for half
Flow Control
duplex mode
MTU 9600 Bytes (Jumbo Frames)
MAC Table 8K
Dimensions 315 mm (D) x 440 mm (W) x 43.5 mm (H)
Mechanical
Power Supply
Redundant AC Model: 2 x Isolated High Voltage 110/220 VAC
(88~264VAC)
Redundant DC Model: 2 x Isolated Low Voltage 24/48 VDC
(18~60VDC)
Operating Temp. -10°C~60°C
Environment
EMC CE
EMI FCC Part 15 sub B class A, CE EN55022 Class A
Immunity &
Emission for Heavy
EN61000-6-2, EN61000-6-4
Industrial
Certifications
Environment
EN61000-4-2 (ESD) Level 3, Criteria B
EN61000-4-3 (RS) Level3, Criteria A
EN61000-4-4 (Burst) Level3, Criteria A
EMS EN61000-4-5 (Surge) Level3, Criteria B
EN61000-4-6 (CS) Level3, Criteria A
EN61000-4-8 (PFMF, Magnetic Field) Field Strength:
300A/m, Criteria A
Safety UL60950-1
Railway Traffic EN50121-4
Shock EN60068-2-27
Freefall EN60068-2-32
Vibration EN60068-2-6
No. Description
1 LED indicators
5 Management Port
6 Console Port
2.2 Connections
100/1000M SFP
On the front panel, 4 combo ports that are either SFP slot (100/1000Mbps) or RJ-
45 UTP (10/100/1000M) interface are provided. Each of these combo ports has
associated LEDs which indicate the active link state and the detected speed of
the interface. A green indicates a link and a speed of 100M, while yellow color
indicates a link and speed of 1000M.
For 10G fiber connection, PowerFlow-2-10G switches support 4 10G SFP+ slots
(labeled 25~28). Users can use any compatible 10G SFP+ fiber transceiver for
network connection.
PowerFlow-2-10G has a terminal console port for local management via a serial
terminal. The terminal provides management via a CLI (Command Line Interface)
which will be familiar to many networking engineers. For most users, the CLI can
be used to initially configure TCP/IP access so that further configuration can be
completed via the GUI (Graphical User Interface) using a web browser (Chrome,
IE, Firefox etc).
to PC COM Port
Pins
Ref. Definition Direction
DB9 RJ-45
2 3 RxD Receive Data Out towards DTE
3 6 TxD Transmit Data In from DTE
5 4,5 SG Signal Ground na
RS232 (Female) Pinouts
PowerFlow-2-10G also provides DC module for power connection. The user must
connect the device only to DC input source that has an input supply voltage from
18 to 60 VDC. If the power you use is not in this range, the device might not
operate properly and there is great possibility that the device might be damaged.
Left: V-
Middle: Frame Ground
Right: V+
Alarm Relay
Terminal Block
Mounting in Rack
Lit when this unit is the 'master' in a fiber ring and all units are
Ring Master Green configured for PF-Ring or ERPS (Ethernet Ring Protection Switching or
G.8032).
Enter authorized
EXEC mode # username and Exit, logout
password
Specify interface,
Config interface type and
(config-if)# End, exit, do logout
Interface Mode number after
(config)#
Keyboard Action
< > (Angle Enter a value, <address> <netmask> Enter IP address and
bracket) alphanumeric strings or subnet mask.
keywords.
{ } A curly bracket has the { { <address> <netmask> } | { dhcp At least specify one
(Curly following two functions: [ fallback <fallback_address> option to complete
bracket) If there are more than two <fallback_netmask> [ timeout the command.
options available, a curly <fallback_timeout> ] ] } }
bracket can be used to
separate them.
The uter curly bracket
means that this is a must
parameter. At leaset one
value should be specified.
# config terminal
(config)# interface vlan 1
(config-if-vlan)# ip address 192.168.0.101 255.255.255.0
(config-if-vlan)# exit
(config)# exit
# show ip interface brief
Vlan Address Method Status
---- -------------------- -------- ------
1 192.168.0.101/24 Manual DOWN
# reload warm
% Warm reload in progress, please stand by.
#
Copyright (C) 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
Free Software Foundation, Inc.
RedBoot is free software, covered by the eCos license, derived from the
GNU General Public License. You are welcome to change it and/or distribute
copies of it under certain conditions. Under the license terms, RedBoot's
source code and full license terms must have been made available to you.
Redboot comes with ABSOLUTELY NO WARRANTY.
RedBoot> fi lo -d managed
Image loaded from 0x80040000-0x80ae54cc
RedBoot> go
# show
version
Alternative
Image
: "V1.052"
------------
: 2017-09-08T10:52:33+08:00
------
Image
Version
Date
------------
------
SID : 1
------------
------
Software
Version
Build Date
# show running-config
Building configuration...
username admin privilege 15 password none
!
vlan 1
!
!
!
no smtp server
spanning-tree mst name 00-02-ab-00-00-01 revision 0
!
interface GigabitEthernet 1/1
no spanning-tree
!
interface GigabitEthernet 1/2
no spanning-tree
!
interface GigabitEthernet 1/3
no spanning-tree
!
# show history
config t
exit
config t
ip arp ex
exit
3.6.9 Help
Help command can be issued in User, Exec, and Global Config mode to get a hint
message describing how to use “show” command to get help from CLI.
# help
Help may be requested at any point in a command by entering
a question mark '?'. If nothing matches, the help list will
be empty and you must backup until entering a '?' shows the
available options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a
command argument (e.g. 'show ?') and describes each possible
argument.
2. Partial help is provided when an abbreviated argument is entered
and you want to know what arguments match the input
(e.g. 'show pr?'.)
3.6.10 Logout
To close an active terminal session, issue the “logout” command in User or EXEC
mode.
(config)# exit
# logout
# disable
> logout
Username: admin
Password:
#
# disable
>
In User mode, only limited commands are available. These commands are used
for clearing statistics, entering Exec mode and pinging the specified destination.
To configure a function, you should enter Config mode or Config Interface mode.
Explanation: Return to the previous mode. Issuing this command in User mode
will logout the Command Line Interface.
[ repeat <count> ]: The number of packets that are sent to the destination
IP or host.
[ interval <seconds> ]: Timeout interval. The ping test is successful only when it receives echo
reply from the destination IP or host within the time specified here.
Explanation: To carry out ping tests on the specified destination IPv4 address or
host.
Syntax: > ping ipv6 <v_ipv6_addr> [ repeat <count> ] [ size <size> ] [ interval
<seconds> ] [ interface vlan <v_vlan_id> ]
[ repeat <count> ]: The number of packets that are sent to the destination
IP or host.
[ interval <seconds> ]: Timeout interval. The ping test is successful only when it receives echo
reply from the destination IP or host within the time specified here.
Explanation: To carry out ping tests on the specified destination IPv6 address or
host.
Parameter:
[ interface ( <port_type> [ <v_port_type_list> ] ) ]: Specify the interface that you want to clear.
Parameter:
Syntax: # clear ip dhcp detailed statistics { server | client | snooping | relay | helper
| all } [ interface ( <port_type> [ <in_port_list> ] ) ]
Parameter:
{ server | client | snooping | relay | helper | all }: Specify the type of information that you want
to clear.
[ interface ( <port_type> [ <in_port_list> ] ) ]: Specify the interface type and port number.
Parameter:
Parameter:
Example:
# config t
(config)#
3.8.26 # copy
{ startup-config | running-config | <source_path> }: Specify the file type that you want to copy
from. This can be “startup-config”, “running-config” or a specific source file in flash or TFTP
server.
{ startup-config | running-config | <destination_path> }: Specify the file type that you want to
copy to. This can be “startup-config”, “running-config” or a specific destination file in flash or
TFTP server.
3.8.27 # delete
Parameters:
# dir
Directory of flash:
r- 1970-01-01 00:00:00 284 default-config
rw 2015-01-01 01:56:32 1487 startup-config
rw 2015-01-01 01:56:49 1487 201
3 files, 3258 bytes total.
# delete flash:201
# dir
Directory of flash:
r- 1970-01-01 00:00:00 284 default-config
rw 2015-01-01 01:56:32 1487 startup-config
2 files, 1771 bytes total.
3.8.28 # dir
Example:
# dir
Directory of flash:
r- 1970-01-01 00:00:00 284 default-config
rw 2015-01-01 01:56:32 1487 startup-config
# disable
>
>
> enable
#
#
3.8.30 # dot1x
[ interface ( <port_type> [ <plist> ] ) ]: Specify the type of interface that you intend to use. “*”
means all interfaces.
3.8.31 # erps
Parameters:
{port0 | port1}: Specify port0 (east) or port1 (west) that applies to this
command.
Explanation: Use the other standby firmware image file uploaded to flash.
3.8.35 # more
3.8.36 # ping ip
Parameters:
<addr>: Specify the IPv4 address or IPv6 address for ping test.
< v_ipv6_addr >: Specify the IPv4 address or IPv6 address for ping test.
Parameters:
Parameters:
3.8.40 # send
Parameters:
Parameters:
Parameters:
Parameters:
<0 or 3-512>: Specify the lines displayed on the screen. “0” means no
pausing.
Parameters:
<0 or 40-512>: Specify the width displayed on the screen. “0” means
unlimited width.
Parameters:
[interface (<port_type>[<v_port_type_list>])]: Specify the port type and port numbers that you
want to reopen.
3.9
Commands in Config Mode
3.9.1 (config)# aaa authentication login
Syntax: (config)# aaa authentication login { console | telnet | ssh | http } { { local |
radius | tacacs } [ { local | radius | tacacs } [ { local | radius | tacacs } ] ] }
Parameters:
{ { local | radius | tacacs } [ { local | radius | tacacs } [ { local | radius | tacacs } ] ] }: Specify one
of the authentication methods for the specified client. At least one method needs to be
specified. Users can specify three methods at most.
local: Use the local user database on the switch for authentication.
NOTE: Methods that involve remote servers will time out if the remote servers are
offline. In this case the next method is tried. Each method is tried and continues
until a method either approves or rejects a user. If a remote server is used for
Example: Set the Console client to use remote RADIUS server(s) for
authentication.
# config t
(config)# aaa authentication login console radius
Parameters:
{ [ web ] [ snmp ] [ telnet ] | all }: Specify matched hosts can access the
switch from which interface.
# config t
(config)# access management 1 1 192.168.0.1 to 192.168.0.10 a
Syntax: (config)# access-list ace <AceId : 1-256> [ action {deny | filter | permit}]
[ dmac-type {any| broadcast | multicast | unicast } ] [frame-type {any|
arp|etype|ipv4|ipv4-icmp|ipv4-tcp|ipv4-udp|ipv6|ipv6-icmp|ipv6-tcp|ipv6-udp} ]
[ingress {any | interface <PORT_TYPE> }] [logging] [next { <AceId : 1-256>|last}]
[policy <PolicyId : 0-255>] [rate-limiter {<RateLimiterId : 1-16>|disable}] [redirect
{disable| interface <PORT_TYPE>}] [shutdown] [tag {any|tagged|untagged}] [tag-
priority {0-1| 0-3| 2-3| 4-5| 4-7| 6-7| <TagPriority : 0-7>|any}] [vid { <Vid : 1-
4095>|any}]
Explanation: Configure an access control list.
Parameters:
<AceId : 1-256>: Specify access control list ID that applies to this rule.
[ action {deny | filter | permit}]: Specify the action that applies to this rule.
[next { <AceId : 1-256>|last}]: Insert the current ACE ID before the next ACE
ID or put the ACE ID to the last one.
[tag-priority {0-1| 0-3| 2-3| 4-5| 4-7| 6-7| <TagPriority : 0-7>|any}]: Specify
the priority value.
Parameters:
<AceId : 1-256>: Specify access control list ID that applies to this rule.
[ action {deny | filter | permit}]: Specify the action that applies to this rule.
[next { <AceId : 1-256>|last}]: Insert the current ACE ID before the next ACE
ID or put the ACE ID to the last one.
[tag-priority {0-1| 0-3| 2-3| 4-5| 4-7| 6-7| <TagPriority : 0-7>|any}]: Specify
the priority value.
Explanation: Configure rate limiter that applies to each rate limit ID.
Parameters:
Parameters:
Parameters:
Parameters:
Parameters:
Parameters:
[smac]: All traffic from the same Source MAC address is output on the same
link in a trunk.
[dmac]: All traffic with the same Destination MAC address is output on the
same link in a trunk.
[ip]: All traffic with the same source and destination IP address is output on
the same link in a trunk.
[port]: All traffic with the same source and destination TCP/UDP port number is output on the
same link in a trunk.
Parameters:
Parameters:
Explanation: Display the configured message when prompted for login ID and
password.
Explanation: Configure daylight saving time. This is used to set the clock forward
or backward according to the configurations set for a defined Daylight Saving
Time duration. “Recurring” command is used to repeat the configuration every
year.
Parameters:
[ <offset_var: 1-1440> ]: Specify the number of minutes to add during Daylight Saving
Time. The allowed range is 1 to 1440.
Explanation: Configure daylight saving time. This is used to set the clock forward
or backward according to the configurations set for a defined Daylight Saving
Time duration. “Recurring” command is used to repeat the configuration every
year.
Parameters:
[ <offset_var: 1-1440> ]: Specify the number of minutes to add during Daylight Saving
Time. The allowed range is 1 to 1440.
Parameters:
Parameters:
# config t
(config)# default access-list rate-limiter 1
Parameters: None.
# config t
(config)# dot1x system-auth-control
# config t
(config)# dot1x re-authentication
Parameters:
# config t
(config)# dot1x authentication timer re-authenticate 100
Explanation: Specify the time that the switch waits for a supplicant response
during an authentication session before transmitting a Request Identify EAPOL
packet. By default, it is set to 30 seconds.
Parameters:
# config t
(config)# dot1x timeout tx-period 30
Explanation: Specify the period that is used to age out a client’s allowed access
to the switch via 802.1X and MAC-based authentication. The default period is
300 seconds. The allowed range is 10 - 1000000 seconds.
Parameters:
# config t
(config)# dot1x authentication timer inactivity 300
Explanation: The time after an EAP Failure indication or RADIUS timeout that a
client is not allowed access. This setting applies to ports running Single 802.1X,
Multi 802.1X, or MAC-based authentication. By default, hold time is set to 10
seconds. The allowed range is 10 - 1000000 seconds.
Parameters:
# config t
(config)# dot1x timeout quiet-period 30
Parameters:
[guest-vlan]: Enable guest VLAN. A Guest VLAN is a special VLAN typically with limited
network access. When checked, the individual ports' ditto setting determines whether the
port can be moved into Guest VLAN. When unchecked, the ability to move to the Guest
VLAN is disabled on all ports.
# config t
(config)# dot1x feature guest-vlan
Parameters:
<value:1-4095>: Specify the guest VLAN ID. The allowed VLAN ID range is
from 1 to 4095.
Parameters:
Parameters:
force-authorized: In this mode, the switch will send one EAPOL Success frame when the
port link comes up, and any client on the port will be allowed network access without
authentication.
force unauthorized: In this mode, the switch will send one EAPOL Failure frame when the
port link comes up, and any client on the port will be disallowed network access.
auto (Port-Based 802.1X): This mode requires a dot1x-aware client to be authorized by the
authentication server. Clients that are not dot1x-aware will be denied access.
single (802.1X): In Single 802.1X, at most one supplicant can get authenticated on the port
at a time. Normal EAPOL frames are used in the communication between the supplicant
and the switch. If more than one supplicant is connected to a port, the one that comes
first when the port's link comes up will be the first one considered. If that supplicant
doesn't provide valid credentials within a certain amount of time, another supplicant will
get a chance. Once a supplicant is successfully authenticated, only that supplicant will be
allowed access. This is the most secure of all the supported modes. In this mode, the “Port
Security” module is used to secure a supplicant's MAC address once successfully
authenticated.
multi (802.1X): In Multi 802.1X, one or more supplicants can get authenticated on the
same port at the same time. Each supplicant is authenticated individually and secured in
the MAC table using the “Port Security” module.
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# dot1x port-control auto
Parameters: None.
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# dot1x guest-vlan
Parameters: None.
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# dot1x radius-qos
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# dot1x radius-vlan
Show: > show dot1x statistics { eapol | radius | all } [ interface ( <port_type>
[ <v_port_type_list> ] ) ]
# show dot1x statistics { eapol | radius | all } [ interface ( <port_type> [ <v_port_type_list> ] ) ]
Parameters:
{ half | full | auto [ half | full ] }: Specify the duplex mode for this specific
interface.
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# duplex auto
Parameters:
Parameters:
[level <priv: 1-15>]: Specify the privilege level for this password.
Parameters:
[level <priv: 1-15>]: Specify the privilege level for this password.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
Syntax: (config)# erps <group> major port0 interface <port_type> <port0> port1
interface <port_type> <port1> [ interconnect ]
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
<port_type> <port0>: Specify Port 0’s port type and port number. Port 0 is also known as E port
(East port) which is used by some of the other vendors.
<port_type> <port1>: Specify Port 1’s port type and port number. Port 1 is also known as W
port (West port) which is used by some of the other vendors. When this port is interconnected
with the other sub-ring, “0” is used in this field to indicate that no west port is associated with
this instance.
Syntax: (config)# erps <group> mep port0 sf <p0_sf> aps <p0_aps> port1 sf
<p1_sf> aps <p1_aps>
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
<p0_sf>: This is also known as East Signal Fail APS MEP. Assign the East Signal
Fail reporting MEP in this field.
<p1_sf>: This is also known as West Signal Fail APS MEP. When interconnected with the other
sub-ring, “0” is used in this field to indicate that no west SF MEP is associated with this
instance. Assign the West Signal Fail reporting MEP in this field.
<p1_aps>: Specify the West APS PDU handling MEP. When interconnected with the other sub-
ring, “0” is used in this field to indicate that no west APS MEP is associated with this instance.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
Explanation: Specify the Ethernet ring port on the local node as the RPL (Ring
Protection Link) owner or neighbor.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
{ owner | neighbor }: Specify the ring port is a owner or neighbor. RPL (Ring Protection Link) is
responsible for blocking traffic over the RPL so that no loops are formed in the Ethernet traffic.
Syntax: (config)# erps <group> sub port0 interface <port_type> <port0> { { port1
interface <port_type> <port1> } | { interconnect <major_ring_id> [ virtual-
channel ] } }
Explanation: Create a profile and configure the Sub ERPS interface port 0, port 1.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
<port_type> <port0>: Specify sub port’s port type and port number.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
Parameters:
<group: 1-64>: Specify a group number. The allowed range is from 1 to 64.
Parameters:
Parameters: None.
# config t
(config)# gvrp
(config)#
Explanation: Set up the maximum number of VLANs can be learned via GVRP.
Parameters:
Example: Set the maximum number of VLANs can be learned via GVRP to 20.
# config t
(config)# gvrp
(config)# gvrp max-vlans 20
Explanation: Set up the maximum number of VLANs can be learned via GVRP.
Parameters:
[ join-time <jointime> ]: Specify the amount of time in units of centi-seconds that PDUs are
transmitted. The default value is 20 centi-seconds. The valid value is 1~20.
[ leave-time <leavetime> ]: Specify the amount of time in units of centi-seconds that the device
waits before deleting the associated etry. The leave time is activated by a “Leave All-time”
message sent/received and cancelled by the Join message. The default value is 60 centi-
seconds.
[ leave-all-time <leavealltime> ]: Specify the amount of time that “LeaveAll” PDUs are created.
A LeaveAll PDU indicates that all registrations are shortly de-registered. Participants will need to
rejoin in order to maintain registration. The valid value is 1000 to 5000 centi-seconds. The
factory default 1000 centi-seconds.
Parameters: None.
# config t
(config)# interface GigabitEthernet 1/1-5
(config-if)# gvrp
(config-if)#
Parameters:
<WORD32>: Specify a descriptive name for this device. Indicate the hostname for this device.
Alphabets (A-Z; a-z), digits (0-9) and minus sign (-) can be used. However, space characters are
not allowed. The first character must be an alphabet character. The first and last character
must not be a minus sign. The allowed string length is 0 – 255.
# config t
(config)# hostname AccessSW
Parameters:
# config t
(config)#
(config)# interface GigabitEthernet 1/1
(config-if)#
Explanation: Enter Config Interface VLAN mode for this specific interface.
# config t
(config)#
(config)# interface vlan 1
(config-if-vlan)#
3.9.17 (config)# ip
Parameters:
Parameters:
Parameters:
Syntax: (config)# ip arp inspection vlan <in_vlan_list> logging { deny | permit | all }
Parameters:
Parameters:
<low_ip> [ <high_ip> ]: Specify the IP address range that will not be used for
DHCP IP assignment.
Explanation: Configure IP addresses that are not used for DHCP IP allocation.
# config t
(config)# ip dhcp excluded-address 1.2.3.4 1.2.3.10
(config)# exit
# show ip dhcp excluded-address
Low Address High Address
--------------- ---------------
01 1.2.3.4 1.2.3.10
Parameters:
Explanation: Specify the broadcast address in use on the client’s subnet for the
specified IP dhcp pool.
Parameters:
Explanation: Specify client's unique identifier to be used when the pool is the
type of host.
Parameters:
Explanation: Specify the name of client to be used when the pool is the type of
host.
Parameters:
<host_name>: Specify the name of client to be used when the pool is the
type of host.
Parameters:
Parameters:
<port_type> <port>: Specify port type and port number for DHCP interface-IP
addresss mapping.
Explanation: Specify a list of Domain Name System name servers available to the
client.
Parameters:
Explanation: Specify a list of Domain Name System name servers available to the
client.
Parameters:
<domain_name>: Specify the domain name that a client use when resolving
hostname via DNS.
Explanation: Specify client's hardware (MAC) address to be used when the pool is
the type of host.
Parameters:
<mac>: Specify client's hardware (MAC) address to be used when the pool is
the type of host.
Explanation: Specify the Network IP and subnet mask of the DHCP address pool.
Parameters:
Explanation: Specify lease time that a client needs to send requests to the DHCP
server for renewed IP address.
Parameters:
{ <day> [ <hour> [ <min> ] ] | infinite }: Specify lease time that a client needs to send requests
to the DHCP server for renewed IP address. Specify "infinite" to mean the lease time is infinite.
Parameters:
[ <ip1> [ <ip2> [ <ip3> ] ] ]: Specify a list of NBNS name servers IP in order of preference.
Explanation: Specify NetBIOS node type option to allow Netbios over TCP/IP
clients as described in RFC 1001/1002.
Parameters:
Explanation: Specify the NetBIOS over TCP/IP scope parameter for the client as
specified in RFC 1001/1002.
Parameters:
Explanation: The pool defines a pool of IP addresses to service more than one
DHCP client
Parameters:
<ip> <subnet_mask>: Specify IP address and subnet mask for this specific IP address.
Parameters:
Parameters:
[ <ip1> [ <ip2> [ <ip3> ] ] ]: Specify a list of IP addresses indicating NIS servers available to the
client.
Parameters:
[ <ip1> [ <ip2> [ <ip3> ] ] ]: Specify a list of IP addresses indicating NTP servers available to the
client.
Explanation: Identify the vendor type and vendor specific information. DHCP
server will deliver the corresponding option 43 specific information to the client
that sends option 60 vendor class identifier.
Parameters:
# config t
(config)# ip dhcp relay
Parameters:
standard: Used for defining the switch port and VLAN ID according to
RFC 3046.
tr-101: Used for defining the switch IP, switch port and VLAN ID according to TR-101.
Explanation: Enable DHCP Relay option 82 function. Please note that “Relay
Mode” must be enabled before this function is able to take effect.
# config t
(config)# ip dhcp relay information option
Parameters:
{ drop | keep | replace }: Specify one of the relay information policy options.
drop: Drop the packet when it receives a DHCP message that already contains relay
information.
replace: Replace (rewrite) the DHCP client packet information with the switch’s relay
information. This is the default setting.
# config t
(config)# ip dhcp relay information policy keep
Parameters:
Parameters:
# config t
(config)# ip dhcp server
Explanation: Enable DHCP snooping function globally. When DHCP snooping mode
operation is enabled, the DHCP request messages will be forwarded to trusted
ports and only allow reply packets from trusted ports.
# config t
(config)# ip dhcp snooping
Syntax: (config)# ip dhcp snooping vlan { all | none | [ add | remove | except ]
<vlan_list> }
{ all | none | [ add | remove | except ] <vlan_list> }: A single VLAN or a range of VLANs specified
here will be treated as authorized and secure VLANs. Packets from specified VLANs are
forwarded normally.
# config t
(config)# ip dns proxy
Parameters:
<v_ipv4_ucast>: Specify DHCP Relay server IPv4 address that is used by the
switch’s DHCP relay agent
Explanation: Enable the HTTPS operation mode. When the current connection is
HTTPS and HTTPS mode operation is disabled, web browser will automatically
redirect to an HTTP connection.
# config t
(config)# ip http secure-server
Explanation: Enable the HTTPS redirect mode operation. It applies only if HTTPS
mode is "Enabled". Automatically redirects HTTP of web browser to an HTTPS
connection when both HTTPS mode and Automatic Redirect are enabled.
# config t
(config)# ip http secure-redirect
Explanation: When enabled, the switch suppresses leave messages unless received
from the last member port in the group. IGMP leave proxy suppresses all
unnecessary IGMP leave messages so that a non-querier switch forwards an IGMP
leave packet only when the last dynamic member port leaves a multicast group.
Parameters:
Explanation: Globally enable IGMP Snooping feature. When enabled, this device will
monitor network traffic and determine which hosts will receive multicast traffic.
The switch can passively monitor or snoop on IGMP Query and Report packets
transferred between IP multicast routers and IP multicast service subscribers to
identify the multicast group members. The switch simply monitors the IGMP packets
passing through it, picks out the group registration information and configures the
multicast filters accordingly.
Parameters:
Parameters:
Explanation: Set up DNS IP address manually or obtain DNS IP address via specific
VLAN DHCP server.
Parameters:
dhcp [ interface vlan <v_vlan_id> ]: Configure DNS IP address via specific VLAN
DHCP server.
Parameters:
<v_ipv4_addr>: Specify IPv4 address. The IP route is the destination IP network or host address
of this route. Valid format is dotted decimal notation.
<v_ipv4_netmask>: The route mask is a destination IP network or host mask, in number of bits
(prefix length). It defines how much of a network address that must match, in order to qualify
for this route. Only a default route will have a mask length of 0 (as it will match anything).
<v_ipv4_gw>: This is the IP address of the gateway. Valid format is dotted decimal notation.
Gateway and Network must be of the same type.
# config t
(config)# ip route 192.168.1.240 255.255.255.0 192.168.1.254
# show ip route
# config t
(config)# ip routing
# show ip route
127.0.0.1/32 via 127.0.0.1 <UP HOST>
224.0.0.0/4 via 127.0.0.1 <UP>
# show ipv6 route interface vlan 1
::1/128 via ::1 <UP HOST>
Parameters:
# config t
(config)# ip ssh
Parameters:
Parameters:
Parameters:
Parameter:
<cnt_var: 1-32>: Specify the maximum number of DHCP clients that can be learnt on this specific
port. The valid number is 1 to 32.
Explanation: Enable the selected port or ports are DHCP Snooping trusted ports.
DHCP requests from Trusted ports are processed.
Explanation: Use this command to filter specific multicast traffic on a per port
basis.
Parameters:
<profile_name>: Specify the configured multicast groups that are denied on a port. When a
certain multicast group is selected on a port, IGMP join reports received on a port are dropped.
Show: > show ip igmp snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ip igmp snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Enable fast leave function on a specific port. When a leave packet is
received, the switch immediately removes it from a multicast service without
sending an IGMP group-specific (GS) query to that interface.
Show: > show ip igmp snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ip igmp snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Specify the maximum number of multicast groups that a port can
join at the same time.
Parameters:
<throttling>: This field limits the maximum number of multicast groups that a port can join at
the same time. When the maximum number is reached on a port, any new IGMP join reports will
be dropped. By default, unlimited is selected. The allowed range can be specified is 1 to 10.
Show: > show ip igmp snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ip igmp snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Set this interface to Router port. If IGMP snooping cannot locate the
IGMP querier, you can manually designate a port which is connected to a known
IGMP querier (i.e., a multicast router/switch). This interface will then join all the
current multicast groups supported by the attached router/switch to ensure that
multicast traffic is passed to all appropriate interfaces within the switch.
Explanation: Specify the maximum number of dynamic clients that can be learned
on a port. The available options are 0, 1, 2. If the port mode is enabled and the
maximum number of dynamic clients is equal 0, the switch will only forward IP
packets that are matched in static entries for a given port.
Parameters:
<0-2>: Specify the maximum number of dynamic clients that can be learned
on a port.
Parameters:
Show: > show ip statistics [ system ] [ interface vlan <v_vlan_list> ] [ icmp ] [ icmp-
msg <type> ]
# show ip statistics [ system ] [ interface vlan <v_vlan_list> ] [ icmp ] [ icmp-
msg <type> ]
Explanation: Configure IGMP Snooping version used for this specific VLAN.
Parameters:
Explanation: LMQI stands for Last Member Query Interval and is to configure the
maximum time to wait for IGMP/MLD report memberships on a receiver port
before removing the port from multicast group membership. The allowed range is
0~31744 tenths of a second.
Parameters:
Parameters:
<cos_priority: 0-7>: Specify COS for this specific VLAN. The valid range is 0 to
7.
Parameters:
{ election | address <v_ipv4_ucast> }: Elect the IGMP Snooping querier or use the specified IPv4
unicast address as a querier.
Parameters:
<ipmc_qi: 1-31744>: Specify IPMC Query interval value. The valid value is
1~31744.
Parameters:
<ipmc_qri>: Specify IPMC Query Response time value. The valid value is
1~31744.
Explanation: The robustness variable (RV) allows tuning for the expected packet
loss on a subnet. If a subnet is susceptible to packet loss, this value can be
increased. The RV value must not be zero and should not be one. The value
should be 2 or greater. By default, it is set to 2.
Parameters:
<ipmc_rv: 1-255>: Specify IPMC Robustness Variable value. The valid value is
1~255.
Explanation: The Unsolicited Report Interval is the amount of time that the
upstream interface should transmit unsolicited IGMP reports when report
suppression/proxy reporting is enabled. The allowed range for URI is 0 -31744
seconds.
Parameters:
<ipmc_uri: 0-31744>: Specify Unsolicited Report Interval value. The valid value
is 0~31744.
Parameters:
Show: > show ipv6 statistics [ system ] [ interface vlan <v_vlan_list> ] [ icmp ]
[ icmp-msg <type> ]
# show ipv6 statistics [ system ] [ interface vlan <v_vlan_list> ] [ icmp ] [ icmp-
msg <type> ]
Explanation: Configure MLD Snooping version used for this specific VLAN.
Parameters:
Explanation: LMQI stands for Last Member Query Interval and is to configure the
maximum time to wait for IGMP/MLD report memberships on a receiver port
before removing the port from multicast group membership. The allowed range is
0~31744 tenths of a second.
Parameters:
Parameters:
<cos_priority: 0-7>: Specify COS for this specific VLAN. The valid range is 0 to
7.
Parameters:
<ipmc_qi: 1-31744>: Specify IPMC Query interval value. The valid value is
1~31744.
Parameters:
<ipmc_qri>: Specify MLD Query Response time value. The valid value is
1~31744.
Explanation: The robustness variable (RV) allows tuning for the expected packet
loss on a subnet. If a subnet is susceptible to packet loss, this value can be
increased. The RV value must not be zero and should not be one. The value
should be 2 or greater. By default, it is set to 2.
Parameters:
<ipmc_rv: 1-255>: Specify IPMC Robustness Variable value. The valid value is
1~255.
Explanation: The Unsolicited Report Interval is the amount of time that the
upstream interface should transmit unsolicited IGMP reports when report
suppression/proxy reporting is enabled. The allowed range for URI is 0 -31744
seconds.
Parameters:
<ipmc_uri: 0-31744>: Specify Unsolicited Report Interval value. The valid value
is 0~31744.
Parameters:
<profile_name: word16>: Specify the desired profile name in 16 characters. When entered is
pressed, the command will change to (config-ipmc-profile)#.
# config t
(config)# ipmc profile goldpass
(config-ipmc-profile)#
Parameters:
Parameters:
Explanation: To set default IPMC Profile Rule for a specific IPMC Profile.
Example: To default IPMC Profile Rule (Entry 1) for specific IPMC Profile.
# config t
(config)# ipmc profile goldpass
(config-ipmc-profile)# default range 1
Parameters:
# config t
(config)# ipmc profile goldpass
(config-ipmc-profile)# description 1stclasscustomer
Parameters:
{ permit | deny }: Specify the action taken upon receiving the Join/Report frame that has the
group address matches the address range of the rule.
Permit: Group address matches the range specified in the rule will be learned.
Deny: Group address matches the range specified in the rule will be
dropped.
Explanation: Enable IPv6 MLD proxy. When MLD proxy is enabled, the switch
exchanges MLD messages with the router on its upstream interface, and
performs the host portion of the MLD task on the upstream interface as follows:
When a host joins a multicast group to which no other host belongs, it sends unsolicited
multicast listener reports to that group.
When the last host in a particular multicast group leaves, it sends an unsolicited multicast
listener done report to the all-routers address (FF02::2) for MLDv1.
# config t
(config)# ipv6 mld host-proxy
(config)#
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Enable IPv6 MLD leave proxy. To prevent multicast router from
becoming overloaded with leave messages, MLD snooping suppresses leave
messages unless received from the last member port in the group. When the
switch acts as the querier, the leave proxy feature will not function.
# config t
(config)# ipv6 mld host-proxy leave-proxy
(config)#
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Enable MLD Snooping feature globally. When enabled, this device will
monitor network traffic and determine which hosts would like to receive multicast
traffic. The switch can passively monitor or snoop on MLD Listener Query and
Report packets transferred between IP multicast routers and IP multicast service
subscribers to identify the multicast group members. The switch simply monitors
the IGMP packets passing through it, picks out the group registration information
and configures the multicast filters accordingly.
# config t
(config)# ipv6 mld snooping
(config)#
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
> show ipv6 mld snooping mrouter [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping mrouter [ detail ]
Parameters:
# config t
(config)# ipv6 mld ssm-range ff3e::7728 128
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# config t
(config)# ipv6 mld unknown-flooding
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
> show ipv6 mld snooping mrouter [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping mrouter [ detail ]
Parameters:
{ <v_ipv6_ucast> | interface vlan <v_vlan_id> <v_ipv6_addr> }: Specify one of the options. This
could be either IPv6 next hop unicast address or an interface.
Explanation: Use this command to filter specific multicast traffic on a per port
basis.
Parameters:
<profile_name>: Specify the configured multicast groups that are denied on a port. When a
certain multicast group is selected on a port, IGMP join reports received on a port are dropped.
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Enable fast leave function on a specific port. When a leave packet is
received, the switch immediately removes it from a multicast service without
sending an IGMP group-specific (GS) query to that interface.
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Specify the maximum number of multicast groups that a port can
join at the same time.
Parameters:
<throttling>: This field limits the maximum number of multicast groups that a port can join at
the same time. When the maximum number is reached on a port, any new IGMP join reports will
be dropped. By default, unlimited is selected. The allowed range can be specified is 1 to 10.
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Set this interface to Router port. If IGMP snooping cannot locate the
IGMP querier, you can manually designate a port which is connected to a known
IGMP querier (i.e., a multicast router/switch). This interface will then join all the
current multicast groups supported by the attached router/switch to ensure that
multicast traffic is passed to all appropriate interfaces within the switch.
Show: > show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
> show ipv6 mld snooping mrouter [ detail ]
# show ipv6 mld snooping [ vlan <v_vlan_list> ] [ group-database [ interface ( <port_type>
[ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show ipv6 mld snooping mrouter [ detail ]
Parameters:
<v_1_to_65535>: The priority of the port. The allowed value range is from 1 to 65535.
Explanation: Configure system priority for LACP function. The lower number
means greater priority. This priority value controls which ports will be active and
which ones will be in a backup role.
# config t
(config)# lacp system-priority 100
# config t
(config)# interface GigabitEthernet 1/1
(config-if)# lacp
(config-if)#
Parameters:
{ <v_1_to_65535> | auto }: Specify a LACP key for this interface. The “auto” setting sets the key
as appropriate by the physical link speed. If you want a user-defined key value, enter a value
between 1 and 65535. Ports in an aggregated link group must have the same LACP port Key. In
order to allow a port to join an aggregated group, the port Key must be set to the same value.
Parameters:
<v_1_to_65535>}: Specify a LACP port priority for this interface. The lower number means
greater priority. This priority value controls which ports will be active and which ones will be in
a backup role.
Parameters:
{ active | passive }: Specify either “Active” or “Passive” role depending on the device’s capability
of negotiating and sending LACP control packets. Ports that are designated as “Active” are able
to process and send LACP control frames. Hence, this allows LACP compliant devices to negotiate
the aggregated like so that the group may be changed dynamically as required. In order to add
or remove ports from the group, at least one of the participating devices must set to “Active”
LACP ports.
Parameters:
{ fast | slow }: The Timeout controls the period between BPDU transmissions. Fast will transmit
LACP packets each second, while Slow will wait for 30 seconds before sending a LACP packet.
Explanation: Enter the specific line. When Enter is pressed, the command line
changes to “(config-line)#”.
Parameters:
vty <0~15>: VTY lines are the Virtual Terminal lines of the device, used solely to control
inbound Telnet connections. They are virtual, in the sense that they are a function of
software - there is no hardware associated with them.
# config t
(config)# line console 0
(config-line)#
3.9.21.2 (config-line)# do
Parameters:
# config t
(config)# line console 0
(config-line)# do show aaa
console : local
telnet : local
ssh : local
http : local
(config-line)#
# config t
(config)# line console 0
(config-line)# end
#
# config t
(config)# line console 0
(config-line)# exec-banner
Parameters:
<min>: Specify timeout in minutes. The allowed range is 0 to 1440. Specify "0" to disable
timeout function (CLI session will never timeout.)
# config t
(config)# line console 0
(config-line)# exit
(config)#
# config t
(config)# line console 0
(config-line)# help
Help may be requested at any point in a command by entering
a question mark '?'. If nothing matches, the help list will
be empty and you must backup until entering a '?' shows the
available options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a
command argument (e.g. 'show ?') and describes each possib
argument.
2. Partial help is provided when an abbreviated argument is
entered
and you want to know what Parameters match the input
(e.g. 'show pr?'.)
Parameters:
# config t
(config)# line console 0
(config-line)# history size 10
Parameters:
<length>: Specify the number of lines displayed on the screen. The allowed range is 3 to 512.
Specify “0” for no pausing.
# config t
(config)# line console 0
(config-line)# length 20
(config-line)#
Parameters:
<location>: Location description for the terminal. The characters allowed are 32.
# config t
(config)# line console 0
(config-line)# location cabinet5a
(config-line)#
# config t
(config)# line console 0
(config-line)# motd-banner
(config-line)#
Parameters:
<privileged_level>: Privilege level for the terminal line. The allowed range is 0
to 15.
# config t
(config)# line vty 1
(config-line)# privilege level 5
(config-line)#
Parameters:
<width>: Specify the width of the terminal line. The allowed range is 40 to 512. Specify “0” for
unlimited width.
# config t
(config)# line vty 1
(config-line)# width 60
(config-line)#
Explanation: This setting defines how long LLDP frames are considered valid and
is used to compute the TTL. The default is 4.
Parameters:
# config t
(config)# lldp holdtime 5
Explanation: Configure a delay between the shutdown frame and a new LLDP
initialization.
Parameters:
# config t
(config)# lldp reinit 3
Explanation: Configure the interval between LLDP frames are sent to its neighbors
for updated discovery information. The default is 30 seconds.
Parameters:
# config t
(config)# lldp timer 35
Parameters:
Explanation: Configure a delay between the LLDP frames that contain changed
configurations. Tx Delay cannot be larger than 1/4 of the Tx interval value.
# config t
(config)# lldp transmission-delay 2
Explanation: The Map Datum is used for the coordinates given in above options.
Parameters:
WGS84: (Geographical 3D) - World Geodesic System 1984, CRS Code 4327, Prime Meridian
Name: Greenwich.
NAD83/NAVD88: North American Datum 1983, CRS Code 4269, Prime Meridian Name:
Greenwich; The associated vertical datum is the North American Vertical Datum of 1988
(NAVD88). This datum pair is to be used when referencing locations on land, not near tidal
water (which would use Datum = NAD83/MLLW).
NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian Name:
Greenwich; The associated vertical datum is Mean Lower Low Water (MLLW). This datum
pair is to be used when referencing locations on water/sea/ocean.
# config t
(config)# lldp med datum wgs84
Parameters:
# config t
(config)# lldp med fast 5
Parameters:
# config t
(config)# lldp med location-tlv altitude floors 10
Syntax: (config)# lldp med location-tlv civic-addr { country | state | county | city |
district | block | street | leading-street-direction | trailing-street-suffix | street-
suffix | house-no | house-no-suffix | landmark | additional-info | name | zip-code |
building | apartment | floor | room-number | place-type | postal-community-name |
p-o-box | additional-code } <v_string250>
Parameters:
country: The two-letter ISO 3166 country code in capital ASCII letters - Example: DK, DE or
US.
leading-street-direction: Example: N.
floor: Example: 4.
# config t
(config)# lldp med location-tlv civic-addr country UK
Parameters:
# config t
(config)# lldp med location-tlv elin-addr 911
Parameters:
# config t
(config)# lldp med location-tlv latitude north 5
Parameters:
# config t
(config)# lldp med location-tlv longitude west 90
Parameters:
{ tagged <v_vlan_id> | untagged }: Specify whether this service is tagged or untagged. When
“tagged” is specified, a VLAN ID should be provided.
[ dscp <v_0_to_63> ]: Specify a value for DSCP. The valid value is from 0 to
63.
# config t
(config)# lldp med media-vlan-policy 1 voice tagged 100 l2-
priority 7 DSCP 63
# config t
(config)# interface GigabitEthernet 1/1
(config-if)# lldp cdp-aware
Parameters:
Parameters:
Explanation: The switch will analyze LLDP information received from neighbours.
Parameters:
Explanation: This sets the server mode operation. When the mode of operation is
enabled (on), the syslog message will send out to syslog server (at the server
address). The syslog protocol is based on UDP communication and received on
UDP port 514. Syslog server will not send acknowledgments back to the sender
since UDP is a connectionless protocol and it does not provide acknowledgments.
The syslog packet will always send out, even if the syslog server does not exist.
When the mode of operation is disabled, no syslog packets are sent out.
# config t
(config)# logging on
Parameters:
{ <hostname> | <ipv4_ucast> }: Specify one of the options. The hostname is the domain name
of the log server; while the latter is IPv4 address of the log server.
# config t
(config)# logging host 192.168.1.253
Parameters:
# config t
(config)# logging level error
# config t
(config)# loop-protect
Explanation: Configure the period for which a port will be kept disabled.
Parameters:
<t: 0-604800>: Specify a shutdown time value. The valid values are from 0 to 604800 seconds.
0 means that a port is kept disabled until next device restart.
# config t
(config)# loop-protect shutdown-time 180
Explanation: Configure the interval between each loop protection PDU sent on
each port.
Parameters:
<t: 1-10>: Specify a transmit time value. The valid values are from 1 to 10 seconds.
# config t
(config)# loop-protect transmit-time 5
Explanation: Configure the action taken when loops are detected on a port.
Parameters:
{ [ shutdown ] [ log ] }: When a loop is detected on a port, the loop protection will immediately
take appropriate actions. Actions will be taken include “Shutdown Port”, “Shutdown Port and
Log” or “Log Only”.
Explanation: Configure the aging time for a learned MAC to be appeared in MAC
learning table.
Parameters:
<v_0_10_to_1000000>: Specify an aging time value for MAC address table. The valid values are
from 10 to 1000000 (seconds). Using “0” to disable aging time function.
# config t
(config)# mac address-table aging-time 600
Show: > show mac address-table [ conf | static | aging-time | { { learning | count } [ interface
( <port_type> [ <v_port_type_list> ] ) ] } | { address <v_mac_addr> [ vlan <v_vlan_id> ] } | vlan
<v_vlan_id_1> | interface ( <port_type> [ <v_port_type_list_1> ] ) ]
# show mac address-table [ conf | static | aging-time | { { learning | count } [ interface
( <port_type> [ <v_port_type_list> ] ) ] } | { address <v_mac_addr> [ vlan <v_vlan_id> ] } | vlan
<v_vlan_id_1> | interface ( <port_type> [ <v_port_type_list_1> ] ) ]
# show mac address-table aging-time
Parameters:
interface ( <port_type> [ <v_port_type_list> ] ): Specify the interface port type and the port
number.
# config t
(config)# mac address-table static 11:11:22:22:33:33 vlan 1
interface GigabitEthernet 1/1-10
Show: > show mac address-table [ conf | static | aging-time | { { learning | count } [ interface
( <port_type> [ <v_port_type_list> ] ) ] } | { address <v_mac_addr> [ vlan <v_vlan_id> ] } | vlan
<v_vlan_id_1> | interface ( <port_type> [ <v_port_type_list_1> ] ) ]
# show mac address-table [ conf | static | aging-time | { { learning | count } [ interface
( <port_type> [ <v_port_type_list> ] ) ] } | { address <v_mac_addr> [ vlan <v_vlan_id> ] } | vlan
<v_vlan_id_1> | interface ( <port_type> [ <v_port_type_list_1> ] ) ]
Parameters:
[ secure ]: Only static MAC entries listed in “Static MAC Table Configuration” are learned. Others
will be dropped.
NOTE: Make sure that the link used for managing the switch is added to the
Static Mac Table before changing to secure learning mode, otherwise the
management link is lost and can only be restored by using another non-secure
port or by connecting to the switch via the serial interface.
Show: > show mac address-table [ conf | static | aging-time | { { learning | count } [ interface
( <port_type> [ <v_port_type_list> ] ) ] } | { address <v_mac_addr> [ vlan <v_vlan_id> ] } | vlan
<v_vlan_id_1> | interface ( <port_type> [ <v_port_type_list_1> ] ) ]
# show mac address-table [ conf | static | aging-time | { { learning | count } [ interface
( <port_type> [ <v_port_type_list> ] ) ] } | { address <v_mac_addr> [ vlan <v_vlan_id> ] } | vlan
<v_vlan_id_1> | interface ( <port_type> [ <v_port_type_list_1> ] ) ]
Explanation: Configure the media type supported for this specific interface.
Parameters:
{ rj45 | sfp | dual }: The options are RJ-45, SFP, or dual (both RJ-45 & SFP are supported.).
Explanation: Configure the maximum transmission unit for this specific interface.
Parameters:
<max_length: 1518-9600>}: Specify the MTU. The range is 1518 to 9600 bytes.
Syntax: (config)# mep <inst> [ mip ] { up | down } domain { port | evc | vlan } [ vid
<vid> ] flow <flow> level <level> interface <port_type> <port>
Parameters:
{ up | down }: Specify the traffic direction either Ingress or Egress for monitoring on a residence
port.
Evc: This is a MEP in the EVC Domain. 'Flow Instance' is a EVC. The EVC must be created.
VLAN: This is a MEP in the VLAN Domain. 'Flow Instance' is a VLAN. The VLAN must be created.
[ vid <vid> ]: A C-tag or S-tag (depending on VLAN port type) is added with this VID. Entering
“0” means no tag will be added.
interface <port_type> <port>: Specify a port number that you want to moinitor.
Parameters:
ais [ fr1s | fr1m ]: Ais stands for Alarm Indication Signal. “fr1s” means that frame rate is 1 f/s.
“fr1m” means that frame rate is 1 f/min.
[ protect ]: The AIS can be used for protection. At the point of state change three AIS PDUs
are transmitted as fast as possible.
Syntax: (config)# mep <inst> aps <prio> [ multi | uni ] { laps | { raps [ octet
<octet> ] } }
Parameters:
aps <prio>: The priority to be inserted as PCP bits in TAG (if any).
multi: OAM PDU is transmitted with multicast MAC. Must be “multi” in case of RAPS (Ring
Automatic Protection Switching Protocol).
uni: OAM PDU is transmitted with unicast MAC. The MAC is taken from peer MEP MAC
database. This option is only possible in case of LAPS (Linear Automatic Protection
Switching Protocol).
octet: This is the last octet of the transmitted and expected RAPS multi-cast MAC. In
G.8031 (03/2010) a RAPS multi-cast MAC is defined as 01-19-A7-00-00-XX. In current
standard the value for this last octet is '01' and the usage of other values is for further
study.
Syntax: (config)# mep <inst> cc <prio> [ fr300s | fr100s | fr10s | fr1s | fr6m | fr1m
| fr6h ]
Parameters:
<prio: 0-7>: The priority to be inserted as PCP bits in TAG (if any).
[ fr300s | fr100s | fr10s | fr1s | fr6m | fr1m | fr6h ]: The frame rate is 300 f/s, 100 f/s, 10 f/s,
1 f/s, 6 f/min, 1 f/min, 6 f/hour.
Parameters:
{ evc | vlan }: The client layer domain. Options available are EVC and VLAN
domain.
Syntax: (config)# mep <inst> client flow <cflow> level <level> [ ais-prio
[ <aisprio> | ais-highest ] ] [ lck-prio [ <lckprio> | lck-highest ] ]
Explanation: Configure the priority to be used when transmitting AIS in each client
flow.
Parameters:
[ ais-prio [ <aisprio:0-7> | ais-highest ] ]: Configure AIS injection priority. Specify either 0-7 or
the highest possible number.
[ lck-prio [ <lckprio: 0-7> | lck-highest ] ]: Configure LCK injection priority. Specify either 0-7 or
the highest possible number.
Syntax: (config)# mep <inst> dm <prio> [ multi | { uni mep-id <mepid> } ] [ single
| dual ] [ rdtrp | flow ] interval <interval> last-n <lastn>
Parameters:
dm <prio: 0-7>: Configure Delay Measurement (DM) priority value. Priority in case of tagged
OAM. In the EVC domain this is the COS-ID.
rdtrp: The frame delay calculated by the transmitting and receiving timestamps of
initiators. Frame Delay = RxTimeb-TxTimeStampf.
Flow: The frame delay calculated by the transmitting and receiving timestamps of initiators
and remotes. Frame Delay = (RxTimeb-TxTimeStampf)-(TxTimeStampb-RxTimeStampf).
interval <interval>: Interval between PDU transmission in 10ms. Min value is 10.
last-n <lastn>: The last N dalays used for average last N calculation. Min value is 10.
Parameters:
Explanation: Reset all Delay Measurement results on total delay counter overflow.
Parameters:
Parameters:
Parameters:
Syntax: (config)# mep <inst> lb <prio> [ dei ] [ multi | { uni { { mep-id <mepid> } |
{ mac <mac> } } } ] count <count> size <size> interval <interval>
Parameters:
lb <prio: 0-7>: Configure loopback priority. The priority to be inserted as PCP bits in TAG (if
any).
[ multi | { uni { { mep-id <mepid> } | { mac <mac> } } } ]: Specify LBM PDU to be transmitted as
unicast or multicast. The unicast MAC will be configured through 'Peer MEP' or 'Unicast Peer
MAC'. To-wards MIP only unicast Loop Back is possible.
size <size>: The number of bytes in the LBM PDU Data Pattern TLV.
interval <interval>: The number of bytes in the LBM PDU Data Pattern TLV.
Parameters:
Parameters:
Syntax: (config)# mep <inst> lm <prio> [ multi | uni ] [ single | dual ] [ fr10s | fr1s
| fr6m | fr1m | fr6h ] [ flr <flr> ]
Parameters:
[ multi | uni ]: multi OAM PDU is transmitted with multicast MAC. uni OAM PDU is transmitted
with unicast MAC. The MAC is taken from peer MEP MAC database. In case of LM there is only
one peer MEP.
Syntax: (config)# mep <inst> lt <prio> { { mep-id <mepid> } | { mac <mac> } } ttl
<ttl>
Parameters:
lt <prio: 0-7>: Configure link trace priority in case of tagged OAM. In the EVC
domain this is the COS-ID.
{ { mep-id <mepid> } | { mac <mac> } }: Specify Peer MEP-ID for Link Trace target unicast MAC
or Link Trace target unicast MAC address.
Syntax: (config)# mep <inst> meg-id <megid> { itu | itu-cc | { ieee [ name
<name> ] } }
Parameters:
meg-id <megid>: Specify a MEG ID string. This is either the ITU MEG-ID or the IEEE Short MA,
depending on the selected MEG-ID format. The ITU max. is 13 characters. The ITU-CC max. is 15
characters. The IEEE max. is 16 characters..
itu:The MEG-ID has ITU format (ICC - UMC). The meg-id max. is 13 characters.
itu-cc:The MEG-ID has ITU Country Code format (CC - ICC - UMC). The meg-id max. is 15
characters.
ieee: The MEG-ID (Short MA Name) has IEEE Character String format. The meg-id max. is 16 characters.
Parameters:
Parameters:
Syntax: (config)# mep <inst> tst <prio> [ dei ] mep-id <mepid> [ sequence ] [ all-
zero | all-one | one-zero ] rate <rate> size <size>
Parameters:
tst <prio: 0-7>: Configure the test signal priority in case of tagged OAM. In the EVC domain this
is the COS-ID.
mep-id <mepid>: Configure Peer MEP-ID value for unicast TST. The MAC is taken from peer MEP
MAC database.
Parameters:
Parameters:
Parameters:
Parameters:
Parameters:
# config t
(config)# monitor destination interface gigabitethernet 1/10
Parameters:
{ [ interface ( <port_type>) [ <v_port_type_list> ] ]}: Specify one of the options. * means all
interfaces.
{ both | rx | tx }: Specify which direction of traffic should be mirrored to the destination port.
“both” means both received and transmitted traffic. “rx” means received traffic. “tx” means
transmitted traffic.
# config t
(config)# monitor source interface GigabitEthernet 1/1-5 rx
# config t
(config)# mvr
Parameters:
<mvr_name>: Specify a name for this MVR entry. The allowed characters are
16.
<profile_name>: Specify a channel name for this MVR entry. The allowed
characters are 16.
Example: Set up a MVR entry “video1” and its corresponding channel profile name
“1”.
# config t
(config)# mvr name video1 channel 1
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Configure the priority for transmitting IGMP/MLD control frames for
the specified MVR entry.
Parameters:
<mvr_name>: Specify a name for this MVR entry. The allowed characters are
16.
<cos_priority>: Specify a Cos priority for this MVR entry. The allowed range is
from 0 to 7.
Example: Set up a MVR entry “video1” and its corresponding priority value “0”.
# config t
(config)# mvr name video1 frame priority 0
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
<mvr_name>: Specify a name for this MVR entry. The allowed characters are
16.
# config t
(config)# mvr name video1 frame tagged
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Configure IGMP IPv4 address for the specified MVR entry.
Parameters:
<mvr_name>: Specify a name for this MVR entry. The allowed characters are
16.
Example: Set up a MVR entry “video1” and its corresponding IGMP address
“10.1.1.100”.
# config t
(config)# mvr name video1 igmp-address 10.1.1.100
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
<mvr_name>: Specify a name for this MVR entry. The allowed characters are
16.
<ipmc_lmqi>: Specify the LMQI (Last Member Query Interval) value. By default, LMQI is set to 5
tenths of a second (0.5 second). The allowed range is from 0 to 31744 tenths of a second.
# config t
(config)# mvr name video1 last-member-query-interval 600
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
<mvr_name>: Specify a name for this MVR entry. The allowed characters are
16.
Dynamic: MVR allows dynamic MVR membership reports on source ports. (This is the
default mode.)
# config t
(config)# mvr name video1 mode dynamic
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
[ name <mvr_name> ]: Specify a name for this MVR entry. This argument is
optional.
# config t
(config)# mvr vlan 201 video1
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
<profile_name>: Specify a channel name for this MVR entry. The allowed
characters are 16.
Example: Set up Set up MVR VLAN 201 and its corresponding channel.
# config t
(config)# mvr vlan 201 channel 1
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Configure the priority for transmitting IGMP/MLD control frames for
the specified MVR VLAN ID.
Parameters:
<cos_priority>: Specify a Cos priority for this MVR entry. The allowed range is
from 0 to 7.
Example: Set up a MVR VLAN 201 and its corresponding priority value “0”.
# config t
(config)# mvr vlan 201 frame priority 0
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
# config t
(config)# mvr vlan 201 frame tagged
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Explanation: Configure IGMP IPv4 address for the specified MVR entry.
Parameters:
Example: Set up a MVR VLAN 201 and its corresponding IGMP address
“10.1.1.100”.
# config t
(config)# mvr vlan 201 igmp-address 10.1.1.100
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
<ipmc_lmqi>: Specify the LMQI (Last Member Query Interval) value. By default, LMQI is set to 5
tenths of a second (0.5 second). The allowed range is from 0 to 31744 tenths of a second.
# config t
(config)# mvr vlan 201 last-member-query-interval 600
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
Parameters:
Dynamic: MVR allows dynamic MVR membership reports on source ports. (This is the
default mode.)
# config t
(config)# mvr vlan 201 mode dynamic
Show: > show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# show mvr [ vlan <v_vlan_list> | name <mvr_name> ] [ group-database [ interface
( <port_type> [ <v_port_type_list> ] ) ] [ sfm-information ] ] [ detail ]
# config t
(config)# interface GigabitEthernet 1/1
(config-if)# mvr immediate-leave
Explanation: Configure port role of specific MVR profile for specific interface.
Parameters:
<mvr_name>: Specify a MVR name. The maximum length of the MVR name string
is 16. Both alphabets and numbers are allowed for use.
Explanation: Configure port role of a specific MVR VLAN ID for this specific
interface.
Parameters:
# config t
(config)# ntp
Parameters:
< index_var: 1-5>: Specify the index number of NTP server. The allowed range is from 1 to 5.
The NTP servers are tried in numeric order. If 'Server 1' is unavailable, the NTP client will try to
contact 'Server 2'.
# config t
(config)# ntp server 1 ip-address 192.168.1.253
# config t
(config)# port-security
# config t
(config)# port-security aging
Parameters:
# config t
(config)# port-security aging time 1800
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# port-security
Explanation: The maximum number of MAC addresses that can be secured on this
port. The number cannot exceed 1024. If the limit is exceeded, the corresponding
action is taken.
Parameters:
Example: Limit Gigabit Ethernet port 1-10’s MAC addresses can be learnt to 5.
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# port-security maximum 5
Explanation: If the limit is exceeded, the specified action will take effect.
Parameters:
protect: Do not allow more than the specified limit of MAC addresses to access on a port.
No action is further taken.
trap: If Limit + 1 MAC addresses are seen on the port, send an SNMP trap. If Aging is disabled,
only one SNMP trap will be sent, but with Aging enabled, new SNMP traps will be sent every
time the limit is exceeded.
trap-shutdown: If Limit + 1 MAC addresses is seen on the port, both the “Trap” and the
“Shutdown” actions described above will be taken.
shutdown: If Limit + 1 MAC addresses is seen on the port, shut down the port. This implies
that all secured MAC addresses will be removed from the port, and no new addresses will be
learned. Even if the link is physically disconnected and reconnected on the port (by
disconnecting the cable), the port will remain shut down. There are three ways to re-open
the port:
* Boot the switch
* Disable and re-enable Limit Control on the port or the switch
* Click the “Reopen” button
# config t
(config)# interface gigabitethernet 1/1-10
(config-if)# port-security violation trap
Parameters:
level <privilege>: Specify the privilege level. The allowed range is 0 to 15.
<cmd>: Initial valid words and literals of the command to modify, in 128 characters.
Example: The following example sets the privilege level to 15 for any Exec mode
(user or privileged) command that start with the letter "v"
# config t
(config)# privilege exec level 15 host
Explanation: This command is used to configure private VLANs. New Private VLANs
can be added and existing VLANs can be modified. Private VLANs are based on
the source port mask and there are no connections to VLANs which means that
VLAN IDs and Private VLAN IDs can be identical. A port must be a member of both
a VLAN and a Private VLAN to be able to forward packets. By default, all ports are
VLAN unaware and members of VLAN 1 and Private VLAN 1. A VLAN unaware port
can only be a member of one VLAN, but it can be a member of multiple Private
VLANs.
Parameters:
Explanation: Enable Port Isolation function on this specific interface. Port Isolation
is used to prevent communications between customer ports in a same Private
VLAN. The port that is isolated from others cannot forward any unicast, multicast
or broadcast traffic to any other ports in the same PVLAN.
Syntax: (config)# qos map cos-dscp <cos> dpl <dpl> dscp { <dscp_num> | { be |
af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43 | cs1
| cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } }
Parameters:
cos-dscp <cos>: Map COS to DSCP. Indicate the Class of Service level. The allowed range is 0 to
7. A CoS class of 0 has the lowest priority, while 7 has the highest priority.
dpl <dpl>: Specify the Drop Precedence Level. The allowed range is 0 to 7.
dscp { <dscp_num> | { be | af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 |
af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } }: Specify one of the DSCP values.
af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43: Assured
Forwarding PHB AF 11 (DSCP 10), 12 (DSCP 12), 13 (DSCP 14), 21 (DSCP 18), 22 (DSCP
20), 23 (DSCP 22), 31 (DSCP 26), 32 (DSCP 28), 33 (DSCP 30), 41 (DSCP 34), 42 (DSCP
36).
cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7: Class selector PHB CS1 precedence 1 (DSCP 8), CS2
precedence 2 (DSCP 16), CS3 precedence 3 (DSCP 24), CS4 precedence 4 (DSCP 32), CS5
precedence 5 (DSCP 40), CS6 precedence 6 (DSCP 48), CS7 precedence 7 (DSCP 56).
# config t
(config)# qos map cos-dscp 4 dpl 4 dscp cs4
Parameters:
dscp-classify { <dscp_num> | { be | af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 |
af41 | af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } }: Specify one of the DSCP
values.
af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43: Assured
Forwarding PHB AF 11 (DSCP 10), 12 (DSCP 12), 13 (DSCP 14), 21 (DSCP 18), 22 (DSCP
20), 23 (DSCP 22), 31 (DSCP 26), 32 (DSCP 28), 33 (DSCP 30), 41 (DSCP 34), 42 (DSCP
36).
cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7: Class selector PHB CS1 precedence 1 (DSCP 8), CS2
precedence 2 (DSCP 16), CS3 precedence 3 (DSCP 24), CS4 precedence 4 (DSCP 32), CS5
precedence 5 (DSCP 40), CS6 precedence 6 (DSCP 48), CS7 precedence 7 (DSCP 56).
# config t
(config)# qos map dscp-classify cs4
Syntax: (config)# qos map dscp-cos { <dscp_num> | { be | af11 | af12 | af13 | af21
| af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 |
cs6 | cs7 | ef | va } } cos <cos> dpl <dpl>
Parameters:
dscp-cos { <dscp_num> | { be | af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 |
af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } }: Specify one of the DSCP values.
af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43: Assured
Forwarding PHB AF 11 (DSCP 10), 12 (DSCP 12), 13 (DSCP 14), 21 (DSCP 18), 22 (DSCP
20), 23 (DSCP 22), 31 (DSCP 26), 32 (DSCP 28), 33 (DSCP 30), 41 (DSCP 34), 42 (DSCP
36).
cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7: Class selector PHB CS1 precedence 1 (DSCP 8), CS2
precedence 2 (DSCP 16), CS3 precedence 3 (DSCP 24), CS4 precedence 4 (DSCP 32), CS5
precedence 5 (DSCP 40), CS6 precedence 6 (DSCP 48), CS7 precedence 7 (DSCP 56).
cos <cos>: Indicate the Class of Service level. The allowed range is 0 to 7. A CoS class of 0 has
the lowest priority, while 7 has the highest priority.
dpl <dpl>: Specify the Drop Precedence Level. The allowed range is 0 to 7.
Parameters:
dscp-egress-translation { <dscp_num> | { be | af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32
| af33 | af41 | af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } }: Specify one of the
DSCP values.
af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43: Assured
Forwarding PHB AF 11 (DSCP 10), 12 (DSCP 12), 13 (DSCP 14), 21 (DSCP 18), 22 (DSCP
20), 23 (DSCP 22), 31 (DSCP 26), 32 (DSCP 28), 33 (DSCP 30), 41 (DSCP 34), 42 (DSCP
36).
cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7: Class selector PHB CS1 precedence 1 (DSCP 8), CS2
precedence 2 (DSCP 16), CS3 precedence 3 (DSCP 24), CS4 precedence 4 (DSCP 32), CS5
precedence 5 (DSCP 40), CS6 precedence 6 (DSCP 48), CS7 precedence 7 (DSCP 56).
# config t
(config)# qos map dscp-egress-translation cs4 to cs5
Parameters:
af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43: Assured
Forwarding PHB AF 11 (DSCP 10), 12 (DSCP 12), 13 (DSCP 14), 21 (DSCP 18), 22 (DSCP
20), 23 (DSCP 22), 31 (DSCP 26), 32 (DSCP 28), 33 (DSCP 30), 41 (DSCP 34), 42 (DSCP
36).
cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7: Class selector PHB CS1 precedence 1 (DSCP 8), CS2
precedence 2 (DSCP 16), CS3 precedence 3 (DSCP 24), CS4 precedence 4 (DSCP 32), CS5
precedence 5 (DSCP 40), CS6 precedence 6 (DSCP 48), CS7 precedence 7 (DSCP 56).
# config t
(config)# qos map dscp-ingress-translation cs4 to cs5
# config t
(config)# qos qce refresh
Parameters:
[ { next <qce_id_next> } | last ]: Put this QCE next to the specified one or to
the last one.
[ tag { [ type { untagged | tagged | c-tagged | s-tagged | any } ]: Set up the matched tag type.
[ vid { <ot_vid> | any } ]: Specify a specific VID or VID range or specify “any” to allow any VIDs.
[ pcp { <ot_pcp> | any } ]: Specify a specific PCP or PCP range or specify “any” to allow any PCP
values.
[ dei { <ot_dei> | any } ] } ]: Specify a specific DEI or specify “any” to allow any DEI.
[ frame-type { any | { etype [ { <etype_type> | any } ] } | { llc [ dsap { <llc_dsap> | any } ] [ ssap
{ <llc_ssap> | any } ] [ control { <llc_control> | any } ] } | { snap [ { <snap_data> | any } ] } | { ipv4
[ proto { <pr4> | tcp | udp | any } ] [ sip { <sip4> | any } ] [ dip { <dip4> | any } ] [ dscp
{ <dscp4> | { be | af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 | af41 | af42 | af43 |
cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } | any } ] [ fragment { yes | no | any } ] [ sport
{ <sp4> | any } ] [ dport { <dp4> | any } ] } | { ipv6 [ proto { <pr6> | tcp | udp | any } ] [ sip
{ <sip6> | any } ] [ dip { <dip6> | any } ] [ dscp { <dscp6> | { be | af11 | af12 | af13 | af21 | af22
| af23 | af31 | af32 | af33 | af41 | af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } |
any } ] [ sport { <sp6> | any } ] [ dport { <dp6> | any } ] } } ]: Specify the frame type that
applies to this QCE rule.
any: By default, any is used which means that all types of frames are
allowed.
etype: This option can only be used to filter Ethernet II formatted packets. (Options: Any,
Specific – 600-ffff hex; Default: ffff). Note that 800 (IPv4) and 86DD (IPv6) are excluded. A
detailed listing of Ethernet protocol types can be found in RFC 1060. A few of the more
common types include 0800 (IP), 0806 (ARP), 8137 (IPX).
llc: LLC refers to Link Logical Control and further provides three options.
dsap: DSAP stands for Destination Service Access Point address. By default, any is
used. Specify “any” or indicate a value (0x00 to 0xFF).
ssap: SSAP stands for Source Service Access Point address. By default, any is used.
Specify “any” or indicate a value (0x00 - 0xFF).
snap: SubNetwork Access Protocol can be distinguished by an OUI and a Protocol ID. (Options
for PID: Any, Specific (0x00-0xffff); Default: Any) If the OUI is hexadecimal 000000, the
protocol ID is the Ethernet type (EtherType) field value for the protocol running on top of
SNAP. If the OUI is that of a particular organization, the protocol ID is a value assigned by
that organization to the protocol running on top of SNAP. In other words, if value of the OUI
field is 00-00-00, then value of the PID will be etherType (0x0600-0xffff), and if value of the
OUI isother than 00-00-00, then valid value of the PID will be any value from 0x0000 to 0xffff.
ipv4:
proto: IPv4 frame type includes Any, TCP, UDP, Other. If “TCP” or “UDP” is specified,
you might further define Sport (Source port number) and Dport (Destination port
number).
sip: Specify source IP type. By default, any is used. Indicate self-defined source IP and
submask format. The address and mask must be in the format x.y.z.w where x, y, z,
and w are decimal numbers between 0 and 255. When the mask is converted to a 32-
bit binary string and read from left to right, all bits following the first zero must also
be zero
dscp: By default, any is used. Indicate a DSCP value or a range of DSCP value.
ipv6:
proto: IPv6 protocol includes Any, TCP, UDP, Other. If “TCP” or “UDP” is specified, you
may need to further define Sport (Source port number) and Dport (Destination port
number).
sip: Specify source IP type. By default, any is used. You can also indicate self-
defined source IP and submask format.
dscp: By default, any is used. You can also indicate a DSCP value or a range of DSCP
value.
[ action { [ cos { <action_cos> | default } ]: Specify the classification action taken on ingress
frame if the parameters match the frame’s content. If a frame matches the QCE, it will be put
in the queue corresponding to the specified QoS class or placed in a queue based on basic
classification rules.
[ dpl { <action_dpl> | default } ]: If a frame matches the QCE, the drop precedence level will be
set to the specified value or left unchanged.
[ pcp-dei { <action_pcp> <action_dei> | default } ]: If a frame matches the QCE, the PCP or DEI
value will be set to the specified one.
[ dscp { <action_dscp_dscp> | { be | af11 | af12 | af13 | af21 | af22 | af23 | af31 | af32 | af33 |
af41 | af42 | af43 | cs1 | cs2 | cs3 | cs4 | cs5 | cs6 | cs7 | ef | va } | default } ] [ policy
{ <action_policy> | default } ] }*1 ]: If a frame matches the QCE, the DSCP value will be set to
the specified one.
Syntax: (config)# qos wred queue <queue> min-th <min_th> mdp-1 <mdp_1>
mdp-2 <mdp_2> mdp-3 <mdp_3>
Explanation: Apply RED on a particular queue or set up the minimum threshold &
drop probability value.
Parameters:
queue <queue>: Specify the queue number. Queue 0 to 5 can apply to Random Early Detection
(RED). However, RED cannot be applied to Queue 6 and 7.
min-th <min_th>: Specify the lowest RED threshold. If the average queue filling level is below
this threshold, the drop probability is zero. This valid value for this field is 0~100.
mdp-1 <mdp_1>: Controls the drop probability for the frames marked in drop precedence level
1 when the average queue filling level is 100%. The valid value is 0~100.
mdp-2 <mdp_2>: Controls the drop probability for the frames marked in drop precedence level
2 when the average queue filling level is 100%. The valid value is 0~100.
mdp-3 <mdp_3>: Controls the drop probability for the frames marked in drop precedence level
3 when the average queue filling level is 100%. The valid value is 0~100.
Parameters:
selected: Classify only selected DSCP for which classification is enabled in DSCP Translation
table
Parameters:
remap: Frame with DSCP from analyzer is remapped and remarked with the remapped
DSCP value. Depending on the frame’s DP level, the remapped DSCP value is either taken
from the DSCP Translation table, Egress Remap DP0 or DP1 field.
remap-dp: Frame with DSCP from analyzer is remapped and remarked with the remapped
DSCP value. The remapped DSCP value is always taken from the DSCP Translation table,
Egress Remap DP0 field.
Syntax: (config-if)# qos map cos-tag cos <cos> dpl <dpl> pcp <pcp> dei <dei>
Explanation: Configure (QoS class, DP level) to (PCP, DEI) Mapping of QoS for
specific interface.
Parameters:
Explanation: Configure Egress Queue shaper Rate of QoS for specific interface.
Parameters:
Explanation: Configure Egress Queue Policers Rate of QoS for specific interface.
Parameters:
Syntax: (config-if)# qos egress tag-remark { pcp <pcp> dei <dei> | mapped }
Explanation: Configure the appropriate egress remarking mode used by this port.
Parameters:
mapped: Use the mapping of the classified QoS class values and DP levels to PCP/DEI values.
Syntax: (config-if)# qos egress wrr <w0> <w1> <w2> <w3> <w4> <w5>
Explanation: Assign egress weight for QoS queueing method. WRR stands for
Weighted Round Robin and uses default queue weights. The number of packets
serviced during each visit to a queue depends on the percentages you configure
for the queues.
Parameters:
Parameters:
Parameters:
Parameters:
Syntax: (config-if)# qos ingress map tag-cos pcp <pcp> dei <dei> cos <cos> dpl
<dpl>
Explanation: Configure (QoS class, DP level) to (PCP, DEI) Mapping of QoS for
specific interface.
Parameters:
Negation: (config-if)# no qos ingress map tag-cos pcp <pcp> dei <dei>
Parameters:
Parameters:
<rate>: Indicate the rate for the policer. By default, 500kbps is used. The allowed range for
kbps and fps is 100 to 1000000. The allowed range for Mbps and kfps is 1 to 3300Mbps.
[ flowcontrol ]: Enable Flow Control. If flow control is enabled and the port is in flow control
mode, then pause frames are sent instead of discarding frames
Explanation: Configure Egress Queue shaper Rate of QoS for specific interface.
Parameters:
Parameters:
[ burst <has_burst_size> ]: Specify the burst size. The allowed range is 0-252Kbytes. By default,
the burst size is 4Kbytes.
Explanation: Configure broadcast storm control rate for QoS on the selected
ports.
Parameters:
{ unicast | multicast | broadcast }: Specify the storm type that you want to configure.
{ { <rate> [ kfps ] } | { 1024 kfps } }: User-define storm frame rate or set storm rate to 1024
kfps.
Example: The following example sets broadcast storm control for QoS to 1024
kfps.
# config t
(config)# interface GigabitEthernet 1/1
(config-if)# qos storm broadcast 1024 kfps
Parameters:
<id>: Specify Radius server identifier. The allowed characters are 1 to 253.
# config t
(config)# radius-server attribute 32 cabinet5aSW
Parameters:
# config t
(config)# radius-server attribute 4 100.1.1.25
Parameters:
Parameters:
# config t
(config)# radius-server deadtime 60
Parameters:
<host_name>: Specify the hostname or IP address for the radius server. The
allowed characters are 1 to 255.
[ timeout <seconds> ]: Specify a timeout value. If timeout value is specified here, it will replace
the global timeout value. If you prefer to use the global value, leave this field blank.
[ retransmit <retries> ]: Specify a value for retransmit retry. If retransmit value is specified
here, it will replace the global retransmit value. If you prefer to use the global value, leave this
field blank.
[ key <key> ]: Specify a secret key. If secret key is specified here, it will replace the global
secret key. If you prefer to use the global value, leave this field blank.
Explanation: Configure RADIUS server key value. This key is shared between the
RADIUS sever and the switch.
Parameters:
<key>: Specify RADIUS server secret key value. The valid range is 1 to 63.
# config t
(config)# radius-server key 803321
Parameters:
# config t
(config)# radius-server retransmit 5
Explanation: Configure the time the switch waits for a reply from an
authentication server before it retransmits the request.
Parameters:
<seconds>: Specify RADIUS server timeout value. The valid range is 1 to 1000.
# config t
(config)# radius-server timeout 60
Parameters:
east interface <port_type> <east_port> [ edge ]: Specify the east port type (Fast Ethernet or
Gigabit Ethernet) and port number. If this port is the edge port, add “edge” after the port
number.
west interface <port_type> <west_port> [ edge ]: Specify the west port type (Fast Ethernet or
Gigabit Ethernet) and port number. If this port is the edge port, add “edge” after the port
number.
# config t
(config)# ring 1 chain east interface GigabitEthernet 1/1 wes
interface GigabitEthernet 1/2
Parameters:
east interface <port_type> <east_port>: Specify the east port type (Fast Ethernet or Gigabit
Ethernet) and port number.
west interface <port_type> <west_port>: Specify the west port type (Fast Ethernet or Gigabit
Ethernet) and port number.
# config t
(config)# ring 2 ring east interface GigabitEthernet 1/3 west
interface GigabitEthernet 1/4
Parameters:
east interface <port_type> <east_port>: Specify the east port type (Fast Ethernet or Gigabit
Ethernet) and port number.
# config t
(config)# ring 3 ring east interface GigabitEthernet 1/1
Syntax: (config)# rmon alarm <id> <oid_str> <interval> { absolute | delta } rising-
threshold <rising_threshold> [ <rising_event_id> ] falling-threshold
<falling_threshold> [ <falling_event_id> ] { [ rising | falling | both ] }
Parameters:
<id>: Indicates the index of the entry. The range is from 1 to 65535.
<oid_str>: The object number of the MIB variable to be sampled. Only variables of the type
ifEntry.n.n may be sampled. Possible variables are ifInOctets, ifInUcastPkts, ifInNUcastPkts,
ifOutDiscards, ifErrors, ifInUnknownProtos, ifOutOctets, ifOutUcastPkts, ifOutNUcastPkts,
ifOutDiscards, ifOutErrors.
<interval>: The polling interval for sampling and comparing the rising and falling threshold. The
range is from 1to 2^31 (2147483647) seconds.
Delta: The last sample is subtracted from the current value and the difference is compared
to the thresholds.
rising-threshold <rising_threshold>: If the current value is greater than the rising threshold and
the last sample value is less than this threshold, then an alarm will be triggered. After a rising
event has been generated, another such event will not be generated until the sampled value
has fallen below the rising threshold, reaches the falling threshold, and again moves back up to
the rising threshold. The threshold range is -2147483647 to 2147483647.
falling-threshold <falling_threshold>: If the current value is less than the falling threshold, and
the last sample value was greater than this threshold, then an alarm will be generated. After a
falling event has been generated, another such event will not be generated until the sampled
value has risen above the falling threshold, reaches the rising threshold, and again moves back
down to the failing threshold. (Range: -2147483647 to 2147483647)
{ [ rising | falling | both ] }: Specify a method that is used to sample the selected variable and
calculate the value to be compared against the thresholds.
rising: Trigger alarm when the first value is larger than the rising
threshold.
falling: Trigger alarm when the first value is less than the falling
threshold.
both: Trigger alarm when the first value is larger than the rising
threshold or less than the falling threshold.
Parameters:
[ log ]: When the event is triggered, a RMON log entry will be generated.
[ trap <community> ]: A password-like community string sent with the trap. Although the
community string can be set on this configuration page, it is recommended that it be defined
on the SNMP trap configuration page prior to configuring it here. The allowed characters are 0 -
127.
Parameters:
[ buckets <buckets> ]: The number of buckets requested for this entry. The allowed range is
1~65535.
[ interval <interval> ]: Indicates the polling interval. By default, 1800 seconds is specified. The
allowed range is 1~3600 seconds.
Parameters:
# config t
(config)# snmp-server
Parameters:
<group_name>: A string identifying the group name that this entry should belong to. The
allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
model { v1 | v2c | v3 | any }: Indicates the security model that this entry should belong to.
Possible security models are:
level { auth | noauth | priv }: Indicates the security level that this entry should belong to.
Possible security models are:
[ read <view_name> ]: The name of the MIB view defining the MIB objects for which this
request may request the current values. The allowed string length is 1 to 32, and the allowed
content is ASCII characters from 0x21 to 0x7E.
[ write <write_name> ]: The name of the MIB view defining the MIB objects for which this
request may potentially set new values. The allowed string length is 1 to 32, and the allowed
content is ASCII characters from 0x21 to 0x7E.
Parameters:
<comm >: Indicate a community read or write access string to permit access to the SNMP
agent. The allowed string length is 0 to 255, and the allowed content is the ASCII characters
from 0x21 to 0x7E.
[ ro | rw ]: Indicates whether the specified community applies to read only access string or read
& write access string.
# config t
(config)# snmp-server community v2c private124 rw
Parameters:
Parameters:
# config t
(config)# snmp-server contact [email protected]
Parameters:
<engineID>: Indicates the SNMPv3 engine ID. The string must contain an even number (in
hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not
allowed. Changes to the Engine ID will clear all original local users.
Parameters:
<conf_name: word 32>: Specify a host name. Once “Enter” is pressed, the CLI prompt changes
to (config-snmps-host)#.
# config t
(config)# snmp-server host RemoteSnmp
Parameters:
<v_line255>: Specify the descriptive location of this device. The allowed string
length is 0 – 255.
# config t
(config)# snmp-server location Cabinet A22
Parameters:
{ v1 | v2c | v3 }: Indicates the security model that this entry should belong to.
<security_name>: A string identifying the security name that this entry should belong to.
The allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21
to 0x7E.
<group_name>: A string identifying the group name that this entry should belong to. The
allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to
0x7E.
# config t
(config)# snmp-server trap
Parameters:
<username: word 32>: A string identifying the user name that this entry should belong to. The
allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
engine-id <engineID>: An octet string identifying the engine ID that this entry should belong to.
The string must contain an even number (in hexadecimal format) with number of digits
between 10 and 64, but all-zeros and all-'F's are not allowed. The SNMPv3 architecture uses
the User-based Security Model (USM) for message security and the View-based Access Control
Model (VACM) for access control. For the USM entry, the usmUserEngineID and usmUserName
are the entry's keys. In a simple agent, usmUserEngineID is always that agent's own
snmpEngineID value. The value can also take the value of the snmpEngineID of a remote SNMP
engine with which this user can communicate. In other words, if user engine ID equal system
engine ID then it is local user; otherwise it is a remote user.
{ md5 <md5_passwd> | sha <sha_passwd> }: Indicates the authentication protocol that this
entry should belong to. Possible authentication protocols are:
md5 <md5_passwd>: An optional flag to indicate that this user uses MD5 authentication
protocol. A string identifying the authentication password phrase. For MD5 authentication
protocol, the allowed string length is 8 to 32 characters. For SHA authentication protocol,
the allowed string length is 8 to 40 characters. The allowed content is ASCII characters
from 0x21 to 0x7E.
sha <sha_passwd>: An optional flag to indicate that this user uses SHA authentication
protocol. A string identifying the authentication password phrase. For MD5 authentication
protocol, the allowed string length is 8 to 32 characters. For SHA authentication protocol,
the allowed string length is 8 to 40 characters. The allowed content is ASCII characters
from 0x21 to 0x7E.
[ priv { des | aes } <priv_passwd> ] ]: Indicates the privacy protocol that this entry should
belong to. Possible privacy protocols are:
DES: An optional flag to indicate that this user uses DES authentication protocol.
AES: An optional flag to indicate that this user uses AES authentication protocol.
<priv_passwd>: A string identifying the privacy password phrase. The allowed string length
is 8 to 32, and the allowed content is ASCII characters from 0x21 to 0x7E.
Parameters:
# config t
(config)# snmp-server version v3
Parameters:
<view_name>: A string identifying the view name that this entry should belong to. The
allowed string length is 1 to 32, and the allowed content is ASCII characters from 0x21 to
0x7E.
<oid_subtree>: The OID defining the root of the subtree to add to the named view. The
allowed OID length is 1 to 128.
{ include | exclude }: Indicates the view type that this entry should belong to. Possible view
types are:
included: An optional flag to indicate that this view subtree should be included.
excluded: An optional flag to indicate that this view subtree should be excluded. In
general, if a view entry's view type is 'excluded', there should be another view entry
existing with view type as 'included' and it's OID subtree should overstep the
'excluded' view entry.
Parameters:
Parameters:
Parameters:
<v_ipv6_ucast>: Specify the IPv6 address. It allows a valid IP address in dotted decimal notation
('x.y.z.w'). Also allowed is a valid hostname. A valid hostname is a string drawn from the
alphabet (A-Z; a-z), digits (0-9), dot (.) and dash (-). Spaces are not allowed. The first character
must be an alpha character, and the first and last characters cannot be a dot or a dash.
[ <udp_port> ]: Indicates the SNMP trap destination port. SNMP Agent will send SNMP message
via this port, the port range is 1~65535. The default SNMP trap port is 162.
Parameters:
{ <v_ipv4_ucast> | <v_word45> }: Indicates the SNMP trap destination address. It allows a valid
IP address in dotted decimal notation ('x.y.z.w'). Also allowed is a valid hostname. A valid
hostname is a string drawn from the alphabet (A-Z; a-z), digits (0-9), dot (.) and dash (-).
Spaces are not allowed. The first character must be an alpha character, and the first and last
characters cannot be a dot or a dash.
[ <udp_port> ]: Indicates the SNMP trap destination port. SNMP Agent will send SNMP message
via this port, the port range is 1~65535. The default SNMP trap port is 162.
Parameters:
v1 [v1_comm]: Support SNMPv1 and trap community access string when sending SNMP
trap packet. The allowed string length is 0 to 255, and the allowed content is ASCII
characters from 0x21 to 0x7E.
v2 [v2_comm]: Support SNMPv2c and trap community access string when sending SNMP
trap packet. The allowed string length is 0 to 255, and the allowed content is ASCII
characters from 0x21 to 0x7E.
[ probe | engineID <v_word10_to_32> ]: Indicates the SNMP trap probe security engine
ID or SNMP trap security engine ID. SNMPv3 sends traps and informs use USM for
authentication and privacy. A unique engine ID for these traps and informs is needed.
When "Trap Probe Security Engine ID" is enabled, the ID will be probed automatically.
Otherwise, the ID specified in this field is used. The string must contain an even
number (in hexadecimal format) with number of digits between 10 and 64, but all-
zeros and all-'F's are not allowed.
[ <securtyname> ]: Indicates the SNMP trap security name. SNMPv3 traps and informs
use USM for authentication and privacy. A unique security name is needed when traps
and informs are enabled.
# config t
(config-snmps-host)# version v2 public
Parameters:
<retries>: Indicates the SNMP trap inform retry times. The allowed range is 0
to 255.
<timeout>: Indicates the SNMP trap inform timeout. The allowed range is 0
to 2147.
Parameters: None.
# config t
(config-snmps-host)# shutdown
Parameters:
coldstart: The switch has booted from a powered off or due to power cycling (power
failure).
[ switch [ stp ] [ rmon ] ]: Indicates that the Switch group's traps. Possible
traps are:
# config t
(config-snmps-host)# traps aaa authentication
# config t
(config)# spanning-tree aggregation
(config-stp-aggr)#
Explanation: Enable BPDU guard function. This feature protects ports from
receiving BPDUs. It can prevent loops by shutting down a port when a BPDU is
received instead of putting it into the spanning tree discarding state. If enabled,
the port will disable itself upon receiving valid BPDU's.
Parameters:
auto: The switch automatically determines whether the interface is attached to a point-to-
point link or shared medium.
Parameters:
mst <instance: 0-15>: Specify MST instance number. Specify “0” to denote CIST. Specify “1-15”
to denote MSTI 1-15.
cost { <cost> | auto }: Specify a Path cost value that is used to determine the best path between
devices. Valid values are 1 to 200000000. If “auto” mode is specified, the system automatically
detects the speed and duplex mode to decide the path cost. Please note that path cost takes
precedence over port priority.
Parameters:
mst <instance: 0-15>: Specify MST instance number. Specify “0” to denote CIST. Specify “1-15”
to denote MSTI 1-15.
Explanation: Enable restricted role function. If enabled, this causes the port not
to be selected as Root Port for the CIST or any MSTI, even if it has the best
spanning tree priority.
Explanation: Enable restricted TCN function. If enabled, this causes the port not
to propagate received topology change notifications and topology changes to
other ports.
Explanation: Enable edge BPDU filtering function. The purpose of Port BPDU
Filtering is to prevent the switch from sending BPDU frames on ports that are
connected to end devices.
# config t
(config)# spanning-tree edge bpdu-filter
Explanation: Enable edge BPDU guard function. Edge ports generally connect
directly to PC, file servers or printers. Therefore, edge ports are configured to allow
rapid transition. Under normal situations, edge ports should not receive
configuration BPDUs. However, if they do, this probably is due to malicious attacks
BPDU Guard is therefore used to prevent the device from suffering malicious
attacks. With this function enabled, when edge ports receive configuration
BPDUs, STP disables those affected edge ports. After a period of recovery time,
those disabled ports are re-activated.
# config t
(config)# spanning-tree edge bpdu-guard
Parameters:
# config t
(config)# spanning-tree mode mstp
Parameters:
<instance: 0-7>: Specify an instance ID. “0” means CIST. “1-7” means MSTI 1-
7.
# config t
(config)# spanning-tree mst 1 priority 61440
Parameters:
<instance: 0-7>: Specify an instance ID. “0” means CIST. “1-7” means MSTI 1-
7.
<v_vlan_list>: Specify a list of VLANs for the specified MST instance. Separate VLANs with a
comma and use hyphen to denote a range of VLANs. (Example: 2,5,20-40)
Explanation: Specify VLANs mapped to a certain MSTI. Both a single VLAN and a
range of VLANs are allowed.
# config t
(config)# spanning-tree mst 1 vlan 90,101-105
Parameters:
Explanation: Fort STP bridges, the Forward Delay is the time spent in each Listening
and Learning state before the Forwarding state is entered. This delay occurs when
a new bridge comes onto a network.
# config t
(config)# spanning-tree mst forward-time 15
Parameters:
<maxage: 6-40>: Specify the max age value. The valid range is from 6 to 40.
[ forward-time <fwdtime> ]: Fort STP bridges, the Forward Delay is the time spent in each
Listening and Learning state before the Forwarding state is entered. This delay occurs when a
new bridge comes onto a network. Valid values are 4-30 seconds.
Explanation: If another switch in the spanning tree does not send out a hello packet
for a period of time, it is considered to be disconnected. Valid values are 6 to 40
seconds, and Max Age values must be smaller than or equal to (Forward Delay-
1)*2.
# config t
(config)# spanning-tree mst max-age 20
Parameters:
<maxhops>: Specify the maximum hop count value. The valid range is from 6
to 40.
Explanation: The maximum number of hops allowed for MST region before a BPDU
is discarded. Each bridge decrements the hop count by one before passing on the
BPDU. When the hop count reaches zero, the BPDU is discarded. The default hop
count is 20. The allowed range is 6-40.
# config t
(config)# spanning-tree mst max-hops 20
Parameters:
name <name>: Specify a name for this MSTI. By default, the switch’s MAC address is used. The
maximum length is 32 characters. In order to share spanning trees for MSTI, bridges must have
the same configuration name and revision value.
Parameters:
<interval>: The time that has to pass before a port in the error-disabled state can be enabled.
The allowed range is 30 – 86400 (seconds).
# config t
(config)# spanning-tree recovery interval 50
Parameters:
<holdcount:1-10>: Specify the transmit hold-count. The allowed transmit hold count is 1 to 10.
Explanation: The number of BPDU sent by a bridge port per second. When
exceeded, transmission of the next BPDU will be delayed. By default, it is set to 6.
The allowed transmit hold count is 1 to 10. Please note that increasing this value
might have a significant impact on CPU utilization and decreasing this value might
slow down convergence. It is recommended to remain Transmit Hold Count to the
default setting.
# config t
(config)# spanning-tree transmit hold-count 6
Explanation: Enable auto edge function on this interface. When enabled, a port is
automatically determined to be at the edge of the network when it receives no
BPDUs.
Explanation: Enable BPDU guard function on this interface. This feature protects
ports from receiving BPDUs. It can prevent loops by shutting down a port when a
BPDU is received instead of putting it into the spanning tree discarding state. If
enabled, the port will disable itself upon receiving valid BPDU's.
Parameters:
auto: The switch automatically determines whether the interface is attached to a point-to-
point link or shared medium.
Parameters:
mst <instance: 0-15>: Specify MST instance number. Specify “0” to denote CIST. Specify “1-15”
to denote MSTI 1-15.
cost { <cost> | auto }: Specify a Path cost value that is used to determine the best path between
devices. Valid values are 1 to 200000000. If “auto” mode is specified, the system automatically
detects the speed and duplex mode to decide the path cost. Please note that path cost takes
precedence over port priority.
Parameters:
mst <instance: 0-15>: Specify MST instance number. Specify “0” to denote CIST. Specify “1-15”
to denote MSTI 1-15.
Explanation: Enable restricted role function. If enabled, this causes the port not
to be selected as Root Port for the CIST or any MSTI, even if it has the best
spanning tree priority.
Explanation: Enable restricted TCN function. If enabled, this causes the port not
to propagate received topology change notifications and topology changes to
other ports.
Explanation: VLAN Translation is especially useful for users who want to translate
the original VLAN ID to a new VLAN ID so as to exchange data across different
VLANs and improve VLAN scaling. VLAN translation replaces an incoming C-VLAN
tag with an S-VLAN tag instead of adding an additional tag. When configuring VLAN
Translation, both ends of the link normally must be able to replace tags
appropriately. In other words, both ends must be configured to translate the C-
VLAN tag to S-VLAN tag and S-VLAN tag to C-VLAN tag appropriately in a network.
Note that only access ports support VLAN translation. It is not recommended to
configure VLAN Translation on trunk ports.
Parameters:
<group ID: 1-28>: Indicate the Group ID that applies to this translation rule.
<translation_vlan>: Indicate the new VID to which VID of ingress frames will be changed.
# config t
(config)# switchport vlan mapping 5 100 201
Parameters:
# config t
(config)# interface GigabitEthernet 1/1
(config-if)# switchport access vlan 10
(config-if)#
Parameters:
{ add | remove }: Add or remove this specific interface from the forbidden VLAN list.
Explanation: Configure the accepted frame types. Available options include “all”
(accept all frames), “tagged” (accept only tagged frames), “untagged” (accept only
untagged frames). This parameter affects VLAN ingress processing. If the port only
accepts tagged frames, untagged frames received on the port are discarded. By
default, frame type is set to All.
Parameters:
{ all | tagged | untagged }: Specify the frame type for this interface. Available options include
“all” (accept all frames), “tagged” (accept only tagged frames), “untagged” (accept only
untagged frames).
Syntax: (config-if)# switchport hybrid allowed vlan { all | none | [ add | remove |
except ] <vlan_list> }
Parameters:
{ all | none | [ add | remove | except ] <vlan_list> }: Specify one of the options.
none: No VLANs.
Parameters:
all [except-native]: All VLANs except the configured PVID will be tagged.
Explanation: Configures the VLAN identifier in Hybrid mode for the port. The
allowed values are from 1 through 4095. The default value is 1.
Parameters:
Explanation: Configures the port type in Hybrid mode for the port.
Parameters:
{ unaware | c-port | s-port | s-custom-port }: There are four port types available. Each port
type’s ingress and egress action is described in the following table.
Action Egress
Ingress Action
Port Action
Type
When a tagged The TPID of
frame is received frame
on a port, transmitted
1. If the tagged frame with by Unaware
TPID=0x8100, it becomes a port will be
double-tag frame and is set to
forwarded. 0x8100. The
2. If the TPID of tagged frame is final status
Unaware not 0x8100 (ex. 0x88A8), it will of the frame
be discarded. after
egressing
When an
are also
untagged frame
affected by
is received on a
egress rule.
port, a tag (PVID)
is attached and
then forwarded.
When a tagged The TPID of
frame is received frame
on a port, transmitted
1. If a tagged frame with by C-port will
TIPID=0x8100, it is forwarded. be set to
2. If the TPID of tagged frame is 0x8100.
not 0x8100 (ex. 0x88A8), it will
C-port be discarded.
When an
untagged frame
is received on a
port, a tag (PVID)
is attached and
then forwarded.
When a tagged The TPID of
S-port frame is received frame
on a port, transmitted
Parameters:
Syntax: (config-if)# switchport trunk allowed vlan { all | none | [ add | remove |
except ] <vlan_list> }
Parameters:
{ all | none | [ add | remove | except ] <vlan_list> }: Specify one of the options.
none: No VLANs.
Explanation: Configure native VLAN ID in trunk mode for this specific interface.
Parameters:
Parameters:
Parameters:
<mac_addr>: Indicate the source MAC address. Please note that the source MAC address can only
map to one VLAN ID.
vlan <vid>: Map this MAC address to the associated VLAN ID.
Explanation: Configure group VLAN mapping table for this specific interface.
Parameters:
Parameters:
<grp_id: word 16>: Indicate the descriptive name for this entry. This field only allows 16 alphabet
characters (a-z; A-Z) or integers (0-9).
Show: # show vlan protocol [ eth2 { <etype> | arp | ip | ipx | at } ] [ snap { <oui> |
rfc-1042 | snap-8021h } <pid> ] [ llc <dsap> <ssap> ]
Explanation: Configure a method for detecting VoIP traffic. By default, OUI is used.
Parameters:
oui: Traffic from VoIP devices is detected by the Organizationally Unique Identifier (OUI) of the
source MAC address. OUI numbers are assigned to manufacturers and form the first three octets
of a device MAC address. MAC address OUI numbers must be configured in the Telephony OUI list
so that the switch recognizes the traffic as being from a VoIP device.
lldp: Use LLDP (IEEE 802.1ab) to discover VoIP devices attached to a port. LLDP checks that the
“telephone bit” in the system capability TLV is turned on or not.
both: Use both OUI table and LLDP to detect VoIP traffic on a port.
Parameters:
auto: Enable the Voice VLAN auto detection mode. When voice (VoIP) traffic is detected on a
port, the port will be added as a tagged member to the Voice VLAN. When Auto mode is selected,
you need to further decide a method for detecting voice traffic in “Discovery Protocol” field,
either OUI or LLDP (802.1ab).
Explanation: Enable security filtering feature on a per port basis. When enabled,
any non-VoIP packets received on a port with Voice VLAN ID will be discarded. VoIP
traffic is identified by source MAC addresses configured in the telephony OUI list
or through LLDP which is used to discover VoIP devices attached to the switch.
Explanation: The time the switch waits for a reply from a TACACS+ server before
it retransmits the request.
Parameters:
Explanation: Deadtime is the period during which the switch will not send new
requests to a server that has failed to respond to a previous request. This will
stop the switch from continually trying to contact a server that it has already
determined as dead.
Parameters:
<minutes:1-1440>: Specify a value for tacacs-server deadtime. The allowed deadtime range is
between 1 to 1440 minutes.
Parameters:
Parameters:
[ port <port> ]: Specify the TCP port number to be used on a TACACS+ server
for authentication.
[ timeout <seconds> ]: If timeout value is specified here, it will replace the global timeout
value. If you prefer to use the global value, leave this field blank.
[ key <key> ]: If secret key is specified here, it will replace the global secret key. If you prefer to
use the global value, leave this field blank.
# config t
(config)# upnp
(config)#
Parameters:
Explanation: This defines how often an UPnP advertisement is sent. The duration
is carried in Simple Service Discover Protocol (SSDP) packets which informs a
control point how often it should receive a SSDP advertisement message from the
switch. By default, the advertising duration is set to 100 seconds. However, due
to the unreliable nature of UDP, it is recommended to set to the shorter duration
since the shorter the duration, the fresher is UPnP status.
# config t
(config)# upnp advertising-duration 150
Parameters:
<v_1_to_255>: Specify the ttl (time to live) value. The allowed range is 1 to
255.
Explanation: TTL (Time to live) is used to configure how many steps an UPnP
advertisement can travel before it disappears.
# config t
(config)# upnp ttl 10
3.9.46.1 (config)#
username<username>privilege<priv>password encrypted
Explanation: By default, there is only one user, 'admin', assigned the highest
privilege level of 15. Use this command to configure a new user account.
Parameters:
privilege <priv: 0-15>: Specify the privilege level for this new user account. The allowed range is
1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully
control of the device. But other values need to refer to each group privilege level. User's
privilege should be same or greater than the group privilege level to have the access of that
group. By default setting, most groups privilege level 5 has the read-only access and privilege
level 10 has the read-write access. And the system maintenance (software upload, factory
defaults and etc.) need user privilege level 15. Generally, the privilege level 15 can be used for
an administrator account, privilege level 10 for a standard user account and privilege level 5 for
a guest account.
password encrypted <encry_password: 4-44>: Specify the encrypted password for this new
user account. The ENCRYPTED (hidden) user password. Notice the ENCRYPTED password will be
decoded by system internally. You cannot directly use it as same as the Plain Text and it is not
human-readable text normally.
Example: Create the new user account with the following settings.
# config t
(config)# username mis4jack privilege 15 password encrypted
jack30125
3.9.46.2 (config)#
username<username>privilege<priv>password none
Explanation: By default, there is only one user, 'admin', assigned the highest
privilege level of 15. Use this command to configure a new user account without
password
Parameters:
privilege <priv: 0-15>: Specify the privilege level for this new user account. The allowed range is
1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully
control of the device. But other values need to refer to each group privilege level. User's
privilege should be same or greater than the group privilege level to have the access of that
group. By default setting, most groups privilege level 5 has the read-only access and privilege
level 10 has the read-write access. And the system maintenance (software upload, factory
defaults and etc.) need user privilege level 15. Generally, the privilege level 15 can be used for
an administrator account, privilege level 10 for a standard user account and privilege level 5 for
a guest account.
Example: Create the new user account with the following settings.
# config t
(config)# username mis4jack privilege 15 password none
3.9.46.3 (config)#
username<username>privilege<priv>password unencrypted
Explanation: By default, there is only one user, 'admin', assigned the highest
privilege level of 15. Use this command to configure a new user account with
unencrypted password.
Parameters:
privilege <priv: 0-15>: Specify the privilege level for this new user account. The allowed range is
1 to 15. If the privilege level value is 15, it can access all groups, i.e. that is granted the fully
control of the device. But other values need to refer to each group privilege level. User's
privilege should be same or greater than the group privilege level to have the access of that
group. By default setting, most groups privilege level 5 has the read-only access and privilege
level 10 has the read-write access. And the system maintenance (software upload, factory
defaults and etc.) need user privilege level 15. Generally, the privilege level 15 can be used for
an administrator account, privilege level 10 for a standard user account and privilege level 5 for
a guest account.
password unencrypted <password: line31>: Specify the unencrypted password for this user
account. The UNENCRYPTED (Plain Text) user password. Any printable characters including
space is accepted.
Example: Create the new user account with the following settings.
# config t
(config)# username mis4jack privilege 15 password unencrypted
jack30125
Parameters:
<vlist>: This shows the allowed access VLANs. This setting only affects ports set in “Access”
mode. Ports in other modes are members of all VLANs specified in “Allowed VLANs” field. By
default, only VLAN 1 is specified. More allowed access VLANs can be entered by specifying the
individual VLAN ID separated by comma. If you want to specify a range, separate it by a dash.
For example, 1, 5,10,12-15,100. Once Enter is pressed, the prompt changes to (config-vlan)#
# config t
(config)# vlan 1,510,12-15,100
(config-vlan)#
Parameters:
ethertype s-custom-port <etype>: Specify ether type used for customer s-ports. The valid
range is 0x0600 to 0xffff.
# config t
(config)# vlan ethertype s-custom-port 0x88a8
To avoid these problems, you can configure this switch with protocol-based VLANs
that divide the physical network into logical VLAN groups for each required
protocol. When a frame is received at a port, its VLAN membership can then be
determined based on the protocol type being used by the inbound packets.
Parameters:
eth2 (Ethernet): Ether Type (etype) value. By default, it is set to 0x0800. The range allowed
is 0x0600 to 0xffff.
OUI: A value in the format of xx-xx-xx where each pair (xx) in the string is a hexadecimal
value in the ranges of 0x00-0xff.
PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type field value
for the protocol running on top of SNAP. If the OUI is that of a particular organization,
the protocol ID is a value assigned by that organization to the protocol running on top
of SNAP. In other words, if value of the OUI field is 00-00-00, then value of the PID will
be etherType (0x0600-0xffff), and if value of the OUI is other than 00-00-00, then valid
value of the PID will be any value from 0x0000 to 0xffff.
LLC (Logical Link Control): This includes DSAP (Destination Service Access Point) and
SSAP (Source Service Access Point) values. By default, the value is 0xff. Valid range is
0x00 to 0xff.
group <grp_id>: Indicate the descriptive name for this entry. This field only allows 16
alphabet characters (a-z; A-Z) or integers (0-9).
# config t
(config)# vlan protocol eth2 0x88a8 group a12
Show: # show vlan protocol [ eth2 { <etype> | arp | ip | ipx | at } ] [ snap { <oui> |
rfc-1042 | snap-8021h } <pid> ] [ llc <dsap> <ssap> ]
Syntax: (config)# web privilege group <group_name> level { [ cro <cro> ] [ crw
<crw> ] [ sro <sro> ] [ srw <srw> ] }*1
Parameters:
group <group_name>: This name identifies the privilege group. Valid words are Aggregation'
'DHCP' 'Dhcp_Client' 'Diagnostics' 'EEE' 'ERPS' 'Green_Ethernet' 'IP2' 'IPMC_Snooping' 'LACP' 'LLDP'
'Loop_Protect' 'MAC_Table' 'MVR' 'Maintenance' 'Mirroring' 'NTP' 'POE' 'PTP' 'Ports'
'Private_VLANs' 'QoS' 'RPC' 'SMTP' 'Security' 'Smart_Config' 'Spanning_Tree' 'System'
'Timer' 'UPnP' 'VCL' 'VLAN_Translation' 'VLANs' 'XXRP' 'u-Ring'
level { [ cro <cro: 0-15> ] [ crw <crw: 0-15> ] [ sro <sro: 0-15> ] [ srw <srw: 0-15> ] }*1: Every
group has an authorization Privilege level for the following sub groups:
User Privilege should be the same or greater than the authorization Privilege level to have
access to that group.
# config t
(config)# web privilege group aggregation level crw 15
(config)# exit
# show web privilege group level
Group Name Privilege Level
CRO CRW SRO SRW
-------------------------------- --- --- --- ---
Aggregation 5 15 5 10
DHCP 5 10 5 10
Dhcp_Client 5 10 5 10
Diagnostics 5 10 5 10
EEE 5 10 5 10
ERPS 5 10 5 10
Green_Ethernet 5 10 5 10
IP2 5 10 5 10
IPMC_Snooping 5 10 5 10
LACP 5 10 5 10
LLDP 5 10 5 10
Loop_Protect 5 10 5 10
MAC_Table 5 10 5 10
Maintenance 15 15 15 15
Mirroring 5 10 5 10
MVR 5 10 5 10
NTP 5 10 5 10
POE 5 10 5 10
Ports 5 10 1 10
-- more --, next page: Space, continue: g, quit: ^C
Enter the factory default username “admin” with “no password”. After
successfully entering the web based management, the Port State page will
appear.
The status display can be reached by using the left side menu, and return to
Monitor>Ports>State.
4.2.2 Refresh
To update the screen, click the "Refresh" button. For automatic updating of the
screen, the "Auto-refresh" tick box may be ticked. The screen will be auto
refreshed every 3 seconds.
Unless connected directly on a local LAN, we recommend not using the auto-
refresh function as it does generate a bit of traffic.
4.2.4 Logout
After completing configuration, we recommend logging out of the web GUI. This
is easily accomplished by clicking the logout icon.
After clicking the logout icon, a confirmation screen will be displayed. Click "OK"
to finish logging out or click "Cancel" to return to the web configuration GUI.
For the remainder of this section, each menu item will be explained one by one,
in order as they descend down the menu screen, starting with the "System"
menu.
4.3 Configuration
This section offers explanations for both basic and advanced management
functions available in PowerFlow-2-10G. They are introduced below individually in
separate sub-sections.
4.3.1 System
The configurations under the "System" menu include device settings such as IP
address, time server, etc.
System Name: Indicate the hostname for this device. Alphabets (A-Z; a-z), digits
(0-9) and minus sign (-) can be used. However, space characters are not allowed.
The first character must be an alphabet character. The first and last character
must not be a minus sign. The allowed string length is 0 – 255.
System Location: Indicate the location of this device. The allowed string length is
0 – 255.
4.3.1.3 System IP
Setup the IP configuration, interface and routes.
IP Configuration
Mode: The "Mode" pull-down configures whether the IP stack should act as a
Host or a Router. In Host mode, IP traffic between interfaces will not be routed.
In Router mode traffic is routed between all interfaces. When configuring this
device for multiple VLANs, the Router mode should be chosen. Router mode is
the default mode.
DNS Server: This setting controls the DNS name resolution done by the switch. The
following modes are supported:
From any DHCP interfaces: The first DNS server offered from a DHCP lease to a
DHCP-enabled interface will be used.
Configured: Explicitly provide the IP address of the DNS Server in dotted decimal
notation.
From this DHCP interface: Specify from which DHCP-enabled interface a provided
DNS server should be preferred.
DNS Proxy: When DNS proxy is enabled, the system will relay DNS requests to the
currently configured DNS server, and reply as a DNS resolver to the client devices
on the network.
IP Interfaces
Click "Add Interface" to add a new IP interface. A maximum of 128 interfaces is
supported.
VLAN: This is the VLAN associated with the IP interface. Only ports in this VLAN
will be able to access the IP interface. This field is only available for input when
creating a new interface.
IPv4 DHCP: When this checkbox is enabled, the system will configure the IPv4
address and mask of the interface using the DHCP protocol. The DHCP client will
announce the configured System Name as hostname to provide DNS lookup.
Fallback: The number of seconds for trying to obtain a DHCP lease. After this
period expires, a configured IPv4 address will be used as IPv4 interface address. A
value of zero disables fallback mechanism. The DHCP will keep retrying until a
valid lease is obtained when fallback is disabled. Valid value is from 0 to
4294967295.
IPv4 Address: The IPv4 address of the interface is entered in dotted decimal
notation. If DHCP is enabled, this field is not used. The field may also be left
blank if IPv4 operation on the interface is not desired.
IPv4 Mask: The IPv4 network mask is entered by a number of bits (prefix length).
Valid values are between 0 and 30 bits for a IPv4 address. If DHCP is enabled, this
field is not used. The field may also be left blank if IPv4 operation on the
interface is not desired.
IPv4 Current Lease: For DHCP interfaces with an active lease, this column shows
the current interface address, as provided by the DHCP server.
IPv6 Mask: The IPv6 network mask is entered by a number of bits (prefix length).
Valid values are between 1 and 128 bits for an IPv6 address. The field may be left
blank if IPv6 operation on the interface is not desired.
IP Routes
Route Network: The IP route is the destination IP network or host address of this
route. Valid format is dotted decimal notation or a valid IPv6 notation. A default
route can use the value 0.0.0.0 or for IPv6 use the :: notation.
Route Mask: The route mask is a destination IP network or host mask, in number
of bits (prefix length). It defines how much of a network address that must
match, in order to qualify for this route. Valid values are between 0 and 32 bits
respectively 128 for IPv6 routes. Only a default route will have a mask length of 0
(as it will match anything).
Gateway: This is the IP address of the gateway. Valid format is dotted decimal
notation or a valid IPv6 notation. Gateway and Network must be of the same
type.
Next Hop VLAN: This field is only for IPv6 and is the VLAN ID (VID) of the specific
IPv6 interface associated with the gateway. The VID can range from 1 to 4096
and will be effective when the corresponding IPv6 interface is valid. If the IPv6
gateway address is link-local, you must specify the next hop VLAN for the
gateway. If it is not link-local, they system ignores the next hop VLAN for the
gateway.
Please refer to “System IP” for the configuration of the interfaces and routes.
This page is informational only.
Server #: Enter the IPv4 or IPv6 address of an NTP server. IPv6 address is in 128-
bit records represented as eight fields of up to four hexadecimal digits with a
colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The
symbol '::' is a special syntax that can be used as a shorthand way of
representing multiple 16-bit groups of contiguous zeros; but it can appear only
once. NTP servers can also be represented by a legally valid IPv4 address. For
example, '::192.1.2.34'. The NTP servers are tried in numeric order. If 'Server 1' is
unavailable, the NTP client will try to contact 'Server 2'.
The setting example above is for Eastern Standard Time in the United States.
Daylight savings time starts on the second Sunday in March at 2:00AM. Daylight
savings ends on the first Sunday in November at 2:00AM. The daylight savings
time offset is 60 minutes (1 hour).
Start time settings: Select the starting week, day, month, year, hours, and
minutes.
End time settings: Select he ending week, day, month, year, hours, and minutes.
Offset settings: Enter the number of minutes to add during Daylight Saving Time.
The allowed range is 1 to 1440.
Server Mode: This sets the server mode operation. When the mode of operation
is enabled, the syslog message will send out to syslog server (at the server
address). The syslog protocol is based on UDP communication and received on
UDP port 514. Syslog server will not send acknowledgments back to the sender
since UDP is a connectionless protocol and it does not provide acknowledgments.
The syslog packet will always send out, even if the syslog server does not exist.
When the mode of operation is disabled, no syslog packets are sent out.
Server Address: This sets the IPv4 host address of syslog server. If the switch
provides DNS feature, it also can be a host name.
Syslog Level: This sets what kind of messages will send to syslog server. Possible
levels are:
Level: Use this pull down to display all messages or messages of type info,
warning or error.
Clear Level: Use this pull down to clear selected message types from the log.
Browsing buttons: Use these buttons to quickly go to the beginning or end of the
log or to page through the log.
4.3.1.10 Power
This screen page displays the current state of the built-in power. If there is
something wrong with power modules, error messages will be displayed here.
The load is measured as averaged over the last 100ms, 1sec and 10 seconds
intervals. The last 120 samples are graphed, and the last numbers are displayed
as text as well. In order to display the SVG graph, your browser must support the
SVG format. Automatic refresh occurs every 3 seconds.
SMTP Configuration
SMTP Mode: Set the SMTP mode operation. Possible modes are:
SMTP Server: Set the SMTP server IP address (this is the server that will forward
email).
SMTP Port: Set the SMTP port number. The default SMTP port is 25.
System: Enable/disable the System group's mail events. Possible mail events are:
Power: Enable/disable the Power group's mail events. Possible mail events are:
Interface: Enable/disable the Interface group's mail events. Possible mail events
are:
4.3.2 Ports
Configurations related to the fiber and electrical ports are performed under the
Ports menu.
4.3.2.1 Configuration
This page displays current port configurations and allows some configuration
here.
Port: This device is a L2 carrier Ethernet access switch with 20 SFP ports
(numbered 1 to 20), 4 combo ports (numbered 21~24) and 4 or 2 SFP-based
uplink ports (numbered 25~28 or 25~26). Each logical port number is displayed in
a row. The select all "*" port will apply actions on all ports.
Link: The current link state for each port is displayed graphically. Green indicates
the link is up and red is down.
Current Speed: This column provides the current link speed of each port.
Configured Speed: This pull down selects any available link speed for the given
switch port. Only speeds supported by the specific port are shown.
Twin Rate Fiber: When this option is selected, the device will automatically detect
the slide-in SFP transceiver’s speed and choose the most appropriate speed
(either 100M or 1000M) for this port.
Auto: Port auto negotiating speed with the link partner, selecting the highest
speed that is compatible with the link partner.
10Gbps FDX: Forces the fiber port to 10Gbps full duplex mode.
Auto Media Select (AMS) is used for dual media ports (ports supporting both
copper and fiber SFP cables). AMS automatically determines if a SFP or copper
cable is inserted and switches to the corresponding media. If both SFP and
copper cables are inserted, the port will select the preferred media.
100-FX_AMS: Port in AMS mode with SFP preferred. SFP port in 100-FX speed.
Copper port in Auto mode.
1000-X_AMS: Port in AMS mode with SFP preferred. SFP port in 1000-X speed.
Copper port in Auto mode.
Maximum Frame Size: Enter the maximum frame size allowed for the switch port,
including FCS. This switch supports up to 10056 byte packets.
Alias Name: Specify an alternate and descriptive name for a given port. By
convention, this is the node's fully-qualified domain name. A domain name is a
text string drawn from the alphabet (A-Z; a-z), digits (0-9), minus sign (-). No
space characters are permitted as part of a name. The allowed string length is 0
to 40.
Excessive Collision Mode: This setting configures the port transmit collision
behavior to either "Discard" (Discard frame after 16 collisions - default) or to
"Restart" (Restart backoff algorithm after 16 collisions).
This is the same graphic overview shown when first logging into the switch for
management. "Black" ports have no link. "Green" colored ports indicate a 100M
linked state, while "Amber" colored ports indicate a 1G linked state. For port
25~28, "Blue" colored ports indicate 10G linked state. The link status display can
be updated by clicking the "Refresh" button. When "Auto-refresh" is checked, the
display will be updated every 3 seconds.
Port: The logical port (1~29) for the data contained in the same row.
Errors: The number of frames received in error and the number of incomplete
transmissions per port.
The counter display can be updated by clicking the "Refresh" button. When
"Auto-refresh" is checked, the display will be updated every 3 seconds. Clicking
the "Clear" button will zero all counters and start counting again.
Port: The logical port for the settings contained in the same row.
Qn: There are 8 QoS queues per port. Q0 is the lowest priority queue.
Each row describes the QCE that is defined. It is a conflict if a specific QCE is not
applied to the hardware due to hardware limitations. The maximum number of
QCEs is 256 on each switch.
Conflict: Displays Conflict status of QCL entries. As H/W resources are shared by
multiple applications, it may happen that resources required to add a QCE may
not be available. In that case it shows conflict status as 'Yes', otherwise it is
always 'No'. Please note that conflict can be resolved by releasing the H/W
resources required to add QCL entry on pressing 'Resolve Conflict' button.
Rx and Tx Octets: The number of received and transmitted (good and bad) bytes.
Includes FCS, but excludes framing bits.
Rx and Tx Unicast: The number of received and transmitted (good and bad)
unicast packets.
Rx and Tx Multicast: The number of received and transmitted (good and bad)
multicast packets.
Rx and Tx Broadcast: The number of received and transmitted (good and bad)
broadcast packets.
Receive and Transmit Size Counters: Displays the number of received and
transmitted (good and bad) packets split into categories based on their
respective frame sizes.
Receive and Transmit Queue Counters: Displays the number of received and
transmitted packets per input and output queue.
2
Rx Jabber: The number of long frames received with invalid CRC.
1
Short frames are frames that are smaller than 64 bytes.
2
Long frames are frames that are longer than the configured maximum frame
length for this port.
Wave Length 2: Laser wavelength Rx. (not all SFP support this reading)
Link Length: Link Length. (This is a marketing specification for this SFP module,
not an actual measurement.)
TX Power: The laser diode transmit power is reported by the SFP that support DDI
(Digital Diagnostic monitoring Interface).
RX Power: The receive optical power is reported by SFP that support DDI.
4.3.3 Security
Under the security heading are three major icons, switch, network and RADIUS.
4.3.3.1 Switch
4.3.3.1.1 Users
This page provides an overview of the current users. Currently the only way to
login as another user on the web server is to close and reopen the browser.
By default, there is only one user, 'admin', assigned the highest privilege level of
15.
Click the entries in User Name column to edit the existing users. Or click the “Add
New User” button to insert a new user entry.
Add User
Group Name: This name identifies the privilege group. In most cases, a privilege
level group consists of a single module (e.g. LACP, RSTP or QoS), but a few of them
contains more than one. The following description defines these privilege level
groups in details:
Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and
the MAC Address Limit), ACL, HTTPS, SSH, ARP Inspection, IP source guard.
Maintenance: CLI- System Reboot, System Restore Default, System Password, Configuration
Save, Configuration Load and Firmware Load. Web- Users, Privilege Levels and everything in
Maintenance.
Privilege Levels: Every group has an authorization Privilege level for the following
sub groups:
configuration read-only
configuration/execute read-write
status/statistics read-only
User Privilege should be the same or greater than the authorization Privilege level
to have access to that group.
Client: The management client for which the configuration below applies.
local: Use the local user database on the switch for authentication.
4.3.3.1.4 SSH
Configure SSH on this page.
4.3.3.1.5 HTTPS
Configure HTTPS on this page.
Mode: Indicates the HTTPS operation mode. When the current connection is
HTTPS and HTTPS mode operation is disabled, web browser will automatically
redirect to an HTTP connection. Possible modes are:
Automatic Redirect: Indicates the HTTPS redirect mode operation. It applies only
if HTTPS mode "Enabled" is selected. Automatically redirects HTTP of web browser
to an HTTPS connection when both HTTPS mode and Automatic Redirect are
enabled. Possible modes are:
Mode: Indicates the access management mode operation. Possible modes are:
VLAN ID: Indicates the VLAN ID for the access management entry.
Start IP address: Indicates the start IP address for the access management entry.
End IP address: Indicates the end IP address for the access management entry.
HTTP/HTTPS: Checked indicates that the matched host can access the switch
from HTTP/HTTPS interface.
SNMP: Checked indicates that the matched host can access the switch from
SNMP.
TELNET/SSH: Indicates that the matched host can access the switch from
TELNET/SSH interface.
Click the “Add New Entry” button to insert a new entry to the list.
Click the “Reset” button to restore changed settings to the default settings.
Interface: The interface type through which any remote host can access the
switch.
Received Packets: The number of received packets from the interface when
access management mode is enabled.
Allowed Packets: The number of allowed packets from the interface when access
management mode is enabled.
Discarded Packets: The number of discarded packets from the interface when
access management mode is enabled.
4.3.3.1.7 SNMP
Read Community: Indicates the community read access string to permit access to
the SNMP agent. The allowed string length is 0 to 255, and the allowed content is
the ASCII characters from 0x21 to 0x7E.
Write Community: Indicates the community write access string to permit access to
the SNMP agent. The allowed string length is 0 to 255, and the allowed content is
the ASCII characters from 0x21 to 0x7E. These two fields are applicable only for
SNMP version v1 or v2c. If SNMP version is v3, the community string will be
associated with SNMPv3 communities table. SNMPv3 provides more flexibility to
configure security name than a SNMPv1 or SNMPv2c community string. In addition
to community string, a particular range of source addresses can be used to restrict
source subnet.
Engine ID: Indicates the SNMPv3 engine ID. The string must contain an even number
(in hexadecimal format) with number of digits between 10 and 64, but all-zeros
and all-'F's are not allowed. Changes to the Engine ID will clear all original local
users.
Relay Mode: This device provides 3-pin alarm terminal on the front panel. It
controls how your alarm circuit works when alarm situion happen.
Global Settings
Mode: Globally enable or disable trap function.
Trap Config Name: Indicates a descriptive name for this SNMP trap entry.
Trap Version: Indicates the SNMP trap supported version. Possible versions are:
Trap Community: Indicates the community access string when sending SNMP trap
packet. The allowed string length is 0 to 255, and the allowed content is ASCII
characters from 0x21 to 0x7E.
Trap Destination Address: Indicates the SNMP trap destination address. It allows
a valid IP address in dotted decimal notation ('x.y.z.w'). Also allowed is a valid
hostname. A valid hostname is a string drawn from the alphabet (A-Z; a-z), digits
(0-9), dot (.) and dash (-). Spaces are not allowed. The first character must be an
alpha character, and the first and last characters cannot be a dot or a dash.
Trap Destination port: Indicates the SNMP trap destination port. SNMP Agent will
send SNMP message via this port, the port range is 1~65535. The default SNMP
trap port is 162.
Trap Inform Mode: Indicates the SNMP trap inform mode operation. Possible
modes are:
Trap Inform Timeout (seconds): Indicates the SNMP trap inform timeout. The
allowed range is 0 to 2147.
Trap Inform Retry Times: Indicates the SNMP trap inform retry times. The allowed
range is 0 to 255.
Trap Probe Security Engine ID: Indicates the SNMP trap probe security engine ID
mode of operation. Possible values are:
Trap Security Engine ID: Indicates the SNMP trap security engine ID. SNMPv3 sends
traps and informs use USM for authentication and privacy. A unique engine ID for
these traps and informs is needed. When "Trap Probe Security Engine ID" is
enabled, the ID will be probed automatically. Otherwise, the ID specified in this
field is used. The string must contain an even number (in hexadecimal format) with
number of digits between 10 and 64, but all-zeros and all-'F's are not allowed.
Trap Security Name: Indicates the SNMP trap security name. SNMPv3 traps and
informs use USM for authentication and privacy. A unique security name is needed
when traps and informs are enabled.
Warm Start: The switch has been rebooted from an already powered on
state.
Cold Start: The switch has booted from a powered off or due to power
cycling (power failure).
Switch: Indicates that the Switch group's traps. Possible traps are:
STP: Select the checkbox to enable STP trap. Clear to disable STP trap.
RMON: Select the checkbox to enable RMON trap. Clear to disable RMON
trap.
Power: Indicates the Power group's traps. Possible trap event are:
Power 1 Status: Select the checkbox to enable Power 1 status trap. Clear the
checkbox to disable Power 1 status trap.
Power 2 Status: Select the checkbox to enable Power 2 status trap. Clear the
checkbox to disable Power 2 status trap.
When the "specific" radio button is selected, a popup graphic with port
checkboxes allows selection specific ports.
After completing all the trap settings, click the "Save" button.
Alarm Relay
Power: Indicates the Power group's alarm relay. Possible options are:
Power 1 Status: Select the checkbox to enable Power 1 status alarm relay
function. Once power 1 fails, the alarm relay contacts are open and Fault LED
indicator is on in amber. Clear the checkbox to disable Power 1 status alarm relay.
Power 2 Status: Select the checkbox to enable Power 2 status alarm relay
function. Once power 2 fails, the alarm relay contacts are open and Fault LED
indicator is on in amber. Clear the checkbox to disable Power 2 status alarm relay.
Interface: Indicates the Interface group's alarm relay. Possible options are:
Link Down: none/specific/all ports Link down alarm relay. Once link down occurs
on the selected interfaces, the alarm relay contacts are open, Fault LED indicator
is on in amber. Clear the checkbox to disable alarm relay function.
When the "specific" radio button is selected, a popup graphic with port
checkboxes allows selection specific ports.
NOTE: For more information about alarm relay circuit on the terminal block,
please see Power & Alarm section.
Delete: Check to delete the entry. It will be deleted during the next save.
Source IP: Indicates the SNMP access source address. A particular range of
source addresses can be used to restrict source subnet when combined with
source mask.
Engine ID: An octet string identifying the engine ID that this entry should belong
to. The string must contain an even number (in hexadecimal format) with number
of digits between 10 and 64, but all-zeros and all-'F's are not allowed. The SNMPv3
architecture uses the User-based Security Model (USM) for message security and
the View-based Access Control Model (VACM) for access control. For the USM entry,
the usmUserEngineID and usmUserName are the entry's keys. In a simple agent,
usmUserEngineID is always that agent's own snmpEngineID value. The value can
also take the value of the snmpEngineID of a remote SNMP engine with which this
user can communicate. In other words, if user engine ID equal system engine ID
then it is local user; otherwise it is a remote user.
User Name: A string identifying the user name that this entry should belong to.
The allowed string length is 1 to 32, and the allowed content is ASCII characters
from 0x21 to 0x7E.
Security Level: Indicates the security model that this entry should belong to.
Possible security models are:
The value of security level cannot be modified if entry already exists. That means
it must first be ensured that the value is set correctly.
MD5: An optional flag to indicate that this user uses MD5 authentication
protocol.
SHA: An optional flag to indicate that this user uses SHA authentication
protocol.
The value of security level cannot be modified if entry already exists. That means
it must first be ensured that the value is set correctly.
Privacy Protocol: Indicates the privacy protocol that this entry should belong to.
Possible privacy protocols are:
DES: An optional flag to indicate that this user uses DES authentication
protocol.
AES: An optional flag to indicate that this user uses AES authentication
protocol.
Privacy Password: A string identifying the privacy password phrase. The allowed
string length is 8 to 32, and the allowed content is ASCII characters from 0x21 to
0x7E.
Click the “Add New Entry” button to insert a new entry to the list.
Click the “Reset” button to restore changed settings to the default settings.
Security Model: Indicates the security model that this entry should belong to.
Possible security models are:
Security Name: A string identifying the security name that this entry should
belong to. The allowed string length is 1 to 32, and the allowed content is ASCII
characters from 0x21 to 0x7E.
Group Name: A string identifying the group name that this entry should belong
to. The allowed string length is 1 to 32, and the allowed content is ASCII
characters from 0x21 to 0x7E.
View Name: A string identifying the view name that this entry should belong to.
The allowed string length is 1 to 32, and the allowed content is ASCII characters
from 0x21 to 0x7E.
View Type: Indicates the view type that this entry should belong to. Possible view
types are:
excluded: An optional flag to indicate that this view subtree should be excluded.
In general, if a view entry's view type is 'excluded', there should be another view
entry existing with view type as 'included' and it's OID subtree should overstep
the 'excluded' view entry.
OID Subtree: The OID defining the root of the subtree to add to the named view.
The allowed OID length is 1 to 128. The allowed string content is digital number
or an asterisk(*).
Delete: Check to delete the entry. It will be deleted during the next save.
Group Name: A string identifying the group name that this entry should belong
to. The allowed string length is 1 to 32, and the allowed content is ASCII
characters from 0x21 to 0x7E.
Security Model: Indicates the security model that this entry should belong to.
Possible security models are:
Security Level: Indicates the security level that this entry should belong to.
Possible security models are:
Read View Name: The name of the MIB view defining the MIB objects for which
this request may request the current values. The allowed string length is 1 to 32,
and the allowed content is ASCII characters from 0x21 to 0x7E.
Write View Name: The name of the MIB view defining the MIB objects for which
this request may potentially set new values. The allowed string length is 1 to 32,
and the allowed content is ASCII characters from 0x21 to 0x7E.
4.3.3.1.8 RMON
Delete: Check to delete the entry. It will be deleted during the next save.
ID: Indicates the index of the entry. The range is from 1 to 65535.
ID: Indicates the index of the entry. The range is from 1 to 65535.
Interval: Indicates the polling interval. By default, 1800 seconds is specified. The
allowed range is 1 - 3600 seconds.
Click the “Add New Entry” button to insert a new entry to the list.
Click the “Reset” button to restore changed settings to the default settings.
ID: Indicates the index of the entry. The range is from 1 to 65535.
Interval: The polling interval for sampling and comparing the rising and falling
threshold. The range is from 1to 2^31 seconds.
Variable: The object number of the MIB variable to be sampled. Only variables of
the type ifEntry.n.n may be sampled. Possible variables are InOctets, InUcastPkts,
InNUcastPkts, InDiscards, InErrors, InUnknownProtos, OutOctets, OutUcastPkts,
OutNUcastPkts, OutDiscards, OutErrors, and OutQLen.
Sample Type: Test for absolute or relative change in the specified variable.
Delta: The last sample is subtracted from the current value and the
difference is compared to the thresholds.
Startup Alarm: Select a method that is used to sample the selected variable and
calculate the value to be compared against the thresholds.
Rising or Falling: Trigger alarm when the first value is larger than the rising
threshold or less than the falling threshold.
Rising: Trigger alarm when the first value is larger than the rising threshold.
Falling: Trigger alarm when the first value is less than the falling threshold.
Rising Threshold: If the current value is greater than the rising threshold and the
last sample value is less than this threshold, then an alarm will be triggered. After
a rising event has been generated, another such event will not be generated until
the sampled value has fallen below the rising threshold, reaches the falling
threshold, and again moves back up to the rising threshold. The threshold range
is -2147483647 to 2147483647.
Rising Index: Indicates the rising index of an event. The range is 1~65535.
Falling Threshold: If the current value is less than the falling threshold, and the
last sample value was greater than this threshold, then an alarm will be
generated. After a falling event has been generated, another such event will not
be generated until the sampled value has risen above the falling threshold,
reaches the rising threshold, and again moves back down to the failing threshold.
(Range: -2147483647 to 2147483647)
Falling Index: Indicates the falling index of an event. The range is 1~65535.
Click the “Add New Entry” button to insert a new entry to the list.
Click the “Reset” button to restore changed settings to the default settings.
Delete: Check to delete the entry. It will be deleted during the next save.
Type: Select an event type that will take when an alarm is triggered.
Log: When the event is triggered, a RMON log entry will be generated.
Community: A password-like community string sent with the trap. Although the
community string can be set on this configuration page, it is recommended that it
be defined on the SNMP trap configuration page prior to configuring it here. The
allowed characters are 0~127.
Event Last Time: The value of sysUpTime when an event was last generated for this
entry.
Pkts: The total number of packets (including bad packets, broadcast packets)
received.
Broadcast: The total number of good packets received that were directed to the
broadcast address.
Multicast: The total number of good packets received that were directed to a
multicast address.
CRC Errors: The total number of packets received that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets.
Undersize: The total number of packets received that were less than 64 octets.
Oversize: The total number of packets received that were longer than 1518
octets.
Frag.: The number of frames which size is less than 64 octets received with
invalid CRC.
Jabb.: The number of frames which size is larger than 64 octets received with
invalid CRC.
Coll.: The best estimate of the total number of collisions on this Ethernet
segment.
64 Bytes: The total number of packets (including bad packets) received that were
64 octets in length.
Sample Index: Display Index of the data entry associated with the control entry.
Sample Start: The time at which this sample started, expressed in seconds since
the switch booted up.
Pkts: The total number of packets (including bad packets, broadcast packets)
received.
Broadcast: The total number of good packets received that were directed to the
broadcast address.
Multicast: The total number of good packets received that were directed to a
multicast address.
CRC Errors: The total number of packets received that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets.
Undersize: The total number of packets received that were less than 64 octets.
Oversize: The total number of packets received that were longer than 1518
octets.
Frag.: The number of frames which size is less than 64 octets received with
invalid CRC.
Jabb.: The number of frames which size is larger than 64 octets received with
invalid CRC.
Coll.: The best estimate of the total number of collisions on this Ethernet
segment.
Utilization: The best estimate of the mean physical layer network utilization on
this interface during this sampling interval, in hundredths of a percent.
Interval: Interval in seconds for sampling and comparing the rising and falling
threshold.
Sample Type: The method of sampling the selected variable and calculating the
value to be compared against the thresholds.
Value: The value of the statistic during the last sampling period.
Startup Alarm: The alarm that may be triggered when this entry is first set to
valid.
Rising Threshold: If the current value is greater than the rising threshold, and the
last sample value was less than this threshold, then an alarm will be generated.
Rising Index: The index of the event to use if an alarm is triggered by monitored
variables crossing above the rising threshold.
Falling Threshold: If the current value is less than the falling threshold, and the
last sample value was greater than this threshold, then an alarm will be
generated.
Falling Index: The index of the event to use if an alarm is triggered by monitored
variables crossing below the falling threshold.
4.3.3.2 Network
System Configuration
Mode: Enable or disable port security limit control globally. If globally disabled,
other modules may still use the underlying functionality, but limit checks and
corresponding actions are disabled.
Aging Enabled: If enabled, secured MAC addresses are subject to aging as discussed
under Aging Period. With aging enabled, a timer is started once the end-host gets
secured. When the timer expires, the switch starts looking for frames from the
end-host, and if such frames are not seen within the next Aging Period, the end-
host is assumed to be disconnected, and the corresponding resources are freed on
the switch.
Aging Period: If Aging Enabled is checked, then the aging period can be set up with
the desired value. By default, the aging period is set to 3600 seconds. The allowed
range is 10~10,000,000 second.
Port Configuration
Port: Display the port number. “Port *” rules apply to all ports.
Mode: Enable or disable port security limit control on a per port basis. To make
limit control function work, port security limit control needs to be enabled globally
and on a port.
Limit: The maximum number of MAC addresses that can be secured on this port.
The number cannot exceed 1024. If the limit is exceeded, the corresponding action
is taken.
Action: If the limit is exceeded, the selected action will take effect.
None: Do not allow more than the specified limit of MAC addresses to access
on a port. No action is further taken.
Trap: If Limit + 1 MAC addresses are seen on the port, send an SNMP trap. If Aging
is disabled, only one SNMP trap will be sent, but with Aging enabled, new SNMP
traps will be sent every time the limit is exceeded.
Shutdown: If Limit + 1 MAC addresses is seen on the port, shut down the port. This
implies that all secured MAC addresses will be removed from the port, and no new
addresses will be learned. Even if the link is physically disconnected and
reconnected on the port (by disconnecting the cable), the port will remain shut
down. There are three ways to re-open the port:
* Boot the switch
* Disable and re-enable Limit Control on the port or the switch
* Click the “Reopen” button
Trap & Shutdown: If Limit + 1 MAC addresses is seen on the port, both the “Trap”
and the “Shutdown” actions described above will be taken.
State: Display the current state of the port from the port security limit control's
point of view. The displayed state might be one of the following:
Limit Reached: The limit is reached on a port. This state can only be shown if
Action is set to None or Trap.
Shutdown: The port is shut down by the Limit Control module. This state can only
be shown if Action is set to Shutdown or Trap & Shutdown.
Re-open Button: If a port is shut down by this module, you may reopen it by clicking
this button, which will only be enabled if this is the case. For other methods, refer
to Shutdown in the Action section. Note that clicking the Reopen button causes
the page to be refreshed, so non-committed changes will be lost.
User Module Name: The full name of a module that may request Port Security
services.
Abbr: This column is the abbreviation for the user module used in the “Users”
column in the “Port Status”.
Port Status
Port: Port number. Click a particular port number to see its port status.
Users: Each of the user modules has a column that shows whether that module
has enabled Port Security or not. A '-' means that the corresponding user module
is not enabled, whereas a letter indicates that the user module abbreviated by
State: This shows the current status of a port. It can be one of the following states:
Disabled: No user modules are currently using the Port Security service.
Ready: The Port Security service is in use by at least one user module, and is
awaiting frames from unknown MAC addresses to arrive.
Limit Reached: The Port Security service is enabled by at least the Limit Control
user module, and that module has indicated that the limit is reached and no more
MAC addresses should be taken in.
Shutdown: The Port Security service is enabled by at least the Limit Control user
module and that module has indicated that the limit is exceeded. No MAC
addresses can be learned on the port until it is administratively re-opened on the
Limit Control configuration page.
MAC Count (Current/Limit): The two columns indicate the number of currently
learned MAC addresses (forwarding as well as blocked) and the maximum number
of MAC addresses that can be learned on the port, respectively. If no user
modules are enabled on the port, the Current column will show a dash (-). If the
Limit Control user module is not enabled on the port, the Limit column will show
a dash (-).
MAC Address: When “Port Security Limit Control” is enabled globally and on a port,
MAC addresses learned on a port show in here.
Time of Addition: Display the date and time when this MAC address was seen on
the port.
Age/Hold: If at least one user module has decided to block this MAC address, it
will stay in the blocked state until the hold time (measured in seconds) expires. If
all user modules have decided to allow this MAC address to forward, and aging is
enabled, the Port Security module will periodically check that this MAC address is
still forwarding traffic. If the
age period (measured in seconds) expires and no frames have been seen, the MAC
address will be removed from the MAC table. Otherwise a new age period will begin.
If aging is disabled or a user module has decided to hold the MAC address
indefinitely, a dash (-) will be shown.
4.3.3.2.2 NAS
Network Access Server configuration is useful to the networking environment that
wants to authenticate clients (supplicants) before they can access resources on
the protected network. To effectively control access to unknown clients, 802.1X
defined by IEEE provides a port-based authentication procedure that can prevent
unauthorized access to a network by requiring users to first submit credentials for
authentication purposes.
4.3.3.2.2.1 Configuration
System Configuration
Reauthentication Period: Specify the time interval for a connected device to be re-
authenticated. By default, the re-authenticated period is set to 3600 seconds. The
allowed range is 1~3600 seconds.
EAPOL Timeout: Specify the time that the switch waits for a supplicant response
during an authentication session before transmitting a Request Identify EAPOL
packet. By default, it is set to 30 seconds. The allowed range is 1~65535 seconds.
Aging Period: Specify the period that is used to age out a client’s allowed access
to the switch via 802.1X and MAC-based authentication. The default period is 300
seconds. The allowed range is 10~1000000 seconds.
Hold Time: The time after an EAP Failure indication or RADIUS timeout that a client
is not allowed access. This setting applies to ports running Single 802.1X, Multi
802.1X, or MAC-based authentication. By default, hold time is set to 10 seconds.
Guest VLAN Enabled: A Guest VLAN is a special VLAN typically with limited network
access. When checked, the individual ports' ditto setting determines whether the
port can be moved into Guest VLAN. When unchecked, the ability to move to the
Guest VLAN is disabled on all ports.
Guest VLAN ID: This VLAN ID is functional only when Guest VLAN is enabled. This is
the value that a port’s Port VLAN ID is set to if a port is moved into the Guest VLAN.
The range is 1~4095.
Max. Reauth. Count: The maximum number of times the switch transmits an EAPOL
Request Identity frame without receiving a response before adding a port to the
Guest VLAN. The value can only be changed when the Guest VLAN option is globally
enabled. The range is 1~255.
Allow Guest VLAN if EAPOL Seen: The switch remembers if an EAPOL frame has
been received on the port for the life-time of the port. Once the switch considers
whether to enter the Guest VLAN, it will first check if this option is enabled or
disabled. If disabled (unchecked; default), the switch will only enter the Guest VLAN
if an EAPOL frame has not been received on the port for the life-time of the port.
If enabled (checked), the switch will consider entering the Guest VLAN even if an
EAPOL frame has been received on the port for the life-time of the port. The value
can only be changed if the Guest VLAN option is globally enabled.
Port Configuration
Admin State: Select the authentication mode on a port. This setting works only
when NAS is globally enabled. The following modes are available:
Force Authorized: In this mode, the switch will send one EAPOL Success frame when
the port link comes up, and any client on the port will be allowed network access
without authentication.
Force Unauthorized: In this mode, the switch will send one EAPOL Failure frame
when the port link comes up, and any client on the port will be disallowed network
access.
Single 802.1X: In Single 802.1X, at most one supplicant can get authenticated on
the port at a time. Normal EAPOL frames are used in the communication between
the supplicant and the switch. If more than one supplicant is connected to a port,
the one that comes first when the port's link comes up will be the first one
considered. If that supplicant doesn't provide valid credentials within a certain
amount of time, another supplicant will get a chance. Once a supplicant is
successfully authenticated, only that supplicant will be allowed access. This is the
most secure of all the supported modes. In this mode, the “Port Security” module
is used to secure a supplicant's MAC address once successfully authenticated.
Multi 802.1X: In Multi 802.1X, one or more supplicants can get authenticated on
the same port at the same time. Each supplicant is authenticated individually and
secured in the MAC table using the “Port Security” module.
Guest VLAN Enabled: Select the checkbox to enable Guest VLAN on a port.
Port State: Display the current state of the port from 802.1X authentication point
of view. The possible states are as follows:
Link Down: 802.1X and MAC-based authentication are enabled but there is no
link on a port.
Unauthorized: The port is forced in unauthorized mode and the supplicant is not
successfully authorized by the RADIUS server.
Restart: Restart client authentication using one of the methods described below.
Note that the restart buttons are only enabled when the switch’s authentication
mode is globally enabled (under System Configuration) and the port's Admin State
is an EAPOL-based or MACBased mode. Clicking these buttons will not cause
settings changed on the page to take effect.
Reinitialize: This forces the reinitialization of the clients on the port and thereby a
reauthentication immediately. The clients will transfer to the unauthorized state
while the reauthentication is in progress.
Port: The port number. Click a port to view the detailed NAS statistics.
Last Source: The source MAC address carried in the most recently received EAPOL
frame for EAPOL-based authentication.
Last ID: The user name (supplicant identity) carried in the most recently received
Response Identity EAPOL frame for EAPOL-based authentication.
QoS Class: Display the QoS class that NAS assigns to the port. This field is left
blank if QoS is not set by NAS.
Port VLAN ID: The VLAN ID of the port assigned by NAS. This field is left blank if
VLAN ID is not set by NAS.
Port State
Total: The number of valid EAPOL frames of any type that has been received by
the switch.
Response ID: The number of valid EAPOL Response Identity frames that have
been received by the switch.
Responses: The number of valid EAPOL response frames (other than Response
Identity frames) that have been received by the switch.
Start: The number of EAPOL Start frames that have been received by the switch.
Logoff: The number of valid EAPOL Logoff frames that have been received by the
switch.
Invalid Type: The number of EAPOL frames that have been received by the switch
in which the frame type is not recognized.
Invalid Length: The number of EAPOL frames that have been received by the
switch in which the Packet Body Length field is invalid.
Total: The number of EAPOL frames of any type that has been transmitted by the
switch.
Request ID: The number of valid EAPOL Request Identity frames that have been
received by the switch.
Requests: The number of valid EAPOL request frames (other than Request
Identity frames) that have been received by the switch.
4.3.3.2.3 ACL
ACL is a sequential list established to allow or deny users to access information
or perform tasks on the network. In this switch, users can establish rules applied
to port numbers to permit or deny actions or restrict rate limit.
4.3.3.2.3.1 Ports
Policy Id: Assign an ACL policy ID to a particular port. A port can only use one policy
ID; however, a policy ID can apply to many ports. The default ID is 0. The allowed
range is 0~255.
Action: Permit or deny a frame based on whether it matches a rule defined in the
assigned policy.
Rate Limiter ID: Select a rate limiter ID to apply to a port. Rate Limiter rule can be
set up in “Rate Limiters” configuration page.
Logging: Enable logging of matched frames to the system log. To view log entries,
go to System menu and then click the “System Log Information” option.
Shutdown: This field is to decide whether to shut down a port when matched
frames are seen or not.
Counters: The number of frames that have matched the rules defined in the
selected policy.
Rate: Specify the threshold above which packets are dropped. The allowed values
are 0~3276700 pps or 1, 100, 200, 300…1000000 kbps.
Ingress Port: The ingress port of the access control entry. Select “All” to apply to
all ports or select a particular port.
Rate Limiter: Display rate limiter is enabled or disabled when matched frames are
found.
Counter: Display the number of frames that have matched any of the rules defined
for this ACL.
ACE Configuration
Ingress Port: Select the ingress port of the access control entry. Select “All” to
apply an ACL rule to all ports or select a particular port.
Policy Filter: Select the policy filter type. “Any” means no policy filter is assigned
to this rule (or don’t care). Select “Specific” to filter specific policy with this ACE.
Frame Type: Select a frame type to match. Available frame types include Any,
Ethernet, ARP, IPv4. By default, any frame type is used.
Rate Limiter: Enable or disable the rate limiter when matched frames are found.
Counter: Display the number of frames that have matched any of the rules defined
for this ACL.
VLAN Parameters
Specific: Specify a VLAN ID. A frame with the specified VLAN ID matches this
ACE rule.
Tag Priority: Select the User Priority value found in the VLAN tag to match this rule.
MAC Parameter
SMAC Filter: The type of source MAC address. Select “Any” to allow all types of
source MAC addresses or select “Specific” to define a source MAC address. (This
field is for Any and Ethernet frame type only.)
Specific: Use this to self-define a destination MAC address. (This option is for
Ethernet frame type only.)
Ether Type Filter: This option can only be used to filter Ethernet II formatted
packets. Select “Specific” to define an Ether Type value.
ARP Parameter
Request/Reply: Specify whether the packet is an ARP request, reply, or either type.
Request: The frame must have ARP Request or RARP Request opcode flag set.
Reply: The frame must have ARP Reply or RARP Reply opcode flag set.
ARP Sender SMAC Match: Select “0” to indicate that the SHA (Sender Hardware
Address) field in the ARP/RARP frame is not equal to source MAC address. Select
“1” to indicate that SHA field in the ARP/RARP frame is equal to source MAC
address. Select “Any” to indicate a match and not a match.
RARP Target MAC Match: Select “0” to indicate that the THA (Target Hardware
Address) field in the ARP/RARP frame is not equal to source MAC address. Select
“1” to indicate that THA field in the ARP/RARP frame is equal to source MAC
address. Select “Any” to indicate a match and not a match.
IP/Ethernet Length: Select “0” to indicate that HLN (Hardware Address Length)
field in the ARP/RARP frame is not equal to Ethernet (0x6) and the Protocol
Address Length field is not equal to IPv4 (0x4). Select “1” to indicate that HLN
(Hardware Address Length) field in the ARP/RARP frame is equal to Ethernet
(0x6) and the Protocol Address Length field is equal to IPv4 (0x4). Select “Any” to
indicate a match and not a match.
IP: Select “0” to indicate that Protocol Address Space field in ARP/RARP frame is
not equal to IP (0x800). Select “1” to indicate that Protocol Address Space is
equal to IP (0x800). Select “Any” to indicate a match and not a match.
Ethernet: Select “0” to indicate that Hardware Address Space field in ARP/RARP
frame is not equal to Ethernet (1). Select “1” to indicate that Hardware Address
Space field is equal to Ethernet (1). Select “Any” to indicate a match and not a
match.
IP Parameters
IP Protocol Filter: Select “Any”, “ICMP”, “UDP”, “TCP”, or “Other” protocol from
the pull-down menu for IP Protocol filtering.
IP TTL: Select “Zero” to indicate that the TTL filed in IPv4 header is 0. If the value
in TTL field is not 0, use “Non-Zero” to indicate that. You can also select “any” to
denote the value which is either 0 or not 0.
IP Fragment: Select “Any” to allow any values. “Yes” denotes that IPv4 frames
where the MF bit is set or the FRAG OFFSET field is greater than zero must match
this entry. “No” denotes that IPv4 frames where the MF bit is set or the FRAG
OFFSET field is greater than zero must not match this entry.
IP Option: Specify the options flag setting for this rule. Select “Any” to allow any
values. “Yes” denotes that IPv4 frames where the options flag is set must match
this entry. “No” denotes that Pv4 frames where the options flag is set must not
match this entry
SIP Filter: Select “Any”, “Host”, or “Network” for source IP filtering. If “Host” is
selected, you need to indicate a specific host IP address. If “Network” is selected,
you need to indicate both network address and subnet mask.
DIP Filter: Select “Any”, “Host”, or “Network” for destination IP filtering. If “Host”
is selected, you need to indicate a specific host IP address. If “Network” is
selected, you need to indicate both network address and subnet mask.
IPv6 Parameters
Next Header Filter: Select next header filter option. Available options include ICMP,
UDP, TCP, Other.
SIP Filter: Select a source IP filter. “Any” denotes that any SIP filter is allowed.
Select “Specific” to enter self-define SIP filter.
Hop Limit: Select “Any” to allow any values in this field. Select” “0” if IPv6 frames
with a hop limit field greater than zero must not be able to match this entry. “1”
denotes that IPv6 frames with a hop limit field greater than zero must be able to
match this entry.
This page shows the ACL status by different ACL users. Each row describes
the ACE that is defined. It is a conflict if a specific ACE is not applied to the
hardware due to hardware limitations. The maximum number of ACEs is 256 on
each switch.
User: Display the ACL user.
Frame Type: Display the frame type of the ACE. Possible values are:
EType: The ACE will match Ethernet Type frames. Note that an Ethernet Type
based ACE will not get matched by IP and ARP frames.
IPv4/ICMP: The ACE will match IPv4 frames with ICMP protocol.
IPv4/UDP: The ACE will match IPv4 frames with UDP protocol.
IPv4/TCP: The ACE will match IPv4 frames with TCP protocol.
IPv4/Other: The ACE will match IPv4 frames, which are not ICMP/UDP/TCP.
Rate Limiter: Indicates the rate limiter number of the ACE. The allowed range
is 1 to 16. When Disabled is displayed, the rate limiter operation is disabled.
Port Redirect: Indicates the port redirect operation of the ACE. Frames matching
the ACE are redirected to the port number. The allowed values are Disabled or a
specific port number. When Disabled is displayed, the port redirect operation is
disabled.
Mirror: Specify the mirror operation of this port. The allowed values are:
Disabled: Frames received on the port are not mirrored. The default value is
"Disabled".
Counter: The counter indicates the number of times the ACE was hit by a frame.
Conflict: Indicate the hardware status of the specific ACE. The specific ACE is not
applied to the hardware due to hardware limitations.
4.3.3.2.4 DHCP
Database Counters
Binding Counters
Manual Binding: The number of bindings that the network engineer assigns an IP
address to a client. In other words, the pool is of host type.
Expired Binding: The number of bindings that their lease time expired or they are
cleared from Automatic or Manual type bindings.
Type: The type of binding method. This field can be “Automatic”, “Manual” or
“Expired”.
Global Mode
Mode: Enable or disable DHCP server mode. When enabled, this device can act as
a DHCP server and provide IP address to clients that request for one.
VLAN Mode
VLAN Range: Enter the VLAN Range in which DHCP server is enabled or disabled.
The starting VLAIN ID must be smaller than or equal to the ending VLAN ID. If
there is only one VLAN ID, then it can be entered either in starting or ending
VLAN ID field.
IP Range: Enter the starting and ending IP address that are not allocated to DHCP
clients. The starting IP address must be smaller or equal to the ending IP address.
If there is only one excluded IP address, it can be entered either in starting or
ending IP address field. The total Excluded IP address ranges can be supported is
16.
Click “Add New Pool” to add a new entry to the list. The maximum entries
supported are 640.
Name: Enter the pool name for this entry. All printable characters are supported
except white space. Click on the pool name after save to configure its detailed
settings.
Type: Display which type the pool is. The displayed options include Network and
Host. If “-“ is displayed, it means this field has not been defined yet.
IP: Display network number of the DHCP address pool. If “-“ is displayed, it
means this field has not been defined yet.
Subnet Mask: Display subnet mask of the DHCP address pool. If “-“ is displayed, it
means this field has not been defined yet.
Pool
Name: Select the pool name that you want to configure from the pull-down
menu.
Setting
Pool Name: Display the pool name for this configured entry.
Network: The pool defines a pool of IP addresses to service more than one
DHCP client.
Host: The pool services for a specific DHCP client identified by client identifier
or hardware address.
Lease Time: Specify lease time that a client needs to send requests to the DHCP
server for renewed IP address. If all are 0’s, then it means the lease time is
infinite.
Domain Name: Specify the domain name that a client use when resolving
hostname via DNS.
Broadcast Address: Specify the broadcast address in use on the client’s subnet.
Default Router: Specify a list of IP addresses for routers on the clients’ subnet.
DNS Server: Specify a list of Domain Name System name servers available to the
client.
NTP Server: Specify a list of IP addresses indicating NTP servers available to the
client.
NetBios Node Type: Select NetBIOS node type option to allow Netbios over TCP/IP
clients which are configurable to be configured as described in RFC 1001/1002.
NetBIOS Scope: Specify the NetBIOS over TCP/IP scope parameter for the client as
specified in RFC 1001/1002.
NetBIOS Name Server: Specify a list of NBNS name servers listed in order of
preference.
NIS Domain Name: Specify the name of the client's NIS domain.
NIS Server: Specify a list of IP addresses indicating NIS servers available to the
client.
Client Identifier: Specify client's unique identifier to be used when the pool is the
type of host.
Hardware Address: Specify client's hardware (MAC) address to be used when the
pool is the type of host.
Client Name: Specify the name of client to be used when the pool is the type of
host.
Snooping Mode: Enable or disable DHCP Snooping function globally. When DHCP
snooping mode operation is enabled, the DHCP request messages will be forwarded
to trusted ports and only allow reply packets from trusted ports.
Mode: Select the DCHP Snooping port mode. Ports can be set to either “Trusted”
or “Untrusted”.
DHCP clients who obtained the dynamic IP address from the DHCP server will be
listed in this table except for local VLAN interface IP addresses. Items displayed
include the following:
Will Expire In: The remaining time the release will be expired.
Source Port: The port number of the client that binds with IP address.
Relay Server: Enter DHCP server IP address that is used by the switch’s DHCP relay
agent.
Relay Information Mode: Enable or disable DHCP Relay option 82 function. Please
note that “Relay Mode” must be enabled before this function is able to take effect.
Relay Information Policy: Select Relay Information policy for DHCP client that
includes option 82 information.
Replace: Replace the DHCP client packet information with the switch’s relay
information. This is the default setting.
Drop: Drop the packet when it receives a DHCP message that already contains
relay information.
Standard: Used for defining the switch port and VLAN ID according to RFC 3046.
TR-101: Used for defining the switch IP, switch port and VLAN ID according to
TR-101.
Configured: The Remote ID can be user-defined when this option is selected. The
maximum length of the Remote ID is 63.
Subscriber ID
Port Alias: Use the individual values for port Alias on a per port basis.
Transmit to Server: The number of packets that are relayed from client to server.
Transmit Error: The number of packets that resulted in errors while being sent to
clients.
Receive Missing Agent Option: The number of packets received without agent
information options.
Receive Missing Circuit ID: The number of packets received with the Circuit ID option
missing.
Receive Missing Remote ID: The number of packets received with the Remote ID
option missing.
Receive Missing Subscriber ID: The number of packets received with the subscriber
ID missing.
Receive Bad Circuit ID: The number of packets whose Circuit ID option did not match
known circuit ID.
Receive Bad Remote ID: The number of packets whose Remote ID option did not
match known Remote ID.
Receive Bad Subscriber ID: The number of packets whose subscriber ID option did
not match known subscriber ID.
Client Statistics
Transmit Error: The number of packets that resulted in error while being sent to
servers.
Receive Agent Option: The number of received packets with relay agent
information option.
Replace Agent Option: The number of packets which were replaced with relay agent
information option.
Keep Agent Option: The number of packets whose relay agent information was
retained.
Drop Agent Option: The number of packets that were dropped which were received
with relay agent information.
4.3.3.2.5.1 Configuration
Translate dynamic to static: Click this button to translate dynamic entries to static
ones.
Mode: Enable or disable IP source guard on a port. Please note that to make IP
source guard work, both global mode and port mode must be enabled.
Max Dynamic Clients: Select the maximum number of dynamic clients that can be
learned on a port. The available options are 0, 1, 2, unlimited. If the port mode is
enabled and the maximum number of dynamic clients is equal 0, the switch will
only forward IP packets that are matched in static entries for a given port.
Click the “Add New Entry” button to insert an entry to the table.
Select the “Delete” checkbox to remove the entry during the next save.
Mode: Enable or disable ARP Inspection on a port. Please note that to make ARP
inspection work, both global mode and port mode must be enabled.
VLAN ID: Specify ARP Inspection is enabled on which VLANs. First, you have to
enable the port setting on Port mode configuration web page. Only when both
Global Mode and Port Mode on a given port are enabled, ARP Inspection is
enabled on this given port. Second, you can specify which VLAN will be inspected
on VLAN mode configuration web page. The log type also can be configured on
per VLAN setting.
Click the “Add New Entry” button to insert an entry to the table.
Select the “Delete” checkbox to remove the entry during the next save.
MAC Address: Specify an allowed source MAC address in ARP request packets.
Click the “Add New Entry” button to insert an entry to the table.
Select the “Delete” checkbox to remove the entry during the next save.
Translate to static: Click the button to translate the dynamic entry to static one.
4.3.3.3 RADIUS
4.3.3.3.1 Configuration
Global Configuration
Timeout: The time the switch waits for a reply from an authentication server before
it retransmits the request.
Deadtime: Deadtime is the period during which the switch will not send new
requests to a server that has failed to respond to a previous request. This will stop
the switch from continually trying to contact a server that it has already determined
as dead. Setting the Deadtime to a value greater than 0 (zero) will enable this
feature, but only if more than one server has been configured. The allowed
deadtime range is between 0 to 1440minutes.
Key: Specify the secret key up to 64 characters. This is shared between the RADIUS
sever and the switch.
Sever Configuration
Auth Port: The UDP port to be used on the RADIUS server for authentication.
Acct Port: The UDP port to be used on the RADIUS server for accounting.
Timeout: If timeout value is specified here, it will replace the global timeout value.
If you prefer to use the global value, leave this field blank.
Retransmit: If retransmit value is specified here, it will replace the global retransmit
value. If you prefer to use the global value, leave this field blank.
Key: If secret key is specified here, it will replace the global secret key. If you prefer
to use the global value, leave this field blank.
Status: The current state of RADIUS authentication server. Displayed states include
the following:
Not Ready: The server is ready but IP communication is not yet up and running.
Ready: The server is ready and IP communication is not yet up and running. The
RADIUS server is ready to accept access attempts.
Unknown Types: The number of RADIUS packets that were received with unknown
types from the server on the authentication port and dropped.
Packets Dropped: The number of RADIUS packets that were received from the
server on the authentication port and dropped for some other reason.
Access Requests: The number of RADIUS Access-Request packets sent to the server.
This does not include retransmissions.
Pending Requests: The number of RADIUS Access-Request packets destined for the
server that have not yet timed out or received a response. This variable is
incremented when an Access-Request is sent and decremented due to receipt of
an Access-Accept, Access-Reject, Access-Challenge, timeout, or retransmission.
IP Address: IP address and UDP port for the authentication server in question.
State: Shows the state of the server. It takes one of the following values:
Not Ready: The server is enabled, but IP communication is not yet up and
running.
Dead (X seconds left): Access attempts were made to this server, but it did not
reply within the configured timeout. The server has temporarily been disabled,
but will get re-enabled when the dead-time expires. The number of seconds left
before this occurs is displayed in parentheses. This state is only reachable when
more than one server is enabled.
Round-Trip Time: The time interval (measured in milliseconds) between the most
recent Access-Reply/Access-Challenge and the Access-Request that matched it
from the RADIUS authentication server. The granularity of this measurement is 100
ms. A value of 0 ms indicates that there hasn't been round-trip communication
with the server yet.
Responses: The number of RADIUS packets (valid or invalid) received from the
server.
Unknown Types: The number of RADIUS packets of unknown types that were
received from the server on the accounting port.
Packets Dropped: The number of RADIUS packets that were received from the
server on the accounting port and dropped for some other reason.
Requests: The number of RADIUS packets sent to the server. This does not include
retransmissions.
Pending Requests: The number of RADIUS packets destined for the server that have
not yet timed out or received a response. This variable is incremented when a
Request is sent and decremented due to receipt of a Response, timeout, or
retransmission.
Timeouts: The number of accounting timeouts to the server. After a timeout, the
client may retry to the same server, send to a different server, or give up. A retry
to the same server is counted as a retransmit as well as a timeout. A send to a
different server is counted as a Request as well as a timeout.
IP Address: IP address and UDP port for the accounting server in question.
State: Shows the state of the server. It takes one of the following values:
Not Ready: The server is enabled, but IP communication is not yet up and
running.
Dead (X seconds left): Accounting attempts were made to this server, but it did
not reply within the configured timeout. The server has temporarily been
disabled, but will get re-enabled when the dead-time expires. The number of
seconds left before this occurs is displayed in parentheses. This state is only
reachable when more than one server is enabled.
Round-Trip Time: The time interval (measured in milliseconds) between the most
recent Response and the Request that matched it from the RADIUS accounting
server. The granularity of this measurement is 100 ms. A value of 0 ms indicates
that there hasn't been round-trip communication with the server yet.
4.3.3.3.4 TACACS+
Global Configuration
Timeout: The time the switch waits for a reply from a TACACS+ server before it
retransmits the request.
Deadtime: Deadtime is the period during which the switch will not send new
requests to a server that has failed to respond to a previous request. This will stop
the switch from continually trying to contact a server that it has already determined
as dead. Setting the Deadtime to a value greater than 0 (zero) will enable this
feature, but only if more than one server has been configured. The allowed
deadtime range is between 0 to 1440 minutes.
Key: Specify the secret key up to 63 characters. This is shared between a TACACS+
sever and the switch.
Server Configuration
Port: The TCP port number to be used on a TACACS+ server for authentication.
Timeout: If timeout value is specified here, it will replace the global timeout value.
If you prefer to use the global value, leave this field blank.
Key: If secret key is specified here, it will replace the global secret key. If you prefer
to use the global value, leave this field blank.
4.3.4 Aggregation
Compared with adding cost to install extra cables to increase the redundancy and
link speed, link aggregation is a relatively inexpensive way to set up a high-speed
backbone network that transfers much more data than any one single port or
device can deliver. Link aggregation uses multiple ports in parallel to increase the
link speed. And there are two types of aggregation that are available, namely
“Static” and “LACP”.
Under the Aggregation heading are two major icons, static and LACP.
4.3.4.1 Static
Source MAC Address: All traffic from the same Source MAC address is output on
the same link in a trunk.
Destination MAC Address: All traffic with the same Destination MAC address is
output on the same link in a trunk.
IP Address: All traffic with the same source and destination IP address is output on
the same link in a trunk.
TCP/UDP Port Number: All traffic with the same source and destination TCP/UDP
port number is output on the same link in a trunk.
4.3.4.2 LACP
Key: The “Auto” setting sets the key as appropriate by the physical link speed.
Select “Specific” if you want a user-defined key value. The allowed key value range
is 1~65535. Ports in an aggregated link group must have the same LACP port Key.
In order to allow a port to join an aggregated group, the port Key must be set to
the same value.
Role: The user can select either “Active” or “Passive” role depending on the device’s
capability of negotiating and sending LACP control packets.
Ports that are designated as “Active” are able to process and send LACP control
frames. Hence, this allows LACP compliant devices to negotiate the aggregated like
so that the group may be changed dynamically as required. In order to add or
remove ports from the group, at least one of the participating devices must set to
“Active” LACP ports.
On the other hand, LACP ports that are set to “Passive” cannot send LACP control
frames. In order to allow LACP-enabled devices to form a LACP group, one end of
the connection must designate as “Passive” LACP ports.
Timeout: The Timeout controls the period between BPDU transmissions. Fast will
transmit LACP packets each second, while Slow will wait for 30 seconds before
sending a LACP packet.
Prio: The priority of the port. The lower number means greater priority. This priority
value controls which ports will be active and which ones will be in a backup role.
Aggr ID: Display the aggregation ID associated with the Link Aggregation Group
(LAG).
Local Ports: The local ports that are a port of this LAG.
Backup: The port is in a backup role. When other ports leave LAG group, this
port will join LAG.
Discarded: The number of unknown and illegal packets that have been discarded
on a port.
4.3.5 Redundancy
Designing redundant paths that can protect networks from unexpected failovers
is extremely important in mission-critical networks that need to provide
uninterrupted services. However, redundant paths mean that possible loops may
occur in networks and bring down networks eventually if they are not treated
carefully. In practice, several loop protection methods are implemented to ensure
that networks function normally without loops and recover as soon as possible
when a point of failure occurs. The most popular ones are STP (802.1d), RSTP
(802.1w) and MSTP (802.1s). For industrial applications, the proprietary PF-ring
and ERPS (G.8032) are highly recommended since they can achieve faster
recovery time than any STP protocol.
4.3.5.1 PF-Ring
PF-Ring is a proprietary redundancy technology that supports 250 units in a ring
topology and can bring redundant paths into service within 10 ms when link
failures occur. Compared with spanning tree protocol, PF-Ring achieves faster
recovery time on the network and is more flexible and scalable in network
architecture. PF-Ring redundancy technology can automatically self identifies the
ring Master (the user-defined Master is also supported) and then block a port
resided in Master device for backup purposes. Once the disconnection is detected
on the network, PF-Ring can bring backup ports back into “forwarding” mode so
that the disconnected path can keep contact with the whole network.
4.3.5.1.1 Configuration
Instance: The instance number. The total instances supported are 14.
Type: PF-Ring supports 3 ring types. They are explained below individually.
PF-Ring: PF-Ring type is used in a closed ring topology. All participating devices
must support PF-Ring redundancy technology.
PF-Chain: PF-Chain type is used when PF-Ring supported devices interconnect to a network or
devices that does not support PF-Ring redundancy technology.
Sub-Ring: Sub-Ring is used in an open ring and only has one node. In a networking topology,
Sub-Ring type must co-exist with PF-Ring type or PF-Chain type. No third-party devices are used
in this ring type.
Figure 4. Sub-Ring
Master: The Master is generally used to decide which segment acts as a backup
path. The user can manually select the checkbox to set the device in a ring as a
Master. However, if all devices’ Master checkboxes are left unchecked, the PF-Ring
protocol will assign one of the devices in the ring as the Master depending on their
MAC address. The election process is explained below in “Determining a Master and
blocking a port”.
Port: Select the west and east port from the pull-down menu.
Edge: This field appears only when you select PF-Chain type. Select the checkbox
to set the selected port as a PF-Chain edge port.
Step 1. Manually select the Master Manually select the Master in a Manually select the Master in a
Determining in a ring. ring. ring.
a Master
If several devices are set to The device with a configured If several devices are set to
Master, the PF-Ring edge port that has the Master, the PF-Ring
redundancy protocol biggest MAC address is redundancy protocol decides
decides the Master in a ring selected as the Master. the Master in a ring depending
depending on devices’ MAC on devices’ MAC address. The
address. The device with device with the biggest MAC
If the Master is mis-assigned to
the biggest MAC address becomes the Master
the device that does not have
address becomes the in a ring.
an edge, the PF-Ring
Master in a ring.
redundancy protocol will ignore
this mis-configuration. If no device in a ring is set to
If no device in a ring is set Master, the PF-Ring
to Master, the PF-Ring redundancy protocol decides
redundancy protocol the Master in a ring depending
decides the Master in a ring Note: When selecting PF-Chain on devices’ MAC address. The
depending on devices’ MAC type, only the devices with an device with the biggest MAC
address. The device with edge port or edge ports are address becomes the Master
the biggest MAC eligible to be elected as the in a ring.
address becomes the Master.
Master in a ring.
Step 2. The port with higher port The edge port in Master device The port with higher port
Blocking a number in Master device is blocked. number in Master device is
port is blocked. blocked.
4.3.5.1.2 Status
Role: This field can be Master or Slave (paths in Slave device will not be blocked).
East & West Port Number: The configured port number in a instance.
East & West Port State: The current state of the configured port in a ring. The
displayed state can be one of the following:
East & West Port Edge: This field shows whether the configured port is an edge
port or not.
: The Master is elected and backup path is blocked. The network with a
redundant path works normally.
: The physical link or connection in the ring is down. The status of backup path
is changed from “blocked” to “forwarding” status when one of the forwarding
paths is down.
4.3.5.2.1 Configuration
General Settings
Transmission Time: The interval between each loop protection PDU sent on each
port. Valid values are 1 to 10 seconds.
Shutdown Time: The period for which a port will be kept disabled. Valid values are
0 to 604800 seconds. 0 means that a port is kept disabled until next device restart.
Port Configuration
Port: List the number of each port. “Port *” settings apply to all ports.
Action: When a loop is detected on a port, the loop protection will immediately
take appropriate actions. Actions will be taken include “Shutdown Port”,
“Shutdown Port and Log” or “Log Only”.
Shutdown Port and Log: A loop-detected port is shutdown for a period of time configured in
“Shutdown Time” and the event is logged.
Log Only: The event is logged and the port remains enable.
4.3.5.2.2 Status
Action: Display the configured action that the switch will react when loops occur.
Time of Last Loop: The time of the last loop event detected.
To solve problems causing by bridge loops, spanning tree allows a network design
to include redundant links to provide automatic backup paths if an active link fails,
without the danger of bridge loops, or the need for manually enabling/disabling
these backup links.
The Spanning Tree Protocol (STP), defined in the IEEE Standard 802.1s, can create
a spanning tree within a mesh network of connected layer-2 bridges (typically
Ethernet switches) and disable the links which are not part of that tree, leaving a
single active path between any two network nodes.
The other extension of RSTP is IEEE 802.1s Multiple Spanning Tree protocol (MSTP)
that allows different VLANs to travel along separate instances of spanning tree.
Unlike STP and RSTP, MSTP eliminates the needs for having different STP for each
VLAN. Therefore, in a large networking environment that employs many VLANs,
MSTP can be more useful than legacy STP.
Basic Settings
Protocol Version: Select the appropriate spanning tree protocol. Protocol versions
provided include “STP”, “RSTP”, and “MSTP”.
Bridge Priority: Each switch has a relative priority and cost that is used to decide
what the shortest path is to forward a packet. The lowest cost path (lowest
numeric value) has a higher priority and is always used unless it is down. If you
have multiple bridges and interfaces then you need to adjust the priorities to
achieve optimized performance. For MSTP operation, this is the priority of the CIST.
Otherwise, this is the priority of the STP/RSTP bridge.
Forward Delay: Fort STP bridges, the Forward Delay is the time spent in each
Listening and Learning state before the Forwarding state is entered. This delay
occurs when a new bridge comes onto a network. Valid values are 4-30 seconds.
Max Age: If another switch in the spanning tree does not send out a hello packet
for a period of time, it is considered to be disconnected. Valid values are 6 to 40
seconds, and Max Age values must be smaller than or equal to (Forward Delay-
1)*2.
Maximum Hop Count: The maximum number of hops allowed for MST region before
a BPDU is discarded. Each bridge decrements the hop count by one before passing
on the BPDU. When the hop count reaches zero, the BPDU is discarded. The default
hop count is 20. The allowed range is 6-40.
Transmit Hold Count: The number of BPDU sent by a bridge port per second. When
exceeded, transmission of the next BPDU will be delayed. By default, it is set to 6.
The allowed transmit hold count is 1 to 10. Please note that increasing this value
might have a significant impact on CPU utilization and decreasing this value might
slow down convergence. It is recommended to remain Transmit Hold Count to the
default setting.
Advanced Settings
Edge Port BPDU Filtering: The purpose of Port BPDU Filtering is to prevent the
switch from sending BPDU frames on ports that are connected to end devices.
Edge Port BPDU Guard: Edge ports generally connect directly to PC, file servers or
printers. Therefore, edge ports are configured to allow rapid transition. Under
normal situations, edge ports should not receive configuration BPDUs. However, if
they do, this probably is due to malicious attacks or mis-settings. When edge ports
receive configuration BPDUs, they will be automatically set to non-edge ports and
start a new spanning tree calculation process.
BPDU Guard is therefore used to prevent the device from suffering malicious
attacks. With this function enabled, when edge ports receive configuration BPDUs,
STP disables those affected edge ports. After a period of recovery time, those
disabled ports are re-activated.
Port Error Recovery: When enabled, a port that is in the error-disabled state can
automatically be enabled after a certain time.
Port Error Recovery Timeout: The time that has to pass before a port in the error-
disabled state can be enabled. The allowed range is 30 – 86400 seconds.
Configuration Identification
Configuration Name: The name for this MSTI. By default, the switch’s MAC address
is used. The maximum length is 32 characters. In order to share spanning trees for
MSTI, bridges must have the same configuration name and revision value.
Configuration Revision: The revision number for this MSTI. The allowed range is 0
– 65535.
MSTI Mapping
VLAN Mapped: Specify VLANs mapped to a certain MSTI. Both a single VLAN and a
range of VLANs are allowed. Separate VLANs with a comma and use hyphen to
denote a range of VLANs. (Example: 2,5,20-40) Leave the field empty for unused
MSTI.
MSTI: Display MSTI instance number. “MSTI *” priority rule applies to all ports.
Priority: Select an appropriate priority for each MSTI instance. Bridge priority is used
in selecting the root device, root port, and designated port. The device with the
highest priority becomes the root device. However, if all devices have the same
priority, the device with the lowest MAC address will then become the root device.
Note that lower numeric values indicate higher priority. The bridge priority plus the
MSTI instance number, concatenated with the 6-byte MAC address of the switch
forms a Bridge Identifier.
Path Cost: Path cost is used to determine the best path between devices. If “Auto”
mode is selected, the system automatically detects the speed and duplex mode to
decide the path cost. Select “Specific”, if you want to use user-defined value. Valid
values are 1 to 200000000. Please note that path cost takes precedence over port
priority.
Admin Edge: If an interface is attached to end nodes, you can set it to “Edge”.
Auto Edge: Select the checkbox to enable this feature. When enabled, a port is
automatically determined to be at the edge of the network when it receives no
BPDUs.
Restricted Role: If enabled, this causes the port not to be selected as Root Port
for the CIST or any MSTI, even if it has the best spanning tree priority.
Restricted TCN: If enabled, this causes the port not to propagate received
topology change notifications and topology changes to other ports.
BPDU Guard: This feature protects ports from receiving BPDUs. It can prevent
loops by shutting down a port when a BPDU is received instead of putting it into
the spanning tree discarding state. If enabled, the port will disable itself upon
receiving valid BPDU's.
Select a specific MSTI that you want to configure and then click the “Get” button.
Path Cost: Path cost is used to determine the best path between devices. If “Auto”
mode is selected, the system automatically detects the speed and duplex mode to
decide the path cost. Select “Specific”, if you want to use user-defined value. Valid
values are 1 to 200000000. Please note that path cost take precedence over port
priority.
STP Bridge
MSTI: The bridge instance. Click this instance to view STP detailed bridge status.
Bridge ID: The unique bridge ID for this instance consisting a priority value and MAC
address of the bridge switch.
Root ID: Display the root device’s priority value and MAC address.
Root Port: The number of the port on this switch that is closest to the root. This
switch communicates with the root device through this port. If there is no root
port, then this switch has been accepted as the root device of the Spanning Tree
network.
Root Cost: The path cost from the root port on the switch to the root device. For
the root bridge this is zero. For all other bridges, it is the sum of the port path
costs on the least cost path to the root bridge.
Topology Flag: The current state of the Topology Change Notification flag for this
bridge instance.
Topology Change Last: The time since this spanning tree was last configured.
Bridge ID: The unique bridge ID for this instance consisting a priority value and MAC
address of the bridge switch.
Root ID: Display the root device’s priority value and MAC address.
Root Cost: The path cost from the root port on the switch to the root device. For
the root bridge this is zero. For all other bridges, it is the sum of the port path
costs on the least cost path to the root bridge.
Root Port: The number of the port on this switch that is closest to the root. This
switch communicates with the root device through this port. If there is no root
port, then this switch has been accepted as the root device of the Spanning Tree
network.
Regional Root: The Bridge ID of the currently elected regional root bridge, inside
the MSTP region of this bridge. (This parameter only applies to the CIST instance.)
Internal Root Cost: The Regional Root Path Cost. For the Regional Root Bridge the
cost is zero. For all other CIST instances in the same MSTP region, it is the sum of
the Internal Port Path Costs on the least cost path to the Internal Root Bridge. (This
parameter only applies to the CIST instance.)
Topology Flag: The current state of the Topology Change Notification flag for this
bridge instance.
Topology Change Last: The time since this spanning tree was last configured.
Port ID: The port identifier used by the RSTP protocol. This port ID contains the
priority and the port number.
Role: The role assigned by Spanning Tree Algorithm. Roles can be “Designated Port”,
“Backup Port”, “Root Port”.
Blocking: Ports only receive BPDU messages but do not forward them.
Learning: Port has transmitted configuration messages for an interval set by the
Forward Delay parameter without receiving contradictory information. Port
address table is cleared, and the port begins learning addresses
Uptime: The time since the bridge port was last initialized.
CIST Role: The role assigned by Spanning Tree Algorithm. Roles can be “Designated
Port”, “Backup Port”, “Root Port” or “Non-STP”.
CIST State: Display the current state of a port. The CIST state must be one of the
following:
Discarding: Ports only receive BPDU messages but do not forward them.
Learning: Port has transmitted configuration messages for an interval set by the
Forward Delay parameter without receiving contradictory information. Port
address table is cleared, and the port begins learning addresses
Uptime: The time since the bridge port was last initialized.
Transmitted & Received TCN: The number of TCN messages transmitted and
received on a port.
Instance: Specify the MEP instance ID. After saving an entry, click the number of
each instance to further configure details of this MEP entry.
Domain (Port): This is a MEP in the Port Domain. 'Flow Instance' is a Port.
Mode: Select either Mep (Maintenance Entity End Point) or Mip (Maintenance Entity
Intermediate Point).
Down: This is a Down (Ingress) MEP - monitoring ingress OAM and traffic on
'Residence Port'.
Up: This is an Up (Egress) MEP - monitoring egress OAM and traffic on 'Residence
Port'.
Tagged VID: A C-tag or S-tag (depending on VLAN port type) is added with this VID.
Entering “0” means no tag will be added.
This MAC: The MAC of this MEP (can be used by other MEP when unicast is selected).
Instance Data
Instance Configuration
ITU ICC: This is defined by ITU in Y.1731 ANNEX A. “Domain Name” is not used.
MEG id must be maximum 13 characters.
IEEE String: This is defined by IEEE in 802.1ag. “Domain Name” can be maximum
16 characters. “MEG ID” (Short MA Name) can be maximum 16 characters.
ITU CC ICC: This is defined by ITU in Y.1731. “Domain Name” is not used. MEG id
must be maximum 15 characters.
ICC/Domain Name: Depending on the format selected, enter ITU ICC or IEEE
Maintenance Domain Name.
MEG id: This is either ITU UMC (MEG ID value [7-13]) or IEEE Short MA Name
depending on “Format”.
MEP id: This value will become the transmitted two byte CCM MEP ID.
Tagged VID: This C-port tag is added to the OAM PDU and is only applicable to
port MEP.
MEP STATE
cLevel: Fault Cause indicating that a CCM is received with a lower level than the
configured for this MEP.
cMEG: Fault Cause indicating that a CCM is received with a MEG ID different from
configured for this MEP.
cMEP: Fault Cause indicating that a CCM is received with a MEP ID different from
all 'Peer MEP ID' configured for this MEP.
cSSF: Fault Cause indicating that server layer is indicating Signal Fail.
aBLK: The consequent action of blocking service frames in this flow is active.
aTSF: The consequent action of indicating Trail Signal Fail to-wards protection is
active.
Click the “Add New Peer MEP” button to create a new entry.
Peer MEP ID: The peer MEP ID of the target MEP. This is used only when Unicast
Peer MAC is all zeros.
Unicast Peer MAC: The target switch or device’s unicast MAC address. You can
specify unicast MAC address in “xx-xx-xx-xx-xx-xx”, “xx.xx.xx.xx.xx.xx” or
“xxxxxxxxxxxx” format where x is a hexadecimal digit.
NOTE: When “Peer MEP ID” field is configured, the device can auto-negotiate the
neighboring device’s MAC address. Therefore, the user can set “Unicast Peer
MAC” field to all zeros “00-00-00-00-00-00” for initial configurations.
cLOC: Fault Cause indicating that no CCM has been received (in 3,5 periods) -
from this peer MEP
cRDI: Fault Cause indicating that a CCM is received with Remote Defect Indication
- from this peer MEP.
cPeriod: Fault Cause indicating that a CCM is received with a period different what
is configured for this MEP - from this peer MEP.
cPriority: Fault Cause indicating that a CCM is received with a priority different
what is configured for this MEP - from this peer MEP.
Functional Configuration
Continuity Check
Enable: Select the checkbox to enable Continuity Check that CCM PDU is
transmitted and received. The CCM PDU is always transmitted as Multicast Class 1.
APS Protocol
Cast: Select whether APS PDU transmitted unicast or multicast. The unicast MAC
will be taken from the “Unicast Peer MAC” configuration. Unicast is only valid for
L-APS type. The R-APS PDU is always transmistted with multicast MAC described
in G.8032.
Type:
R-APS: APS PDU is transmitted as R-APS (this is for ERPS).
Last Octet: This is the last octet of the transmitted and expected RAPS multi-cast
MAC. In G.8031 (03/2010) a RAPS multi-cast MAC is defined as 01-19-A7-00-00-
XX. In current standard the value for this last octet is '01' and the usage of other
values is for further study.
Loop Back
Enable: Select the checkbox to enable Loop Back based on transmitting and
receiving LBM/LBR PDU. Loop Back is automatically disabled when all “To Send”
LBM PDU has been transmitted.
Cast: Select LBM PDU to be transmitted as unicast or multicast. The unicast MAC
will be configured through 'Peer MEP' or 'Unicast Peer MAC'. To-wards MIP only
unicast Loop Back is possible.
Peer MEP: This is only used if the “Unicast MAC” is configured to all zero. The LBM
unicast MAC will be taken from the “Unicast Peer MAC” configuration of this peer.
Unicast MAC: This is only used if NOT configured to all zero. This will be used as
the LBM PDU unicast MAC. This is the only way to configure Loop Back to-wards a
MIP.
To Send: The number of LBM PDU to send in one loop test. The value 0 indicate
infinite transmission (test behaviour). This is HW based LBM/LBR and Requires VOE.
Size: The number of bytes in the LBM PDU Data Pattern TLV.
Interval: The interval between transmitting LBM PDU. In 10ms. in case 'To Send' !=
0 (max 100 - '0' is as fast as possible) In 1us. in case 'To Send' == 0 (max 10.000)".
Transaction ID: The transaction ID of the first LBM transmitted. For each LBM
transmitted the transaction ID in the PDU is incremented.
Reply MAC: The MAC of the replying MEP/MIP. In case of multi-cast LBM, replies can
be received from all peer MEP in the group. This MAC is not shown in case of “To
Send”= 0.
Received: The total number of LBR PDU received from this “Reply MAC”.
Out of Order: The number of LBR PDU received from this “Reply MAC” with incorrect
“Transaction ID”.
Link Trace
Enable: Select the checkbox to enable Link Trace based on transmitting and
receiving LTM/LTR PDU. Link Trace is automatically disabled when all 5 transactions
are done with 5 sec. interval - waiting 5 sec. for all LTR in the end. The LTM PDU is
always transmitted as Multi-cast Class 2.
Peer MEP: This is only used if the “Unicast MAC” is configured to all zero. The Link
Trace Target MAC will be taken from the “Unicast Peer MAC” configuration of this
peer.
Unicast MAC: This is only used if NOT configured to all zero. This will be used as
the Link Trace Target MAC. This is the only way to configure a MIP as Target MAC.
Time To Live: This is the LTM PDU TTL value as described in Y.1731. This value is
decremented each time forwarded by a MIP. PDU will not be forwarded when the
TTL value reaches zero.
Transaction ID: The transaction id is incremented for each LTM send. This value is
inserted the transmitted LTM PDU and is expected to be received in the LTR PDU.
Received LTR with wrong transaction id is ignored. There are five transactions in
one Link Trace activated.
Time To Live: This is the TTL value taken from the LTM received by the MIP/MEP
sending this LTR - decremented as if forwarded.
Relayed: This indicates if MEP/MIP sending this LTR has relayed or forwarded the
LTM.
Last MAC: The MAC identifying the last sender of the LBM causing this LTR -
initiating MEP or previous MIP forwarding.
Next MAC: The MAC identifying the next sender of the LBM causing this LTR - MIP
forwarding or terminating MEP.
Test Signal
Peer MEP: The TST frame destination MAC will be taken from the “Unicast Peer
MAC” configuration of this peer.
Rate: The TST frame transmission bit rate - in Mega bits pr. second. Limit on
Caracal is 400 Mbps. Limit on Serval is 1Gbps.
Size: The TST frame size. This is entered as the wanted size (in bytes) of a un-
tagged frame containing TST OAM PDU - including CRC (four bytes).
Pattern: The 'empty' TST PDU has the size of 12 bytes. In order to achieve the
configured frame size a data TLV will be added with a pattern.
TX frame count: The number of transmitted TST frames since last 'Clear'.
RX frame count: The number of received TST frames since last 'Clear'.
RX rate: The current received TST frame bit rate in 100 Kbps. This is calculated on
a 1 s. basis, starting when first TST frame is received after 'Clear'. The frame size
used for this calculation is the first received after 'Clear'
Test time: The number of seconds passed since first TST frame received after last
'Clear'.
Clear: This will clear all Test Signal State. Transmission of TST frame will be
restarted. Calculation of 'Rx frame count', 'RX rate' and 'Test time' will be started
when receiving first TST frame.
Client Configuration
Level: The client layer level which means that PDU transmitted in client layer flows
will be on this level.
Flow: Client layer flow instance numbers. It must only be configured in case of
Port MEP.
AIS
Enable: Enable or disable the insertion of AIS signal (AIS PDU transmission) in
client layer flows.
Priority: On Caracal this priority is used in sink direction (client layer). On Serval,
for each client EVC, the highest COS-ID (ECE Class) is used.
Frame Rate: Select the frame rate of AIS PDU. This is the inverse of transmission
period as described in Y.1731.
Protection: Select the checkbox to enable protection. This means that the first 3
AIS PDU is transmitted as fast as possible - in case of using this for protection in
the end point.
Lock
Enable: Enable or disable the insertion of LOCK signal (LCK PDU transmission) in
client layer flows.
Frame Rate: Select the frame rate of LCK PDU. This is the inverse of transmission
period as described in Y.1731.
Enable: When enabled, this MEP instance will contribute to the 'PM Data Set'
gathered by the PM Session.
Loss Measurement
Priority: The priority to be inserted as PCP bits in TAG (if any). In case of enable
of Continuity Check and Loss Measurement both implemented on SW based CCM,
'Priority' has to be the same.
Frame rate: Select the frame rate of CCM/LMM PDU. This is the inverse of
transmission period as described in Y.1731. Selecting 300f/sec or 100f/sec is not
valid. In case of enable of Continuity Check and Loss Measurement both
implemented on SW based CCM, 'Frame Rate' has to be the same.
Cast: Selection of CCM or LMM PDU transmitted unicast or multicast. The unicast
MAC will be taken from the 'Unicast Peer MAC' configuration. In case of enable of
Continuity Check and dual ended Loss Measurement both implemented on SW
based CCM, 'Cast' has to be the same.
Ended:
FLR Interval: This is the interval in seconds where the Frame Loss Ratio is
calculated.
Near End Loss Count: The accumulated near end frame loss count - since last
'clear'.
Far End Loss Count: The accumulated far end frame loss count - since last 'clear'.
Near End Loss Ratio: The near end frame loss ratio calculated based on the near
end frame loss count and far end frame transmitted - in the latest 'FLR Interval'.
The result is given in percent.
Far End Loss Ratio: The far end frame loss ratio calculated based on the far end
frame loss count and near end frame transmitted - in the latest 'FLR Interval'. The
result is given in percent.
Clear: Set of this check and save will clear the accumulated counters and restart
ratio calculation.
Delay Measurement
Peer MEP: This is only used if the 'Cast' is configured to Uni. The 1DM/DMR
unicast MAC will be taken from the 'Unicast Peer MAC' configuration of this peer.
Tx Mode:
Round trip: The frame delay calculated by the transmitting and receiving
timestamps of initiators. Frame Delay = RxTimeb-TxTimeStampf
Flow: The frame delay calculated by the transmitting and receiving timestamps of
initiators and remotes. Frame Delay = (RxTimeb-TxTimeStampf)-(TxTimeStampb-
RxTimeStampf)
Gap: The gap between transmitting 1DM/DMM PDU in 10ms. The range is 10 to
65535.
D2forD1: Enable to use DMM/DMR packet to calculate one-way DM. If the option
is enabled, the following action will be taken. When DMR is received, two-way delay
(roundtrip or flow) and both near-end-to-far-end and far-end-to-near-end one-
way delay are calculated. When DMM or 1DM is received, only far-end-to-near-end
one-way delay is calculated.
Rx Timeout: The accumulated receive timeout count for two-way only - since last
'clear'.
Rx Error: The accumulated receive error count - since last 'clear'. The frame delay
is larger than 1 second (timeout).
Average Total: The average delay - since last 'clear'. The unit is microsecond.
Average last N: The average delay of the last n packets - since last 'clear'. The
unit is microsecond.
Average Variation Total: The average delay variation - since last 'clear'. The unit is
microsecond.
Average Variation last N: The average delay variation of the last n packets - since
last 'clear'. The unit is microsecond.
Min.: The minimum delay - since last 'clear'. The unit is microsecond.
Max.: The maximum delay - since last 'clear'. The unit is microsecond.
Clear: Click the checkbox and save this setting will clear the accumulated
counters.
In a ring topology that runs ERPS, only one switch is assigned as an owner that is
responsible for blocking traffic in RPL so as to avoid loops. The switch adjacent to
the RPL owner is called RPL neighbor node that is responsible for blocking its end
of the RPL under normal condition. Other participating switches adjacent to RPL
owner or neighbor in a ring are members or RPL next-neighbor nodes to this
topology and normally forward receive traffic.
Nodes on the ring periodically use control messages called Ring Automatic
Protection Switching message to ensure that a ring is up and loop-free. Once RPL
owner misses poll packets or learns from fault detection packets, RPL owner
detects signal failure (SF) in a ring. Upon learning of a fault, the RPL owner
unblocks ring protection link (RPL) allowing protected VLAN traffic through.
ERPS, like STP, provides a loop-free network by using polling packets to detect
faults. However, when a fault occurs, ERPS heals itself by sending traffic over a
protected reverse path instead of making a calculation to find out the forwarding
path. Because of this fault detection mechanism, ERPS can converge in less than
50 milliseconds and recover quickly to forward traffic.
Port 0: Port 0 is also known as E port (East port) which is used by some of the
other vendors. Specify the east port of the switch in the ring.
Port 1: Port 1 is also known as W port (West port) which is used by some of the
other vendors. When this port is interconnected with the other sub-ring, “0” is
used in this field to indicate that no west port is associated with this instance.
Specify the west port of the switch in the ring.
Port 0 APS MEP: Specify the East APS PDU handling MEP.
Port 1 APS MEP: Specify the West APS PDU handling MEP. When interconnected
with the other sub-ring, “0” is used in this field to indicate that no west APS MEP
is associated with this instance.
Port 0 SF MEP: This is also known as East Signal Fail APS MEP. Assign the East Signal
Fail reporting MEP in this field.
Port 1 SF MEP: This is also known as West Signal Fail APS MEP. When
interconnected with the other sub-ring, “0” is used in this field to indicate that no
west SF MEP is associated with this instance. Assign the West Signal Fail reporting
MEP in this field.
Ring Type: Select the type of protection ring which can be either “major” ring or
“sub” ring.
Virtual Channel: Sub rings can either have virtual channel or not on the
interconnected node. Select the checkbox if this instance is an interconnected
node with virtual channel. Leave this checkbox unchecked if sub ring does not have
virtual channel.
Major Ring ID: This field is used for an interconnected sub ring for sending topology
change updates on major ring. If ring is set to major, this value is same as the
protection group ID of this ring.
Alarm: When settings are complete, then the switch will show an alarm status on
the ERPS.
Click the “Add New Protection Group” button to create a new entry.
Click “Reset” to undo any changes made locally and restore changes to previously
saved (default) values.
Click the "Add New IPMC Profile" to insert a new entry to the table.
Profile Name & Index: Display the profile name and index.
Entry Name: The name used in specifying the address range. Only the existing
profile address entries are selectable in the drop-down menu.
Address Range: Specify the multicast IP range. The available IP range is from
224.0.0.0~239.255.255.255
Action: Select the action taken upon receiving the Join/Report frame that has the
group address matches the address range of the rule.
Permit: Group address matches the range specified in the rule will be learned.
Deny: Group address matches the range specified in the rule will be dropped.
Log: Select the logging preference receiving the Join/Report frame that has the
group address matches the address range of the rule.
Enable: Corresponding information of the group address, that matches the range
specified in the rule, will be logged.
Disable: Corresponding information of the group address, that matches the range
specified in the rule, will not be logged.
You can manage rules and the corresponding precedence order by using the following
buttons:
Entry Name: Enter a name which is used for indexing the address entry table.
Start Address: Enter the starting IPv4 or IPv6 multicast address used in this address
range.
End Address: Enter the ending IPv4 or IPv6 multicast address used in this address
range.
Click the "Add new Address (Range) Entry" button to insert a new entry.
Select the "Delete" checkbox to delete an entry during the next save.
4.3.7 MVR
Multicast VLAN Registration protocol (MVR) allows a media server to transmit
multicast stream in a single multicast VLAN when clients receiving multicast VLAN
stream can reside in different VLANs. Clients in different VLANs intend to join or
leave the multicast group simply by sending the IGMP Join or Leave message to a
receiver port. The receiver port that belongs to one of the multicast groups can
receive multicast stream from the media server.
MVR further isolates users who are not intended to receive multicast traffic and
hence provide data security by VLAN segregation that allows only multicast traffic
into other VLANs to which the subscribers belong. Even though common multicast
streams are passed onto different VLAN groups from the MVR VLAN, users in
different IEEE 802.1Q or private VLANs cannot exchange any information (except
through upper-level routing services).
4.3.7.1 Configuration
MVR Configurations
MVR Mode: Enable or disable MVR feature globally on this device. Any multicast
data from source ports will be sent to associated receiver ports registered in the
table. By default, MVR feature is turned off.
MVR ID: Specify multicast VLAN ID. Please note that MVR source ports are not
recommended to be used as management VLAN ports. MVR source ports should
be configured as members of the MVR VLAN, but MVR receiver ports should not
be manually configured as members of this VLAN.
MVR Name: Optionally specify a user-defined name for this multicast VLAN. The
maximum length of the MVR name string is 32. Both alphabets and numbers are
allowed for use.
IGMP Address: Specify the IPv4 unicast address as source address used in IP header
for IGMP control frames.
Dynamic: MVR allows dynamic MVR membership reports on source ports. (This
is the default mode.)
Tagging: Specify whether IGMP/MLD control frames will be sent tagged with MVR
VID or untagged.
Priority: Specify the priority for transmitting IGMP/MLD control frames. By default,
priority is set to 0. Allowed priority values is 0 -7.
LLQI: LLQI stands for Last Listener Query Interval and is to configure the maximum
time to wait for IGMP/MLD report memberships on a receiver port before removing
the port from multicast group membership. By default, LLQI is set to 5 tenths of a
second (0.5 second). The allowed range is 0 – 31744 tenths of a second.
Interface Channel Profile: Select an IPMC profile from the drop-down menu. Click
the button to view a summary about the selected IPMC profile settings.
Port Role: Click the Port Role symbol to change the role status.
Inactive (I): By default, all ports are set to inactive. Inactive ports do not
participate in MVR operations.
Source (S): Set a port (uplink ports) to source port. Source ports will receive and
send multicast data. Subscribers can not directly be connected to source ports.
Please also note that source ports cannot be management ports at the same
time.
Receiver (R): Set a port to receiver port. Client or subscriber ports are configured
to receiver ports so that they can issue IGMP/MLD messages to receive multicast
data.
Immediate Leave: Enable for disable immediate leave function. When enabled, the
device immediately removes a port from a multicast stream as soon as it receives
leave message for that group. This option only applies to an interface configured
as MVR receivers.
This page displays MVR statistics information on queries, joins, reports and leaves
messages.
VLAN ID: Display VLAN ID that is used for processing multicast traffic.
IGMP/MLD Queries Received: The number of received queries for IGMP and MLD.
IGMPv2/MLDv1 Leaves Received: The number of IGMPv2 and MLDv1 received leaves.
Start from VLAN ____ and Group Address _______ with 20 entries per page.
This table displays MVR channels (groups) information and is sorted by VLAN ID.
Groups: Group ID
Mode: Indicates the filtering mode maintained per (VLAN ID, port number, Group
Address) basis. It can be either Include or Exclude.
Source Address: The source IP Address. Currently, the system limits the total
number of source IP addresses for filtering to be 128. When there is no source
filtering address, "None" is shown in the Source Address field.
Hardware Filter/Switch: Indicate whether data plane destined to the specific group
address from the source IPv4/IPv6 address could be handled by chip or not.
4.3.8 IPMC
The “IPMC” menu includes IGMP Snooping and MLD Snooping sub menu. Select
the appropriate menu to set up detailed configurations.
When IGMP snooping is enabled in a switch, it analyses all the IGMP packets
between hosts connected to the switch and multicast routers in the network.
When a switch receives an IGMP report for a given multicast group from a host,
the switch adds the host's port number to the multicast list for that group. When
the switch hears an IGMP Leave, it removes the host's port from the table entry.
IGMP snooping can reduce multicast traffic from streaming and other bandwidth
intensive IP applications more effectively. A switch using IGMP snooping will only
forward multicast traffic to the hosts in that traffic. This reduction of multicast
traffic reduces the packet processing at the switch (at the cost of needing
additional memory to handle the multicast tables) and also decreases the
workload at the end hosts since their network cards (or operating system) will
not receive and filter all the multicast traffic generated in the network.
Global Configuration
Snooping Enabled: Select the checkbox to globally enable IGMP Snooping feature.
When enabled, this device will monitor network traffic and determine which hosts
will receive multicast traffic. The switch can passively monitor or snoop on IGMP
Query and Report packets transferred between IP multicast routers and IP multicast
service subscribers to identify the multicast group members. The switch simply
monitors the IGMP packets passing through it, picks out the group registration
information and configures the multicast filters accordingly.
Unregistered IPMCv4 Flooding Enabled: Set forwarding mode for unregistered (not-
joined) IP multicast traffic. Select the checkbox to flood traffic.
IGMP SSM Range: SSM (Source-Specific Multicast) Range allows the SSM-aware
hosts and routers run the SSM service model for the groups in the address range.
Leave Proxy Enabled: Suppresses leave messages unless received from the last
member port in the group. IGMP leave proxy suppresses all unnecessary IGMP leave
messages so that a non-querier switch forwards an IGMP leave packet only when
the last dynamic member port leaves a multicast group.
Proxy Enabled: When enabled, the switch performs like “IGMP Snooping with
Proxy Reporting” (as defined in DSL Forum TR-101, April 2006).
Router Port: Tick the checkbox on a given port to assign it as a router port. If IGMP
snooping cannot locate the IGMP querier, you can manually designate a port which
is connected to a known IGMP querier (i.e., a multicast router/switch). This
interface will then join all the current multicast groups supported by the attached
router/switch to ensure that multicast traffic is passed to all appropriate interfaces
within the switch.
Fast Leave: Enable fast leave function if the checkbox is ticked. When a leave packet
is received, the switch immediately removes it from a multicast service without
sending an IGMP group-specific (GS) query to that interface.
Throttling: This field limits the maximum number of multicast groups that a port
can join at the same time. When the maximum number is reached on a port, any
new IGMP join reports will be dropped. By default, unlimited is selected. Other
allowed options are 1 – 10
Click the “Add New IGMP VLAN” button to add a new entry.
Querier Election: Enable to join querier election in the VLAN. When disabled, it will
act as an IGMP non-querier.
Querier Address: Specify the IPv4 unicast source address used in IP header for IGMP
querier election. When the field is not specified, the switch uses the first available
IPv4 management address of the IP interface associated with this VLAN.
Compatibility: This configures how hosts and routers take actions within a network
depending on IGMP version selected. Available options are “IGMP-Auto”, “Forced
IGMPv1”, “Forced IGMPv2”, “Forced IGMPv3”. By default, IGMP-Auto is used.
PRI: Select the priority of interface. This field indicates the IGMP control frame
priority level generated by the system which is used to prioritize different classes
of traffic. The allowed range is 0 (best effort) to 7 (highest). By default, interface
priority value is set to 0.
RV: The robustness variable (RV) allows tuning for the expected packet loss on a
subnet. If a subnet is susceptible to packet loss, this value can be increased. The
RV value must not be zero and should not be one. The value should be 2 or greater.
By default, it is set to 2.
QI (sec): The Query Interval is the interval between IGMP General Query messages
sent by the Querier. The default Querier Interval is 125 seconds.
QRI: The Query Response Interval is the maximum amount of time that the IGMP
router waits to receive a response to a General Query message. The QRI applies
when the switch is acting as the querier and is used to inform other devices of the
maximum time this system waits for a response to general queries. By default, RQI
is set to 10 seconds. The allowed range is 10 – 31744 tenths of a second.
LLQI: The Last Listener Query Interval sets the interval that waits for a response to
a group-specific or group-and-source specific query message.
URI: The Unsolicited Report Interval is the amount of time that the upstream
interface should transmit unsolicited IGMP reports when report suppression/proxy
reporting is enabled. By default, URI is set to 1 second. The allowed range for URI
is 0 -31744 seconds.
Filtering Profile: Select the configured multicast groups that are denied on a port.
When a certain multicast group is selected on a port, IGMP join reports received on
a port are dropped.
: Click the summary button to view details of the selected IPMC profile.
Statistics
Querier Status: Show the Querier status that is either "ACTIVE" or "IDLE".
"DISABLE" denotes the specific interface is administratively disabled.
Router Port
Mode: The filtering mode maintained per VLAN ID, port number and group address.
Hardware Filter/Switch: Indicates whether the data plane destined to the specific
group address from the source IPv4 address can be handled by the chip or not.
Global Configuration
Snooping Enabled: Select the checkbox to globally enable MLD Snooping feature.
When enabled, this device will monitor network traffic and determine which hosts
would like to receive multicast traffic. The switch can passively monitor or snoop
on MLD Listener Query and Report packets transferred between IP multicast
routers and IP multicast service subscribers to identify the multicast group
members. The switch simply monitors the IGMP packets passing through it, picks
out the group registration information and configures the multicast filters
accordingly.
MLD SSM Range: SSM (Source-Specific Multicast) Range allows the SSM-aware
hosts and routers run the SSM service model for the groups in the address range.
Leave Proxy Enabled: To prevent multicast router from becoming overloaded with
leave messages, MLD snooping suppresses leave messages unless received from
the last member port in the group. When the switch acts as the querier, the leave
proxy feature will not function.
Proxy Enabled: When MLD proxy is enabled, the switch exchanges MLD messages
with the router on its upstream interface, and performs the host portion of the
MLD task on the upstream interface as follows:
• When queried, it sends multicast listener reports to the group.
• When a host joins a multicast group to which no other host belongs, it sends
unsolicited multicast listener reports to that group.
• When the last host in a particular multicast group leaves, it sends an
unsolicited multicast listener done report to the all-routers address (FF02::2)
for MLDv1.
Router Port: Tick the checkbox on a given port to assign it as a router port. If
MLD snooping cannot locate the MLD querier, you can manually designate a port
which is connected to a known MLD querier (i.e., a multicast router/switch). This
interface will then join all the current multicast groups supported by the attached
router/switch to ensure that multicast traffic is passed to all appropriate
interfaces within the switch.
Fast Leave: Enable fast leave function if the checkbox is ticked. When a leave packet
is received, the switch immediately removes it from a multicast service without
sending a MLD group-specific (GS) query to that interface.
Throttling: This field limits the maximum number of multicast groups that a port
can join at the same time. When the maximum number is reached on a port, any
new MLD join reports will be dropped. By default, unlimited is selected. Other
allowed options are 1 – 10.
Querier Election: Enable to join querier election in the VLAN. When enabled, the
switch can serve as the MLDv2 querier in the bidding process with other competing
multicast routers or switches. Once it becomes querier, it will be responsible for
asking hosts periodically if they want to receive multicast traffic. When disabled, it
will act as an IGMP non-querier.
Compatibility: This configures how hosts and routers take actions within a network
depending on MLD version selected. Available options are “MLD-Auto”, “Forced
MLDv1”and “Forced MLDv2”. By default, MLD-Auto is used.
PRI: Select the priority of interface. This field indicates the MLD control frame
priority level generated by the system which is used to prioritize different classes
of traffic. The allowed range is 0 (best effort) to 7 (highest). By default, interface
priority value is set to 0.
RV: The robustness variable (RV) allows tuning for the expected packet loss on a
subnet. If a subnet is susceptible to packet loss, this value can be increased. The
RV value must not be zero and should not be one. The value should be 2 or greater.
By default, it is set to 2. The allowed range is 1 -255.
QI (sec): The Query Interval is the interval between IGMP General Query messages
sent by the Querier. The default Querier Interval is 125 seconds. The allowed
interval range is 1 – 255 seconds.
QRI: The Query Response Interval is the maximum amount of time that the IGMP
router waits to receive a response to a General Query message. The QRI applies
when the switch is acting as the querier and is used to inform other devices of the
maximum time this system waits for a response to general queries. By default, RQI
is set to 10 seconds. The allowed range is 10 – 31744 tenths of a second.
LLQI: The Last Listener Query Interval sets the interval that waits for a response to
a group-specific or group-and-source specific query message.
URI: The Unsolicited Report Interval is the amount of time that the upstream
interface should transmit unsolicited IGMP reports when report suppression/proxy
reporting is enabled. By default, URI is set to 1 second. The allowed range for URI
is 0 -31744 seconds.
Click the “Add New MLD VLAN” button to add a new entry.
Filtering Profile: Select the configured multicast groups that are denied on a port.
When a certain multicast group is selected on a port, MLD join reports received on
a port are dropped.
: Click the summary button to view details of the selected IPMC profile.
Statistics
Querier Status: Show the Querier status that is either "ACTIVE" or "IDLE".
"DISABLE" denotes the specific interface is administratively disabled.
Router Port
NOTE: The maximum number of MLD Snooping groups can be learned is 32.
Mode: The filtering mode maintained per VLAN ID, port number and group address.
Hardware Filter/Switch: Indicates whether the data plane destined to the specific
group address from the source IPv4 address can be handled by the chip or not.
4.3.9 LLDP
LLDP (Link Layer Discovery Protocol) runs over data link layer which is used for
network devices to send information about themselves to other directly connected
devices on the network. By using LLDP, two devices running different network layer
protocols can learn information about each other. A set of attributes referred to
TLVs are used to discover neighbour devices. Details such as port description,
system name, system description, system capabilities, management address can
be sent and received on this device.
The “LLDP” menu contains the following sub menus. Select the appropriate menu
to set up detailed configurations.
LLDP Parameters
Tx Interval: Specify the interval between LLDP frames are sent to its neighbors for
updated discovery information. The valid values are 5 - 32768 seconds. The default
is 30 seconds.
Tx Hold: This setting defines how long LLDP frames are considered valid and is used
to compute the TTL. Valid range is 2~10 times. The default is 4.
Tx Delay: Specify a delay between the LLDP frames that contain changed
configurations. Tx Delay cannot be larger than 1/4 of the Tx interval value. The valid
values are 1 - 8192 seconds.
Tx Reinit: Specify a delay between the shutdown frame and a new LLDP
initialization. The valid values are 1 - 10 seconds.
Disabled: LLDP information will not be sent and LLDP information received from
neighbours will be dropped.
Enabled: LLDP information will be sent and LLDP information received from
neighbours will be analyzed.
Rx Only: The switch will analyze LLDP information received from neighbours.
Tx Only: The switch will send out LLDP information but will drop LLDP
information received from neighbours.
CDP Aware: CDP aware operation is used to decode incoming CDP (Cisco Discovery
Protocol) frames. If enabled, CDP TLVs that can be mapped into a corresponding
field in the LLDP neighbors table are decoded, all others are discarded. CDP TLVs
are mapped into LLDP neighbors table as shown below:
Optional TLVs: LLDP uses several attributes to discover neighbour devices. These
attributes contains type, length, and value descriptions and are referred to TLVs.
Details such as port description, system name, system description, system
capabilities, management address can be sent from this device. Uncheck the boxes
if they are not appropriate to be known by other neighbour devices.
4.3.9.2 LLDP-MED
LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates
between endpoint devices such as IP phones and network devices such as switches.
It specifically provides support for voice over IP (VoIP) applications and provides
additional TLVs for capabilities discovery, network policy, Power over Ethernet,
inventory management and location information.
Fast Start Repeat Count: Rapid startup and Emergency Call Service Location
Identification Discovery of endpoints is a critically important aspect of VoIP systems
in general. In addition, it is best to advertise only those pieces of information which
are specifically relevant to particular endpoint types (for example only advertise
the voice network policy to permitted voice-capable devices), both in order to
conserve the limited LLDPU space and to reduce security and system integrity
issues that can come with inappropriate knowledge of the network policy. With
this in mind, LLDP-MED defines an LLDP-MED Fast Start interaction between the
protocol and the application layers on top of the protocol, in order to achieve these
related properties. With Fast start repeat count it is possible to specify the number
of times the fast start transmission is repeated. The recommended value is 4 times,
giving that 4 LLDP frames with a 1 second interval will be transmitted, when a LLDP
frame with new information is received. It should be noted that LLDP-MED and the
LLDP-MED Fast Start mechanism is only intended to run on links between LLDP-
MED Network Connectivity Devices and Endpoint Devices, and as such does not
apply to links between LAN infrastructure elements, including between Network
Connectivity Devices, or to other types of links.
Coordinates Location
Map Datum: The Map Datum is used for the coordinates given in these options:
WGS84: (Geographical 3D) - World Geodesic System 1984, CRS Code 4327,
Prime Meridian Name: Greenwich.
NAD83/NAVD88: North American Datum 1983, CRS Code 4269, Prime Meridian
Name: Greenwich; The associated vertical datum is the North American Vertical
Datum of 1988 (NAVD88). This datum pair is to be used when referencing
locations on land, not near tidal water (which would use Datum = NAD83/MLLW).
NAD83/MLLW: North American Datum 1983, CRS Code 4269, Prime Meridian
Name: Greenwich; The associated vertical datum is Mean Lower Low Water
(MLLW). This datum pair is to be used when referencing locations on
water/sea/ocean.
Country Code: The two-letter ISO 3166 country code in capital ASCII letters -
Example: DK, DE or US.
City District: City division, borough, city district, ward, chou (Japan).
Floor: Example: 4.
Emergency Call Service: Emergency Call Service (e.g. E911 and others), such as
defined by TIA or NENA.
Policies
Application Type: The application types include “Voice”, “Voice Signalling”, “Guest
Voice”, “Guest Voice Signalling”, “Softphone Voice”, “Video Conferencing”,
“Streaming”, “Video Signalling”.
Tag: Tag indicating whether the specified application type is using a “tagged” or an
“untagged” VLAN.
DSCP: Specify one of 64 code point values (0-63) as defined in IETF RFC 2474.
4.3.9.3 Neighbours
Local Port: The local port that a remote LLDP-capable device is attached.
Global Counters
Total Neighbours Entries Added: Shows the number of new entries added since
the switch was rebooted, and for which the remote TTL has not yet expired.
Total Neighbors Entries Deleted: The number of LLDP neighbors which have been
removed from the LLDP remote systems MIB for any reason.
Total Neighbors Entries Dropped: The number of times which the remote
database on this switch dropped an LLDPDU because the entry table was full.
Total Neighbors Entries Aged Out: The number of times that a neighbor’s
information has been deleted from the LLDP remote systems MIB because the
remote TTL timer has expired.
Rx Errors: The number of received LLDP frames with some kind of error.
Frames Discarded: The number of frames discarded because they did not conform
to the general validation rules as well as any specific usage rules defined for the
particular Type Length Value (TLV).
TLVs Discarded: Each LLDP frame can contain multiple pieces of information, known
as TLVs. If a TLV is malformed, it is counted and discarded.
TLVs Unrecognized: The number of well-formed TLVs, but with an unknown type
value.
Age-Outs: Each LLDP frame contains information about how long the LLDP
information is valid (age-out time). If no new LLDP frame is received within the
age-out time, the LLDP information is removed, and the Age-Out counter is
incremented.
4.3.10.1 Configuration
Aging Configuration
Disable Automatic Aging: Learned MAC addresses will appear in the table
permanently.
Aging Time: Set up the aging time for a learned MAC to be appeared in MAC learning
table. The allowed range is 10 to 1000000 seconds.
Secure: Only static MAC entries listed in “Static MAC Table Configuration” are
learned. Others will be dropped.
NOTE: Make sure that the link used for managing the switch is added to the
Static Mac Table before changing to secure learning mode, otherwise the
management link is lost and can only be restored by using another non-secure
port or by connecting to the switch via the serial interface.
Static MAC Table Configuration: This table is used to manually set up static MAC
entries. The total entries that can be entered are 64.
Port Members: Check or uncheck the ports. If the incoming packet has the same
destination MAC address as the one specified in VID, it will be forwarded to the
checked port directly.
4.3.11 VLANs
IEEE 802.1Q VLAN (Virtual Local Area Network) is a popular and cost-effectively
way to segment your networking deployment by logically grouping devices with
similar attributes irrespective of their physical connections. VLANs also segment
the network into different broadcast domains so that packets are forwarded to
ports within the VLAN that they belong. Using VLANs provides the following main
benefits:
VLANs provide extra security: Devices that frequently communicate with each
other are grouped into the same VLAN. If devices in a VLAN want to communicate
with devices in a different VLAN, the traffic must go through a routing device or
Layer 3 switching device.
VLANs help control traffic: Traditionally, when networks are not segmented into
VLANs, congestion can be easily caused by broadcast traffic that is directed to all
devices. To minimize the possibility of broadcast traffic damaging the entire
network, VLANs can help group devices that communicate frequently with other
in the same VLAN so as to divide the entire network into several broadcast
domains.
4.3.11.1 Configuration
Allowed Access VLANs: This shows the allowed access VLANs. This setting only
affects ports set in “Access” mode. Ports in other modes are members of all VLANs
specified in “Allowed VLANs” field. By default, only VLAN 1 is specified. More
allowed access VLANs can be entered by specifying the individual VLAN ID
separated by comma. If you want to specify a range, separate it by a dash. For
example, 1, 5, 10, 12-15, 100
Ethertype for Custom S-ports: Specify ether type used for customer s-ports.
Port: List the number of each port. “Port *” settings apply to all ports.
Mode: The port mode (default is Access) determines the fundamental behavior of
the port in question. A port can be in one of three modes as described below.
Whenever a particular mode is selected, the remaining fields in that row will be
either grayed out or made changeable depending on the mode in question.
Grayed out fields show the value that the port will get when the mode is applied.
Access: Access ports are normally used to connect to end stations. Dynamic
features like Voice VLAN may add the port to more VLANs behind the scenes.
Access ports have the following characteristics:
• Member of exactly one VLAN, the Port VLAN (a.k.a. Access VLAN), which by
default is 1.
• Accepts untagged and C-tagged frames.
• Discards all frames that are not classified to the Access VLAN.
• On egress all frames classified to the Access VLAN are transmitted untagged.
Other (dynamically added VLANs) are transmitted tagged.
Trunk: Trunk ports can carry traffic on multiple VLANs simultaneously, and are
normally used to connect to other switches. Trunk ports have the following
characteristics:
Hybrid: Hybrid ports resemble trunk ports in many ways, but adds additional port
configuration features. In addition to the characteristics described for trunk
ports, hybrid ports have these abilities:
Port VLAN: Configures the VLAN identifier for the port. The allowed values are
from 1 through 4095. The default value is 1.
The Port VLAN is called an "Access VLAN" for ports in Access mode and Native VLAN
for ports in Trunk or Hybrid mode.
Port Type: When you select “Hybrid” mode, the Port Type field becomes selectable.
There are four port types available. Each port type’s ingress and egress action is
described in the following table.
Ingress Filtering: If Ingress Filtering is enabled and the ingress port is not a member
of a VLAN, the frame from the ingress port is discarded. By default, ingress filtering
is disabled.
Tagged and Untagged: Both tagged and untagged ingress packets are
acceptable on a port.
Tagged Only: Only tagged ingress packets are acceptable on a port. Untagged
packets will be dropped.
Untagged Only: Only untagged ingress packets are acceptable on a port. Tagged
packets will be dropped.
Egress Tagging: The action taken when packets are sent out from a port.
Untag Port VLAN: Frames that carry PVID will be removed when leaving from a
port. Frames with tags other than PVID will be transmitted with the carried tags.
Untag All: Frames are transmitted without a tag. This option is only available
for ports in Hybrid mode.
Allowed VLAN: Ports in Trunk and Hybrid mode may control which VLANs they are
allowed to become members of. Access ports can only be member of one VLAN,
the Access VLAN. By default, a Trunk or Hybrid port will become member of all
VLANs, and is therefore set to 1-4095.
4.3.11.2 Membership
This page shows the current VLAN membership saved on the Switch.
4.3.11.3 Ports
This page shows the current VLAN settings on a per-port basis saved on the Switch.
Untagged VLAN ID: Display the untagged VLAN ID. A port's UVID determines the
packet's behavior at the egress side. If the VID of Ethernet frames leaving a port
match the UVID, these frames will be sent untagged.
The “VLAN Translation” menu contains the following sub menus. Select the
appropriate one to configure settings or view its status.
Group ID: The total VLAN Translation group can be used is 11 which is automatically
created in Group Mapping Table when entering “Port to Group Mapping” page. A
port can be mapped to any of the groups. Multiple ports can be mapped to a single
group with the same Group ID.
NOTE: By default, each port is mapped to a group with a group ID equal to the port
number. For example, port 2 is mapped to the group with ID is 2.
Port Number: Click the appropriate radio button to include a port into a group.
Group ID: Indicate the Group ID that applies to this translation rule.
VLAN ID: Indicate the VLAN ID that will be mapped to a new VID.
Translated to VID: Indicate the new VID to which VID of ingress frames will be
changed.
Click the “Add New Entry” button once to add a new VLAN Translation entry.
This page is used to configure private VLANs. New Private VLANs can be added here
and existing VLANs can be modified. Private VLANs are based on the source port
mask and there are no connections to VLANs which means that VLAN IDs and
Private VLAN IDs can be identical. A port must be a member of both a VLAN and a
Private VLAN to be able to forward packets. By default, all ports are VLAN unaware
and members of VLAN 1 and Private VLAN 1. A VLAN unaware port can only be a
member of one VLAN, but it can be a member of multiple Private VLANs.
PVLAN ID: Specify the PVLAN ID. Valid values are 1 to 11.
Port Members: Select the checkbox, if you would like a port to belong to a certain
Private VLAN. Uncheck the checkbox to remove a port from a Private VLAN.
Add New VLAN: Click the button once to add a new VLAN entry.
Save: VLAN membership changes will be saved and new VLANs are enabled after
clicking “Save” button.
Reset: Click “Reset” button to clear all unsaved VLAN settings and changes.
Port Number: Select the checkbox if you want a port or ports to be isolated from
other ports.
4.3.13 GVRP
GVRP (GVRP VLAN Registration Protocol) is defined in the IEEE 802.1Q standard and
enables the switch to dynamically create IEEE 802.1Q compliant VLANs between
GVRP-enabled devices. With GVRP, VLAN information can be automatically
propagated from device to device so as to reduce errors when creating VLANs
manually and provide VIDs consistency across network.
This section provides configuration pages for users to set up GVRP timers and
enable GVRP on a per-port basis.
Join-time: Specify the amount of time in units of centi-seconds that PDUs are
transmitted. The default value is 20 centi-seconds. The valid value is 1~20.
Note: The “Leave-time” parameter must be three times greater than or equal to
Join time.
Leave-time: Specify the amount of time in units of centi-seconds that the device
waits before deleting the associated etry. The leave time is activated by a “Leave
All-time” message sent/received and cancelled by the Join message. The default
value is 60 centi-seconds.
LeaveAll-time: Specify the amount of time that “LeaveAll” PDUs are created. A
LeaveAll PDU indicates that all registrations are shortly de-registered. Participants
will need to rejoin in order to maintain registration. The valid value is 1000 to
5000 centi-seconds. The factory default 1000 centi-seconds.
NOTE: The “LeaveAll-time” parameter must be greater than the “Leave-time”
parameter.
Max VLANs: The maximum number of VLANs can be learned via GVRP.
4.3.14 VCL
The “VCL” menu contains the following sub menus.
address is processed to decide which VLAN these untagged frames belong. When
source MAC addresses does not match the rules created, untagged frames are
assigned to the receiving port’s native VLAN ID (PVID).
MAC Address: Indicate the source MAC address. Please note that the source MAC
address can only map to one VLAN ID.
VLAN ID: Map this MAC address to the associated VLAN ID.
Save: Changes will be saved and newly entered rules are enabled after clicking
“Save” button.
To avoid these problems, you can configure this switch with protocol-based VLANs
that divide the physical network into logical VLAN groups for each required protocol.
When a frame is received at a port, its VLAN membership can then be determined
based on the protocol type being used by the inbound packets.
Frame Type: There are three frame types available for selection; these are
“Ethernet”, “SNAP”, and “LLC”. The value field will change accordingly.
Value: This field specifically indicates the protocol type. This value field varies
depending on the frame type you selected.
Ethernet: Ether Type (etype) value. By default, it is set to 0x0800. The range
allowed is 0x0600 to 0xffff.
SNAP: This includes OUI (Organizationally Unique Identifier) and PID (Protocol
ID) values.
OUI: A value in the format of xx-xx-xx where each pair (xx) in the string is a
hexadecimal value in the ranges of 0x00-0xff.
PID: If the OUI is hexadecimal 000000, the protocol ID is the Ethernet type field
value for the protocol running on top of SNAP. If the OUI is that of a particular
organization, the protocol ID is a value assigned by that organization to the
protocol running on top of SNAP. In other words, if value of the OUI field is 00-
00-00, then value of the PID will be etherType (0x0600-0xffff), and if value of
the OUI is other than 00-00-00, then valid value of the PID will be any value from
0x0000 to 0xffff.
LLC (Logical Link Control): This includes DSAP (Destination Service Access Point)
and SSAP (Source Service Access Point) values. By default, the value is 0xff. Valid
range is 0x00 to 0xff.
Group Name: Indicate the descriptive name for this entry. This field only allows 16
alphabet characters (a-z; A-Z) or integers (0-9).
Group Name: Indicate the descriptive name for this entry. This field only allows 16
alphabet characters (a-z; A-Z) or integers (0-9).
Click the “Add New Entry” button to insert a new entry to the list.
Click the “Add New Entry” button to insert a new entry to the list.
4.3.15 QoS
Network traffic is always unpredictable and the only basic assurance that can be
offered is the best effort traffic delivery. To overcome this challenge, Quality of
Service (QoS) is applied throughout the network. This ensures that network traffic
is prioritized according to specified criteria and receives preferential treatments.
QoS enables you to assign various grades of network service to different types of
traffic, such as multi-media, video, protocol-specific, time critical, and file-backup
traffic. To set up the priority of packets in this switch, go to “Port Classification”
page.
4.3.15.1 Ingress
Port: List of the number of each port. “Port *” rules will apply to all ports.
CoS: Indicate the Class of Service level. A CoS class of 0 has the lowest priority. By
Default, 0 is used.
PCP: Select the appropriate value for the default Priority Code Point (or User Priority)
for untagged frames.
DEI: Select the appropriate value for the default Drop Eligible Indicator for untagged
frames.
Tag Class: This field displays classification mode for tagged frames on this port:
Disabled: Use the default QoS class and DP level for tagged frames.
Enabled: Use the mapped versions of PCP and DEI for tagged frames.
DSCP Based: Select the checkbox to enable DSCP based QoS (Ingress Port).
Rate: Indicate the rate for the port shaping. By default, 500kbps is used. The
allowed range for kbps and fps is 100 to 1000000. The allowed range for Mbps
and kfps is 1 to 3300Mbps.
Burst Size: Indicate in bits (or bytes) per burst how much traffic can be sent within
a given unit of time to not create scheduling concerns.
Rate: Indicate the rate for the policer. By default, 500kbps is used. The allowed
range for kbps and fps is 100 to 1000000. The allowed range for Mbps and kfps is
1 to 3300Mbps.
Queue 0~7 Enable: Select the appropriate checkboxes to enable queue policing
function on switch ports.
When enabled, the following image will appear:
Rate: Indicate the rate for the ingress queue policer. By default, 500kbps is used.
Allowed range for kbps is 100 to 1000000. Allowed range for Mbps is 1 to
3300Mbps.
4.3.15.2 Egress
Port: Click the port to set up detailed settings for port scheduler.
This page allows you to set up the Schedulers and Shapers for a specific port.
Strict mode: This gives egress queues with higher priority to be transmitted first
before lower priority queues are serviced.
Enable: Select the checkbox to enable queue shaper on a certain queue for this
selected port.
Rate: Indicate the rate for the queue shaper. By default, 500kbps is used. Allowed
range for kbps is 100 to 1000000. Allowed range for Mbps is 1 to 13200Mbps.
Queue Schedule
Queue Scheduler: When Scheduler Mode is set to Weighted, the user needs to
indicate a relative weight for each queue. DWRR uses a predefined relative weight
for each queue that determines the percentage of service time the switch
services each queue before moving on to the next queue. This prevents the head-
of-line blocking that can occur with strict priority queuing.
Weight: Assign a weight to each queue. This weight sets the frequency at which
each queue is polled for service and subsequently affects the response time
software applications assigned a specific priority value.
Port Shaper
Rate: Indicate the rate for Port Shaper. By default, 500kbps is used. Allowed range
for kbps is 100 to 1000000. Allowed range for Mbps is 1 to 13200Mbps.
This displays each port’s queue shaper and port shaper’s rate.
Click the port number to modify or reset queue shaper and port shaper’s rates.
See “Port Scheduler” for detailed explanation on each configuration option.
Tag Remarking Mode: Select the appropriate remarking mode used by this port.
Mapped: Use the mapping of the classified QoS class values and DP levels to
PCP/DEI values.
QoS class/DP level: Show the mapping options for QoS class values and DP levels
(drop precedence).
PCP: Remarks matching egress frames with the specified Priority Code Point (or
User Priority) value. (Range: 0-7; Default: 0)
DEI: Remarks matching egress frames with the specified Drop Eligible Indicator.
(Range: 0-1; Default: 0)
Ingress Translate: Select the checkbox to enable ingress translation of DSCP values
based on the selected classification method.
Remap: DSCP from analyzer is remapped and frame is remarked with remapped
DSCP value.
Trust: Select the checkbox to indicate that DSCP value is trusted. Only trusted DSCP
values are mapped to a specific QoS class and drop precedence level (DPL). Frames
with untrusted DSCP values are treated as non-IP frames.
QoS Class: Select the QoS class to the corresponding DSCP value for ingress
processing. By default, 0 is used. Allowed range is 0 to 7.
DPL: Select the drop precedence level to the corresponding DSCP value for ingress
processing. By default, 0 is used. The value “1” has the higher drop priority.
Ingress Translate: Enable Ingress Translation of DSCP values based on the specified
classification method.
Ingress Classify: Enable classification at ingress side as defined in the QoS port
DSCP Configuration Table.
Egress Remap: Enable egress remap based on the specified classification method.
DSCP: Select the DSCP value to map QoS class and DPL value. DSCP value selected
for “*” will map to all QoS class and DPL value.
This page displays rules created in QoS control list (QCL) only. The maximum
number of QCL is 256 on this device. Click the plus sign to insert a new QCL to
the list.
DMAC: Destination MAC address. Possible values are Any, Broadcast, Multicast,
Unicast.
Tag Type: The value of tag field can be “Untagged”, “Tagged” or “Any”.
Frame Type: Display the frame type to look for in incoming frames. Possible frame
types are Any, Ethernet, LLC SNAP, IPv4, IPv6.
Action: Display the classification action taken on ingress frames when the
configured parameters are matched in the frame’s content. If a frame matches the
QCL, the following actions will be taken.
CoS: If a frame matches the QCL, it will be put in the queue corresponding to
the specified QoS class.
DPL: The drop precedence level will be set to the specified value.
You can modify each QCE (QoS Control Entry) in the table using the following
buttons:
: Insert a new QCE before the current row.
: Edit the QCE entry.
: Move the QCE up the list.
: Move the QCE down the list.
: Delete the QCE.
: The lowest plus sign add a new entry at the bottom of the QCE listings.
QCE Configuration
Key Parameters
SMAC: Select source MAC address type. By default, any is used. Select “Specific” to
specify a source MAC (first three bytes of the MAC address or OUI).
DMAC Type: Select destination MAC address type. By default, any is used. Other
options available are “UC” for unicast, “MC” for multicast, and “BC” for broadcast.
Tag: Select VLAN tag type (Tag or Untag). By default, any type is used.
VID: Select VID preference. By default, any VID is used. Select “Specific”, if you
would like to designate a VID to this QCL entry. Or Select “Range”, if you would like
to map a range of VIDs to this QCL entry.
PCP: Select a PCP value (either specific value or a range of values are provided). By
default, any is used.
Frame Type: The frame types can be selected are listed below.
Any: By default, any is used which means that all types of frames are allowed.
Ethernet: This option can only be used to filter Ethernet II formatted packets
(Options: Any, Specific – 600-ffff hex; Default: ffff). Note that 800 (IPv4) and
86DD (IPv6) are excluded. A detailed listing of Ethernet protocol types can be
found in RFC 1060. A few of the more common types include 0800 (IP), 0806
(ARP), 8137 (IPX).
LLC: LLC refers to Link Logical Control and further provides three options.
SSAP: SSAP stands for Source Service Access Point address. By default, any is
used. Select specific to indicate a value (0x00 - 0xFF).
DSAP: DSAP stands for Destination Service Access Point address. By default, any
is used. Select specific to indicate a value (0x00 to 0xFF).
for the protocol running on top of SNAP. If the OUI is that of a particular
organization, the protocol ID is a value assigned by that organization to the
protocol running on top of SNAP. In other words, if value of the OUI field is 00-
00-00, then value of the PID will be etherType (0x0600-0xffff), and if value of
the OUI isother than 00-00-00, then valid value of the PID will be any value from
0x0000 to 0xffff.
IPv4:
Protocol: IPv4 frame type includes Any, TCP, UDP, Other. If “TCP” or “UDP” is
selected, you might further define Sport (Source port number) and Dport
(Destination port number).
Source IP: Select source IP type. By default, any is used. Select “Specific” to
indicate self-defined source IP and submask format. The address and mask must
be in the format x.y.z.w where x, y, z, and w are decimal numbers between 0 and
255. When the mask is converted to a 32-bit binary string and read from left to
right, all bits following the first zero must also be zero
DSCP: By default, any is used. Select “Specific” to indicate a DSCP value. Select
“Range” to indicate a range of DSCP value.
IPv6:
Protocol: IPv6 protocol includes Any, TCP, UDP, Other. If “TCP” or “UDP” is
selected, you may need to further define Sport (Source port number) and Dport
(Destination port number).
SIP (32 LSB): Select source IP type. By default, any is used. Select “Specific” to
indicate self-defined source IP and submask format.
DSCP: By default, any is used. Select “Specific” to indicate a DSCP value. Select
“Range” to indicate a range of DSCP value.
Action Parameters
Specify the classification action taken on ingress frame if the parameters match
the frame’s content. The actions taken include the following:
CoS: If a frame matches the QCE, it will be put in the queue corresponding to the
specified CoS class.
DPL: If a frame matches the QCE, the drop precedence level will be set to the
selected value or left unchanged.
DSCP: If a frame matches the QCE, the DSCP value will be set to the selected one.
Rate (pps): Select the packet threshold. The packets received exceed the selected
value will be dropped.
4.3.15.9 WRED
Queue: The queue number. Queue 0 to 5 can apply to Random Early Detection
(RED). However, RED cannot be applied to Queue 6 and 7.
Min. threshold: Specify the lowest RED threshold. If the average queue filling level
is below this threshold, the drop probability is zero. This valid value for this field
is 0~100.
Max. DP 1: Controls the drop probability for the frames marked in drop
precedence level 1 when the average queue filling level is 100%. The valid value is
0~100.
Max. DP 2: Controls the drop probability for the frames marked in drop
precedence level 2 when the average queue filling level is 100%. The valid value is
0~100.
Max. DP 3: Controls the drop probability for the frames marked in drop
precedence level 3 when the average queue filling level is 100%. The valid value is
0~100.
4.3.16 Mirroring
Port to mirror: Select the mirror port to which rx or tx traffic will be mirrored. Or
disable port mirroring function.
Mode: There are four modes that can be used on each port.
Rx only: Only frames received on this port are mirrored on the mirror port.
Tx only: Only frames transmitted on this port are mirrored on the mirror port.
Enable: Both frames received and transmitted re mirrored on the mirror port.
4.3.17 UPnP
TTL: TTL (Time to live) is used to configure how many steps an UPnP advertisement
can travel before it disappears.
Advertising Duration: This defines how often an UPnP advertisement is sent. The
duration is carried in Simple Service Discover Protocol (SSDP) packets which informs
a control point how often it should receive a SSDP advertisement message from
the switch. By default, the advertising duration is set to 100 seconds. However,
due to the unreliable nature of UDP, it is recommended to set to the shorter
duration since the shorter the duration, the fresher is UPnP status.
4.3.18 L2CP
L2CP stands for Layer 2 Control Protocol and contains Ethernet control protocols
such as Spanning Tree BPDUs, LACP, Pause frames, etc. A L2CP frame has a specific
destination address (DA) belonging to reserved multicast MAC address ranges. MEF
defines L2CP processing rules for Ethernet Frames carrying a MAC destination
address (DA) within the range of 01-80-C2-00-00-00 through 01-80-C2-00-00-0F
and 01-80-C2-00-00-20 through 01-80-C2-00-00-2F. Therefore, if a vendor
defines L2CP frames outside the specified MAC DA ranges, the L2CP handling rules
do not apply to these frames.
DMAC: The destination MAC address. The MAC DA range for Bridge block of protocol
is 01-80-C2-00-00-00 through 01-80-C2-00-00-0F and for GARP block of protocol
is 01-80-C2-00-00-20 through 01-80-C2-00-00-2F.
L2CP Mode: Select the L2CP frame handling mode for the corresponding
destination MAC address (DMAC).
4.3.19 Diagnostics
The “Diagnostics” menu provides ping function to test the connectivity of a certain
IP.
4.3.19.1 Ping
This Ping function is for ICMPv4 packets.
4.3.19.2 Ping6
This Ping function is for ICMPv6 packets.
Egress Interface: The VLAN ID (VID) of the specific egress IPv6 interface which ICMP
packet goes. The VID ranges from 1 to 4094 and will be effective only when the
corresponding IPv6 interface is valid. When this field is not specified, Ping6 will find
the best match interface for destination. Do not specify egress interface for
loopback address. Do specify egress interface for link-local or multicast address.
4.3.20 Maintenance
The “Maintenance” menu contains several sub menus. Select the appropriate sub
menu to restart the device, set the device to the factory default or upgrade
firmware image.
4.3.20.1 Reboot
Click “Yes” button to reset your device to factory defaults settings. Please note
that all changed settings will be lost. It is recommended that a copy of the current
configuration is saved to your local device.
4.3.20.3 Software
4.3.20.3.1 Upload
Select a Firmware file from your local device and then click “Upload” to start
updating.
4.3.20.4 Configuration
4.3.20.4.2 Backup
4.3.20.4.3 Restore
Select a file and then click “Upload Configuration” to start uploading the file.
4.3.20.4.4 Activate
Select the file that you would like to use. Click on the “Activate Configuration” to
replace configurations to the selected one.
4.3.20.4.5 Delete
Select the file that you would like to delete. Click on the “Delete Configuration
File” to remove the file from the device.
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail [email protected]
www.rad.com