User Manual6610
User Manual6610
UMN : CLI
DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
Non-observance of these conditions and the safety instructions can result in personal injury or in
property damage.
Therefore, only trained and qualified personnel may install and maintain the system.
The system complies with the standard EN 60950 / IEC 60950. All equipment connected has to comply
In elektrischen Anlagen stehen zwangsläufig bestimmte Teile der Geräte unter Spannung. Einige Teile
Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Körperverletzungen und
Sachschäden führen.
Deshalb wird vorausgesetzt, dass nur geschultes und qualifiziertes Personal die Anlagen installiert und
wartet.
Das System entspricht den Anforderungen der EN 60950 / IEC 60950. Angeschlossene Geräte müssen
Trademarks:
All designations used in this document can be trademarks, the use of which by third parties for their own
DDJ:A-M-5524B5-01 1
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
This Siemens product, SURPASS hiD 6610, contains both proprietary software and „Open Source Software”. The
Open Source Software is licensed to you at no charge under the GNU General Public License (GPL) and the GNU
Lesser General Public License (LGPL). This Open Source Software was written by third parties and enjoys copyright
protection. You are entitled to use this Open Source Software under the conditions set out in the GPL and LGPL
licenses indicated above. In the event of conflicts between Siemens´ license conditions and the GPL or LGPL license
conditions, the GPL and LGPL conditions shall prevail with respect to the Open Source portions of the software.
http://www.gnu.org/copyleft/gpl.html
http://www.gnu.org/copyleft/lgpl.html
The Open Source Software´s source code, including related copyright notices, can be found under the following URL:
http://now-portal.c-lab.de/projects/………….
In addition, if the source code to the Open Source Software has not been delivered with this product, you may obtain
the source code (including the related copyright notices) by sending your request to the following address/fax
number: +82-2-3484-6551
You will, however, be required to reimburse Siemens for its costs of postage and copying. Any source code request
made by you must be sent within 3 years of your purchase of the product. Please include a copy of your sales receipt
when submitting your request. Also please include the exact name and number of the device and the version number
The use of Open Source Software contained in this product in any manner other than the simple running of the
program occurs at your own risk, that is, without any warranty claims against Siemens. For more information about
the warranties provided by the authors of the Open Source Software contained in this product, please consult the
You have no warranty claims against Siemens when a defect in the product is or could have been caused by changes
made by you in any part of the software or its configuration. In addition, you have no warranty claims against Siemens
when the Open Source Software infringes the intellectual property rights of a third party.
Siemens provides no technical support for either the software or the Open Source Software contained therein if either
has been changed. You will find the GPL and LGPL license texts on the SW CDR which is delivered with the product
2 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
Details :
Version history
DDJ:A-M-5524B5-01 3
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Contents
1. Preface................................................................................................................................................. 3
1.1 Document Organization...................................................................................................................... 3
3. Using Command................................................................................................................................. 12
4 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
4.3 SSH.................................................................................................................................................. 52
DDJ:A-M-5524B5-01 5
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
6 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 7
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
8 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 9
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
10 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 11
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
12 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 13
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
14 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 15
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
8.13.5 Registering DNS Server that is common to all IP Pools ............................................................ 392
(3) Configuring Remote-ID and the Number of Assigning IP Address .................................................. 398
16 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
(18) Considering Route without MED as the Worst Route ................................................................... 425
DDJ:A-M-5524B5-01 17
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
18 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
Illustrations
【 Figure 8-1 】 VLAN structure based on the port in Layer 2 environment ...................................... 252
【 Figure 8-2 】The process of deciding packet route based on VLAN.............................................. 253
【 Figure 8-4 】In case the packets going outside in Layer 2 environment ........................................ 262
【 Figure 8-5 】In case external packets enter under Layer 2 environment ①.................................. 263
【 Figure 8-6 】In case external packet enter in Layer 2 environment② ........................................... 264
DDJ:A-M-5524B5-01 19
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
【 Figure 8-38 】 Example ① The Multicast packet registered in the IGMP group.......................... 346
【 Figure 8-43 】 Network that multicast source are not directly connected to multicast group ........ 362
【 Figure 8-45 】 Network in case of Prohibiting transmitting Bootstrap Message ............................ 367
20 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 21
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Table
【 Table 6-1 】The basic information to operate ping test .................................................................. 117
2 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
1. Preface
This Manual provides helpful information and instruction how to configure SURPASS hiD 6610. All users
should carefully read this guide before handing this product and follow all instructions. For reader’s
This guide is designed for network administrators who will be installing and maintaining SURPASS hiD
6610. The system administrator should be familiar with the fundamentals of LAN and have technical
▣ Using CLI : Explains CLI command mode and how to use it.
▣ System Connection and IP Address : Provides information of system connection and explains how
▣ Port Basic Configuration : Provides instruction how to configure default parameters of Ethernet
port and port mirroring.
▣ System Environment : Explains how to configure basic system environment, manage configuration,
▣ Network Management : Provides instructions how to configure SNMP, Syslog, and packet filtering.
▣ System Main Function : Describes functions such as VLAN, STP(Spanning Tree Protocol), and IP
multicasting.
▣ IP Routing Protocol : Explains how to configure routing protocol of BGP, OSPF, and RIP.
DDJ:A-M-5524B5-01 3
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
This guide uses the following conventions to convey instructions and information.
Information
This information symbol provides useful information when using commands to configure.
Note
This note symbol means reader take note. Notes contain helpful suggestions or references.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury or broke the
equipment. Before you work on any equipment, be aware of the hazards involved with electrical
circuitry and be familiar with standard practices for preventing accidents by making quick guide based
on this guide.
The following table shows commands used in console terminal of SURPASS hiD 6610. Please be
Notation Description
4 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
◈ Notation of Guide
The following table shows commands used in guidebook. Please be aware of each command to use
them correctly.
Notation Description
DDJ:A-M-5524B5-01 5
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
2. Product Introduction
SURPASS hiD 6610 L3 switch is typical Layer 3 switch intended to construct large-scale network, which
provides aggregated function of upgraded LAN network consisted of typical Ethernet switch. Layer 3
switch can connect to PC, web server, LAN equipment, backbone equipment, or another switch through
various interfaces.
SURPASS hiD 6610 L3 switch supports routing based on VLAN, IP multicasting, and provides Layer 3
The following picture is an example of network construction using SURPASS hiD 6610.
Internet
Switch
Switch Switch
6 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
2.2 Features
In SURPASS hiD 6610 L3 switch, QoS-based forwarding sorts traffic into a number of classes and
marks the packets accordingly. Thus, different quality of service is provided to each class, which the
packets belong to. The rich QoS capabilities enable network managers to protect mission-critical
applications and support differentiated level of bandwidth for managing traffic congestion. SURPASS
hiD 6610 L3 switch supports delay priority of the packet based on the IEEE 802.1p class of services
(CoS) standard.
• Multicast Communication
Since SURPASS hiD 6610 L3 switch provides IGMP Snooping and IGMP Querier, you can use
multicast communication. Through multicast communication, packets can be transmitted to hosts who
Switch in SNMP is mounted can manage and monitor switch at remote place. SURPASS hiD 6610 L3
switch supports SNMP version 1,2, and four kinds of groups’ RMON so that administrator can check
• IP Routing
Generally, switches are operated as Layer 2 of OSI layers. But, since SURPASS hiD 6610 L3 switch is
Layer 3 switch, it IP routing that routers have. So you can save the cost to install router additionally.
Newly upgraded SURPASS hiD 6610 L3 switch can restore the way of IP packet forwarding in terms of
network so that entry remembered in switching chip is enlarged. Maximum thirteen ways of IP packet
DDJ:A-M-5524B5-01 7
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SURPASS hiD 6610 L3 switch supports DHCP, which automatically assigns IP address to clients,
accessed to network. You can effectively utilize limited IP source and lower cost to manage network
VLAN(Virtual Local Area Network) is made by dividing one network into several logical networks. Packet
cannot be transmitted and received between different VLANs. Therefore it can prevent needless
packets accumulating and strengthen security of VLAN. SURPASS hiD 6610 L3 switch recognizes
• ARP-alias
ARP-alias makes concentrating switch response to ARP request from equipment without registered IP
• Proxy-ARP
Proxy-ARP responses to ARP request from equipment in other subnet, so it makes communication
• Packet Filtering
IP packet filtering limits network users so that only specific equipments and users can access to network.
Through this function, user can not only block unnecessary information and prevent outflow of specific
data, but also block unidentified users to strengthen network security. In addition, when Martian-filter to
block outgoing packet with other source IP address and LAN service is provided in apartment or some
• Stacking
In switch group, a switch configured as master can configure, manage, and monitor the other switches
called slave with one IP address. Since one IP address can manage several switches, IP source can be
saved.
8 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
• Port Trunk
SURPASS hiD 6610 L3 switch aggregates several physical interfaces into one logical port(aggregate
port). Port trunk aggregates interfaces with the standard of same speed, same duplex mode, and same
VLAN ID. According to IEEE 802.3ad, SURPASS hiD 6610 L3 switch can configure maximum six
aggregate ports, which can include maximum eight ports to decrease traffic and improve fault recovery
function.
SURPASS hiD 6610 L3 switch supports LACP, complying with IEEE 802.3ad, which aggregates multiple
• Rate-limit
SURPASS hiD 6610 L3 switch provides graded bandwidths to all ports. Through providing bandwidths
graded by user’s configuration, ISP can charge graded billing plan and manage efficient and
economized lines.
• Flood-Guard
Flood-guard limits amount of packets as many as user configures in a second, whereas Rate limit does
STP(Spanning Tree Protocol) enables switches, which have double-path to use the double-path without
loops. That is, it activates only one path, which is the shortest one among several paths and blocks the
SURPASS hiD 6610 L3 switch supports PVST(Per VLAN Spanning Tree) that STP is independently
operated per each VLAN. PVST(Per VLAN Spanning Tree) prevents entire network freezing caused by
DDJ:A-M-5524B5-01 9
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
It is possible to construct stable and flexible network on metro Ethernet RING or existing P-to-P through
supporting RSTP(Rapid Spanning Tree Protocol) complying with IEEE 802.1W. RSTP is designed to
innovately decrease STP Reconvergency time. It innovate saves time of Fail over on Layer 2 switch,
system operating through CLI. CLI is easy to configure the needed functions after looking for available
SURPASS hiD 6610 L3 switch restricts clients attempting to access to port by 802.1x port-based
authentication to enhance security and portability of network management. When a client attempts to
connect to port of 802.1x port-based authentication enabled, the switch transfers required information to
RADIUS server for authentication. Therefore, only authorized client who has access right can connect
to the port.
SURPASS hiD 6610 L3 switch supports client authentication protocol, that is RADIUS(Remote
Authentication Dial-In User Service) and Tacacs+(Terminal Access Controller Access Control System+).
Not only user IP and password registered in switch but also authentication through RADIUS server and
TACACS+ server are required to access. So, security of system and network management is
strengthened.
• SSH Server
Through enabled SSH(Secure Shell) server, the security of telnet and ftp server can be strengthen.
10 DDJ:A-M-5524B5-01
User Manual UMN : CLI
SURPASS hiD 6610 S311 R1.0
Broadcast storm control is, when too much of broadcast packets are being transmitted to network, a
situation of network timeout because the packets occupy most of transmit capacity. SURPASS hiD 6610
L3 switch supports broadcast packet, multicast packet, and Broadcast storm control, which disuses
Flooding packet, that exceed the limit during the time configured by user.
DDJ:A-M-5524B5-01 11
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
3. Using Command
You can be configured and managed SURPASS hiD 6610 L3 switch by console terminal that is installed
on User’s PC. When you configure and manage SURPASS hiD 6610 L3 switch by console terminal, you
use the CLI-based interface command. Connect RJ-45-to-DB-9 console cable to SURPASS hiD 6610
L3 switch.
This chapter explains how CLI command mode is organized before installing. CLI command mode is
consisted as follow:
12 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
When user logs in successfully, the command mode is on Privilege Exec View Mode. Privilege Exec
View Mode is a read-only mode provided to all users accessing to the switch. In Privilege Exec View
【 Table 3-1 】shows main commands used on Privilege Exec View Mode of the SURPASS hiD 6610.
Command Function
To have not only reading right but also configuring right, you must enter to Privilege Exec Enable Mode.
It is possible to enter into Privilege Exec Enable Mode using “enable” command in Privilege Exec View
Mode. After enter into Privilege Exec Enable Mode, the command prompt changes SWITCH> to
SWITCH#.
enable View Enter to Privilege Exec Enable Mode from Privilege Exec View Mode.
DDJ:A-M-5524B5-01 13
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To enhance the security more, the administrator can designate the password. In Privilege Exec Enable
Mode, if the user successfully logs in the switch, enters to Privilege Exec Enable Mode of CLI command.
The command in Privilege Exec Enable Mode is used to check the changes of terminal configuration,
【 Table 3-2 】is the command in OS 3.02 Privilege Exec Enable Mode of SURPASS hiD 6610.
Command Function
To enter into Global Configuration Mode, input the command, “configure terminal” on Privilege Exec
Enable Mode. After entering into Global Configuration Mode, the system prompt is supposed to change
configure terminal Enable Enters into configuration mode from Enable mode.
Global Configuration Mode is to configure functions for general system management and SNMP before
configuring specific protocol or specific function. And user can enter into Bridge/Interface
14 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Command Function
You can enter into Rule Configuration Mode using the “rule name create” command in Global
Configuration Mode. If you enter into Rule Configuration Mode, the system prompt changes from
SWTCH(config)# to SWITCH(config-rule[name])#.
rule name create Global Enters into Rule configuration mode from Configuration.
DDJ:A-M-5524B5-01 15
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In Rule Configuration Mode, it is possible to configure the condition and operational method for the
【 Table 3-4 】is the command of configuring OS 2.09 Rule Configuration Mode of SURPASS hiD
6610.
Command Function
no-match Configures the operational condition for the packet which doesn’t meet the packet condition.
To enter into DHCP Configuration Mode, input the command, “ip dhcp pool pool-name” on
configuration mode as follow. Then the system prompt is changed to SWITCH(config-dhcp[pool-
ip dhcp pool pool-name Global Enters into DHCP Configuration Mode to configure DHCP.
DHCP Configuration Mode is to configure range of IP address used in DHCP server, group in subnet,
16 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Command Function
In Global Configuration Mode, if you the subnet using “ip dhcp option82” command, system prompt is
changed to SWITCH(config-opt82)# from SWITCH(config)# and enters into DHCP Option-82
Configuration Mode.
ip dhcp option82 Global Enters into DHCP Option-82 Configuration Mode for DHCP configuration.
In DHCP configuration mode, configure the range of IP address used in DHCP server and designate the
group in subnet and configure default gateway of the subnet. 【 Table 3-6 】is the main commands of
Command Function
DDJ:A-M-5524B5-01 17
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To enter into Rmon-alarm Configuration Mode, input “rmon-alarm <1-65534>”, to enter into Rmon-event
Configuration Mode, input “rmon-event <1-65534>”, and to enter into Rmon-history Configuration Mode,
Command Function
owner Shows the subject, which configures each Rmon and uses related information.
To enter into PIM Configuration Mode, use the following command. The system prompt will be changed
router pim Global Enters into PIM Configuration Mode from Global Configuration Mode.
18 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Command Function
cache-check Configures the interval that checks packet transmission result from source.
whole-packet-checksum Gives comparability with Cisco router when transmitting Register message.
To enter into VRRP Configuration Mode, use the following command. The system prompt is supposed
On VRRP Configuration Mode, you can configure VRRP to activate it. 【 Table 3-9 】shows main
Command Function
Configures Advertisement time, which means the interval that Master router
vr_timers
distributes its information to another Virtual Router.
DDJ:A-M-5524B5-01 19
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
When you input the command, “bridge” on configuration mode as follow, the system prompt is changed
to SWITCH (bridge)# from SWITCH(config)#.
bridge Global Enters into Bridge configuration mode from configuration mode.
Bridge mode is to manage MAC address and to configure switch functions of Layer 2 such as VLAN,
mirroring, STP.
Command Function
To enter into Interface configuration mode, input the command, “interface interface-name” on
configuration mode. When you enter into Interface configuration mode, the system prompt is changed to
interface interface-name Global Enters into Interface configuration mode from configuration mode.
20 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Interface configuration mode is to assign IP address in Ethernet interface and to activate or deactivate
interface.
Command Function
ip Assigns IP address.
To enter into Router Configuration Mode, use the following command. The system prompt is supposed
According to routing protocol way, Router Configuration Mode is divided into BGP, RIP, and OSPF. They
DDJ:A-M-5524B5-01 21
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Command Function
To enter into Route-Map Configuration Mode, use the following command. The system prompt is
route-map name {permitㅣdeny} Enters into Route-Map Configuration Mode from Global
Global
<1-65535> Configuration Mode.
On Route-Map Configuration Mode, you can configure the place where information is from and sent in
routing table.
Command Function
22 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
This section provides useful functions for user’s convenience while using DSH commands. They are as
follow.
□ Using Abbreviation
To find out available commands, input question mark(?). When you input the question mark(?) in each
command mode, you can see available commands used in the mode and variables following after the
commands. The following is the available commands on Privilege Exec Enable Mode of hiD 6610.
SWITCH# ?
Exec commands:
clear Reset functions
clock Manually set the system clock
configure Enter configuration mode
copy Copy from one file to another
debug Debugging functions (see also 'undebug')
default-os Select default OS
enable Turn on privileged mode command
exit End current mode and down to previous mode
help Description of the interactive help system
no Negate a command or set its defaults
ping Send echo messages
quote Execute external command
reload Reload the system
show Show running system information
ssh Configure secure shell
tech-support Technical Supporting Function for Diagnosis System
telnet Open a telnet connection
terminal Set terminal line parameters
traceroute Trace route to destination
where List active user connections
write Write running configuration to memory, network, or terminal
SWITCH#
DDJ:A-M-5524B5-01 23
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
Question mark(?) will not be seen in the screen and you do not need to press Enter key to display
commands list. This guide is designed for the standard OS V3.02. The displayed contents may vary
depending on OS version.
In case of SURPASS hiD 6610 installed CLI, you can find out commands starting with specific alphabet.
Input the first letter and question mark without space. The following is an example of finding out the
SWITCH# s?
show Show running system information
ssh Configure secure shell
SWITCH# s
Also, it is possible to view variables you should input following after commands. After inputting the
command you need, make one space and input question mark. The following is an example of viewing
variables after the command, write. Please note that you must make one space after inputting
SWITCH# write ?
file Write to file
memory Write to NV memory
terminal Write to terminal
SWITCH# write
If you need to find out the list of available commands in each mode and the variables in more detail, use
the command, show list. The following is an example of displaying list of available commands in
Privilege Exec Enable Mode and the variables by using the command, show list.
24 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Press any key to skip to the next list while you see “more”.
Note
This guide is designed for the standard OS V3.02. The displayed contents may vary depending on OS
version.
In case of DSH, you do not have to enter repeated command again. When you need to call command
history, use this arrow key, (↑). When you press the arrow key, the latest command you used will be
The following is an example of calling command history after using several commands. After using
these commands in order : show clock→configure terminal→interface 1→exit, press the arrow key(↑)
and then you will see the commands from latest one: exit→interface 1→configure terminal→show clock.
DDJ:A-M-5524B5-01 25
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Command Abbreviation
clock cl
show sh
syslog sys
In SURPASS hiD 6610, the user can use the commands of Privilege Exec Enable Mode in the other
mode.
To use the commands of Privilege Exec Enable Mode in the other mode, use the following command.
In SURPASS hiD 6610, it is possible to return to the previous mode or move to Privilege Exec Enable
mode. On other hand, moving to previous mode is impossible in Privilege Exec View mode and
Privilege Exec Enable mode but it is possible to system log out in the mode.
To return to the previous mode or Privilege Exec Enable Mode, use the following command.
Global/RMON/DHCP/Option-82/Bridge
exit Returns to the previous mode.
Interface/Rule/PIM/VRRP/Router/ Route-map
Global/RMON/DHCP/Option-82/Bridge
end Returns to Privilege Exec Enable Mode.
Interface/Rule/PIM/VRRP/Router/ Route-map
26 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Note
The same command is used for system log out in Privilege Exec View mode and Privilege Exec
Enable mode.
The following is to log out of the system in Privilege Exec View mode and Privilege Exec Enable mode.
DDJ:A-M-5524B5-01 27
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
After installing switch, SURPASS hiD 6610 is supposed to examine that each port is rightly connected to
network and management PC. And then, user connects to system to configure and manage SURPASS
hiD 6610.
This section provides instructions how to change password for system connection, connect to system
□ System Login
□ Telnet Access
□ System Reboot
□ System Logout
After installing SURPASS hiD 6610, finally make sure that each port is correctly connected to PC for
network and management. And then, turn on the power and boot the system as follow.
Step 1 When you turn on the switch, booting will be automatically started and login prompt will be
displayed.
28 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
************************************************************
* *
* Boot Loader Version 4.59 *
* Siemens AG *
* *
************************************************************
Press 's' key to go to Boot Mode: 0
Load Address: 0x01000000
Image Size: 0x0095b000
Start Address: 0x01000000
console=ttyS0,9600 root=/dev/ram rw
NOS version 3.02 #3020
CPU : Motorola [rev=1014]
Total Memory Size : 128 MB
Calibrating delay loop... 175.71 BogoMIPS
Switch init...
system_probe : Finding model.....V5524EL
INIT: version 2.85 booting
Extracting configuration
Wed, 30 Mar 2005 14:34:55 +0000
INIT: Entering runlevel: 3
SWITCH login:
Step 2 When you enter login IP at the login prompt, password prompt will be displayed. And enter
password to move into Privilege Exec View mode. By default setting, login ID is configured
Step 3 In Privilege Exec View Mode, you can check only the configuration for the switch. To
configure and manage the switch, you should enter into Privilege Exec Enable Mode. The
SWITCH> enable
SWITCH#
DDJ:A-M-5524B5-01 29
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Administrator who manages and configures the switch can change system Login password. For
thorough security, you would better to change the password whenever necessary.
To change system password, use the following command on Global configuration mode.
Information
You can make password from at least five characters up to eight characters. Please avoid similar one
In order to change the Login password of added user with reading right, use the following command.
passwd user-name Global Changes the Login password of added user with reading right.
[ Sample Configuration 1 ]
SWITCH(config)# passwd
Changing password for admin
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password: networks
Re-enter new password: networks
Password changed.
SWITCH(config)#
Note
The password you enter will not be seen in the screen, so please be careful. You need to enter the
30 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
You can configure the password to enhance the security when you change the mode from Privilege
Exec View Mode to Privilege Exec Enable Mode. To configure the password for changing, use the
following command.
passwd enable password Global Configure the password in to access to Privilege Exec Enable Mode.
The password that you had configured is displayed in configuration mode with the command show
running-config. For the security reasons, you can configure not to display with show running-config
command. The password is displayed with being encrypted so that the user cannot recognize the
However, even though you configure the encrypted password with service password-encryption
command, the other user can check the password disabling this command. To enhance the security for
the password, you can configure to check the encrypted password without service password-encryption
command. However, in order to user it, the user should input the character string for encrypted
password.
To configure the character string for encrypted password not to show the password, use the following
command.
DDJ:A-M-5524B5-01 31
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
If you want to check the character string for encrypted password, first configure the password using
passwd enable password command and then enable service password-encryption and then check
Information
no passwd enable Global Deletes the configured password to enter into Privilege Exec Enable
[ Sample Configuration 1 ]
The following is to configure the password to enter into Privilege Exec Enable as networks.
32 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 2 ]
The following is to configure the password as networks using the character string for the encrypted
Information
You can check the character string for encrypted password like [ Sample Configuration 1 ].
Configure the password with passwd enable password command and enable service password-
For security reasons of SURPASS hiD 6610, if no command is entered within the configured inactivity
time, the user is automatically logged out of the system. Administrator can configure the inactivity timer.
DDJ:A-M-5524B5-01 33
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
Information
The time unit for <1-35791> is minute and the time unit for < 0-59 > is second.
The following is an example of configuring auto-logout function as 60 seconds and viewing the
configuration.
SWITCH(config)# exec-timeout 60
SWITCH(config)# show exec-timeout
Log-out time : 60 seconds
SWITCH(config)#
In SURPASS hiD 6610, the administrator can add the other user’s account. And it is possible to
designate the level from Level o to Level 5 to enhance the security for the switch.
The following describes how to manage the user’s account such as adding user, configuring the user’s
right.
34 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, the administrator can add the other user’s account. When you add the user’s
account, it is possible to designate the user’s right at once. If the user’s right is not designated, the right
for Level 0 is basically configured. To add the user’s account, user the following command.
user add name description Adds the user’s account having the right of Level 1.
user add-admin name description Global Adds the user’s account having the right of Level 15.
user add name level <0-15> description Add the user’s account with designating user’s right.
Information
As the account of Level 0 to Level 14 without configuring anything, it is possible to user exit and help
in Privilege Exec View Mode and it is not possible to access to Privilege Exec Enable Mode. The
account having the highest Level 15 is admin and it is possible to have both Read-Write right.
In order to show the added user’s account, use the following command.
In SURPASS hiD 6610, it is possible to configure the Level for the user’s right from 0 to 15. Level 15, as
the highest level, has both Read-Write right. The administrator can configure from Level 0 to Level 14.
The administrator decides which Level user uses which commands in which level. As the basic right
from Level 0 to Level 14, it is possible to use exit and help command in Privilege Exec View Mode and
it is not possible to access to Privilege Exec Enable Mode. The following is to configure the user’s right
DDJ:A-M-5524B5-01 35
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
privilege dhcp-option82 level <0-15> Uses the specific command of DHCP-option82 mode in
privilege dhcp-pool level <0-15> Uses the specific command of DHCP configuration mode
privilege enable level <0-15> Uses the specific command of Privilege Exec Enable
privilege interface level <0-15> Uses the specific command of Interface Configuration
G
{commandㅣall} mode in the Level.
L
privilege ospf level <0-15> O
Uses the specific command of OSPF mode in the Level.
{commandㅣall} B
privilege pim level <0-15> {commandㅣall} A Uses the specific command of PIM mode in the Level.
privilege rip level <0-15> {commandㅣall} L Uses the specific command of RIP mode in the Level.
privilege route-map level <0-15> Uses the specific command of Route-map mode in the
{commandㅣall} Level.
privilege rule level <0-15> {commandㅣall} Uses the specific command of Rule mode in the Level.
privilege view level <0-15> Uses the specific command of Privilege Exec View mode
privilege vrrp level <0-15> {commandㅣall} Uses the specific command of VRRP mode in the Level.
36 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Note
The commands that can be used in low Level can be also used in the higher Level. For example, the
Note
The commands should be input same as the displayed commands by show list. Therefore, it is not
possible to input the commands in the bracket seperately.
It is not possible to configure clear ip bgp * ipv4 unicast in. You should configure like clear ip bgp
* ipv4 {unicastㅣmulticast} in.
Information
The commands starting with the same character are applied by inputting only the starting commands.
For example, if you input show, all the commands starting with show are applied.
DDJ:A-M-5524B5-01 37
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To delete the configuration for user’s right, use the following command.
all}
all}
To show the right for the Level configured by administrator, use the following command.
38 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 1 ]
The following is to add test0 having the right as Level10 and test15 having the right as Level15.
admin 15
tset0 0
test15 15
3 user(s) found.
(Omitted)
SWITCH(config)#
DDJ:A-M-5524B5-01 39
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 2 ]
The following is to add test0 having the right as Level10 and test1 having the right as Level1 without
password.
====================================================
====================================================
test0 level0user
test1 level1user
SWITCH(config)#
40 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
EXEC(ENABLE) 1 clock
EXEC(ENABLE) 1 configure terminal
EXEC(VIEW) 0 enable
EXEC(ENABLE) 0 show
4 entry(s) found.
SWITCH(config)#
In the above configuration, as Level 0, it is possible to use only show command in Privilege Exec
Enable however as Level 1, it is possible to use not only the commands in Level 1 but also time
configuration commands in Privilege Exec Enable and accessing commands to Global configuration
mode.
In SURPASS hiD 6610, you can limit the number of users accessing to the switch. Here, the user
means who access to the switch through both console port and remote. In case the switch is configured
as RADIUS server, or TACACS+ server, the users accessing to the server are contained in the number
of it.
To limit the number of users accessing to the switch, use the following command.
login connect <1-8> Global Limits the number of users accessing to the switch.
DDJ:A-M-5524B5-01 41
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
Note
When you save configuration with telnet connection, you should wait for [OK] message. Or, all new
configurations will be deleted when telnet session is disconnected. Please wait for [OK] message and
disconnect it.
Administrator of SURPASS hiD 6610 can confirm users connected from remote place and make some
of them disconnected, as administrator wants. To view tty of users connected from remote place, before
To disconnect a user connected from remote place by using this information, use the following
command.
42 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is to check the remote user and disabling remote user ,“ttyp1”,
SWITCH(config)# where
admin at ttyS0 from console for 23 hours 50 minutes 17.27 seconds
User’s
admin at ttyp0 from 172.16.30.2:3246 for 4 hours 31 minutes 46.65 seconds
ID
hyun at ttyp1 from 172.16.119.201:2633 for 2 hours 31 minutes 51.61 seconds
SWITCH(config)# disconnect ttyp1
SWITCH(config)#
After downloading new system image from TFTP/FTP server, reboot the system. Input the command,
reload on Privilege Exec Enable Mode to reboot in other cases when rebooting is needed during
installing and managing switch through terminal program.
On other hand, In SURPASS hiD 6610, it is possible to support Dual-OS according to the configured
Flash Memory. Single-OS is provided in the case Flash Memory is 8M+16M and Dual-OS is provided in
the case Flash Memory is 8M+32M. It is possible to check Flash Memory with show system command.
To reboot in Dual-OS, use the following command.
If you reboot system without saving new configuration, new configuration will be deleted. So, you have
to save the configuration before rebooting. Not to make that mistake, SURPASS hiD 6610 is supposed
to print the following message to ask if user really wants to reboot and save configuration.
If you want to continue to reboot, press “y” key, if you want to save new configuration, press “n” key.
SWITCH# reload
Warning : Changed configuration was not saved to flash memory.
Do you still want to reload the system?[y|N]
DDJ:A-M-5524B5-01 43
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SURPASS hiD 6610 reboots the system according to user’s configuration. There are two basises for
system rebooting. They are CPU and Memory. CPU is rebooted in case CPU Load or Interrupt Load
continues for the configured time. Memory is automatically rebooted in case Memory low occurs as the
configured times.
auto-reset memory
Bridge Configures to reboot automatically in case Memory low occurs as
time-threshold--memory-low
count--memory-low for time-threshold--memory-low.
count--memory-low
Information
The configurable range for cpu-load-average is from 50 to 100 and for interrupt-load-average is from 1
to 100.
Information
The configurable range for time-threshold-of-memory-low is from 1 to 120 and for count-of-memory-low
is from 1 to 10.
Information
The default for Time threshold of memory low is 10 minutes and the default for count of memory low is
5 times.
44 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 1 ]
The following is to configure to reboot automatically in case CPU Load continues as 70% and Interrupt
SWITCH(bridge)#
[ Sample Configuration 2 ]
The following is to configure to reboot automatically in case Memory low occurs 3 times in 10 minutes.
SWITCH(bridge)#
It is possible to log out of the system in Privilege Exec View mode or Privilege Exec Enable mode.
Therefore you should return to Privilege Exec Enable mode to log out if you are configuring in the other
DDJ:A-M-5524B5-01 45
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The switch uses only the data’s MAC address to determine where traffic needs to come from and which
ports should receive the data. Switches do not need IP addresses to transmit packets. However, if you
want to access to SURPASS hiD 6610 from remote place with TCP/IP through SNMP or telnet, it
requires IP address.
Information
As the default setting, SURPASS hiD 6610 is configured with virtual interface 1 and all of the ports are
You can enable interface to communicate with switch interface on network and assign IP address as the
following in order.
□ Enabling Interface
□ Disabling Interface
Before you assign IP address to network interface, you need to verify that interface to communicate is
enabled. Unless the interface is enabled, you can communicate by assigning IP address. To check if
46 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
There are two ways to enable interface; on Global Configuration Mode and on Interface Configuration
Mode.
Information
You also can enable interface on Interface configuration mode. Before enabling interface on Interface
Configuration Mode, you should enter into the mode. To enter into Interface Configuration Mode of the
interface you are about to enable interface, use the following command.
interface interface-name Global Enters into Interface configuration mode of specified interface.
DDJ:A-M-5524B5-01 47
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
You also can disable interface on Interface configuration mode. Before enabling interface on Interface
To enter into Interface configuration mode of the interface you are about to enable interface, use the
following command.
interface interface-name Global Enters into Interface configuration mode of specified interface.
48 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
After enabling interface, assign IP address. To assign IP address to network interface, use the following
commands.
It is possible to configure Static route in SURPASS hiD 6610. Static route is a route that user configures.
Packets are transmitted to destination through Static route. Static route includes destination address,
neighbor router to receive packet, number of routes that packets have to go through.
DDJ:A-M-5524B5-01 49
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
You can configure the maximum number of pathes when there are various multipahes. To configure the
50 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 1 ]
① On Configuration Mode
[ Sample Configuration 2 ]
SWITCH(config-if)#
[ Sample Configuration 3 ]
DDJ:A-M-5524B5-01 51
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
4.3 SSH
Network security is getting more important and more important according to using network has been
generalized between users. However, typical ftp and telnet service have big weakness for security.
SSH(Secure Shell) is security shell for login. Through SSH, all data are encoded, traffic is compressed.
So, transmit rate becomes faster, and tunnel for existing ftp and pop, which are not safe in security, is
supported.
SURPASS hiD 6610 can be operated as server. You can configure the following things in SURPASS hiD
□ Disconnecting Clients
52 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to view clients who are connected to SSH server, SURPASS hiD 6610. To view on-line
show ssh Enable/Global Shows clients who are connected to SSH server.
The following is an example of viewing clients who are connected to SSH server.
It is possible to disconnect clients who are connected on SSH server. To have clients disconnected, use
ssh disconnect pid Global Disconnects clients who are connected to SSH server.
Information
“pid” is SSH client’s number. It can be displayed by using the command, “show ssh”.
It is possible to view connection history of clients who are connected to SSH server after SURPASS hiD
6610 is operated as the server. To view connection history of client, use the following command.
ssh debug Global Shows connection history of clients who are connected to SSH server up to now.
DDJ:A-M-5524B5-01 53
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
When you use the command, “ssh debug” to view connection history, you can view the history of only
disconnected clients. To view connected clients at present, use the command, “show ssh”.
SURPASS hiD 6610 can be used for the following ways as client of SSH server.
□ File Copy
□ Connecting to FTP
To log in to SSH server after configuring SURPASS hiD 6610 as SSH client, use the following command.
Information
You can input IP address or 「 ID@IP address or host domain name(ex : [email protected]) 」 at
“destination”.
It is possible to copy file or open file in server through SSH after SURPASS hiD 6610 is configured as
54 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
You need to input 「ID@host:file name」at “source” or “destination”. But, if IP address of user’s
switch is host of “source” or “destination”, you can input only file name.
The following is an example of copying file named, “etc/startup.post” into SSH server, 172.16.209.10 as
Information
SSH client can access to server through authentication key after configuring authentication key and
informing it to server. It is safer to use authentication key than inputting password every time for login,
and it is also possible to connect to many SSH server with using one authentication key. To configure
Information
“rsa1” is authentication way supported in ssh1, and “rsa” and “dsa” are authentication ways supported
in ssh2.
To configure authentication key and connect to server with the authentication key, perform the following
steps.
DDJ:A-M-5524B5-01 55
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Step 2 Copy file, in which authentication key is stored into SWITCH B, which is SSH server. You
should connect to SWITCH B to copy. So, you have to input password of ID, “root”. In this
Typical FTP service has weak point in security. Therefore, it is possible to use FTP safely with SSH. To
56 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
You can input IP address or 「 ID@IP address or host domain name(ex : [email protected]) 」 at
“destination”.
The following is an example of confirming the configuration after enabling SSH server.
SWTICH(config)#
The following is an example of viewing client’s number and having the clients disconnected.
DDJ:A-M-5524B5-01 57
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
001 235 96 admin 202.26.10.29 Thu Mar 6 09:54:15 1980 Thu Mar 6 09:55:47 1980
002 269 96 admin 172.16.10.1 Thu Mar 6 09:58:30 1980 Thu Mar 6 10:00:00 1980
003 297 96 admin 172.16.10.1 Thu Mar 6 10:00:46 1980 Thu Mar 6 10:28:39 1980
004 441 96 admin 172.16.10.1 Thu Mar 6 10:46:44 1980 Thu Mar 6 10:46:46 1980
005 487 96 admin 172.16.20.10 Thu Mar 6 11:42:13 1980 Thu Mar 6 11:47:56 1980
006 500 96 admin 172.16.20.10 Thu Mar 6 11:59:06 1980 Thu Mar 6 12:00:32 1980
007 511 96 admin 172.16.9.10 Thu Mar 6 12:03:42 1980 Thu Mar 6 12:03:43 1980
008 258 96 admin 202.6.14.20 Thu Mar 6 09:56:17 1980 Thu Mar 6 12:07:52 1980
009 640 96 admin 172.16.21.55 Thu Mar 6 16:31:02 1980 Thu Mar 6 16:31:02 1980
010 646 96 admin 10.10.21.61 Thu Mar 6 16:34:27 1980 Thu Mar 6 16:35:49 1980
011 656 96 admin 100.16.21.61 Thu Mar 6 16:39:37 1980 Thu Mar 6 16:39:37 1980
012 660 96 admin 172.16.21.61 Thu Mar 6 16:39:59 1980 Thu Mar 6 16:40:06 1980
013 669 96 admin 172.16.21.61 Thu Mar 6 16:41:45 1980 Thu Mar 6 16:41:45 1980
014 673 96 admin 172.16.21.61 Thu Mar 6 16:42:05 1980 Thu Mar 6 16:55:13 1980
015 731 96 admin 202.2.24.19 Fri Mar 7 04:23:51 1980 Fri Mar 7 04:33:23 1980
SWITCH(config)#
The following is an example of connecting to SSH server, 172.16.209.10. When you use the above
58 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In this case, if you want to connect to server, type “yes”. Then, the message to ask password will be
All the above examples will be displayed only for the first connection. After the first connection, known-
host will be created. Then, you can connect to server only with password.
The following is an example of connecting to server, in which known-host has been created.
172.16.209.10 as “startup.post”.
Information
DDJ:A-M-5524B5-01 59
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of connecting to FTP server, 172.16.100.10 with using SSH. When you use
the above command, the message to ask whether or not to connect will be displayed.
In this case, type “yes” to connect to server. Then the message to ask password will be displayed. You
All the above examples will be displayed only for the first connection. After the first connection, known-
host will be created. Then, you can connect to server only with password.
The following is an example of connecting to server, in which known-host has been created.
SURPASS hiD 6610 restricts clients attempting to access to port by 802.1x port-based authentication to
enhance security and portability of network management. When a client attempts to connect to port of
802.1x port-based authentication enabled, the switch transfers required information to RADIUS server
for authentication. RADIUS server retains database about authorized clients who can access to the port.
60 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The switch acts an intermediary between the client and the authentication server, requesting identity
information from the client, verifying that information with the authentication server, and relaying a
response to the client. Therefore, only authorized client who has access right can connect to the port.
PC
Switch RADIUS
Server
EAPOL-Start
EAP-Request/Identity
EAP-Response/Identity Radius-Access-Request
EAP-Request Radius-Access-Challenge
EAP-Response Radius-Access-Request
EAP-Success Radius-Access-Accept
To enable 802.1x port-based authentication in port of SURPASS hiD 6610, you must be able to perform
□ Configuration of Port-Control
□ 802.1x Reauthentication
DDJ:A-M-5524B5-01 61
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
□ Sample Configuration
User should configure which port to be used for 802.1x Port-Based Authentication.
In SURPASS hiD 6610, you can permit the users requesting the access regardless of the authentication
from RADIUS server. For example, even though a client is authenticated from the server, it is possible
To manage the approval for the designated port, use the following command.
“auto” means to follow the authentication of RADIUS server. And “force-authorized” is to give the
permit to a client even though RADIUS server didn’t approve it. “force-unauthorized” is not to
authenticate a clinet even though RADIUS server authenticate it.
Information
Default is “auto”.
62 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
After configuring 802.1x port-based authentication with the above explanation, user can confirm the
In case the configuration for authentication does not operate well, the administrator could restart the
authentication on the port without rebooting. To reauthenticate on the port, use the following command.
Port based 802.1x authentication authenticates the port itself regardless of the number of clients.
After enabling 802.1x demon, configure port based authentication as the following.
DDJ:A-M-5524B5-01 63
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
After enabling 802.1x demon, user should configure which port to be used for 802.1x Port-Based
Information
To release configured port of 802.1x port-based authentication, use the following command in
Configuration mode.
no dot1x nas-port port-number Global Releases configured port of 802.1x port-based authentication.
After enabling 802.1x port-based authentication in port of SURPASS hiD 6610, there must be RADIUS
server that retains data about authorized clients who have access right. User has to configure IP
address of RADIUS server to be used for user’s device and key value after configuring port of 802.1x
port-based authentication.
To configure IP address of RADIUS server and key value, use the following command.
dot1x radius-server host {ip-addressㅣname} Register RADIUS server with key value and UDP port of
64 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
Information
In SURPASS hiD 6610, the authentication port number is basically configured as 1812.
As RADIUS server is registered in Authenticator, Authenticator also can be registered in RADIUS server.
Here, Authenticator and RADIUS server need extra data authenticating each other besides they register
each other’s IP address. The data is Key and should be the same value for each other. For the Key
value, every kinds of character can be used except the space or special character. If you register in
several server, the authentication server starts form RADIUS server registered as first one, then
requests the second RADIUS server in case there’s no response. According to the order of registering
the authentication request, the authentication request is tried and the server which responds to it
becomes the Default server from the point of response time. After Default server is designated, all
requests start from the RADIUS server. If there’s no response from Default server again, the
A : 10.1.1.1
B : 20.1.1.1
Configure as Default RADIUS
server Response C : 30.1.1.1
:
:
J : 100.1.1.1
DDJ:A-M-5524B5-01 65
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
no dot1x radius-server host ip-address Global Deletes the registered RADUIS server.
In hiD 6610, you can configure the priority for the radius server that have configured by user.
In SURPASS hiD 6610, it is possible to specifie how long the device waits for a client to send back an
response/identity packet after the device has sent an request/identity packet. If the Client does not send
back an response/identity packet during this time, the device retransmits the request/identity packet.
To configure the number of seconds that the switch waits for a response to an request/identity packet,
To disable the interval for requesting identity, use the following command.
no dot1x timeout tx-period port-number Global Disable the interval for requesting identity
66 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
After 802.1x port-based authentication being configured as explained above, when the user tries to
connect with the port, the process of authentication is progressed among user’s PC and the equipment
as Authenticator and RADIUS server. It is possible to configure how many times the device which will be
Information
user 】
In order to configure times of authentication request in SURPASS hiD 6610, please use the command in
Global mode.
dot1x radius-server retries number Global Configure times of authentication request to RADIUS server
Information
In SURPASS hiD 6610, basically you can configure the authentication request three times.
In case there’s no response after requesting authentication to RADIUS server from SURPASS hiD 6610,
authentication request will be reattempted as many as configured above. However, the administrator
For example, suppose the reattempt interval of authentication request is configured as 1000ms (1sec)
DDJ:A-M-5524B5-01 67
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
802.1x user 】
Information
Reattempt interval of authentication request becomes effective only in case that there’s no response
to request. For example, if RADUIS server is down and there’s a response from other packets,
To configure reattempt interval of authentication request, use the following command in Global
Configuration Mode.
Information
Information
In SURPASS hiD 6610, reattempt interval of authentication request is basically configured as 60s.
Note
In case the distance from the server is too far and reattempt interval of Authentication request is
configured too short regardless of time that request packet reaches to the server, authentication might
not be occurred. Therefore, configure reattempt interval of Authentication request considering the
distance with the server. If authentication often fails after configuration, configure enough time by
no dot1x timeout quiet-period port-number Global Release the configuration of configured quiet-period.
68 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, it is possible to set the time for the retransmission of packets to check RADIUS
server. If RADIUS server is down and there’s a response from other packets, the switch waits for a
response from RADIUS server during the configured time before resending the request.
RAIDIUS server contains the database about the user who has access right. The database is real-time
upgraded so it is possible for user to lose the access right by updated database even though he is once
authenticated. In this case, even though the user is accessible to network, he should be authenticated
so that the changed database is applied to. Besides, because of various reasons managing RADIUS
server and 802.1x authentication port, the user is supposed to be re-authenticated every regular time.
Information
Information
DDJ:A-M-5524B5-01 69
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
no dot1x timeout reauth-period port-number Global Deletes the period between reauthentication attempts
Information
In SURPASS hiD 6610, a term of re-authentication is basically configured 1 hour ( 3600 sec).
command.
(8) Configuring a term of re-authentication, it is described even though the user is accessible to
network, he should be authenticated so that the changed database is applied to. Besides, because of
various reasons managing RADIUS server and 802.1x authentication port, the user is supposed to be
However, there are some cases of implementing reauthentication immediately. In SURPASS hiD 6610,
70 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The user can delete the configuration about the authentication one by one and initiate all the
configuration to the default status. To initiate the configuration, use the following command in
configuration mode.
dot1x default port-number Global Initiate all the configuration for authentication.
Suppose there’s a switch or a hub which is connected to SURPASS hiD 6610 and 802.1x user
authentication is not supported for the equipment. If many clients are connected to the equipment and a
client tries to be authenticated for SURPASS hiD 6610, all clients which are connected to the
In the following picture, SURPASS hiD 6610 is connected to SWITCH A which is linked with Clint
A,B,C,D. And 802.01x user authentication is not supported for SWITCH A. If Client A is authenticated
through SWITCH A To get access right, all clients which are connected to SWITCH A will have the right
to access like Client A. Therefore, To authenticate only for Client A , accessing to Client B, C, D should
be blocked. In this case, if SURPASS hiD 6610 allows the access right through MAC address, it is
SWITCH A
802.1x user authentication is
RADIUS server not supported for the switch.
DDJ:A-M-5524B5-01 71
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
If a client is connected to the equipment and 802.1x user authentication is supported for the
To give the access right for clients using MAC address, use the following command.
no dot1x auth-mode mac-base port-number Global Disables to give the access right using MAC address.
To show the authenticated MAC addresses on specific port, use the following command.
show dot1x mac_authed port-number Global Shows the authenticated MAC addresses.
It is possible for user to make reset state by confirming and deleting the statistics of 802.1x user
authentication. To confirm the statistics about the process of 802.1x user authentication, use the
following command.
show dot1x statistics port-number Global Confirms the statistics of 802.1x user authentication on the port
To make reset state by deleting the statistics of 802.1x user authentication, use the following command.
dot1x clear statistic port-number Global Make Reset state by deleting the statistics of 802.1x on the port.
72 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To release 802.1x user authentication and delete all configurations connected with user authentication,
use the following command. To release 802.1x user authentication, use the following command.
Note
All the configuration connected to 802.1x is deleted by releasing 802.1x function using the above
commands.
The following is to confirm the configuration after configuring pot number 4 as the authentication port
DDJ:A-M-5524B5-01 73
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 2]
The following is configuring a term of reauthentication as 1800 and a tem of reauthentication as 1000
sec.
[Sample Configuration 3]
The following is an example of confirming the configuration after configuring the authentication based
on MAC address.
SWTICH(config)#
74 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SURPASS hiD 6610 is enhanced security of client authentication and user is able to configure
Usually, ID/password registered in switch is used but if you use RADIUS(Remote Authentication Dial-In
User Service), which is client authentication protocol, and TACACS+(Terminal Access Controller Access
Control System+), only clients recorded in each server can connect to the system. With TACACS+
Sends Result
With TACACS+ configured,
sends client information for
authorization.
TACACS Server
You need to configure the followings for system authentication in SURPASS hiD 6610.
DDJ:A-M-5524B5-01 75
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Configuring RADIUS
Configuring TACACS+
Sample Configuration
Note
To enable RACIUS or TACACS+, add user with reading right named「user」by using the command,
“user add”. Or, all users connecting through authentication protocol are supposed to receive a right
as 「root」. Refer to 「4.1.5 Managing the user’s account」for the instruction to add user with
reading right.
You can authorize clients attempting to access to SURPASS hiD 6610 by using registered ID/password,
RADIUS and TACACS+. It is possible to take all of three and to select one of them.
Information
76 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610 where over 2 interfaces or IP addresses are configured , in case RADIUS or
TACACS is used for authentication, the user can designate the packet destination as specific interface
or IP address.
After configuring authorization in diverse ways, you can configure priority of authorization method which
DDJ:A-M-5524B5-01 77
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
By default, priority of SURPASS hiD 6610 authentication is set to “host → radius → tacacs” in
order.
User is able to check configured priority of authorization method. To do it, use the following command.
After configuring RADIUS for client authentication, you need to configure RADIUS server to be used in
Information
Information
78 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
login radius server del ip-address Global Deletes registered RADIUS server
It is possible to configure up 5 RADIUS Server in hiD 6610. In the case of multiple RADIUS Servers,
you can give the priority for the servers. The server having higher priority is supposed to be used first.
login radius server move priority Global Gives the priority for configured RADIUS server.
Information
When SURPASS hiD 6610 cannot get any response from RADIUS server, it is supposed to retransmit
request. By default, frequency of retransmit is three times, but user can configure the number of the
Information
DDJ:A-M-5524B5-01 79
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
In SURPASS hiD 6610, the number of seconds that the switch waits for a response from RADIUS
server is configured. User can configure it for convenience. To configure timeout of response, use the
following command.
Information
Information
After configuring TACACS+ for client authentication, you need to configure TACACS server to be used
80 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
And then, you should register interface of TACACS server connected to user’s switch. Use the following
command.
Information
“port-number” is to input interface of TACACS server connected to user’s switch. Please check
Information
You can register maximum five TACACS servers in SURPASS hiD 6610.
To register port of TACACS server connected to user’s switch, use the following command.
login tacacs socket-port port-number Global Registers port of TACACS server connected to user’s switch.
login tacacs server del ip-address Global Deletes registered TACACS server.
It is possible to configure up 5 TACAS Server in hiD 6610. In the case of multiple TACAS Servers, you
can give the priority for the servers. The server having higher priority is supposed to be used first. The
login tacacs server move ip-address priority Global Gives the priority for configured TACAS server.
DDJ:A-M-5524B5-01 81
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
When you configure TACACS+ for authentication, you need to select authorization type of TACACS+.
pap stands for Password Authentication Protocol and chap stands for Challenge Handshake
Authentication Protocol.
Information
In SURPASS hiD 6610, the number of seconds that the switch waits for a response from TACACS
server is configured. User can configure it for convenience. To configure timeout of response, use the
following command.
Information
Information
82 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to configure priority of client’s right to use server according to configuration of TACACS
server authorization method. This priority is not used in SURPASS hiD 6610 but in TACACS server user
connects. To configure priority of client’s right to use server, use following command.
When user configures RADIUS or TACACS+ for system authentication, the system records specific
services user has taken. Through this function, it is possible to apply billing policy to specific service.
Information
“start” sets the standard on user’s login and “stop” sets the standard on user’s logout. “both” takes
The following is an example of configuring authorization method in SURPASS hiD 6610. It is configured
to add RADIUS to default method in case of clients connecting through console and telnet. And, the
priority is given to RADIUS in case of clients connecting through console and to default method in case
of clients connecting through telnet. Then, confirm the configuration. And The following is an example of
configuring frequency of retransmit and timeout of response after registering RADIUS server.
DDJ:A-M-5524B5-01 83
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
------------------------------------
[RADIUS]
<Radius Servers & Key>
100.1.1.1 1
Radius Retries : 5
Radius Timeout : 10
Radius Interface : default
------------------------------------
[TACACS]
<Tacacs Servers & Key>
Tacacs Timeout : 3
Tacacs Socket Port : 49
Tacacs Interface : default
Tacacs PPP Id : 1
Tacacs Authen Type : ASCII
Tacacs Priority Level : MIN
SWITCH(config)#
84 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
------------------------------------
[RADIUS]
<Radius Servers & Key>
Radius Retries : 3
Radius Timeout : 3
Radius Interface : default
------------------------------------
[TACACS]
<Tacacs Servers & Key>
200.1.1.1 1
Tacacs Timeout : 10
Tacacs Socket Port : 1
Tacacs Interface : default
Tacacs PPP Id : 1
Tacacs Authen Type : PAP
Tacacs Priority Level : MAX(ROOT)
SWITCH(config)#
DDJ:A-M-5524B5-01 85
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
It is possible for user to configure basic environment such as auto-negotiate, transmit rate, and flow-
control of SURPASS hiD 6610 port. Also, it includes instructions how to configure port mirroring and
port as basic.
It is possible to configure default environment of port such as port state, speed. To configure port, you
need to enter into Bridge configuration mode by using bridge command on configuration mode.
When you are entered into Bridge configuration mode, system prompt will be changed to
SWITCH(config)# bridge
SWITCH(bridge)#
VLAN default
86 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To view the configuration of user’s switch port, use the following command.
When you use the command, show port command, if you input letter at port-number, the message, “%
Invalid port: port'” will be displayed, and if you input wrong number, the message, “% Invalid range: 100
Information
On CLI command mode, you can use “,” and “-” at port-number to choose several ports.
You can configure the below functions about port basic configuration.
□ Activating Port
□ Auto negotiation
□ Duplex Mode
□ Flow Control
□ Description of Port
DDJ:A-M-5524B5-01 87
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
The following is an example of deactivating port 1 Ethernet port and confirming it.
You can configure auto-negotiation for a port, automatically to match the transmission speed and the
To determine if the speed and duplex mode are set to auto-negotiate, use the following command in the
Information
88 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of deleting auto-negotiate of port 1 and 2 and confirming it.
Note
Note
It is possible to configure transmit rate of each port. To configure transmit rate of port, use the following
command.
port speed port-number {10ㅣ100ㅣ1000} Bridge Configure transmit rate of port as 10, 100, or 1000Mbps.
DDJ:A-M-5524B5-01 89
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring transmit rate of port 1 as 10Mbps and confirming it.
Note
Only unidirectional communication is possible on half duplex mode and bi-directional communication is
possible on full duplex mode to transmit packet for two ways. By transmitting packet for two ways,
Ethernet bandwidth is enlarged two times- 10Mbps to 20Mbps, 100Mbps to 200Mbps.
To configure duplex mode of 10/100BaseTx Ethernet port, use the following command.
port duplex port-number {full | half} Bridge Configures duplex mode of port.
Note
90 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring duplex mode of port 2 as half mode and confirming it.
Infomation
Before connecting the link, the port of hiD 6610 is basically configured as 「Half duplex mode」.
Note
100BASE-FX Ethernet and 1000BASE-X Gigabit Ethernet can be configured as full duplex. User of
100BASE-FX Ethernet and 1000BASE-X Gigabit Ethernet cannot change the mode.
Ethernet ports on the switches use flow control to restrain the transmission of packets to the port for a
period of time. Typically, if the receive buffer becomes full, the port transmits a "pause" packet that tells
remote ports to delay sending more packets for a specified period of time. In addition, the Ethernet ports
can receive and act upon "pause" packets from other devices. To configure flow control on the Ethernet
Information
DDJ:A-M-5524B5-01 91
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
For user’s reference, you can make description for each port.
show port description [port_number] Enable/Global/Bridge/Interface Shows description of one port or more.
92 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To display traffic average of each port or interface MIB, RMON MIB data defined in SNMP MIB, use the
following commands.
DDJ:A-M-5524B5-01 93
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
94 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To clear all recorded statistics of port and initiate, use the following command. It is possible to initiate
Port mirroring is the function of monitoring a designated port. Here, one port to monitor is called
“monitor port” and a port to be monitored is called “mirrored port”. Traffics transmitted from mirrored port
are copied and sent to monitor port so that user can monitor network traffic.
The following is a network structure to analyze the traffic by configuring port mirroring It analyzes traffic
on the switch and network status by configuring Mirrored port and Monitor port and connecting the
computer, that the watch program is installed, to the port configured as Monitor port.
MONITORING
Mirrored Mirrored
Port 1 Port 3
DDJ:A-M-5524B5-01 95
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure port Mirroring in hiD 6610, designate Mirrored port and Monitor port and enable port
mirroring function. Monitor port should be connected to PC that Watch program is installed. You can
designate only one Monitor port but many Mirrored ports for one switch.
You should assign monitor port and mirrored port, and then you can configure Port-mirroring. To assign
Information
To configure over 2 Mirrored ports, you can input the port-number using 「,」or「-」.
Note
If CPU is monitoring the traffic on Mirrored port, it can cause CPU overloads.
To use port mirroring function, you should enable port mirroring first. To enable port mirroring, use the
following command.
96 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Also, you have to disable port mirroring to release it. To do it, use the following command.
Note
You’d better to delete Mirrored port or disable Mirroring port after data analyzing. Using Mirroring
function too long time can cause CPU overload so that packet process would be delayed.
Step 1 Connect PC, that Watch program is installed for, to the port number 1 as Monitor port.
Step 2 Configure port number 1 as Monitor port and port number 2,3,4,5 as Mirroring ports.
DDJ:A-M-5524B5-01 97
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWITCH(bridge)#
Step 1 Configure 2,3,4,5 port as Mirroring port and monitor them by CPU.
SWITCH(bridge)#
98 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
6. System Environment
This chapter explains how to configure host name and time of system and how to manage it.
■ Environment Configuration
■ Configuration Management
■ System Check
□ Host name
□ Date and Time
□ Time-zone
□ NTP
□ SNTP
□ DNS Server
□ Log-in Banner
□ Fan Operation
Host name displayed on prompt is necessary to distinguish each device connected to network. To
configure or change host name of switch, use the command, “hostname” on Global configuration mode.
hostname name Global Configures host name of switch with new name user assigns.
DDJ:A-M-5524B5-01 99
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
The variable, “name” which follows command is the new name of switch user assigns. Default is
“SWITCH”.
To configure or change time and date in switch, use the command, “clock” on Privilege Exec Enable
Mode.
clock MMDDhhmmYYYY Enable/Global Configures or change time and date in user’s switch.
The variable, “MMDDhhmmYYYY” you need to enter after the command is “Month-Day-Hour-Minute-
Year”.
100 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
6.1.3 Time-zone
You can configure Time-zone to the SURPASS hiD 6610 with the following command. Time-zone is
If you want to know what kind of Time-zone can you configure, Use the “show time-zone” command.
Time-zone is predefined as the UTC(Universal Coordinated Time) at the factory configuration
Information
The command, “show time-zone” only displays kinds of Time-zone. To verify configuration about Time-
The following table shows the kinds of Time-zone, which can configure to the Switch and a main country
DDJ:A-M-5524B5-01 101
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
time-zone time-zone Global Configure or modify the current Time-zone on the Switch.
Information
show clock Enable/Global Shows user’s configuration about date/time and Time-zone.
The following is an example of configuring Time-zone as Seoul and viewing the configuration.
6.1.4 NTP
NTP(Network Time Protocol) can be used to configure user’s switches to 1/1000 second to guarantee
the exact time on networks. The Switch and NTP server constantly transmit the massage each other to
converge the correct time. It is very important to configure exact time to the Switch so that switch
operates properly. The details about NTP will be given at STD and RFC 1119. To configure the switch in
102 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
We can use the public NTP server and private NTP server both and enter the Domain name or IP
The following is an example of configuring 203.255.112.96 as NTP server, running it and confirming it.
SWITCH(config)# no ntp
SWITCH(config)# show ntp
ntp stoped
SWITCH(config)#
6.1.5 SNTP
NTP (Network Time Protocol) and SNTP (Simple Network Time Protocol) are the same TCP/IP protocol
in that they use the same UDP time packet from the Ethernet Time Server message to compute
accurate time. The basic difference in the two protocols is the algorithms being used by the client in the
client/server relationship.
DDJ:A-M-5524B5-01 103
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The NTP algorithm is much more complicated than the SNTP algorithm. NTP normally uses multiple
time server to verify the time and then controls the rate of adjustment or slew rate of the PC which
provides a very high degree of accuracy. The algorithm determines if the values are accurate by
identifying time server that don't agree with other time servers. It then speeds up or slows down the
PC's drift rate so that the PC's time is always correct and there won't be any subsequent time jumps
after the initial correction. Unlike NTP, SNTP usually uses just one Ethernet Time Server to calculate the
time and then it "jumps" the system time to the calculated time. It can, however, have back-up Ethernet
Information
You can configure up to 3 servers so that you use second and third servers as backup use in case the
104 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
By default setting, SURPASS hiD 6610 is configured to display 24 lines composed by 80 characters on
console terminal screen. User can change the number of displayed lines by using the command, line.
You can display maximum 512 lines.
To configure the number of displayed lines on terminal screen, use the following command on Privilege
terminal length <0~512> View/Enable Configures the number of displayed lines on terminal screen.
Information
The following is an example of configuring the number of displayed lines in terminal screen as 20 lines.
To disable the configuration for terminal length, use the following command.
DDJ:A-M-5524B5-01 105
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, it is possible to use hostname or URL instead of IP address when you use
telnet, ftp, tftp, and ping command. To do that, you should register DNS server. To register DNS server,
After registering DNS server with using the above command, DNS server is connected to network. Then,
you can use hostname or URL instead of IP address with commands such as telnet, ftp, tftp, and ping.
Note
To support this function, SURPASS hiD 6610 and DNS server should be connected to network.
The following is an example of registering 168.126.63.1 as DNS server and checking it.
Information
The above example is just for your reference. In real configuration, you must input the DNS server you
106 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of taking ping test with domain name after registering DNS server.
In addition, when you register specific domain name, you can use hostname in the domain instead of IP
address to use the commands such as telnet, ftp, tftp, and ping.
Domain name - A
In the above example, after domain name “A” is registered in hiD 6610, it is possible to use hostname
instead of IP address to use the commands such as telnet, ftp, tftp, and ping.
DDJ:A-M-5524B5-01 107
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
To support this function, SURPASS hiD 6610 and DNS server should be connected to network.
The following is an example of inputting hostname instead of IP address for ping test to host “B” after
In the above example, “A” and “B” are just example. In real configuration, you should input actual
domain name and hostname instead of A and B.
To delete registered DNS server and domain name, use the following command.
108 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to write message in system login page. Through the message, administrator can leave a
banner login Global Register displayed message when successfully log in the system.
banner login-fail Register displayed message when fail to login the system.
To delete login banner in system login page, use the following command.
no banner login Global Deletes displayed message when successfully log in the system.
no banner login-fail Deletes displayed message when fail to login the system.
[ Sample Configuration 1 ]
When you use the above command, the following message will be displayed.
SWITCH(config)# banner
Save & Exit : CTRL-D When you press Ctrl + D key, you can exit to
system prompt.
DDJ:A-M-5524B5-01 109
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Write message you need. When you finish the message, press Ctrl+D key.
SWITCH(config)# banner
When you press Ctrl+D key after writing
Save & Exit : CTRL-D
a message, you can exit to system
do not change the configuration
prompt.
SWITCH(config)#
SWITCH# exit
In hid 6610, it is possible to configure FAN operation. To configure FAN operation, use the following
command.
On other hand, if Fan is on, it is possible to configure to start and stop Fan operation. on specific
Information
Information
It is possible to configure up to 100℃ for starting temperature and -30℃ for stopping temperature.
110 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
To check Fan status and the temperature for Fan operation, use the following command.
show status fan Enable/Global Check the Fan status and the temperature for the fan operation.
The following is to configure the starting temperature as 25℃ and stopping temperature as 5℃ for Fan
operation.
Fan A : None
Fan B : None
Fan A-1 : None
Fan A-2 : None
Fan A-3 : None
Fan B-1 : None
Fan B-2 : None
Fan B-3 : None
Fan operation : ON
Fan threshold : Run 25 C / Stop 5 C
SWITCH(config)#
User can check if user’s configurations are correct and save them in system. This section contains the
following functions.
□ Saving Configuration
□ Auto-Saving
□ Reloading
□ Configuration Backup
DDJ:A-M-5524B5-01 111
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
User can view switch configuration. To do it, use the following command.
After you download a new system image to SURPASS hiD 6610 from TFTP/FTP server, if the
configuration files are changed, you must save the changed file in the flash memory. Unless you saved
the changed file, the configuration file will delete incase of rebooting. To save the configuration files in
112 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Note
When you store configurations with using this command, please wait for [OK] message without any
key pressed.
6.2.3 Auto-Saving
In hiD 6610, it is possible to save the configuration automatically. To configure the configuration
Information
6.2.4 Reloading
User can delete an individual configuration one by one, and also can reload the switch with the default
setting. To reload the switch, use the following command on configuration mode.
Note
After reloading with the command, “restore factory-defaults”, restore factory-defaults, you have to
reboot the switch to initiate.
DDJ:A-M-5524B5-01 113
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
It is possible to save user’s configurations and to use for the data recovery or system operating. To back
up user’s configuration, use the following commands. To use back up file, use the following command.
copy file-name1 file- name2 Copies backup file with another name.
To use back up file using ftp or tftp server, use the following commands.
copy {ftp|tftp} config upload Uploads a file to ftp or fttp server with a name
copy {ftp|tftp} config download Downloads a file from ftp or fttp server with a
Note
To access to FTP to back up the configuration or use the backup file, you should know FTP user ID and
the password.
Information
To back up the configuration or use the file through FTP, you can check the transmission rate of file
114 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Note
The following is an example of copying the current configuration with a name and confirming it.
DDJ:A-M-5524B5-01 115
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
When there is any problem in switch, user must find what the problem is and its solution. Also neither he
nor she should always check switch to prevent trouble. Therefore user should not only be aware of
□ IP Source-routing Function
□ Checking Installed OS
□ Configuring Default OS
□ Checking Tech-support
To check if user’s switch is correctly connected to network, use the command, ping. In IP network, the
command, ping transmits echo message to ICMP(Internet Control Message Protocol). ICMP is internet
protocol that notifies fault situation and provides information on the location where IP packet is received.
When ICMP echo message is received at the location, its replying message is returned to the place
116 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To operate Ping test to check network status, use the following commands in privileged mode.
The following is the basic information to operate Ping test. Input the following configurations after
It is considered as successful Ping test if reply returns within the configured time
Timeout in seconds [2]
interval. Default is 2 seconds.
When a number of IP addresses are configured in user’s switch, sometimes you need to check the
To take Sping test, use the same process as Ping test and then input the followings after ‘ Extended
commands’. It is possible to check the connection between specific IP address and network using the
following command.
DDJ:A-M-5524B5-01 117
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Designates the address where the relative device should respond in source ip
Decides whether Don’t Fragment (DB) bit is applied to Ping packet or not.
Default is no. If the user choose ‘yes’, when the packets pass through the
Set DF bit in IP header? [no]
segment compromised with the smaller data unit, it prevents the packet to be
Note
Use “sping” in the case there are a number of IP addresses in user’s switch. It is not necessary for the
switch having only one IP address.
[ Sample configuration 1 ]
The following is an example of Ping test 5 times to check network status with IP address 172.16.1.254.
SWITCH# ping
Protocol [ip]: ip
Target IP address: 172.16.1.254
Repeat count [5]: 5
Datagram size [100]: 100
Timeout in seconds [2]: 2
Extended commands [n]: n
PING 172.16.1.254 (172.16.1.254) 100(128) bytes of data.
Warning: time of day goes back (-394us), taking countermeasures.
108 bytes from 172.16.1.254: icmp_seq=1 ttl=255 time=0.058 ms
108 bytes from 172.16.1.254: icmp_seq=2 ttl=255 time=0.400 ms
108 bytes from 172.16.1.254: icmp_seq=3 ttl=255 time=0.403 ms
108 bytes from 172.16.1.254: icmp_seq=4 ttl=255 time=1.63 ms
108 bytes from 172.16.1.254: icmp_seq=5 ttl=255 time=0.414 ms
118 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample configuration 2 ]
In case that user’s switch is configured with several IP addresses, sometimes you need to check
The following is to check network status between 172.16.157.100 and 172.16.1.254 when IP address of
SWITCH# ping
Protocol [ip]:
Target IP address: 172.16.1.254
Repeat count [5]: 5
Datagram size [100]:100
Timeout in seconds [2]:2
Extended commands [n]: y Input to select Extended commands
Source address or interface: 172.16.157.100 to operate “sping”.
Type of service [0]:0
If you implement PING test to check the status of network connection, icmp request arrives at the final
DDJ:A-M-5524B5-01 119
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Reply B
Request
E
PC
In the above figure, if you implement PING test from PC to C, it goes through the route of 「A→B→C」
This is the general case. But, in SURPASS hiD 6610, it enables to implement PING test from PC as the
route of 「A→E→D→C」.
Reply Request
B
PC
120 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To implement PING test as the route which the manager designated, use the following steps.
Step 1 Enables IP source-routing function from the equipment connected to PC which the PING
test is going be implemented.
Step 2 Implements the PING test from PC as the designate route with the 「ping –k ip-address
ip-address…」command.
In hiD 6610, the user can check the tracing route while the packet goes to the destination. To show the
tracing route, traceroute command displays the returning time for every passing route after sending test
To trace packet route, use the following command in Privilege Exec Enable.
traceroute [word] Traces packet transmission route by configuring IP address or Hostname of the
Enable
traceroute ip [word] destination.
DDJ:A-M-5524B5-01 121
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Designates the address where the relative device should respond in source ip
Source address or interface:
address.
Decides whether Don’t Fragment (DB) bit is applied to Ping packet or not.
Default is no. If the user choose ‘yes’, when the packets pass through the
Set DF bit in IP header? [no]
segment compromised with the smaller data unit, it prevents the packet to be
The following is an example of checking if there is any accessed user from remote place.
SWITCH# where
admin at ttyS0 from console for 4 hours 6 minutes 21.57 seconds
SWITCH#
122 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To display MAC table recorded in specific port, use the following command.
Information
Information
There are more than about a thousand MAC addresses in MAC table. And it is difficult to find
information you need at one sight. So, The system shows certain amount of addresses displaying 「-
more-」on standby status. Press any key to search more. After you find the information, you can go
back to the system prompt without displaying the other table by pressing “q”.
SURPASS hiD 6610 records MAC Table to prevent Broadcast packets from transmitting. And
unnecessary MAC address that does not response during specified time is deleted from the MAC table
DDJ:A-M-5524B5-01 123
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
User can view time how long user’s switch has been running after booting.
show uptime Enable/Global Shows running time of user’s switch after power on.
To view system information such as product model, memory size, hardware specification, and OS
It is possible to check average of CPU utilization. To do it, use the following command.
show cpuload Enable/Global Shows threshold of CPU utilization and average of CPU utilization.
It is possible to check CPU loading process classified by each process. Through this function, user can
see which demon possesses the most of CPU, if there is unnecessary demon, and operating process of
124 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
User can view current system image version of SURPASS hiD 6610. To view the current system image
User can verify the size of the current system image file of SURPASS hiD 6610. To do this, use the
following command.
DDJ:A-M-5524B5-01 125
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
It is possible to view utilization of flash memory. To do it, use the following command.
Note
In SURPASS hiD 6610, it is possible to provide Dual-OS according to Flash Memory installed in the
switch.
On other hand, In SURPASS hiD 6610, it is possible to support Dual-OS according to the configured
Flash Memory. Single-OS is provided in the case Flash Memory is 8M+16M and Dual-OS is provided in
SWITCH#
126 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is to show NOS installed in the switch that supports Dual-OS.
Flash Information(Bytes)
Note
On other hand, In SURPASS hiD 6610, it is possible to support Dual-OS according to the configured
Flash Memory. Single-OS is provided in the case Flash Memory is 8M+16M and Dual-OS is provided in
the case Flash Memory is 8M+32M. You can confirm the Flash Memory by using show system
command.
When there are two kinds of system images installed, user can configure one of two as Default OS as
Note
In SURPASS hiD 6610, a system image saved in os1 is configured as Default OS by default.
User can configure default OS used in case of booting or rebooting the system. To do this, use the
follow command.
DDJ:A-M-5524B5-01 127
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To confirm configured Default OS, view the system image installed in flash memory by using the
command, show flash. The following is an example of configuring os2 as Default OS of SURPASS hiD
6610 by changing from os1.
Flash Information(Bytes)
Area total used free
----------------------------------------------------
OS1(default) 7864320 5367868 2234398 2.09 #4121
OS2 7864320 5115586 2748734 7.83 #4435
Config 524284 92160 432124
----------------------------------------------------
Total 167252924 10575614 5415256
SWITCH# default-os os2
SWITCH# show flash
Flash Information(Bytes)
Area total used free
----------------------------------------------------
OS1 7864320 5367868 2234398 2.09 #4121
OS2 (default) 7864320 5115586 2748734 7.83 #4435
Config 524284 92160 432124
----------------------------------------------------
Total 167252924 10575614 5415256
SWITCH#
You can check temperature of switch, power status, and fan status. To do it, use the following
commands.
128 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, you can check the configuration and configuration file, log information, register,
memory, debugging information using the following commands. By checking Tech-supporting, check the
tech-support {all | crash-info} remote View/Enable Save the contents of Tech-support in the designated
Information
If you choose all among options, you can check all of Tech-support information and if you choose
crash-info, you can check [SYSTEM], [SYSINFO], [VERSION], [TAG], [SHOW RUNNING-CONFIG],
[VOLATILE SYSLOG], [NON-VOLATILE SYSLOG], [SWITCHING ASIC INFO], [UPTIME INFO],
[FLASHINFO].
Information
Tech-support contents displayed on console are showed at once regardless of the number of display
DDJ:A-M-5524B5-01 129
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
7. Network Management
This chapter provides guidelines to manage SURPASS hiD 6610 and network in which SURPASS hiD
■ SNMP
■ RMON
■ Syslog
■ MAC Filtering
■ ARP-Alias
■ Proxy-ARP
7.1 SNMP
SNMP(Simple Network Management Protocol) system is consisted of three parts: SNMP manager, a
managed device and SNMP agent. SNMP is an application-layer protocol that allows SNMP manager
and agent stations to communicate with each other. SNMP provides a message format for sending
information between SNMP manager and SNMP agent. The agent and MIB reside on the switch. In
configuring SNMP on the switch, you define the relationship between the manager and the agent.
According to community, you can give right only to read or right both to read and to write. The SNMP
agent has MIB variables to reply to request from SNMP administrator. And SNMP administrator can
obtain data from the agent and save data in the agent. The SNMP agent gets data from MIB, which
The SNMP agent sends trap to administrator for some cases. Trap is a warning message to alert
network status to SNMP administrator. Trap informs improper user authentication, rebooting, connection
130 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Managed Device
Requested information
(Each SNMP Agent included) transferred to SNMP
manager
Request information
to SNMP Agent
SNMP Manager
NMS(Network Management
System) used
SURPASS hiD 6610 has supported SNMP v1, v2c, v3. SURPASS hiD 6610 enhances accessing
management of SNMP agent more and limit the range of OID opened to agents. The following is how to
□ Configuring Group
DDJ:A-M-5524B5-01 131
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Only authorized person can access to the SNMP agent installed in the switch by configuring password
called as community.
To configure the community in SNMP v1, use the following command on Global configuration mode.
snmp community {ro | rw} community Configures community to allow authorized person to
Global
[ip-address] [oid] access.
Information
It is possible to configure SNMP community up to maximum three for each reading right and writing
Community means password as we usually know. You can configure the community by entering
password you want at community. And it is possible to give access right only to read or both to read and
The abbreviations following, ro stands for read-only and rw stands for read/write. They are commands
to distinguish access right.
132 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample configuration 1]
The followings are two examples of giving access right both to read and write by configuring password
as public, and giving access right only to read by configuring password as private.
Community List
Community Source OID
--------------------------------------------
community rw public
community ro private
SWITCH(config)#
You can configure accessed person and location of the SNMP agent so that these descriptions can be
saved at SNMP configuration file. To configure accessed person and location of the SNMP agent, use
To delete accessed person and location of the SNMP agent, use the following command.
To check accessed person and location of the SNMP agent, use the following command.
DDJ:A-M-5524B5-01 133
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 2]
The following is to configure the information about system administrator of SNMP agent as
dasan<02.3484.6500> and the location of the switch where SNMP agent configured as Seoul,Korea.
contact dasan<02.3484.6500>
location Seoul,Korea
SWITCH(config)#
SNMP v2 authorizes the host to access the agent, according to the identity of the host and Community
name. The command, com2sec, specifies the mapping from the identity of the host and Community
name to Security name. To create Security name, use the following command.
snmp com2sec security-name Specifies the mapping from the identity of the host and
Global
{ip-addressㅣip-address/m} community Community name to Security name.
134 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 3]
com2sec list
---------------------------------------
com2sec test 100.1.1.1 public
SWITCH(config)#
User can make SNMP Manager that can access SNMP Agent and its Community belongs to a group.
User can choose the security type from {v1ㅣv2cㅣv3}. security-name takes the one created from the
command, com2sec. However, security-name is a part of the basic SNMP protocol in SNMP v3, so
DDJ:A-M-5524B5-01 135
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The SNMP v2c and v3 can block the user with only access to limited OID. OID which limits the open
range is “view”.
View A
View B
136 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
snmp view view included oid [mask] Configures OID which contains Sub-tree as “view”
[Sample Configuration 4]
View list
-------------------------------------------
view TEST included 410
SWITCH(config)#
In SURPASS hiD 6610, the manager can configure for the particular Group to look at limited
OID(=View).
To permit the particular group to access to limited OID, use the following command.
DDJ:A-M-5524B5-01 137
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
snmp access group-name {v1ㅣv2c} read- view Configures View to permit for appropriate
To release the configuration for accessing to limited OID, use the following command.
no snmp access group-name Global Releases the Group which gets the permission for limited OID.
To check the group which gets the permission for limited OID, use the following command.
show snmp access Enable/Global Shows the group which gets the permission for limited OID.
In SNMP v3, register the agent as user. If you register User, you should configure it with the
snmp user user-name {md5ㅣsha} auth-key [des] [private_key] Global Configures user of SNMP v3.
138 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SNMP trap is alert message that SNMP agent notifies SNMP manager about certain problems. If you
configure SNMP trap, switch transmits pertinent information to network management program. In this
To configure trap-host who receives trap message, use the following command. In this case, you should
input IP address of trap-host who is supposed to receive trap. For example, if SNMP manager is trap-
In hiD 6610, it is possible to configure trap-host of SNMP v1 and SNMP v2c and SNMP v3 inform-trap-
host.
snmp trap2-host ip-address [community] Global Configures SNMP version 2 trap host.
Information
To disable to configuration of transmitting Trap message to appropriate IP address, use the following
command.
DDJ:A-M-5524B5-01 139
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
show snmp trap Global Checks configured SNMP trap-host and SNMP trap.
Information
When you configure more than one trap-host, you can configure it by inputting IP address one by one or
[ Sample Configuration 5 ]
The following is an example of configuring IP address 10.1.1.3, 20.1.1.5, and 30.1.1.2 as trap-host in
two ways.
[ Sample Configuration 6 ]
The following is an example of configuring IP address 10.1.1.1 as trap-host, 20.1.1.1 as trap2-host and
30.1.1.1 as inform-trap-host.
140 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Trap-Host List
Host Community
------------------------------------------
inform-trap-host 30.1.1.1
trap2-host 20.1.1.1
trap-host 10.1.1.1
Trap List
Trap-type Status
--------------------------
auth-fail enable
cold-start enable
cpu-threshold enable
port-threshold enable
dhcp-lease enable
power enable
module enable
fan enable
temp-threshold enable
SWITCH(config)#
There are nine kinds of SNMP trap messages provided by SNMP – authentication-failure, cold-start,
(1) authentication-failure is shown to inform wrong community is input when user trying to access to
SNMP inputs wrong community.
(2) cold-start is shown when SNMP agent is turned off and rebooted again.
DDJ:A-M-5524B5-01 141
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
(3) link-up/down is shown when network of port specified by user is disconnected, or when the network
is connected again.
(4) cpu-threshold is shown when CPU utilization rises above the threshold configured by user referred
to「6.3.3 Configuring Threshold of CPU Utilization」. Also, when CPU utilization falls below the
(5) dhcp-lease is shown when there is no more IP address can be assigned in subnet of DHCP server.
Even though only one subnet does not have IP address to assign when there are several subnets,
(6) port-threshold is shown when the port traffic rises above the threshold configured by user referred
to「7.3.4 Configuring Threshold of Port Traffic」. Also, when port traffic falls down below the
(7) fan/module/power is shown when there is any problem in Fan, Module, and Power.
(8) temp-threshold is shown when temperature rises above the threshold configured by user referred
Information
SNMP Trap message provided by each switch can be different. Each switch that supports SNMP
function can use all or a part of the following commands when you configure the switch. To check the
command provided by each switch, use snmp trap ? in Global Configuration Mode.
However, it may inefficiently work if all these trap messages are too frequently sent. Therefore, user can
142 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To configure kinds of trap messages that user wants to receive, use the following commands.
snmp trap link-down Configures Link-down message to be sent when network of port
snmp trap link-up Configures Link-up message to be sent when network of port specified
snmp trap temp-threshold temperature rises above the threshold and falls down below the
threshold.
snmp trap fan Sends trap message when there is any problem in fan.
snmp trap module Sends trap message when there is any problem in module.
snmp trap power Sends trap message when there is any problem in power.
Information
DDJ:A-M-5524B5-01 143
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
show snmp trap Global Checks configured SNMP trap-host and SNMP trap.
144 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 6 ]
Trap-Host List
Host Community
------------------------------------------
inform-trap-host 30.1.1.1
trap2-host 20.1.1.1
trap-host 10.1.1.1
Trap List
Trap-type Status
--------------------------
auth-fail disable
cold-start enable
cpu-threshold enable
port-threshold enable
dhcp-lease enable
power enable
module enable
fan enable
temp-threshold enable
SWITCH(config)#
In this mode, you can configure the Alarm notification. The notification will be sent to a configured trap
host whenever the configuration change occurs through CLI and ACI-E. This enhanced alarm
notification allows the network administrator to customize the severity on each alarm.
DDJ:A-M-5524B5-01 145
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
To configure the severity for general alarm notifications, use the following command.
Information
If the severity is not configured for an alarm-notification, the general alarm notification is applied to the
alarm notification. The default value is configured as minor and it can be changed by network
administrator ’s configuration. If the user changes the severity of the general alarm notification, the
other alarm notification will be sent to inform the changes. To configure the alarm notification with the
severity to inform the changes or configuration about the general alarm notification, use the following
command.
snmp alarm-severity criteria Configures the severity for the changes on “general
Global
{ critical|major|minor |warning|intermediate} alarm notification alarm”.
Information
146 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
snmp alarm-severity fan-fail Sends alarm notification with the severity when
snmp alarm-severity broadcast-over Sends alarm notification with the severity when
snmp alarm-severity cpu-load-over Sends alarm notification with the severity in the
snmp alarm-severity dhcp-illegal Sends alarm notification with the severity when
snmp alarm-severity fan-remove Sends alarm notification with the severity when
Global
{ critical|major|minor |warning|intermediate} the fan is removed from the switch.
snmp alarm-severity ipconflict Sends alarm notification with the severity when
snmp alarm-severity memory-over Sends alarm notification with the severity in the
snmp alarm-severity mfgd-block Sends alarm notification with the severity when
snmp alarm-severity port-remove Sends alarm notification with the severity when
snmp alarm-severity port-thread-over Sends alarm notification with the severity when
DDJ:A-M-5524B5-01 147
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
snmp alarm-severity power-fail Sends alarm notification with the severity when
snmp alarm-severity power-remove Sends alarm notification with the severity when
snmp alarm-severity rmon-alarm-rising Sends alarm notification with the severity when
snmp alarm-severity rmon-alarm-falling Sends alarm notification with the severity when
Global
{ critical|major|minor |warning|intermediate} traffic is falling over rmon alarm threshold.
snmp alarm-severity system-restart Sends alarm notification with the severity when
snmp alarm-severity module-remove Sends alarm notification with the severity when
snmp alarm-severity temperature-high Sends alarm notification with the severity when
148 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To configure the severity of alarms for ADVA status, use the following commands.
snmp alarm-severity adva-fan-fail Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-if-misconfig Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-if-opt-thres Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-if-rcv-fail Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-if-sfp-mismatch Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-psu-fail Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-temperature Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-voltage-high Sends alarm notification with the severity when ADVA
snmp alarm-severity adva-voltage-low Sends alarm notification with the severity when ADVA
DDJ:A-M-5524B5-01 149
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure the severity of alarms for ERP status, use the following commands.
snmp alarm-severity erp-domain-multi-rm Sends alarm notification with the severity when a
snmp alarm-severity erp-domain-ulotp test packet has been received within 3 test packet
150 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To check the severity of alarms that user configure, use the following commands.
show snmp alarm-severity Enable/Global To check the severity of alarms that user configure
[ Sample Configuration 8 ]
To show what kind of alarm has been transmitted, use the following command.
show snmp alarm-history Enable/Global Shows what kind of alarm has been transmitted.
To deletes the recorded alarm in the system, use the following command.
snmp clear alarm-history Enable/Global Deletes the recorded alarm in the system.
The following is to show the transmitted alarm and delete the records.
DDJ:A-M-5524B5-01 151
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In case SNMP agent has various IP addresses, SNMP transmits information through the best route
when SNMP manager requests for information. Therefore, when the manager requests information, the
IP : 10.1.1.1 IP : 20.1.1.1
( contain SNMP agent )
In SURPASS hiD 6610, user can designate IP address of SNMP agent in order to receive information
again when the administrator requests for information. As the above picture, if SNMP manager
Note
If the designated IP address of SNMP agent is deleted from the switch, SNMP may not respond.
152 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
If you try to delete the designated IP as the IP address of SNMP agent from device, it informs that
Note
When you use the above command, all configurations concerned with SNMP will be deleted.
DDJ:A-M-5524B5-01 153
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
OAM(Operations, Administration, Maintenance) is useful function for watching the Link Operation.
Network administrator watches the network so that it helps to seize the location where the error
happens fast. OAM shows the network status by using Loopback function. And it also helps to
For OAM Loopback function, the user’s switch and host connected to the user’s device should support
OAM function. OAM Loopback function enables Loopback function from the user’s device to host
To enable Loopback function of the host connected to the user’s switch, use the following command.
oam remote loopback enable port-number Bridge Enables Loopback function of Peer device.
oam remote loopback disable port-number Bridge Disables Loopback function of Peer device.
154 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
oam local mode {activeㅣpassive} port-number Bridge Configures the mode of Local OAM.
Both Request and Loopback are possible for Local OAM active.
When RX is impossible in Local OAM, it is possible to send the information by using TX.
oam local unidirection enable port-number Bridge Sends the information by using TX
To disable to transmit the information by using TX, use the following command.
oam local unidirection disable port-number Bridge Disables to transmit the information by using TX.
DDJ:A-M-5524B5-01 155
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
oam remote oam admin <1-2> enable port-number Bridge Enables Remote OAM.
oam remote oam admin <1-2> disable port-number Bridge Disables Remote OAM.
oam remote oam mode <1-2> {activeㅣpassive} port-number Bridge Configures the mode of Remote OAM.
Both Request and Loopback are possible for Remote OAM active. Whereas, Request or Loopback is
To check the information of peer host using OAM function, use the following command.
oam remote alarm general forwarding <3-4> {enableㅣdisable} port-number Check the information
Bridge
oam remote alarm general speed <1-4> <0-4294967295> port-number of peer host using
OAM function.
oam remote alarm general user <1-4> string port-number
156 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is to configure to enable OAM Loopback function through 25 port of the user’s switch and
operate once.
DDJ:A-M-5524B5-01 157
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
LLDP(Link Layer Discovery Protocol) is the function of transmitting data for network management for
hiD 6610 supporting LLDP transmits the management information between near switches. The
information shows the management information that can recognize the switches and the function. Then
When LLDP starts to operate, the switches send their information to near switches. If Local status is
changed, it sends their changed information to near switch to inform their changes. For example, if the
port statue is changed to disable, it informs that the port is disabled to near switches. On other hand,
the switch that receives the information from near switches processes LLDP frame and saves the
information of the other switches. The information received from other switches is Ageing.
To operate LLDP, LLDP should be enabled first. To enable LLDP, use the following command.
158 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
If LLDP is enabled on the port, then you should configure how to operate LLDP.
Information
lldp adminstatus port-number {bothㅣ tx_onlyㅣrx_only} Bridge Configure how to operate LLDP.
Tx-only is to receive LLDP frame and rx-only is to send LLDP frame. Both is to receive and send LLDP
frame. To configure not to process LLDP operation, use the following command.
LLDC is transmitted through TLV. There are Mandatory TLV and Optional TLV. In optional TLV, there are
Basic TLV and organizationally specific TLV. Basic TLV must be in the switch where LLDP is realized ,
DDJ:A-M-5524B5-01 159
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In hiD 6610, the administrator can enable and disable Basic TLV by selecting it.
In hiD 6610, it is possible to configure the interval time and times of sending LLDP message. To
configure the interval time and times of LLDP message, use the following command.
lldp msg txhold <2-10> Configures the periodic times of LLDP message.
Information
In hiD 6610, the administrator can configure the interval time of enabling LLDP frame after
160 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To configure the interval time of enabling LLDP frame after configuring not to process it, use the
following command.
Configures the interval time of enabling LLDP frame from the time
lldp reinitdelay <1-10> Bridge
of configuring not to process LLDP frame.
Information
In hiD 6610 , the administrator can configure Delay time of transmitting LLDP frame. To configure
lldp txdelay <1-8192> Bridge Configures Delay time of transmitting LLDP frame/
Information
DDJ:A-M-5524B5-01 161
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
show lldp statistics port-number Enable/Global/Bridge Shows LLDP operation and statistics.
To initialize the accumulated statistics on the port, use the following command.
clear lldp statistics port-number Bridge Initializes the accumulated statistics on the port
show lldp remote port-number Enable/Global/Bridge Shows the statistics of Remote entry.
162 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 1 ]
The following is to enable LLDP on the port 25,26 and show it.
DDJ:A-M-5524B5-01 163
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 2 ]
Port 26:
MSAP-Identifier: 00 d0 cb 27 00 8d 65 74 68 32 36
ChassisType : macAddress(4)
ChassisID : 00 d0 cb 27 00 8d
PortType : interfaceAlias(1)
PortID : 'eth26'
PortDescription: 'port26-TX-10/100/1000'
SystemName : 'EL3'
SystemDescript.: 'hiD6610 NOS 3.02/DS-QA-07D-B0'
SysCapabilities: [0x16] repeater(0x02), bridge(0x04), router(0x10),
SysCapEnabled : [0x04] bridge(0x04),
Mgmt: ifType ifId ifAddress |OID
SWITCH(bridge)#
164 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 3 ]
DDJ:A-M-5524B5-01 165
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 4 ]
166 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
7.4 RMON
Ethernet at remote place. While SNMP can give information only about the device mounted SNMP
agent, RMON gives information about overall segments including devices. Thus, user can manage
network more effectively. For instance, in case of SNMP it is possible to be informed traffic about certain
ports but through RMON you can monitor traffics occurred in overall network, traffics of each host
Since RMON processes quite lots of data, its processor share is very high. Therefore, administrator
should take intensive care to prevent performance degradation and not to overload network
transmission caused by RMON. There are nine defined RMON MIB groups in RFC 1757: Statistics,
History, Alarm, Host, Host Top N, Matrix, Filter, Packet Capture and Event. SURPASS hiD 6610
supports three MIB groups of them, most basic ones: History, Alarm and Event.
RMON History is periodical sample inquiry of statistical data about each traffic occurred in Ethernet port.
Statistical data of all ports are pre-configured to be monitored at 30-minute interval, and 50 statistical
data stored in one port. It also allows you to configure the time interval to take the sample and the
DDJ:A-M-5524B5-01 167
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
You need to enter into History configuration mode first to configure RMON history. To enter into History
configuration mode, use the following command. After entering into History configuration mode, the
The following is an example of entering into History Configuration mode to configure History 5.
SWITCH(config)# rmon-history 5
SWITCH(config-rmonhistory[5])#
Input a question mark(?) at the system prompt on History configuration mode if you want to list available
commands.
SWITCH(config-rmonhistory[1])# ?
RMON history configuration commands:
active Activate the history
data-source Set data source name for the ethernet port
do To run exec commands in config mode
exit End current mode and down to previous mode
help Description of the interactive help system
interval Define the time interval for the history
owner Assign the owner who define and is using the history resources
requested-buckets Define the bucket count for the interval
show Show running system information
SWITCH(config-rmonhistory[1])#
Information
The question mark(?) you enter will not be seen. Right after entering the question mark, the commands
will be displayed.
168 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To return into configuration mode, or to enter into Privilege Exec Enable Mode, use the following
commands.
The followings are examples of returning to Global Configuration Mode and going back to Privilege
SWITCH(config-rmonhistory[5])# exit
SWITCH(config)#
SWITCH(config-rmonhistory[5])# end
SWITCH#
When you configure RMON History, you have to assign source port of statistical data. To invest
statistical data from a certain port as sample inquiry, assign the port by using the following command.
User can configure RMON History and identify subject using many kinds of data from History.
DDJ:A-M-5524B5-01 169
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
owner name RMON Configures History and identifies subject using related data.
Information
When you configure subject of RMON History, it is possible to input maximum 32 letters. If you input
more than 32 letters, the error message, “%Too long owner name” will be displayed.
SWITCH(config-rmonhistory[5])# requested-buckets 25
SWITCH(config-rmonhistory[5])#
Information
170 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
interval time RMON Configures the interval of sample inquiry. The default setting is 30 seconds.
SWITCH(config-rmonhistory[5])# interval 60
SWITCH(config-rmonhistory[5])#
Information
You can configure the interval of sample inquiry as maximum 3,600 seconds.
After finishing all configurations, you need to activate RMON History. To activate RMON History, use the
following command.
The following is an example of activating RMON History and viewing the configuration
SWITCH(config-rmonhistory[5])# active
SWITCH(config-rmonhistory[5])# show running-config
Building configuration...
(Omitted)
rmon-history 5
owner test
data-source ifindex.hdlc1
interval 60
requested-buckets 25
active
(Omitted)
SWITCH(config-rmonhistory[5])#
DDJ:A-M-5524B5-01 171
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
Before activating RMON History, check if user’s configuration is correct. After RMON History is
activated, you cannot change its configuration. If you need to change configuration, you have to delete
When you need to change configuration of RMON History, you should delete RMON History of the
SWITCH(config)# no rmon-history 5
SWITCH(config)#
RMON Alarm invests sample data at the interval as use configured, and when the data is not in the
configured threshold.
There are two ways to compare with the threshold: Absolute comparison and Delta comparison.
■ Absolute Comparison : Comparing sample data with the threshold at configured interval, if the
data is more than the threshold or less than the threshold, Alarm is occurred.
■ Delta Comparison : Comparing difference between current data and the latest data with the
threshold, if the data more than the threshold or less than the threshold, Alarm is occurred.
You need to enter into RMON Alarm configuration mode first to configure RMON Alarm.
172 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To enter into RMON Alarm configuration mode, use the following command. After entering into RMON
SWITCH (config)#. The variable “n” is number to be configured to distinguish each RMON Alarm.
The following is an example of entering into Alarm configuration mode to configure RMON Alarm 1.
SWITCH(config)# rmon-alarm 1
SWITCH(config-romonalarm[1]#
Input a question mark(?) at the system prompt on Alarm configuration mode if you want to list available
commands.
SWITCH(config-rmonalarm[1])# ?
RMON alarm configuration commands:
active Activate the event
do To run exec commands in config mode
exit End current mode and down to previous mode
falling-event Associate the falling threshold with an existing RMON event
falling-threshold Define the falling threshold
help Description of the interactive help system
owner Assign the owner who define and is using the history resources
rising-event Associate the rising threshold with an existing RMON event
rising-threshold Define the rising threshold
sample-interval Specify the sampling interval for RMON alarm
sample-type Define the sampling type
sample-variable Define the MIB Object for sample variable
show Show running system information
startup-type Define startup alarm type
SWITCH(config-rmonalarm[1])#
Information
The question mark(?) you enter will not be seen. Right after entering the question mark, the commands
will be displayed.
DDJ:A-M-5524B5-01 173
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To return into configuration mode, or to enter into Privilege Exec Enable Mode, use the following
commands.
The followings are examples of returning to Configuration mode and going back to Privilege Exec
SWITCH(config-rmonalarm[1])# exit
SWITCH(config)#
SWITCH(config-rmonalarm[1])# end
SWITCH#
User needs to configure RMON Alarm and identify subject using many kinds of data from Alarm. To
Information
When you identify subject of RMON Alarm, it is possible to input maximum 32 letters. If you input more
than 32 letters, the error message, “%Too long owner name” will be displayed.
174 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
User needs object value used for sample inquiry to provide RMON Alarm. The following is rule of object
To assign object used for sample inquiry, use the following command.
sample-variable mib-object RMON Assigns MIB object used for sample inquiry.
The following is an example of configuring MIB object apSvcConnections used for sample inquiry
It is possible to select the way to compare MIB object used for sample inquiry in case of configuring
RMON Alarm. Absolute comparison directly compares object selected as sample with the threshold. For
instance, when you want to know the point of 30,000 times of sample inquiry, if you configure
To compare object selected as sample with the threshold, use the following command.
Delta comparison compares difference between current data and the latest data with the threshold. For
instance, in order to know the point of variable notation rule 100,000 more than the former rule,
DDJ:A-M-5524B5-01 175
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
sample-type delta RMON Compares difference between current data and the latest data with the threshold.
If you need to occur Alarm when object used for sample inquiry is more than upper bound of threshold,
Information
You can configure upper bound of threshold as maximum 2,147,483,647. If you configure it as 0, then
After configuring upper bound of threshold, configure to occur RMON Event when object is more than
176 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring to occur RMON event 1 when object is more than configured
threshold.
SWITCH(config-rmonalarm[1])# rising-event 1
SWITCH(config-rmonalarm[1])#
Information
If you configure the standard, the upper bound of threshold as 0, there will not be Event.
If you need to occur Alarm when object used for sample inquiry is less than lower bound of threshold,
you should configure lower bound of threshold. To configure lower bound of threshold, use the following
command.
SWITCH(config-rmonalarm[1])# falling-threshold 90
SWITCH(config-rmonalarm[1])#
Information
You can configure lower bound of threshold as maximum 2,147,483,647. If you configure it as 0, there
After configuring lower bound of threshold, configure to occur RMON Event when object is less than
DDJ:A-M-5524B5-01 177
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring ro occur RMON Event when object is less than configured
threshold.
SWITCH(config-rmonalarm[1])# falling-event 2
SWITCH(config-rmonalarm[1])#
Information
It is possible for users to configure standard when Alarm is first occurred. User can select the first point
when object is more than threshold, or the first point when object is less than threshold, or the first point
when object is more than threshold or less than threshold. To configure the first RMON Alarm to occur
when object is less than lower bound of threshold first, use the following command.
To configure the first Alarm to occur when object is firstly more than upper bound of threshold, use the
following command.
To configure the first Alarm to occur when object is firstly more than threshold or less than threshold,
178 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The interval of sample inquiry means time interval to compare selected sample data with upper bound
of threshold or lower bound of threshold in terns of seconds. To configure interval of sample inquiry for
SWITCH(config-rmonalarm[1])# sample-interval 60
SWITCH(config-rmonalarm[1])#
After finishing all configurations, you need to activate RMON Alarm. To activate RMON Alarm, use the
following command.
The following is an example of activating RMON Alarm and viewing the configuration.
SWITCH(config-rmonalarm[1])# active
SWITCH(config-rmonalarm[1])# show running-config
Building configuration...
(Omitted)
rmon-alarm 1
owner test
sample-variable apSvcConnections
sample-type absolute
startup-type rising
rising-threshold 100
falling-threshold 90
rising-event 1
falling-event 2
sample-interval 60
active
(Omitted)
SWITCH(config-rmonalarm[1])#
DDJ:A-M-5524B5-01 179
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
You should make sure that all configurations are correct before activating RMON Alarm. After activating
RMON Alarm, you cannot change configuration. If you need to change configuration, you have to delete
When you need to change configuration of RMON Alarm, you should delete RMON Alarm of the number
and configure it again. To delete RMON Alarm, use the following command.
SWITCH(config)# no rmon-alarm 1
SWITCH(config)#
RMON Event identifies all operations such as RMON Alarm in switch. User can configure Event
message or Trap message to be sent to SNMP management server when sending RMON Alarm. You
need to enter into Event configuration mode to configure RMON Event. When you enter into Event
configuration mode by using the following command, the system prompt is changed to SWITCH(config-
rmonevent[n]# from SWITCH(config)#. The variable “n” is a number to distinguish each different Event.
The following is an example of entering into Event configuration mode to configure Rmon Event 1.
SWITCH(config)# rmon-event 1
SWITCH(config-rmonevent[1])#
To list available commands for RMON Event, input the question mark(?) at the system prompt on Event
configuration mode.
180 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH(config-rmonevent[1])# ?
RMON event configuration commands:
active Activate the event
community Define a community to an unactivated event
description Define description of RMON event
do To run exec commands in config mode
exit End current mode and down to previous mode
help Description of the interactive help system
owner Assign the owner who define and is using the history resources
show Show running system information
type Define the event type determines where send the event notification
SWITCH(config-rmonevent[1])#
Note
The question mark(?) you enter will not be seen. Right after entering the question mark, the
To return into configuration mode, or to enter into Privilege Exec Enable Mode, use the following
commands.
The followings are examples of returning to configuration mode and going back to Privilege Exec
SWITCH(config-rmonevent[1])# exit
SWITCH(config)#
SWITCH(config-rmonevent[1])# end
SWITCH#
When RMON Event is happened, you need to input community to transmit SNMP trap message to host.
DDJ:A-M-5524B5-01 181
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure community for trap message transmission, use the following command.
community password RMON Configures password for trap message transmission right.
It is possible to describe Event briefly when Event is happened. However, the description will not be
automatically made. Thus administrator should make the description. To make a description about
Information
User should configure Event and identify subject using various data from Event. To identify subject of
Identifies subject of Event. You can use maximum 126 characters and
owner name RMON
this subject should be same with the subject of Alarm.
182 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
When you identify subject of RMON Event, it is possible to input maximum 32 letters. If you input more
than 32 letters, the error message, “%Too long owner name” will be displayed.
When RMON Event is happened, you need to configure Event type to arrange where to send Event.
Configures Event type as log type. Event of log type is sent to the
type log
place where the log file is made.
RMON Configures Event type as trap type. Event of trap type is sent to
type trap
SNMP administrator and PC.
type log-and-trap Configures Event type as both log type and trap type.
After finishing all configurations, you should activate RMON Event. To activate RMON Event, use the
following command.
DDJ:A-M-5524B5-01 183
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of activating RMON Event and viewing the above configuration.
SWITCH(config-rmonevent[1])# active
SWITCH(config-rmonevent[1])# show running-config
Building configuration...
(omitted)
!
rmon-event 1
owner test
community password
description This event ...
type log-and-trap
active
(omitted)
SWITCH(config-rmonevent[1])#
Information
You should make sure that all configurations are correct before activating RMON Event. After activating
RMON Event, you cannot change configuration. If you need to change configuration, you have to delete
Before changing the configuration of RMON Event, you should delete RMON Event of the number and
configure it again.
SWITCH(config)# no rmon-event 1
SWITCH(config)#
184 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
7.5 Syslog
The function of syslog massage is to inform the troubles that occurred in user’s switch, to the network
manager. By default, system logger is activated in SURPASS hiD 6610. Therefore, although you delete
Information
□ Configuring Local-code
□ Disabling Syslog
In hiD 6610, Syslog message is transmitted with Level and Priority. To mark level for all Sylslog
message regardless of Priority, use the following command. Here, it is also possible to configure the
DDJ:A-M-5524B5-01 185
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure level of syslog message and place to transmit, use the following commands.
There are seven levels of syslog message according to its importance; emergencyㅣalertㅣcriticalㅣ
errorㅣwarningㅣnoticeㅣinfo. Emergency is the highest level and info is the lowest level in importance.
User can configure level of syslog, but user cannot receive messages of lower levels than user’s
configured level. That means, in order to receive all messages, user have to configure the level as info.
When user configures syslog level as error, he can receive messages of higher level than error.
If you want to receive syslog message through console on user’s PC, enter console, and if you want to
receive it within the system, enter local, and if you want to receive it remote host, enter remote.
186 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In hid 6610, it is possible to configure the Priority for Syslog Message It is possible to transmit specific
syslog message that is selected by user. Here, Level and the destination should be configured at once.
infoㅣdebug} console
You can choose auth, authpriv, cron, deamon, kern, lpr, mail, news, syslog, user, uucp as the priority in
hiD 6610. As the priority, you can also configured from local0 to local7. This is used to sort out Syslog
message of each host when Syslog server receives Syslog message from many hosts. To transmit
Syslog message by configuring Priority, use the following command.
local4ㅣlocal5ㅣlocal6ㅣlocal7} {emergㅣalertㅣcritㅣerrㅣ
warningㅣnoticeㅣinfoㅣdebug} console
local4ㅣlocal5ㅣlocal6ㅣlocal7} {emergㅣalertㅣcritㅣerrㅣ
DDJ:A-M-5524B5-01 187
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In hiD 6610, it is possible to transmit all syslog messages for remote by changing the priority. As the
priority of syslog message that is transmitted to remote, Local-code can be configured from local0 to
local7.
syslog local-code <0-7> Global Changes the Priority of all syslog into local-code.
Note
The above commands are applicable only to Syslog message, that is transmitted to remote. You don’t
have to use the commands if there’s no configuration for syslog messages to remote.
[ Sample Configuration 1 ]
The following is an example of configuring syslog message to send all logs higher than notice to
188 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 2 ]
The following is to configure Priority of all Syslog message, that is transmitted to remote, as local0.
To recovery syslog again after deleting it by “no syslog”, use the following command. Since syslog
logger is activated when booting, this command is not necessary when syslog is activated.
To show the configuration of the syslog massage, use the following “show” commands. Take notice that
the configuration of the syslog can’t be showed by using “show running-config” command.
DDJ:A-M-5524B5-01 189
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
The following shows the configuration that Emergency massage is saved in the console and Info
massage and the higher massage than Info is saved in the volatile file.
If you need to delete the log massage that is saved in the syslog file, use the following command.
clear syslog local {volatileㅣnon-volatile} Global Deletes the log massage in the Syslog file.
The user can designate which IP address to be assigned for syslog message forwarded remotely. In
order to designate which IP address to be assigned for syslog message, use the following command.
190 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
For the user who accesses from remote, it is possible to check Syslog message through the server by
sending syslog message to the server. In hiD 6610, it is possible to check Debug message in user’s
To check Debug message in remote user’s Console window, use the following command.
terminal monitor Enable Check Debug message in remote user’s own Console window.
The following is to check Debug message in remote user’s own Console window.
To disable terminal monitor in remote user’s own Console window, use the following command.
no terminal monitor Enable Disables terminal monitor in remote user’s own Console window.
SURPASS hiD 6610 has a function that sends syslog message to inform when CPU utilization excesses
configured threshold or is less than the threshold. To configure threshold of CPU utilization, use the
following command.
DDJ:A-M-5524B5-01 191
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
The default is 50% and you can configure 5, 60,600 seconds as time interval.
show cpuload Enable/Global Shows configured threshold of CPU utilization and average of CPU utilization.
The following is an example of configuring threshold of CPU utilization as 70% and checking it.
cpuload threshold : 70
timer interval : 60 seconds
SWITCH(config)#
After you configure as the above, the following message will be displayed when CPU utilization
excesses 70%.
Oct 18 17:37:24 zebra[80]: CPU Overload Warning : Threshold [70] < CPU Load [86]
And the following message will be displayed when the CPU utilization goes down less than 70%.
Oct 18 17:37:29 zebra[80]: CPU Overload Cleared : Threshold [70] > CPU Load [39]
SURPASS hiD 6610 has a function that sends syslog message to inform when port traffic excesses
192 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
The port threshold is basically configured as maximum rate value. 1000000kbps is configured for Giga
Information
threshold port disable port-number { rxㅣtx } Global Disables threshold of port traffic.
The following is an example of configuring threshold of port 1 traffic as 500Mbps and checking it.
Note
The contents for show status fan can be different according to the product.
DDJ:A-M-5524B5-01 193
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In hiD 6610, If the user configures the threshold for the switch temperature, the system informs by
syslog message when the temperature accesses the threshold and goes down under the threshold.
To configure the threshold for the temperature of the switch, use the following command in Global
configuration mode.
threshold temp <-40-100> Global Configures the threshold for the temperature of the switch.
Information
To show the temperature status and the threshold for the switch, use the following command.
show status temp Enable/Global Informs the temperature status and threshold value for the user’s switch.
The following is to configure the threshold of the temperature as 45℃ and checking it.
Temperature 1 current : 57 C
Temperature 2 current : 48 C
Temp Threshold : 45 C
SWITCH(config)#
Note
The contents for show status fan can be different according to the product.
194 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SURPASS hiD 6610 provides Rule and Qos function for traffic management. Rule function analyzes the
transmitted packets and decides packet forwarding by classified according to the designated policy.
MAC address, VLAN ID, IP address are used for distinguishing the packets in order to configure the
policy of Rule function. And the packets by this function operate as the user has configured. The user
can configure the policy in order to block unnecessary data and keep important data thorough Rule
function.
QoS(Quality of Service) is one of useful functions to provide more convenient service about network
traffic for users. It is very serviceable to prevent overloading and delaying or failing of sending traffic by
giving priority to traffic. By the way, you need to be careful for other traffics not to be failed by the traffic
configured as priority by user. QoS can give a priority to a specific traffic by basically offering the priority
When processing data, data are usually supposed to be processed in time-order like first in, first out.
This way, not processing specific data first, might lose all data in case of overloading traffics.
However, in case of overloading traffics QoS can apply processing order to traffic by reorganizing
priorities according to its importance. By favor of QoS, user can predict network performance in
◆ Rule Creation
To classify the packets according to the specific basis, configure the policies about them first. The basis
◆ Rule Action
Configure the policy classifying the packets and Precedence and DiffServ, Cos to designate the priority
DDJ:A-M-5524B5-01 195
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Prescribe Rule action for the classified packets according to the user’s requirements.
● Deny” operates for the traffic which do not meet the requirements.
◆ Scheduling
To handle overloading of traffics, you need to configure differently processing orders of graphic by using
scheduling algorithm.
SURPASS hiD 6610 provides Strict Priority Queuing, WRR(Weighted Round Robin), WFQ(Weighted
□ Creating Rule
□ Packet Counter
□ Saving Rule
□ Deleting Rule
In SURPASS hiD 6610, in order to create rule, enter into Rule configuration mode first. To enter Rule
rule name create Global To create new Rule, enter into Rule configuration mode.
196 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
After entering into Rule creation mode, the prompt changes SWITCH(config)# into SWITCH(config-
rule[name])#
The following is to enter into Rule creation mode in order to create new Rule named by “TEST”.
Information
After entering into Rule configuration mode, configure Rule that the user wants. For the rule, configure
To configure the priority for the Rule, use the following command. The higher priority Rule has, the
faster it is processed.
priority {lowㅣmediumㅣhighㅣhighest} Rule Configure the priority for the new Rule.
Information
In Rule, configure the condition for the packets and how to process the packets. Configure Rule of the
DDJ:A-M-5524B5-01 197
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
{dst-ip-addressㅣdst-ip-address/mㅣany} <0-255>
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure the Rule based on Source IP address,
{dst-ip-addressㅣdst-ip-address/mㅣany}
Destination IP address, and protocol.
{icmpㅣtcpㅣudp}
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure Message type and Code value of
{dst-ip-addressㅣdst-ip-address/mㅣany} icmp
ICMP.
{<0-255>ㅣany} {<0-255>ㅣany}
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure based on TCP Source port and
{dst-ip-addressㅣdst-ip-address/mㅣany} tcp
Destination port.
{<1-65535>ㅣany} {<1-65535>ㅣany} [tcp-flagㅣany] Rule
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure the rule based on UDP Source port
{dst-ip-addressㅣdst-ip-address/mㅣany} udp
and Destination port.
{<1-65535>ㅣany} {<1-65535>ㅣany}
port {src-port-numberㅣany}
Configure the rule based on the port.
{dst-port-numberㅣcpuㅣany}
Information
198 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
no cos
no ethtype
no ip
no mac
no tos
no vlan
After configuring the packet condition for Rule, then configure how to process the packets. To configure
match dmac dst-mac-address Designate MAC address of packets that correspond to Rule.
match redirect port-number Sends the packets correspond to Rule packet to the designate port.
match vlan <1-4094> Designate VID for the packets that correspond to Rule.
DDJ:A-M-5524B5-01 199
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
no match bandwidth
no match copy-to-cpu
no match deny
no match dmac
no match dscp Release the configuration for the process of the packets that
Rule
no match egress correspond to Rule.
no match mirror
no match permit
no match redirect
no match vlan
no-match copy-to-cpu Sends the packets that don’t correspond to Rule to CPU.
no-match dscp <0-63> Designate DSCP value in ToS area of packets that don’t correspond to Rule.
Rule
no-match mirror Sends a copy of packets that don’t correspond to Rule to mirroring port.
no-match redirect
Sends the packets that don’t correspond to Rule to the designated port.
port-number
no no-match copy-to-cpu
no no-match deny
Release the process for the packets that don’t correspond to
no no-match dscp Rule
Rule.
no no-match mirror
no no-match redirect
200 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To apply the scheduling value using the configured Rule, first apply a class that can adjust to the
scheduling value for each rule. CoS value is classified as 8 class. On the other hand, “overwite
“ variable decides whether the packets are processed with CoS class only in internal of the switch or
they are transmitted to external network with the designated CoS value. Therefore, if the command
contains “overwrite”, CoS value adjust to the packets when they communicate with external and if it is
To apply the class to the packets that correspond to Rule, use the following command.
match cos <0-7> [overwrite] Give CoS value to the packets that correspond to Rule.
DDJ:A-M-5524B5-01 201
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To adjust the class when the packets that don’t correspond to Rule, use the following command.
no-match cos <0-7> [overwrite] Give CoS value to the packets that don’t correspond to Rule.
When packets defined in rule are come, QoS policy is applied. However, suppose that packet defined to
throw out is come. In that case, it will be thrown out without any notice or record. For administrators, it
would better to know the packet is transmitting although it is unnecessary and harmful. It is possible to
know how many times packet defined in specified rule are come.
In SURPASS hiD 6610, it is possible to know how many times packet defined in specified rule are come.
To check how many times packet defined in specified rule are come, use the following command.
match counter Rule Check how many times packet defined in specified rule are come.
202 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To release the configuration for how many times packet defined in specified rule are come, use the
following command.
Release the configuration for how many times packet defined in specified
no match counter Rule
rule are come.
After configuring rule using the above commands, apply it to the switch by saving. If you don’t save and
Note
DDJ:A-M-5524B5-01 203
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
It is possible to modify the Rule configuration. To modify them, use the following command.
In SURPASS hiD 6610, it is possible to use RED, Strict Priority Queuing, WFQ(Weighted Fair Queuing),
□ Setting Weight
□ Configuring Min-bandwidth
□ Limiting Max-bandwidth
□ RED Setting
204 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, it is possible to Mapping to Que with CoS configured for packets. Basically, they
0 0 4 4
1 1 5 5
2 2 6 6
3 3 7 7
To create QoS Map, in order to classify the rule having a class to Que, use the following command in
qos map <0-7> <0-7> Global Classify the rule to Que. CoS number is 0~7, queue number is 0~7.
Note
Information
To return to Basic QoS map, use the following command in Global Configuration Mode.
DDJ:A-M-5524B5-01 205
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To process Que, it is possible to use Strict Priority Queuing, WFQ, WRR method.
Strict Priority Queuing is used to process firstly more important data than the others. Since all data are
processed by their priorities, data with high priorities can be processed fast but data without low
priorities might be delayed and piled up. This method has a strong point of providing the distinguished
service with a simple way. However, if the packets having higher priority enter, the packets having lower
The processing order in Strict Priority Queuing in case of entering packets having the Que number
as belows.
7 1 3 4 6 7 7 7
WRR processes packets as much as Weight. Processing the packets that have higher priority is the
same way as Strict Priority Queuing. However, it passes to next stage after processing as configured
Weight so that it is possible to configure for packet process not to be partial to the packets having
higher priority. However, there’s a limitation of providing differentiated service from those existing
service.
206 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The processing in WRR when the packets having following Que numbers
3
Que W 7
0 1
1 1 6
2 1 7 6 7 1 3 6 7 7
3 1
4 1 7
5 1 6
6 1
7 2 1
WFQ has only good points of Strict Priority Queuing and WRR. If the bandwidth are configured for all
Ques, the packets of appropriate Que can be processed in the assigned bandwidth.
The processing in WRQ when the packets having following Que numbers
3
Que BW 7
7
0 7 50Mbps
1 6
7
2 7
3
7 6 50Mbps
4
5 6 6
6 50Mbps
1
7 50Mbps
DDJ:A-M-5524B5-01 207
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To decide one among three scheduling methods, use the following command.
Inforamtion
In WRR, the packets are processed by Weight. The user can configure the weight value.
Information
Information
WFQ restricts the traffic of appropriate Que with bandwidth. Therefore, in order to use WFQ, you should
configure the assured bandwidth for every Que. This assured bandwidth is Min-bandwidth.
Information
In SURPASS hiD 6610, the minimum of the assured bandwidth is configured as “0”.
208 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
In case of processing scheduling by Strict Priority Queuing, it is possible to concentrate on the packets
of one kind of class. To prevent this, it is possible to limit the bandwidth. Also, it is possible to configure
redundant bandwidth for the packets over assured bandwidth. The function is Max-bandwidth.
Max-bandwidth is used to restrict the bandwidth processing the packets of appropriate Que in Strict
For example, in WFQ, if Min-bandwidth is configured as 10Mbps for specific Que and Max-bandwidth
Packet
Min-bandwidth
(Guarantee)
Max-bandwidth
(Possibility)
DDJ:A-M-5524B5-01 209
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure the maximum bandwidth used for appropriate Que, use the following command.
Information
Queue processing for CPU packet can be set up by user with two scheduling methods, Strict Priority
To select which scheduling method of the two, use the following command.
qos cpu scheduling-mode {spㅣwrr} Global Selects scheduling method for CPU packet.
Information
WRR method is a packet processing method according to weight value. Weight value can be
designated by user.
Information
qos cpu weight <0-7> <1-15> Assigns weight value from “1’” to “15”
Global
qos cpu weight <0-7> unlimited Handles designated queue with Strict Priority Queuing
210 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
RED, which utilizes end-to-end flow-control of TCP, is a random packet dropping function when traffic
reaches the user-designated threshold even before it reaches maximum buffer size. If traffic usage
reaches maximum buffer size, all packets can be dropped, which makes packet loss. Therefore, in order
to prevent packet loss or unstable traffic transmission, user can restrict excessive traffic over buffer size
by setting up a threshold. With RED function, packet loss can be reduced and stable packet
transmission can be acquired. To apply RED function, RED function needs to be enabled.
To utilize RED function, start queue length value and drop probability are necessary. Start queue length
represents the starting point of random packet dropping, and drop probability indicates the percentage
of packet dropping from the starting point of random packet dropping to the point of complete dropping.
If probability is large, large amount of packets would be dropped, therefore complete dropping point is
slowly reached. On the other hand, if probability is little, little amount of packets would be dropped,
therefore complete dropping point is quickly reached. If probability value is 1, dropping packet would be
none and the value is 15, all packets would be dropped from the point of start queue length value is
Drop
100%
Probability
S X Queue
Length
In Above figure, “S” indicates start queue length value and “X” is the point of complete dropping. If
queue length reaches “S’, packet would be randomly dropped, and if it reaches “X”, packet would be
completely dropped. At this moment, it is probability that shows how many packets are dropped as “S”
approaches to “X”.
DDJ:A-M-5524B5-01 211
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To set up RED function by designating start threshold and probability, use following command.
qos red <0-7> start <0-127> probability <1-15> Global Designates start threshold and probability for CPU
Information
Information
Above command just disables RED function, and does have not influence on the setting value
show qos port-number Displays set-up for QoS scheduling per each port
Enable/Global
show qos cpu Displays set-up for QoS scheduling of CPU packet
212 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, it is possible to configure to block the service access such as telnet, ftp, icmp,
snmp accessing to switch. To block the service such as telnet, ftp, icmp, snmp entering to switch, use
In SURPASS hiD 6610, in order to create Admin access rule, enter into Rule configuration mode first.
To enter Admin access rule configuration mode, use the following command.
rule name create admin Global To create Admin access Rule, enter into Admin access Rule mode.
After entering into Admin access rule mode, the prompt changes SWITCH(config)# into
SWITCH(config-admin-rule [name])#
The following is to enter into Admin access rule mode in order to create new Admin access rule named
by “TEST”.
DDJ:A-M-5524B5-01 213
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
After entering into Admin access rule configuration mode, configure Admin access rule that the user
wants. For the Admin access rule, configure the packet condition and how to process the packets.
To configure the priority for the Rule, use the following command. The higher priority Rule has, the
faster it is processed.
priority
Admin access rule Configure the priority for the new Admin Access Rule.
{lowㅣmediumㅣhighㅣhighest}
Information
In Admin access rule, you can configure the condition for the packet and how to process the packets
that correspond to the condition. Configure Admin access rule with various conditions.
214 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
{dst-ip-addressㅣdst-ip-address/mㅣany} <0-255>
{icmpㅣtcpㅣudp} protocol.
Admin
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
access Configure Message type and Code value of
{dst-ip-addressㅣdst-ip-address/mㅣany} icmp
rule ICMP.
{<0-255>ㅣany} {<0-255>ㅣany}
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure the rule based on TCP Source port
{dst-ip-addressㅣdst-ip-address/mㅣany} tcp
and Destination port.
{<1-65535>ㅣany} {<1-65535>ㅣany} [tcp-flagㅣany]
ip {src-ip-addressㅣsrc-ip-address/mㅣany}
Configure the rule based on UDP Source
{dst-ip-addressㅣdst-ip-address/mㅣany} udp
port and Destination port.
{<1-65535>ㅣany} {<1-65535>ㅣany}
Information
After configuring the condition of packets for Admin access rule, configure how to process the packets.
DDJ:A-M-5524B5-01 215
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
no match deny Disable the configuration for the packet process of Admin access
Admin access rule
no match permit rule
To process the packets that don’t correspond to the Rule, use the following command.
no-match deny Deny the packets that correspond to Admin access rule.
Admin access rule
no-match permit Permit the packets that don’t correspond to Admin access rule.
no no-match deny Release the configuration for the process of packets which
Admin access rule
no no-match permit don’t correspond to Admin access rule.
After configuring Admin access rule using the above commands, apply it to the switch by saving. If you
don’t save and apply Admin access rule to the switch, all configurations are deleted.
To save and apply Admin access rule, use the following command.
apply Admin access rule Save Admin access rule and apply it to the switch.
Note
216 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To check the configured Admin access rule Profile, use the following command.
show rule-profile Admin access rule Check the Profile of appropriate Admin access rule.
show rule admin Check the profile of all Admin access rule.
View/Enable/Global
show rule all Check all Rule and all Admin access rule Profile.
It is possible to modify the Admin-access-rule configuration. To modify them, use the following
command.
To delete the configure Admin access rule, use the following command.
DDJ:A-M-5524B5-01 217
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring Rule as “TEST” and applying it to the system.
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST create
SWITCH(config-rule[TEST])# priority high
SWITCH(config-rule[TEST])# ip 10.1.1.1 20.1.1.1 tcp 22 any
SWITCH(config-rule[TEST])# cos 0
SWITCH(config-rule[TEST])# match deny
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config-rule[TEST])# apply You should apply it to the system.
SWITCH(config-rule[TEST])# exit
SWITCH(config)# show rule
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config)#
If you don’t apply it to the system and change to other configuration, all the configuration is deleted as
follows.
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST create
SWITCH(config-rule[TEST])# priority high
SWITCH(config-rule[TEST])# ip 10.1.1.1 20.1.1.1 tcp 22 any
SWITCH(config-rule[TEST])# cos 0
SWITCH(config-rule[TEST])# match deny
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config-rule[TEST])# exit
SWITCH(config)# show rule
There’s no configured rule.
SWITCH(config)#
218 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST modify
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match deny
SWITCH(config-rule[TEST])# match permit
SWITCH(config-rule[TEST])# show rule-profile
rule TEST
priority high
cos 0
ip 10.1.1.1/32 20.1.1.1/32 tcp 22 any
match permit
SWITCH(config-rule[TEST])# apply
SWITCH(config-rule[TEST])# exit
SWITCH(config)#
DDJ:A-M-5524B5-01 219
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is how to configure Strict Priority Queuing on SURPASS hiD 6610.
PORT Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7
-------------------------------------
1 UN UN UN UN UN UN UN 50
2 UN UN UN UN UN UN UN 50
3 UN UN UN UN UN UN UN 50
4 UN UN UN UN UN UN UN 50
5 UN UN UN UN UN UN UN 50
6 UN UN UN UN UN UN UN UN
7 UN UN UN UN UN UN UN UN
8 UN UN UN UN UN UN UN UN
9 UN UN UN UN UN UN UN UN
10 UN UN UN UN UN UN UN UN
11 UN UN UN UN UN UN UN UN
12 UN UN UN UN UN UN UN UN
13 UN UN UN UN UN UN UN UN
14 UN UN UN UN UN UN UN UN
15 UN UN UN UN UN UN UN UN
16 UN UN UN UN UN UN UN UN
17 UN UN UN UN UN UN UN UN
18 UN UN UN UN UN UN UN UN
19 UN UN UN UN UN UN UN UN
20 UN UN UN UN UN UN UN UN
21 UN UN UN UN UN UN UN UN
22 UN UN UN UN UN UN UN UN
23 UN UN UN UN UN UN UN UN
24 UN UN UN UN UN UN UN UN
25 UN UN UN UN UN UN UN UN
26 UN UN UN UN UN UN UN UN
SWITCH(config)#
220 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
PORT Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7
-------------------------------------------------------------
1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
2 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
3 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
4 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
5 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
6 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
7 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
8 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
9 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
10 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/5
11 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
12 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
13 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
14 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
15 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/4 UN/1
16 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
17 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
18 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
19 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
20 UN/1 UN/1 UN/1 UN/1 UN/1 UN/3 UN/1 UN/1
21 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
22 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
23 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
24 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
25 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
26 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1 UN/1
SWITCH(config)#
DDJ:A-M-5524B5-01 221
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
PORT Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7
---------------------------------------------------------------------
1 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
2 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
3 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
4 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
5 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
6 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
7 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
8 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
9 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
10 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 25/20 35/30
11 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
12 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
13 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
14 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
15 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
16 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
17 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
18 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
19 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
20 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
21 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
22 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
23 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
24 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
25 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
26 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0 UN/0
SWITCH(config)#
222 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH(config)#
The following is an exmple of configuring not to permit all telent to the switch.
SWITCH> enable
SWITCH# configure terminal
SWITCH(config)# rule TEST create admin
SWITCH(config-admin-rule[TEST])# priority high
SWITCH(config-admin-rule[TEST])# ip 10.1.1.1 20.1.1.1 tcp 22 any
SWITCH(config-admin-rule[TEST])# cos 0
SWITCH(config-admin-rule[TEST])# match deny
SWITCH(config-admin-rule[TEST])# apply
SWITCH(config-admin-rule[TEST])# exit
SWITCH(config)#
If you save the configured Admin access rule and go out from Admin access rule configuration
mode without applying it to the switch, all of the configuration would be deleted.
DDJ:A-M-5524B5-01 223
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
NetBIOS is used at LAN(Local Area Network) environment where should share information with each
other to communicate between computers. However, in case ISP(Internet Service Provider) provides
internet communication through LAN service to specific area such as apartments, customer’s
Cyber Apt.
LAN environment for Internet Service
Information Shared
In this case, without NetBIOS filtering, customers’ data may be opened to each other even though the
data should be kept. To keep customer’s information and prevent sharing information in the above case,
To release NetBIOS filtering according to user’s request, use the following command.
224 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring NetBIOS filtering in port 1~5 and confirming it.
DHCP(Dynamic Host Control Protocol) makes DHCP server assign IP address to DHCP clients
automatically and manage the IP address. Most ISP operators provide the service as such a way. At this
time, if a DHCP client connects with the equipment that can be the other DHCP server such as Internet
DHCP filtering helps to operate DHCP service by blocking Request which enters through subscriber’s
port and goes out into uplink port or the other subscriber’s port and Reply which enters to the
subscriber’s port.
In the below example, server A has the IP area from 192.168.10.1 to 192.168.10.10. Suppose a user
connects with Client 3 that can be DHCP server to A in order to share IP address from 10.1.1.1 to
10.1.1.10.
DDJ:A-M-5524B5-01 225
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Here, if Client 1 and Client 2 are not blocked from Client 3 of DHCP server, Client 1 and Client 2 will
request and receive IP from Client 3 so that communication blockage will be occurred.
Therefore, the filtering function should be configured between Client 1 and Client 3, Client 2 and Client
3 in order to make Client 1 and Client 2 receive IP without difficulty from DHCP server A
To configure DHCP filtering function in particular port according to user’s demand, after enabling filtering
function, designate the port needing DHCP filtering function by using the following command.
226 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example for configuring DHCP filtering from 1 to 5 and checking it.
It is possible to block packets, which try to bring different source IP out from same network. If packet
brings different IP address, not its source IP address, then it is impossible to know it makes a trouble.
Therefore, you would better prevent this kind of packet outgoing from your network. This function is
named as Martian-filter.
To block packets, which try to bring different source IP out from same network, use the following
command.
Note
It is not possible to configure both Qos and Martin Filtering at the same time.
DDJ:A-M-5524B5-01 227
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
ip martian-filter br1
(omitted)
SWITCH(config)#
It is possible to forward frame to MAC address of destination. Without specific performance degradation,
The basic policy of filtering based on system is set to allow all packets for each port. However the basic
After configuring basic policy of filtering for all packets, use the following command on Bridge mode to
228 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
By default, basic filtering policy provided by system is configured to permit all packets in each port.
[ Sample Configuration 1 ]
You can add the policy to block or to allow some packets of specific address after configuring the basic
policy of MAC Filtering. To add this policy, use the following commands on Bridge mode.
DDJ:A-M-5524B5-01 229
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
Variable MAC-ADDRESS is composed of twelve digits number in Hexa decimal. It is possible to check it
To confirm user’s configuration about MAC filter policy, use the following commands.
show mac-filter count Enable/ Global Shows MAC filter policy as many as user configures.
/Bridge Shows filter policy concerned with specified MAC
show mac-filter count mac-address
address as many as user configures.
[ Sample Configuration 2 ]
The latest policy is recorded as number 1. The following is an example of permitting MAC address
230 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
When you need to make many MAC filtering policies at a time, it is hard to input command one by one.
In this case, it is more convenient to save MAC filtering policies at “/etc/mfdb.conf” and display the list
of MAC filtering policy. To view the list of MAC filtering policy at /etc/mfdb.conf, use the following
command.
mac-filter list Bridge Shows the list of MAC filtering policy at /etc/mfdb.conf.
User can limit the number of users by configuring maximum number of users also named as Max host
for each port. In this case, you need to consider not only the number of PCs in network but also devices
For SURPASS hiD 6610, you have to lock the port like MAC filtering before configuring Max Host. In
case of ISPs, it is possible to arrange billing plan for each user by using this configuration.
DDJ:A-M-5524B5-01 231
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
When Max host is configured as “0”, no one can connect to the port.
The following is an example of configuring to allow two MAC addresses to port 1, and five addresses to
SWITCH(bridge)# max-hosts 1 2
SWTICH(bridge)# max-hosts 2 5
SWTICH(bridge)# max-hosts 3 5
SWTICH(bridge)# max-hosts 4 10
SWTICH(bridge)#
232 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Max-new-hosts is to limit the number of users by configuring the number of MAC address that can be
Learning on the system and on the port for a second. The number of MAC address that ca be Learming
on the system has the priority. To configure Max-new-hosts, use the following command.
Note
If MAC that is already counted disappears before passing 1 seconds and again starts Learning, it is
not counted.
Note
In case the same MAC changes the port, it is not counted again. For example, if MAC that is Learning
port number 1 is Learning port number 2, it is supposed to move the port. So, it is deleted from port
DDJ:A-M-5524B5-01 233
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[ Sample Configuration 1 ]
The following is to limit the number of MAC address that can be Learning on the system for a second as
10 and limit the number of MAC address that can be Learning on the port number 1-10 for a second as
3.
port 1 : 3
port 2 : 3
port 3 : 3
port 4 : 3
port 5 : 3
port 6 : 3
port 7 : 3
port 8 : 3
port 9 : 3
port 10 : 3
port 11 : Unlimited
port 12 : Unlimited
port 13 : Unlimited
port 14 : Unlimited
port 15 : Unlimited
port 16 : Unlimited
port 17 : Unlimited
port 18 : Unlimited
port 19 : Unlimited
port 20 : Unlimited
port 21 : Unlimited
--More--
SWITCH(bridge)#
In the above configuration, after MAC is Learning on the port number 1-10, when 11th MAC starts
Learning, it is limited because the number of MAC address, that can be Learning on the system for a
234 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
There are two types of addresses registered in MAC table: Dynamic address and Static address.
Dynamic address is deleted when it is not used after the switch registers it in MAC table. Static address
is the configured address by user that is remained even after rebooting. To register Static address in
show mac bridge-name [port-number] Enable/Global/Bridge Shows MAC address user configured.
The following is an example of registering MAC address 00:01:02:9a:61:17 in port 13 MAC table of 1.
The following is an example of showing MAC address of destination, the specified port number, VLAN
To delete Static address in MAC table, use the following commands on Bridge configuration mode.
DDJ:A-M-5524B5-01 235
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Devices connected to IP network have two address, LAN address and network address. LAN address is
sometimes called as data link because it is used in Layer 2 level, but more commonly the address is
Switch on Ethernet needs 48-bit-MAC address to transmit packets. In this case, the process of finding
proper MAC address from IP address is called as address resolution. On the other hand, the progress
of finding proper IP address from MAC address is called as reverse address resolution. Siemens’
switches find MAC address from IP address through Address Resolution Protocol(ARP). ARP saves
these addresses in ARP table for quick search. Referring to IP address in ARP table, packet attached IP
address is transmitted to network. When configuring ARP table, it is possible to do it only in some
specific interfaces.
To match a specific IP address and MAC address, use the following command on configuration mode.
arp ip-address mac-address Saves IP address and MAC address in ARP table. Also
Global
[interface-name] possible to configure a specific interface.
To view ARP table, use the following command on Privilege Exec Enable Mode or configuration mode.
To release ARP function about IP address and MAC address, use the following command on
configuration mode.
236 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
7.14 ARP-Alias
Although clients are joined in same client switch, it may be impossible to communicate between clients
for their private security. When you need to make them communicate each other, SURPASS hiD 6610
supports ARP-alias, which responses ARP request from client net through Concentrating switch. In the
below picture, it is impossible to communicate between clients 10.1.1.2~10.1.1.5. In this case, you can
configure ARP-alias to response ARP request from the clients 10.1.1.2~10.1.1.5. Through
Internet
Concentrating
Client Switch
② ARP requests of
10.1.1.2~10.1.1.5 sent to
Concentration Switch
Client Net
For private security
10.1.1.2 10.1.1.3 10.1.1.4 10.1.1.5 impossible to communicate
between clients
∴ No ARP between Clients.
DDJ:A-M-5524B5-01 237
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To register address of client net range in ARP-Alias, use the following command.
arp-alias start-ip-address end-ip-address Registers IP address range and MAC address in ARP-
Global
[mac-address] Alias to make user’s equipment response ARP request.
Information
Unless you input MAC address, MAC address of user’s equipment will be used for ARP response.
no arp-alias start-ip-address
Global Deletes registered IP address range of ARP-Alias.
end-ip-address
【 Sample Configuration 1 】
The following is an example of configuring ARP-Alias by registering IP address from 10.1.1.2 to 10.1.1.5.
Unless you input MAC address as the above example, MAC address of hiD 6610 will be used.
7.15 Proxy-ARP
SURPASS hiD 6610 has Proxy-ARP, which responses ARP request instead of other equipment. In the
below picture, Host A has IP address 172.16.10.100 and the subnet mask is set to /16. So, it is
238 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In case Host A needs to send packet to Host D, Host A is supposed to send ARP request considering
that Host D is on the same network. Since ARP request is transferred through broadcast, the ARP
request from Host A is sent not to Host D, but to 1 interface and nodes belonged to subnet A.
Host A Host B
172.16.10.100/16 172.16.10.200/24
br1 172.16.10.99/24
subnet A
subnet B
Host C Host D
172.16.20.100/24 172.16.20.200/24
However, SURPASS hiD 6610 is aware that Host D belongs to other subnet and able to transmit packet
to Host D. Therefore it responses to ARP request from Host A with its own MAC address. Using this way,
all ARP requests from subnet A to subnet B are responded with MAC address of SURPASS hiD 6610.
Packets, which should be transmitted to Host D from Host A are well transmitted through SURPASS hiD
6610.
To configure Proxy-ARP, enter into Interface configuration mode of specific interface and use the
following command.
DDJ:A-M-5524B5-01 239
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
【 Sample Configuration 1 】
In SURPASS hiD 6610 3.02 NOS, by broadcasting Gratuitous ARP containing IP address and MAC
address of gateway, the network is accessible even though IP addresses of specific host’s gateway are
repeatedly assigned.
Configure Gratuitous ARP interval and transmission count using following commands. And configure
Gratuitous ARP is transmitted after some time from transmitting ARP reply.
240 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring the transmission interval as 10 sec and transmission times
SWITCH(config)# arp-patrol 10 4
SWITCH(config)# show running-config
Building configuration...
Current configuration:
hostname SWITCH
(Omitted)
arp-patrol 10 4
!
no snmp
!
SWITCH(config)#
SURPASS hiD 6610 provides packet routing function based on CPU, host, or network, which means the
capacity for packet routing ways has been larger than before.
Information
To configure a packet routing way based on CPU, host, or network, use the following command.
Information
Although user configures more than two routes for packets in the same network using the packet routing
way based on network, only one route is available. In case of being impossible to use the first route,
DDJ:A-M-5524B5-01 241
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
ICMP stands for Internet Control Message Protocol. When it is impossible to transmit data or configure
The first 4 bytes of all ICMP messages are same, but the other parts are different according to type field
There are fifteen values of field to distinguish each different ICMP message, and code field value helps
0 7 15 16 31
The following table shows explanations for fifteen values of ICMP message type.
11 time exceeded
It is possible to control ICMP message through user’s configuration. You can configure not to send echo
reply message to the partner who is taking ping test to device and interval to transmit ICMP message.
242 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to configure not to send echo reply message to the partner who is taking ping test to
Blocks echo reply message to all partners who are taking ping
ip icmp ignore echo all
test to device.
Global
Blocks echo reply message to partner who is taking broadcast
ip icmp ignore echo broadcast
ping test to device.
It is possible to configure interval to transmit ICMP message. After you configure the interval, ICMP
message will not be sent until configured time based on the last message is up. For example, if you
configure the interval as 1 second, ICMP will not be sent within 1 second after the last message has
been sent.
To configure interval to transmit ICMP message, the administrator should configure the type of message
DDJ:A-M-5524B5-01 243
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure the interval to transmit ICMP message, use the following command.
ip icmp interval rate-mask mask Global Configures the interval to transmit ICMP message
Information
ICMP_ECHOREPLY 0 ICMP_DEST_UNREACH 3
ICMP_SOURCE_QUENCH 4 ICMP_REDIRECT 5
ICMP_ECHO 8 ICMP_TIME_EXCEEDED 11
ICMP_PARAMETERPROB 12 ICMP_TIMESTAMP 13
ICMP_TIMESTAMPREPLY 14 ICMP_INFO_REQUEST 15
ICMP_INFO_REPLY 16 ICMP_ADDRESS 17
ICMP_ADDRESSREPLY 18
How to calculate Mask is as follows. If mask that is input as hexadecimal number is calculated as binary
number,“1” means “Status ON”, “0” means “Status OFF”. In binary number, if the digit showed as “1”
matches with the value of ICMP message, it means ICMP Message is selected as “Status ON”. Digit
Note
For example, if hexadecimal number “8” is changed as binary number, it is “1000”. In 1000, 0 digit is “0”
and 1 digit is “0”, 2 digit is “0” and 3 digit is “1”. The digit showed as “1” is “3” and
244 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
Information
1100000011000. By calculating from 0 digit, 3 digit, 4 digit, 11 digit, 12 digit is “1” and it is “STATUS ON”.
Therefore, the message that corresponds to 3,4,11,12 is chosen as the message limiting the
transmission rate.
TYPE STATUS
ICMP_ECHOREPLY(0) OFF
ICMP_DEST_UNREACH(3) ON
ICMP_SOURCE_QUENCH(4) ON
ICMP_REDIRECT(5) OFF
ICMP_ECHO(8) OFF
ICMP_TIME_EXCEEDED(11) ON
ICMP_PARAMETERPROB(12) ON
ICMP_TIMESTAMP(13) OFF
ICMP_TIMESTAMPREPLY(14) OFF
ICMP_INFO_REQUEST(15) OFF
ICMP_INFO_REPLY(16) OFF
ICMP_ADDRESS(17) OFF
ICMP_ADDRESSREPLY(18) OFF
DDJ:A-M-5524B5-01 245
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure how much time ICMP transmission time is limited, use the following command.
ip icmp interval rate-limit interval Global Configures how much time ICMP transmission time is limited
Information
Information
Information
246 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 1]
The following is to limit the transmission rate of the message for ICMP_ECHO, ICMP_INFO_REQUEST,
ICMP_INFO_REPLY.
by changing binary number which 8 digit, 15 digit, 16 digit is “1” into hexadecimal number. As binary
User can configure to transmit ICMP Redirect Message. Transmitting ICMP Redirect Message is one of
the ways preventing DoS(Denial of Service), and this can make the switch provide the constant service
to the hosts.SURPASS hiD 6610 transmits more optimized route to the host than the present route
between the host connected to the switch and the specific destination.
DDJ:A-M-5524B5-01 247
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To activate the function transmitting ICMP Redirect Message, use the following command.
The following is an example for configuring ICMP Redirect Message and checking the configuration.
(omitted)
interface 1
ip address 222.121.68.247/24
!
!
!
SWITCH(config)# ip redirects
SWITCH(config)# show running-config
(omitted)
interface 1
ip address 222.121.68.247/24
!!
ip redirects
!
!
SWITCH(config)#
TCP(Transmission Control Protocol) header includes six kinds of flags that are URG, ACK, PSH, RST,
SYN, and FIN. In SURPASS hiD 6610, you can configure RST and SYN as the below.
□ RST Configuration
□ SYN Configuration
248 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
RST sends a message that TCP connection cannot be done to a person who tries to make it. However,
it is also possible to configure not to send the message. This function will help prevent that hackers can
To configure not to send the message that informs TCP connection cannot be done, use the following
command.
Information
SYN sets up TCP connection. SURPASS hiD 6610 transmits cookies with SYN to a person who tries to
make TCP connection. And only when transmitted cookies are returned, it is possible to permit TCP
connection. This function prevents connection overcrowding because of accessed users who are not
using and helps the other users use service. To permit connection only when transmitted cookies are
returned after sending cookies with SYN, use the following command.
DDJ:A-M-5524B5-01 249
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 1]
The following is an example of disabling RST and permitting only when transmitted cookies are returned
250 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
This chapter describes main functions of this switch such as VLAN, Port trunking, and STP. It contains
■ VLAN
■ Port Trunking
■ LACP Configuration
■ Stacking
■ Flood-Guard
■ Configuring Bandwidth-share-group
■ IP IGMP
■ PIM-SM
■ VRRP
■ Bandwidth
■ DHCP
Every nodes in the same LAN could get the information from a node by Broadcast. However, there’s the
inconvenience of having unnecessary information from Broadcast. Here, if you divide LAN into logical
LAN again, nodes only on the same logical LAN would get the information from Broadcast.
LAN, separated like this way is named VLAN (Virtual LAN). It is logical Network logically separated as
user’s needs and a VLAN contains many ports. The network composed of VLAN can transmit the
DDJ:A-M-5524B5-01 251
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
br 1 br 3
br 2
In the above figure, br1, br2, br3 configured as VLAN is logically configured virtual network. If it
operates as Layer 2, it is possible to communicate in the same virtual network, however it is impossible
to communicate with other virtual network. SURPASS hiD 6610 provides Layer 3 switching function so
that it makes the ports in the other VLAN to communicate with each other.
VLAN decreases Ethernet traffic to improve transmit rate and strengthens security by transmission per
VLAN. You can construct VLAN based on port, MAC address, and protocol. VLAN based on the port
designate VLAN as ports, a port could belong to various VLANs. VLAN based on MAC addresses
configures VLAN with their MAC addresses. Even though the administrator changes the connection port,
VLAN is not changed because it uses its own MAC address. Also, VLAN based on protocol is the way
of structuring VLAN by the protocol. SURPASS hiD 6610 supports VLAN based on the port and the
protocol. The number of VLAN which can be generated from VLAN is 4096 and it is possible to
In order to decide the packet path, first of all, VLAN based on the protocol is used. When the packet is
transmitted, it is forwarded to VLAN as the user configured. However, if the user did not configure VLAN
for the packet, the packet path would be decided according to the port.
252 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SURPASS hiD 6610 according to IEEE 802.1q standards already has VLAN ID(PVID) on the all ports. If
the packet entering to Tagged port keeps its VLAN ID and the packet transmitting to Untagged port
receives PVID that the system configured. In other words, if a port of SURPASS hiD 6610 ports
The following is how to decide packet route by VLAN configured in SURPASS hiD 6610 S.
There’s VLAN
Transmits
Untagged
→ → packets by giving
port
PVID on them
◆ Cost-Effective Way
When you use VLAN to prevent unnecessary traffic loading because of broadcast, you can get cost-
◆ Strengthened Security
Usually node shares broadcast information, in some case, authorization is required for the information.
VLAN supports the way for VLAN member consisted of only authorized users so that network security
DDJ:A-M-5524B5-01 253
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
□ Default VLAN
□ Configuring QinQ
□ Configuring FID
In SURPASS hiD 6610, all ports are basically configured as Default VLAN. Default VLAN designates
PVID as 1 and it is impossible to deleted. In order to contain the ports in newly generated VLAN without
duplication, the user should delete the ports from Default VLAN. The ports deleted from other VLAN are
automatically contained in Default. Also, the ports that are once the member port of Trunk port and then
The following is an example of deleting port number 3 from br2 and showing it to return to Default status
again.
254 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to configure VLAN based on the port in SURPASS hiD 6610, first of all, newly make VLAN and
designate the member and assign PVID for them. The following describes VLAN configuration as
follows.
□ Making VLAN
□ Specifying PVID
□ Releasing VLAN
In SURPASS hiD 6610, make vlan-name form “brN” (N=integer) in order to make VLAN. Here, VID for
each VLAN is automatically configured as “N”. In other words, VID for br2 is 2 and VID for br100 is 100.
Default VLAN is VLAN that has VID 1.
Therefore the user can not make VLAN which has the name of br1.
In order to configure new VLAN in user’s network, user the following command.
vlan create vlan-name Bridge By designating VLAN name, make new VLAN.
Information
Make vlan-name form “brN” (N=integer) or “N”. If you input wrong letter, not BrN, the following
message will be displayed.
Information
In order to use vlan-name for “N”, you can input large range by using “-” and display them by using “,”.
DDJ:A-M-5524B5-01 255
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, “N” for vlan-name is automatically configured as VID. For example, if vlan-name
The user can designate PVID. In order to designate PVID on the port, use the following command.
After making VLAN newly, you should assign port for it. In SURPASS hiD 6610, because all ports are
basically integrated in interface “default”, you should delete all ports from “default” in order to assign
ports to another VLAN without duplication.
Information
In SURPASS hiD 6610, all ports basically belong to “default”. In order to assign them to VLAN without
vlan add vlan-name port-number Designate the port which VLAN to belong and
Information
When you designate many ports in VLAN, displays the port number using “,” without vacancy. In order
256 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to delete VLAN configured in SURPASS hiD 6610, you should delete all ports in appropriate
Step 1 In bridge mode, delete all ports in VLAN by using the commands.
Step 2 Enter interface mode from configuration mode in order to disable virtual interface.
Input the name of VLAN which is going to be deleted and enter into
Interface interface-name Global
interface mode.
DDJ:A-M-5524B5-01 257
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
If you delete VLAN, all ports in appropriate VALN will be disabled. There ports keep disabled status
In order to configure VLAN based on protocol, designate port, protocol, PVID. If an entering packet
corresponds to the protocol composing of VLAN, it is transmitted to VLAN according to the configured
PVID.
no vlan pvid port-number ethertype [ethertype] Bridge Clears configured VLAN based on protocol.
In the QinQ environment, it is possible to communicate between networks where different VLANs are
It is also called Double Q-tag because another Tag is attached to in order to send a packet.
In existing network environment, suppose that there are two switches composed of different VLAN. For
all switches connecting those two switches, VLAN should be configured just the same. However, you
don’t need to configure a number of VLAN by using QinQ function in SURPASS hiD 6610.
258 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Network A-1
communication with PVID 10 Network A-1/A-2 and Network other
VLAN is configured with PVID 3.
In above figure, when Network A-1 sends packet to Network A-2, packets are transmitted to QinQ port
of SWITCH 1 and the transmitted packets are sent to Network A-2 through SWITCH 2 where Qin Q has
been configured.
If you configure QinQ on the port connected to Network A-2, the original PVID shows by taking off
covered PVID.
Here, if packets are sent to SWITCH1 from Network A-1, the packets going out from QinQ port attach
other Tag. This Tag is to use transmit packets from Network where a number of VLAN are configured.
When packets are transmitted to Network A-2 through QinQ of SWITCH 2, the attached Tag on QinQ
Note
Because not QinQ port but other ports should transmit Tagged packet, it should be configured as
Tagged port.
DDJ:A-M-5524B5-01 259
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure QinQ, configure the port where other VLAN is configured as QinQ and configure
PVID used for other VLAN ‘s network on that port. In case of 【 Figure 7-1-3 】The construction
Step 1 In order to configure the port where QinQ is configured, follow below order.
vlan dot1q-tunnel enable port-number Bridge Configure QinQ on the designated port.
Information
The port where QinQ is configured does not operate as a member of VLAN.
Step 2 Configure the same PVID with network communicating to other VLAN on the port where
QinQ is configured.
vlan pvid port-number <1-4094> Bridge The user Configure PVID from 1~4094.
TPID(Tag Protocol Identifier) shows the kind of Tag protocol and currently used protocol. The user can
change TRIP.
Information
In TPID, the port configuring 802.1q(0x8100) does not operate as the member of VLAN.
260 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
vlan dot1q-tunnel disable port-number Bridge Release the configuration as QinQ port.
Note
This configuration is applied if only SURPASS hiD 6610 is used as L2 dedicated switch.
SURPASS hiD 6610 is actually Layer 3 switch and it is possible to use as Layer 2 dedicated switch. In
case the user uses it as Layer 2 switch, because there’s no routing function, it is not possible to
communicate between VLAN. Specially, the port designated as Uplink port should receive packets from
all VLAN. In case of using it as Layer 2 switch, if the user doesn’t configure Uplink port in all VLAN, it is
DDJ:A-M-5524B5-01 261
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Therefore, in order to configure VLAN in Layer 2 Switch, you should configure Uplink port to belong in
default
X
br2
External
Network
X
br3
br4 X
Uplink
Port
【 Figure 8-4 】In case the packets going outside in Layer 2 environment
In the above configuration, when Untagged packet enters into port number 1, PVID would attach tag 1.
Because Uplink port 24 belongs to VLAN 1, it is possible to transmit to port number 24.
The problem is Untagged packet entering into Uplink port. It is hardly known Untagged packet coming
down Uplink port would be transmitted to which port with what kind of PVID.
262 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
default
X
br2
External
Network
? X
br3
br4 X
Uplink When untagged packets that
Port should be transmitted to br3
through Uplink port, it is
impossible to know what kind of
PVID should be attached
【 Figure 8-5 】In case external packets enter under Layer 2 environment ①
In order to transmit untagged packets Uplink port to the other port, you should create a VLAN having all
By this configuration, Uplink port recognizes all ports. Here, what helps packet transmission is FID.FID
is used to control MAC table and it is possible to inform the packet process because same FID
manages with same MAC table. If you don’t configure FID equally, packet would be Flooded because
DDJ:A-M-5524B5-01 263
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWITCH(bridge)#
default
br2
External
Network br3
br4
Uplink
Port
Packet transmission to br3 is possible since a
connection is established among them.
Therefore for L2 exclusive use, add Uplink port to all VLAN as a member and create one more VLAN
having all ports as a member and configure FID equally for the communication between VLANs. In
vlan fid vlan-name fid Bridge Fid value is from 1to 4094
264 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, it is possible to confirm port based VLAN, protocol based VLAN, QinQ.How to
show vlan description Enable/Global/Bridge Shows the description for specific VLAN.
DDJ:A-M-5524B5-01 265
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
266 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
DDJ:A-M-5524B5-01 267
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is configuring protocol based VLAN on the port number 2 and port number 4.
With above configuration, the packets from port number 2 and 4 are decided according to the protocol
kinds. In case the protocol is incongruous, the route is decided according to the port based VLAN.
268 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
10 port of SWITCH 1 and 11 port of SWITCH 2 are connected to the network where different VLAN is
configured. In order to communicate without changing VLAN configuration of SWITCH 1 and SWITCH 2
Note
You should configure the ports connected to network communicating with PVID 11 as Tagged VLAN
port.
The network
communicating
with PVID 11
SWITCH 1 SWITCH 2
Communicating Communicating
with PVID 10 with PVID 10
Connecting to port Connecting to
number 10 of port number 11
SWITCH 1 of SWITCH 1
DDJ:A-M-5524B5-01 269
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Configure br2, br3, br4 in SURPASS hiD 6610 configured Layer 2 environment and 24 ports as Uplink
port is configured. In order to transmit Untagged packet through Uplink port rightly, follow below
configuration.
default
br2
External
Network br3
br4
Uplink
Port
270 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
LACP(Link Aggregation Control Protocol) complying with IEEE 802.3ad bundles several physical ports
together to from one logical port so that user can get enlarged bandwidth”.
Information
In SURPASS hiD 6610, it is possible to make the configured logical port with Link aggregation up to
SURPASS hiD 6610 supports two kinds of Link aggregation as port trunk and LACP. There’s a little
In case of Port Trunking, it is quite troublesome to set the configuration manually and the rate to adjust
to the network environment changes when connecting to the switch using logical port. However, if the
user configures physical port aggregated with the logical port in each switches, the switches are
connected as the configuration. Therefore it is easier for user to configure comparing to the port trunk
DDJ:A-M-5524B5-01 271
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWICH C SWICH A
SWICH B
SWITCH A is aggregated with SWITCH B as a logical port by connecting 2 physical ports and it is
Link aggregation function should be used for the above configuration. Here, if port trunk is use for the
configuration, first the user should configure the logical port by aggregating 3 physical ports and the
logical ports by aggregating 2 physical ports. Configure a logical port by aggregating 2 physical ports in
SWITCH B and configure a logical port by aggregating three physical ports. If the user connects the
However, using LACP could make the configuration to be easier. The link is automatically generated if
logical port and physical port which is going to be aggregated as logical port are configured.
For SWITCH A, after making two logical ports, designate 5 physical ports which will be contained in the
logical port. Then, even though there’s no configuration as above, it operates as Link aggregation status
by connecting the cable.The following is how to configure port trunk and LACP.
Port trunking enables you to dynamically group similarly configured interfaces into a single logical link
272 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to make logical port by aggregating the ports, use the following command.
Information
It is possible to input Group-id from “0” to “13” because SURPASS hiD 6610 supports 14 logical ports.
Note
If packets enter to logical port aggregating several ports and there’s no way to decide packet route, the
packets could be gathered on particular member port so that it is not possible to use logical port
effectively. Therefore SURPASS hiD 6610 is configured to decide the way of packet route in order to
divide on member port effectively when packets enter. It is decided with Source IP address, Destination
IP address, Source MAC address, Destination Mac address and the user could get information of
packets to decided packet route. dstip is Destination IP address and dstmac means Destination MAC
address .srcdstip means Destination IP address and srcdstmac means Source Destination MAC
Information
In SURPASS hiD 6610, Source Destination MAC address is basically used to decide packet route.
The port designated as member port of port trunk is automatically deleted from existing VLAN as the
following example. Therefore, if member port and aggregated port exist in other VLAN, VLAN
DDJ:A-M-5524B5-01 273
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
If member port and aggregated port exist in other VLAN, VLAN configuration for aggregated port
should be changed.
In order to release the configured port trunk, use the following command.
trunk del group-id port-number Bridge Release the configured trunk port.
If the user deleted member port from logical port or release port trunk, they are automatically contained
as Default VLAN.
In order to confirm the configuration of port trunk, use the following command.
274 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
LACP(Link Aggregation Control Protocol) is the function of using more wide bandwidth by aggregating
more than two ports as a logical port as previously stated port trunk function. However, what is different
from port trunk is to make aggregated bandwidth automatically in case logical Aggregator that
aggregates the ports and physical member port which will be aggregated as logical port are configured.
If the integrated port by configuring from port trunk is in other VLAN which is different from VLAN where
existing member port is originally belong to, it should be moved to VLAN where the existing member
port is belong to. However, the integrated port configured by LACP is automatically added to
appropriate VLAN.
Information
The integrated port from LACP could support up to 14 so that it is possible to input Aggregator-number
Note
Enabling LACP
DDJ:A-M-5524B5-01 275
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure LACP function in SURPASS hiD 6610, fist enable LACP function. In order to LACP,
On the other hand, in order to release LACP and delete the configuration of LACP, use the following
command.
When packets enter to logical port integrating several ports, if there’s no process to decide packet route,
it is possible not to use logical port effectively from focusing packets on a particular member port.
If packets enter to logical port aggregating several ports and there’s no way to decide packet route, the
packets could be gathered on particular member port so that it is not possible to use logical port
effectively.
Therefore SURPASS hiD 6610 is configured to decide the way of packet route in order to divide on
member port effectively when packets enter. It is decided with Source IP address, Destination IP
address, Source MAC address, Destination Mac address and the user could get information of packets
to decided packet route. dstip is Destination IP address and dstmac means Destination MAC
address .srcdstip means Destination IP address and srcdstmac means Source Destination MAC
Information
In SURPASS hiD 6610, Source Destination MAC address is basically used to decide packet route.
276 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
After configuring aggregator, you should configure packets transmitting aggregator port. The following is
After the configuration for Aggregator, configure the physical port that is a member of aggregated port.
In order to configure member port of aggregated port, use the following command in Bridge mode.
lacp port port-number Bridge Configure physical port that is member port of Aggregator.
Information
After configuring member port, configure the mode of member port. There are two kinds of mode of
“Active Mode ” and “Passive mode ” in member port. The port of Passive mode starts LACP when
there’s Active mode on the port of opposite switch. The priority of Active mode is higher that that of
Passive mode so that the port of Passive mode follows the port of Active mode.
DDJ:A-M-5524B5-01 277
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
If each member ports of the connected switch is configured as“ active mode” and “passive mode”,
“active mode” is the standard. If both switches are configured as “passive mode”, Link for member
ports of two switches is not realized.
In order to configure the mode of member port, use the following command in Bridge mode.
lacp port activity port-number {activeㅣpassive} Bridge Configure the mode of member port.
Information
In order to release the operating mode of configured member port, use the following command.
no lacp port activity port-number Bridge Release operation mode of configured member port.
Information
After releasing operating mode of configured member port, the basic configuration returns to default.
In case the member ports of connected switches are configured as Active mode, it is required to
configure which switch would be a standard for it. For this case, the user could configure the priority on
switch.. The following is the command of configuring the priority of the switch in LACP function.
lacp system priority <1-65535> Bridge Sets the priority of the switch in LACP function.
Information
In SURPASS hiD 6610, the priority of the system is basically configured as “32768(=0x8000)”.
278 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Note
If each member ports of the connected switch is configured as“ active mode” and “passive mode”,
“active mode” is the standard. If all of them is configured as “active mode”, the switch having higher
priority would be the standard.
In order to release the priority of configured switch, use the following command.
no lacp system priority Bridge Clears the priority of the configured switch.
Information
After clearing operating mode of configured member port, the basic configuration returns to default.
The port configured as member port is basically configured to aggregated to LACP. However, even
though the configuration as member port is not released, they could operate as independent port
without being aggregated to LACP. These independent ports cannot be configured as trunk port
because they are independent from being aggregated to LACP under the condition of being configured
as member port. In order to configure for member port to aggregated to LACP, use the following
command.
lacp port aggregation port-number Designate whether a member port is included in LACP
Bridge
{ aggregatableㅣindividual } or not
Information
In SURPASS hiD 6610, the member port is basically configured to aggregated to LACP.
In order to clear aggregated to LACP of configured member port, use the following command.
no lacp port aggregation port-number Bridge Clears the configured member in LACP.
DDJ:A-M-5524B5-01 279
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
Member port transmits BPDU with it’s information. In SURPASS hiD 6610, it is possible to configure the
lacp port timeout port-number { longㅣshort} Bridge Configure BPDU transmission rate.
Information
In SURPASS hiD 6610, BPDU transmission rate of member port is basically configured as “long”.
Information
no lacp port timeout port-number Bridge Clears BPDU transmission rate of configured member port.
Member port of LACP has key value. All member ports in one aggregator have same key values. In
order to make an aggregator consisted of specified member ports, configure different key value with key
lacp port admin-key port-number <1-15> Bridge Configure Key value of member port.
Information
In hiD 6610, key value of all ports are basically configured as “1”.
280 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
For example, switch A and switch B are linked with switch C in the below picture. Two aggregators are
configured in switch A and ports 7 ~ 10 are configured as member port. One aggregator is configured in
switch B and ports 7 ~ 8 are configured as member port. And one aggregator is configured as switch C
and port 9 ~ 10 are configured as member port. After these configurations, ports 7~8 of switch A and B
are linked with ports 9~10 of switch A and C, then switch A is linked with switch B and C through
aggregators.
SWICH B
Meanwhile, switch A is linked with switch B in the below picture. Two aggregators are configured in both
switch A and B, ports 7~10 are configured as member port. With this configuration, if ports 7~10 are
connected through cable, one aggregator including the ports is made. However, if key values of ports
DDJ:A-M-5524B5-01 281
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWICH A Internet
SWICH B
In order to delete key value of configured member port, use the following command.
no lacp port admin-key port-number Bridge Delete key value of member port.
Information
If you delete Key value of configured member port, it returns to default configuration.
One aggregator can include maximum eight ports. When there are ten ports configured, higher priories
are selected. However, user can configure the priority when user wants specific port to configure as
member port regardless of its priority. In order to configure priority of LACP member port, use the
following command.
lacp port priority port-number <1-65535> Bridge Sets the LACP priority of member port.
282 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
In SURPASS hiD 6610, the LACP priority of a member port is basically configured. “32768(=0x8000)”.
In order to clear port priority of configured member port, use the following command.
no lacp port priority port-number Bridge Clears port priority of member port.
Information
After releasing the priority of configuring member port, it returns to default configuration.
DDJ:A-M-5524B5-01 283
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is configuring port number 10-17 as trunk 0 and confirming the configuration.
284 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is to configure 10-17 port in br2 to trunk 0 which belongs to default VLAN.
In order to make VLAN 10-17 port to be the same status that is before trunk configuration, you must
The following is an example of configuring Aggregator 0 in SWITCH A and SWITCH B and port number
2, 3 as the member port. Here, in order to configure SWITCH A as a reference, configure operating
mode of member port for SWITCH B as “Passive mode”. If there’s no configuration on it, the reference
is automatically displayed.
DDJ:A-M-5524B5-01 285
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWITCH A
SWITCH B
SWITCH_A(bridge)#
SWITCH_A(bridge)#
286 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
“AGGR” shows ID of Aggregator by using the “show lacp port” command. It is different from
Aggregator-number.
SWICH A Internet
SWICH B
The following example is configuring two intergrate ports and 7-10 port as member port in SWITCH A
<SWITCH A>
SWITCH_A(bridge)#
DDJ:A-M-5524B5-01 287
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
<SWITCH B>
SWITCH_B(bridge)#
The above configiuration shows 4 integrated ports are integrated to a port. However, you can make 2
integrated ports by configuring key value of port 7,8 and 9,10 in SWITCH A and SWITCH B.
<SWITCH A>
SWITCH_A(bridge)#
<SWITCH B>
SWITCH_B(bridge)#
288 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
LAN, which is composed of double-path like token ring, has the advantage that it is possible to access
in case of disconnection with one path. However there is another problem named Loop when you
always use the double-path. Loop is; when there are more than two paths between switches as below
figure(SWITCH A,B), PC A sends packet through broadcast or multicast and then the packet keeps
SWITCH A SWITCH B
PC A PC B
STP(Spanning-Tree Protocol) is the function to prevent Loop in LAN with more than two paths and to
utilize the double-path efficiently. It is specified in IEEE 802.1d. When STP is configured, there is no
Loop since it chooses more effective path of them and closes the other path. In other words, when
SWITCH C in the below figure sends packet to SWITCH C, path 1 is chosen and path 2 is closed.
SWITCH A
SWITCH B SWITCH E
Path 1
DDJ:A-M-5524B5-01 289
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Meanwhile, RSTP(Rapid Spanning-Tree Protocol) defined in IEEE 802.1w innovate reduces the time of
network convergence on STP. Due to same vocabularies and configuration parameter used in 802.1d, it
Also, 802.1w includes 802.1d inside, so it can provide comparability with 802.1d. For more detail
□ STP operation
□ RSTP operation
□ Configuring STP/RSTP/MSTP
□ Configuring PVSTP/PVRSTP
The 802.1d STP defines port state as Blocking, Listening, Learning, and Forwarding. When STP is
configured in LAN with double-path, switches exchange their information including Bridge ID.
It is named as BPDU(Bridge Protocol Data Unit). Switches decide port state based on exchanged
BDPU and automatically decide optimized path to communicate with Root switch as standard of
Spanning-Tree.
◆ Root Switch
The critical information to decide Root switch is Bridge ID. Bridge ID is composed of 2 bytes-Priority and
6 Bytes-MAC address. The Root switch is decided with the lowest Bridge ID.
290 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH A
Priority : 8
ROOT
SWITCH B SWITCH C
Priority : 9 Priority : 10
SWITCH D
For example, suppose there are three linked switches as below picture. After configuring STP, switches
exchange their information. The Priority of SWITCH A is 8, the Priority of SWITCH B is 9 and the Priority
◆ Designated Switch
After deciding Root switch, when SWTCH A transmits packet to SWITCH C, SWITCH A compares
exchanged BDPU to decide path. The critical information to decide path is path-cost. Path-cost depends
on transmit rate of LAN interface and path with lower path-cost is selected.
The standard to decide designated switch is total Root path-cost which is added with path-cost to Root.
Path-cost depends on transmit rate of switch LAN interface and switch with lower path-cost is selected
to be designated switch.
DDJ:A-M-5524B5-01 291
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWITCH A
Priority : 8
ROOT
Path-cost Path-cost
50 100
Designated
SWITCH
SWITCH B SWITCH C
Priority : 9 Priority : 10
Path-cost Path-cost
100 100
SWITCH D
: Path 1
: Path2
(PATH 1=50+100=150, PATH 2=100+100=200, PATH 1< PATH 2, ∴ PATH 1 selected)
In case of the above picture showing SWITCH C sends packet, path-cost of PATH 1 is 150 and path-
cost of PATH 2 is total 200(100 + 100 ; path-cost of SWITCH C to B + path-cost of SWITCH B to C).
Therefore lower path-cost, PATH 1 is chosen. In this case, port connected to Root switch is named Root
port. In the above picture, port of SWITCH C connected to SWITCH A as Root switch is Root port.
Information
The standard to decide designated switch is total Root path-cost which is added with path-cost to
Root. switch with lower path-cost is selected to be designated switch. When Root path-costs are same,
bridge ID is compared.
Also, selected switch for communication in a segment is named Designated switch. In the below picture,
suppose that packet is transmitted from Root switch to SWITCH D. SWITCH B and SWITCH C can be
selected.
292 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
However, since Loop is created transmitting packet to SWITCH D, one of two must be selected by
Except Root port in each switch, selected port to communicate is Designated port. The other ports,
except Root port and Designated port, are named Blocked port.
SWITCH A
ROOT
Designated▶
Port
SWITCH B
◀ Root Port
Designated
SWITCH
Designated ▶ SWITCH C
Port
PATH 1 PATH 2
SWITCH D
◆ Port-priority
Meanwhile, when path-costs of two paths are same, port-priority is compared. As the below picture,
Since the path-costs of two paths are 100, same, their port-priorities are compared and port with smaller
DDJ:A-M-5524B5-01 293
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
- Path-cost 100
- Port priority 7
ROOT - Port 1
PATH 1
PATH 2
- Port 2
- Port priority 8
- Path-cost 100
PATH 1 port priority = 7, PATH 2 port priority = 8, PATH 1< PATH 2, ∴ PATH 1 is chosen )
All these functions are automatically performed by BDPU, which is the information of switch. It is also
possible to configure BDPU to change Root switch or path manually. Refer to ‘8.4.4 Configuring BPDU
When SRP or RSTP is configured on network where Loop can be created, result of the last
Previlegedology is same. However, RSTP is more rapidly progressed than STP at the stage of reaching
to the last Previlegedology. This section describes how the RSTP more improved than STP works. It
□ Port States
□ BPDU Policy
RSTP defines port states as Discarding, Learning, and Forwarding. Blocking of 802.1d and Listening is
combined into Discarding. Same as STP, Root port and Designated port are decided by port state. But
existing Blocked port is divided into Alternate port and Backup port.
294 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Alternate port means a port blocked by receiving BDPU of priority of high numerical value from another
equipment, and Backup port means a port blocked by receiving BDPU of priority of high numerical value
from another port of same equipment. The below picture shows Alternate port and Backup port.
SWITCH A
ROOT
SWITCH B SWITCH C
PATH 1 PATH 2
SWITCH D
The difference of between Alternate port and Backup port is that Alternate port can alternate path of
packet when there is a problem between Root switch and SWITCH C but Backup port cannot provide
802.1d forwards BDPU following Hello-time installed in Root switch and the other switch except Root
switch its own BDPU only when receiving BDPU from Root switch. However, in 802.1w not only Root
switch but also all the other switches forward BDPU following Hello-time. BDPU is more frequently
changed than the interval Root switch exchanges, but with 802.1w it becomes faster to be master of the
By the way, when low BDPU is received from Root switch or Designated switch, it is immediately
accepted. For example, suppose that Root switch is disconnected to SIWTCH B. Then, SWITCH B is
DDJ:A-M-5524B5-01 295
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
However, SWITCH C recognizes Root existing, so it transmits BDPU including information of Root to
Bridge B. Thus, SWITCH B configures a port connected to SWITCH C as new Root port.
SWITCH A
ROOT
New
ROOT PORT
▼
SWITCH B SWITCH C
BPDU including
Low BPDU Root information
created
SWITCH A
② Transmit
BDPU at
SWITCH B SWITCH C Listen state
③ Blocking to
prevent Loop
: BPDU Flowing
SWITCH D
296 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
As the above picture, suppose that there is a new link connected between SWITCH A and Root. Root
and SIWTCH A is not directly connected, but indirectly through SSIWTCH D. After SWITCH A is newly
connected to Root, packet cannot be transmitted between the ports because state of two switches
In this state, if Root transmits BDPU to SWITCH A, SWITCH A transmits new BDPU to SWITCH A and
SWITCH C, SIWTCH C transmits new BDPU to SWITCH D. SWITCH D, which received BDPU from
SWITCH C makes port connected to SWITCH C Blocking state to prevent Loop after new link.
This is very an epochal way of preventing Loop, the matter is that communication is disconnected
during two times of BDPU Forward-delay till a port connected to SIWTCH D and SWITCH C is blocked.
The below picture shows the progress of 802.1w to save the time of disconnection. There is a new link
Then, right after the connection, it is possible to transmit BDPU although packet cannot be transmitted
ROOT
① New link
SWITCH A created
② Negotiate between
SWITCH A and Root
SWITCH B SWITCH C (Traffic Blocking)
SWITCH D
DDJ:A-M-5524B5-01 297
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWITCH A negotiates with Root through BDPU. To make link between SWITCH A and Root, port state
Root, Loop will not be created because SWITCH A is blocked to SWITCH Band C. In this state, BDPU
form Root is transmitted to SWITCH B and C through SWITCH A. To configure Forwarding state of
SWITCH A, SWITCH A negotiates with SWITCH B and SWITCH A does with SWITCH C.
ROOT
③ Forwarding state
SWITCH D
SWITCH B has only edge-designated port. Edge designated does not cause Loop, so it is defined in
802.1w to be changed to Forwarding state. Therefore, SWITCH B does not need to block specific port
to Forwarding state of SWITCH A. However since SWITCH C has a port connected to SWITCH D, you
ROOT
SWITCH A
SWITCH B SWITCH C
④ Blocking
to make Forwarding
SWITCH D
state of SWITCH A
298 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is same with 802.1d to block the connection of SWITCH D and SWITCH C. However, 802.1w does
not need any configured time to negotiate between switches to make Forwarding state of specific port.
So it is very fast progressed. During progress to Forwarding sate of port, Listening and Learning are not
RSTP internally includes STP, so it has comparability with 802.1d. Therefore, RSTP can recognize
BDPU of STP. But, STP cannot recognize BDPU of RSTP. For example, assume that SWITCH A and
SWITCH B are operated as RSTP and SWITCH A is connected to SWITCH C as Designated switch.
Since SWITCH C, which is 802.1d ignores RSTP BDPU, it is interpreted that SIWTCH C is not
However, SWITCH A converts a port received BDPU into RSTP of 802.1d because it can read BDPU of
SWITCH C. Then SWITCH C can read BDPU of SWITCH A and accepts SWITCH A as Designated
switch.
STP BPDU
DDJ:A-M-5524B5-01 299
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to operate the network more effectively, SURPASS hiD 6610 uses PVSTP(Per VLAN Spanning
Tree Protocol) or MSTP(Multiple Spanning Tree Protocol). It constitutes the network with VLAN
subdividing existing LAN domain logically and configure the route by VLAN or VLAN group instead of
Using PVMSTP, it is possible to minimize tree reconstruction time in case of changing Previlegedology
(1) Operation
Here explains how STP/PVSTP/MSTP differently operates on the LAN. Suppose to configure 100 of
In case of STP/RSTP, there’s only a STP on all of VLAN and it does not provide multiple Instances.
SWITCH A
Root
BPDU BPDU
SWITCH B SWITCH C
While existing STP is a protocol to prevent Loop in a LAN domain and PVSTP(Per VLAN Spanning Tree
Protocol) establishes STP per VLAN in order to realize Routing suitable to VLAN environment.
In case of PVSTP/PVRSTP, each STP could be supported for a VLAN. In this case, it is required to
calculate 100 of STP from 100 of VLAN so that there’s a defect of burdening on a switch.
300 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH A
SWITCH B SWITCH C
In IEEE 802.1s MSTP using RSTP for rapid convergence, it is possible to classify several VLAN with
Instance unit. Each Instance operates with different Spanning Tree Previlegedology.
It does not need to calculate all STP for several VLAN so that traffic overload could be reduced. By
reducing unnecessary overload and providing multiple transmission route for data forwarding, it realizes
SWITCH A
Instance 1 Instance 1
Instnace 2 Instance 2
SWITCH B SWITCH C
DDJ:A-M-5524B5-01 301
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
(2) MSTP
In MSTP, VLAN is classified to groups with same Configuration ID. Configuration ID is composed of
Revision name, Revision, VLAN map. Therefore in order to have same Configuration ID, all of these
tree conditions should be the same. VLAN classified with same Configuration ID is called MST Region.
In a Region, there’s only a STP so that it is possible to reduce the number of STP comparing to PVSTP.
There’s no limitation for Region in a network environment but it is possible to generate Instances up to
64. Therefore Instances can be generated from 1 to 64. Spanning-Tree which operates in each Region
means that there is not any Instance generated from grouping VLAN, that is, it does not operate as
MSTP. Therefore Instance 0 exists on all the ports of the equipments. After starting MSTP, all the
switches in CST exchanges BPDU and CST Root is decided by comparing their BPDU. Here, the
switches that don’t operate with MSTP have Instance 0 so that they can also join BPUD exchanges.
CST
Legacy 802.1d
Region B(IST)
Legacy 802.1d
CST Root & IST Root
*B *C
IST Root
Instance 2 Instance 1
IST Root
Instance 2
*D Instance 1 *E
Region A(IST)
302 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In CST, A and B are the switches operating with STP and C, D and, E are those operating with MSTP.
First, in CST, CIST is established to decide CST Root. After CST Root is decided, the closest switches
to CST Root is decided as IST Root of the Region. Here, CST Root in IST is IST Root.
CST
Legacy 802.1d
*B IST Root *C
Instance 2 Instance 1
IST Root
Instance 2
*D Instance 1
*E
Region A(IST)
In above situation, if B operates with MSTP, B will send it’s BPDU to CST Root and IST Root in order to
request itself to be CST Root. However, if any BPDU having higher priority than that of B is sent, B
In SURPASS hiD 6610, the commands configuring MSTP are also used to configure STP and RSTP.
DDJ:A-M-5524B5-01 303
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In SURPASS hiD 6610, in order to configure STP, fist of all, configure Force-version in order to decide
In order to clear STP configuration from the switch, use the following command.
In order to enable STP, RSTP, MSTP in the Force-version, use the following command in Bridge
configuration mode.
Information
With using above commands, STP, RSTP, MSTP can be enabled by the configuration.
Even though STP function does not operated, loop event does not occur in a switch which belongs to
In order to disable configured STP, RSTP, or MSTP, use the following command.
304 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order establish STP, RSTP, or MSTP function, first of all, Root switch should be decided. In STP or
RSTP, it is Root switch and in MSTP it is IST Root switch. Each switch has its own Bridge ID and Root
switch on same LAN is decided by comparing their Bridge ID. However, the user can change Root
switch by configuring Priority for it. The switch having lowest priority is decided as Root switch.
In order to change Root switch by configuring Priority for it, use the following command..
stp mst priority mstid_range <0-61440> Configures the Priority of the switch.
Bridge
no stp mst priority mstid_range Clears the Priority of the switch.
Information
Note
Note
Information
After deciding Root switch, you need to decide to which route you will forward the packet. To do this, the
standard is path-cost.
Generally, path-cost depends on transmission speed of LAN interface in switch. The following table
DDJ:A-M-5524B5-01 305
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
You can use same commands to configure STP and RSTP, but their path-costs are totally different.
4M 250
10M 100
100M 19
1G 4
10G 2
4M 20,000,000
10M 2,000,000
100M 200,000
1G 20,000
10G 2,000
When the route decided by path-cost gets overloading, you would better take another route.
Considering these situations, it is possible to configure path-cost of Root port so that user can configure
route manually.
306 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
Note
When all conditions of two routes are same, the last standard to decide route is port-priority. It is also
possible to configure port priority so that user can configure route manually.
Information
Note
Note
Information
DDJ:A-M-5524B5-01 307
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
If MSTP is established in SURPASS hiD 6610, decide which MST Region the switch is going to belong
to by configuring MST Configuration ID. Configuration ID contains Region name, Revision, VLAN map.
stp mst config-id name name Designate the name for the Region.
Information
There is no limitation to configure the number of MST Region in a network environment, but it is
Information
In case of configuring STP and RSTP, you don’t need to configure Configuration ID. If it is configured,
After configuring Configuration ID in SURPASS hiD 6610, you should apply the configuration to the
switch. After changing or deleting the configuration, you must apply it to the switch. If not, it does not
308 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to apply the configuration to the switch after configuring Configuration ID, use the following
command.
stp mst config-id commit Bridge Committing the configuration of the Region.
Note
After deleting the configured Configuration ID, apply it to the switch using the above ommand.
In order to confirm the configuration after configuring STP, RSTP, MSTP, use the following command.
show stp mst mstid_range Enable Shows the configuration of specific Instance.
/Global Shows the configuration of the specific Instance for all
show stp mst mstid_range all [detail]
/Bridge the ports.
show stp mst mstid_range port-number Shows the configuration of specific Instance for specific
[detail] port.
Information
With 「show stp」command, it is possible to confirm the information for STP/ RSTP/MSTP. How to
Note
In case STP or RSTP is configured in SURPASS hiD 6610, you should configure mstid_range as
「0」.
DDJ:A-M-5524B5-01 309
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In case of configure MSTP in switch, use the following command to show Configuration ID.
show stp mst config-id currnet Shows the current Configuration ID.
Enable/Bridge Shows Configuration ID that is the most recently
show stp mst config-id pending
configured.
For example, after the user configures Configuration ID, if you apply it to the switch with stp mst
config-di commit command, you can check Configuration ID with the show stp mst config-id currnet
However, if the user didn’t use stp mst config-di commit command in order to apply to the switch after
configuration, the configuration could be confirmed with show stp mst config-id pending command
and you can check the configuration with the show stp mst config-id currnet command.
In SURPASS hiD 6610, in order to configure PVSTP or PVRSTP, fist of all, configure Force-version in
order to decide the mode. In order to decide Force-version, use the following command.
Information
PVSTP is activated after selecting PVSTP in Force-version using the above command and PVRSTP is
Information
vlan-range can be input with VLAN name or integral. It is possible to input integral using「-」.
310 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
In PVSTP and PVRSTP, it is possible to configure only the current VLAN. If you input VLAN that does
For the switches in LAN where dual pathdoesn’t exist, Loop does not generate even though STP
function is not configured. In order to release configured PVSTP, PVRSTP, use the following command.
In order establish STP, RSTP, or MSTP function, first of all, Root switch should be decided. Each switch
has its own Bridge ID and Root switch on same LAN is decided by comparing their Bridge ID. However,
the user can change Root switch by configuring Priority for it. The switch having lowest priority is
In order to change Root switch by configuring Priority for it, use the following command..
stp pvst priority vlan_range <0-61440> Bridge Configure Priority of the switch.
Information
Note
Information
DDJ:A-M-5524B5-01 311
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
After deciding Root switch, you need to decide to which route you will forward the packet. To do this, the
standard is path-cost. Generally, path-cost depends on transmission speed of LAN interface in switch.
In case the route is overload based on Path-cost, it is better to take another route.
By considering the situation, in SURPASS hiD 6610, the user can configure Path-cost of Root port in
order to designate the route on ones own. In order to configure Path-cost, use the following command.
stp pvst path-cost vlan_range port-number Configures path-cost to configure route on user’s
Bridge
<1-200000000> own
Information
When all conditions of two routes are same, the last standard to decide route is port-priority. It is also
possible to configure port priority so that user can configure route manually. In order to configure port-
Information
Note
Information
312 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
BPDU is a transmission message in LAN in order to configure, maintain the configuration for
STP/RSTP/MSTP. Switches in which STP is installed exchange their information BDPU to find best path.
For STP, user can configure the following. MSTP BPDU is general STP BPDU having additional MST
data on it’s end. MSTP part of BPDU does not rest when it is out of Region
◆ Hello time
Hello time decides an interval time when a switch transmits BPDU. It can be configured from 1 to 10
◆ Max Age
Root switch transmits new information every time based on information from another switches. However,
if there are many switches on network, it takes lots of time to transmit BDPU. And if network status is
changed while transmitting BDPU, this information is useless. To get rid of useless information, Max
◆ Forward Delay
Switches find location of another switches connected to LAN though received BDPU and transmit
packets. Since it takes certain time to receive BDPU and find the location before transmitting packet,
switches send packet at regular interval. This interval time is named Forward Delay.
Information
The configuration for BPDU is applied as selected in Force-version. The same commands are used for
STP, RSTP and MSTP and the same commands are used for PVSTP and PVRSTP.
DDJ:A-M-5524B5-01 313
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
stp mst hello-time Configures Hello time to transmit the message in STP, RSTP,
Information
no stp mst hello-time Clears the time configuration that is set up to transmit
Bridge
route message.
no stp pvst hello-time vlan-range
It is possible to configure Forward delay, which means time to take port status from Listening to
stp mst forward-delay <4 – 30> Designates Forward-delay in STP, RSTP or MSTP.
Bridge
stp pvst forward-delay vlan-range <4 – 30> Designates Forward-delay in PVSTP or PVRSTP.
Information
314 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Max Age shows how long path message is valid. In order to configure Max Age to delete useless
stp mst max-age <6-40> Configure Max age of route message in STP, RSTP or MSTP.
Bridge
stp pvst max-age vlan-range <6-40> Configure Max age in PVST or PVRST.
Information
Note
It is recommended that Max Age is configured less than twice of Forward Delay and more than twice of
Hello Time.
In order to release the configured Max age, use the following command.
In MSTP, it is possible to configure the number of Hop in order to prevent BPDU from wandering. BPDU
DDJ:A-M-5524B5-01 315
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure the number of Hop of BPDU in MSTP, use the following command.
stp mst max-hops <1-40> Bridge Configures the number of Hop for BPDU.
In order to delete the configured number of Hop for BPDU, use the following command.
no stp mst max-hops Bridge Delete the number of Hop for BPDU in MSTP.
In order to confirm the configuration for BPDU, use the following command.
show stp pvst vlan-range /Global/Brdige In PVSTP, PVRST, it is possible to check the configuration for
Although there is no double path in user’s equipment, Loop can be caused by network environment and
cable condition connected to equipment. To prevent this, SURPASS hiD 6610 has Self Loop detection
to perceive that outgoing packet is got back. Through the Self Loop detection, you can prevent packet,
which comes back because it blocks the port. In order to enable Self Loop detection, use the following
command.
316 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to check Self Loop detection or the port where Loop occurred, use the following command.
show stp self-loop-detect Shows status of Self Loop detection and a port where Loop is happed.
show stp self-loop-detect Bridge Shows Self Loop detection status and Loop on specific port or all the
{port-numberㅣall} ports
DDJ:A-M-5524B5-01 317
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring PVSTP when Default and br2, br3 is configured as VLAN.
The following is an example of changing Path-cost into 100 on the port number 1 in PVSTP and
SWITCH(bridge)#
318 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring mstp Hello time as 3 sec, Forward-delay as 15 sec, Max-age
as 20 se in MSTP.
name TEST
revision 1
instance vlans
-------------------------------------------------------------------
CIST 51-4094
2 1-50
-------------------------------------------------------------------
SWITCH(bridge)#
The following is an example of confirming the configuration after enabling Self Loop Detection.
DDJ:A-M-5524B5-01 319
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
ERP(Ethernet Ring Protection) is a protocol to prevent Loop in Metro Ethernet network. It is a fast failur
e detection and recovery so that it decreases the time to prevent Loop under 50ms by realizing ERP
in hiD 6610.
Note
Ethernet Ring Protection (ERP) is a concept and protocol optimized for fast failure detection and
recovery on Ethernet ring topologies. The Protection of fast failure detection and recovery occurs on
RM Node.
An Ethernet ring consists of two or more switches. One of the nodes on the ring is designated
as redundancy manager (RM) and the two ring ports on the RM node are configured as primary
The RM blocks the secondary port for all non-control traffic belong to this ERP domain. Here, if Line
failure occurs, the Nodes detecting Link Failure transmit Link Down message and Link Failure port
When the RM nodes receive this link-down message, it immediately declares failed state, and op
ens the logically blocked protected VLANs on the secondary port. Then, Ethernet Ring restarts the
communication.
320 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Normal Normal
Node Node
② Link failure
P RM
Normal
Node ① Secondary Port of RM node is
Blocking status in Normal state.
② Sends
Link Down Message
Normal Node P RM
② Sends ① Secondary port of RM Node
Link Down Message is changed as unblocking state.
When a Link Failure is recovered, a temporary loop may occur. To rectify this condition, ERP sends a “link up”
message to the RM. The RM will logically block the protected VLANs on its secondary port and generate a
“RM link up” packet to make sure that all transit nodes are properly reconfigured. This completes fault restora
DDJ:A-M-5524B5-01 321
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
② The Nodes detecting Link Failure ② The Nodes detecting Link Failure
Send Link Up message Send Link Up message
Normal Node P RM
Normal Node P RM
② Sends ① Blocks RM Node of
RM Link Up message Secondary Port
8.5.2 LOTP
ERP recognizes the Link Failure using LOTP(Loss of Test Packet). RM Node regularly sends RM Test
Packet message. If the message is not retransmitted to RM Node through Ethernet Ring, it means that
Loop doesn’t occur. Therefore, RM Node unblocks Secondary port. The condition that RM Test Packet
322 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
On the other hand, if RM Test Packet is retransmitted to RM Note through Ethernet Ring, Loop may
To realize ERP, you should fist configure domain for ERP. To configure the domain, use the following
command.
Information
To add the description for configured domain, use the following command.
DDJ:A-M-5524B5-01 323
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
no erp rmnode domain-id Bridge Configures ERP Node Mode as Normal Node.
To configure Primary Port and Secondary port of RM Node, use the following command.
Note
erp protections domain-id vid Bridge Configures Protected VLAN of ERP Domain.
The delete the configured Protected VLAN, use the following command.
324 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To return the configured Wait-to-Restore Time as Default, use the following command.
DDJ:A-M-5524B5-01 325
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
erp learn-dis-time domain-id <0-500> Bridge Configures ERP Learning Disable Time.
To return the configured Learning Disable Time as Default, use the following command.
no erp learn-dis-time domain-id Bridge Configures ERP Learning Disable Time as default.
erp test-packet-interval domain-id <10-500> Bridge Configures ERP Test Packet Interval.
To return ERP Test Packet Interval as Default, use the following command.
no erp test-packet-interval domain-id Bridge Configures ERP Test Packet Interval as default.
show erp configuration {allㅣdomain-id} Enable/Global/Bridge Shows the information for ERP.
[ Sample Configuration 1 ]
The following is an example of configuring primary port number 1, secondary port number 2, VLAN 201-
326 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH A SWITCH B
RM Node
SWITCH C
Here, VID same as Domain ID should be configured before configuring ERP domain, the port as
Primary port and Secondary port should be configured as Tagged VLAN as follows.
SWITCH(bridge)#
DDJ:A-M-5524B5-01 327
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
328 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SWITCH_B(bridge)#
DDJ:A-M-5524B5-01 329
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
SWITCH_C(bridge)#
330 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
8.6 Stacking
It is possible to manage several switches with one IP address by using stacking. If there’s a limitation for
using IP addresses and there are too many switches which you must manage, you can manage a
It is named One IP Management because you can easily manage various switches and subscribers
connected to the switch with this stacking function. SURPASS hiD 6610 provides the function.
Information
SWITCH
Internet
SWITCH A
(Master switch) SWITCH SWITCH
SWITCH B
(Slave switch)
Manage with
the same IP
SWITCH C
(Slave switch)
A switch, which is supposed to manage the other switches in stacking is named as Master switch and
the other switches managed by Master switch are named as Slave switch. Regardless of installed place
or connection state, Master switch can check and manage all Slave switches.
DDJ:A-M-5524B5-01 331
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
You shold configure all the switches configured with stacking function to be in the same VLNA. In order
to configure the switches as a switch group which belongs in the same VLAN, use the following
command.
Information
For manging the stacking function, the port connecting Master switch and Slave switch must be in the
same VLAN.
After designating Master switch, register Slave switch for Master switch.
In order to register Slave switch or delete the registered Slave switch, use the following command.
332 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
To make stacking operate well, it is required to enable the interface of Slave switch.
Information
The switches in different VLAN cannot be added to the same switch group.
You shold register Slave switch registered in Master switch as Slave switch. In order to designate Slave
In order to confirm the configuration for stakcing, use the following command.
After configuring all stakcing configuration, it is possible to configure and mange by accessing to Slave
DDJ:A-M-5524B5-01 333
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to access to Slave switch from Mater switch, use the following command in Bridge configuration
mode.
node-number means “node ID” from configuring stacking in Slave switch. If you input the above
command in Mater switch, Telnet connected to Slave switch is displayed and it is possible to configure
Slave switch using DSH command. If you use “exit” command in Telnet, the connection to Slave switch
is down.
slave.
SWITCH A
(Master switch) Step 1 Assign IP address in Interface configuration mode
SWITCH B Manage switches mode, you should enter into Interface configuration mode
(Slave switch) using an IP.
of VLAN to register as a switch group for stacking.
334 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
If there are several switches, rest of them are managed by IP address of Master switch. Therefore you
Step 2 Configure Switch A as Master switch. Configure VLAN to belong in the same switch group and
after registering Slave switch, configure it as a Master switch.
Step 3 Configure VLAN in order to belong to the same switch group in Switch B registered in Master
switch as Slave switch and configure as a Slave switch.
Step 4 Confirm the configuration. The information you can check in Master switch and Slave switch is
different as belows.
DDJ:A-M-5524B5-01 335
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of accessing to Slave switch from Master switch configured in [ Sample
Configuration 1 ].. If you confirm the configuration of Slave switch in [ Sample Configuration 1 ], you
recognizes node-number is 2.
SWITCH(bridge)# rcommand 2
Trying 127.1.0.1(23)...
Connected to 127.1.0.1.
Escape character is '^]'.
SWITCH login: root
Password: vertex25
SWITCH#
SWITCH# exit
Connection closed by foreign host.
SWITCH(bridge)#
User can customize port bandwidth according to user’s environment. Through this configuration, you
can prevent a certain port to monopolize whole bandwidth so that all ports can use bandwidth equally.
egress and ingress can be configured both to be same and to be different.
rate port-number rate Sets port bandwidth. If you input egress or ingress, you can configure
Bridge
[egressㅣingress] outgoing packet or incoming packet. The unit is Mbps.
Unless you input neither egress nor ingress, they are configured to be same. To switch, egress is
incoming packet. So, it is upload to PC user. On the otherhand, when the packets over the configured
bandwidth enter, Rate limit has been drop the packets unconditionally.
336 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Howerver, newly upgraded SURPASS hiD 6610 sends pause packet first and then if the packets are
continuously transmitted, drop them. With this method, in order to configure Rate limit in ingress, use
In order to clear the configured bandwidth, use the following command in Bridge configuration mode.
The following is an example of the configuration after setting the bandwidth of port number 1 as 64Mbps
SWTICH(bridge)# rate 1 64
SWTICH(bridge)# rate 2 52
SWTICH(bridge)# show rate
----------------------------------------------------------------
Port Ingress Egress | Port Ingress Egress
--------------------------------+-------------------------------
1 64( 64.000) 64( 64.000) | 2 52( 52.000) 52( 52.000)
3 N/A N/A | 4 N/A N/A
5 N/A N/A | 6 N/A N/A
(Omitted)
SWTICH(bridge)#
DDJ:A-M-5524B5-01 337
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
8.8 Flood-Guard
Flood-guard limits number of packets, how many packets can be transmitted, in configured bandwidth,
whereas Rate limit described in 「8.5 Configuring Rate Limit」controls packets through configuring
width of bandwidth, which packets pass through. This function prevents receiving packets more than
Configure Flood-guard
Configure to allow packets as
Rate Limit in port many as ‘n’ per a
second
3
Control ‘n’ packets
. .
bandwidth . allowed for
.
a second
n
In order to limit the number of packets which can be transmitted in a second, use the following
command.
338 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to clear the configured Flood Guard, use the following command.
In order to check the configuration of Flood Guard, use the following command.
The following is an example of confirming the configuration after limiting the number of packets
The Multicast packet is transmitted to a part of group request the Multicast packet. IGMP(Internet Group
Management Protocol) is the internet protocol that helps to inform Multicast groups to Multicast router.
In the Multicast Network, Multicast router sends only IGMP Query massage that quest whether receive
DDJ:A-M-5524B5-01 339
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
If a switch sends the join massage to Multicast router, Multicast router transmits the Multicast packet
Multicast Packet
Multicast Router
No packet transmission
Before join message. Sends IGMP Query Message
Multicst Packet
Multicast Router
: Multicast Packet
IGMP Snooping is a function that finds port, which sends 「Join message」to join in specific multicast
group to receive multicast packet or「leave message」to get out of the multicast group because it does
340 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Only when the switch is connected to multicast router, IGMP Snooping can be enabled.
On the otherhand, in order to release IGMP snooping, use the following command in Global
Configuration Mode.
Note
Since PIM-SM includes IGMP Snooping, both IGMP Snooping and PIM-SM can be enabled at the
same time.
DDJ:A-M-5524B5-01 341
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
8.9.3 Fast-leave
If the Multicast client sends the leave massage to leave out Multicast group, Multicast router sends
IGMP Query massage to the client again, and when the client does not respond, delete the client from
Therefore, it takes time the Multicast router to delete the client. But, you can configure the function that
the client has no sooner sent the leave massage than Multicast router has delete it from the Multicast
342 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To remove fast-leave from the SURPASS hiD 6610, use the following command.
In order to view IGMP snooping fast-leave configration, use the following command.
If the clients in multicast group sends leave message in order to leave from multicast group, multicast
router sends IGMP Query message again. If there’s no respond about the message, it takes some time
In order to send IGMP Query message and configure the respond time, use the following command.
<100-900> vlan <1-4094> group after sending Join message from VLAN.
Information
DDJ:A-M-5524B5-01 343
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
In SURPASS hiD 6610, the respond wating time is basically configured as 1000ms.
Information
If you configure ip igmp snooping fast-leave, it is meaningless to register time as multicast group.
In order to release the waiting time for respond after sending IGMP Query message, use the following
command.
In order to view the IGMP snooping last-member-query-interval configuration, use the following
command.
In SURPASS hiD 6610, it is possible to designate multicast router is connected to which port. If you
designate multicast router is connted to where, it is possible to transmit multicast packet or message
344 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To designate the port connected to multicast router, use the following command.
In order to release the port where multicast router is connected, use the following command.
In order to view IGMP snooping mrouter configuration, use the following command.
When the Multicast packet is transmitted to the switch, the switch transmits it as IGMP table. The packet
that is registered in the IGMP group is transmitted to the interface of the same group.
But, the unregistered Multicast packet can be transmitted from the device connected with user’s switch,
too. If the unregistered Multicast packet is transmitted to the switch, the switch will drops or floods it as
user’s decision. Therefore, you have to decide how to do the unregistered packet.
DDJ:A-M-5524B5-01 345
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Multicast Packet
of Gourp A
interface group
b, e A
Transmit to the b and c
registered in the IGMP
table
a b c d e
【 Figure 8-38 】 Example ① The Multicast packet registered in the IGMP group
Multicast Packet
of Group B
a b c d e
In order to filter all unregistered multicast packet in IGMP table, use the following command.
346 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In the Multicast Network, it takes time that Multicast client send the join massage and receive Multicast
packet. But, SURPASS hiD 6610 can transmit Multicast packet promptly when the client request the
Multicast packet, because it receives Multicast packets previously and keeps them.
If you want to keep the Multicast packets transmitted to do Multicasting quickly, configure your switch to
After using the above command, you need to verify that SURPASS hiD 6610 joins in multicast group
Information
The above example is a case when there is no registration. It may vary according to registered
information.
DDJ:A-M-5524B5-01 347
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to delete switch from multicast group, use the following command.
IGMP is the protocol to help multicast communication between switch and host, and PIM is the protocol
for multicast communication between router and router. There are two kinds of PIM, PIM-DM(Protocol
Independent Multicast – Dense Mode) and PIM-SM(Protocol Independent Multicast – Sparse Mode),
Protocol of dense mode can send information about data packet and member to interface, which is not
connected to multicast source or receiver, and multicast router saves connection state to all the nodes.
In this case, when most hosts are belonged to multicast group and there is enough bandwidth to
support flow of controlling message between constituent members, these overheads are acceptable,
Contrary to dense mode, PIM-SM receives multicast packet only when request comes from specific
host in multicast group. Therefore PIM-SM is proper when constituent members of group are dispersed
in wide area or bandwidth used for the whole is small. Sparse mode is the most useful on WAN and can
be used on LAN. For standard of PIM-SM, you can refer to RFC 2362.
Information
RP(Rendezvous Point) works in a central role for PIM-SM. Viewing the below chart, multicast packet is
transmitted to D as RP from A as source, through B and C. And D(RP) transmits multicast packet after
receiving join message from E or F. That is, all multicast packets are transmitted with passing through
RP(Rendezvous Point). For instance, even though F needs multicast packet, the packet is passed
348 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Like this, route made with focusing on RP is RPT(Rendezvous Point Tree) or shared tree. There is only
one RP in one multicast group. RPT has (*, G) entry because receiver can send a message to RP
1.Multicast packet
transmitted to RP
A
B
2. Asks RP for
multicast packet
D
E Source
RP 2. Asks RP for
(Rendezvous Point) multicast packet
3. RP transmits multicast
packet for the request.
C F
3. RP transmits multicast
packet for the request.
Also, routers on packet route automatically optimize route by deleting unnecessary when traffic exceeds
certain limit. After route to source and multicast group connected to the source are constituted, all
In the below picture example, packets are usually transmitted through 『A → B → C → D』, but
packets are transmitted through faster route 『A → C → F』 when traffic is increased. SPT(Shortest-
Path Tree) selects the shortest route between source and receiver regardless of RP, it is called source
based tree or short path tree. SPT has (S, G) entry, “S” means source address and “G” means multicast
group.
DDJ:A-M-5524B5-01 349
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
A
4.optimizes route by deleting unnecessary
when traffic exceeds certain limit 2.requests multicast
packet to RP
Source 1.multicast packet is D
transmitted to RP
B C
E
RP
(Rendezvous Point) F
3. RP transmits multicast
packet for the request.
In order to configure PIM-SM in SURPASS hiD 6610, you should refer to the following sections.
Enabling PIM-SM
Deciding RP
Configuring Static RP
Configuring BSR
Configuring RP Information
Whole-packet-checksum
Before configuring PIM-SM in switch, you should enable PIM-SM. In order to enable PIM-SM, use the
following command. When you enable PIM-SM by using the following command, the system is
supposed to enter into PIM configuration mode. When you enter into PIM configuration mode, the
350 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
router pim Global Enables PIM-SM and enters into PIM configuration mode.
Information
PIM-SM supports both IGMP Querier and IGMP Snooping, therefore you cannot configure them at the
same time.
Note
The commands, “ip igmp static” and “ip igmp fast-leave” can be used when IGMP and PIM-SM are
enabled at same time.
no router pim Global Enables PIM-SM and enters into PIM configuration mode.
[Sample Configuration 1]
The following is an example of enabling PIM-SM and entering into PIM configuration mode from
configuration mode.
Use “exit” command to go back to configuration mode. And use “end” command to enter into Privilege
Exec Enable Mode.
SWITCH(config_pim)# exit
SWITCH(config)#
SWITCH(config_pim)# end
SWITCH#
DDJ:A-M-5524B5-01 351
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
8.10.2 Deciding RP
There are two ways to decide RP as central of PIM-SM on multicast network. One is that network
administrator manually decides RP and the other way is that RP is automatically decided by exchanging
information between multicast routers installed on network. The information transmitted between
multicast routers in the automatic way is called Bootstrap message and the router, which sends this
Bootstrap message, is called BSR(Bootstrap Router). All PIM routers existed on multicast network can
be BSR.
Routers that want to be BSP are named candidate-BSR and one router, which has the highest priority,
becomes BSR among them. If there are routers, which have same priority, then one router, which has
the highest IP address, becomes BSR. Bootstrap message includes priority to decide BSR, hash-mark
to be used in Hash, and RP information. After deciding BSR, routers, which support RP, transmit
candidate-RP message to BSR. Candidate-RP message includes priority, IP address, and multicast
group. Then BSR adds candidate-RP message to Bootstrap message and transmits it to another PIM
User’s equipment belonged in PIM-SM network can be candidate-BSR and BSR is decided among
them. Candidate-BSR transmits Bootstrap message to decide BSR. You can configure priority to decide
352 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring a router, which has an address 200.1.1.1 in multicast group,
The information transmitted between multicast routers in the automatic way is called Bootstrap
message and the router, which sends this Bootstrap message, is called BSR(Bootstrap Router). All PIM
routers existed on multicast network can be BSR. Routers, which want to be BSP, are named
candidate-BSR and one router, which has the highest priority, becomes BSR among them. If there are
routers, which have same priority, then one router, which has the highest IP address, becomes BSR.
It is possible to configure the following messages, which are included in candidate-BSR message.
□ Candidate-BSR IP Address
□ Candidate-BSR Priority
□ Candidate-BSR Hash-mask
Since it is possible to assign several IP addresses in SURPASS hiD 6610, the switch may have several
IP addresses assigned. User can select one IP address among several IP addresses to be used in
switch as candidate-BSR. In order to select IP address to be used in candidate-BSR, use the following
command.
DDJ:A-M-5524B5-01 353
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
When you decide BSR among candidate-BSRs, priority in Bootstrap message is compared to decide it.
The highest priority of candidate-BSR becomes BSR. In order to configure priority of Bootstrap
Information
Information
When there are same priorities to compare candidate-BSR, IP address is compared through Hash. User
In order to configure Hash-mask included in Bootstrap message when SURPASS hiD 6610 is
354 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
[Sample Configuration 2]
confirming it.
After deciding BSR on multicast network, candidate-RP routers send RP message to BSR. Candidate-
RP message includes priority, IP address, and multicast group. Then, BSR adds received candidate-RP
information to Bootstrap message and transmit to another PIM router. Through this Bootstrap message,
RP of multicast group is decided. All routers belonged in multicast network can become candidate-RP
and routers which generally consist candidate-BSR are supposed to consist candidate-RP. It is possible
DDJ:A-M-5524B5-01 355
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
□ Candidate-RP IP Address
□ Candidate-RP Priority
It is possible to configure several IP addresses in SURPASS hiD 6610 router. Therefore, you need to
You should register address of multicast group as well as IP address in candidate-RP message for
service. In order to register address of multicast group in candidate-RP message, use the following
command.
356 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
When BSR decides RP, priority of candidate-RP is compared. In order to configure this priority, use the
following command.
Information
Information
Candidate-RP transmits candidate-RP message to BSR at regular interval. User can configure the
In order to configure interval to transmit candidate-RP message, use the following command.
Information
DDJ:A-M-5524B5-01 357
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to delete interval to transmit candidate-RP message, use the following command.
[Sample Configuration 3]
The following is an example of configuring things about candidate-RP message and confirming it.
One network may include different multicast groups and routers that are not members of multicast group.
Therefore it can happen that routers, which are members of another network or not members of
In order to prevent this case, user can block candidate-RP message of another router by making only
candidate-RP in multicast group communicate. In order to block candidate-RP message from routers
cand-rp access deny network-address PIM Blocks all packets transmitted on specified network.
358 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Step 2 Allow only packets transmitted by routers that will exchange candidate-RP message.
[Sample Configuration 4]
The following is an example of allowing only packets transmitted by routers that will exchange
When there are several PIM-SM routers on same LAN, they may exchange packets are not needed. In
order to prevent this problem, you need to assign one PIM-SM router to transmit multicast packet. In
DDJ:A-M-5524B5-01 359
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In the below example, there are router B, C which can transmit multicast packet in case of receiving
Join message from receiver. D and E, which send Join message, cannot decide which router to receive.
And C may transmit same packet to B belonged in multicast group. In this case, if Assert is decided,
multicast group is well organized because D and E transmit Join message only to Assert.
RP
A
B C
Unnecessary same
packet sent
When Assert is decided, Metric and Preference in Assert message are compared. Lower Metric has
□ Configuring Metric
□ Configuring Preference
360 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
In order to delete configured Metric of Assert message, use the following command.
Information
In order to delete configured Preference of Assert message, use the following command.
DDJ:A-M-5524B5-01 361
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 5]
SWITCH(config_pim)# metric 1
SWITCH(config_pim)# preference 1
SWITCH(config_pim)# show running-config
Building configuration...
(Omitted)
router pim
preference 1
metric 1
(Omitted)
SWITCH(config_pim)#
8.10.7 Whole-packet-checksum
Although source of multicast is not connected to multicast group, multicast communication is possible.
In the below picture, First-Hop router directly connected to source can receive packet from source
without (S,G) entry about source. The First-Hop router encapsulates the packet in Register message
and unicasts to RP of multicast group. RP decapsulates capsule of Register message and transmits it to
Source
Multicast Packet
First-Hop Router
RP
【 Figure 8-43 】 Network that multicast source are not directly connected to multicast group
362 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
When the Register message is transmitted, range of Checksum in header conforms to header part as
RFC standard, but whole packet is included in range of Checksum in case of Cisco router. For
comparability with Cisco router, you should configure range of Checksum of Register message as whole
packet.
In order to configure range of Checksum of Register message as whole packet for comparability with
In order to follow RFC standard by deleting comparability with Cisco router, use the following command.
Information
RP receives packet from multicast source and transmits it to receiver. However, it there is no packet
received from source for certain period, it is not necessary to keep multicast item. Therefore, RP checks
whether packet is received from source at regular interval and this function is named Cache-check. In
DDJ:A-M-5524B5-01 363
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
There is RPF(Reverse Path Forwarding) on route of transmitting multicast packet. RPF is, a former
router that transmits multicast packet. In the below picture, ROUTER B is RPT of ROUTER E and
Source
B(RP) A C
SPT
RPT
364 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
However, user can configure ROUTER D as RPF by configuring multicast routing table manually. It is
possible for users to configure router as RPF by configuring multicast routing table manually.
In order to configure multicast routing table manually to configure RPF, use the following command.
In order to delete configured multicast routing table, use the following command.
It is possible to configure PIM-SM on Ethernet interface. You need to be able to do the following to do it.
You need to enter into Interface configuration mode of specified interface for activating PIM-SM on
Ethernet Interface. In order to enter into Interface configuration mode, use the following command.
interface interface-name Global Enters into Interface configuration mode of specified interface.
DDJ:A-M-5524B5-01 365
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
no interface interface-name Global Enters into Interface configuration mode of specified interface.
In order to activate PIM-SM after entering into the Interface configuration mode, use the following
command.
It may happen that some of receivers in multicast group cannot receive packet because of not satisfying
terms to receive multicast packet. It is possible to configure not to receive multicast packets that cannot
be sent to receiver.
In order to block transmitting packet to specified multicast group, use the following command.
366 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
When all equipments configured PIM are considered as one big PIM domain, it may cause that
unnecessary Bootstrap messages can be transmitted between group members which are operated as
To prevent this problem, you can prohibit transmitting Bootstrap message between multicast groups,
Source A Source B
Bootstrap Message
Mutlcast Domain A blocked
In order to prohibit transmitting Bootstrap message between multicast groups, which are operated as
DDJ:A-M-5524B5-01 367
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Assert message information owned only by Ethernet interface in which PIM-SM is configured.
Information
Unless you configure Assert message information on Ethernet interface, value configured at “7.6.6
In order to configure Assert message interface on Ethernet interface, use the following commands.
ip pim preference <1-255> Interface Configures preference of Assert message of specific interface.
Information
In order to delete configured Assert message information on Ethernet interface, use the following
commands.
no ip pim preference Interface Deletes configured preference of Assert message of specific interface.
368 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
[Sample Configuration 6]
SWITCH(config)# interface 1
SWITCH(config-if)# ip pim sparse-mode
SWITCH(config-if)# ip pim border
SWITCH(config-if)# ip pim metric 5
SWITCH(config-if)# ip pim preference 10
SWITCH(config-if)# ip pim threshold 100
SWITCH(config-if)# show running-config
Building configuration...
(omitted)
interface 1
no shutdown
ip address 172.16.209.1/16
ip pim sparse-mode
ip pim threshold 100
ip pim preference 10
ip pim metric 5
ip pim border
!
router pim
preference 1
metric 1
!
ip route 0.0.0.0/0 172.16.1.254
(omitted)
!
no snmp
!
SWITCH(config-if)#
DDJ:A-M-5524B5-01 369
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
□ RP Table
show ip pim mrt group group-address Enable/Global Shows routing table of specific multicast group.
370 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
(3) RP Table
show ip pim rp group ip- address Enable/Global Shows RP table recorded in switch.
In order to view PIM-SM configured on Ethernet interface, use the following command.
show ip pim interface Enable/Global Shows PIM-SM information configured on Ethernet interface.
In order to view static IP multicast routing table, use the following command.
VRRP routers to prevent network failure caused by one dedicated router. You can configure maximum
255 VRRP routers in VRRP group of SURPASS hiD 6610. First of all, decide which router plays a roll as
Master Virtual Router. The other routers will be Backup Virtual Routers. After you give priority to these
backup routers, the router serves for Master Virtual Router when there are some problems in Master
Virtual router. When you configure VRRP, configure all routers in VRRP with unified Group Id and
assign unified Associated IP to them. After that, decide Master Virtual Router and Backup Virtual Router.
A router which has the highest priority is supposed to be Master and Backup Virtual Routers also get
DDJ:A-M-5524B5-01 371
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Internet
Virtual Router
Associate IP : 10.0.0.5/24
In case routers have same priorities, then a router, which has lower IP address, gets the precedence.
The below picture shows an example of configuring three routers which have IP addresses, 10.0.0.1/24,
10.0.0.2/24 and 10.0.0.3/24 for each one as Virtual router by Associated IP,10.0.0.5/24. If theses three
routers have same Priority, a router, which has the smallest IP, address, 10.0.0.1/24 is decided to be
Master Router. Also, switches and PCs connected to the Virtual Router are to have IP address of Virtual
In order to configure SURPASS hiD 6610 as device in Virtual Router, use the following command on
configuration mode. Then you can configure VRRP by entering into VRRP configuration mode.
372 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Information
The following is an example of entering into VRRP configuration mode by using the above command.
When you enter into VRRP configuration mode, the system prompt will be changed for SWITCH(config-
Enable/Global /Bridge
show running-config Shows switch’s configuration.
/Interface/VRRP
In order to return into configuration mode, or to enter into Privilege Exec Enable Mode, use the following
commands.
After configuring Virtual Router, you need to assign Associated IP address in Virtual Router. Assign
In order to assign Associate IP address to routers in Virtual Router or delete configured Associate IP
DDJ:A-M-5524B5-01 373
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The following is an example of assigning IP address, 10.0.0.5 to Virtual Router of SURPASS hiD 6610.
Siemens, Inc. products configure Master Router and Backup Router by comparing Priority and IP
address of devices in Virtual Router. First of all, it compares Priority. A device, which has higher Priority,
is to be higher precedence. And when devices have same Priority, then it compares IP address. A
device, which has lower IP address, is to be higher precedence. In case of trouble with Master Router,
when there are more than two routers, one of them is selected according to their precedence.
In order to configure Priority of Virtual Router or delete the configuration, use the following commands.
In order to set Vrrp timers or delete the configuration, use the following commands.
Note
374 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Note
The following is an example of configuring Master Router and Backup Router by comparing their
Priorities: Virtual Routers, Layer 3 SWITCH 1 – 101 and Layer 3 SWITCH 2 – 102. Then, regardless of
IP addresses, one that has higher Priority, Layer 3 SWITCH 2 becomes Master Router.
DDJ:A-M-5524B5-01 375
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
By default, Priority of SURPASS hiD 6610 is configured as “100”. So, unless you configure specific
Priority, this switch becomes Master Router because a device, which has lower IP address, has higher
precedence.
Also, when there are more than two Backup Routers, IP addresses are compared to decide order. The
following is an example of configuring Master Router and Backup Router by comparing IP addresses:
376 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
When the link connected to Master Router of VRRP is off as below, if link of Master Router is not
recognized, the users on the interface are not able to communicate because the interface is not able to
In the condition that Link to VRRP's master router is link down as the figure shown below, if the link of
In SURPASS hiD 6610, you can configure Master Router to be changed by giving lower Priority to
Master Router when the link of Mater Router is disconnected. This function is VRRP Track.
Internet
Virtual Router
Associate IP : 10.0.0.5/24
① Link down
DDJ:A-M-5524B5-01 377
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure VRRP Track in SURPASS hiD 6610, use the following command.
Information
If the user configures priority value as less than 1, the priority will be 1.
Information
If you configure VIP as your IP address, so priority becomes 255, the priority does not become lower
by Track function.
After user configures Virtual Router, if anyone knows Group ID And Associated IP address, it is possible
to configure another devices as Virtual Router. To prevent it, user needs to configure a password,
named authentication password that can be used only in Virtual Router user configured. In order to
configure an authentication password for security of Virtual Router, use the following command on
Note
378 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is an example of configuring Authentication password in Virtual Router as network and
confirming it.
Preempt is a function that an added device with the highest Priority user gave is automatically
configured as Master Router without rebooting or specific configuration when you add an other device
after Virtual Router is configured. In order to configure Preempt, use the following command on VRRP
configuration mode.
SWITCH(config)#
DDJ:A-M-5524B5-01 379
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Also, in order to make Preempt “enable” as default setting, use the following command on VRRP
configuration mode.
Note
Master Router in Virtual Router transmits its data to the other routers in VRRP group at regular interval.
The interval is named as Advertisement Time. User can configure Advertisement Time in SURPASS hiD
6610. In order to configure Advertisement Time, use the following command on VRRP configuration
mode.
The following is an example of configuring Advertisement Time as 10 seconds and confirming it.
SWITCH(config)#
380 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to delete configured Advertisement Time for default setting, use the following command.
no vr_timers advertisement VRRP Deletes configured Advertisement time to return default setting.
Note
Note
For SURPASS hiD 6610, Advertisement Time can be configured for 1 second to 10 seconds.
In order to view statistics that packets have bees sent and received, use the following command.
show vrrp stat Enable/Global Shows statistics of packets in Virtual Router Group.
SWITCH(config)#
DDJ:A-M-5524B5-01 381
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to clear statistics that packets have bees sent and received, use the following command.
clear vrrp stat Global/ VRRP Clear s statistics of packets in Virtual Router Group.
8.12 Bandwidth
Routing protocol uses bandwidth information to measure routing distance value. In order to configure
Note
The bandwidth can be from 1 to 10,000,000Kbits. This bandwidth is for routing information implement
382 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
8.13 DHCP
DHCP(Dynamic Host Control Protocol) makes DHCP server assign IP address to DHCP clients
automatically and manage the IP address. In the environment that all PCs may be not connected to
network at the same time, all of they do not need to have IP addresses. When some of they need IP
address, it can be automatically assigned. In this case, DHCP server is the one that assigns IP address
automatically and DHCP clients are those, which PCs are. DHCP provides the following benefits.
◆ Saving COST
With limited IP source, many users can connect to internet. So, it can save IP source and the cost.
Anyone can configure DHCP server and DHCP clients belonged to network managed by DHCP server
access to network without professional knowledge such as configuring TCP/IP on network environment..
DHCP Server
IP Request
(Broadcast)
DHCP Pack
(Unicast)
PC PC PC
Subnet
※ PC=DHCP Client
SURPASS hiD 6610 can be the DHCP server or the DHCP Relay agent according to user’s
configuration. The DHCP Relay agent’s function is to connect the DHCP server to the DHCP client.You
IP Pool
DDJ:A-M-5524B5-01 383
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
DHCP Option-82
In order to provide DHCP server to DHCP client by configuring the switch as DHCP server, configure as
In order to configure the user’s switch as DHCP server, use the following command in Configuration
mode.
ip dhcp active server Global Configures the user’s switch as DHCP server.
Meanwhile, SURPASS hiD 6610 supports special function that prohibits assigning plural IP address to
one MAC address. Usually, SURPASS hiD 6610 assigns IP address to equipment, which already has
However, although personal computer does not need plural IP addresses, it gets them. This function
prevents that case. In other words, it is possible for SURPASS hiD 6610 both to assign plural IP
address to equipments and also prohibit assigning plural IP address to one MAC address. In order to
prohibit assigning plural IP address to one MAC address, use the following command.
Information
When you do not need the function to prohibit assigning IP address to one MAC address, activate
384 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
no ip dhcp active server Global Disable the user’s switch as DHCP server.
8.13.2 IP Pool
The assembly place for IP address which DHCP server assign to clients is called IP Pool. The manager
can configure the name for their IP Pool. If you configure the name for IP Pool, you will enter DHCP IP
Pool configuration mode. After that, system prompt changes form SWITCH(config)# to
In IP Pool configuration mode, you can configure subnet, the range of IP address, default gateway of
subnet. In order to enter from IP Pool configuration mode to configuration mode, input the command
“exit” and in order to enter Privilege Exec Enable Mode immediately, input the “end” command. In order
to delete configured IP Pool , use the following command in Global Configuration Mode.
DDJ:A-M-5524B5-01 385
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to designate the subnet, use the following command in IP Pool configuration mode.
Information
You have to configure default gateway all IP addresses can be allowed so that DHCP server can
communicate with unspecified IP address. In order to configure default gateway of subnet, use the
following command.
After configuring DHCP subnet, you need to configure IP address range used in the subnet.
386 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to configure inconsecutive subnets in same IP address range. For example, you can
In order to delete the configured IP address range, use the following command.
DHCP server administrator can configure the available time to use IP address assigned to DHCP client.
This time is named IP address lease time. The default is one-hour and the system asks if DHCP client
wants to extend it by the end of the time. In order to configure IP address lease time, use the following
command.
Information
The default is one hour(3600 seconds), and the maximum is two hours.
DDJ:A-M-5524B5-01 387
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
Information
DHCP server basically informs IP address, default gateway, IP address lease time ,and available DNS
server when DHCP client is accessed. Therefore, you should register DNS server that can be used in
Information
In order to delete the configured DNS server, use the following command.
In SURPASS hiD 6610, the administrator can manually configure IP addresses. It is assigning an IP
address to DHCP client who has specific MAC address. In order to assign IP address manually, use the
following command.
388 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to check lease data of IP address which is assigned to the IP Pool, use the following command.
fixed shows fixed-IP addresses and bound shows IP addresses assigned from the server by Discover-
Offer-Request-Ack when a clinet requests IP address to the server and offer shows IP address that the
server presented to the client in offer stage. free shows the addresses that the clients can currently use
and abandon shows IP addresses that have been requested from the clients even the server did not
present them and you can check all of the IP addresses with the command all.
[Sample Configuration 1]
The following is an example of configuring DHCP server ; network range 192.168.1.0/24 as subnet and
DDJ:A-M-5524B5-01 389
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The default gateway of subnet is configured as 192.168.1.254 and DHCP server is activated.
Supported informations:
Lease time (default) 3600
Lease time (Maximum) 3600
Default gateway
192.168.1.254
SWITCH(config)#
In order to check the assigned IP addresses of each IP Pool, use the following command.
show ip dhcp pool summary pool-name Global Check the IP addresses assigned from DHCP.
In SURPASS hiD 6610, it is possible to block to use IP Pool resources as fixed by using the assigned IP
390 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The following is the commands of blocking the user who uses IP address as fixed.
You can check the information of valid IP and invalid IP after enabling “ blocking the fixed IP” function
show ip dhcp authorized-arp valid Shows the assigned IP addresses through the proper process.
In order to deleted the data of fixed IP, use the following command.
clear ip dhcp authorized-arp illegal Global Deletes the data of fixed IP.
In SURPASS hiD 6610, it is possible to block the specific client with MAC address. If the blocked MAC
address by an administrator requests IP address, the server does not assign IP. This function is to
ip dhcp filter-port port-number Global Configure the port in order not to assign IP.
DDJ:A-M-5524B5-01 391
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
DHCP server basically informs IP address, default gateway, IP address lease time ,and available DNS
server when DHCP client is accessed. Therefore, you should register DNS server that can be used in
DHCP server. You can register up to two servers. This server is applied to all IP Pools if you don’t
In order to register DNS server that is common to all IP Pools, use the following command in IP Pool
mode.
ip dhcp default-config dns-server ip-address 1 Register DNS server that is common to all
IP Pool
[ip-address 2] [ip-address 3] of IP Pools.
In order to delete the registered DNS server, use the following command.
392 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
DHCP server administrator can configure IP available time that is common to all IP Pools. This time is
applied to all IP Pools if you don’t configure DNS server for IP Pools seperately. The default time is an
hour and the server sends Request Packet in order to ask if DHCP clinet prolongs the time of using IP.
To configure available time of using IP, use the following command in Global Configuration Mode.
ip dhcp default-config lease-time defalut Configure default time of using IP. The time uint is
<120-2147483637> second.
Global
ip dhcp default-config lease-time max Configure maximum time of using IP. The time uint is
<120-2147483637> second..
Information
In SURPASS hiD 6610, the default time for using IP address is 1 hour (3600 sec).
In order to release the the configured time, use the following command.
You can configure the system to forward IP address that is requested from DHCP clients in hiD 6610. It
called the DHCP Relay agent. The DHCP Relay agent is of avail to manage a wide DHCP subnet.
DDJ:A-M-5524B5-01 393
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
DHCP Server
※ PC=DHCP Client
PC PC PC PC PC PC
Subnet 1 Subnet 2
The following is how to configure SURPASS hiD 6610 as DHCP Relay agent.
After configuring SURPASS hiD 6610 as Relay agent, register DHCP server. In order to register DHCP
ip dhcp active relay server-address Register DHCP server and configure the user’s switch
Global
[server-address2] [server-address 3] as Relay agent.
The following is how to delete the registered DHCP server and configuring the user’s switch as Relay
agent.
no ip dhcp active relay server-address Release the registered DHCP server and Relay agent.
394 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to register DHCP server up to 3. DHCP client can select IP address among many IP
[ Sample Configuration 1 ]
The following is an example of configuring DHCP Relay and register DHCP server.
!
SWITCH(config)#
As subscriber network is getting enlarged, DHCP server should assign IP addresses to many
subscribers. User can manage subscribers efficiently using DHCP Option-82. In DHCP Option-82,
DHCP Relay sends DHCP Request packets attaching Option-82 information and it authenticates the
subscriber through this information. Through Option-82, DHCP not only assigns IP address but also
restricts access to server. Moreover it provides differentiated service and enhances the security.
hiD 6610 transmits port number and Remote ID with Option-82 to DHCP server. The priority of port
number is higher than that of Remote ID. When it receives Request packet without Option-82
information, it attaches its information. In case Remote ID recorded in Option-82 is same with MAC
address of its system, it transmits packets after removing Option-82 by designated port number.
DDJ:A-M-5524B5-01 395
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
DHCP Server
④ DHCP Rspond+Option-82
② DHCP Request+Option-82
⑤ DHCP Respond
① DHCP Request
In order to enable DHCP Option-82 in hiD 6610, use the following command.
In order to return into configuration mode, or to enter into Privilege Exec Enable Mode, use the following
commands.
396 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
User can configure how to process the packets when DHCP Option-82 packets come to DHCP server
In order to configure the policy for Option-82 packet, use the following command in Option-82
configuration mode.
In order to configure the policy for Option-82 packet, use the following command in Option-82
configuration mode.
“drop” means to throw away Option-82 packet. “keep” means that Relay agent transmits packets
preserving Option-82 which the agent sends, “replace” means to transmit by changing into it’s Option-
82 information.
DHCP Server
④ DHCP Rspond+Option-82
② DHCP Request+Option-82
⑤ DHCP Respond
① DHCP Request
It is possible to configure the rule for Option-82 packets when hiD 6610 is DHCP server or DHCP Relay
agent.
DDJ:A-M-5524B5-01 397
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
In order to configure remote-ID and designate the number of assigning IP address to the remote-ID, use
To delete remote-ID and designate the number of assigning IP address for the remote-ID, use the
following command.
When the administrator configures the remote-id, he can also configure from where ip addresses are
remote-id binary binary-format pool pool-name Option-82 Configures remote-ID and pool.
398 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
no remote-id binary binary-format pool pool-name Option-82 Deletes remote-ID and pool.
In SURPASS hiD 6610, you can assign IP addresses by Remote-ID and Circuit-ID. If you configure
Remote-ID and Circuit-ID, the server assigns IP addresses for the packets having the designated
Remote-ID and Circuit-ID. And you can also limit the number of assigning IP address in this
configuration. To assign IP address with Remote-ID and Circuit-ID and limit the number of IP address,
remote-id binary binary-format circuit-id text circuit-id lease-limit Remote-ID and Circuit-
Option-82
<0-2147483637> ID and limits the number
<0-2147483637>
DDJ:A-M-5524B5-01 399
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To delete Remote-ID and Circuit-ID and the number of IP address, use the following commands.
no remote-id binary binary-format circuit-id text circuit-id lease-limit Option-82 Circuit-ID and limits
address
no remote-id text remote-id circuit-id binary binary-format lease-limit
In SURPASS hiD 6610, you can assign IP addresses by Remote-ID and Circuit-ID. If you configure
Remote-ID and Circuit-ID, the server assigns IP addresses for the packets having the designated
Remote-ID and Circuit-ID. And you can also configure IP Pool in this configuration.
To assign IP address with Remote-ID and Circuit-ID and configure IP Pool, use the following commands.
400 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To delete Remote-ID and Circuit-ID and IP Pool, use the following commands.
no remote-id binary binary-format circuit-id binary binary-format pool Assigns IP address with
no remote-id binary binary-format circuit-id text circuit-id pool Option-82 Remote-ID and Circuit-
no remote-id binary binary-format circuit-id index <0-65535> pool ID and configure IP Pool
In option-82 environment, the packet from the switch is transmitted with remote ID or circuit ID. In
SURPASS hiD 6610, remote ID is MAC address by default and circuit ID is port number by default.
Here, it is possible to change the form for remote ID and circuit ID of the switch in easier way to
recognize.
To change the form of Remote ID of the switch, use the following commands.
DDJ:A-M-5524B5-01 401
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To disable to change the form fo Remote ID and Circuit ID, use the following command.
no system-remote-id port-number
Option-82 Configures remote-ID.
no system-circuit-id
In hiD 6610, it is possible to save DHCP lease data base. To Back-up DHCP lease database,use
ip dhcp leasedb backup ip- address <1- Back-up DHCP lease database and configure the
SURPASS hiD 6610 supports Broadcast Storm Control for Broadcast packet. Broadcast Storm is
overloading situation of broadcast packets since they need major part of transmit capacity. Broadcast
storm may be often occurred because of difference of versions.For example, when there are mixed 4.3
BSD and 4.2 BSD, or mixed Appletalk Phase I and Phase II in TCP/IP, Storm may be occurred.
Also, when information of routing protocol regularly transmitted from router is wrong recognized by
system, which does not support the protocol, Broadcast Storm may be occurred.
Broadcast Storm Control is operated by ; system counts how many Broadcast packets are there for a
second and if there are packets over configured limit, they are discarded.
SURPASS hiD 6610 provides not only broadcast storm but also control of multicast and
DLF(Destination Lookup Fail) storm. In order to use control of muticast and DLF storm, use the
following commands. Then all configurations of Broadcast storm control will be equally applied to all
VLANs.
402 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To enable multicast storm control and DLF storm control, use the following commands.
Information
The default is enabled DLF storm control and disabled multicast storm control.
In order to disable multicast storm control and DLF storm control, use the following commands.
The packet range that can be capable to accept is from 64 Bytes to 1,518 bytes. Therefore, packets not
between this range will not be taken. However, SURPASS hiD 6610 can accept Jumbo-frame larger
In order to configure to accept Jumbo-frame larger than 1,158 bytes, use the following command.
DDJ:A-M-5524B5-01 403
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Information
[Sample Configuration 1]
The following is an example of configuration to accept Jumbo-frame under 2500 bytes in port 1~10.
404 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
RFC 2644 recommends that system blocks broadcast packet of same network bandwidth with
interfaceof equipment, namely Direct broadcast packet. Hereby, SURPASS hiD 6610 supposed to block
Direct broadcast packet by default setting. However, you can enable or disable it in SURPASS hiD 6610.
Information
In order to disable blocking Direct broadcast packet, use the following command.
In order to view configuration about blocking Direct broadcast packet, use the following command.
The following is an example of blocking Direct broadcast packet and confirming it.
DDJ:A-M-5524B5-01 405
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
9. IP Routing Protocol
This chapter describes on layer 3 switching and how to configure the switch for supported IP routing
protocols. It is intended to provide enough information for a network administrator to get the protocols
up and running.
BGP(Border Gateway Protocol) is, as defined in RFC 1163, 1267, EGP(Exterior Gateway Protocol) to
connect to exterior Network. BGP manages routing information in network so that AS(Autonomous
System) can transmit and receive routing information. BGP consists of network number, which packet is
SURPASS hiD 6610 supports BGP version 4 defined in RFC 1771. BGP version 4 provides Aggregate
route by using CIDR(classless interdomain routing) to reduce size of routing table. CIDR provides IP
prefix, which is network address instead of IP address on BGP network. OSPF and RIP can also
Switch, which takes BGP protocol, is intended to exchange AS(autonomous system) and path reaching
to AS between BGP equipments. By doing it, user can prevent routing Loop and take the most effective
AS information.
User can configure MED(Multi Exit Discriminator) by using route map. When new routing information is
transmitted to neighbor BGP, MED is passed without any change. Thus, BGP routers located in same
BGP configuration is roughly divided into basic configuration and advanced configuration. Basic
□ Activating BGP
406 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
□ AS Route Filtering
Step 1 Enter into BGP router configuration mode by using the following command. Then BGP will be
activated.
router bgp <1-65535> BGP Config Assigns AS number to configure BGP routing.
AS number is an identification of autonomous system used for detecting the BGP connection. AS
number is a digit between 1 and 655367. AS number 65512 through 65535 are defined as private AS
Step 2 Configure BGP network and register it in BGP routing table by using the following commands.
network prefix nlri [multicast | unicast] Decides where to send routing information.
EGP should know neighbor router. Therefore BGP, as one of EGP, has to configure neighbor router.
BGP neighbor router includes internal neighbor router, which is located in same AS and external
neighbor router, which is located in different AS. Usually, internal neighbor router in same AS is not
directly connected, but external neighbor router is directly connected to share partner’s sub network.
DDJ:A-M-5524B5-01 407
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Routing policy is to decide which information to receive and which information to provide through route-
map, distribute-list and prefix-list when exchanging routing information with neighbor router. When you
change routing policy, you should modify routing information to follow new policy by deleting routing
In order to receive routing information of new policy, you need to configure inbound reset, and in order
to provide the information, you need to configure outbound reset. When BGP router provides routing
information of new policy, neighbor routers are supposed to receive the information.
If both BGP router and neighbor router support route refresh capability, it is possible to renew routing
information by using inbound reset. This way has the following advantages.
In order to check if neighbor router supports route refresh capability, use the following command.
If all BGP routers support route refresh capability, user can receive route information by using soft reset.
408 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to configure routing information to follow new policy, use the following command.
clear ip bgp [* | AS | address ] network address to receive the information or AS. When you select
Enable
soft in asterisk(*), the routing information will be received from all
addresses.
No previous configuration is required for outbound reset. Routing information is resent by using
command, soft.
clear ip bgp [* | AS | address] provided. You can configure network address or AS to send the
Enable
soft out information. When you select asterisk(*), the routing information will
When administrator recoveries default routing policy from configured one, route refresh capability is
used. You do not have to delete configured policy one by one in case of this function.
Meanwhile, if a router does not support route refresh capability, you should delete old routing
information by using “neighbor soft-reconfiguration”. However, you would better take another way as
possible because it may cause network problem.
If you do not want to reconfigure BGP information but create new information, you have to save all
incoming information to BGP network in BGP router without processing routing information in order.
Therefore you would better avoid it. On the other hand, memory is not required to provide changed
information. After BGP router transmits new information, neighbor router receives the information.
DDJ:A-M-5524B5-01 409
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to change BGP configuration through saved routing policy, follow the below steps.
Step 1 After reconfiguring BGP router, configure to save received information from neighbor router.
And then, all incoming information to BGP router will be saved.
clear ip bgp [* | as-address] soft in Enable information. You can configure network address, AS, or
In order to check it routing information is correctly changed through routing table and BGP neighbor
Weight is number assigned to route to decide route. It is available from 0 to 65534 only in BGP. If you
want to give priority to information from specific router, you can assign higher weight to the information
410 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
By default setting, SURPASS hiD 6610 uses AS to decide route. However, you can change it to decide
route as IETF.
In order to disregard length required to reach to AS in case of deciding route, use the following
command.
If you want to block specific routing information in system, you can optionally receive information, which
is transmitted to and received from neighbor router. In this case, user should configure access list and
prefix list. Then routing information will be filtered with configured standard.
Information
As filtering information with network address on BGP network, it is possible to filter information going
through AS. Policies applied to decide route are registered in access list. In order to filter routing
information with AS standard, configure filtering policy in access list and apply the policy to neighbor
router.
DDJ:A-M-5524B5-01 411
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Step 3 Apply defined access list to filter routing information, which AS transmits or receives.
When you restrict BGP route, prefix list is preferred than access list because of the following reasons;
● saves time to search and apply data in case of massive filter lists.
● easy to use
Before applying prefix list, user should configure prefix list. User can assign number to each policy
412 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Filtering through prefix list processes routing information in specific order by applying policy defined in
filter list. It is similar to access list but there are more detail rules as follow;
● Rejects specified network information unless policy applied to network is defined in prefix list.
● Distinguishes each policy with the assigned number and applies policy which has the lowest number
when there are more than one policy applied to one network.
Routers search policy in prefix list from the top in order. When they find required policy, they
sPrevileged searching. For faster operation, user can make quick search list on the top of the list by
using seq provided from ip prefix-list. In order to view assigned number to policy, use the command,
show ip prefix-list. Policies configured by user are automatically assigned number. If you do not
configure it, you should assign number to each policy by using the command, ip prefix-list SEQ-
VALUE.
ip prefix-list name {deny|permit} [description description] Configures list name when creating prefix
ip prefix-list name {deny|permit} [description description] Global Creates prefix list to be applied to all
Information
DDJ:A-M-5524B5-01 413
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
You can add policy to prefix list one by one. Use the following command.
You can input ge and le optionally, and they are used when you configure more than one network. If you
do use neither ge nor le, network range is more clearly configured. When only ge attribute us
configured, network range is configured from ge-value, and when only le attribute is configured, network
range is configured from netmask to le-value.
In order to view information about prefix table, use the following command.
By default system records number how many times prefix list is inquired. In order to delete the number,
414 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to block new routing information transmitting to next destination. This function is useful
when system is not connected to same IP network like Frame Relay. There are two ways to bock new
□ Receives information from neighbor through route map and local BGP router distributes
information
In order to block routing information transmitting to next destination by configuring another address
This command informs router’s address instead of neighbor router address and makes BGP routers
transmit information with the address. It is more effective than assigning specific address which to
To make the next destination of BGP be neighbor router, use the command, set ip next-hop. In order to
configure neighbor router as the next destination of BGP, use the following command.
DDJ:A-M-5524B5-01 415
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
set ip next-hop ip-address Route-map next destination of BGP and configure neighbor router address
By default, system supports BGP version 4. It is also possible to change the version as user needs.
In order to make a connection to neighbor router with specified BGP version, use the following
command.
neighbor ip-address version Configures BGP version to be used when communicating with
Router
{4 | 4-} neighbor router..
After finishing basic configuration, it is possible to do advanced configuration. It contains the following
sections.
416 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
□ Route Dampening
You can process routes in specific order or change various attributes through route map. It is possible
for route map to apply both received information and distributed information.
Define route map and then it is possible to receive or distribute only matched routes to route map.
Routing information is processed in order; AS route first, then community, and network number last.
To prescribe process term, AS route uses as-path access-list, community uses community-list and
network uses ip access-list. In order to define route map, use the following command.
CIDR(Classless interdomain routing) has user create aggregate route or supernet to minimize size of
routing table. User can transmit aggregate route to BGP router or configure aggregate route by using
aggregate function. When there are more than one route in BGP table, aggregate address is added to
BGP table.
DDJ:A-M-5524B5-01 417
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure aggregate address to routing table, use the following commands.
BGP supports transmit policy distributing routing information. Distributing routing information is operated
based on not only community list but also IP address and AS route. Community list makes community
according to each destination and routing policy is applied based on community standard. It helps
Community is destination group that shares some common attributes. One destination can be belonged
to more than one community. As administrator can configure to which community destination is
● no-advertise: (Either exterior or interior) Do not distribute this route to neighbor router.
● local-as: Distribute this information to neighbor routers of low level AS located on BGP united
network. Do not distribute it to exterior router.
“community” is notated with a form, AA:NN as defined in RFC. AA is AS number and NN is number of 2
bytes. In order to transmit community name to IP address of neighbor router, use the following
command.
418 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
User can assign router ID number for BGP router, which transmits BGP route. If you want delete this
It is possible to register route made in another place in BGP routing table. For instance, it is possible to
transmit connected route, kernel route, static route and route made by routing protocol to BGP. This
In order to distribute route made in another place to BGP, use the following command.
One way to reduce complicate multi-connection of BGP network is to divide one AS into several small
ASs and to group them into one confederation. To the outside, the confederation looks like a single AS.
All systems in each AS are connected to each other, but all they are not directly connected to another
AS in same confederation. In this case, communicating with neighbor router in another AS is considered
as communicating with interior BGP router. Especially, next destination, MED, and priority value in
network are applied as they are. In order to configure BGP confederation, you should configure ID
number for confederation. To the outside, a series of AS group looks like a single AS which has each
DDJ:A-M-5524B5-01 419
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
BGP requires that all of speaker routers in network be connected to each other. However, it is
By using route reflector, all BGP speaker routers do not need to be fully connected to each other
because it is possible to distribute transmitted route to neighbor route. Interior neighbor router
In order to configure route reflector and client router, which receives the route, use the following
command.
To provide BGP routing information to lots of neighbors, you can configure BGP to receive information
from neighbors by using access list. In order to configure BGP route through neighbor, use the following
commands.
420 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
neighbor ip-address
Saves received information.
soft-reconfiguration inbound Router
neighbor ip-address
Configures peer not to reflect changed route.
dont-capability-negotiate
neighbor ip-address Configures not to display the next hop although peer is
neighbor ip-address
Makes peer to override another route on received route.
override-capability
neighbor ip-address
Configures interface of neighbor router.
interface interface-name
DDJ:A-M-5524B5-01 421
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
default-originate router.
neighbor ip-address update-source Forwards internal BGP information to interface, which is able
In order to activate BGP neighbor router again, use the following command.
You can configure which networks are reachable by using a backdoor route that the border router
should use. In order to configure border router, use the following command.
422 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to decide type of route for sending to neighbor router, use the following command.
Administrative distance is a measure of priority of each routing protocol. BGP uses three kinds of
Routes through exterior BGP are given exterior distance, routes through interior BGP are given interior
distance and routes through local BGP are given local distance.
distance bgp external internal local Router Configures BGP distance value.
Since it may be risky to change BGP distance, it is not recommended. The exterior distance should be
lower than any other routing protocol, and the interior distance and local distances should be higher
You need to configure BGP timer so that BGP can transmit keepalive message at regular interval and
control it when there is no response from its destination. Keepalive timer configured by BGP system is
60 seconds and holdtimer is 180 seconds. It is possible to configure monitor timer in all neighbor router.
DDJ:A-M-5524B5-01 423
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure BGP timer for all neighbor routers, use the following command.
In order to adjust BGP timer for specified neighbor router, use the following command.
neighbor ip-address
Configures keepalive timer and holdtimer for specific peer.
timers keepalive holdtimer
Router
neighbor ip-address
Configures connection timer with neighbor router.
timers connect time
To delete time value configured in BGP neighbor router, use no neighbor timers command.
In order to check imported information from remote network, use the following command.
In order to configure neighbor router as the first AS, use the following command.
424 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to make high preference low preference by changing priority of local network. The default
setting of priority is 100. In order to change priority of local network, use the following command.
bgp default local-preference value Router Changes default priority of local network.
In order to select route of the lowest number as the optimized route among similar routes from exterior
BGP router, use the following command. If you recovery default setting, use “no”.
In order to configure route without MED attribute as the worst route, use the following command.
bgp bestpath med missing-as-worst Router having a value of infinity, choosing a path among
confederation paths.
MED is one of the parameters that is considered when deciding the best route among many alternative
routes. Route with a lower MED is preferred over route with a higher MED. By default, MED is
compared just in same AS to decide the best route. To do it, use the following command.
DDJ:A-M-5524B5-01 425
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
To configure router to consider MED value when deciding route, use the following command.
In order to configure router to use MED to decide the best route among routes distributed by a single
In order save route reflection from BGP route reflector to clients, use the following command.
bgp client-to-client reflection Router Saves route reflection from BGP route reflector to clients.
Route dampening is designed not to distribute routes, which repeat being available and unavailable. A
route is considered to be flapping when it is repeatedly available, then unavailable, then available, then
426 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
● History state — Whenever a route flaps, it assigns a penalty and configure as "history state,"
meaning the router does not have the best path, based on historical information.
● Penalty — Each time a route flaps, the router configured for route dampening in another AS assigns
the route a penalty of 1000. Penalties are cumulative. The penalty for the route is stored in the BGP
routing table until the penalty exceeds the suppress limit. At that point, the route state changes from
"history" to "damp."
● Damp state — In this state, the route has flapped so often that the router will not advertise this route
to BGP neighbors.
● Suppress limit — A route is suppressed when its penalty exceeds this limit. The default value is 2000.
● Half-life — Once the route has been assigned a penalty, the penalty is decreased by half after the
half-life time, which is 15 minutes by default. The process of reducing the penalty happens at 5 seconds
interval.
● Reuse limit — As the penalty for a flapping route decreases and falls below this reuse limit, the route
is unsuppressed. That is, the route is added back to the BGP table and once again used for forwarding.
The default reuse limit is 750. The process of unsuppressing routes occurs at 10-second increments.
Every 10 seconds, the router finds out which routes are now unsuppressed and advertises them to the
world.
● Maximum suppress limit — This value is the maximum amount of time a route can be suppressed.
The default value is 4 times the half-life.
In order to change the default values of various dampening factors, use the following command.
DDJ:A-M-5524B5-01 427
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
User can delete all factors of cache, table and database. Also it is possible to display specific statistics.
You can delete all contents of specific cache, table, and database when some factors are invalid or
unreliable. In order to delete cache, table or database, use the following commands.
You can display specific statistics such as contents of BGP routing table, cache, and database.
Information provided can be used to determine resource utilization and solve network problems. You
can also display information about node reachability and discover the routing path your device's packets
are taking through the network. In order to display various routing statistics, use the following
commands.
show ip bgp prefix-list name Shows peers to which the prefix has been advertised.
show ip bgp filter-list Shows routes that are matched by the specified autonomous
428 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
show ip bgp regexp Shows routes that match the specified regular expression
show ip bgp [network] Shows BGP routing table. longer-prefix presents more detail
and accepted.
OSPF(Open shortest path first) is ) is an interior gateway protocol developed by the OSPF working
group of IETF(Internet Engineering Task Force). OSPF designed for IP network supports IP subnetting
The first thing you should do on OSPF network is to configure border router and AS boundary router.
And then, you need to configure basic setting to operate OSPF router and interface in area.
When you customize OSPF router for user’s environment, you have to confirm that all configurations
DDJ:A-M-5524B5-01 429
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to configure routing protocol in router, you need to enter into Router configuration mode by
Step 2 Configure network ID of OSPF. Network ID decides IPv4 address of this network.
Step 3 Configures an interface on which OSPF runs and specifies the area ID or IP address for that
interface.
After enabling OSPF, you can select the following items to configure.
□ Configuring Comparability
□ Configuring Areas
430 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
As there are various OSPF versions, there are various OSPF configurations according to equipments.
In order to configure OSPF protocol of equipment, configure equipment type named ABR by using the
following command. Please note that SURPASS hiD 6610 is complied with RFC 2328.
Compatibility configuration enables the switch to be compatible with a variety of RFCs that deal with
OSPF. Perform the following task to support many different features within the OSPF protocol.
You can alter certain interface-specific OSPF parameters as needed. You are not required to alter any
of these parameters, but some interface parameters must be consistent across all routers in an
attached network.
Those parameters are controlled by “ip ospf hello-interval”, “ip ospf dead-interval”, and “ip ospf
authentication-key” commands.
DDJ:A-M-5524B5-01 431
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Therefore, be sure that if you configure any of these parameters, the configurations for all routers on
Interface Configures interval to transmit hello packet from OSPF interface. All
ip ospf hello-interval
routers on same network should have same interval value. The default
second
is 10 seconds.
Configures number of how many time hello packets are not received to
ip ospf dead-count
be considered as freezing of OSPF router in neighbor routers. All
count
routers on same network should have same value. The default is 4.
□ Broadcast Network
□ Point-to-point Network
432 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
It is possible to configure OSPF network as broadcast type or non-broadcast type. For example, if
user’s network does not support multicasting, it is possible to configure broadcast network as non-
broadcast type. Conversely, it is also possible to configure NBMP network such as frame relay as
broadcast type. To operate network as NBMA type, all routers should be connected through virtual
circuit. However, it is possible to connect to some part of OSPF network with using virtual circuit through
point-to-multipoint function so that network management cost can be saved. Two routers that are not
directly connected should transmit and receive routing information through intermediate router. So, you
● IP source is economized because you do not have to assign Neighbor router and there is no
● Management cost is saved because it does not need to be linked with all router on network like a
spider's thread.
● It can provide more stable network service since it can communicate even when virtual circuit is
disconnected.
As there might be many routers attached to an OSPF network, a designated router is selected for the
network. It is necessary to select designated router to transmit routing information if broadcast capability
is not configured. To configure router communicated by non-broadcast type, use the following command.
DDJ:A-M-5524B5-01 433
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
You can configure several area parameters including authentication, defining stub areas, and assigning
specific costs to the default route. Authentication allows password-based protection against
unauthorized access to an area. Stub areas are areas into which information on external routes is not
sent. Instead, there is a default external route generated by the area border router, into the stub area for
destinations outside the autonomous system. To further reduce the number of link state advertisements
sent into a stub area, “no-summary” configuration on the ABR is allowed to prevent it from sending
summary link advertisement into the stub area.
Use the following commands as you need. The parameter, “area-id” can be formed as IP address or
from 0 to 4,294,967,295.
Through route summarization, you can configure ABR to transmit single summarized route to other
areas. In OSPF, ABR transmits network information of an area to other areas. When the networks’
addresses are in consecutive range, you can configure a representative address including each network
as network route.
434 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
area id-id range ip-address {suppress | Configures network range that does not transmit
In OSPF, all areas must be connected to a backbone area. If there is a break in backbone continuity, or
The virtual link must be configured in both routers. The configuration information in each router consists
of the other virtual endpoint, and the nonbackbone area that the two routers have in common (called the
transit area). Note that virtual link cannot be configured through stub areas.
In order to create a virtual link, perform the following task in router configuration mode. The parameter,
area area-id virtual-link router-id-address hello- from 1 to 65535 seconds, retransmit-interval is from
interval time retransmit-interval time transmit- Router 3 to 65535 seconds, transmit-delay is from 1 to
255 seconds.
OSPF calculates metric based on interface bandwidth. For example, default metric of T1 link is 64, but
DDJ:A-M-5524B5-01 435
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
If there are plural lines in the bandwidth, you can view costs to use line by assigning metric to each line.
After notice of OSPF network organization changed, you can configure interval to calculate route, which
starts calculating ‘the shortest path first’. In order to configure the interval, use the following command.
The originating router keeps track of LSAs and performs refreshing LSAs when a refresh timer is
reached. You can configure the refresh time when OSPF LSAs gets refreshed and sent out. In order to
Redistributing routes into OSPF from other routing protocols, static, kernel or from connected devices
436 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
In order to redistribute routes into OSPF, use the following tasks associated with route redistribution.
redistribute {kernel | connected | static | rip | bgp} Transmits external route to OSPF
transmitted to OSPF.
You can configure Autonomous System Boundary router to transmit default route to OSPF network.
Autonomous System Boundary router transmits route created externally to OSPF network. However, it
In order to have autonomous System Boundary router create system default route, use the following
command.
and 255. In general, the higher the value is, the lower the trust rating is. An administrative distance of
255 means the routing information source cannot be trusted at all and should be ignored.
OSPF uses three different administrative distances: intra-area, inter-area, and external. Routes learned
through other domain are external, routes to another area in OSPF domain are inter-area, and routes
inside an area are intra-area. The default distance for each type of route is 110.
DDJ:A-M-5524B5-01 437
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
In order to change any of the OSPF distance values, use the following commands.
Interface configured as passive in OSPF network is operated like stub network. Therefore, it is
impossible to transmit and receive OSPF routing information in passive interface. In order to block
To block OSPF routing information to other routers, you should configure to block renewed routing
information. Please note that this function can be configured only for external routes.
distribute-list name out {bgp | Distributes or blocks renewed routing information according
Router
connected | kernel | rip | static} to policy configured in Access list.
You can view all kinds of statistics and database recorded in IP routing table. These information can be
438 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
You can check network connection and routes that data went through when transmitting data also.In
show ip ospf neighbor Shows information of neighbor router communicated with OSPF
When network trouble is occurred, you can find what the cause is by using debugging command.In
debug ospf ism Shows information transmitted in OSPF internal area and the
Global
[events | status | timers] shortest route.
debug ospf lsa Shows information transmitted by OSPF and calculating the
DDJ:A-M-5524B5-01 439
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
RIP(Routing Information Protocol) is a relatively old, but still commonly used, IGP(Interior Gateway
Protocol) created for use in small, homogeneous networks. It is a classical distance-vector routing
RIP uses broadcast UDP(User Datagram Protocol) data packets to exchange routing information. The
OS software sends routing information updates every 30 seconds. This process is termed advertised. If
a router does not receive an update from another router for 180 seconds or more, it marks the routes
served by the nonupdating router as being unusable. If there is still no update after 120 seconds, the
router removes all routing table entries for the nonupdating router.
The metric that RIP uses to rate the value of different routes is hop count. The hop count is the number
of routers that can be traversed in a route. A directly connected network has a metric of zero; an
unreachable network has a metric of 16. This small range of metrics makes RIP an unsuitable routing
A router that is running RIP can receive a default network via an update from another router that is
running RIP, or the router can source (generate) the default network itself with RIP. In both cases, the
RIP sends updates to the interfaces in the specified networks. If an interface's network is not specified,
it will not be advertised in any RIP update. The system supports RIP version 1and 2.
Step 1 Enter into Router configuration mode by using the following command.
440 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
The command “network ip-address” enables RIP interfaces between certain numbers of a special
network address. For example, if the network for 10.0.0.0/24 is RIP enabled, this would result in all the
addresses from 10.0.0.0 to 10.0.0.255 being enabled for RIP. RIP packet is transmitted to port specified
□ Configuring Time
Since RIP is broadcast protocol, routers should be connected to transmit routing information of RIP to
non-broadcast network. In order to configure neighbor router to transmit RIP information, use the
following command.
You can block routing information to specific interface by using passive-interface command.
DDJ:A-M-5524B5-01 441
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Siemens’ routers basically support RIP version 1 and 2. However, you can configure to receive only
version 1 type packet or only version 2 type packet. In order to configure RIP version, use the following
command.
version {1 | 2} Router Configures version to transmit one of RIP 1 type packet and RIP 2 type packet.
The preceding task controls default RIP version settings. You can override the routers RIP version by
configuring a particular interface to behave differently. To control which RIP version an interface sends,
perform one of the following tasks after entering into RIP interface configuration mode.
ip rip send version 1 Transmits only RIP version 1 type packet in the interface.
ip rip send version 2 Interface Transmits RIP version 2 type packet on the interface.
Similarly, to control how packets received from an interface are processed, perform one of the following
tasks.
ip rip receive version 1 Receives only RIP version 1 type packet in the interface.
ip rip receive version 2 Interface Receives only RIP version 2 type packet on the interface.
This feature is provided only by Siemens’ route command creates static route available only for RIP. If
you are not familiar with RIP protocol, you would better use redistribute static command.
route ip-address/m Router Creates static route available only for RIP.
442 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
SURPASS hiD 6610 can redistribute routing information from a source route entry into the RIP tables.
For example, you can instruct the router to re-advertise connected, kernel, or static routes as well as
routing protocol-derived routes. This capability applies to all the IP-based routing protocols.
In order to redistribute routing information from a source route entry into the RIP table, use the following
command.
You may also conditionally control the redistribution of routes between the two domains using “route
map” command. In order to define a route map for redistribution, use the following command.
One or more match and set commands typically follow a route-map command. If there are no match
commands, then everything matches. If there are no set commands, nothing is done. Therefore, you
need at least one match or set command. To define conditions for redistributing routes from a source
route entry into the RIP tables, perform at least one of the following tasks in route-map configuration
node.
match ip next-hop {access-list-name | Route Transmits information to only neighbor router in access-list or
DDJ:A-M-5524B5-01 443
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
The metrics of one routing protocol do not necessarily translate into the metrics of another. For example,
the RIP metric is a hop count and the OSPF metric is a combination of five quantities. In such situations,
an artificial metric is assigned to the redistributed route. Because of this unavoidable tampering with
dynamic information, carelessly exchanging routing information between different routing protocols can
In order to set metrics for redistributed routes, use the following command.
default-metric value Router Configures same metric for all route transmitted by routing protocol.
Information
The metric of all protocol can be configured from 0 to 4294967295. It can be configured from 1 to 16
for RIP.
Distance value represents confidence of routing information created by router. In large scaled network,
some routing protocols or routing information may be more confident than other protocols or routers.
Therefore, although a router has many routing protocols, the most confident route can receive routing
information. When user configures distance value, router can find where routing information is created.
Router always selects route created by routing protocol of the smallest distance value . Each network
has its own features. So, there is no general rule for distance configuration. You should consider overall
444 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
You can force an autonomous system boundary router to generate a default route into an RIP routing
domain. Whenever you specifically configure redistribution of routes into an RIP routing domain, the
system boundary router does not, by default, generate a default route into the RIP routing domain.
In order to force the autonomous system boundary router to generate a default route, use the following
command.
You can filter routing protocol information by performing the following tasks.
● Suppress sending of routing updates on a particular router interface. This is done to prevent other
● Apply an offset to routing metrics. This is done to provide a local mechanism for increasing the value
of routing metrics.
To prevent other routers on a local network from learning about routes dynamically, you can keep
routing update messages from being sent through a router interface. This feature applies to all IP-based
passive-interface
Router Blocks routing information from interface of router.
interface-name
DDJ:A-M-5524B5-01 445
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
An offset list is the mechanism for increasing incoming and outgoing metrics to routes learned via RIP.
In order to increase the value of routing metrics, use the following command.
Routing protocols use several timers that determine such variables as the frequency of routing updates,
the length of time before a route becomes invalid, and other parameters. You can adjust these timers to
tune routing protocol performance to better suit your internet needs. The default settings for the timers
are as follows.
● The update timer is 30 seconds. Every update timer seconds, the RIP process is awakened to send
an unsolicited response message containing the complete routing table to all neighboring RIP routers.
● The timeout timer is 180 seconds. Upon expiration of the timeout, the route is no longer valid; however,
it is retained in the routing table for a short time so that neighbors can be notified that the route has
been dropped.
● The garbage collect timer is 120 seconds. Upon expiration of the garbage-collection timer, the route is
timers basic update timeout garbage Router Adjusts routing protocol timers.
446 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
Normally, routers that are connected to broadcast-type IP networks and that use distance-vector routing
protocols employ the split horizon mechanism to reduce the possibility of routing loops. Split horizon
blocks information about routes from being advertised by a router out any interface from which that
information originated. This behavior usually optimizes communications among multiple routers,
particularly when links are broken. However, with nonbroadcast networks, such as Frame Relay,
situations can arise for which this behavior is less than ideal. For these situations, you might want to
If an interface is configured with secondary IP addresses and split horizon is enabled, updates might not
be sourced by every secondary address. One routing update is sourced per network number unless
In order to activate or deactivate or disable split horizon, perform the following tasks in interface
configuration mode.
RIP Version 1 does not support authentication. If you are sending and receiving RIP Version 2 packets,
The key chain determines the set of keys that can be used on the interface. If a key chain is not
We support two modes of authentication on an interface for which RIP authentication is enabled: plain
text authentication and MD5 authentication. The default authentication in every RIP Version 2 packet is
DDJ:A-M-5524B5-01 447
UMN:CLI User Manual
SURPASS hiD 6610 S311 R1.0
Note
Do not use plain text authentication in RIP packets for security purposes, because the unencrypted
authentication key is sent in every RIP Version 2 packet. Use plain text authentication when security is
not an issue, for example, to ensure that misconfigured hosts do not participate in routing.
ip rip authentication mode {text | md5} authentication or let it default to simple password
Interface
authentication.
You can display specific router statistics such as the contents of IP routing tables, and databases.
Information provided can be used to determine resource utilization and solve network problems. You
can also discover the routing path your router’s packets are taking through the network.
show ip route rip Enable/Global Shows routing table information concerned with RIP.
show ip protocols Shows current status of using RIP protocol and the information.
448 DDJ:A-M-5524B5-01
User Manual UMN:CLI
SURPASS hiD 6610 S311 R1.0
To quickly diagnose problems, the command, “debugging” is meaningful and useful to customers. Use
the following commands to display information on RIP routing transactions.
show debugging rip Shows all information configured for RIP debugging.
DDJ:A-M-5524B5-01 449