SJ-20150112110821-002-ZXR10 2900E Series (V2.05.12) Easy-Maintenance Secure Switch Configuration Guide - 676543
SJ-20150112110821-002-ZXR10 2900E Series (V2.05.12) Easy-Maintenance Secure Switch Configuration Guide - 676543
Version: 2.05.12
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION
Copyright © 2016 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
II
Figures............................................................................................................. I
Tables ...........................................................................................................VII
Glossary ........................................................................................................IX
III
IV
Intended Audience
This document is intended for:
l Software debugging engineers
l Date configure engineers
l Maintenance engineers
Chapter 2, System Overview Provides an overview about the ZXR10 2900E series switches.
Chapter 3, Usage and Describes configuration modes, command modes and usage of
Operation command line.
Chapter 7, Maintenance Describes routine maintenance, virtual line detection and common
fault handling.
Conventions
This manual uses the following typographical conventions:
Italics Variables in commands. It may also refer to other related manuals and documents.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
Warning!
Indicates the matters needing close attention. If this is ignored, serious injury accidents
may happen or devices may be damaged.
Caution!
1-1
Note:
Indicates the description, hint, tip and so on for configuration operations.
1-2
2-1
Switching Capability
The ZXR10 2900E series switches support layer-2 wire-speed switching on all ports. The
data packets can be forwarded at wire-speed after being filtered and classified. The ports
provide high throughput, low packet loss rate, and low time delay and jitter, which satisfy
application requirements of key services.
Reliability
l The ZXR10 2900E supports the Spanning Tree Protocol (STP), Rapid Spanning
Tree Protocol (RSTP), and Multiple Spanning Tree Protocol MSTP, and implements
redundancy backup and fast switching of links.
l The ZXR10 2900E supports the 802.3ad Link Aggregation Control Protocol (LACP)
function, and provides load balancing and link backup.
l The ZXR10 2900E supports the ZTE Ethernet Switch Ring (ZESR) to provide fast
protection switching, which ensures that user services are not interrupted.
Service Features
The ZXR10 2900E provides the following service features:
l Provides a flexible Virtual Local Area Network (VLAN) classification mode. The VLANs
can be classified by port or protocol type.
l Provides a layer-2 Virtual Private Network (VPN) through QinQ to control outer-layer
labels flexibly.
l Supports user port locating technologies, such as Virtual Broadband Access Server
(VBAS), Dynamic Host Configuration Protocol (DHCP) Option82, and Point to Point
Protocol over Ethernet (PPPoE)+.
l Provides layer-2 multicast technologies, including Internet Group Management
Protocol (IGMP)-snooping and its proxy function, the fast-leaving feature, and the
2-2
Multicast VLAN Switching (MVS) function, which provide a support for enabling the
Internet Protocol Television (IPTV) service.
Security Control
The ZXR10 2900E provides the following security control functions:
l User-level security control
à It supports IEEE 802.1x, which implements dynamic and port-based security and
provides the user ID authentication function.
à It supports MAC/IP/VLAN/Port combination at random, which effectively prevents
illegal users from accessing the network.
à Port isolation ensures that a user can neither monitor traffic of another user on
the same switch nor obtain the user's information.
à It supports the GuestVlan and anti-proxy function, which facilitates its applications
in educational networks and other complex network environments.
à Dynamic Host Configuration Protocol (DHCP) monitoring prevents malicious
users from deceiving the DHCP server and sending spurious address information.
It can also enable IP source protection and create a binding table for the IP
address, MAC address, and port of the client and the VLAN to prevent a user
from accessing or using the IP address of another user.
l Equipment-level security control
à The CPU security control technology prevents Denial of Service (DoS) attacks.
à The Secure Shell (SSH)/Simple Network Management Protocol (SNMP)v3
ensures network management security.
à Multi-level access security of the console prevents unauthorized users from
changing the switch configuration.
à The Remote Authentication Dial In User Service (RADIUS)/Terminal Access
Controller Access-Control System Plus (TACACS+) identification authentication
puts the switch under centralized control and prevents unauthorized users from
modifying the configuration.
l Network security control
à The Access Control List (ACL) based on ports and VLANs makes it possible for
users to apply security strategies to each port or trunk of the switch.
à MAC address binding and source- or destination-based filtering provide effective
address-based traffic control.
à The port mirroring function provides an effective tool for network management
analysis.
QoS Guarantee
The ZXR10 2900E provides the following applications of Quality of Service (QoS):
2-3
l Provides Standard 802.1p Class of Service (CoS) and Differentiated Services Code
Point (DSCP) field sorting. Single group-based labeling and re-sorting can be
performed by using source and destination IP addresses, source and destination
MAC addresses, and Transfer Control Protocol (TCP)/User Datagram Protocol
(UDP) port numbers.
l Provides queue scheduling algorithms including Strict Priority (SP) and Weighted
Round Robin (WRR).
l Supports the Committed Access Rate (CAR) function. It manages asynchronous
uplink and downlink data flows from uplinks by ingress strategy control and egress
shaping. The ingress strategy control provides bandwidth control with the minimum
increment of 8 kbps. It can satisfy QoS requirements of packet loss, time delay and
jitter even if network congestion occurs, thus avoiding queue congestion effectively.
Management Modes
The ZXR10 2900E provides the following management modes:
Functions
The ZXR10 2900E uses the Store and Forward mode, and supports layer 2 wire-speed
switching. Full wire-speed switching is implemented on all ports.
The ZXR10 2900E provides the following functions:
2-4
2-5
42. It supports version/configuration upload and download through the Trivial File Transfer
Protocol (TFTP).
43. It supports version/configuration upload and download through the FTP .
44. The ZXR10 2910E-PS/2918E-PS/2928E-PS/2952E-PS supports the 802.3af Power
over Ethernet (PoE) function. The power supply of at most 30 W is supported.
2-6
3-1
Select Start > All programs > Accessories > Communications > HyperTerminal
in the Windows operating system to start the HyperTerminal program.
2. Establish a connection.
Enter a name and select an icon for the connection, and then click OK, see Figure 3-2.
3-2
5. Click the OK button. After the ZXR10 2900E is powered on, enter the configuration
mode for further operations.
For configuration of the IP address of the layer-3 port, refer to 5.15 IPv4 Layer 3
Configuration and 5.16 IPv6 Layer 3 Configuration.
Command Function
create user <name>{admin | guest}[<0-15>] Create a new user, The user <name> parameter
value consists of at most 15 characters.
set user local <name> login-password [<string>] Set the login password, The login-password
<string> parameter value consists of at most 16
characters.
set user {local | radius| tacacs-plus}<name> Set the administrator password, The
admin-password <string> admin-password <string> parameter value
consists of at most 16 characters.
3-3
Note:
The default username is admin and the password is zhongxing. The default administrator
password is empty.
It is assumed that the IP address of the layer-3 port is 192.168.3.1 and this address can be
pinged successfully from the local computer. Perform the following remote configuration
operations:
1. Select Start > Run on the local computer. Run the Telnet command in the displayed
Run dialog box, see Figure 3-5.
3. Enter the username and password to enter user mode of the switch.
3-4
The SNMP uses the server/client management mode. The back-end network management
server serves as the SNMP server. The front-end network device serves as the SNMP
client. The front end and back end share one Management Information Base (MIB) and
communicate with each other through SNMP.
The back-end network management server must be installed with the network
management software supporting SNMP. The switch is configured and managed by the
network management software. For the detailed SNMP configuration on the ZXR10
2900E, refer to 6.4 SNMP.
Command Function
create user <name>{admin | guest}[<0-15>] The user <name> parameter value consists of
at most 15 characters.
Command Function
set user local <name> login-password <string> The login-password <string> parameter value
consists of at most 16 characters.
Command Function
4. Enable the web network management function (by default, this function is disabled)
and set a listening port.
Command Function
3-5
Note:
The default username is admin and the password is zhongxing. The administrator
password is empty. If you log in as the administrator, the administrator password cannot
be empty. Set the administrator password in advance. The default HTTP listening port
is 80.
For the detailed remote login and configuration through Web, refer to 6.8 Web.
User Mode
After logging in to the switch through HyperTerminal, Telnet or SSH, you can enter user
mode after entering your login username and password. The prompt in user mode is the
host name followed by ">", which is shown as follows:
zte>
The default host name is zte. You can modify the host name by running the hostname
<name> command. The name length consists of at most 200 characters.
In user mode, you can run the exit command to exit the switch configuration or run the
show command to view the system configuration and operation information.
Note:
zte>enable
Password:***
zte(cfg)#
3-6
In global configuration mode, you can configure various functions of the switch. The
password for entering global configuration mode must be set by running the set user local
<name> admin-password [<string>] command to prevent login of unauthorized users.
To return to user mode from global configuration mode, run the exit command.
In SNMP configuration mode, you can set the SNMP and RMON parameters.
To return to global configuration mode from SNMP configuration mode, run the exit
command or press Ctrl+Z.
In layer-3 configuration mode, you can configure the layer-3 port, static router, and ARP
entity.
To return to global configuration mode from layer-3 configuration mode, run the exit
command or press Ctrl+Z.
In file system configuration mode, you can perform the following operations on the file
system of the switch, including
l adding files or directories
l deleting files or directories
l modifying file names
l displaying files or directories
l changing file directories
l uploading/downloading files through TFTP
l uploading/downloading files through FTP
l copying files
l formatting the Flash memory
3-7
l upgrading firmware
To return to global configuration mode from file system configuration mode, run the exit
command or press Ctrl+Z.
In NAS configuration mode, you can configure the access service of the switch, including
user access authentication and management.
To return to global configuration mode from NAS configuration mode, run the exit command
or press Ctrl+Z.
In cluster management configuration mode, you can configure the cluster management
service of the switch.
To return to global configuration mode from cluster management configuration mode, run
the exit command or press Ctrl+Z.
In basic ingress ACL configuration mode, you can add, delete and move rules for a
specified basic ingress ACL.
To return to global configuration mode from basic ingress ACL configuration mode, run the
exit command or press Ctrl+Z.
3-8
In extended ingress ACL configuration mode, you can add, delete and move rules for a
specified extended ingress ACL.
To return to global configuration mode from extended ingress ACL configuration mode, run
the exit command or press Ctrl+Z.
In layer-2 ingress ACL configuration mode, you can add, delete and move rules for a
specified layer-2 ingress ACL.
To return to global configuration mode from layer-2 ingress ACL configuration mode, run
the exit command or press Ctrl+Z.
In hybrid ingress ACL configuration mode, you can add, delete and move rules for a
specified hybrid ingress ACL.
To return to global configuration mode from hybrid ingress ACL configuration mode, run
the exit command or press Ctrl+Z.
In global ingress ACL configuration mode, you can add, delete and move rules for a
specified global ingress ACL.
To return to global configuration mode from global ingress ACL configuration mode, run
the exit command or press Ctrl+Z.
3-9
In basic egress ACL configuration mode, you can add, delete and move rules for a basic
egress ACL.
To return to global configuration mode from basic egress ACL configuration mode, run the
exit command or press Ctrl+Z.
In extended egress ACL configuration mode, you can add, delete and move rules for a
specified extended egress ACL.
To return to global configuration mode from extended egress ACL configuration mode, run
the exit command or press Ctrl+Z.
In layer-2 egress ACL configuration mode, you can add, delete and move rules for a
specified layer-2 egress ACL.
To return to global configuration mode from layer-2 egress ACL configuration mode, run
the exit command or press Ctrl+Z.
In hybrid egress ACL configuration mode, you can add, delete and move rules for a
specified hybrid egress ACL.
To return to global configuration mode from hybrid egress ACL configuration mode, run
the exit command or press Ctrl+Z.
3-10
In Mac-Based-Vlan configuration mode, you can add or delete rules for a specified session.
To return to global configuration mode from Mac-Based-Vlan configuration mode, run the
exit command or press Ctrl+Z.
In user-defined ingress ACL configuration mode, you can add, delete, or move the rules
of ACLs with the specified ACL numbers.
To return to global configuration mode from user-defined ingress ACL configuration mode,
run the exit command or press Ctrl+Z.
Parameter Description
3-11
Parameter Description
3-12
Note:
A space must be entered before the question mark (?).
4. If a wrong command, keyword, or parameter is entered, and the Enter key is pressed,
a message "Command not found" is displayed. For example,
zte(cfg)#conf ter
% Command not found (0x40000034)
Command Abbreviations
In the ZXR10 2900E, a command or keyword can be abbreviated as a character or string
that uniquely identifies this command or keyword. For example, the command exit can be
abbreviated as ex, and the command show port abbreviated as sh por.
3-13
Command History
The user interface supports the function of recording entered commands. A maximum of
20 historical commands can be recorded. The function is very useful for recalling a long
or complicated command.
To recall commands from the history buffer, perform one of the following actions.
Keystroke Function
Ctrl+P or the up arrow key Recall commands in the history buffer, beginning with the most
recent command. Repeat the key sequence to recall successive
older commands.
Ctrl+N or the down arrow key Return to more recent commands in the history buffer after
recalling commands with Ctrl+P or the up arrow key. Repeat the
key sequence to recall successively more recent commands.
Keystroke Purpose
Ctrl+P or the up arrow key Recall commands in the history buffer, beginning with the
most recent command. Repeat the key sequence to recall
successive older commands.
Ctrl+N or the down arrow key Return to more recent commands in the history buffer
after recalling commands with Ctrl+P or the up arrow key.
Repeat the key sequence to recall successively more recent
commands.
Ctrl+B or the left arrow key Move the cursor back one character.
Ctrl+F or the right arrow key Move the cursor forward one character.
Ctrl+K Delete all characters from the cursor to the end of the
command line.
3-14
Keystroke Purpose
If the command output has more lines than can be displayed on the terminal screen, the
output is split into several pages automatically and the prompt "—– more —– Press Q or
<Ctrl+C> to break —–" is displayed at the bottom of the current page. You can press
Return to scroll down one line, or Space to scroll down one screen. To stop the output,
press Q or Ctrl+C.
3-15
3-16
Directory Management
The file system can be used to create and delete directories, display the current working
directory, and display the information about subdirectories or files under a specified
directory.
For the procedure to manage file system directories, refer to the table below:
4-1
You can run the remove <file-name> command to delete a specified directory. The img, cf
g, and data directories created by default and all non-empty directories cannot be deleted.
File Management
The file system can be used to delete a specified file, rename a file name, copy a file and
display the file information.
For the procedure to manage file system files, refer to the table below:
You can run the remove <file-name> command to delete a specified file.
4-2
Flash Formatting
Caution!
After the Flash memory is formatted, all system software and configurations will be cleared.
For the procedure to format the Flash memory, refer to the table below:
Steps
1. Run the Tftpd software at the back-end computer. The TFTP server window is
displayed, see Figure 4-1.
4-3
2. Select Tftpd > Configure. The Tftpd Settings dialog box is displayed, see Figure
4-2.
3. Click the Browse button on the upper side of the dialog box and select a directory to
save the version file or configuration file.
4. Click the Browse button on the lower side of the dialog box to select a log file, and
then click OK to complete the configuration.
– End of Steps –
The switch version file and configuration file can be backed up or recovered through FTP.
The FTP server application software is started at the back end to communicate with the
switch (FTP client) to implement file backup and recovery. This procedure describes how
to configure the back-end FTP server using FileZilla Server (FTP server software) as an
example.
Steps
1. Run the FileZilla Server software on the back-end computer. The Connect to Server
dialog box is displayed, see Figure 4-3.
2. Set Server Address, Port and Administration password, and click OK. The FileZilla
Server window is displayed, see Figure 4-4.
3. Select Edit > Users. The Users dialog box is displayed, see Figure 4-5. Create a
user name and password.
4-5
4. Select Shared folders in the left area and set a primary directory for the new user,
see Figure 4-6.
4-6
Note:
The application scenarios for FTP and TFTP are the same, including configuration file
import and export, and automatic software version download.
– End of Steps –
4-7
To prevent damage to the configuration data, back up the configuration data by using the
tftp command.
Run the following commands to upload the configuration file in the Flash memory to the
back-end TFTP server:
zte(cfg-tffs)#cd cfg
zte(cfg-tffs)#tftp 192.168.1.102 upload startrun.dat
zte(cfg-tffs)#cd ..
zte(cfg-tffs)#cd img
zte(cfg-tffs)#tftp 192.168.1.102 upload zImage
zte(cfg-tffs)#cd ..
4-8
zImage Yes No
config.dat No Yes
startrun.dat No Yes
*.dat No Yes
In the above table, “*” is a wildcard indicating a device type. This means the configuration
file automatically adapts according to the device type.
The name of the file to be downloaded is a character string configured on the DHCP server,
and it cannot be modified on the local computer.
By executing the show dhcp command, you can see the configuration file to be downloaded
to the current device. For example, the ZXR10 2928E downloads the ZXR10_2928E.dat
file from the TFTP server.
zte(cfg)#show dhcp
DHCP download flag is disabled, config file is found.
DHCP download will not startup, when system reboot.
DHCP config file(option-67) *.dat will be translated to ZXR10_2928E.dat.
DHCP snooping-and-option82 is disabled.
DHCP client is enabled.
DHCP client broadcast-flag is enabled.
4-9
The network architecture is shown in Figure 4-7. Set the TFTP server address and version
file name on the DHCP server. For example, set the TFTP server address to 10.40.89.78,
and the file name to *.dat@zImage. After being powered on, the switch downloads ZXR10
2918E.dat (assuming that the device type is ZXR10 2918E) and zImage from the TFTP
server. After downloading the files successfully, the switch is restarted automatically.
The network is shown in Figure 4-8. Before configuring the following commands, make
sure that the switch can ping the server successfully. Assume that the IP address of the
4-10
TFTP server is 10.40.89.78, and the configuration is saved to the server every 10 days.
The configuration commands are as follows:
zte(cfg)#set auto-saveconfig serverip 10.40.89.78
zte(cfg)#set auto-saveconfig period 10
zte(cfg)#set auto-saveconfig enable
Caution!
The enable command should be configured after serverip is configured. If serverip is not
configured, the system displays a message, prompting that the automatic upload function
cannot be enabled. If a communication exception occurred between the switch and the
server when the upload function was triggered last time, the configuration file cannot be
uploaded successfully this time. The system uploads the configuration files when the next
triggering time comes.
Note:
Normally, version upgrade is needed only when the original version does not support some
functions or the switch operates abnormally due to some special causes. Improper version
upgrade operations may result in upgrade failure and startup failure of the system. So,
before version upgrade, get familiar with the principles and operations of the ZXR10 2900E
and master the upgrade procedure.
Version upgrade operations performed in proper and improper switch systems are
different.
4-11
1. Connect the console port of the switch to the serial port of the back-end computer by
using a provided configuration cable. Connect an Ethernet port of the switch to the
network port of the back-end computer by using a network cable. Ensure that the
connections are correct.
2. Set the IP address of the Ethernet port on the switch. Set the IP address of the
back-end computer used for upgrade. The two IP addresses must be in the same
network segment so that the computer can ping the switch successfully.
3. Start the TFTP server software on the back-end computer and configure it by referring
to 4.2 Configuring the TFTP Server.
4. On the switch, use the show version command to check the information of current
operating version.
5. Enter file system configuration mode and use the remove command to delete the old
version file in the Flash memory. If the Flash memory has sufficient space, change the
name of the old version file and keep it in the Flash memory.
zte(cfg)#config tffs
zte(cfg-tffs)#cd img
zte(cfg-tffs)#remove zImage
zte(cfg-tffs)#cd ..
6. Use the tftp command to upgrade the version. The following shows how to download
the version file from the TFTP server to the Flash memory:
zte(cfg-tffs)#cd img
zte(cfg-tffs)#tftp 10.40.89.78 download zImage
4-12
.................................................
.................................................
.................................................
7,384,016 bytes downloaded
zte(cfg-tffs)#ls
zte(cfg-tffs)#ls
/img/
. <DIR>
.. <DIR>
zImage 7,536,884 bytes
240,568,768 bytes free
7. Restart the switch. After successful startup, check the operating version and confirm
whether the upgrade is successful.
4-13
FTP directory format: ftp get<filename>. The file will be downloaded to the current
directory. If you want to check the current directory, use the ls command. The port
address used by FTP and port information can be modified in the c directory in ZX10
Boot. Take port 1 as an example.
boot location [0:Net,1:Flash] : 1
4-14
actport : 1
serverip : 10.40.89.78
netmask : 255.255.255.0
ipaddr : 10.40.89.79
bootfile : /img/zImage
username : ZXR10
password : ZXR10
MAC : 00:d0:d0:30:20:10
Hit any key to stop autoboot: 0
[ZXR10 Boot]:
[ZXR10 Boot]:zte
[bootManager]: cd img
[bootManager]: ftp get zImage
............................................
............................................
............................................
Ftp get zImage successfully, 7397428 bytes received.
[bootManager]:
8. In BootManager status, use the reboot command to restart the switch by using the new
version. If the switch is started normally, use the show version command to verify that
the new version is operating in the memory. If the switch cannot be started normally, it
indicates that the version upgrade has failed. In this case, repeat the above upgrade
procedure from step 1.
Command Function
4-15
Command Function
4-16
5-1
Command Function
exit (All configuration mode) Returns to the original command line mode.
list (all configuration modes) Lists all valid configuration commands in the current
mode.
zte(cfg)#set auto-reset <2-120> Sets automatic logout time of the switch console.
5-2
Command Function
zte(cfg)#line-vty timeout <1-12> Sets login timeout time of the Telnet user.
zte(cfg)#set date <yyyy-mm-dd> time Sets date and time of the switch.
<hh:mm:ss>
zte(cfg)#set date summer-time {one-year | Sets the period when the daylight saving time is used.
repeating}{date <yyyy-mm-dd><hh:mm:ss><y
yyy-mm-dd><hh:mm:ss>| week <week><day
><month><year><hh:mm:ss><week><day><mo
nth><year><hh:mm:ss>}[<60-1440>]
zte(cfg)#telnet <A.B.C.D>[<A.B.C.D>] Logs in to the Telnet server. You can select the source
address.
zte(cfg)#set user local <name> Sets the login password for the local user.
login-password [<string>]
zte(cfg)#set user local <name> Sets the management password for the local user.
admin-password [<string>]
zte(cfg)#set user radius purview {admin | Sets the RADIUS authentication user login authority.
guest}
zte(cfg)#set user radius admin-password Sets the management password for the RADIUS user.
[<string>]
zte(cfg)#set user tacacs-plus purview Sets login permissions for the TACACS+
{admin | guest} authentication user.
zte(cfg)#set user tacacs-plus Sets the management password for the TACACS+
admin-password [<string>] user.
5-3
Command Function
zte(cfg)#terminal monitor {on | off} Allows or forbids printing the real-time alarm log
information to the terminal.
zte(cfg)#terminal log toFile Saves logs in the RAM to the Flash memory.
zte(cfg)#terminal log timer {enable | disable Sets automatic saving of log information.
| interval <1-720>}
zte(cfg)#set bootpassword to <string> Sets the password for logging in to boot mode.
zte(cfg)#set bootpassword clear Deletes the password for logging in to boot mode.
zte(cfg)#set fan mode {auto | manual} Sets the fan operating mode.
zte(cfg)#readconfig <filename> Reads the local file on the device as the configuration.
show reset-time (all configuration modes) Displays automatic logout time setting of the switch
console.
show line-vty (all configuration modes) Displays Telnet user login timeout time setting.
show adminauth (all configuration modes) Displays management authentication state and
authentication mode.
show terminal (all configuration modes) Displays terminal log configuration information.
5-4
Command Function
show terminal log (all configuration modes) Displays the terminal log information in RAM.
show user (all configuration modes) Displays the user configured on the switch and current
login user information.
show running-config [{include | begin}<string>] Displays all non-default configuration of the current
(all configuration modes) system.
show start-config (all configuration modes) Displays all non-default configuration when the
system is written at last.
show date-time (all configuration modes) Displays the current date and time.
show cpu (all configuration modes) Displays CPU usage at the duration of 5 s, 30 s and 2
m.
show memory (all configuration modes) Displays the current RAM usage.
show bootpassword (all configuration modes) Displays the password for logging in to boot mode.
show Etag (all configuration modes) Displays the electronic labels of devices.
list include <string> (all configuration modes) Displays the commands including a specific string.
show terminal log include <string> (all Displays alarm log information including a specific
configuration modes) string.
zte(cfg)#set banner filename Sets the banner displayed on the welcome screen.
The banner is stored in the system file, and spaces
are supported.
5-5
Configuring a Port
The port configuration includes the following commands:
Command Function
zte(cfg)#set port <portlist> work-mode {fiber | Sets the combo port to switch between the
copper | auto [ prefer {first-up | fiber | copper}]} electrical mode and the optical mode.
zte(cfg)#set port <portlist> phy-mode Controls switchover between 1000 Mbps optical
{1000base-x | sgmii}]} ports and electrical internal ports.
zte(cfg)#set port <portlist> speedadvertise Sets the advertisement of the maximum port speed
maxspeed duplex information.
zte(cfg)#set port <portlist> speedadvertise Sets the advertisement of the port speed duplex
{speed10 | speed100 | speed1000}{fullduplex | information.
halfduplex}
zte(cfg)#set port <portlist> duplex {full | half | Sets the working mode of the port to full duplex
auto} or half duplex.
zte(cfg)#set port <portlist> speed {10 | 100 | Sets the speed of the port to 10 Mbps, 100 Mbps,
1000 | auto} or 1000 Mbps, or auto.
zte(cfg)#set port <portlist> mdix {auto | normal Sets the line sequence identification function.
| crossover}
zte(cfg)#set port <portlist> flowcontrol {enable Enables or disables the port flow control function.
| disable}
zte(cfg)#set port <portlist> accept-frame {tag | Sets the packet type that the port allows to accept.
untag | all}
zte(cfg)#set jumbo port <portlist>{enable | Enables or disables the port jumbo function.
disable }
5-6
Command Function
zte(cfg)#set sleep-mode {enable | disable} Enables or disables the port sleep mode.
zte(cfg)#clear port <portlist>{name | statistics | Clears the port name, port statistics data, port
description| multicast-filter} description, and the multicast filter flag.
show port (all configuration modes) Displays the configuration and status information
of all ports.
show port [<portlist>] (all configuration modes) Displays port configuration and status information.
show port <portlist> statistics (all configuration Displays the statistics of the current port.
modes)
show port <portlist> utilization (all configuration Displays port bandwidth utilization.
modes)
show port <portlist> brief (all configuration Displays port brief information.
modes)
show port <portlist> vlan (all configuration Displays the location of VLAN.
modes)
show jumbo (all configuration modes) Displays the jumbo configuration of all ports.
show jumbo [<portlist>] (all configuration modes) Displays port jumbo configuration information.
show vct port <portid> (all configuration modes) Displays port virtual line detection result.
show cable-diag (all configuration modes) Displays the up/down status of each port and VCT
detection result.
zte(cfg)#set port <portlist> protect {enable | Enables or disables the port protection function.
disable }
zte(cfg)#set port <portlist> protect time Sets the port protection period in port protection
<1-10> status.
zte(cfg)#set cable-diag {enable | disable } Enables or disables the function of virtual cables
detecting logs.
zte(cfg)#set mac protect port <portlist>{enable Enables or disables the port protection function.
| disable}
zte(cfg)#set mac protect port <portlist> action Sets the port protection action.
{shutdown | restrict | protect}
zte(cfg)#show mac protect port <portlist> Displays the port protection state.
5-7
The ZXR10 2900E-PS series switch supports the following PoE features:
5-8
l The ZXR10 2900E-PS series switch provides the following configuration and
management functions for convenient use.
1. Sets integrated device maximum output power.
2. Sets port maximum output power.
3. Sets port power supply priority. The system provides three types of priorities for
each port. When the total power of all ports exceeds the maximum output power of
the ZXR10 2900E switch, the switch will decide which devices are to be powered
on according to port power supply priority. The port with a high power supply
priority will provide power in advance. The port with the lowest priority will stop
power supply. If the two ports have the same power supply priority, the priority of
port will be decided by its port number. The less the port number is, the higher
the priority is and the port is powered in advance.
4. Provides the monitoring function for fans.
5. Provides various alarm information and exception monitoring and alarm report
mechanisms such as Terminal log, SNMP Trap and Syslog.
Configuring PoE
The PoE configuration includes the following commands:
Command Function
zte(cfg)#set poe port <portlist> pd-max-power {15.4 | 4.0 | 7.0 Sets the maximum power supply
| ext.18 | ext.27 | ext.30} of the port.
zte(cfg)#set poe port <portlist> priority {critical | high | low} Sets the port power supply priority.
zte(cfg)#set poe port <portlist> forcepower {enable |disable} Enables or disables the port
force-power function.
zte(cfg)#set poe port <portlist> extend-detection {enable |disable} Enables or disables the port
extended detection function.
zte(cfg)#set poe power maxvalue <1–500>[threshold <0-30>] Sets device maximum output
power and protection threshold.
zte(cfg)#set poe port <port list> enable time-range <word> Enables the port PoE.
zte(cfg)#set poe port <portlist> work-mode {auto | semi-auto} Sets the operation mode of the port
(automatic or semi-automatic).
show poe device (all configuration modes) Displays the PoE status of the
device.
show poe status [port <portlist>] (all configuration modes) Displays the PoE status of the
port.
show poe config [port <portlist>] (all configuration modes) Displays PoE configuration
information.
5-9
From the results, we can see that the DUT device provides a power supply for the PD
stably.
5-10
Based on the result, the DUT can supply stable power to the PD.
5-11
Note:
By default, switches do not have mirroring ports or monitoring ports. The correct data
packets received by the ingress mirroring port are mirrored onto the monitoring ports, but
data packets directly discarded on the ingress port (for example, because of CRC errors)
are not mirrored.
Command Function
zte(cfg)#set mirror session <1-3> add dest-port <1-28>{ingress Adds an egress or ingress
| egress| rspan} mirroring destination port
according to the session.
zte(cfg)#set mirror rspan-tag vlan-id <1-4094> priority Sets RSPAN tag format including
<0-7>{ingress | egress} VLAN-ID and priority.
5-12
Command Function
show mirror [session <1-3>] (all configuration modes) Displays the configuration
information of mirror session.
show mirror rspan (all configuration modes) Displays the ingress or egress
RSPAN configuration information.
l Configuration Procedure
1. The following example describes how to set port mirroring in ingress direction.
zte(cfg)#set mirror session 1 add source-port 1 egress
zte(cfg)#set mirror session 1 add dest-port 2 egress
zte(cfg)#set mirror session 1 add dest-port 2 rspan
zte(cfg)#set mirror statistical sample-interval 100 ingress
/*set the port sample-interval of mirror statistic*/
5-13
MAC addition/deletion Users can manually add static and fixed MAC addresses and delete
dynamic, static and fixed MAC address table entry through a command
line.
MAC table aging time MAC table aging time refers to the period from the latest update of
dynamic MAC address in the FDB table to the deletion of this address.
MAC filtering function When the switch receives the packets with specified source address
or destination address, it drops them according to the source MAC
address and the destination MAC address.
MAC address learning MAC address learning control means MAC learning can provide
control three types of learning modes including hardware wire-speed
learning, CPU controlled learning and non learning to satisfy various
user requirements. In addition, MAC learning can provide global,
port-based, Trunk-based and VLAN-based independent switches.
MAC learning number limit MAC learning number limit can configure the maximum learning MAC
address number based on global, port, TRUNK and VLAN. When the
value is reached, the new MAC address cannot be learnt.
5-14
MAC alarm control MAC alarm control can configure the output of the common alarm
information of MAC function, for example, the number of learnt MAC
addresses is exceeded or the address is drifted.
MAC address fixed function MAC address fixed function can transform a dynamic MAC address
entry to a static or fixed MAC entry in batches. After transformation,
the static entry cannot drift. When the device is rebooted, a fixed MAC
address entry can recover and cannot disappear.
MAC information display MAC information display means the current MAC function configuration
and state information can be checked.
MAC protection function The MAC protection function limits port access. When the number
of MAC addresses learned on a port exceeds the limit, packets with
unknown source MAC addresses are dropped. The protection action
can be set to shutdown, restrict (stopping MAC address learning,
dropping packets with unknown MAC addresses, and sending an
alarm), or protect (stopping MAC address learning, and dropping
packets with unknown MAC addresses).
The MAC address of Ethernet NIC is 48 bits. The 48 bits include two parts. The first
24 bits are used to represent the manufacturer indicating Ethernet NIC. The remaining
24 bits are a group of sequence numbers designated by the manufacturer and named as
Organizationally Unique Identifier (OUI). The lowest bit (the most left bit in the structure)
is named as a private or group bit. If this bit is set to 0, the remaining address is a private
address.
If this bit is set to 1, the remaining address domain identifies the group address requiring
more resolution. If the whole OUI is set to 1, each site of the whole network is a destination.
That is the special engagement supported by OUI.
Command Function
zte(cfg)#set port <portlist> security {enable | disable} Enables or disables the security function
of a port.
zte(cfg)#set mac add static <HH.HH.HH.HH.HH.HH> Adds a static MAC address entry based
port <1-28> vlan <1-4094> on the port and the VLAN.
5-15
Command Function
zte(cfg)#set mac add static <HH.HH.HH.HH.HH.HH> Adds a static MAC address entry based
trunk <1-15> vlan <1-4094> on the trunk and the VLAN.
zte(cfg)#set mac add permanent <HH.HH.HH.HH.HH. Adds a permanent MAC address entry
HH> port <1-28> vlan <1-4094> based on the port and the VLAN.
zte(cfg)#set mac add permanent <HH.HH.HH.HH.HH. Adds a permanent MAC address entry
HH> trunk <1-15> vlan <1-4094> based on the trunk and the VLAN.
zte(cfg)#set mac delete {port <1-28>| trunk <1-15>| Deletes all dynamic/static/permanent MAC
vlan <1-4094>}[dynamic | static | permanent] address entries based on port/trunk/VLAN.
zte(cfg)#set mac delete dynamic Deletes all dynamic MAC address entries.
zte(cfg)#set mac delete static Deletes all static MAC address entries.
zte(cfg)#set mac aging-time <60-600> Sets device MAC address aging time.
zte(cfg)#set mac filter {source | destination | Sets the source MAC address or
both}<HH.HH.HH.HH.HH.HH> vlan <1-4094> destination MAC address filter function.
zte(cfg)#set mac learning {global | port <1-28>| trunk Sets MAC address learning mode based
<1-15>| vlan <1-4094>}{enable | disable | mode {automatic on global/port/trunk/VLAN.
| cpu-controlled}}
zte(cfg)#set mac limit {global | port <1-28>| trunk Sets the MAC address number limit
<1-15>| vlan <1-4094>} limit-num <0-16384> function based on global/port/trunk/VLAN.
zte(cfg)#set mac unknown-filter {global | port <1-28>| Sets the function of filtering unknown
trunk <1-15>} limit-num <0-16384> source packets based on global/port/trunk.
zte(cfg)#set mac to permanent {port <1-28>| trunk Sets the function of converting MAC
<1-15>}{enable | disable | max-number <1-128>} addresses as permanent in batches.
zte(cfg)#set mac to permanent auto-save-time Sets the time when MAC addresses
<1–1440> converted to permanent ones are
automatically saved.
zte(cfg)#set mac to static {port <1-28>| trunk <1-15>| Sets the function of converting MAC
vlan <1-4094>}{enable | disable} address to static ones in batches.
zte(cfg)#set mac logging-alarm {station-move | Enables or disables the MAC event alarm
threshold-state}{enable | disable} function.
zte(cfg)#set mac logging-alarm interval <1-256> Sets the MAC event alarm output interval.
zte(cfg)#set mac protect port <1-28> action {shutdown | Sets the MAC protection action.
restrict | protect}
5-16
Command Function
zte(cfg)#set mac protect port <1-28>{enable | disable} Enables or disables the MAC protection
function.
show mac (all configuration modes) Displays MAC address entry content.
show mac running-config (all configuration modes) Displays MAC configuration information.
show mac all-type {port <1-28>| trunk <1-15>| vlan Displays MAC address entry content
<1-4094>} (all configuration modes) based on port/trunk/VLAN.
show mac {dynamic | learning | limit | permanent | Displays various MAC function
static}[port <1-28>| trunk <1-15>| vlan <1-4094>] (all configurations and MAC address
configuration modes) entries based on global/port/trunk/VLAN.
show mac mac-address <HH.HH.HH.HH.HH.HH> (all Displays the MAC address entry content
configuration modes) of a specified MAC address.
show mac unknown-filter [port <1-28>| trunk <1-15>] Displays the filter function of the packet
(all configuration modes) with an unknown source based on
global/port/trunk.
show mac aging-time (all configuration modes) Displays device MAC address aging time.
show mac filter (all configuration modes) Displays source MAC address or
destination MAC address filtering function.
show mac logging-alarm (all configuration modes) Displays MAC event alarm configuration.
zte(cfg)#set mac learning except session <1-100>{clear Sets the function of not learning specified
|mac-address <HH.HH.HH.HH.HH.HH.HH> mac-mask MAC addresses
<HH.HH.HH.HH.HH.HH.HH>[vlan <1-4094>]}
zte(cfg)#set mac learning except {port <portlist>| trunk Unbinds ports/trunks and all sessions.
<trunklist>}session unbind
zte(cfg)#set mac learning except {port <portlist>| trunk Sets the binding relation between
<trunklist>}session <1-100>{bind|unbind} ports/trunks and all sessions.
show mac learning except session [<1-100>] Displays the configuration of sessions for
which specified source MAC learning is
not needed.
show mac learning except {port <portlist>|trunk<trunklis Displays the binding relation between
t>} ports/trunks and sessions.
show mac protect [portlist] Displays the MAC protection state to check
whether MAC protection is triggered.
5-17
Configuring LACP
The LACP configuration includes the following commands:
Command Function
zte(cfg)#set trunk <trunklist> pvid <1-4094> Sets the default trunk VID.
zte(cfg)#set lacp aggregator <1-15>{add | delete} port <portlist> Adds or deletes a specified port
to/from an LACP aggregation
group.
zte(cfg)#set lacp aggregator <1-15> mode {dynamic | static | Sets aggregation mode of an
mixed } LACP aggregation group.
zte(cfg)#set lacp port <portlist> mode {active | passive} Sets the mode used by the port to
participate in the aggregation.
zte(cfg)#set lacp port <portlist> timeout {long | short} Sets the timeout information
of the port participating in the
aggregation.
zte(cfg)#set lacp load-balance {port | packet {L2 | L3 | L4}} Sets LACP load balancing mode.
show trunk (all configuration modes) Displays the Port VLAN IDs
(PVIDs) of all trunks and
unregistered multicast filtering
configuration.
5-18
Command Function
show trunk [<trunklist>] (all configuration modes) Displays the trunk PVID and
unregistered multicast filtering
configuration.
show trunk <trunklist> vlan (all configuration modes) Displays the VLAN configuration
of trunk.
show lacp aggregator (all configuration modes) Displays brief information of all
LACP aggregation groups.
show lacp aggregator <1-15> (all configuration modes) Displays detailed information of an
LACP aggregation group.
show lacp port [<portlist >] (all configuration modes) Displays aggregation status
information of LACP member
ports.
zte(cfg)#clear trunk <trunklist>{ multicast-filter} Clears the flag of the port multicast
filter.
l Configuration Procedure
5-19
zte(cfg)#show lacp
Lacp is enabled.
Lacp priority is 32768.
Load-balance is based on L2 hash mode.
PortNum GroupNum GroupMode LacpTime LacpActive
----------- ----------- ----------- ----------- -----------
15 3 Dynamic Long True
16 3 Dynamic Long True
zte(cfg)#show lacp aggregator 3
Group 3
Actor Partner
---------------------------- ----------------------------
Priority : 32768 32768
Mac : 00.d0.d0.fa.29.20 00.d0.d0.fc.88.63
Key : 258 258
Ports : 16, 15 16, 15
5-20
The above displayed result proves that the link aggregation is successful. If it is not
successful, the result is shown as follows after executing the show lacp aggregator 3
command.
zte(cfg)#show lacp aggregator 3
% Group 3 is not active!
The above result is due to physical link failure. It is recommended to check the physical
link status.
Command Function
zte(cfg)#set igmp snooping {add | delete} vlan <vlanlist> Adds or deletes the IGMP
Snooping function to/from the
specified VLAN.
zte(cfg)#set igmp snooping {add | delete} maxnum Sets or clears the maximum
<1-1024>{vlan <vlanlist>| port <portlist>[replace] multicast group number on the
specified VLAN/port. The replace
keyword means to replace the
query group which does not
respond for the longest period.
zte(cfg)#set igmp snooping monitor-ring {enable | disable} Enables or disables the IGMP ring
monitoring function.
5-21
Command Function
zte(cfg)#set igmp snooping vlan <1-4094>{add | delete} group Adds or deletes static multicast
<A.B.C.D>[port <portlist>| trunk <trunklist>] group based on the VLAN.
zte(cfg)#set igmp snooping vlan <1-4094>{add | delete} smr Adds or deletes routing port or
{port <portlist>| trunk <trunklist>} trunk on the specified VLAN.
zte(cfg)#set igmp snooping private-group {<A.B.C.D>| enable | Adds private multicast group
disable} and enables or disables private
multicast group function.
zte(cfg)#set igmp snooping timeout {host | router}<time> Sets multicast member or route
time-out.
The value of the <time> parameter
is 0 means no aging. A value
between 100 and 2147483647
(unit: 100 milliseconds).
zte(cfg)#set igmp snooping query-interval <10-2147483647> Sets the snooping interval, unit:
100 milliseconds.
zte(cfg)#set igmp snooping last-member-query <10-250> Sets the snooping interval for
the last member, unit: 100
milliseconds.
zte(cfg)#set igmp snooping query vlan <vlanlist>{enable | Enables or disables the query
disable} function on the specified VLAN.
zte(cfg)#set igmp snooping query version {v2 | v3} Sets the IGMP version of the query
packet sent by the switch.
zte(cfg)#set igmp snooping fastleave {enable | disable} Enables or disables the fast leave
function.
zte(cfg)#set igmp snooping proxy version {v2 | auto} Sets the IGMP version of the
query message that the switch
responses to the router.
zte(cfg)#set igmp snooping crossvlan {enable | disable} Enables or disables the switch
cross-VLAN function.
zte(cfg)#set igmp filter {add | delete} groupip <A.B.C.D.> vlan Adds or deletes the filtering of
<vlanlist> group in the specified VLAN.
5-22
Command Function
zte(cfg)#set igmp filter {add | delete} sourceip <A.B.C.D.> vlan Adds or deletes the filter of source
<vlanlist> in the specified VLAN.
zte(cfg)#set igmp filter {add | delete} query port < portlist> Adds or deletes the query packet
vlan <vlanlist> filter for the specified port.
zte(cfg)#set igmp filter {add | delete} query trunk < trunklist> Adds or deletes the query packet
vlan <vlanlist> filter for the specified trunk port.
show igmp snooping (global configuration modes) Displays IGMP Snooping global
configuration information.
show igmp snooping vlan [<1-4094>[host | route]] (global Displays the configuration of the
configuration modes) IGMP snooping result.
show igmp snooping port [<portlist>] (global configuration modes) Displays the maximum and current
multicast group numbers for the
port.
show igmp snooping v3 {port <1-28>| trunk <1-15>} (global Displays the v3 multicast snooping
configuration modes) results of the port or the trunk.
show igmp filter report (global configuration modes) Displays the configuration of the
IGMP filter.
show igmp filter vlan <vlanlist> (global configuration modes) Displays the specified VLAN
multicast group filtering
configuration.
zte(cfg)#set igmp filter {add | delete} grouplist <A.B.C.D.> Adds/removes the group list filter
mask <A.B.C.D.> vlan <vlanlist> to/from the specified VLAN.
zte(cfg)#set igmp snooping multicast-ring {enable | disable} Enables or disables the IGMP
multicast ring network function.
zte(cfg)#set igmp snooping multicast-ring {add | delete} Adds or deletes cascaded ports in
cascade port <portlist> a multicast ring network.
Ports 1, 3, and 5 are connected to the host, port 10 is connected to the router, add
ports 10, 1, 3, and 5 to VLAN200, and users on ports 1, 3, and 5 send multicast
join request packets with multicast addresses 230.44.45.167 and 230.44.45.157
respectively. Add multicast filter group address 230.44.45.167 on VLAN200. The
5-23
IGMP Snooping function and IGMP Filter function are enabled and the snooping
results are displayed. See Figure 5-4.
l Configuration Procedure
zte(cfg)#set vlan 200 add port 1, 3, 5, 10 untag
zte(cfg)#set port 1, 3, 5, 10 pvid 200
zte(cfg)#set vlan 200 enable
zte(cfg)#set igmp snooping enable
zte(cfg)#set igmp snooping add vlan 200
zte(cfg)#set igmp snooping vlan 200 add smr port 10
zte(cfg)#set igmp filter enable
zte(cfg)#set igmp filter add groupip 230.44.45.167 vlan 200
l Configuration Verification
Display multicast listening and filtering result.
zte(cfg)#show igmp snooping vlan
Maximal group number: 1024
Current group number: 1
Num VlanId Group Last_Report PortMember
---- ------- --------------- --------------- ----------------
1 200 230.44.45.157 194.85.1.3 1,3,5,10
5-24
l Configuration Flow
Switch A is configured as follows:
/*Configure a generateion tree instance*/
Switch_A(config)#set stp enable
Switch_A(config)#set stp instance 1 add vlan 100-110
5-25
Command Function
zte(cfg)#set mld snooping {enable | disable} Enables or disables the MLD snooping function
globally.
5-26
Command Function
zte(cfg)#set mld snooping {add | delete} vlan Adds or deletes an MLD snooping VLAN.
<vlanlist>
zte(cfg)#set mld snooping add maxnum <1-256> Sets the maximum number of multicast groups
vlan <vlanlist> of a specific VLAN.
zte(cfg)#set mld snooping vlan <1-4094> add Adds a static group to a specific VLAN and adds
group <ipv6-address> port <portlist> a port to the static group.
zte(cfg)#set mld snooping vlan <1-4094> delete Clears static groups in a specific VLAN and
group <ipv6-address>[port <portlist>] clears the ports in the static groups.
zte(cfg)#set mld snooping vlan <1-4094>{add | Adds or clears a routing portsin a specific VLAN.
delete} mrouter port <port-id>
zte(cfg)#set mld snooping { host-time-out | Sets the time-out period between the router port
mrouter-time-out }<30-65535> and the host port.
zte(cfg)#set mld snooping query-interval Sets the interval for sending query packets.
<30-65535>
zte(cfg)#set mld snooping query-response-inter Sets the interval for sending report packets.
val <1000-25000>
zte(cfg)#set mld snooping last-member-query Sets the time of waiting for a query response
<1-25> when the last member leaves.
zte(cfg)#set mld snooping query vlan Enables or disables the query function in a
<vlanlist>{enable | disable} specific VLAN.
zte(cfg)#set mld snooping query vlan <vlanlist> Sets the MLD version of query packets.
version <1-2>
zte(cfg)#set mld snooping query {enable | Enables or disables the query function.
disable}
zte(cfg)#set mld snooping fastleave {enable | Enables or disables the fast leave function.
disable}
zte(cfg)#set mld snooping robustness <1-7> Sets the MLD robustness value.
zte(cfg)#set mld filter {enable | disable} Enables or disables the filter function globally.
zte(cfg)#set mld filter {add | delete} query port Adds or deletes the query packet filter for the
< portlist> vlan <vlanlist> specified port.
zte(cfg)#set mld filter {add | delete} query trunk Adds or deletes the query packet filter for the
< trunklist> vlan <vlanlist> specified trunk port.
show mld snooping (all configuration modes) Displays global MLD snooping configuration
information.
show mld snooping vlan <1-4094>[group Displays the MLD snooping result.
<ipv6-address>| port-info | group-source-filter |
host-source-filter ] (all configuration modes)
5-27
Command Function
show mld snooping mr-port-info (all configuration Displays MLD router port information.
modes)
show mld filter query (all configuration modes) Displays the configuration of the query packet
filter.
show mld filter query vlan <vlanlist> (all Displays the configuration of the query packet
configuration modes) filter for the specified VLAN.
See Figure 5-6. Port 1, Port 3 and Port 5 are connected to hosts, Port 10 is connected
to a router, ports 10, 1, 3 and 5 are in VLAN 200, users connected to Ports 1, 3 and 5
send multicast join requests to join the groups ff1e::22 and ff1e::11. Enable the MLD
snooping function on the switch and display the snooping result.
l Configuration Procedure
zte(cfg)#set vlan 200 add port 1, 3, 5, 10 untag
zte(cfg)#set port 1, 3, 5, 10 pvid 200
zte(cfg)#set vlan 200 enable
zte(cfg)#set mld snooping enable
zte(cfg)#set mld snooping add vlan 200
zte(cfg)#set mld snooping vlan 200 add mr port 10
l Configuration Verification
5-28
Querier : disable
Working Mode : proxy
Max Group Number : 256
Total Group Number : 2
Exist Host Group Number : 2
Index Vlan Group ID Prejoin LiveTime Ports
----- ---- -------------- ------- ---------- --------
1 200 ff1e::11 0 0:00:00:14 D:1,3, 5
2 200 ff1e::22 0 0:00:00:09 D:1,3,
Configuring IPTV
The IPTV configuration mainly includes the following contents:
l Configure channel attributes
l Configure package attributes
l Configure preview-related attributes
l Configure CDR-related attributes
l Configure port-related attributes
The IPTV configuration includes the following commands:
Command Function
zte(cfg-nas)#iptv channel mvlan <1-4094> groupip <A.B.C.D> Adds channel (multicast group) to
count <1-1032>[prename <prename>] the specified VLAN in batch and
names channels in batch.
5-29
Command Function
zte(cfg-nas)#iptv channel {name <channel-name>| id-list < Enables or disables channel log
channel-list>} cdr {enable | disable} function.
zte(cfg-nas)#iptv cdr create-period <1-65535> Sets the interval for creating CDRs
when users watch programs for a
long time.
zte(cfg-nas)#iptv cdr report-interval <1-65535> Sets the time interval for CDR
report.
5-30
Command Function
zte(cfg-nas)#iptv port <portlist>[vlan <1-4094>] service {start | Sets user service state.
remove | pause | resume}
zte(cfg-nas)#iptv port <portlist>[vlan <1-4094>] control-mode Sets user multicast control mode.
{package | channel}
zte(cfg-nas)#iptv port <portlist>[vlan <1-4094>] package Allocates packages for the user.
{name <package-name>| id-list <package-list>}
zte(cfg-nas)#iptv port <portlist> general {order | preview} Allocates general group order
and preview permissions to users
under the port list.
zte(cfg-nas)#iptv port <portlist> general deny Denies general group order and
preview permissions for users
under the port list.
zte(cfg-nas)#iptv port <portlist>[vlan <1-4094>] cdr {enable | Enables or disables the user CDR
disable} log record function.
5-31
Command Function
zte(cfg-nas)#iptv filter user-mac {enable | disable} Enables or disables the user MAC
filtering function.
zte(cfg-nas)#clear iptv port <portlist>[vlan <1-4094>] package Deletes the package allocated for
{name <package-name>| id-llist <package-idlist>} users.
show iptv control (all configuration modes) Displays IPTV global configuration.
show iptv channel [name <channel-name>| id <channel-id>] (all Displays channel information (all
configuration modes) channels or some channel detailed
information).
show iptv package [name<package-name>| id <0-127>] (all Without parameters, displays the
configuration modes) package names. With parameters,
this displays all channel lists in the
package.
show iptv prv (all configuration modes) Displays IPTV preview global
configuration information.
show iptv view-profile [name <viewfile-name>| id <0-1023>] (all Displays preview configuration file
configuration modes) information.
show iptv cdr (all configuration modes) Displays global CDR configuration
information.
show iptv client [{channel <0-1031>| index <0-255>| mac Displays IPTV user information.
<HH.HH.HH.HH.HH.HH>| port <portid>| vlan <1-4094>}] (all
configuration modes)
show iptv rule [ port <portid>][vlan <1-4094>][channel | package] Displays IPTV rule information.
(all configuration modes)
5-32
Command Function
l Configuration Procedure
1. Configure VLAN
zte(cfg)#set vlan 100 add port 1
zte(cfg)#set vlan 4000 add port 1, 4
zte(cfg)#set vlan 100, 4000 enable
zte(cfg)#set port 1 pvid 100
zte(cfg)#set port 4 pvid 4000
/*IGMP Snooping*/
5-33
Id Port Vlan Mbase Mode Service Cdr Order Preview Query PkgNum
-- ---- ---- ----- ------- ------- -------- ----- ------- ----- ------
1 1 false channel in disabled 1 0 0 0
Index :0
Rule :1 Vlan :100
Port :1 ChNum :1
Mac :00.10.94.00.00.01 Ip :192.85.1.3
5-34
l Configuration Procedure
1. Configure VLAN
zte(cfg)#set vlan 100 add port 1
zte(cfg)#set vlan 4000 add port 1, 4
zte(cfg)#set vlan 100, 4000 enable
zte(cfg)#set port 1 pvid 100
zte(cfg)#set port 4 pvid 4000
/*IGMP Snooping*/
zte(cfg)#set igmp snooping enable
zte(cfg)#set igmp snooping add vlan 100, 4000
zte(cfg)#set igmp snooping fastleave enable
2. Configure IPTV
zte(cfg)#config nas
zte(cfg-nas)#iptv control enable
zte(cfg-nas)#iptv cac-rule enable
zte(cfg-nas)#iptv prv enable
3. Configure a rule on the port
zte(cfg-nas)#iptv channel mvlan 4000 group 225.1.1.1
name CCTV1 id 1
zte(cfg-nas)#iptv port 1 service start
zte(cfg-nas)#iptv port 1 control-mode channel
zte(cfg-nas)#iptv port 1 channel id 1 preview
4. Configure the preview template
zte(cfg-nas)#iptv view-profile name VPF1.PRF
zte(cfg-nas)#iptv view-profile name VPF1.PRF count 2
zte(cfg-nas)#iptv view-profile name VPF1.PRF blackout 10
zte(cfg-nas)#iptv view-profile name VPF1.PRF duration 20
zte(cfg-nas)#iptv channel id 1 viewfile-name VPF1.PRF
l Configuration Verification
Check configuration
5-35
5-36
and CSTs are called as Common and Internal Spanning Tree (CIST). A CIST is a single
spanning tree used to connect all switches.
In this MSTP topology structure, an IST can serve as a single bridge (switch). In this
way, a CTS can serve as an RSTP for the interaction of configuration information (BPDU).
Multiple instances can be created in an IST area and these instances are valid only in this
area. An instance is equivalent to an RSTP, except that the instance needs to perform
BPDU interaction with bridges outside this area.
For the MSTP topological structure, see Figure 5-9.
l Master: The port type is introduced in the MSTP protocol. When multiple different
areas exist, the master port is the port with the minimal cost to the root.
l Root: The port that has the minimal cost to the root bridge and takes charge in
forwarding data to the root node. When multiple ports have the same cost to the root
bridge, the port with the lowest port priority becomes to the root port.
l Designated: The port transmits data to the switch downward, and sends the STP
protocol message to maintain the state of STP.
l Backup: The port receives the STP message, which proves that there exists a loop
to the port itself.
l Alternate: The port receives excess STP protocol messages from other equipment.
However, when the original link fails, the port becomes transmitting and maintains the
network taking the place of the faulty port.
5-37
l Edged: The port is used to connect the terminal equipment, for example, PC. The
port does not participate in the calculation before the STP is stable, and the state can
be switched fast.
According to the port role, the port state is different after the calculation becomes steady.
For the relationships between the port role and the port state, refer to Table 5-1.
Master Forward
Root Forward
Designated Forward
Backup Discard
Alternate Discard
Edged Forward
5-38
The port root protection feature is used to protect the root bridge. After being configured
with root protection, if a port receives a BPDU in which the numerical value for the bridge
ID is lower, the port will enter RootGuard state to avoid spanning tree recalculation. In
this state, no data will be forwarded from this port. Once the port no longer receives any
BPDU in which the numerical value for the bridge ID is lower, it will go through the transitory
states, that is, Listening state and Learning state, and finally transit to Forwarding state.
The recovery is automatic, without any human intervention.
Configuring STP
In the default configuration, the MSTP only has the instance with ins_id being 0. This
instance always exists and users cannot manually delete it. This instance is mapped with
VLANs 1 to 4094.
The STP configuration includes the following commands:
Command Function
zte(cfg)#set stp forceversion {mstp | rstp | stp} Sets the forced STP type to
MSTP/RSTP/STP.
zte(cfg)#set stp port <portlist>{enable | disable} Enables or disables the port STP
function.
zte(cfg)#set stp port <portlist> linktype {point-point | shared} Sets port connection type.
zte(cfg)#set stp port <portlist> packettype {IEEE | CISCO | Sets instance port packet type.
HUAWEI | HAMMER | extend }
zte(cfg)#set stp port <portlist> pcheck Checks the current STP protocol
type and selects the best protocol.
zte(cfg)#set stp port <portlist> bpdu-guard {enable | disable} Enables or disables the BPDU
packet protection function on the
port.
zte(cfg)#set stp trunk <trunklist> linktype {point-point | shared} Sets trunk connection type.
zte(cfg)#set stp trunk <trunklist> packettype {IEEE | CISCO | Sets packet types sent and
HUAWEI | HAMMER | extend } received by the trunk.
zte(cfg)#set stp edge-port {add | delete} port <portlist> Adds/deletes STP edge port.
5-39
Command Function
zte(cfg)#set stp instance <0-63>{add | delete} vlan <vlanlist> Adds or deletes the VLAN to/from
the MSTP instance.
zte(cfg)#set stp instance <0-63>{port <1-28>| trunk < trunklist Sets the priority of the port/trunk
>} priority <0-240> in the instance.
zte(cfg)#set stp instance <0-63>{port <1-28>| trunk <trunklist>} Sets the path cost of the port/trunk
cost <1-200000000> in the instance.
zte(cfg)#set stp instance <0-63>{port <1-28>| trunk <trunklist>} Enables or disables the root
root-guard {enable | disable} protection of port/trunk in the
instance.
zte(cfg)#set stp instance <0-63>{port <1-28>| trunk <trunklist>} Enables or disables the loop
loop-guard {enable | disable} protection of port/trunk in the
instance.
zte(cfg)#set stp instance <0-63> priority <0-61440> Sets the priority of the bridge in
the instance, which is used for root
bridge selection.
zte(cfg)#clear stp instance <0-63>{port <1-28>| trunk <1-15>} Sets the path cost of the port/trunk
cost in the instance as the default
value.
show stp instance [<0-63>] (all configuration modes) Displays the state information of
the instance.
show stp port [<portlist>] (all configuration modes) Displays the STP port
configuration information.
show stp trunk <trunklist> (all configuration modes) Displays STP trunk configuration
information.
5-40
l Configuration Procedure
zte(cfg)#set stp enable
/*enable the stp protocol of switch1 and switch2*/
zte(cfg)#set stp forceversion stp
/*set STP forceversion as stp*/
l Configuration Verification
1. Check the STP state of switch 1 in the system view.
zte(cfg)#show stp instance
Spanning tree enabled protocol stp
RootID:
Priority : 32768 Address : 00.d0.d0.02.00.54
HelloTime(s) : 2 MaxAge(s): 20
ForwardDelay(s): 15
Reg RootID:
Priority : 32768 Address : 00.d0.d0.02.00.54
RemainHops : 20
BridgeID:
Priority : 32768 Address : 00.d0.d0.02.00.54
HelloTime(s) : 2 MaxAge(s): 20
ForwardDelay(s): 15 MaxHops : 20
Interface PortId Cost Status Role Bound GuardStatus
--------- ------ ------- ------- ---------- ----- -----------
1 128.1 200000 Forward Designated SSTP None
2 128.2 200000 Forward Designated SSTP None
2. Check the STP state of switch 2 in the system view.
zte(cfg)#show stp instance
Spanning tree enabled protocol stp
RootID:
Priority : 32768 Address : 00.d0.d0.02.00.54
HelloTime(s) : 2 MaxAge(s): 20
ForwardDelay(s):15
Reg RootID:
Priority : 32768 Address : 00.d0.d0.29.52.06
5-41
RemainHops : 20
BridgeID:
Priority : 32768 Address : 00.d0.d0.29.52.06
HelloTime(s) : 2 MaxAge(s): 20
ForwardDelay(s): 15 MaxHops : 20
Interface PortId Cost Status Role Bound GuardStatus
--------- ------ ------- ------- ---------- ----- -----------
1 128.1 200000 Forward Root SSTP None
2 128.2 200000 Discard Alternate SSTP None
l Configuration Procedure
zte(cfg)#set stp enable
/*enable STP protocol of switch1 and switch2*/
zte(cfg)#set stp forceversion rstp
/*set forceversion of stp as rstp*/
l Configuration Verification
1. Check the STP state of switch 1 in the system view.
zte(cfg)#show stp instance
Spanning tree enabled protocol rstp
RootID:
Priority : 32768 Address : 00.d0.d0.02.00.54
HelloTime(s) : 2 MaxAge(s): 20
ForwardDelay(s): 15
Reg RootID:
Priority : 32768 Address : 00.d0.d0.02.00.54
RemainHops : 20
BridgeID:
Priority : 32768 Address : 00.d0.d0.02.00.54
HelloTime(s) : 2 MaxAge(s): 20
ForwardDelay(s): 15 MaxHops : 20
Interface PortId Cost Status Role Bound GuardStatus
--------- ------ -------- ------- ---------- ----- -----------
1 128.1 200000 Forward Designated RSTP None
5-42
l Configuration Procedure
zte(cfg)#set stp enable
/*enable the stp protocol of switch1 and switch2*/
zte(cfg)#set stp forceversion mstp
/*set the STP forceversion as mstp*/
zte (cfg)#set stp name zte
/*set switch1 and switch2 in the same area*/
zte(cfg)#set stp revision 10
zte(cfg)#set stp instance 1 add vlan 10-20
l Configuration Verification
1. Check the STP state of switch 1 and switch 2 in the system view.
zte(cfg)#show stp
5-43
5-44
5-45
switch accepts or rejects the packets because the switch stops testing conditions after
the first match. The order of conditions in the list is critical. If no conditions match, the
switch rejects the packets. If there are no restrictions, the switch forwards the packet.
Otherwise, the switch drops the packet.
The ZXR10 2900E supports the following functions.
l The ZXR10 2900E provides two binding types, including physical port and VLAN port.
l ACL rules can be added, deleted, and sorted.
1. Rules can be added to a configured ACL. Regular ID number range is 1-500.
2. Configured ACL can be deleted regularly. If the specified ACL instance number
or rule number is not configured, a false message will return.
3. Many rules of an ACL can be sorted. It is necessary to specify the position where
a rule number should be moved.
l An ACL can become valid according to the configured time range. After configuring
absolute or relative time range on the switch, the time range can be applied to the rule
of the ACL. This causes the rule to be valid according to the time range specification.
l The ZXR10 2900E provides the following ten types of ACLs:
1. Basic ACL: Only matches the source IP address.
2. Extended ACL: Matches the source IP address, destination IP address, IP
protocol type, TCP source port number, TCP destination port number, UDP
source port number, UDP destination port number, ICMP type, ICMP Code and
DiffServ Code Point (DSCP).
3. L2 ingress ACL: Matches the source MAC address, destination MAC address,
source VLAN ID and 802. 1p priority value, Ethernet network type and
DSAP/SSAP.
4. Hybrid ingress ACL: Matches source IPv4/IPv6 address, destination IPv4/IPv6
address, IP protocol type, TCP source port number, TCP destination port number,
UDP source port number, UDP destination port number, DiffServ Code Point
(DSCP), source MAC address, destination MAC address, source VLAN ID and
802. 1p priority value.
5. Global ACL: Matches the source IP address, destination IP address, IP protocol
type, TCP source port number, TCP destination port number, UDP source port
number, UDP destination port number, DiffServ Code Point (DSCP), source MAC
address, destination MAC address, source VLAN ID and 802. 1p priority value.
6. Basic egress ACL: Only matches source IP address.
7. Extended egress ACL: Matches the source IP address, destination IP address,
IP protocol type, TCP source port number, TCP destination port number, UDP
source port number, UDP destination port number, ICMP type, ICMP Code and
DiffServ Code Point (DSCP).
8. L2 egress ACL: Matches the destination MAC address, source VLAN ID and 802.
1p priority value, Ethernet network type and DSAP/SSAP.
9. Hybrid egress ACL: Matches the Source IPv4/IPv6 address, destination
IPv4/IPv6 address, IP protocol type, TCP source port number, TCP destination
port number, UDP source port number, UDP destination port number, DiffServ
5-46
Code Point (DSCP), source MAC address, destination MAC address, source
VLAN ID and 802. 1p priority value.
10. User-defined ingress ACL: Only matches the bytes defined by users.
l Each ACL has an access list number to identify, which is a digit. The access list
number ranges of different types of ACL are shown below:
1. Basic ingress ACL: 1–99
2. Extended ingress ACL: 100–199
3. L2 ingress ACL: 200–299
4. Hybrid ingress ACL: 300–399, support IPv6
5. Basic egress ACL: 400–499
6. Extended egress ACL: 500–599
7. L2 egress ACL: 600-699
8. Hybrid egress ACL:700–799, supports IPv6
9. Global ACL: 800
10. User-defined ingress ACL: 801–828
l Each ACL has at most 500 rules and the range is 1–500.
Configuring ACL
The ACL configuration includes the following commands:
Command Function
zte(cfg)#set port <portlist> acl mode {port | vlan} Sets port ACL binding mode.
zte(cfg)#set port <portlist> acl <1-799, 801–828>{enable | Binds ACL instance to the port.
disable}
zte(cfg)#set vlan <vlanlist> acl <1-399, 801–828>{enable | Binds ACL instance to the VLAN.
disable}
5-47
Command Function
zte(link-acl-group)#rule <1-500>{permit | deny} arp {[cos Sets the rule that a layer-2 ingress
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>| ACL is used to match ARP
any][<dest-mac><dmac-mask>| any]} packets.
zte(link-acl-group)#rule <1-500>{permit | deny} other Sets the rule that a layer-2 ingress
{[ether-type <1501-65535>| dsap-ssap <0-65535>][cos ACL is used to match packets
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>| except IP/ARP packets.
any][<dest-mac><dmac-mask>| any]}
zte(link-acl-group)#rule <1-500>{permit | deny} any [cos Sets the rule that a layer-2 ingress
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>| ACL is used to match packets with
any][<dest-mac><dmac-mask>| any] specified cos, VLAN id, smac, and
dmac flags.
5-48
Command Function
zte(hybrid-acl-group)#rule <1-500>{permit | deny} tcp Sets the rule that a hybrid ingress
{<source-ipaddr><sip-mask>| any}[source-port <0-65535><s ACL is used to match IPv4-TCP
port-mask>]{<destination-ipaddr><dip-mask>| any}[dest-port packets.
<0-65535><dport-mask>][dscp <0-63>][fragment][cos
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>|
any][<dest-mac><dmac-mask>| any]
zte(hybrid-acl-group)#rule <1-500>{permit | deny} udp Sets the rule that a hybrid ingress
{<source-ipaddr><sip-mask>| any}[source-port <0-65535><s ACL is used to match IPv4-UDP
port-mask>]{<destination-ipaddr><dip-mask>| any}[dest-port packets.
<0-65535><dport-mask>][dscp <0-63>][fragment][cos
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>|
any][<dest-mac><dmac-mask>| any]
zte(hybrid-acl-group)#rule <1-500>{permit | deny} arp Sets the rule that a hybrid ingress
{<sender-ipaddr><sip-mask>| any}{<target-ipaddr><tip-mask>| ACL is used to match ARP
any}[cos <0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-m packets.
ask>| any][<dest-mac><dmac-mask>| any]
zte(hybrid-acl-group)#rule <1-500>{permit | deny} any Sets the rule that a hybrid ingress
{[ether-type <1501-65535>][cos <0-7>][<vlan-id>[<vlan-mask ACL is used to match non-IPv6
>]][<source-mac><smac-mask>| any][<dest-mac><dmac-mask>| packets.
any]}
5-49
Command Function
zte(hybrid-acl-group)#rule <1-500>{permit | deny} ipv6 Sets the rule that a hybrid ingress
udp {<source-ipv6addr><sipv6-mask>| any}[source-port ACL is used to match IPv6-UDP
<0-65535><sport-mask>][<destination-ipv6addr><dipv6-mask>| packets.
any][dest-port <0-65535><dport-mask>][<vlan-id>]
zte(hybrid-acl-group)#rule <1-500>{permit | deny} all Sets the rule that a hybrid ingress
ACL is used to match any packet.
zte(global-acl-group)#rule <1-16>{permit | deny} port Sets the rule that a global ingress
{<1-28>| any}<ip-protocol>{<source-ipaddr><sip-mask>| any}{<d ACL matches specified fields of
estination-ipaddr><dip-mask>| any}[dscp <0-63>][fragment][cos IPv4 packets.
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>|
any][<dest-mac><dmac-mask>| any]
zte(global-acl-group)#rule <1-500>{permit | deny} port Sets the rule that a global ingress
{<1-28>| any} ip {<source-ipaddr><sip-mask>| any}{<destina ACL matches IPv4 packets.
tion-ipaddr><dip-mask>| any}[dscp <0-63>][fragment][cos
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>|
any][<dest-mac><dmac-mask>| any]
5-50
Command Function
zte(global-acl-group)#rule <1-500>{permit | deny} port Sets the rule that a global ingress
{<1-28>| any} tcp {<source-ipaddr><sip-mask>| any}[source-port ACL matches IPv4–TCP packets.
<0-65535><sport-mask>]{<destination-ipaddr><dip-mask>| any}[d
est-port <0-65535><dport-mask>][dscp <0-63>][fragment][cos
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>|
any][<dest-mac><dmac-mask>| any]
zte(global-acl-group)#rule <1-500>{permit | deny} port Sets the rule that a global ingress
{<1-28>| any} udp {<source-ipaddr><sip-mask>| any}[source-port ACL matches IPv4–UDP packets.
<0-65535><sport-mask>]{<destination-ipaddr><dip-mask>| any}[d
est-port <0-65535><dport-mask>][dscp <0-63>][fragment][cos
<0-7>][<vlan-id>[<vlan-mask>]][<source-mac><smac-mask>|
any][<dest-mac><dmac-mask>| any]
zte(cfg)#config egress-acl basic number < 400-499> Creates a basic egress ACL
instance and configures it.
zte(cfg)#clear egress-acl basic number < 400-499> Clears a basic egress ACL
instance.
zte(cfg)#config egress-acl extend number < 500-599> Creates an extended egress ACL
instance and configures it.
zte(egress-extend-acl)#rule < 1-500>{ permit | deny} icmp {< Sets an extended egress ACL that
source-ipaddr>< sip-mask>| any}{< destination-ipaddr>< dip-mask>| matches ICMP packets.
any}[ iicmp-ttype < 0-254>< icmp-code>][ dsscp < 0-63>][
fragment]
zte(egress-extend-acl)#rule < 1-500>{ permit | deny} ip {< Sets an extended egress ACL that
source-ipaddr>< sip-mask>| any}{< destination-ipaddr>< dip-mask>| matches IP packets.
any}[ dsscp < 0-63>][ fragment]
5-51
Command Function
zte(egress-extend-acl)#rule < 1-500>{ permit | deny} tcp {< Sets an extended egress ACL that
source-ipaddr>< sip-mask>| any}[ ssourrce-porrtt < 0-65535>< matches TCP packets.
sport-mask>]{< destination-ipaddr>< dip-mask>| any}[ desstt-porrtt
< 0-65535>< dport-mask>][ establishing | established][ dsscp <
0-63>][ fragment]
zte(egress-extend-acl)#rule < 1-500>{ permit | deny} udp {< Sets an extended egress ACL that
source-ipaddr>< sip-mask>| any}[ ssourrce-porrtt < 0-65535>< matches UDP packets.
sport-mask>]{< destination-ipaddr>< dip-mask>| any}[ desstt-porrtt
< 0-65535>< dport-mask>][ dsscp < 0-63>][ fragment]
zte(egress-extend-acl)#rule < 1-500>{ permit | deny} arp {< Sets an extended egress ACL that
sender-ipaddr>< sip-mask>| any}{< target-ipaddr>< tip-mask>| any} matches ARP packets.
zte(cfg)#clear egress-acl extend number < 500-599> Clears an extended egress ACL
instance.
zte(cfg)#config egress-acl link number < 600-699> Creates a layer-2 egress ACL
instance and configures it.
zte(egress-link-acl)#rule < 1-500>{ permit | deny} arp {[ coss Sets a layer-2 egress ACL that
< 0-7>][< vlan-id>[< vlan-mask>]][< dest-mac>< dmac-mask>| any]} matches ARP packets.
zte(egress-link-acl)#rule < 1-500>{ permit | deny} other Sets a layer-2 egress ACL that
{[ ether-type < 1501-65535>| dsap-ssap < 0-65535>][ coss matches packets except IP/ARP
< 0-7>][< vlan-id>[< vlan-mask>]][< source-mac>< smac-mask>| packets.
any][< dest-mac>< dmac-mask>| any]}
zte(egress-link-acl)#rule <1-500>{permit | deny} any Sets the rule that a layer-2 egress
[<vlan-id>[<vlan-mask>]][cos <0-7>][<dest-mac><dmac-mask>| ACL is used to match packets with
any] specified cos, VLAN id, and dmac
flags.
zte(cfg)#clear egress-acl link number < 600-699> Clears a layer-2 egress ACL
instance.
zte(cfg)#config egress-acl hybrid number < 700-799> Creates a hybrid egress ACL
instance and configures it.
5-52
Command Function
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} ip {< Sets a hybrid egress ACL that
source-ipaddr>< sip-mask>| any}{< destination-ipaddr>< dip-mask>| matches IPv4 packets.
any}[ dsscp < 0-63>][ fragment][ coss < 0-7>][< vlan-id>[<
vlan-mask>]][< source-mac>< smac-mask>| any][< dest-mac><
dmac-mask>| any]
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} tcp {< Sets a hybrid egress ACL that
source-ipaddr>< sip-mask>| any}[ ssourrce-porrtt < 0-65535>< matches IPv4-TCP packets.
sport-mask>]{< destination-ipaddr>< dip-mask>| any}[ desstt-porrtt
< 0-65535>< dport-mask>][ dsscp < 0-63>][ fragment][ coss
< 0-7>][< vlan-id>[< vlan-mask>]][< source-mac>< smac-mask>|
any][< dest-mac>< dmac-mask>| any]
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} udp {< Sets a hybrid egress ACL that
source-ipaddr>< sip-mask>| any}[ ssourrce-porrtt < 0-65535>< matches IPv4-UDP packet.
sport-mask>]{< destination-ipaddr>< dip-mask>| any}[ desstt-porrtt
< 0-65535>< dport-mask>][ dsscp < 0-63>][ fragment][ coss
< 0-7>][< vlan-id>[< vlan-mask>]][< source-mac>< smac-mask>|
any][< dest-mac>< dmac-mask>| any]
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} arp Sets a hybrid egress ACL that
{< sender-ipaddr>< sip-mask>| any}{< target-ipaddr>< tip-mask>| matches ARP packets.
any}[ coss < 0-7>][< vlan-id>[< vlan-mask>]][< source-mac><
smac-mask>| any][< dest-mac>< dmac-mask>| any]
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} any Sets a hybrid egress ACL that
{[ ettherr-ttype < 1501-65535>][ coss < 0-7>][< vlan-id>[< matches non-IPv6 packet
vlan-mask>]][< source-mac>< smac-mask>| any][< dest-mac><
dmac-mask>| any]}
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} Sets a hybrid egress ACL that
iipv6 < ip-protocol>{< source-ipv6addr>< sipv6-mask>| any}[< matches specified fields of IPv6
destination-ipv6addr>< dipv6-mask>| any][< vlan-id>] packets.
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} ipv6 Sets a hybrid egress ACL that
tcp {< source-ipv6addr>< sipv6-mask>| any}[ ssourrce-porrtt < matches IPv6-TCP packets.
0-65535>< sport-mask>][< destination-ipv6addr>< dipv6-mask>|
any][ desstt-porrtt < 0-65535>< dport-mask>][< vlan-id>]
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} ipv6 Sets a hybrid egress ACL that
udp {< source-ipv6addr>< sipv6-mask>| any}[ ssourrce-porrtt < matches IPv6-UDP packets.
0-65535>< sport-mask>][< destination-ipv6addr>< dipv6-mask>|
any][ desstt-porrtt < 0-65535>< dport-mask>][< vlan-id>]
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} ipv6 any Sets a hybrid egress ACL that
{< source-ipv6addr>< sipv6-mask>| any}[< destination-ipv6addr>< matches IPv6 packets.
dipv6-mask>| any][< vlan-id>]
5-53
Command Function
zte(egress-hybrid-acl)#rule < 1-500>{ permit | deny} all Sets a hybrid egress ACL that
matches any packet.
zte(cfg)#clear egress-acl hybrid number < 700-799> Clears a hybrid egress ACL
instance.
zte(cfg)#config ingress-acl user-define udb <1-15> anchor Sets a user-defined anchor and
<0-3>[offset <0-31>][data-length<1-6>] offset.
move <1-500>{after | before}<1-500> (all ACL configuration Sorts rules in ACL instance.
modes)
clear rule <1-500> (all ACL configuration modes) Clears one rule in ACL instance.
zte(cfg)#show acl binding {all | port [<portlist>]| vlan [<vlanlist>]} Displays the configuration
information that ACL is bound to
the interface.
zte(cfg)#show acl config [<1-828>| name <word>][ active | Displays the detailed configuration
command | deny | passive | permit | policy | rule <1-500>| snmp of ACL instance.
| time-range ]
Configure ACL in the switch to realize the following functions. Forbid the users to
access the external network through the gateway from 9:00 to 18:00. The gateway
connects with the switch on port 26. The client PC connects the switch on ports 1-24.
All the users access the external network through the gateway 192.168.0.1. See
Figure 5-13.
5-54
l Configuration Procedure
zte(cfg)#config ingress-acl hybrid number 300
zte(ingress-hybrid-acl)#rule 1 deny ip any 192.168.0.1 255.255.255.255
zte(ingress-hybrid-acl)#rule 2 deny arp any 192.168.0.1 255.255.255.255
zte(ingress-hybrid-acl)#exit
zte(cfg)#set port 1-24 acl 300 enable
zte(cfg)#set time-range worktime period 09:00 to 18:00 daily
zte(cfg)#set acl 300 rule 1 time-range worktime enable
zte(cfg)#set acl 300 rule 2 time-range worktime enable
5-55
For the data packet QoS handling method on the network edge device on the access side,
there are the following conditions:
l The switch can select whether to trust the packet and which fields of the packet, such
as UP or DSCP, can be trusted when receiving the packet. It allocates the QoS service
according to trusted fields.
l When the data packet received by the switch is not trusted, the QoS service is
allocated according to the related QoS configuration on the receiving port.
l QoS service defines the internal processing method and external processing method
of the packet. The internal processing method includes TC, and the external process-
ing method includes modifying the 802.1p user priority of a data packet or the DSCP
domain of an IP header.
For the following network core device, implement the service similar to the previous service
according to 802.1p of the packet or DSCP mark. This way, a set of end-to-end QoS
service is provided. When the flow exceeds the configuration, the network device can
modify the QoS service level such as dropping packets or allocating the lower-level QoS
service.
When a data packet enters the port, the switch will perform the QoS initialization mark
which mainly includes the initialization of TC QoS parameters.
In the direction of switch egress, the QoS is used to put the packet into the suitable queue
according to marked TC and perform the corresponding queue scheduling algorithm and
congestion control algorithm according to the current queue configuration and modify it
according to 802.1p user priority or IP DSCP field of the data packet.
Configuring QoS
The QoS configurations on the ZXR10 2900E includes global-based QoS configuration
and port-based QoS configuration. Part of QoS configuration is related to ACL. The QoS
configuration includes the following commands:
Command Function
zte(cfg)#set qos priority-mapping port <1-28> default-up <0-7> Sets the default port UP priority.
zte(cfg)#set qos priority-mapping port <1-28> trust-mode Sets the port trusted mode.
{dscp-priority | port-profile | user-priority}
zte(cfg)#set qos priority-mapping qos-profile dscp-to-dscp Sets the mapping relation between
<0-63> to <0-63> DSCPs .
zte(cfg)#set qos priority-mapping port <1-28> port-to-profile Sets the mapping relation between
qos-profile <0-127> the port and the QoS profile.
zte(cfg)#set qos priority-mapping qos-profile {up-to-profile Sets the mapping relation between
<0-7>| dscp-to-profile <0-63>} qos-profile <0-127> the DSCP/UP and the QoS profile.
5-56
Command Function
zte(cfg)#set qos priority-mapping qos-profile <0-127>{drop-pri Sets the QoS profile template.
ority {red | yellow | green}| dscp-priority <0-63>| user-priority
<0-7>| traffic-class <0-7>}
zte(cfg)#set qos priority-mapping qos-profile default Sets 128 QoS profiles to recover
default values.
zte(cfg)#set qos queue-schedule enhance {disable| enable} Sets the optimized queue
scheduling mode.
zte(cfg)#set qos queue-schedule mode {byte | packet} Sets the QoS queue scheduling
unit.
zte(cfg)#set qos queue-schedule port <1-28>{session <1-7>| Sets the scheduling policy of each
default} queue of the port.
zte(cfg)#set qos traffic-limit mode {byte|packet} Sets the speed limit mode of the
global Ingress port.
zte(cfg)#set qos traffic-limit fe-port <1-24>{data-rate Sets 100 M port ingress rate
<0-100000>| disable} limit, in which <0-100000> is the
maximum of data transmission
rate.
zte(cfg)#set qos traffic-limit fe-port <1-24>{packet-rate Sets 100 M port ingress rate
<0-148810>[packet-lenth <64-10240>]| disable} limit, in which <0-148810> is the
maximum of packet transmission
rate.
zte(cfg)#set qos traffic-limit port <1-28> packet-type {broadcast Sets the packet type that the rate
| known-uc | multicast | tcp-syn | unknown-uc}{enable | disable} limit function limits.
zte(cfg)#set qos traffic-limit port <1-28> percent <1-100> Sets the ingress rate limit based
on the port bandwidth percentage.
zte(cfg)#set qos traffic-limit port <1-28> protect {enable|disable} Sets the port rate limiting function.
zte(cfg)#set qos traffic-limit port <1-28> protect time <1-10> Sets the port shutdown time
when the port rate limit function is
enabled.
zte(cfg)#set qos traffic-limit port <1-28> trap {enable | disable} Enables or disables the trap
function for a port.
zte(cfg)#set qos traffic-limit ge-port <25-28>{data-rate Sets 1000 M port ingress rate
<32-1000000>| disable} limit, in which, <32-100000> is the
maximum of data transmission
rate.
5-57
Command Function
zte(cfg)#set qos traffic-limit ge-port <25-28>{packet-rate Sets 1000 M port ingress rate limit.
<0-14881000>[packet-lenth <64-10240>]| disable}
zte(cfg)#set qos traffic-limit xge-port <2/1-2/4>{data-rate Sets the ingress rate limit for
<0-10000000>| disable} the 10000 M port, in which,
<0-100000> is the maximum of
data transmission rate
zte(cfg)#set qos traffic-limit ge-port <2/1-2/4>{packet-rate Sets the ingress rate limit for
<0-14881000>[packet-lenth <64-10240>]| disable} the 10000 M port, in which,
<0-148810> is the maximum of
packet transmission rate.
zte(cfg)#set qos traffic-shaping fe-port <1-24>{data-rate Sets 100M egress shaping rate.
<32-100000> burst-size <8-4094>| disable}
zte(cfg)#set qos traffic-shaping fe-port <1-24> queue Sets 100M egress shaping rate
<0-7>{data-rate <32-100000> burst-size <8-4094>| disable} based on the queue.
zte(cfg)#set qos traffic-shaping ge-port <25-28>{data-rate Sets 1000M egress shaping rate.
<2-1000> burst-size <8-4094>| disable}
zte(cfg)#set qos traffic-shaping ge-port <25-28> queue Sets 1000M egress shaping rate
<0-7>{data-rate <2-1000> burst-size <8-4094>| disable} based on the queue.
zte(cfg)#set qos traffic-shaping xge-port <2/1-2/4>{data-rate Sets the Egress shaping rate for
<2-10000> burst-size <8-4094>| disable} the 10000 M port.
zte(cfg)#set qos traffic-shaping xge-port <2/1-2/4> queue Sets the queue-based Egress
<0-7>{data-rate <2-10000> burst-size <8-4094>| disable} shaping rate for the 10000 M port.
show qos priority-mapping port [<1-28>] (all configuration modes) Displays priority mapping
configuration based on the
port.
show qos queue-schedule mode (all configuration modes) Displays QoS queue scheduling
unit.
show qos queue-schedule port <1-28> (all configuration modes) Displays the queue scheduling
policy of each queue of the port.
show qos queue-schedule session [<1-7>] (all configuration modes) Displays the configuration of
scheduling policy template.
show qos traffic-limit [port <1-28>] protect (all configuration Displays the egress rate limiting
modes) configuration of the port.
5-58
Command Function
show qos traffic-limit [port <1-28>] trap (all configuration modes) Displays trap function
configuration.
show qos traffic-limit [port <1-28>] (all configuration modes) Displays ingress rate limit
configuration.
show qos traffic-shaping [port <1-28>] (all configuration modes) Displays egress shaping
configuration.
show qos traffic-limit [protect | port <1-28> protect] Displays the port protection
configuration.
zte(cfg)#set qos policer <0-383> mode {aware | blind} cir Sets the flow policer.
<32-10485760> cbs <20000-268435456>{ebs <20000-268435456>|
pir <32-10485760> pbs <20000-268435456>}
zte(cfg)#set qos policer <0-383> exceed-action red {no-operation Sets flow policing action.
| drop | remark} yellow {no-operation | drop | remark}
zte(cfg)#set qos policer <0-383> exceed-action remark profile Sets the binding and action
<0-127> up {no-change | enable-modify | disable-modify} dscp { implementation mode between the
no-change | enable-modify | disable-modify } flow policer and the QoS profile.
zte(cfg)#set qos policer counter-mode {L1 | L2 | L3} Sets the flow policer statistics
mode.
zte(cfg)#set qos policer <0-383> counter <0-255>{enable | Enables or disables the flow
disable} policer statistics function and
configures the binding between
the flow policer and the counter.
zte(cfg)#set policy policing in acl <1-828> rule <1-500> policer Enables the flow policer and
<0-383> handles the special flow by the
flow policer.
zte(cfg)#set policy remark in ingress-acl <1-399,800-828> Uses the QoS profile to modify the
rule <1-500> profile <0-127> up {no-change | enable-modify | specified flow UP/DSCP field that
disable-modify} dscp {no-change | enable-modify | disable-modify} the ingress ACL matches.
zte(cfg)#set policy remark in egress-acl < 400-799> rrulle < Uses the QoS profile to modify the
1-500> up { no-change |< 0-7>} dscp { no-change |< 0-63>} specified flow UP/DSCP field that
the egress ACL matches.
zte(cfg)#set mirror analyze-port session <1-3>{enable | disable} Sets the session between flow
mapping port and port mapping .
zte(cfg)#set policy mirror in acl <1-399,800-828> rule Copies the specified data flow to
<1-500>{cpu | analyze-port} the monitor port.
5-59
Command Function
zte(cfg)#set policy redirect in acl <1-399,800-828> rule Redirects the specified data flow
<1-500>{cpu | port <1-28>} to the user-specified egress port.
zte(cfg)#set policy statistics in acl <1-828> rule <1-500> Implements flow statistic for the
counter <0-1023> data flow matching ACL rule.
zte(cfg)#set policy vlan-remark in acl <1-828> rule Modifies the VLAN remark of the
<1-500><1-4094>{nested | replace {untagged | tagged | all}} specified flow.
zte(cfg)#clear policy remark in acl <1-828> rule <1-500> Clears the configuration of the
specified flow UP/DSCP field
modified by QoS profile.
zte(cfg)#clear policy policing in acl <1-828> rule <1-500> Clears the configuration that
the flow policer processes the
specified flow.
zte(cfg)#clear policy mirror in acl <1-399,800-828> rule <1-500> Clears the configuration that
the specified flow mirrors to the
specified port.
zte(cfg)#clear policy statistics in acl <1-828> rule <1-500> Clears the configuration of
collecting statistics of packets of
the specified flow.
zte(cfg)#clear policy redirect in acl <1-399,800-828> rule Clears the configuration that the
<1-500> specified flow is redirected to the
specified port.
zte(cfg)#clear policy vlan-remark in acl <1-828> rule <1-500> Clears the configuration of
modifying the specified flow VLAN
tag.
zte(cfg)#clear policy harddrop in acl <1-828> rule <1-500> Clears the configuration that
the specified flow implements
harddrop operation.
zte(cfg)#clear qos policy-counter <counterlist> Clears the counter that counts the
specified flow.
show qos policer [<0-383>] (all configuration modes) Displays the flow policer
configuration.
show qos policy-counter [<0-1023>] (all configuration modes) Displays the counter value of the
specified flow.
5-60
Command Function
show qos policer-counter [<0-383>] (all configuration modes) Displays the flow policer statistics
value.
show policy [mirror | redirect | statistics | policing [<0-383>]| Displays various binding
vlan-remark | remark | harddrop] (all configuration modes) configuration of the specified
flow.
5-61
l Configuration Procedure
zte(cfg)#set qos traffic-limit fe-port 1 data-rate 2000
zte(cfg)#set qos traffic-limit fe-port 2 data-rate 2000
/*Omitted*/
zte(cfg)#set qos traffic-limit fe-port 24 data-rate 2000
zte(cfg)#set qos traffic-shaping ge-port 26 data-rate 20 burst-size 10
l Configuration Verification
zte(cfg)#show qos traffic-shaping port 26
Port Egress Traffic Shaping Table:
Port ID : 26
Port Shaping Rate (Kbps) : 20000 The Burst Size : 10
Queue 0 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 1 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 2 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 3 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 4 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 5 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 6 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
Queue 7 Shaping Rate (Kbps) : No-Limit The Burst Size : N/A
zte(cfg)#show qos traffic-limit port 1
Port Ingress Traffic Limit Table:
Flags: DataRate - traffic limit rate (Kbps), BcEn - Enable Broadcast Limit
KucEn - Enable Known unicast Limit, McEn - Enable Multicast Limit
TcpSynEn - Enable TCP SYN Limit, UucEn - Enable Unknown unicast Limit
PORT DataRate(Kbps) BcEn KucEn McEn TcpSynEn UucEn
------- -------------- ----- ------ ----- --------- ------
port-1 2000 1 1 1 1 1
5-62
5-63
A PVLAN divides ports in a VLAN into hybrid ports, isolated ports, and community ports.
l A hybrid port can communicate with any port.
l An isolated port can communicate only with a hybrid port, and it cannot communicate
with other isolated ports.
l A community port can communicate with a hybrid port or another community port in
the same session.
The ports within a VLAN are separated. Users can only communicate with their default
gateways, and the network security is guaranteed.
5-64
The ZXR10 2900E series switches support four PVLAN sessions. Each PVLAN session
supports an unlimited number of hybrid ports. Each PVLAN supports an unlimited number
of isolated or community ports.
Configuring PVLAN
The PVLAN configuration includes the following commands:
Command Function
show vlan pvlan [session<1-4>] (all configuration modes) Displays the PVLAN configuration.
l Configuration Procedure
5-65
l Configuration Procedure
1. Configuration of switch A:
zte(cfg)#set lacp enable
zte(cfg)#set lacp aggregator 1 add port 1-3
zte(cfg)#set lacp sggregator 1 mode dynamic
2. Configuration of switch B:
zte(cfg)#set lacp enable
zte(cfg)#set lacp aggregator 1 add port 1-3
zte(cfg)#set lacp aggregator 1 mode dynamic
5-66
pvlan session : 2
promise-ports :
promise-trunks : 1
isolate-ports : 4-6
isolate-trunks :
community-ports :
community-trunks :
0x00 STP
0x02 LACP/OAM
0x03 802.1x
0x09 ZGMP
5-67
0x0E LLDP
0x21 GVRP
Command Function
l Configuration Procedure
zte(cfg)#set l2pt 0x02 enable
zte(cfg)#set vlan 100 enable
zte(cfg)#set vlan 100 add port 1, 3
zte(cfg)#set port 1,3 pvid 100
zte(cfg)#set vlan 200 enable
zte(cfg)#set vlan 200 add port 2, 4
5-68
5-69
The ZXR10 2900E series system supports the hardware routing function to increase IP
packets forwarding speed.
To configure the IPv4 layer-3 function, use the config router command to enter the layer-3
configuration mode first.
Command Function
zte(cfg-router)#set ipport <0-63> ipaddress {<A.B.C.D/M>|<A. Sets the IP address and submask
B.C.D>< A.B.C.D>} of a layer-3 port.
zte(cfg-router)#set ipport <0-63> mac <HH.HH.HH.HH.H Sets the MAC address of layer-3
H.HH> port.
zte(cfg-router)#set ipport <0-63> vlan <1-4094> Sets the VLAN binding with layer-3
port.
zte(cfg-router)#arp ipport <0-63> timeout <1-1000> Sets ARP entry aging time based
on layer-3 interface.
5-70
Command Function
zte(cfg-router)#show arp [static | dynamic | invalid | ipport Displays the ARP table item
<0-63>[static | dynamic | invalid]| ipaddress <A.B.C.D>] information and free ARP function
status according to various rules.
l Configuration Procedure
zte(cfg)#set vlan 100 enable
zte(cfg)#set vlan 100 add port 1
zte(cfg)#set port 1 pvid 100
zte(cfg)#config route
zte(cfg-router)#set ipport 0 ipaddress 192.168.1.2 255.255.255.0
zte(cfg-router)#set ipport 0 vlan 100
zte(cfg-router)#set ipport 0 enable
l Configuration Verification
zte(cfg-router)#show ipport
IpPort En/Disable IpAddress Mask MacAddress VlanId
------ ---------- ------------ -------------- ----------------- ------
0 enabled 192.168.1.2 255.255.255.0 00.d0.d0.fa.29.20 100
zte(cfg-router)#exit
Use the ping command to check whether the layer-3 port is available.
zte(cfg)#ping 192.168.1.1
5-71
zte(cfg)#ping 192.168.1.1
Reply from 192.168.1.1 : bytes=28 time<1ms TTL=64
Reply from 192.168.1.1 : bytes=28 time<1ms TTL=64
Reply from 192.168.1.1 : bytes=28 time<1ms TTL=64
Reply from 192.168.1.1 : bytes=28 time<1ms TTL=64
Reply from 192.168.1.1 : bytes=28 time<1ms TTL=64
Command Function
show ipv6port <0> nd (all configuration modes) Displays IPv6 device neighbor
information, similar to the function
of the show arp command in IPv4.
5-72
l Configuration Procedure
zte(cfg)#set vlan 300 enable
zte(cfg)#set vlan 300 add port 10
zte(cfg)#set port 10 pvid 300
zte(cfg)#config route
zte(cfg-router)#set ipv6port 0 ipv6address 12:12::c055:40/128
zte(cfg-router)#set ipv6port 0 vlan 300
zte(cfg-router)#set ipv6port 0 enable
zte(cfg-router)#set ipv6port 0 enable
zte(cfg-router)#ipv6route default 12:12::c055:12
l Configuration Verificatio
zte(cfg-router)#show ipv6port
IpPort Status Ipv6AddrNum MacAddress VlanId IpMode
------ ------ --------------- ----------------- ------ ------
0 up 1 00.22.93.63.4f.70 300 static
Use the ping command to check whether the layer-3 port is available.
zte(cfg)#ping6 12:12::c055:40
5-73
DAI is related to the trusted state of the port of the switch. If an ARP packet is received
on a trusted port, shield all DAI detections. If an ARP packet is received on a non-trusted
port, it must pass the DAI validity test.
Configuring DAI
The DAI configuration includes the following commands:
Command Function
zte(cfg)#set arp-inspection port <portlist> limit {<1-100>| Sets the maximum number of ARP
infinite} packets in the unit time.
l Configuration Procedure
zte(cfg)#set dhcp snooping-and-option82 enable
zte(cfg)#set dhcp snooping add port 49,50
zte(cfg)#set dhcp port 49 client
zte(cfg)#set dhcp port 50 server
zte(cfg)#show dhcp snooping
DHCP snooping is enabled on the following port(s):
PortId PortType
5-74
------ --------
49 Client
50 Server
zte(cfg)#set arp-inspection vlan 1 enable
zte(cfg)#set arp-inspection port 49 untrust
zte(cfg)#set arp-inspection port 49 limit 15
zte(cfg)#set arp-inspection validate ip enable
zte(cfg)#set arp-inspection validate dst-mac enable
zte(cfg)#set arp-inspection validate src-mac enable
Note:
DAI detection condition: the port sending packets is a non-trusted port, and the DAI
function is enabled on the VLAN. When DHCP Snooping is enabled and a non-trusted
port is added into DHCP Snooping, DAI detection is valid.
l Configuration Verification
zte(cfg)#show arp-inspection
Enabled validation: ip,dst-mac,src-mac
Enabled vlanlist : 1
PortId TrustType Limit(pps)
------ --------- ----------
49 Untrust 15
50 Trust -
51 Trust -
52 Trust -
5-75
client software. To support the port-based network access control, the client system
must support the Extensible Authentication Protocol Over LAN (EAPOL).
l The authentication system is network equipment that supports the IEEE802.1x pro-
tocol. Corresponding to the ports of different subscribers (the ports can be physical
ports or MAC address, VLAN, or IP address of the user equipment), the authentication
system has two logical ports: controlled port and uncontrolled port.
1. The uncontrolled port is always in the state that the bidirectional connections are
available. It is used to transfer the EAPOL frames and can ensure that the client
can always send or receive the authentication.
2. The control port is enabled only when the authentication is passed. It is used to
transfer the network resource and services. The controlled port can be configured
as bidirectional controlled or input controlled to meet the requirement of different
applications. If the subscriber authentication is not passed, this subscriber cannot
visit the services provided by the authentication system.
3. The controlled port and uncontrolled port in the IEEE 802.1x protocol are logical
ports. There are no such physical ports on the equipment. The IEEE 802.1x
protocol sets up a local authentication channel for each subscriber and other
subscribers cannot use it. Thus, preventing the port from being used by other
subscribers after the port is enabled.
l The authentication server is a RADIUS server. This server can store a lot of
subscriber information, such as the VLAN that the subscriber belongs to, CAR
parameters, priority, and subscriber access control list. After the authentication
of a subscriber is passed, the authentication server will pass the information of
this subscriber to the authentication system, which will create a dynamic access
control list. The subsequent flow of the subscriber will be monitored by the above
parameters. The authentication system communicates with the RADIUS server
through the RADIUS protocol.
RADIUS is a protocol standard used for the authentication, authorization, and exchange
of configuration data between the Radius server and Radius client.
RADIUS uses the Client/Server mode. The Client runs on the NAS. It is responsible
for sending the subscriber information to the specified Radius server and carrying out
operations according to the result returned by the server.
The Radius Authentication Server is responsible for receiving the subscriber connection
request, verifying the subscriber identity, and returning the configuration information
required by the customer. A Radius Authentication Server can serve as a RADIUS
customer proxy to connect to another Radius Authentication Server.
The Radius Accounting Server is responsible for receiving the subscriber billing start
request and subscriber billing stop request, and completing the billing function.
The NAS communicates with the Radius Server through RADIUS packets. Attributes in
the RADIUS packets are used to transfer the detailed authentication, authorization, and
billing information.
The EAP protocol is used between the switch and the subscriber. Three types of identity
authentication methods are provided between the RADIUS servers: PAP, CHAP, and
5-76
EAP-MD5. Any of the methods can be used according to different service operation
requirements.
l Password Authentication Protocol (PAP)
PAP is a simple plain text authentication mode. NAS requires the subscriber to
provide the username and password and the subscriber returns the subscriber
information in the form of plain text. The server checks whether this subscriber
is available and whether the password is correct according to the subscriber
configuration and returns different responses. This authentication mode features
poor security and the username and password transferred may be easily stolen.
For the process of using the PAP mode for identity authentication, see Figure 5-21.
For the process of using the CHAP mode for identity authentication, see Figure 5-22.
5-77
5-78
Command Function
zte(cfg)#set port <portlist> vlanjump {enable [defaultauthvlan Enables or disables the vlan jump
<1-4094>]| disable]} after user 802.1x authentication.
5-79
Command Function
zte(cfg-nas)#dot1x add vlan <1-4094>[mac <HH.HH.HH.HH Sets the private MAC address that
.HH.HH>] DOT1X protocol can use.
zte(cfg-nas)#clear client {port <portlist>| vlan <vlanlist>} Deletes the client end user of
specified port/VLAN.
show client index <0-255> (all configuration modes) Displays the information of an
access user.
show client mac <HH.HH.HH.HH.HH.HH> (all configuration Displays access user information
modes) on the specified MAC address.
show client port <portlist> (all configuration modes) Displays access user information
on the specified port.
zte(cfg-nas)#aaa-control port <portlist> dot1x {enable | disable} Enables or disables port 802.1x
access authentication function.
zte(cfg-nas)#aaa-control port <portlist> protocol {pap | chap Sets the authentication mode of
| eap } the port.
5-80
Command Function
show aaa-control port [<portlist>] (all configuration modes) Displays port AAA configuration
information.
zte(cfg-nas)#radius isp <ispname> client <A.B.C.D> Sets RADIUS client end address.
zte(cfg-nas)#radius isp <ispname> sharedsecret <string> Sets the shared password of the
ISP domain (public key).
zte(cfg-nas)#radius isp <ispname> fullaccount {enable | disable} Sets or deletes the full account of
the domain.
zte(cfg-nas)#radius isp <ispname> defaultisp {enable | disable} This specifies a default domain.
5-81
Command Function
show radius [ispname <ispname>] (all configuration modes) Displays radius configuration
information.
5-82
l Configuration Procedure
1. Configure layer-3 interface commands
zte(cfg-router)#set ipport 0 ip 10.40.89.106/24
zte(cfg-router)#set ipport 0 vlan 1
zte(cfg-router)#set ipport 0 enable
2. Configure 802.1X commands
zte(cfg)#set port 2 security enable
zte(cfg)#config nas
zte(cfg-nas)#aaa-control port 2 dot1x enable
zte(cfg-nas)#aaa-control port 2 keepalive enable
zte(cfg-nas)#aaa-control port 2 accounting enable
3. Configure radius commands
zte(zte)#config nas
zte(cfg-nas)#radius isp zte enable
zte(cfg-nas)#radius isp zte defaultisp enable
zte(cfg-nas)#radius isp zte sharedsecret 1234
zte(cfg-nas)#radius isp zte client 10.40.89.106
zte(cfg-nas)#radius isp zte add accounting 10.40.89.78
zte(cfg-nas)#radius isp zte add authentication 10.40.89.78
4. Enable radius client software on the PC and input a correct username and
password. Then the authentication request is sent.
Note:
Disable the security proxy such as Sygate before the user PC sending the
authentication request.
l Configuration Verification
When the authentication request succeeds, view the user information by using the
show client command.
zte(cfg)#show client
MaxClients : 256 HistoryAccessClientsTotal : 1
OnlineClients: 1 HistoryFailureClientsTotal: 0
Flags:I-Index,Au-Authorized,P-PortId,US-UpSpeed,DS-DownSpeed,Y-yes,N-no
I UserName Au P Vlan MacAddress US DS ElapsedTime
--- ------------- -- ---- ---- ----------------- ------ ------ ------------
0 liushujie Y 2 1 00.19.e0.1a.97.dd 0 0 0:0:0:22
5-83
MAC authentication means that, with a MAC address segment configured on a device,
when the device detects that a MAC address belongs to the address segment, a switch
agent initiates authentication. The user's MAC address is used as a username and
password. If a RADIUS server returns a message indicating that the authentication
succeeded, the device can access the network.
Command Function
show aaa mac-authentication client (all configuration modes) Displays information of all MAC
authentication clients.
5-84
A QinQ does not need any protocol support. The simple Layer 2 Virtual Private Network
(L2VPN) can be realized through QinQ. The QinQ is especially suitable for the small-sized
LAN that takes the layer-3 switch as its backbone.
For the typical network of the QinQ technology, see Figure 5-25. The port connected to
the user network is called Customer port. The port connected to the ISP network is called
Uplink port. The edge access equipment of the ISP network is called Provider Edge (PE).
The user network is connected to the PE through the Trunk VLAN mode. The internal
Uplink ports of the ISP network are symmetrically connected through the Trunk VLAN
mode.
1. When a packet is sent form user network 1 to the customer port of switch A, because
the PORTBASE VLAN-based customer port does not identify the tag when receiving
the packet, the customer port processes the packet as an untagged packet no matter
whether this data packet is attached with the VLAN tag or not. The packet is forwarded
by the VLAN 10, which is determined by the PVID.
2. The uplink port of switch A inserts the outer tag (VLAN ID: 10) when forwarding the
data packet received from the customer port. The tpid of this tag can be configured
on the switch. Inside the ISP network, the packet is broadcast along the port of VLAN
10 until it reaches the switch B.
3. Switch B finds out that the port connected to user network 2 is a customer port. Thus, it
removes the outer tag in compliance with the conventional 802.1Q protocol to recover
the original packet and sends the packet to user network 2.
4. In this way, data between user network 1 and user network 2 can be transmitted
transparently. The VLAN ID of the user network can be planned regardless of the
conflict with the VLAN ID in the ISP network.
5-85
Configuring QinQ
The QinQ configuration includes the following commands:
Command Function
zte(cfg)#set vlan qinq customer port <portlist>{enable | disable} Adds or deletes a customer port.
zte(cfg)#set vlan qinq uplink port <portlist>{enable | disable} Adds or deletes an uplink port.
zte(cfg)#set vlan egress-tpid session <1-7> tpid-value Sets an egress TPID template.
<0xHHHH>
zte(cfg)#set port <portlist> egress-tpid {default | session <1-7>} Sets the binding between the port
and the template.
show vlan egress-tpid (all configuration modes) Displays the egress-tpid value of
each template.
zte(cfg)#set port <portlist> ingress-tpid session <sessionlist> Sets the binding between the port
and the template.
5-86
l Configuration Procedure
/*set qinq, the outer label is 100*/
zte(cfg)#set vlan 100 enable
zte(cfg)#set vlan 100 add port 1 untag
zte(cfg)#set vlan 100 add port 24 tag
zte(cfg)#set port 1 pvid 100
zte(cfg)#set vlan qinq customer port 1 enable
zte(cfg)#set vlan qinq uplink port 24 enable
zte(cfg)#set vlan 999 enable
zte(cfg)#config router
zte(cfg-router)#set ipport 1 ipaddress 192.168.0.1/24
zte(cfg-router)#set ipport 1 vlan 999
zte(cfg-router)#set ipport 1 enable
zte(cfg-router)#exit
5-87
Configuring SQinQ
The SQinQ configuration includes the following commands:
Command Function
show vlan sqinq (all configuration modes) Displays all SQinQ sessions.
show vlan sqinq session <1-400> (all configuration modes) Displays the specified SQinQ
session.
l Configuration Procedure
Configure the SVLAN instance.
zte(cfg)#set vlan 10,12 add port 1 tag
zte(cfg)#set vlan 997,998 add port 1 untag
zte(cfg)#set vlan 997,998 add port 2 tag
zte(cfg)#set vlan 10,12,997,998 enable
zte(cfg)#set vlan sqinq session 1 customer-port 1 customer-vlan 10 uplink-vlan 997
zte(cfg)#set vlan sqinq session 2 customer-port 1 customer-vlan 12 uplink-vlan 998
l Configuration Verification
The following example shows how to show the SVLAN instance.
5-88
Session number : 2
Customer Port : 1
Customer Vlan List : 12
Uplink Vlan : 998
Configuring a VLAN
The VLAN configuration includes the following commands:
Command Function
zte(cfg)#set vlan <vlanlist> add port <portlist>[untag | tag] Adds a port to a VLAN and
configures the location in the
VLAN.
zte(cfg)#set vlan <vlanlist> delete port <portlist> Deletes the port from a VLAN.
5-89
Command Function
zte(cfg)#set vlan <vlanlist> add trunk <trunklist>[tag | untag] Adds a trunk to a VLAN and
configures the trunk location in the
VLAN.
zte(cfg)#set vlan <vlanlist> delete trunk <trunklist> Deletes a trunk from a VLAN.
zte(cfg)#set port <portlist> protocol-vlan {enable | disable} Enables or disables the protocol
VLAN function.
show vlan [<vlanlist>] (all configuration modes) Displays the basic VLAN
information.
show vlan protocol-mapping (all configuration modes) Displays the VLAN configuration
of the protocol.
Note:
By default, VLAN1 is enabled, all ports are in VLAN1 and in untag mode.
l Configuration Procedure
zte(cfg)#set vlan 100 add port 1, 2 untag
zte(cfg)#set vlan 100 add port 7, 8 tag
zte(cfg)#set port 1, 2 pvid 100
zte(cfg)#set vlan 100 enable
l Configuration Verification
zte(cfg)#show vlan 100
VlanId : 100 VlanStatus: enabled
VlanName:
VlanMode: Static
Tagged ports : 7-8
5-90
l Configuration Procedure
1. Configuration of switch A
zte(cfg)#set vlan 2 add port 16 tag
zte(cfg)#set vlan 2 add port 1 untag
zte(cfg)#set vlan 3 add port 16 tag
zte(cfg)#set vlan 3 add port 3 untag
zte(cfg)#set port 1 pvid 2
zte(cfg)#set port 3 pvid 3
zte(cfg)#set vlan 2-3 enable
2. Configuration of switch B
zte(cfg)#set vlan 2 add port 16 tag
zte(cfg)#set vlan 2 add port 2 untag
zte(cfg)#set vlan 3 add port 16 tag
zte(cfg)#set vlan 3 add port 4 untag
zte(cfg)#set port 2 pvid 2
zte(cfg)#set port 4 pvid 3
zte(cfg)#set vlan 2-3 enable
5-91
5-92
Mapping Modes:
Uplink: replace the CVLAN with SVLAN based on "Interface+customer VLAN".
Downlink: replace the SVLAN in the outermost layer with CVLAN based on "SVLAN +
Destination MAC address".
The whole system supports 400 sessions, and up to 400 CVLANs can be supported.
5-93
Command Function
zte(cfg)#set vlan mapping session <session_id> customer-port Sets the VLAN Mapping function.
<port-id> customer-vlan <vlan-list> uplink-vlan <vlan-id> When the VLAN Mapping is
enabled, the uplink traffic is
normally forwarded in SPVLAN.
The downlink traffic is normally
forwarded in SPVLAN. When
reaching the user port, it is
transformed to the corresponding
CVLAN tag.
zte(cfg)#clear vlan mapping user session <1-400> Deletes the user information of the
specified VLAN Mapping session.
show vlan mapping (all configuration modes) Displays all VLAN Mapping
sessions.
show vlan mapping session <1-400> (all configuration modes) Displays the specified VLAN
Mapping session.
show vlan mapping user-table (all configuration modes) Displays the user information of all
VLAN Mapping sessions.
show vlan mapping user-table session <1-400> (all configuration Displays the user information
modes) of the specified VLAN Mapping
session.
5-94
Switch1 and Switch2 are configured in the same way. Use Switch1 as an example.
l Configuration Procedure
The following example shows how to configure the VLAN Mapping instance.
5-95
The Syslog protocol can classify the log information into eight levels from the highest to
the lowest level of importance. For a description of the levels, refer to Table 5-2.
Configuring Syslog
The Syslog configuration includes the following commands:
Command Function
zte(cfg)#set syslog module {all | arp-inspection | commandlog | Enables or disables the syslog
dhcp| radius | AAA}{enable | disable} module.
zte(cfg)#set syslog level {emergencies | alerts | critical | errors | Defines the syslog information
warnings | notifications | informational | debugging } level.
zte(cfg)#set syslog add server <1-5 > ipaddress Sets the syslog server.
<A.B.C.D>[name <name>][<0-65535>]
show syslog status (all configuration modes) Displays the syslog configuration.
5-96
Configuring NTP
The NTP configuration includes the following commands:
Command Function
zte(cfg)#set ntp add authentication-key <1-255> md5 <string> Sets the NTP authentication key.
zte(cfg)#set ntp {add | delete} trusted-key <1-255> Adds or deletes the NTP trusted
key.
zte(cfg)#set ntp server <A.B.C.D>[version <1,2,3>| key Sets the NTP server.
<1-255>]
zte(cfg)#set ntp second-server <A.B.C.D>[version <1,2,3>| key Sets the NTP second server.
<1-255>]
5-97
Command Function
zte(cfg)#set ntp src-udp-port {123 | 1000} Sets the ID of the udp port through
which NTP messages are sent.
l Configuration Procedure
zte(cfg)#set ntp server 202.10.10.10
zte(cfg)#set ntp second-server 201.10.10.10
zte(cfg)#set ntp enable
l Configuration Verification
zte(cfg)#show ntp
ntp protocol is enable
ntp server address : 202.10.10.10
ntp source address : None
ntp source udp port : 1000
ntp is_synchronized for second server : Yes
ntp rcv stratum : 16
no reference clock.
ntp time zone : 0
In the displayed information, "ntp is_synchronized for second server" means the
current switch time is synchronized with that of the server 2.
5-98
information dynamically including the current VLAN on this switch and the ports in
this VLAN. All switches supporting GVRP can broadcast the local VLAN registration
information to other switches, so that, the VLAN configurations of all devices with the
GVRP in the same switching network have a consistent interworking according to the
demand.
Configuring GARP/GVRP
The GARP/GVRP configuration includes the following commands:
Command Function
zte(cfg)#set garp timer {hold | join | leave | learvall}<timer_value> Sets various GARP timers.
zte(cfg)#set gvrp {port <portlist>| trunk <trunklist>}{enable | Enables or disables GVRP on the
disable} port/trunk.
zte(cfg)#set gvrp {port <portlist>| trunk <trunklist>} registration Sets GVRP registration type on
{normal | fixed | forbidden} Trunk port.
l Configuration Procedure
1. Configuration of switch A:
zte(cfg)#set garp enable
zte(cfg)#set gvrp enable
zte(cfg)#set gvrp port 1 enable
zte(cfg)#set vlan 10-20 enable
zte(cfg)#set vlan 10-20 add port 1
2. Configuration of switch B:
5-99
Note:
1. The GARP function must be enabled first before the GVRP function is enabled.
2. Enabling GVRP can enable up to 512 vlans.
3. Timer of Garp uses the default value. If it is modified, the value must be the same
as the one configured in the network.
4. Gvrp port registration type uses default Normal value. If it is modified to other
types, vlan learning cannot be implemented.
l Configuration Verification
SwitchA(cfg)#show garp /*View GARP configuration*/
GARP is enabled!
GARP Timers:
Hold Timeout :100 milliseconds
Join Timeout :200 milliseconds
Leave Timeout :600 milliseconds
LeaveAll Timeout :10000 milliseconds
5-100
SwitchB(cfg)#show vlan 10
VlanId : 10 VlanStatus: enabled
VlanName:
VlanMode: Dynamic
Tagged ports :1
Untagged ports :
Forbidden ports :
The DHCP snooping function prevents bogus DHCP servers from being deployed in the
network, and in this case, the port connecting to DHCP server must be set to a trusted
port. Besides, the dynamic ARP inspection technology can be used together to prevent
illegal IP and MAC address binding, thus ensuring normal assignment of IP addresses
by the DHCP server. DHCP Snooping and Option82 are designed to solve these safety
problems. DHCP Snooping, namely DHCP packet filtering, is to detect legality of DHCP
packets based on some special rules and filter illegal packets. Use Option82 technique to
provide more additional information, and then strengthen the network safety ability.
In the DHCP service system, the ZXR10 2900E series switches are provided with a lot of
automatically deployed functions. For details, refer to Downloading the Software Version
Automatically.
Configuring DHCP
The DHCP configuration includes the following commands:
Command Function
zte(cfg)#set dhcp snooping {add | delete}{port <portlist>| trunk Enables or disables the DHCP
<trunklist>} Snooping function based on the
port/trunk.
zte(cfg)#set dhcp port <portlist>{server | cascade | client} Sets DHCP attribute of the port.
zte(cfg)#set dhcp ip-source-guard {{add | delete} port <portlist>| Enables or disables port
quota <0-400>} ip-source-guard function.
5-101
Command Function
zte(cfg)#set dhcp snooping bind-entry mac <HH.HH.HH.HH.HH Adds static user information
.HH> ip <A.B.C.D> vlan <1-4094> port <1-28> binding entry.
zte(cfg)#set dhcp snooping bind-entry mode port <portlist>{hold Sets the binding mode of the
| drop} dynamic user information binding
entry on the port.
zte(cfg)#set dhcp option82 {add | delete}{port <portlist>| trunk Enables or disables DHCP
<trunklist>} Option82 function based on the
port/trunk.
zte(cfg)#set dhcp option82 sub-option device { ani< string >| Configures the device information
remote-ID {cisco | key < string >| manual < string >}} of Switch.
zte(cfg)#set dhcp option82 sub-option port < portlist >{circuit-ID Sets option82 sub-option.
{on {cisco | china-tel | dsl-forum| henan-rtf | key <string>| manual
<string>}| off}| subscriber-ID {on <string>| off}| reserve {on tag
<1-255> value <string>| off}}
zte(cfg)#set dhcp option82 sub-option port <portlist> format Sets the format of the option82
{ascii| hex} sub-option to ASCII or hex.
zte(cfg)#set dhcp option82 sub-option sysname <string> Sets the sysname of the option82
sub-option.
zte(cfg)#set dhcp option82 mode port <portlist>{default | drop | Sets the binding mode of the
modify | append} dynamic user binding entry on the
port.
zte(cfg)#clear dhcp option82 sub-option sysname Deletes the sysname of the device.
show dhcp snooping (all configuration modes) Displays DHCP snooping global
configuration information.
show dhcp snooping binding[port <1-28>] (all configuration Displays DHCP snooping entry
modes) information.
5-102
Command Function
show dhcp option82 port (all configuration modes) Displays the configuration
information of DHCP option82.
show dhcp option82 device (all configuration modes) Displays the configuration
information of the device.
zte(cfg)#set dhcp client broadcast-flag {enable | disable} Sets whether the packet that
DHCP server returns is a
broadcast packet.
show dhcp client (all configuration modes) Displays DHCP client configuration
information.
zte(cfg-router)#set ipport <0-63> dhcp client {class-id Sets available messages when
{characters <string>| hex-numbers <hex-string>}| client-id mac | the DHCP client interacts with the
hostname <string>| lease {<0-365><0-23><0-59>| infinite}} server.
zte(cfg-router)#set ipport <0-63> dhcp client request Sets message type sent by the
{dns-server | domain-name | route | static-route | tftp-server-name} server when the DHCP client
interacts with the server.
zte(cfg-router)#clear ipport < 0-63> dhcp client { class-id | Clears DHCP client optional
client-id | hostname | lease } sending information configuration.
zte(cfg-router)#clear ipport <0-63> dhcp client request Clears the configuration requesting
{dns-server | domain-name | route | static-route | tftp-server-name} DHCP server to return various
information.
zte(cfg)#set dhcp snooping bind-entry database read Reads DHCP binding entry from
the Flash memory.
zte(cfg)#set dhcp snooping bind-entry database recovery{ Recovers binding entry from the
disable | enable } Flash memory after restarted.
zte(cfg)#set dhcp snooping bind-entry database time-write Writes DHCP binding entry into
{disable | enable | time <30-65535>} the Flash memory at regular time.
zte(cfg)#set dhcp snooping bind-entry database write Writes DHCP binding entry into
the Flash memory.
show dhcp snooping database (all configuration modes) Displays configuration related to
DHCP database.
5-103
Command Function
l Configuration Procedure
zte(cfg)#set dhcp snooping-and-option82 enable
zte(cfg)#set dhcp snooping add port 49,50
zte(cfg)#set dhcp port 49 client
5-104
zte(cfg)#show dhcp
DHCP download flag is disabled, config file is found.
DHCP download will not startup, when system reboot.
DHCP config file(option-67) *.dat will be translated to ZXR10_2952E.dat.
DHCP snooping-and-option82 is enabled.
PortId PortType Snooping Option82
------ -------- -------- --------
49 Client Enabled Enabled
50 Server Enabled Enabled
51 Client Disabled Disabled
52 Client Disabled Disabled
DHCP client is disabled.
The PC can get an IP address from the specified DHCP server. See Figure 5-33.
5-105
l Configuration Procedure
zte(cfg)#set dhcp client enable
zte(cfg)#set vlan 10 add port 49 untag
zte(cfg)#set vlan 10 enable
zte(cfg)#set port 49 pvid 10
zte(cfg)#config router
zte(cfg-router)#set ipport 0 vlan 10
zte(cfg-router)#set ipport 0 ipaddress dhcp
zte(cfg-router)#set ipport 0 enable
l Configuration Verification
zte(cfg-router)#show ipport
IpPort Status IpAddress Mask MacAddress VlanId IpMode
------ ------ ---------- ------------ ----------------- ------ ------
0 up 100.1.1.5 255.255.0.0 00.00.00.00.00.02 10 dhcp
5-106
Configuring DHCPv6
The DHCPv6 configuration includes the following commands:
Command Function
zte(cfg)#set dhcpv6 snooping {add | delete} port <portlist> Enables or disables the DHCPv6
snooping function on a port.
zte(cfg)#set dhcpv6 port <portlist>{server | cascade | client} Sets the attribute of a port in the
DHCPv6 snooping function.
zte(cfg)#set dhcpv6 option18 {add | delete} port <portlist> Enables or disables the DHCPv6
Option18 function on a port.
zte(cfg)#set dhcpv6 option37{add | delete} port <portlist> Enables or disables the DHCPv6
Option37 function on a port.
zte(cfg)#set dhcpv6 option82 {add | delete} port <portlist> Enables or disables the DHCPv6
Option18 function on a port.
zte(cfg)#set dhcpv6 option82 sub-option port < portlist Sets the sub-option port for
>{circuit-ID {on {cisco | china-tel | dsl-forum|key <string>}| off}| Option82 function.
subscriber-ID {on <string>| off}| reserve {on tag <1-255> value
<string>| off}}
show dhcpv6 snooping (all configuration modes) Displays global DHCPv6 snooping
configuration information.
5-107
Command Function
show dhcpv6 snooping binding (all configuration modes) Displays information about
DHCPv6 snooping entries.
show dhcpv6 snooping [port <1-28>] (all configuration modes) Displays DHCPv6 snooping
entities.
show dhcpv6 option82 port (all configuration modes) Displays DHCPv6 Option82
configuration information on ports.
show dhcpv6 option82 ani (all configuration modes) Displays device identifiers.
l Configuration Procedure
zte(cfg)#set dhcpv6 snooping enable
zte(cfg)#set dhcpv6 snooping add port 49,50
zte(cfg)#set dhcpv6 port 49 client
zte(cfg)#set dhcpv6 port 50 server
zte(cfg)#set dhcpv6 ip-source-guard add port 49
zte(cfg)#set dhcpv6 option82 enable
5-108
Note:
Only trust ports can receive VBAS packets and VBAS response packets only can be sent
from trust ports.
Port connecting to user network is called cascade port and port connecting to BAS server
is called trust port. For the typical network of VBAS, see Figure 5-35.
5-109
Configuring VBAS
The VBAS configuration includes the following commands:
Command Function
l Configuration Procedure
1. Configuration of switch A:
5-110
Check switch B
zte(cfg)#show vbas
vbas: enabled
trust port : 1
cascade port : none
Configuring PPPoE-PLUS
The configuration of PPPoE-PLUS (PPPoE+) includes the following contents:
Command Function
5-111
Command Function
show pppoe-plus port <1-28> (all configuration modes) Displays port rid configuration.
zte(cfg)#set pppoe-plus mode port <portlist>{default | drop | Sets the mode for dynamic user
modify } information processing at the port.
Configure the user information format of switch A as DSL forum format. See Figure
5-37.
l Configuration Procedure
Configure switch A
zte(cfg)#set pppoe-plus enable
zte(cfg)#set pppoe-plus tag-format port 1 dsl-forum
l Configuration Verification
zte(cfg)#show pppoe-plus
PPPoE plus is enabled.
5-112
Name Description
ZESR Domain and A ZESR domain consists of a control VLAN and a protection instance.
ZESR Node The device that is configured with ZESR is called a ZESR node. All ZESR
nodes in the same ZESR domain must be configured with the same control
VLAN and protection instance.
Control VLAN The control VLAN of a ZESR domain forwards ZESR protocol packets. A
control VLAN is required for a ZESR domain.
Protection Instance An instance in MSTP is used as the protection instance of a ZESR domain.
and Service VLAN The VLAN in a protection instance (that is, service VLAN) is used for service
data transmission.
Major ZESR Ring A ZESR domain supports ring-based hierarchy with three levels, including
and Secondary major-level, level 1, and level 2. Among them, major-level is the highest level
ZESR Ring and level 2 is the lowest level.
A ring with major-level is called a primary ring, while a ring with level 1 or level
2 is called a secondary ring.
ZESR Ring State There are two states for a ZESR ring: UP and DOWN.
l UP indicates that each link in a ring operates properly.
l DOWN indicates that there is one or more disconnected links in a ring.
ZESR Node Role A ZESR node can act as a master node, a transit node, an edge control node,
or an edge assistant node.
l A master node implements the control function and transmits data in a ring.
l A transit node transmits data in a ring.
l An edge control node implements the control function and transmits data
in a secondary ring.
l An edge assistant node transmits data in a secondary ring.
Primary Port and When a device is configured as a master node or a transit node, two ports need
Secondary Port to be designated for it, that is, a primary port and a secondary port. The primary
port and secondary port of a transit node have the same functions, while the
primary port and secondary port of a master node have the following differences:
l When a ring is in UP state, the primary port of a master node is in
Forwarding state, and the secondary port is in Blocking state to block
logical loops.
l When a ring is in DOWN state, ZESR rapidly transits the secondary port
of a master node from Blocking state to Forwarding state to switch the
logical path quickly.
Boundary Port When a device is configured as an edge control node or an edge assistant
node, one port needs to be designated for it, that is, a boundary port.
5-113
Figure 5-38 Diagram of the Master Node Blocking its Secondary Port When the Ring
is in UP State
5-114
Figure 5-39 Diagram of the Master Node Opening its Secondary Port When the Ring
is in DOWN State
As shown in Figure 5-38, all links operate properly, the ring is in UP state, the secondary
port of the master node is blocked, and traffic needs to go through switch C and switch D.
As shown in Figure 5-39, the link between switch B and switch C is disconnected, the ring
state is changed to DOWN, ZESR rapidly transits the secondary port of the master node
to Forwarding state, and traffic is switched quickly to switch A without going through switch
C and switch D.
When the link between switch B and switch C recovers from disconnection, the secondary
port of the master node is blocked again, the ring is switched to UP state, and the entire
ZESR region returns to the state shown in Figure 5-38.
5-115
Configuring ZESR
The ZESR configuration includes the following commands:
5-116
3 ZXR10(config)#set zesr ctrl-vlan <1-4094> Configures the preforward time and the
major-level preforward <10-600>[preup < preup time for a node on the primary
0-500>] ring.
The default value for the preforward time
is 10 seconds, and the default value for
the preup time is 0 second.
The configuration of the preforward time
and the preup time is required to satisfy
the following condition: preforward >
preup + link recovery time (10 seconds).
ZXR10(config)#set zesr ctrl-vlan <1-4094> level Configures the preforward time and the
<1-2> seg <1-10> preforward <10-600>[ preup preup time for a node on a secondary
<0-500>] ring.
l The preforward time: takes effect
during link failure recovery. During
the failure recovery, the faulty port
still remains blocked for some
time for the master node to block
the secondary port first to avoid
temporary loops.
After the master node blocks
the secondary port, it will inform
the node where the faulty port is
located to unblock the faulty port
immediately. If the node where
the faulty port is located does not
receive any notification from the
master node, the faulty port will
unblock itself when the preforward
time expires.
l The preup time: takes effect during
link failure recovery. During the
failure recovery, the master node
waits for the preup time before it
blocks the secondary port again,
to prevent the ring state from
repeatedly switching due to the
instability of the link state during the
failure recovery.
5-117
5-118
6 ZXR10(config)#set zesr restart-time <30-600> Configures the ZESR restart time (s).
Default: 120.
Restart-time: the ZESR initialization
time during the device startup. During
this period, all ports in the ZESR ring are
in Blocking state.
5-119
l Switch E is the master node of the secondary ring with port 1/1 as its primary port and
port 1/2 as its secondary port.
l Switch F is the transit node of the secondary ring. Switches A and B are the edge
assistant nodes of the secondary ring.
Configurations on switch A:
/*Run the following commands to configure the spanning tree instance.*/
Switch_A(config)#set stp enable
Switch_A(config)#set stp forceversion mstp
Switch_A(config)#set stp instance 1 add vlan 100-110
/*Run the following command to configure the ZESR domain with VLAN 4000 as
the control VLAN and protection instance 1 as the protection instance.*/
Switch_A(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch A as the master node of the
primary ring with Smartgroup1 as its primary port and port 1/2 as its
secondary port.*/
Switch_A(config)#set zesr ctrl-vlan 4000 major-level role master
primary-trunk 1 secondary-port 1/2
5-120
Configurations on switch B:
/*Run the following commands to configure the spanning tree instance.*/
Switch_B(config)#set stp enable
Switch_B(config)#set stp forceversion mstp
Switch_B(config)#set stp instance 1 add vlan 100-110
/*Run the following command to configure the ZESR domain with VLAN 4000 as
the control VLAN and protection instance 1 as the protection instance.*/
Switch_B(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch B as the transit node of the
primary ring with port 1/1 as its primary port and port 1/2 as its
secondary port.*/
Switch_B(config)#set zesr ctrl-vlan 4000 major-level role transit
primary-port 1/1 secondary-port 1/2
Configurations on switch C:
/*Run the following commands to configure the spanning tree instance.*/
Switch_C(config)#set stp enable
Switch_C(config)#set stp forceversion mstp
Switch_C(config)#set stp instance 1 add vlan 100-110
/*Run the following command to configure the ZESR domain with VLAN 4000 as
the control VLAN and protection instance 1 as the protection instance.*/
Switch_C(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch C as the transit node of the
primary ring with port 1/1 as its primary port and port 1/2 as its
secondary port.*/
Switch_C(config)#set zesr ctrl-vlan 4000 major-level role transit
primary-port 1/1 secondary-port 1/2
Configurations on switch D:
/*Run the following commands to configure the spanning tree instance.*/
Switch_D(config)#set stp enable
Switch_D(config)#set stp forceversion mstp
Switch_D(config)#set stp instance 1 add vlan 100-110t
/*Run the following command to configure the ZESR domain with VLAN 4000 as
the control VLAN and protection instance 1 as the protection instance.*/
Switch_D(config)#set zesr ctrl-vlan 4000 protect-instance
5-121
/*Run the following command to configure switch D as the transit node of the
primary ring with Trunk1 as its primary port and port 1/2 as its secondary port.*/
Switch_D(config)#set zesr ctrl-vlan 4000 major-level role transit
primary-trunk 1 secondary-port 1/2
Configurations on switch E:
/*Run the following commands to configure the spanning tree instance.*/
Switch_E(config)#set stp enable
Switch_E(config)#set stp forceversion mstp
Switch_E(config)#set stp instance 1 add vlan 100-110
/*Run the following command to configure the ZESR domain with VLAN 4000 as
the control VLAN and protection instance 1 as the protection instance.*/
Switch_E(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch E as the master node of the
secondary ring Level1Seg1 with port 1/1 as its primary port and port 1/2
as its secondary port.*/
Switch_E(config)#set zesr ctrl-vlan 4000 level 1 seg 1 role master
primary-port 1/1 secondary-port 1/2
Configurations on switch F:
/*Run the following commands to configure the spanning tree instance.*/
Switch_F(config)#set stp enable
Switch_F(config)#set stp forceversion mstp
Switch_F(config)#set stp instance 1 add vlan 100-11
/*Run the following command to configure the ZESR domain with VLAN 4000 as
the control VLAN and protection instance 1 as the protection instance.*/
Switch_F(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch F as the transit node of the
secondary ring Level1Seg1 with port 1/1 as its primary port and port 1/2
as its secondary port.*/
Switch_F(config)#set zesr ctrl-vlan 4000 level 1 seg 1 role transit
primary-port 1/1 secondary-port 1/2
5-122
l Switch A is the master node in ZESR domain 1 with port 1/1 as its primary port and
port 1/2 as its secondary port. Switch A is also the master node in ZESR domain 2
with port 1/2 as its primary port and port 1/1 as its secondary port.
l Switches B to D are the transit nodes in both ZESR domains.
Note:
When multiple ZESR domains are configured on a physical ring, service data traffic in
different ZESR domains can be planned to go through different paths by proper settings
to achieve load balancing.
Configurations on switch A:
/*Run the following commands to configure the spanning tree instance.*/
Switch_A(config)#set stp enable
Switch_A(config)#set stp forceversion mstp
Switch_A(config)#set stp instance 1 add vlan 100-110
Switch_A(config)#set stp instance 2 add vlan 200-210
/*Run the following command to configure node roles, that is, switch A
is the master node in ZESR domain 1 with port 1/1 as its primary port
and port 1/2 as its secondary port.*/
Switch_A(config)#set zesr ctrl-vlan 4000 major-level role master
5-123
/*Run the following command to configure node roles, that is, switch A
is the master node in ZESR domain 2 with port 1/2 as its primary port
and port 1/1 as its secondary port.*/
Switch_A(config)#set zesr ctrl-vlan 4001 major-level role master
primary-port 1/2 secondary-port 1/1
Configurations on switch B:
/*Run the following commands to configure the spanning tree instance.*/
Switch_B(config)#set stp enable
Switch_B(config)#set stp forceversion mstp
Switch_B(config)#set stp instance 1 add vlan 100-110
Switch_B(config)#set stp instance 2 add vlan 200-210
/*Run the following command to configure node roles, that is, switch B
is the transit node in ZESR domain 1 with port 1/1 as its primary port
and port 1/2 as its secondary port.*/
Switch_B(config)#zesr ctrl-vlan 4000 major-level role transit
primary-port 1/1 secondary-port 1/2
/*Run the following command to configure node roles, that is, switch B
is the transit node in ZESR domain 2 with port 1/1 as its primary port
and port 1/2 as its secondary port.*/
Switch_B(config)#zesr ctrl-vlan 4001 major-level role transit
primary-port 1/1 secondary-port 1/2
5-124
l In order for switch C and the top network to perceive the topology change of the
underlying network, port 1/1 of switch A and port 1/1 of switch B are enabled with the
TCN packet sending function to notify the network topology change upwards.
Configurations on switch A:
/*Run the following commands to configure the spanning tree instance.*/
Switch_A(config)#set stp enable
Switch_A(config)#set stp forceversion mstp
Switch_A(config)#set stp instance 1 add vlan 100-110
/*Run the following command to configure the ZESR domain with VLAN 4000
as the control VLAN and protection instance 1 as the protection instance.*/
Switch_A(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch A as the master node of the
primary ring with port 1/2 as its primary port and port 1/1 as its
secondary port.*/
Switch_A(config)#set zesr ctrl-vlan 4000 major-level role zess-master
primary-port 1/2 secondary-port 1/1
/*Run the following commands to enable the TCN packet sending function
on port 1/1.*/
Switch_A(config)#set zesr tcn-sending port 1/1 enable
Configurations on switch B:
/*Run the following commands to configure the spanning tree instance.*/
Switch_B(config)#set stp enable
Switch_B(config)#set stp forceversion mstp
Switch_B(config)#set stp instance 1 add vlan 100-11
5-125
/*Run the following command to configure the ZESR domain with VLAN 4000
as the control VLAN and protection instance 1 as the protection instance.*/
Switch_B(config)#set zesr ctrl-vlan 4000 protect-instance 1
/*Run the following command to configure switch B as the transit node of the
primary ring with port 1/1 as its primary port and port 1/2 as its
secondary port.*/
Switch_B(config)#set zesr ctrl-vlan 4000 major-level role zess-transit
primary-port 1/1 secondary-port 1/2
/*Run the following commands to enable the TCN packet sending function
on port 1/1.*/
Switch_B(config)#set zesr tcn-sending port 1/1 enable
Configurations on switch C:
/*Run the following commands to configure the spanning tree
instance: the configuration commands from vendors differ.
Refer to the user guides published by respective vendors.*/
Switch_C(config)#set stp enable
Switch_C(config)#set stp forceversion mstp
Switch_C(config)#set stp instance 1 add vlan 100-110
Name Description
ZESS Domain A ZESS domain consists of a control VLAN and a protection instance.
There are two states for a ZESS domain:
l UP indicates that each link in a ZESS domain operates properly.
l DOWN indicates that at least one link in a ZESS domain is disconnected.
ZESS Node A device that is configured with a ZESS domain is called a ZESS node.
5-126
Name Description
Control VLAN The control VLAN of a ZESS domain forwards ZESS protocol packets (Flush
packets).
A Flush packet is sent from a ZESS node during ZESS link switching to inform
the relevant devices to refresh the MAC address table. The control VLAN is not
required for a ZESS domain. If the control VLAN is not configured, no Flush
packets will be sent during ZESS link switching.
Primary/Sec- When a device is configured with a ZESS domain, the primary port and the
ondary Port and secondary port are designated to it. The link where the primary port is located is
Primary/Sec- called the primary link and the link where the secondary port is located is called
ondary Link the secondary link. Both links can back up each other.
Reversal Mode In the condition that the primary link is disconnected and the secondary link is in
and Non-Reversal use for data transmission, if the primary link recovers from disconnection, there
Mode are two modes of processing: reversal mode and non-reversal mode.
l In reversal mode, ZESS switches data traffic to the primary link and blocks
the secondary link.
l In non-reversal mode, ZESS continues to use the secondary link for data
transmission and blocks the primary link.
5-127
Note:
In reversal mode, when the primary link recovers from disconnection, the link is not
switched immediately but after a period of the preup time.
Configuring ZESS
The ZESS configuration includes the following commands:
5-128
2 ZXR10(config)#set zess domain <1-4> mode Configures the ZESS switching mode. The
{revertive | non_revertive} default value is reversal mode.
Here are two ZESS switching modes:
l Revertive: reversal mode.
l Non_revertive: non-reversal mode.
4 ZXR10(config)#set zess domain < 1-4> Configures the preup time (s). Default: 5.
preup <1-600> The preup time is used in reversal mode.
In the condition that the primary link is
disconnected and the secondary link is in
use for data forwarding, if the primary link
recovers from disconnection, ZESS does
not switch the data traffic to the primary
link immediately. It waits for the preup
time before it implements the switching, to
prevent the switching from occurring when
the primary link recovery is still unstable.
Switch A is configured with two ZESS domains. To achieve load balancing, the primary
and secondary ports of one domain operate as the secondary and primary ports of the
other domain, respectively.
l In ZESS domain 1, the control VLAN is VLAN4000, the protection instance is instance
1, the primary port is port_1/1 and the secondary port is port_1/2.
l In ZESS domain 2, the control VLAN is VLAN4001, the protection instance is instance
2, the primary port is port_1/2 and the secondary port is port_1/1.
The capability of receiving Flush packets from the control VLANs VLAN4000 and
VLAN4001 is enabled on relevant ports of switch B and switch C.
5-129
Configurations on switch A:
/*Run the following commands to configure a protection instance.*/
Switch_A(config)#set stp enable
Switch_A(config)#set stp instance 1 add vlan 100-110
Configurations on switch B:
/*Run the following commands to configure a protection instance.*/
Switch_B(config)#set stp enable
Switch_B(config)#set stp instance 1 add vlan 100-110
Configurations on switch C:
/*Run the following commands to configure a protection instance.*/
Switch_C(config)#set stp enable
Switch_C(config)#set stp instance 1 add vlan 100-110
5-130
IEEE 802.3ah operations, administration and maintenance standard is the formal standard,
which aims at the management of link level. It monitors and troubleshoots the point to
point (virtual point to point) Ethernet link. It has the important meaning for connection
management of Last One Mile. The faults take place constantly on Last One Mile.
The ZXR10 2900E series switch supports IEEE 802.3ah.
Ethernet OAM Main Function
l OAM Discovery Function: After enabling Ethernet OAM function, the ZXR10 2900E
series switch can detect the remote DTE device which has OAM function. After
coordinating with the peer OAM, enter normal Ethernet OAM interaction process .
l Remote Link Event Alarm: OAM function inspects the events of remote link, and
adopts the corresponding responding methods. When the fault takes place on remote
link, OAM defines the event and announces it to remote OAM client. The detailed
events announcement packet is also provided.
OAM defines the following link events.
1. Link Failure: The physical layer locates the failure that take place on receiving
direction of local DTE.
2. Emergency Failure: The local failure event has happened, and this failure cannot
be recovered.
3. Emergency Events: The un-defined emergency event happens.
l OAM Remote Loopback: The ZXR10 2900E series switch provides optional data link
layer frame level loopback mode by OAM function. OAM remote loopback is used to
locate failure and examine the link performance. When remote DTE is on the OAM
remote loopback mode, the statistic data of local and remote DTE can be inquired and
compared at any time. OAM loopback frame can be analyzed to obtain the additional
information of link health (frame discard due to the link failure).
l Link Monitoring: The ZXR10 2900E series switch monitors and examines the link
state, and announces the specified frame events by OAM function. The specified
5-131
frame events can be classified into four types: error symbol period event, error
frame event and error frame period event, error frame-second statistic event. After
inspecting the error, OAM will respond and alarm the peer device by announcement
mechanism.
The link monitoring events are classified into four types: error symbol monitor event, error
frame monitor event, error frame-period monitor event and error frame-second statistic
monitor event. When the link monitoring information is viewed, the related error symbol,
the statistic of error frame and the statistic of local and peer link events will be shown on
each event.
Configuring OAM
The OAM configuration includes the following commands:
Command Function
zte(cfg)#set ethernet-oam port <portlist> period <1-10> Sets the OAM period, timeout time
timeout <2-20> mode {active | passive} and mode of the port.
zte(cfg)#set ethernet-oam port <portlist> link-monitor {enable | Enables or disables link monitor
disable} function.
zte(cfg)#set ethernet-oam port <portlist> link-monitor Sets the symbol period event
symbol-period threshold <1-65535> window <1-65535> which is used for link monitor.
zte(cfg)#set ethernet-oam port <portlist> link-monitor frame Sets the error frame.
threshold <1-65535> window <1-60>
zte(cfg)#set ethernet-oam port <portlist> link-monitor Sets the period of error frame.
frame-period threshold <1-65535> window <1-600000>
5-132
Command Function
show ethernet-oam port (all configuration modes) Displays OAM port summary
information.
show ethernet-oam port <portlist> discovery (all configuration Displays port OAM discovery
modes) state.
show ethernet-oam port <portlist> statistics (all configuration Displays port OAM statistics
modes) information.
show ethernet-oam port <portlist> link-monitor (all configuration Displays port OAM link event
modes) configuration and state.
l Configuration Procedure
1. Configuration of switch A:
zte(cfg)#set ethernet-oam en
zte(cfg)#set ethernet-oam port 1 en
2. Configuration of switch B:
zte(cfg)#set ethernet-oam enable
zte(cfg)#set ethernet-oam port 2 enable
zte(cfg)#show Ethernet-oam port 2 discovery
PortId 2: ethernet oam enabled
Local DTE /*the local device information*/
-----------
Config:
Mode : active
/*the port mode must be active, or the discovery is failure*/
Period : 10*100(ms)
Link TimeOut : 5(s)
Unidirection : nonsupport
5-133
5-134
Disconnect the network cable between switches, the following information appears.
SAT JUL 03 23:33:00 2004 ETH-OAM port 2 deteced
a fault in the local receive direction.
5-135
l Configuration Procedure
1. Configuration of switch A:
zte(cfg)#set ethernet-oam enable
zte(cfg)#set ethernet-oam port 2 enable
2. Configuration of switch B:
zte(cfg)#set ethernet-oam enable
zte(cfg)#set ethernet-oam port 1 enable
zte(cfg)#set ethernet-oam port 1 link-monitor enable
zte(cfg)#set ethernet-oam port 1 lin symbol-period threshold 10 window 10
zte(cfg)#set ethernet-oam port 1 lin frame threshold 10 window 20
zte(cfg)#set ethernet-oam port 1 link-monitor frame-period threshold 5
window 1000
zte(cfg)#set ethernet-oam port 1 link-monitor frame-seconds threshold 10
window 30
zte(cfg)#show eth port 1 link-monitor
Link Monitoring of Port: 1 enabled
Errored Symbol Period Event:
Symbol Window : 10(million symbols)
Errored Symbol Threshold : 10
Total Errored Symbols : 0
Local Total Errored Events : 0
Remote Total Errored Events : 0
5-136
Command Function
zte(cfg)#set sflow {ingress | egress} reload-mode { continue | cpu} Sets the reloading mode on an
sFlow ingress or egress.
zte(cfg)#set sflow ingress sample-mode {all | forward} Sets the sampling mode on an
sFlow ingress or egress.
zte(cfg)#set sflow {ingress | egress} port <portlist> packet-sample Disables port-based sFlow
off sampling.
5-137
5.35 PP Configuration
PP Overview
Protocol Protect (PP) maintains and monitors the rate of packets forwarded to the CPU,
thus preventing viruses or spiteful attacks to the switch. In this way, the switch provides
self-protection ability and ensures network security.
PP takes the following measures: limiting the rates of related services, filtering unsuitable
packets, sending alarms when there are packets sent at an abnormal rate, and reminding
NMS that there may be packets attacking the CPU.
To enhance flexibility and compatibility of the switch, PP provides the function of configuring
priority users for the protocol packets sent by the switch.
Configuring PP
The PP configuration includes the following commands:
Command Function
zte(cfg)#set protocol-protect mac-drop {disable | enable} Enables the mac drop function.
zte(cfg)#set protocol-protect mac-drop rule <1-128> bind port Binds the mac drop rule with the
<portlist> port.
zte(cfg)#clear protocol-protect mac-drop port <portlist>[rule Clears the mac drop rules for
<1-128>] specified or all ports.
zte(cfg)#clear protocol-protect mac-drop rule [<1-128>] Clears specified mac drop rules.
show protocol-protect statistic [port <portlist>] (all configuration Displays statistics information of
modes) protocol packet alarms on a PP
port.
show protocol-protect limit (all configuration modes) Displays PP rate limit information.
5-138
Command Function
show protocol-protect mac-drop port [<portlist>](all configuration Displays the rules and statistics
modes) bound with a specified port.
show protocol-protect mac-drop rule [<1-128>](all configuration Displays specified mac drop rules.
modes)
PP Configuration Instance
l Configuration Description
See Figure 5-48, Host 1 sends DHCP attack packets. Users can view the device
operating status and alarm information. Users also can view IGMP operating status
under DHCP packet attacks. The router sends IGMP query packets periodically.
l Configuration Procedure
zte(cfg)#set igmp snooping enable
zte(cfg)#set igmp snooping add vlan 1
zte(cfg)#set dhcp snooping-and-option82 enable
zte(cfg)#set dhcp snooping add port 1-3
l Configuration Verification
Use Host 1 to send DHCP Discover packets. View alarm information on the switch.
Thu Jul 1 17:53:18 2004 Receive too many packets of 'dhcp' from port 1
Use Host 2 to request joining the multicast group 225.0.0.1. View the multicast entity
on the device.
zte(cfg)#show igmp snooping vlan
Maximal group number: 1024
Current group number: 1
Num VlanId Group Last_Report PortMember
5-139
1. The local device sends its link and management information to a neighbor device.
2. The local device receives the network management information of a neighbor device.
3. The MIB of the local device stores the network management information of all
neighbor devices, and a network management program can query layer-2 connection
information in the MIB.
The LLDP is not a configuration protocol of the remote system or a signaling control
protocol used between two ports. The LLDP discovers layer-2 protocol configuration
conflicts between neighbor devices, but it only reports the problem to an upper-layer
network management device, without providing any mechanism to solve the problem.
The LLDP is simply a neighbor discovery protocol that defines a standard for network
devices (such as switches, routers, and WLAN access points) in the Ethernet to advertise
their identities to other nodes in the network and store discovery information of all neighbor
devices. For example, device configuration and device IDs can be advertised by the LLDP.
The LLDP defines a universal advertisement information set, a protocol for sending
the advertisement information, and a method for storing the received advertisement
information. The device that wants to advertise its information can place multiple pieces
of advertisement information into a Link Layer Discovery Protocol Data Unit (LLDPDU).
The LLDPDU contains a variable-length message unit (called TLVs), which are described
below:
l Type: indicates the type of the message to be sent.
l Length: indicates the number of bytes in the message.
l Value: indicates the contents to be sent.
Each LLDPDU contains four mandatory TLVs and one optional TLV:
5-140
Configuring LLDP
The LLDP configuration includes the following commands:
Command Function
zte(cfg)#lldp port <portlist> med-tlv-select {capabilities-tlv Sets the optional MED TLV type
| extended-power-tlv | inventory-tlv | location-tlv | sent on a port.
network-policy-tlv}{enable | disable}
zte(cfg)#clear lldp neighbor port <portlist> Clears LLDP neighbors with whom
neighbor relationships have been
established.
show lldp config port <portlist> (all configuration modes) Displays LLDP configuration
information.
show lldp neighbor port <portlist> (all configuration modes) Displays summary information of
LLDP neighbors.
show lldp entry port <portlist> (all configuration modes) Displays detailed information of
LLDP neighbors.
show lldp statistic port <portlist> (all configuration modes) Displays statistics information of
LLDP neighbors.
5-141
l Configuration Verification
zte(cfg)#show lldp neighbor
Capability Codes:
P-Repeater, B-Bridge, W-WLAN Access Point, R-Router, T-Telephone
C-DOCSIS Cable Device, s-Station, S-Switch, O-Other
Interface DeviceID Hdtm Capability Platform PortID
---------- ----------------- ----- ---------- ------------------ --------------
port-19 00.d0.d0.09.29.18 110 B S ZXR10 2918E-PS port-9
Version V2.05.11B06
zte(cfg)#show lldp entry
--------------------------------------------------------
Local Port:port-1/1
Chassis ID:00.55.43.33.33.59 (MAC Address)
Port ID :port-1/48 (Interface Name)
TTL ID :102 (Time to live)
Port Description :port-1/48 status is up,media-type is 1000BaseT,pvid is 4094.
System Name :52PM
System Description:ZXR10 2918E-PS Version V2.05.11B06
System Capability :Bridge, Switch
Management Address:IPv4 - 192.168.100.100, ifIndex - 63, OID - Null
5-142
The switch sends a test packet through a port. If this test packet is received through the
port without any change (or only a tag is attached), it indicates that a loop exists in this
port.
The test packet sent by the switch includes the following three parameters:
l Source MAC address: It indicates the MAC address of the switch. The MAC address
of each switch is unique.
l Port Number: Port numbers correspond to the numbers of the ports on the switch one
by one.
l Discrimination Field: For each switch, the digital signature of each port is different.
When three parameters in the receiving and sending test packets are same, the loop
definitely exists on this port.
Command Function
zte(cfg)#set loopdetect sendpktinterval <5-60> Sets the interval for sending loop
detection packet.
zte(cfg)#set loopdetect blockdelay <1-1080> Sets interval for blocking port with
loop.
zte(cfg)#set loopdetect port <portlist> vlan <vlanlist>{enable|d Enables or disables loop detection
isable} on a port in a specific VLAN.
zte(cfg)#set loopdetect port <portlist> protect {enable | disable} Enables or disables port protection
when a loop occurs on a port.
zte(cfg)#set loopdetect trunk <trunklist> protect {enable | Enables or disables trunk port
disable} protection when a loop occurs on
a trunk port.
5-143
Command Function
show loopdetect port [<portlist>] (all configuration modes) Displays port information of loop
detection.
show loopdetect trunk [<trunklist>] (all configuration modes) Displays trunk information of loop
detection.
l Configuration Procedure
zte(cfg)#set loopdetect port 1 enable
l Configuration Verification
Check the loop detection state of Switch 2:
zte(cfg)#show loopdetect
The block-delay of loopdetect : 5 (min)
The packet interval of loopdetect : 15 (sec)
PortId isUp isStp isProtect isExtend loopVlanNum loopType
------ ---- ----- --------- -------- ----------- ---------
1 Up No Yes No 1 Port
5-144
See Figure 5-51, configure the double ports loop detection function of loop-detect of
switch2 to suppress broadcast storm of network under switch2.
l Configuration Procedure
Switch2(cfg)#set loopdetect port 1,2 enable
Switch2(cfg)#set loopdetect extend port 1 enable
l Configuration Verification
Check the loop detection state of switch2.
Switch2(cfg)#show loopdetect
The block-delay of loopdetect : 5 (min)
The packet interval of loopdetect : 15 (sec)
PortId isUp isStp isProtect isExtend loopVlanNum loopType
------ ---- ----- --------- -------- ----------- ---------
1 Up No Yes Yes 1 Port
2 Up No Yes No 0 Port
After neighbor relationship is established, the devices send Hello messages periodically
to detect whether the link is operating properly. When receiving a Hello message from the
neighbor, a device updates the neighbor information saved locally and resets the time-out
period of the neighbor. If the device does not receives a Hello message when the time-out
period expires, it is considered that the a fault occurs to the neighbor and the neighbor is
5-145
aged. If the last neighbor is deleted due to aging, it is considered that the link is not in
normal operating state. It is necessary to handle the problem according to working mode.
There are two UDLD working modes: normal mode and aggressive mode.
l In normal mode, only when the device receives a protocol message confirming that
the link is connected incorrectly will the port be shut down. If the device does not
receive the related message or cannot confirm that the link is working properly in one
direction, the device does not operate the port.
l In aggressive mode, if the device cannot confirm that the link is working properly in
both directions (such as the link is connected incorrectly, the link is working properly
only in one direction or the link is a self-loop), the port is shut down. It is necessary to
use the reset or recovery command to recover the communication ability of the port.
To prevent a neighbor from being aged by mistake, a local device sends Flush messages
on its own initiative to the port on which the UDLD function is enabled in the following
situations.
l The port is down administratively.
l UDLD is down on the port.
l The device is restarted.
Configuring UDLD
The UDLD configuration includes the following commands:
Command Function
zte(cfg)#udld port <portlist> mode {aggressive | normal} Sets the mode of a port in UDLD.
zte(cfg)#udld port <portlist> message timer <7-90> Sets the interval of sending
messages after UDLD enters the
BiDirectional status and the port is
steady.
zte(cfg)#udld port <portlist> recovery {enable | disable} Enables or disables the UDLD
recovery function.
zte(cfg)#udld port <portlist> recovery timer <10-600> Sets the recovery interval.
5-146
Command Function
show udld port [<portlist>] (all configuration modes) Displays port configuration, status
and detailed neighbor information.
l Configuration Procedure
zteA(cfg)#udld port 17,18 enable
zteB(cfg)#udld port 17,18 enable
l Configuration Verification
Thu Jul 1 16:07:09 2004 Udld Port : 17 link failure
Thu Jul 1 16:07:09 2004 Udld Port : 18 link failure
Thu Jul 1 16:07:10 2004 Port : 17 linkdown
Thu Jul 1 16:07:10 2004 Host Topology changed
Thu Jul 1 16:07:10 2004 Port : 18 linkdown
Thu Jul 1 16:07:10 2004 Host Topology changed
5-147
Configuring TACACS+
The TACACS+ configuration includes the following commands:
Command Function
zte(cfg-nas)#tacacs-plus loginauthor default group <group-name> Sets the default server group
authorized for TACACS+
login.
zte(cfg-nas)#tacacs-plus adminauthen default group <group-name> Sets the default server group
authenticated for TACACS+
management.
5-148
Command Function
zte(cfg-nas)#tacacs-plus accounting update period <1-2147483647> Sets the refresh period for
TACACS+ user accounting.
5-149
l Configuration Procedure
zte(cfg)#set loginauth tacacs-plus+local
zte(cfg)#set adminauth tacacs-plus+local
zte(cfg)#config router
zte(cfg-router)#set ipport 1 ipaddress 192.168.1.1 255.255.255.0
zte(cfg-router)#set ipport 1 vlan 1
zte(cfg-router)#set ipport 1 enable
zte(cfg-router)#exit
zte(cfg)#config nas
zte(cfg-nas)#tacacs-plus group zte enable
zte(cfg-nas)#tacacs-plus group zte add host 192.168.1.100
zte(cfg-nas)#tacacs-plus loginauthen default group zte
zte(cfg-nas)#tacacs-plus loginauthor default group zte
zte(cfg-nas)#tacacs-plus adminauthen default group zte
zte(cfg-nas)#tacacs-plus accounting commands default group zte
zte(cfg-nas)#tacacs-plus accounting exec default group zte
zte(cfg-nas)#tacacs-plus accounting update period 10
5-150
Command Function
show time-range [<word>] (all configuration modes) Displays time range configuration.
Voice data can be added to the voice VLAN in two modes: dynamic mode and manual
mode.
In dynamic mode, if the interface fails to be added to or removed from the voice VLAN, the
system will send an alarm to notify the user.
To prevent common service packets from occupying the bandwidth of the voice VLAN and
ensure the quality of voice communication, the voice VLAN provides the security mode.
The security mode is classified into the strict security mode and non-strict security mode.
Command Function
zte(cfg)#set vlan voice-vlan port <port-id> ingress-vlan Sets the voice VLAN function on
<vlanlist> voice-vlan <1-4094> a port.
zte(cfg)#set vlan voice-vlan <1-4094> qos-profile <0-127> Sets to modify either up or dscp
modify {up|dscp|all} or both.
5-151
Command Function
zte(cfg)#set vlan voice-vlan <1-4094> qos-profile disable Disables the association between
a QoS profile and a voice VLAN.
zte(cfg)#clear vlan voice-vlan port <port-id> Clears all voice VLAN information
configured on a port.
zte(cfg)#clear vlan voice-vlan port <port-id> oui-id Clears all OUIs configured on a
port.
zte(cfg)#clear vlan voice-vlan port <port-id> oui-id <1-32> Clears a specific OUI configured
on a port.
show vlan voice-vlan (all configuration modes) Displays voice configuration on all
ports.
show vlan voice-vlan port <port-id> (all configuration modes) Displays voice configuration on a
port.
show vlan voice-vlan default-oui (all configuration modes) Displays the default OUI of a
device.
show vlan voice-vlan user-table port <port-id> (all configuration Displays the user table on a port.
modes)
show vlan voice-vlan <vlanlist> qos (all configuration modes) Displays voice VLAN QoS
configuration.
l Configuration Procedure
zte(cfg)#set vlan 10,20,100 add port 1-3 tag
zte(cfg)#set vlan 10,20,100 enable
zte(cfg)#set vlan voice-vlan port 1 oui-id 1 mac-addr 00.00.01.00.00.01
mac-mask FF.FF.FF.FF.FF.FF
zte(cfg)#set vlan voice-vlan port 2 oui-id 1 mac-addr 00.00.01.00.00.02
5-152
mac-mask FF.FF.FF.FF.FF.FF
zte(cfg)#set vlan voice-vlan port 1 ingress-vlan 10 voice-vlan 100
zte(cfg)#set vlan voice-vlan port 2 ingress-vlan 20 voice-vlan 100
l Configuration Verification
zte(cfg)#show vlan voice-vlan
Port Id: 1
Customer Vlan List: 10
Voice-vlan : 100
Oui configed :
oui-id: 1 mac: 00.00.01.00.00.01 mask: FF.FF.FF.FF.FF.FF
Port Id: 2
Customer Vlan List: 20
Voice-vlan : 100
Oui configed :
oui-id: 1 mac: 00.00.01.00.00.02 mask: FF.FF.FF.FF.FF.FF
The network manager performs planning on network services and levels for the
management and maintenance purposes. The entire network is divided into multiple
Management Domains (MDs). For a single management domain, see Figure 5-55.
5-153
In the domain in Figure 5-55, a series of ports are defined on peripheral and internal
devices.
l The grey ports on the peripheral devices are service ports connected to the external
devices and therefore are named Maintenance association End Point (MEP).
l The other black ports (including those on intermediate devices) connect internal
devices and therefore are named Maintenance Domain Intermediate Point (MIP).
The management function is implemented through the defined MEP and MIP.
A network is divided into a customer domain, provider domain, and operator domain.
A level between 0-7 is designated for each domain. The domain level determines the
inclusion relation between domains. A domain with a higher level can include domains
with lower levels but not vice versa. The domains with the same level cannot include each
other. This means that all domains can be tangential (internally or externally) and inclusive
but cannot be intersecting.
The message types defined in the CFM protocol include:
5-154
l Loopback Message (LBM): A unicast CFM protocol data unit. It is sent to a specified
MP from an MEP, expected to receive an LBR message.
l Loopback Reply (LBR): A unicast CFM protocol data unit. It is sent by the MP receiving
an LBM as the reply to the LBM.
With the five protocol messages listed above, CFM implements the following functions:
l Detecting faults: MEP detects network connectivity faults by periodically sending
and receiving CCM messages. The faults include connection failure and unwelcome
connection (error connection).
l Notifying faults: After MEP detects a connectivity fault, it sends a proper alarm to the
specified management system, for example, trap messages of SNMP.
l Locating a path: MEP locates and traces a path from an MEP to another MP (including
MEP and MIP) by using LTM/LTR messages.
l Confirming and separating a fault: This is an administrative function. The network
manager confirms the fault through LBM/LBR messages and separates the fault.
Command Function
zte(cfg)#create cfm md-session <1-16> name <string> level Creates a CFM md.
<0-7>
zte(cfg)#create cfm md-session <1-16> ma-session <1-32> Creates a CFM local mep.
mep-session <1-64> mep-id <1-8191> direction {down|up}
zte(cfg)#create cfm md-session <1-16> ma-session <1-32> Creates a CFM remote mep.
rmep-session <1-64> rmep-id <1-8191> remote-mac
<hh.hh.hh.hh.hh.hh>
zte(cfg)#cfm md-session <1-16> ma-session <1-32> Sets or delete the primary VLAN
primary-vlan {<1-4094>| delete} within cfm ma.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> ccm Sets the interval that ccm packets
time-interval <4-7> of mep within cfm ma are sent.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> ccm Sets the way to fill in the MEG ID
md-name {absent | disable | present} field in a cfm ccm messages.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the status of the cfm mep
<1-8191> state {disable|enable} protocol.
5-155
Command Function
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the status of cfm mep ccm
<1-8191> ccm-send {disable|enable} sending packets.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the status of cfm mep ccm
<1-8191> ccm-receive {disable|enable} receiving packets.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the priority of packets sent by
<1-8191> priority <0-7> cfm mep ccm.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the lowest alarm priority of
<1-8191> alarm-lowest-pri <1-5> cfm mep.
zte(cfg)#clear cfm md-session <1-16> ma-session [<1-32>] Clears all configuration of cfm ma.
zte(cfg)#clear cfm md-session <1-16> ma-session <1-32> Clears all configuration of cfm mip.
mip-session [<1-64>]
show cfm md-session <1-16> ma-session [<1-32>] (all confiuration Displays all configuration of cfm
modes) ma.
show cfm md-session <1-16> ma-session <1-32> mp-session Displays all configuration of cfm
[<1-64>] (all confiuration modes) mp.
5-156
l Configuration Procedure
Configuration on S1:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 1
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 assign port 1
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 2
remote-mac 00.d0.d0.c0.00.02
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
Configuration on S2:
zte(cfg)# cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 2
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 assign port 2
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 1
remote-mac 00.d0.d0.c0.00.01
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
5-157
l Configuration Procedure
Configuration on S1:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 1
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 assign port 1
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 2
remote-mac 00.d0.d0.c0.00.03
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
Configuration on S2:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mip-session 1 name zte_mip_1
zte(cfg)#cfm md-session 1 ma-session 2 mip-session 1 assign port 2
zte(cfg)#create cfm md-session 1 ma-session 1 mip-session 2 name zte_mip_1
zte(cfg)#cfm md-session 1 ma-session 2 mip-session 2 assign port 3
Configuration on S3:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 2
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 assign port 4
5-158
Y.1731 Configuration
Y.1731 configuration includes the following commands:
Command Function
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Enables the LM function at one
<1-8191> one-lm {enable | disable} end.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Enables the LM function at both
<1-8191> two-lm {enable | disable} ends.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Enables the DM function in both
<1-8191> two-dm {enable | disable} directions.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Enables the AIS function.
<1-8191> ais {enable | disable}
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Enables the LCK function.
<1-8191> lck {enable | disable}
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the level that sending the
<1-8191> client-level <0-7> AIS/LCK function to outer layers.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Sets the remote MEP related to
<1-8191> relate-to rmep-id <1-8191> local MEP.
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Starts LM detection at one end.
<1-8191> one-lm send-packet [continue-time <60-600> interval
<1-60>]
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Stops LM detection at one end.
<1-8191> one-lm send-packet stop
5-159
Command Function
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Starts DM detection at both ends.
<1-8191> two-dm send-packet [continue-time <60-600> interval
<1-60>]
zte(cfg)#cfm md-session <1-16> ma-session <1-32> mep-id Stops DM detection at both ends.
<1-8191> two-dm send-packet stop
zte(cfg)#clear cfm md-session <1-16> ma-session <1-32> Clears the results of LM detection
mep-id <1-8191>{ one-lm | two-lm | two-dm } at one end and at both ends, as
well as the result of DM detection
in both directions.
zte(cfg)#clear cfm md-session <1-16> ma-session <1-32> Clears the related remote MEP.
mep-id <1-8191> relate-rmep
LM Network Configuration
l Configuration Description
The network configuration is illustrated by using the network instance in Figure 5-58.
l Configuration Procedure
Configuration on S1:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 1
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 assign port 1
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 2
remote-mac 00.d0.d0.c0.00.02
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 relate-to rmep-id 2
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 one-lm (two-lm) enable
Configuration on S2:
5-160
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 2
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 assign port 4
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 1
remote-mac 00.d0.d0.c0.00.01
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 relate-to rmep-id 1
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 one-lm (two-lm) enable
l Configuration Verification
LM on both ends is automatically performed based on the CCM configuration. While
LM on one end is performed after manually triggering on S1 or S2:
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 (2) one-lm send-packet
View the measurement result by using the command for displaying MEP information
that is provided by 802.1ag.
DM Network Configuration
l Configuration Description
The network configuration is illustrated by using the network instance in Figure 5-59.
l Configuration Procedure
Configuration on S1:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 1
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-send enable
5-161
Configuration on S2:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 2
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 assign port 4
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 1
remote-mac 00.d0.d0.c0.00.01
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 relate-to rmep-id 1
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 two-dm enable
l Configuration Verification
Manually trigger the test on S1 or S2:
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 (2) one-lm send-packet
View the measurement result by using the command for displaying MEP information
that is provided by 802.1ag.
l Configuration Procedure
Configuration on S1:
zte(cfg)#cfm enable
5-162
Configuration on S2:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 10 name zte level 4
zte(cfg)#create cfm md-session 10 ma-session 10 name zte_zte
zte(cfg)#cfm md-session 10 ma-session 10 primary-vlan 100
zte(cfg)#create cfm md-session 10 ma-session 10 mep-session 10 mep-id 10
direction down
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 state enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 ccm-send enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 ccm-receive enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 assign port 3
zte(cfg)#create cfm md-session 10 ma-session 10 rmep-session 20 rmep-id 20
remote-mac 00.d0.d0.c0.00.03
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 20 ccm-receive enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 ais (lck) enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 client-level 5
Configuration on S3:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 10 name zte4 level 4
zte(cfg)#create cfm md-session 10 ma-session 10 name zte_zte
zte(cfg)#cfm md-session 10 ma-session 10 primary-vlan 100
zte(cfg)#create cfm md-session 10 ma-session 10 mep-session 20 mep-id 20
direction down
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 20 state enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 20 ccm-send enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 20 ccm-receive enable
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 20 assign port 5
zte(cfg)#create cfm md-session 10 ma-session 10 rmep-session 10 rmep-id 10
remote-mac 00.d0.d0.c0.00.02
zte(cfg)#cfm md-session 10 ma-session 10 mep-id 10 ccm-receive enable
5-163
Configuration on S4:
zte(cfg)#cfm enable
zte(cfg)#create cfm md-session 1 name zte_1 level 5
zte(cfg)#create cfm md-session 1 ma-session 1 name zte_zte_1
zte(cfg)#cfm md-session 1 ma-session 1 primary-vlan 100
zte(cfg)#create cfm md-session 1 ma-session 1 mep-session 1 mep-id 2
direction down
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 state enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-send enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 2 assign port 6
zte(cfg)#create cfm md-session 1 ma-session 1 rmep-session 2 rmep-id 1
remote-mac 00.d0.d0.c0.00.01
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ccm-receive enable
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 ais (lck) enable
l Configuration Verification
Disconnect the link between S2 and S3. After that, alarms occur on only S2 and S3,
and unrelated alarms on S1 and S4 are restricted due to the AIS function.
zte(cfg)#cfm md-session 1 ma-session 1 mep-id 1 (2) one-lm send-packet
View the measurement result by using the command for displaying MEP information
that is provided by 802.1ag.
Command Function
5-164
Command Function
5-165
The DHCP Server checks the validity of the Relay Agent domain and allocates an IP
address to the DHCP Client that is in the same subnet as the IP address in accordance
with the domain value. This means that the allocated IP address and the IP address of
the interface through which the Relay receives request messages are in the same network
segment. At the same time, the DHCP Relay implements the forwarding of the responses
from the DHCP Server to the Client.
Command Function
zte(cfg)#set dhcp relay option82 sub-option device { ani< string Sets the switch node device ID.
>| remote-ID {cisco | manual < string >| key < string >}}
zte(cfg)#set dhcp relay option82 sub-option port <portlist> Sets the relay option82 suboption.
circuit-ID {on {cisco | china-tel | dsl-forum| henan-rft| ukrtelcom
|key < string >| manual < string >}| off}
zte(cfg)#clear dhcp relay vclass-id {characters <string>{ server Clears the configured dhcp relay
A.B.C.D}| hex-numbers <hex-string>{ server A.B.C.D}} vclass-id.
zte(cfg)#clear dhcp relay option82 device ani Clears the device ID information.
5-166
Command Function
show dhcp relay binding [port <1-28>| trunk <1-15>] (all Displays the DHCP relay binding
configuration modes) information.
Displays device-related
show dhcp relay option82 device (all configuration modes) information, including ANI
and remote-ID.
zte(cfg-router)#set ipport <0-63> dhcp relay {agent | server Sets the DHCP relay information
<A.B.C.D>} of ipport.
zte(cfg-router)#clear ipport <0-63> dhcp relay {agent | server Clears the DHCP relay information
<A.B.C.D>} of ipport.
show dhcp relay binding [portt<1-28>|trunk <1-15>] (all Shows the information about the
configuration modes) DHCP relay table item.
See Figure 5-61, switch port 1 is connected to the DHCP client, and switch port 2 is
connected to the DHCP server of the IP network.
5-167
Note:
The DHCP client and the DHCP server are in different network segments.
l Configuration Procedure
1. Assign a specified VLAN to the port:
set vlan 1000 add port 2 tag
set vlan 1000 enable
2. Configure the DHCP relay by using the following commands:
zte(cfg)#set dhcp relay enable
zte(cfg-router)#set ipport 0 ipaddress 169.1.15.1 255.255.0.0
zte(cfg-router)#set ipport 0 vlan 1
zte(cfg-router)#set ipport 0 enable
zte(cfg-router)#set ipport 0 dhcp relay agent
zte(cfg-router)#set ipport 0 dhcp relay server 10.230.72.2
zte(cfg-router)#set ipport 63 ipaddress 10.230.72.1 255.255.255.0
zte(cfg-router)#set ipport 63 vlan 1000
zte(cfg-router)#set ipport 63 enable
l Configuration Verification
zte(cfg)#show dhcp relay
DHCP relay status : enable
DHCP server mode : ipport
DHCP server retry : 10
DHCP relay option82: disable
5-168
zte(cfg)#show ipport 0
Status : up IpAddress : 169.1.15.1
VlanId : 1 Mask : 255.255.0.0
ArpProxy : disabled MacAddress: 00.00.00.11.22.33
Timeout : 600(s) IpMode : static
En/Disable: enabled
5-169
A gateway can be configured in a VLAN for ARP proxy, or a global gateway can be
configured. When performing ARP proxy, the gateway in an MFF entry is preferred
than the intra-VLAN gateway, and the intra-VLAN gateway is preferred than the global
gateway. The gateway address can be an IP address or a MAC address. If the gateway
address is an IP address, the switch sends an ARP request to the gateway to obtain the
MAC address. If the gateway address is a MAC address, the switch directly uses the
MAC address in ARP responses. Therefore, it is necessary to manually configure a static
MAC entry directing to the gateway for the switch.
Configuring MFF
The MFF configuration includes the following commands:
Command Function
zte(cfg)#set mff vlan <vlanlist> add port Sets the MFF attributes for ports and VLANs.
<portlist>{userport | network}
zte(cfg)#set mff vlan <vlanlist> delete port Deletes the MFF attributes for ports and VLANs.
<portlist>
zte(cfg)#set mff vlan <vlanlist> gateway {ip | Sets an intra-VLAN MFF gateway.
mac}<address>
zte(cfg)#set mff user ip <ip-addr> mac Adds an MFF user entry manually.
<mac-addr> vlan <vlan-id> gateway {ip |
mac}<address>
zte(cfg)#set mff gateway-arp-keepalive add-port Sets the ARP keep-alive parameter for the MFF
{<portlist>| all}{timeout <value>}{enable | disable} gateway, and enables or disables the keep-alive
function.
zte(cfg)#set mff gateway-user-keepalive add-port Sets the ARP keep-alive parameter for users
{<portlist>| all}{timeout <value>}{enable | disable} connected to the gateway device that sends
gratuitous ARP keep-alive packets, and enables
or disables the keep-alive function.
zte(cfg)#clear mff gateway arp-keepalive-port Clears the ports that send gateway ARP
keep-alive packets.
zte(cfg)#clear mff gateway user-keepalive-port Clears the ports that send user ARP keep-alive
packets.
zte(cfg)#clear mff vlan <vlanlist> gateway Deletes the intra-VLAN MFF gateway.
zte(cfg)#clear mff user ip <ip-addr> vlan Deletes the specified MFF user entry.
<vlan-id>
zte(cfg)#show mff user-table Displays information about the MFF user table.
5-170
Command Function
zte(cfg)#show mff gateway -keepalive-info {port} Displays information about ARP keep-alive
configuration, including gateway ARP keep-alive
configuration and user ARP keep-alive
configuration.
l Configuration Procedure
à Configure a VLAN for the ports:
zte(cfg)#set vlan 400 add port 1/1,1/2,1/4 untag
zte(cfg)#set port 1/1,1/2,1/4 pvid 400
l Configuration Verification
When an ARP request is received on a user port, the switch searches the ARP table
first. If the gateway ARP entry is not contained in the ARP table, the switch replaces
5-171
the user to send an ARP request to the gateway, and then adds an MFF user entry.
The MFF user entry is as follows:
zte(cfg)#show mff user-table
MFF user entry total count: 1
Type: born way of MFF user entry.
'M',manual configure; 'A',ARP packet; 'D',DHCP snooping packet.
VlanId IpAddress Type MacAddress Gateway(IpOrMac)
------ --------------- ---- ----------------- ----------
400 197.1.23.3 A 00.10.94.00.00.03 197.1.23.15
The SSL functional module enables the ZXR10 2900E to operate as an SSL server and
complete interaction with a client. The interaction procedure includes SSL handshaking,
and packet monitoring, receiving, parsing and sending. The SSL handshaking procedure
includes negotiating an encryption algorithm, verifying the local certificate on the server,
exchanging keys, and verifying a MAC address. The encryption algorithm, local certificate
on the server, keys, and MAC address are used for data encryption and decryption,
identification authentication, and message integrity validation in a subsequent session.
Encryption certificate management is the prerequisite for SSL handshaking. Certificate
management includes key generation management, local certificate generation on the
server, and root certificate generation on the client.
Users can access the ZXR10 2900E by using browsers and HTTPS to perform Web-based
configuration and management.
Configuring SSL
The SSL configuration includes the following commands:
Command Function
show ssl (all configuration modes) Displays the SSL configuration and state.
5-172
l Configuration Procedure
Configure the switch:
zte(cfg)#create ca 192.168.100.110/24
ca is creating ,please wait......
Rootcafile /flash/data/root.cer, has created!
Servercafile /flash/data/server.pem, has created!
Serverkeyfile /flash/data/server.key, has created!
FS is releasing ,please wait......
Done!
zte(cfg)#set ssl en
The current ca is for ipaddress 192.168.100.110,
Please make sure ip of the switch matches.
Then upload /flash/data/root.cer, and import to explore,the ssl is availible.
zte(cfg)#config tffs
zte(cfg-tffs)#cd data
zte(cfg-tffs)#tftp 192.168.100.109 upload root.cer
5-173
b. Click the Content tab, and then click Certificates. The Certificates dialog
box is displayed, see Figure 5-65.
5-174
c. Click the Trusted Root Certification Authorities tab, and then click
Import..., see Figure 5-66. The dialog box for certificate import wizard is
displayed.
d. Based on the wizard, click Next, a dialog box is displayed. Select the root.cer
file. Complete the certificate import procedure. Close the dialog boxes, and
restart the browser.
2. Open the SSL login page.
After the SSL function is enabled for the switch, enter https://<ip address
of the switch> in the address bar of the browser. The SSL login page is
displayed, see Figure 5-67.
Enter your username, login password and administration password in the text
boxes. The main page for Web-based management is displayed, see Figure 5-68.
5-175
The ERPS protocol supports triggering the protocol calculation by using manual
switching commands: Forced Switch (FS) and Manual Switch (MS).
l WTR timer
In revertive mode, the WTR timer is used to prevent the frequent operation of the
protection switch due to an intermittent defect.
l WTB timer
When the corresponding function of the device is restored after an operation command
(such as the FS or MS command) is executed, the delay time (called WTB time, guard
timer time plus five seconds) must be set long enough to receive potential FS, SF, or
MS requests from the remote end. This time is long enough for an Ethernet ring
5-176
node to consecutively send two R-APS messages, and it is also the condition for
determining that the Ethernet ring node exists.
Note:
The WTB timer is valid for the RPL owner node only, and the value range depends on
the guard timer.
l Guard timer
The guard timer is used to prevent expired R-APS packets.
An Ethernet ring node can send multiple R-APS packets simultaneously. In this case,
the node can still send expired R-APS packets until it receives a new R-APS packet.
If the ring node receives an R-APS (SF) packet that is the same as the message
previously sent by the node, the node determines that an SF occurs. Due to the
above reason, the guard timer is used to forcedly prevent loops.
l Ring statuses
A ring may be in idle, pending, protection, FS, or MS status.
5-177
Figure 5-69 Example of the Primary Node Blocking the Secondary Port (Ring Status:
UP)
Figure 5-70 Example of the Primary Node Enabling the Secondary Port (Ring status:
DOWN)
Figure 5-69 shows that each link is operating properly, the ring is in idle status, and the
secondary port of the primary node is blocked. Traffic passes through switches C and D.
Figure 5-70 shows that the link between switches B and C is disconnected. The link status
changes to Protection, and ERPS immediately switches the RPL port of the owner node
to forwarding status. After the switching, traffic does not pass through switches C and D.
After the link between switches C and D is restored, the RPL port of the owner node is
blocked again, and the ring status changes to pending as shown in Figure 5-69.
Configuring ERPS
To configure ERPS, perform the following steps.
5-178
3 ZXR10(config)#set erps domain <1-4> Configures the mel for the ring node.
ring-mel <1-7>
5 ZXR10(config)#set erps domain <1-4> Configures the WTR time (in minutes) of
timer wtr-time <1-12> the ERPS ring.
The WTR timer (in minutes) is valid for the
RPL owner node only, range: 1–12, default:
5.
6 ZXR10(config)#set erps domain <1-4> Configures the guard timer time (in units of
timer guard-time <1-200> 10 ms) for the ERPS ring,
Range: 1–200, default: 50.
5-179
Figure 5-71 Configuration Example of a Single ERPS Domain with Multiple Loops
/*The following command configures protection instance 1 for the ERPS domain*/
Switch_A(config)#set ERPS domain 1 protect-instance 1
/*The following command configures the owner node. The RPL port is port 1/2. */
Switch_A(config)#set ERPS domain 1 ring-id 1 raps-vlan 4000 ring-east trunk 1
ring-west port 1/2 rpl-role owner rpl-port west
/*The following command configures protection instance 1 for the ERPS domain:*/
Switch_B(config)#set ERPS domain 1 protect-instance 1
5-180
/*The following command configures protection instance 1 for the ERPS domain:*/
Switch_C(config)#set ERPS domain 1 protect-instance 1
/*The following command configures protection instance 1 for the ERPS domain:*/
Switch_D(config)#set ERPS domain 1 protect-instance 1
l Protection instance 1 is configured for ERPS domain 1. In this instance, the dedicated
VLAN (VLAN 4000) protects VLANs 100 to 110. Protection instance 2 is configured for
ERPS domain 2. In this instance, the dedicated VLAN (VLAN 4001) protects VLANs
200 to 210.
l Switch A is an owner node in domain 1 (the related ports are ports 1/1 and 1/2, where
port 1/2 is an RPL port), and it is a neighbor node in domain 2 (the related ports are
ports 1/1 and 1/2, where port 1/2 is also an RPL port).
l Switch B is a neighbor node in domain 1 (the related ports are port 1/1 and port 1/2,
where port 1/2 is an RPL port), and it is an owner node in domain 2 (the related ports
are ports 1/1 and 1/2, where port 1/2 is also an RPL port).
l Both switches C and D are none nodes in domains 1 and 2.
Note:
If a physical ring has multiple ERPS domains, you can plan different paths for the service
traffic related to different ERPS domains through the proper configuration, so that load
balancing can be implemented.
5-181
/*The following commands configure protection instance 1 for ERPS domain 1*/
/*and protection instance 2 for ERPS domain 2:*/
Switch_B(config)#set ERPS domain 1 protect-instance 1
Switch_B(config)#set ERPS domain 2 protect-instance 2
5-182
/*The following command configures switch B to be the owner node in domain 2*/
/*and its port 1/2 to be an RPL port:*/
Switch_B(config)#set ERPS domain 2 ring-id 2 raps-vlan 4001 ring-east port 1/1
ring-west port 1/2 rpl-role owner rpl-port west
/*The following commands configure protection instance 1 for ERPS domain 1*/
/*and protection instance 2 for ERPS domain 2:*/
Switch_C(config)#set ERPS domain 1 protect-instance 1
Switch_C(config)#set ERPS domain 2 protect-instance 2
5-183
Command Function
zte(cfg)#debug protocol dhcp client disable Disables the debug function of the DHCP client.
zte(cfg)#debug protocol dhcp client enable Enables the debug function of the DHCP client.
zte(cfg)#debug protocol dhcp client state ipport Shows statistical data of an ip port on the DHCP
<0-63> client.
zte(cfg)#debug protocol dhcp download Shows the downloaded information of the DHCP.
zte(cfg)#debug protocol dhcp relay disable Disables the debug function of the DHCP Relay
module.
zte(cfg)#debug protocol dhcp relay enable Enables the debug function of the DHCP Relay
module.
zte(cfg)#debug protocol dhcp snooping-and-opt Disables the debug function of the DHCP
ion82 disable snooping-and-option82 module.
zte(cfg)#debug protocol dhcp snooping-and-op Enables the debug function of the DHCP
tion82 enable snooping-and-option82 module.
zte(cfg)#debug protocol dhcp statistics clear Deletes DHCP statistical data of all ports.
zte(cfg)#debug protocol dhcp statistics port Shows DHCP statistical data of a port.
<1/1-24>
zte(cfg)#debug protocol dhcp statistics port Deletes DHCP statistical data of a port.
<1/1-24> clear
zte(cfg)#debug protocol dhcp statistics trunk Shows DHCP statistical data of a trunk port.
<1-15>
zte(cfg)#debug protocol dhcp statistics trunk Deletes DHCP statistical data of a trunk port.
<1-15> clear
zte(cfg)#debug protocol dhcpv6 disable Disables the debug function of the DHCPv6
module.
zte(cfg)#debug protocol dhcpv6 enable Enables the debug function of the DHCPv6
module.
zte(cfg)#debug protocol dot1x disable Disables the debug function for the dot1x
protocol.
zte(cfg)#debug protocol dot1x enable Enables the debug function for the dot1x protocol.
5-184
Command Function
zte(cfg)#debug protocol layer3 arp disable Disables the debug function of ARP messages.
zte(cfg)#debug protocol layer3 arp enable Enables the debug function of ARP messages.
zte(cfg)#debug protocol snmp disable Disables the debug function for the SNMP
protocol.
zte(cfg)#debug protocol snmp enable Enables the debug function for the SNMP
protocol.
5-185
5-186
Command Function
zte(cfg)#set monitor-link group <1-8> add Adds an uplink port to a monitor-link group.
uplink port <portlist>
zte(cfg)#set monitor-link group <1-8> add Adds an uplink trunk to a monitor-link group.
uplink trunk <trunklist>
zte(cfg)#set monitor-link group <1-8> add Adds a downlink port to a monitor-link group.
downlink port <portlist>
zte(cfg)#set monitor-link group <1-8> add Adds a downlink trunk to a monitor-link group.
downlink trunk <trunklist>
zte(cfg)#set monitor-link group <1-8> delete Deletes an uplink port from a monitor-link group.
uplink port <portlist>
zte(cfg)#set monitor-link group <1-8> delete Deletes an uplink trunk from a monitor-link group.
uplink trunk <trunklist>
zte(cfg)#set monitor-link group <1-8> delete Deletes a downlink port from a monitor-link group.
downlink port <portlist>
zte(cfg)#set monitor-link group <1-8> delete Deletes a downlink trunk from a monitor-link
downlink trunk <trunklist> group.
5-187
Configuration Example
l Configuration Description
See Figure 5-73, the rapid switching duration between active and standby links for
optical interfaces must be shorter than 300 ms, and the switching duration between
active and standby links for electrical interfaces is about 2 seconds. If an electrical
interface is configured to be shut down, the link on the interface is interrupted after
700 ms. The route loop is affected by the switching duration.
l Configuration Flow
5-188
5-189
The hop count from the router to a directly-connected network is 0. After passing a
router, the hop count is incremented by one. To restrict the convergence time, the
metric in RIP must be an integer ranging from 0 to 15. RIP is applicable to small-scale
networks. A hop count of 16 is considered an infinite distance, in other words the
route is considered unreachable. This is a method for RIP to identify and avoid routing
loops.
RIP uses the hop count as the only metric in routing, regardless of the bandwidth,
delay, or other variable factors. The RIP always selects the path with the smallest
hop count as the preferred path, which sometimes may not be the best path.
The default Administrative Distance (AD) of the RIP is 120. The smaller the AD, the
higher the credibility of the route. Compared with other routing protocols, the RIP is
not that reliable.
l Timers
The RIP provides the following four timers:
Type Description
Update timer The switch running the RIP sends an message containing
updated routing information every a specified internal (by
default, 30 seconds) to show all routes of the switch. This
process is called advertisement.
Holddown timer After a route is marked unavailable, the switch enters the
holddown state. The default duration is 180 seconds. The
holddown timer stops counting if the switch receives an update
route within 180 seconds or the 180 seconds run out.
l Route update
The RIP uses route update to spread the changes in the RIP routing domain in time.
An update is triggered if an RIP router detects that an interface stops operating, a
neighboring node crashes, or a new subnet or neighboring node is added. The update
message contains the changed routes only.
The RIP protocol uses poison reverse to speed up protocol convergence. Poison
reverse sets the metrics of the unreachable network prefixes to 16. After receiving
such a route update, the switch discards the route rather than waiting for the aging
time.
5-190
The RIP uses split horizon to prevent routing loops and decrease the size of route
update. The interface receiving a particular route update never send the route update
back in the direction from which it was received.
Some key concepts in the RIP are listed as follows:
l Split horizon
A reverse route refers to the route whose direction is opposite to the actual direction
of data flow. The split horizon is used to prevent reverse routes between two routers.
Simple split horizon: An update message sent from an interface cannot contain any
update received from this interface. If interface A receives a route item, interface A
cannot broadcast any message containing this route item when sending updates.
Thus the router cannot encapsulate a routing table into one or multiple update
messages simply and broadcast the messages through the interfaces on which rip is
started because each interface needs to filter the routes learnt through this interface
when sending a packet.
l Route poisoning and poison reverse
If a route is unreachable, the router sends an update message actively and tags this
route unavailable with the hop count 16, which means that the route is poisoned. Thus
the neighboring routers know that this route is unreachable.
The split horizon prevent an interface from broadcasting routing from the same
direction, but poison reverse, on the contrary, notifies the router that the route is
unreachable. Poisoned reverse split horizon: When an update message is to be
sent to an interface, the route for receiving the update message is unreachable.
Poison reverse sets the metrics of the unreachable routes to 16 and then sends the
message through the source port.
l Triggered update
The RIP uses triggered update to prevent routing loops among multiple routers and
speed up network convergence. If the metric of a route changes, the router sends an
update message to the neighboring router rather than waiting for the update period.
l Infinite
A route with the metric 16 is unreachable. When a routing loop occurs, the metric of
a route is set to 16, and the route is unreachable.
The operation principles of the RIP are described as follows:
The RIP protocol defines two types of messages: request messages and response
messages. A request message is used to send an update request to a neighboring
switch, while a response message carries the route update information.
1. Upon startup of RIP, the initial routing table only contains the routes to the interfaces
directly connected to the local router. RIP then sends a request message to each
interface.
5-191
2. Upon receiving the request message through one interface, a neighboring router
constructs a response message that contains its routing table and sends it to the
network corresponding to the interface.
3. Upon receiving the response message from the neighboring router, the local router
constructs its own routing table, increases the received route metric by 1, and sets the
next hop to the address of the neighboring router.
4. The router periodically (default period: 30 seconds) sends a response message con-
taining its routing table.
5. Upon receiving a response message from a neighbor, the RIP router calculates the
route metric in the message, compares it with the route metric in the local routing
table, and updates its routing table. If the received metric is 16 or the route is not
updated within the timeout time (default: 180 seconds), the metric is set to 16, which
indicates that the route is invalid.
6. The router continues sending routing information to notify its neighbors that the route
is invalid.
7. When the metric of a route entry becomes unreachable, the metric is advertised four
times (120 seconds) in a response message, and then the route is deleted.
RIP Configuration
The RIP configuration includes the following commands:
Command Function
zte(cfg-router)#set rip version {send | Sets the versions for sending and receiving RIP
recv}<0-2> messages.
5-192
Switch1 and Switch2 are connected while Switch2 and Switch3 are connected. The
RIP (RIPv1) is enabled on the devices. Then you can check the routing tables on
each device.
l Configuration Flow
Run the following commands on Switch1:
Set layer-2 attributes for the port:
Switch1(cfg)#set vlan 100 add port 1 untag
Switch1(cfg)#set port 1 pvid 100
Switch1(cfg)#set vlan 100 enable
Set RIP:
Switch1(cfg-router)#set rip enable
Switch1(cfg-router)#set rip vlan 100 enable
Switch1(cfg-router)#set rip version send 0
Switch1(cfg-router)#set rip version recv 0
5-193
Set RIP:
Switch2(cfg-router)#set rip enable
Switch2(cfg-router)#set rip vlan 100 enable
Switch2(cfg-router)#set rip vlan 1000 enable
Switch2(cfg-router)#set rip version send 0
Switch2(cfg-router)#set rip version recv 0
Set RIP:
Switch3(cfg-router)#set rip enable
Switch3(cfg-router)#set rip vlan 1000 enable
Switch3(cfg-router)#set rip version send 0
Switch3(cfg-router)#set rip version recv 0
l Configuration Verification
5-194
Switch2:
Switch2(cfg)#show iproute
Total: 2
Type IpAddress Mask Gateway Metric IpPort
------ --------------- --------------- --------------- ------ ------
direct 195.168.100.0 255.255.255.0 195.168.100.11 0 1
direct 195.168.10.0 255.255.255.0 195.168.10.11 0 2
Run the following command on Switch2. The command execution result shows that
Switch3 learns the network segment 195.168.100.0 from Switch2.
Switch3(cfg)#show iproute
Total: 2
Type IpAddress Mask Gateway Metric IpPort
------ --------------- --------------- --------------- ------ ------
direct 195.168.10.0 255.255.255.0 195.168.10.13 0 1
rip 195.168.100.0 255.255.255.0 195.168.10.11 1 1
After learning the network segments on the peer port through the RIP, Switch1 and
Switch3 can be pinged.
5-195
5-196
6.1 Remote-Access
Remote-Access Overview
Remote-Access is a mechanism for limiting network management users to manage the
switch through Telnet, SSH, SNMP and Web, that is, it is used to restrict the access. This
function is to enhance the security of the network management system.
After this function is enabled, specify a network management user to access the switch
only from a specified IP address, the user cannot access the switch from other IP
addresses. When this function is disabled, the network management user can access the
switch through Telnet, SSH, SNMP and Web from any IP address.
Configuring Remote-Access
The Remote-Access configuration includes the following commands:
Command Function
6-1
Command Function
6-2
6.2 SSH
SSH Overview
The Secure Shell (SSH) is a protocol created by the Network Working Group of the Internet
Engineering Task Force (IETF), which is used to offer secure remote access and other
secure network services over an insecure network.
The initial purpose of the SSH protocol is to solve the security problems in interconnected
networks, and to offer a securer substitute for Telnet and Rlogin, although the present
development of the SSH protocol has far exceeded remote access. So, the SSH
connection protocol should support interactive sessions.
The SSH can be used to encrypt all transmitted data. Even if these data is intercepted, no
useful information can be obtained.
At present, the SSH protocol has two incompatible versions: SSH v1.x and SSH v2.x. The
ZXR10 2900E only supports SSH v2.0 and uses the password authentication mode. The
SSH uses TCP port 22.
Configuring SSH
The SSH configuration includes the following commands:
Command Function
6-3
l Configuration Procedure
1. Switch configuration
zte(cfg)#set ssh enable
zte(cfg)#show ssh
SSH is enabled.
There's no ssh user logging in this system.
2. Software configuration
The SSH v2.0 client can use the free software PuTTY developed by Simon
Tatham. The current version supports the client of multiple versions. The settings
when using PuTTY to log in to the switch are as follows.
a. Set the IP address and port number of the SSH server, see Figure 6-2.
Figure 6-2 Setting IP Address and Port Number of the SSH Server
6-4
c. For the first time to log in, user confirmation is needed, see Figure 6-4.
6-5
l Configuration Procedure
Configure the switch:
zte(cfg)#set ssh enable
zte(cfg)#show ssh
SSH is enabled.
There's no ssh user logging in this system.
zte(cfg)#set ssh sftp enable
zte(cfg)#show sftp
SFTP is enabled.
There's no sftp user logging in this system.
6-6
Before logging in to the switch through an SFTP client, set the client on the PC.
Different types of client software provide different SSH and SFTP supports, so the
settings vary. It is recommended that you use SFTP client software such as WinSCP
and Secure FX. WinSCP is SSH open-source graphic SFTP client software operating
in the Windows operating system. The following procedure uses WinSCP as an
example to describe the settings.
1. Set the IP address and port number for the SSH server. SFTP uses port 22. Set
a username and password. See Figure 6-7.
2. From the left navigation tree, select Environment > SFTP, and then set the
parameters (you can use the default settings), see Figure 6-8.
6-7
3. From the left navigation tree, select Preferences. The Preferences dialog box is
displayed, see Figure 6-9.
By default, WinSCP fragments large-size files and adds filepart postfix names.
The ZXR10 2900E does not support extra-long file postfix names, so you must
click Disable in the Enable transfer resume/transfer to temporary filename
for area.
6-8
4. Click OK. The WinSCP Login dialog box is displayed. Click Login. When you
log in to the SFTP server for the first time, the Warning dialog box is displayed,
see Figure 6-10.
6-9
6-10
8. Click Continue. The WinSCP desktop window is displayed, see Figure 6-14.
In the WinSCP desktop window, you can upload or download files.
6.3 Privilege
Privilege Overview
The command level function, that is, the privilege function, refers to leveling the command
lines available for the switch and granting different permissions. With this function, users
of different levels can access the commands of different scopes. This protects switch
configuration from being modified by any user with any permission.
Privilege Configuration
The Privilege configuration includes the following commands:
Command Function
6-11
Command Function
show privilege {default | level [<0-15>]| session [<1-1024>]} (for Displays a specified command
all configuration modes) permission rule.
Users can perform this configuration only when logging in to the switch with the highest
permission (level 15).
l Configuration Procedure
The user privilege(level 11) is less than command privilege(level 12 rule 1).
% Command cannot be performed because of insufficient privilege. (0x40000aab)
Log in to the switch as a user with a permission higher than or equal to the
permission (for example, level 13) and execute the same command. The
command can be properly executed, without the prompt mentioned above.
6-12
6.4 SNMP
SNMP Overview
The SNMP is the most popular network management protocol currently. It involves a series
of protocols and specifications:
l MIB: Management Information Base
l SMI: Structure of Management Information
l SNMP: Simple Network Management Protocol
They offer the means to collect network management information from network
devices. The SNMP also enables the devices to report problems and errors to Network
Management Systems (NMSs). Any network administrator can use the SNMP to manage
the switch. The ZXR10 2900E supports SNMPv1, v2c and v3 (v3 strengthens SNMP
management security based on v1 and v2c).
The SNMP uses the "Management process–Agent process" model to monitor and control
all types of managed network devices. The SNMP network management needs three key
elements:
1. Managed devices. They can communicate over the Internet. Each device contains an
agent.
2. NMS. The network management process should be able to communicate over the
Internet.
3. The protocol used to exchange management information between the agent process
and the NMS, that is, the SNMP.
The NMSs collect data by polling the agents that reside in the managed devices. The
agents in the managed devices can report errors to NMSs at any time before the NMSs
poll them. These errors are called traps. When a trap occurs on a device, the NMSs can
be used to query the device (suppose it is reachable) and obtain more information. SNMP
v2c and v3 also support an inform message (an SNMPv2 Trap that needs a response)
to inform abnormal events to the NMSs. After an NMS receives the inform message,
it sends an acknowledgement message to the switch. If the switch does not receive
the acknowledgement message from the NMS in a period, it resends the original inform
message twice.
All variables in the network are stored in MIBs. The SNMP monitors the network device
status by querying the related object values in the agent MIBs.
SNMP Configuration
The SNMP configuration includes the following commands:
Command Function
6-13
Command Function
zte(cfg-snmp)#set host <A.B.C.D> trap {v1 <string>| v2c Sets the IP address, community
<string>| v3 <string>{auth | noauth | priv}} name, username, version, and
security level of the computer
receiving trap information.
zte(cfg-snmp)#set host <A.B.C.D> inform { v2c <string>| v3 Sets the IP address, community
<string>{auth | noauth | priv}} name, username, version, and
security level of the computer
receiving inform messages.
6-14
Command Function
zte(cfg-snmp)#set group <string> v3 {auth | noauth | priv}[read Sets an SNMP V3 group name
<string>[write <string>[notify <string>]]] and the group security level.
show snmp {community | engineID | group | host | trap | user | Displays each element of SNMP
view} (all configuration modes) V1, V2C and V3.
Create a community named "zte" with the read/write permission and a view named
"vvv", and then associate the community "zte" with the view "vvv". Set the IP address
of the computer receiving traps to 10.40.92.105, and the community to "zte".
l Configuration Procedure
zte(cfg)#config router
zte(cfg-router)#set ipport 0 ipaddress 10.40.92.200 255.255.255.0
zte(cfg-router)#set ipport 0 vlan 2
zte(cfg-router)#set ipport 0 enable
6-15
zte(cfg-router)#exit
zte(cfg)#config snmp
zte(cfg-snmp)#create community zte private
zte(cfg-snmp)#create view vvv
zte(cfg-snmp)#set community zte view vvv
zte(cfg-snmp)#set host 10.40.92.105 trap v2 zte
zte(cfg)#config snmp
zte(cfg-snmp)#set group ztegroup v3 priv
zte(cfg-snmp)#set user zteuser ztegroup v3 md5-auth zte des56-priv zte
zte(cfg-snmp)#set host 10.40.92.77 inform v3 zteuser priv
6-16
l Configuration Procedure
zte(cfg-snmp)#set trap macnotification enable
zte(cfg-snmp)#set trap macnotification port 1 enable
zte(cfg-snmp)#set trap macnotification history-size 50
zte(cfg-snmp)#set trap macnotification interval 60
l Configuration Verification
If the number of changed MAC entries reaches 50 within one minute, the switch sends
trap information when the number reaches 50 instead of waiting until one minute. The
6-17
number of sent entries is 50. If the number of changed MAC entries does not reach
50 within one minute, the switch sends trap information when one minute expires.
The number of sent entries is less than or equal to 50. By default, the MAC change
notification function is disabled. So, if the MAC change notification function is enabled
globally but it is not enabled on a port, the network management server cannot receive
trap information. In this example, if the MAC entries change on another port instead
of Port 1, trap information is not sent.
6.5 RMON
RMON Overview
The Remote Monitoring (RMON) defines the standard network monitoring function and a
communication interface between the management console and the remote monitor. The
RMON offers an efficient method to monitor the behaviors of subnets while reducing the
load of other agents and management stations.
The RMON specifications refer to the definition of RMON MIB. The ZXR10 2900E supports
four groups of RMON MIB.
l History: records the periodic statistics sample of the information that can be obtained
from the statistics group.
l Statistics: maintains the basic application and error statistics of each subnet that the
agent monitors.
l Event: a table related to all events generated by RMON agents.
l Alarm: allows operators of the management console to set sampling interval and
alarm threshold for any count or integer recorded by RMON agents.
All these groups are used to store the data collected by the monitor and derived data and
statistics data. The alarm group is based on the implementation of the event group. These
data can be obtained through the MIB browser.
The RMON control information can be configured through the MIB browser, or
HyperTerminal or remote Telnet command lines. The RMON sampling information and
statistics data is obtained through the MIB browser.
RMON Configuration
The RMON configuration includes the following commands:
Command Function
6-18
Command Function
6-19
6-20
UndersizePkts :0 Pkts1024to1518Octets: 0
OversizePkts :0 DataSource(port) : 1.3.6.1.2.1.2.2.1.1.16
Status : valid Owner : zteNj
l Configuration Result
After the above configuration, when the number of etherHistoryPkts packets of the
first bucket on port 16 rises over 8 or the number falls below 15, the event with index
2 is triggered. The event with index 2 sends a trap to the management station.
6.6 ZGMP
ZGMP Overview
ZGMP is ZTE Group Manage Protocol. A cluster is a set of switches in a specific broadcast
domain. The switches form a unified management domain, providing an external public
network IP address and management interface, and the ability to manage and access each
member in the cluster.
The management switch which is configured with a public network IP address is called a
command switch. Other switches serve as member switches. In normal cases, a member
switch is not configured with a public network IP address. A private address is allocated to
each member switch through the DHCP function of the command switch. The command
switch and member switches form a cluster (private network).
In general, the broadcast domain where a cluster is located consists of switches of four
roles: command switch, member switches, candidate switches and independent switches.
One cluster has only one command switch. The command switch can automatically collect
the device topology and set up a cluster. After a cluster is set up, the command switch
provides a cluster management channel to manage member switches. Member switches
serve as candidate switches before they join the cluster. The switches that do not support
cluster management are called independent switches.
It is recommended that you isolate the broadcast domain between the public network
and the private network on the command switch and shield direct access to the private
address. The command switch provides an external management and maintenance
channel to manage the cluster in a centralized manner.
6-21
For changeover rules of the four roles of switches within a cluster, see Figure 6-17.
6-22
ZGMP Configuration
The ZGMP configuration includes the following commands:
Command Function
show zdp neighbour detail (all configuration modes) Displays detailed ZDP neighbor
information.
6-23
Command Function
show ztp mac <HH.HH.HH.HH.HH.HH> (all configuration modes) Displays detailed information of
a device according to the MAC
address.
zte(cfg-group)#set group mac-mode {standard | extend [mac Sets a protocol multicast address
<HH.HH.HH.HH.HH.HH>]} of cluster management.
show group member [<1-253>] (all configuration modes) Displays a member switch or all
member switches.
6-24
Command Function
rlogin {commander | member <1-253>}(all configuration modes) Remotely logs in to the cluster
device.
l Configuration Procedure
1. Configure the public network IP address of the command switch and the gateway.
zte(cfg)#set vlan 2525 enable
zte(cfg)#set vlan 2525 add port 1-24 tag
zte(cfg)#config router
6-25
6-26
6.7 sFlow
sFlow Overview
The sFlow is a technique to monitor high-speed data transmission network. It uses an
sFlow proxy embedded in network equipment to send sampled data packets to sFlow
collectors.
6-27
sFlow Configuration
The sFlow configuration includes the following commands:
Command Function
zte(cfg)#set sFlow ingress sample-mode {all | forward} Sets the sFlow ingress sampling
mode.
zte(cfg)#set sflow {ingress | egress} port <portlist> packet-sample Disables sFlow sampling on a port
off or ports.
zte(cfg)#set sflow {ingress | egress} port <portlist> Enables sFlow sampling based
packet-sample on frequency <2-16000000>[time-range on ports, or binds a time range to
<word>] ports.
6.8 Web
Web Management Overview
The ZXR10 2900E provides an embedded Web server stored in the Flash memory, which
allows user to use a standard Web browser (it is recommended to use IE6.0 above and
1024×768 resolution) for managing the remote switch.
6-28
3. Enter a username and a password, and select a user privilege. The Admin user needs
to enter a login password and a management password. Guest users only need to
enter a login password. Click Login to log in to the system main page, see Figure
6-20.
Click the directory tree on the left of the system main page, Configuration > System.
The system information page (by default, Configuration directory is expansive) is
displayed, see Figure 6-21.
6-29
Parameter Description
6-30
Parameter Description
Note:
Port linkdown means that port hasn't a physical connection. The displayed values of
"Duplex" and "Speed" are meaningless.
6-31
Parameter Description
Click the Config button in the line of the port to be configured on the port configuration
information page. The configuration page of this port is displayed, see Figure 6-24.
6-32
Configure the attribute of the selected port on this page. After configuration, click the
Apply button to complete the configuration.
Note:
"Security" and "MacLimit" are conflicting. The two attributes cannot be set to be
enabled at the same time.
Caution!
If the port connected to the network management computer is disabled, the network
management is interrupted.
6-33
Set the attributes on this page, and then click Apply to complete the configuration.
l VLAN Management
VLAN Information Check
Click the directory tree on the left of the main page, Configuration > VLAN > Vlan
Overview. The VLAN information page is displayed, displaying the VLAN information
that is operated currently. If the VLAN hasn't been operated, the default VLAN will be
displayed. See Figure 6-26.
If the number of VLANs to be displayed is more than 20, they will be displayed by page
and page number is displayed at the bottom right corner. You can click previous or
next to turn pages or select a page number from the GO drop-down list box.
6-34
Parameter Description
2. Enter a VLAN number (for example, "1, 3-5"), and click Apply. A single VLAN
configuration page or bulk VLAN configuration page is displayed.
6-35
After setting some attributes of the VLAN on this page, click Apply to
complete the configuration.
Note:
When configuring port/trunk in the VLAN, you can enter port/trunk number in
the text box with the format "1, 3-5". You can also select the corresponding
check boxes to add them into the VLAN.
Admin of Select items is used to enable the VLAN. Port is ordinary port of
bulk VLAN configuration. Trunk is trunk group of bulk VLAN configuration.
6-36
After setting some attributes on this page, click Apply to complete the
configuration.
l PLAN Management
PVLAN Information Check
Click Configuration > PVLAN > Pvlan Overview on the left of the main page. The
PVLAN information page is displayed, see Figure 6-30.
Parameter Description
PVLAN Configuration
Click Configuration > PVLAN > Pvlan Configure on the left of the main page. The
PVLAN configuration page is displayed, see Figure 6-31.
6-37
Parameter Description
After setting some attributes on this page, click Apply to submit. When system is
configured successfully, the configured information page will be displayed.
l Port Mirroring Management
Port Mirroring Information Check
Click Configuration > MIRROR > Mirror Overview on the left of the main page. The
mirror information page is displayed, see Figure 6-32.
6-38
Parameter Description
The source port and destination port can be configured on this page. After setting,
click Apply to complete the configuration.
l LACP Management
6-39
Parameter Description
Parameter Description
Set basic attributes of "AdminStatus" and "LacpPriority" on this page and set attributes
of "LacpTime" and "LacpActive" of the aggregation port. After setting, click Apply to
complete the configuration.
When setting the same configuration of bulk aggregation port attribute, click the
corresponding check box to select multiple aggregation ports (select Select All to
select all ports), and then click Set. The configuration page of bulk aggregation port
is displayed, see Figure 6-35.
6-40
After setting attributes of the aggregation port on this page, click Apply to submit.
Aggregation Group Information Check
Click Configuration > Lacp > Lacp State on the left of the main page. The
aggregation group information page is displayed, see Figure 6-36.
Parameter Description
6-41
Click Config of the right column. The corresponding aggregation group configuration
page is displayed, see Figure 6-37.
You can configure the "Aggregator Mode" attribute of the aggregation group on
this page, bind ports with the aggregation group (select ports in the port available
column, and click ) and release ports from the aggregation group (select ports in
the aggregation port column, and click ).
Note:
Only the ports with the same attribute can be bound into the same aggregation group.
Each aggregation group can bind up to 8 ports.
Caution!
Do not bind the port connected to the network management computer to an
aggregation group. Otherwise, the network management will be interrupted.
Monitoring Information
l Terminal Log Check
Click Monitoring > Terminal Log on the left of the main page. The terminal log
information page is displayed, see Figure 6-38.
6-42
l Statistics data
Parameter Description
6-43
Parameter Description
System Maintenance
l Configuration Saving Page
Click Maintenance > Save on the left of the main page. The saving configuration
information page is displayed, see Figure 6-41.
6-44
Caution!
Saving configuration will cover the original configuration file. Make sure that the
configuration need to be covered before clicking Ok.
l Configuring Reboot
Click Maintenance > Reboot on the left of the main page. The reboot function page
is displayed, see Figure 6-42.
6-45
l Uploading File
à Click Maintenance > Upload on the left of the main page. The file upload page
is displayed, see Figure 6-43.
à Click Browse... to browse and select the file to be uploaded. Click OK to upload
the file.
Note:
For safety and application, only "zImage", "zImage.bak", "bootrom.bin", "start
run.dat" and "to_permmac.dat" can be uploaded.
Caution!
Make sure the legality and validity of files to be uploaded. The uploaded file will cover
the original file. If the operation is not correct, the switch cannot work. Unprofessional
personnel are not recommended to use this function.
l User Management
Click Maintenance > User Manager on the left of the main page. The user
management page is displayed, see Figure 6-44.
6-46
By default, the Modify tab is displayed. Modify the login password and management
password of the user, and then click Apply to submit.
l Adding User
Click the add button on the user management page. The adding user page is
displayed, see Figure 6-45.
Click the add button on the user management page. The adding user page is
displayed, see Figure 6-45.
6-47
Enter the password of the current user on this page, enter the information about the
user to be added, and then click Apply to submit.
l Deleting User
Click the Delete button on the user management page. The deleting user page is
displayed, see Figure 6-47.
6.9 M_Button
Introduction to the M_Button Function
The M_button function is used to display the key statistics data and indicate the key events
through the panel indicators, which facilitates device maintenance.
6-48
For a description of the port indicators on the ZXR10 2900E, refer to Table 6-1.
SPD On (green) The port speed is the same as the default port
speed.
6-49
Note:
In STA mode, if a port is added to multiple instances, the indicator of the port indicates the
STA state in the first instance.
6-50
2. In a mode, if the mode button is not pressed in 3 minutes, the device exits from this
mode automatically to the LINK mode. If the button is pressed, the device enters the
next mode. The corresponding mode indicator begins flashing, which is as described
in 1.
3. In the PING mode, a ping packet is sent once per 20 seconds. In other modes, the
statuses are updated in real time.
6.10 Telnet
Telnet Overview
As a member of the TCP/IP protocol family, the Telnet protocol is the standard protocol for
the remote Internet login service. With this protocol, users can perform operations on a
remote switch through a local PC.
A ZTE switch can be used as both a Telnet client and a Telnet server.
User can set the listening port number when the device is logged in to through Telnet, also
user can set the port number and source IP address when the device is used as a Telnet
client to log in to another device.
Telnet Configuration
The Telnet configuration includes the following commands:
Command Function
6-51
l Configuration Procedure
1. Configure the switch
By default, the Telnet server function is enabled. You can use the following
command to make sure that the function is enabled.
zte(cfg)#show Telnet
Telnet server is enable
Telnet server is listening on port 23
2. Configure the PC
Note:
Windows 2000 provides the Telnet client and server programs. Telnet.exe
is the client program and tlntsvr.exe is the server program. In addition,
Windows 2000 provides the Telnet server management program tlntadmn.exe.
By default, the Telnet service is installed in Windows 2000.
6-52
6-53
6-54
7-1
Maintenance Period
For the maintenance period of the Ethernet switch, refer to Table 7-1.
Example 1
zte(cfg)#show vct port 1
Cable Test Result for Port 1
RX PAIR : /* Wiring pair for receiving data in the twisted pair cable */
Cable Test Passed. No problem found.
7-2
Example 2
zte(cfg)#show vct port 8
Cable Test Result for Port 8
RX PAIR :
Cable Test Passed. Cable is open.
Approximately 7 meters from the tested port.
TX PAIR :
Cable Test Passed. Cable is open.
Approximately 6 meters from the tested port.
Fault Analysis
1. The configuration cable is incorrect.
2. The serial port attributes of HyperTerminal are incorrect, or the serial port is faulty.
3. The console port of the switch is faulty.
7-3
Solution
1. Use a correct configuration cable.
2. Check the serial port attributes of HyperTerminal. The correct settings are as follows:
Bits per Second (baud rate) is 9600, Data bit is 8, Parity is None, and Flow control
is None. Verify that the serial port is normal and replace the terminal if necessary.
3. Verity that the Console port of the switch is normal.
Fault Analysis
1. The port PVID is incorrect.
2. The port is disabled.
3. The VLAN bound to the IP port is disabled.
4. The IP address, subnet mask or default gateway of the switch is incorrect.
5. The IP address of the switch conflicted with the IP address of another device.
6. The wrong REMOTE ACCESS setting of the switch caused the IP address to be filtered
out.
Solution
1. Set the port PVID to be the same as the VLAN ID to which the port belongs.
2. Enable the port.
3. Enable the VLAN bound to the IP port.
4. Configure a valid IP address, subnet mask and default gateway for the switch.
5. Modify the IP address of the switch or another device to remove the IP address conflict.
6. Set REMOTE ACCESS to "any".
Fault Analysis
1. The browser version is too low.
2. An incorrect address or port number was entered in the address bar.
3. The communication between the local computer and the switch failed.
4. The switch did not configure a management port or the IP address of the switch is
incorrect.
7-4
Solution
1. Upgrade the browser version on the local computer to at least IE 6.0.
2. Check the switch configuration to obtain a correct IP address and port number.
3. Check the line between the local computer and the switch to ensure that the
communication is normal.
4. Configure a correct management port and IP address for the switch.
5. Enable the Web management function of the switch and set a port number.
Fault Analysis
The username or password used to log in to the switch is incorrect.
Solution
First of all, confirm whether the system administrator can find the original username and
password. If the system administrator cannot find the original username and password,
reboot the switch and delete the configuration file. The operation procedure is as follows:
1. Reboot the switch and press any key on the HyperTerminal to enter the boot state.
ZXR10 2928E BootRom Version v1.15
Compiled May 21 2012 08:57:22
Copyright (c) 2010 by ZTE Corporation.
7-5
startrun.dat 671
to_permmac.dat 98304
[bootManager]: rm startrun.dat
[bootManager]: ls
/cfg/
to_permmac.dat 98304
[bootManager]:
4. After the switch is rebooted, use the default username and password to log in to the
switch.
Fault Analysis
An incorrect password was used when the user tried to enter global configuration mode.
Solution
For the handling method, refer to 7.3.5 Login Username or Password Lost.
7-6
Note
Before the switch is rebooted, record the current configuration for reconfiguration.
Fault Analysis
1. The port PVID is incorrect.
2. The ports are disabled.
3. The VLAN bound to the ports is disabled.
4. When the ports were added in the VLAN, tag was selected.
5. IP addresses of the devices were not set or not in the same network segment.
Solution
1. Set the port PVID to be the same as the VLAN ID to which the ports belong.
2. Enable all the ports used.
3. Enable the VLAN used.
4. Add the ports in the VLAN again, and select untag.
5. Set correct IP addresses for the devices.
7-7
config nas
radius isp test defaultisp enable
radius isp test sharedsecret amtium
/*Shared key negotiated with company B*/
radius isp test add accounting 10.150.12.101
/*Address of the authentication and accounting server of company B*/
radius isp test add authentication 10.150.12.101
/*Address of the authentication and accounting server of company B*/
radius isp test client 172.16.0.181
/*ISP name and IP address accessing the switch*/
aaa-control port 1-24 dot1x enable
aaa-control port 1-24 accounting enable
aaa-control port 1-24 port-mode auto
When the configuration was completed, the authentication of some computers in B1, B2
and B3 timed out.
Fault Analysis
The students' accounts and configuration were correct, and the configuration of the ZXR10
2900E was correct. Even if ZTE's maintenance engineers replaced the faulty switch with
a new one, the problem still existed. The diagnosis result was that the interconnection
between devices of ZTE and company B was faulty.
By capturing packets, ZTE's maintenance engineers found that the ZXR10 2900E sent a
Radius Access Request message to the authentication and accounting server of company
B, but did not receive a response message. In normal circumstance, the Radius message
receiving and sending procedure is as follows:
1. When the server accesses the switch, the switch sends an Access Request message.
2. The server returns an Access Challenge message.
3. The switch sends an Access Request message again.
4. The server returns an Access Accept message.
5. The switch sends an Accounting Request message.
6. The server returns an Accounting Response message.
Because the authentication data packet flows captured on the two same ZXR10 2900E
devices were not the same, the diagnosis result was that the configuration of the
authentication and accounting server of company B was incorrect. Engineers of company
B checked alarms on the authentication and accounting server, and an alarm "AP not
support user auth type" was located. That is, authentication types of the server and
the switch were different. When the back-end configuration of the authentication and
accounting server was checked, it was found that the shared key on the switches of
buildings B1, B2 and B3 was set to "antium", but the negotiated key was "amtium".
7-8
Solution
The engineers of company B change the shared key to "amtium", and the problem is solved
completely.
Fault Analysis
After checking the network management system, maintenance engineers found that the
eleven switches were disconnected and failed to be pinged. The maintenance engineers
arrived at the weak electricity well in which four switches were installed, accessed the
switch whose IP address was 172.168.0.123 through HyperTerminal, and found its CPU
usage reached 93%–100%. The maintenance engineers checked the alarm information
and configuration information, but no exception was found. The maintenance engineers
then accessed the convergence layer switch T40G and found an alarm "port 4 receives
too many ARP broadcast packets". After checking the traffic on this port, the maintenance
engineers found that about 100,000 broadcast packets were added every ten seconds.
After analyzing the ZXR10 2900E connected to the port, the maintenance engineers found
the following conditions:
1. There was a loop on the user side.
2. A user's computer was infected by a virus and sent broadcast packets continuously.
3. A user's computer was installed with the ARP attack software and sent ARP attack
packets continuously.
The IP address of the ZXR10 2900E connected to the port was 172.168.0.111. The
maintenance engineers connected the switch through a network cable and captured
packets. After analyzing the packets, the maintenance engineers found that a computer
with the MAC address "00:19:e0:a9:5a:fc" sent ARP broadcast packets continuously.
Based on the label on the network cable, the computer was in room 2606. After the
maintenance engineers removed its network cable, the eleven switches recovered normal
and CPU utilization was no more than 5%.
Solution
1. Filter out the MAC address of the computer on the access layer switch and prohibit it
from accessing the Internet.
2. Notify the central equipment room of the school to prohibit the computer from
accessing the Internet before its hard disk is formatted and the system is reinstalled.
3. Install an ARP virus kill tool on all computers.
7-9
7-10
II
III
IV
VI
VII
VIII
CCM
- Continuity Check Message
CFM
- Connectivity Fault Management
CIST
- Common and Internal Spanning Tree
CoS
- Class of Service
CST
- Common Spanning Tree
C-VLAN
- Customer VLAN
DAI
- Dynamic ARP Inspection
DHCP
- Dynamic Host Configuration Protocol
DM
- Delay Measurement
IX
DoS
- Denial of Service
DSCP
- Differentiated Services Code Point
EAPOL
- Extensible Authentication Protocol Over LAN
EAPS
- Ethernet Automatic Protection Switching
ERPS
- Ethernet Ring Protection Switching
FTP
- File Transfer Protocol
GARP
- Generic Attribute Registration Protocol
GVRP
- GARP VLAN Registration Protocol
IETF
- Internet Engineering Task Force
IGMP
- Internet Group Management Protocol
IGP
- Interior Gateway Protocol
IP
- Internet Protocol
IPTV
- Internet Protocol Television
IST
- Internal Spanning Tree
LACP
- Link Aggregation Control Protocol
LBM
- Loopback Message
LBR
- Loopback Reply
LCK
- Locked
LLDP
- Link Layer Discovery Protocol
LM
- Loss Measurement
LTM
- Link Trace Message
LTR
- Link Trace Reply
MDI/MDIX
- Media-Dependent Interface/Media-Dependent Interface-crossover
MEP
- Maintenance association End Point
MFF
- MAC-Forced Forwarding
MIB
- Management Information Base
MIP
- Maintenance domain Intermediate Point
MLD
- Multicast Listener Discovery
MST
- Multiple Spanning Tree
MSTP
- Multiple Spanning Tree Protocol
NAS
- Network Access Service
NMS
- Network Management System
NTP
- Network Time Protocol
OAM
- Operation, Administration and Maintenance
OUI
- Organizationally Unique Identifier
PE
- Provider Edge
PoE
- Power over Ethernet
PPPoE
- Point to Point Protocol over Ethernet
XI
PVLAN
- Private Virtual Local Area Network
QoS
- Quality of Service
RADIUS
- Remote Authentication Dial In User Service
RDI
- Remote Defect Indication
RIP
- Routing Information Protocol
RMON
- Remote Monitoring
RPL
- Ring Protection Link
RSTP
- Rapid Spanning Tree Protocol
SBT
- Side Smart Bias Tee
SNMP
- Simple Network Management Protocol
SP
- Strict Priority
SQinQ
- Selective QinQ
SSH
- Secure Shell
SSL
- Secure Sockets Layer
STP
- Spanning Tree Protocol
TACACS+
- Terminal Access Controller Access-Control System Plus
TC
- Traffic Classification
TCP
- Transmission Control Protocol
TDR
- Time Domain Reflectometry
XII
TFTP
- Trivial File Transfer Protocol
UDLD
- Unidirectional Link Detection
UDP
- User Datagram Protocol
VBAS
- Virtual Broadband Access Server
VLAN
- Virtual Local Area Network
VPN
- Virtual Private Network
WRR
- Weighted Round Robin
ZDP
- ZTE Discovery Protocol
ZESR
- ZTE Ethernet Switch Ring
ZESS
- ZTE Ethernet Smart Switch
ZTP
- ZTE Topology Protocol
XIII