ETS-1-10G-A: Ethernet Aggregation Switches
ETS-1-10G-A: Ethernet Aggregation Switches
Installation and
ETS-1-10G-A
Ethernet Aggregation Switches
Version 5.5.4.2
© 2019–2020 RAD Data Communications Ltd.
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD"). No part
of this publication may be reproduced in any form whatsoever without prior written approval by RAD
Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets, and other
intellectual property or other proprietary rights relating to this manual and to the ETS-1-10G-A and any
software components contained therein are proprietary products of RAD protected under international
copyright law and shall be and remain solely with RAD.
The ETS-1-10G-A product name is owned by RAD. No right, license, or interest to such trademark is
granted hereunder, and you agree that no such right, license, or interest shall be asserted by you with
respect to such trademark. RAD products/technologies are protected by registered patents. To review
specifically which product is covered by which patent, please see ipr.rad.com. The RAD name, logo,
logotype, and the product names Airmux, IPmux, MiNID, MiCLK, Optimux, and SecFlow are registered
trademarks of RAD Data Communications Ltd. All other trademarks are the property of their respective
holders.
You shall not copy, reverse compile, or reverse assemble all or any portion of the Manual or the ETS-1-
10G-A. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute, license,
or sell any product that supports substantially similar functionality as the ETS-1-10G-A, based on or
derived in any way from the ETS-1-10G-A. Your undertaking in this paragraph shall survive the
termination of this Agreement.
This Agreement is effective upon your opening of the ETS-1-10G-A package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof. Upon such
termination by RAD, you agree to return to RAD the ETS-1-10G-A and all copies and portions thereof.
Contact Information
For further information, contact RAD at the address below, or contact your local business partner.
International Headquarters North American Headquarters
24 Raoul Wallenberg St., Tel Aviv 6971923, Israel 900 Corporate Drive, Mahwah, NJ 07430, USA
Tel 972-3-6458181 | Fax 972-3-7604732 Tel 201-529-1100 | Toll Free: 800-444-7234 | Fax: 201-529-5777
Email [email protected] Email [email protected]
www.rad.com | radcare-online.rad.com
Publication No. 751-207-06/20
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETS-1-10G-A to be delivered hereunder shall be
free of defects in material and workmanship under normal use and service for a period of twelve (12)
months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by reason of
material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall have the
option to choose the appropriate corrective action: a) supply a replacement part, or b) request return of
equipment to its plant for repair, or c) perform necessary repair at the equipment's location. In the
event that RAD requests the return of equipment, each party shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has been
subjected to misuse, neglect, accident, or improper installation, or if repairs or modifications were made
by persons other than RAD's own authorized service personnel, unless such repairs by others were made
with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties
which extend beyond the face hereof, including, but not limited to, warranties of merchantability and
fitness for a particular purpose, and in no event shall RAD be liable for consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not limited to,
lost profits from any cause whatsoever arising from or in any way connected with the manufacture, sale,
handling, repair, maintenance, or use of the ETS-1-10G-A, and in no event shall RAD's liability exceed the
purchase price of the ETS-1-10G-A.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes relating to
ETS-1-10G-A and for ensuring that replacements and other adjustments required in connection with the
said warranties are satisfactory.
Software components in the ETS-1-10G-A are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a particular
purpose. RAD shall not be liable for any loss of use, interruption of business, or indirect, special,
incidental or consequential damages of any kind. In spite of the above, RAD shall do its best to provide
error-free software products and shall offer free Software updates during the warranty period under
this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any claims,
demands, or actions arising out of or relating to this Agreement and the ETS-1-10G-A shall not exceed
the sum paid to RAD for the purchase of the ETS-1-10G-A. In no event shall RAD be liable for any
indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD has been
advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of Israel.
Safety and Disposal (English)
General Safety Instructions
The following instructions serve as a general guide for the safe installation and operation of
telecommunications products. Additional instructions, if applicable, are included inside the manual.
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates
potential safety hazards regarding product operation or maintenance to
operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable is attached near the
optical transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:
• Before turning on the equipment, make sure that the fiber-optic cable is
intact and is connected to the transmitter.
• Do not attempt to adjust the laser drive current.
• Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
• The use of optical devices with the equipment increases eye hazard.
• Use of controls, adjustments, or performing procedures other than those
specified herein may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
ETS-1-10G-A Safety and Disposal (English) 5
In some cases, the users may insert their own SFP laser transceivers into the product. Users are alerted
that RAD cannot be held responsible for any damage that may result if non-compliant transceivers are
used. In particular, users are warned to use only agency approved products that comply with the local
laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation, and maintenance of this
product. Only qualified and authorized service personnel should carry out adjustment, maintenance or
repairs to this product. No installation, adjustment, maintenance, or repairs should be performed by
either the operator or the user.
Before working on equipment connected to power lines or telecommunication lines, remove jewelry or
any other metallic object that may come into contact with energized parts.
Unless otherwise specified, all products are intended to be grounded during normal use. Grounding is
provided by connecting the mains plug to a wall socket with a protective ground terminal. If a ground
lug is provided on the product, it should be connected to the protective ground at all times, by a wire of
diameter 18 AWG or wider. Rack-mounted equipment should be mounted only in grounded racks and
cabinets.
Always make the ground connection first and disconnect it last. Do not connect telecommunication
cables to ungrounded equipment. Make sure that all other cables are disconnected before
disconnecting the ground.
Some products may have panels secured by thumbscrews with a slotted head. These panels may cover
hazardous circuits or parts, such as power supplies. These thumbscrews should therefore always be
tightened securely with a screwdriver after both initial installation and subsequent access to the panels.
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power to the
product is 16A (20A for USA and Canada). The circuit breaker in the building installation should have
high breaking capacity and must operate at short-circuit current exceeding 35A (40A for USA and
Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power switch is
provided in the equipment, set it to the OFF position. If the power cord cannot be readily disconnected
in case of emergency, make sure that a readily accessible circuit breaker or emergency switch is installed
in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference to the
ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting the DC
supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the installation
complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power to the
product is 16A (20A for USA and Canada). The circuit breaker in the building installation should have
high breaking capacity and must operate at short-circuit current exceeding 35A (40A for USA and
Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate the
circuit breaker of the panel board that services the equipment and switch it to the OFF position. When
connecting the DC supply wires, first connect the ground wire to the corresponding terminal, then the
positive pole, and last the negative pole. Switch the circuit breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated in the
building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
The following table lists the status of several standard interfaces. If the status of a given port differs
from the standard one, a notice is given in the manual.
Ports Safety Status
V.11, V.28, V.35, V.36, RS-530, X.21, SELV: Safety Extra Low Voltage:
10BaseT, 100BaseT, 1000BaseT, • Ports which do not present a safety hazard. Usually up to 30 VAC
Unbalanced E1, E2, E3, STM, DS-2, DS-3, or 60 VDC.
S-Interface ISDN, Analog voice E&M
xDSL (without feeding voltage), TNV-1: Telecommunication Network Voltage-1:
Balanced E1, T1, Sub E1/T1, POE • Ports whose normal operating voltage is within the limits of SELV,
on which overvoltages from telecommunications networks are
possible.
FXS (Foreign Exchange Subscriber) TNV-2: Telecommunication Network Voltage-2:
• Ports whose normal operating voltage exceeds the limits of SELV
(usually up to 120 VDC or telephone ringing voltages), on which
overvoltages from telecommunication networks are not possible.
• These ports are not permitted to be directly connected to
external telephone and data lines.
FXO (Foreign Exchange Office), xDSL TNV-3: Telecommunication Network Voltage-3:
(with feeding voltage), U-Interface ISDN • Ports whose normal operating voltage exceeds the limits of SELV
(usually up to 120 VDC or telephone ringing voltages), on which
overvoltages from telecommunication networks are possible.
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance of a
qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables. Do not
disconnect the ground connection before disconnecting all telecommunication cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables. Extra
caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both ends. The
grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk, there are
restrictions on the diameter of wires in the telecom cables, between the equipment and the mating
connectors.
ETS-1-10G-A Safety and Disposal (English) 8
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Warning
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In such
cases, a notice is given in the installation instructions.
A good ground connection is essential. When installing the equipment in a rack, make sure to remove all
traces of paint from the mounting points. Use suitable lock-washers and torque. If an external grounding
lug is provided, connect it to the ground bus using braided wire as short as possible.
The equipment is designed to comply with EMC requirements when connecting it with unshielded
twisted pair (UTP) cables with the exception of 1000BaseT ports that must always use shielded twisted
pair cables of good quality (CAT 5E or higher). However, the use of shielded wires is always
recommended, especially for high-rate data. In some cases, when unshielded wires are used, ferrite
cores should be installed on certain cables. In such cases, special instructions are provided in the
manual.
Disconnect all wires which are not in permanent use, such as cables used for one-time configuration.
The compliance of the equipment with the regulations for conducted emission on the data lines is
dependent on the cable quality. The emission is tested for UTP with 80 dB longitudinal conversion loss
(LCL).
Unless otherwise specified or described in the manual, TNV-1 and TNV-3 ports provide secondary
protection against surges on the data lines. Primary protectors should be provided in the building
installation.
The equipment is designed to provide adequate protection against electrostatic discharge (ESD).
However, it is good working practice to use caution when connecting cables terminated with plastic
connectors (without a grounded metal hood, such as flat cables) to sensitive data lines. Before
connecting such cables, discharge yourself by touching ground or wear an ESD preventive wrist strap.
ETS-1-10G-A Safety and Disposal (English) 9
Warning
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the unit’s use,
customers should provide for its collection for reuse, recycling, or other form
of environmentally conscientious disposal.
Sécurité et élimination (français)
Instructions générales de sécurité
Les instructions suivantes servent de guide général d'installation et d'opération sécurisées des produits
de télécommunications. Des instructions supplémentaires sont éventuellement indiquées dans le
manuel.
Symboles de sécurité
Ce symbole peut apparaitre sur l'équipement ou dans le texte. Il indique des
risques potentiels de sécurité pour l'opérateur ou le personnel de service,
quant à l’utilisation du produit ou à sa maintenance.
Avertissement
Danger de choc électrique ! Evitez tout contact avec la surface marquée tant
que le produit est sous tension ou connecté à des lignes externes de
télécommunications.
Certains produits peuvent être équipés d'une diode laser. Dans de tels cas,
une étiquette indiquant la classe laser (ainsi que d'autres avertissements le
cas échéant) sera jointe près du transmetteur optique. Le symbole
d'avertissement laser peut aussi être joint.
Veuillez observer les précautions suivantes :
• Avant la mise en marche de l'équipement, assurez-vous que le câble de
fibre optique est intact et qu'il est connecté au transmetteur.
• Ne tentez pas d'ajuster le courant de la commande laser.
• N'utilisez pas des câbles ou connecteurs de fibre optique cassés ou sans
terminaison et n'observez pas directement un rayon laser.
• L'usage de périphériques optiques avec l'équipement augmentera le
risque pour les yeux.
• L'usage de contrôles, ajustages ou procédures autres que celles
spécifiées ici pourrait résulter en une dangereuse exposition aux
radiations.
ATTENTION : Le rayon laser peut être invisible !
Les utilisateurs pourront, dans certains cas, insérer leurs propres émetteurs-récepteurs Laser SFP dans le
produit. Les utilisateurs sont avertis que RAD ne pourra pas être tenue responsable de tout dommage
pouvant résulter de l'utilisation d'émetteurs-récepteurs non conformes. Plus particulièrement, les
utilisateurs sont avertis de n'utiliser que des produits approuvés par l'agence et conformes à la
réglementation locale de sécurité laser pour les produits laser de classe 1.
Avant de travailler sur un équipement connecté aux lignes de tension ou de télécommunications, retirez
vos bijoux ou tout autre objet métallique pouvant venir en contact avec les pièces sous tension.
ETS-1-10G-A Sécurité et élimination (français) 12
Sauf s'il en est autrement indiqué, tous les produits sont destinés à être mis à la terre durant l'usage
normal. La mise à la terre est fournie par la connexion de la fiche principale à une prise murale équipée
d'une borne protectrice de mise à la terre. Si une cosse de mise à la terre est fournie avec le produit, elle
devrait être connectée à tout moment à une mise à la terre de protection par un conducteur de
diamètre 18 AWG ou plus. L'équipement monté en châssis ne devrait être monté que sur des châssis et
dans des armoires mises à la terre.
Branchez toujours la mise à la terre en premier et débranchez-la en dernier. Ne branchez pas des câbles
de télécommunications à un équipement qui n'est pas mis à la terre. Assurez-vous que tous les autres
câbles sont débranchés avant de déconnecter la mise à la terre.
Certains produits peuvent avoir des panneaux sécurisés par des vis papillons avec une tête fendue. Ces
panneaux peuvent couvrir des circuits ou des composants dangereux, tels que les alimentations
électriques. Ces vis papillons devront par conséquent être solidement serrées avec un tournevis après
chaque installation initiale et chaque accès ultérieur aux panneaux.
Branchez toujours la fiche de secteur à une prise murale équipée d'une borne protectrice de mise à la
terre.
Connexion d'alimentation CC
Sauf s'il en est autrement spécifié dans le manuel, l'entrée CC de l'équipement est flottante par rapport
à la mise à la terre. Tout pôle doit être mis à la terre en externe.
A cause de la capacité de courant des systèmes à alimentation CC, des précautions devraient être prises
lors de la connexion de l'alimentation CC pour éviter des courts-circuits et des risques d'incendie.
ETS-1-10G-A Sécurité et élimination (français) 13
Assurez-vous que l'alimentation CC est isolée de toute source de courant CA (secteur) et que
l'installation est conforme à la réglementation locale.
Avant la connexion des câbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est pas
sous tension. Localisez le coupe-circuit dans le tableau desservant l'équipement et fixez-le en position
OFF. Lors de la connexion de câbles d'alimentation CC, connectez d'abord le conducteur de mise à la
terre à la borne correspondante, puis le pôle positif et en dernier, le pôle négatif. Remettez le coupe-
circuit en position ON.
Le disjoncteur devrait déconnecter simultanément les deux pôles si l'alimentation en courant CC est
flottante.
Le tableau suivant liste les statuts de plusieurs interfaces standards. Si le statut d’un port donné diffère
d’un standard, une notification sera fournie dans le manuel.
Ports Niveau de sécurité
V.11, V.28, V.35, V.36, RS-530, X.21, TBTS (Très Basse Tension de Sécurité):
10BaseT, 100BaseT, 1000BaseT, • Ports qui ne présentent pas un danger pour la sécurité.
Unbalanced E1, E2, E3, STM, DS-2, DS-3, Généralement jusqu’à 30 VAC (courant alternatif) ou 60 VDC
S-Interface ISDN (RNIS), Voix analogique (courant continu).
E&M
xDSL (sans tension d’alimentation), TNV-1 (Tension de Réseau de Télécommunications-1):
Balanced E1, T1, Sub E1/T1, POE • Ports dont la tension de fonctionnement normal est comprise
dans les limites des interfaces SELV (TBTS), sur lesquelles des
surtensions provenant des réseaux de télécommunications sont
possibles.
ETS-1-10G-A Sécurité et élimination (français) 14
Toujours connecter un port donné à un port de même niveau de sécurité. En cas de doute, solliciter
l’assistance d’un ingénieur de sécurité qualifié.
Toujours s’assurer que l’équipement est relié à la terre avant de connecter des câbles de
télécommunications. Ne pas déconnecter la connexion à la terre avant la déconnexion de tous les câbles
de télécommunications.
Certains circuits SELV et non-SELV utilisent les memes connecteurs. Soyez prudents lors de la connexion
des câbles. Une extrême prudence est requise en cas d’orages.
En cas d’utilisation de cables blindés ou coaxiaux, vérifier qu’il y a bien une connexion à la terre aux deux
extrémités. Le raccordement à la terre et la liaison à la prise de terre doivent être conformes à la
réglementation locale.
Avertissement
ETS-1-10G-A Sécurité et élimination (français) 15
Certains ports sont uniquement adaptés à une connexion à un câblage interne ou à un câblage non
exposé. Dans ce cas, une notification sera fournie dans les instructions d’installation.
Une bonne connexion à la terre est essentielle. Lors de l'installation de l'équipement dans un rack,
veillez à éliminer toute trace de peinture des points de montage. Utilisez des rondelles de blocage et un
couple appropriés. Si une cosse de mise à la terre externe est fournie, connectez-la au bus de terre à
l'aide d'un fil tressé aussi court que possible.
L’équipement est conçu pour répondre aux exigences CEM lors de la connexion avec des câbles à paires
torsadées non blindées (UTP), à l’exception des ports 1000BaseT, qui doivent toujours utiliser des câbles
à paires torsadées blindés de bonne qualité (CAT 5E ou supérieure). Cependant, l'utilisation de câbles
blindés est toujours recommandée, en particulier pour les données à haut débit. Dans certains cas,
lorsque des câbles non blindés sont utilisés, des noyaux en ferrite doivent être installés sur certains
câbles. Dans ce cas, des instructions spéciales sont fournies dans le manuel.
Débranchez tous les câbles qui ne sont pas utilisés de manière permanente, tels que les câbles utilisés
pour une configuration unique.
Sauf indication contraire ou décrite dans le manuel, les ports TNV-1 et TNV-3 offrent une protection
secondaire contre les surtensions sur les lignes de données. Des protections primaires doivent être
fournies dans l’installation du bâtiment.
L'équipement est conçu pour fournir une protection adéquate contre les décharges électrostatiques
(DES). Toutefois, il est recommandé de faire preuve de prudence lors du raccordement de câbles munis
de connecteurs en plastique (sans capot métallique mis à la terre, tels que des câbles plats) sur des
lignes de données sensibles. Avant de connecter ces câbles, déchargez-vous en touchant le sol ou portez
un bracelet antistatique.
ETS-1-10G-A Sécurité et élimination (français) 16
Avertissement
Élimination du produit
Afin de faciliter la réutilisation, le recyclage ainsi que d'autres formes de
récupération d'équipement mis au rebut dans le cadre de la protection de
l'environnement, il est demandé au propriétaire de ce produit RAD de ne pas
mettre ce dernier au rebut en tant que déchet municipal non trié, une fois
que le produit est arrivé en fin de cycle de vie. Le client devrait proposer des
solutions de réutilisation, de recyclage ou toute autre forme de mise au
rebut de cette unité dans un esprit de protection de l'environnement,
lorsqu'il aura fini de l'utiliser.
Sicherheit und Entsorgung (Deutsch)
Allgemeine Sicherheitsanleitung
Die folgenden Anleitungen dienen als allgemeiner Leitfaden für die sichere Installation und Bedienung
von Telekommunikationsprodukten. Zusätzliche Anleitungen sind im Nutzerhandbuch vorhanden.
Sicherheitssymbole
Dieses Symbol kann auf ihren Geraeten oder im Text auftauchen. Es weist
den Nutzer oder das Servicepersonal auf möglche Gefahren bei der
Bedienung der Geräte hin.
Achtung
Gefahr eines elektrischen Schlages! Vermeiden Sie jeglichen Kontakt mit der
gekennzeichneten Oberfläche während das Gerät unter Spannung steht
oder an auβenliegende Telekommunikationsleitungen angeschlossen ist.
In einigen Fällen werden Nutzer eigene SFP-Lasertransceiver in das Gerät einführen. Nutzer sind darauf
hingewiesen, dass RAD nicht verantwortlich zeichnet für Beschädigungen, die von nicht kompatiblen
Transceivern herrühren. Nutzer seien ferner darauf hingewiesen, daβ ausschlieβlich amtlich zugelassene
Produkte eingesetzt werden sollten, die den ortsüblichen Sicherheitsbestimmungen für Lasergeräte der
Laserklasse 1 entsprechen.
Beachten Sie ferner die üblichen Sicherheitsmaβnahmen während der Installation, des Betriebs, der
Wartung oder der Reparatur des Gerätes. Installationen, Einstellungen und Reparaturen sollten weder
vom Nutzer oder dem zuständigen Operator durchgeführt werden.
Legen Sie Schmuck oder sonstige Metallobjekte ab, bevor Sie mit Geräten arbeiten, die an das Netz oder
Telekommunikationsleitungen angeschlossen sind, um zu verhindern, daβ dies mit spannungsgeladenen
Bauteilen in Berührung kommen.
Falls nicht anders angegeben, sollten alle Produkte bei normalem Gebrauch geerdet werden. Die Erdung
erfolgt durch den Anschlss an eine Steckdose mit Schutzerdung. Wenn das Gerät mit einer
Erdungslasche ausgestattet ist, sollte diese immer an die Schutzerde angeschlossen sein mit einem
Kabel, das einen Durchmesser von mindestens 18 AWG aufweist. Geräte für die Rack-Montage sollten
ausschlieβlich in geerdeten Racks oder Schränken montiert werden.
Schlieβen Sie grundsätzlich zuerst die Schutzerde an und klemmen Sie diese zuletzt ab. Schlieβen Sie
keine Telekommunikationskabel an nicht geerdete Geräte an. Stellen Sie sicher, dass alle anderen Kabel
abgeklemmt sind, bevor Sie die Erdung abklemmen.
Die Frontpanele einiger Geräte sind mit Flügelschrauben mit Schlitz gesichert. Diese Paneele decken
gefährliche Schalkreise oder Teile, wie zum Beispiel Netzteile ab. Diese Flügelschrauben sollten daher
immer mittels eines Schraubenziehers sicher angezogen werden nach der Erstinstallation und jedem
späterem Zugriff auf die Paneele.
Stecken Sie den Stecker immer in eine Steckdose mit Schutzerdung ein.
Der maximal mögliche Stromfluss im Bereich des Verteilerstromkreis, der die Stromversorgung des
Gerätes sicherstellt, ist 16 A (20A in den USA und in Kanada). Der Schutzschalter in der
Gebäudeinstallation muss starke Ströme unterbrechen können und muss den Stromfluss bei 35A (40A in
den USA und Kanada) unterbrechen.
Schlieβen Sie das Netzkabel zuerst an das Gerät und dann an die Steckdose an. Falls ein Ein/Aus-Schalter
zur Verfügung steht, schalten Sie diesen auf AUS (OFF). Falls das Netzkabel im Notfall nicht schnell
herausgezogen werden kann, stellen Sie sicher, daβ ein Schutzschalter oder Notschalter Bestandteil der
elektrischen Installation des Gebäudes ist.
Falls die Stromversorgung über einen IT Netz-Verteiler erfolgt, muss der Schalter die Stromversorgung
zu beiden Polen gleichzeitig unterbrechen.
Aufgrund der Fähigkeit, hohe Stromflüsse zu verarbeiten, muss sorgfältig vorgegangen werden beim
Anschluss der Gleichstromquelle, um Kurzschlüsse und Brände zu vermeiden.
Stellen Sie sicher, daβ Gleichstromquellen (DC) von Wechselstromquellen (AC) isoliert sind und daβ die
Installation den örtlichen Richtlinien entspricht.
Der maximal mögliche Stromfluss im Bereich des Verteilerstromkreis, der die Stromversorgung des
Gerätes sicherstellt, ist 16 A (20A in den USA und in Kanada). Der Schutzschalter in der
Gebäudeinstallation muss starke Ströme unterbrechen können und muss den Stromfluss bei 35A (40A in
den USA und Kanada) unterbrechen.
Vor dem Anschluss der Gleichstrom-Speisekabel ist sicher zu stellen, daβ kein Strom über den
Gleichstromkreis flieβt. Finden Sie den Schutzschalter an der Schalttafel, die das Gerät bedient, und
schalten Sie ihn auf AUS (OFF). Wenn Sie die Gleichstrohmdrähte anschlieβen, schliessen Sie zuerst den
Erdungsdraht an das zugehörige Terminal an, dann den Pluspol und zuletzt den Minuspol. Schalten Sie
den Schutzschalter zurück auf AN (ON).
Ein verfügbares nicht angeschlossenes Gerät, das ordnungsgemäβ genehmigt und abgenommen wurde,
sollte in die bestehende Installation eingebaut werden.
Falls die Gleichstromspannung schwankt, muss der Schalter beide Pole gleichzeitig trennen.
V.11, V.28, V.35, V.36, RS-530, X.21, SELV: Besonders niedrige Sicherheitsspannung (Safety Extra Low
10BaseT, 100BaseT, 1000BaseT, Voltage)
Unsymmetrisches E1, E2, E3, STM, DS-2, • Anschlüsse, die kein Sicherheitsrisiko darstellen, normalerweise
DS-3, S-Schnittstelle ISDN bis zu 30 VAC oder 60 VDC
xDSL (ohne Einspeisungsspannung), TNV-1: Telekommunikationsnetzwerkspannung 1
symmetrisches E1, T1, Sub-E1/T1, POE (Telecommunication Network Voltage-1):
• Anschlüsse, deren Betriebsspannung innerhalb der SELV-Limits
liegt und für die eine Überspannung von
Telekommunikationsnetzwerken möglich ist.
ETS-1-10G-A Sicherheit und Entsorgung (Deutsch) 21
Schnittstellen Sicherheitsstatus
Verbinden Sie Anschlüsse, die denselben Sicherstatus aufweisen. Wenn Sie nicht sicher sind, wenden Sie
sich bitte an einen qualifizierten Sicherheitsingenieur.
Vergewissern Sie sich immer, daβ das Gerät geerdet ist bevor Sie Telekommunikationskabel
anschlieβen. Klemmen Sie die Erdung nie ab, bevor Sie Telekommunikationskabel abklemmen.
Einige SELV und Nicht-SELV-Stromkreise nutzen dieselben Stecker. Seien Sie vorsichtig, wenn Sie Kabel
anschlieβen. Seien Sie besonders vorsichtig während einem Gewitter.
Wenn Sie abgeschirmte -, oder Koaxialkabel nutzen, stellen Sie sicher, daβ diese an beiden Enden eine
gute Erdung aufweisen.
Wenn auβenliegende Kabel und Wechselstromleitungen (AC) in Kontakt kommen, kann die Verkabelung
innerhalb des Gebäudes beschädigt werden oder einen Brand auslösen. Um dieses Risiko zu verringern,
gibt es Bestimmungen zum Durchmesser von Telekommunikationskabeln zwischen den Geräten und
den Anschlüssen.
Um das Brandrisiko zu reduzieren, setzen Sie ausschließlich 26 AWG oder
dickere Telekommunikationskabel ein.
Achtung
Einige Anschlüsse eignen sich lediglich für Verbindungen zu gebäude-internen oder nicht
außenliegenden Verkabelungen. Auf solche Fälle wird in der Installationsanleitung gesondert
hingewiesen.
Versuchen Sie nicht, die vom Carrier erhaltene Ausrüstung oder Verbindungselemente zu manipulieren.
ETS-1-10G-A Sicherheit und Entsorgung (Deutsch) 22
Eine gute Erdung ist wesentlich. Wenn die Ausrüstung in einem Rack montiert wird, stellen Sie sicher,
daβ jegliche Farbspuren von den Befestigungspunkten entfernt sind. Benutzen Sie geeignete
Sicherungsscheiben und das richtige Drehmoment. Falls eine externe Erdungsmutter zur Verfügung
steht, schließen Sie diese an den Erdbus an mittels kürzestmöglichem verdrillten Draht.
Die Ausrüstung ist ausgelegt, um den Anforderungen der EMC zu entsprechen, wenn man sie mit nicht
abgeschirmten und verdrillten (UTP) Kabeln anschließt mit Ausnahme von 1000BaseT-Anschlüssen, die
grundsätzlich mit abgeschirmten verdrillten Kabeln hoher Qualität (CAT 5E oder besser) erfordern. Im
Allgemeinen ist die Verwendung von abgeschirmten Kabeln immer empfohlen, besonders für schnellen
Datendurchsatz. Beim Einsatz nicht abgeschirmter Kabel wird in manchen Fällen empfohlen, einen
Ferritkern an bestimmten Kabeln anzubringen. In diesen Fällen werden im Benutzerhandbuch
gesonderte Anleitungen bereitgestellt.
Klemmen Sie alle Kabel ab, die nicht permanent in Gebrauch sind, wie zum Beispiel solche, die fuer eine
einmalige Konfiguration eingesetzt wurden.
Die Einhaltung der Regeln für elektromagnetische Leitungsemissionen an den Datenleitungen hängt von
der Kabelqualität ab. Die Emission wurde für UDP mit 80 db Längsumwandlungsdämpfung (LCL)
getestet.
Falls im Benutzerhandbuch nicht anders spezifiziert oder beschrieben, bieten TNV-1 und TNV-3
Anschlüsse lediglich sekundären Schutz gegen Überspannungen in den Datenleitungen. Primäre
Protektoren müssen innerhalb der Gebäudeinstallation bereitgestellt werden.
Die Ausrüstung ist ausgelegt, ausreichenden Schutz gegen elektrostatische Entladung (ESD) zu bieten. Es
ist jedoch empfehlenswert, vorsichtig zu agieren, wenn Kabel mit Plastikanschlüssen (ohne geerdete
Metallhalterung wie bei flachen Kabeln) und empfindliche Datenleitungen angeschlossen werden. Vor
dem Anschliessen solcher Kabel, entladen Sie sich selbst durch Berührung des Bodens oder durch das
Tragen eines ESD-präventiven Bandes um das Handgelenk.
Kanadische Emissionsbestimmungen
Dieses digitale Gerät der Klasse A erfüllt alle Vorgaben der Kanadischen Regulierungen für Geräte, die
Störeffekte haben können (Canadian Interference-Causing Equipment Regulation).
Over the last few years, more and more large-scale projects are utilising NGN concept in
communication network development. One of the main tasks in implementing large multiservice
networks is to create reliable high-performance backbone networks for multilayer architecture of next-
generation networks.
High-speed data transmission, especially in large-scale networks, requires a network topology that
will allow flexible distribution of high-speed data flows.
ETS-1-10G-A series switches could be used in large enterprise networks, SMB networks and
operator's networks. These switches deliver high performance, flexibility, security, and multi-tier QoS.
ETS-1-10G-A switches provide better availability due to protection of nodes that enable fail-over
operation and backup of power and ventilation modules.
This operation manual describes intended use, specifications, first-time set-up recommendations,
and the syntax of commands used for configuration, monitoring and firmware update of the switches.
ETS-1-10G-A 2. Product Description 30
2 Product Description
2.1 Purpose
ETS-1-10G-A series aggregation switches are high-performance devices equipped with 10GBASE-R,
1000BASE-X interfaces and designed for use in carrier networks as aggregation devices and in small data
centers.
The device’s ports support operation at rates of 1 Gbps (SFP) and 10 Gbps (SFP+) that provides
flexible using and ability of smooth transition to higher data rates. Non-blocking switch fabric ensures
correct packet processing with minimal and predictable latency at maximum load for all types of traffic.
Reduntant fans and AC or DC power supplies along with a comprehensive hardware monitoring
system ensure high reliability. The devices allow hot swapping of power and ventilation modules providing
smooth network operation.
Basic Features
Table 1 lists the basic administrable features of switches of this series.
Table 1 – Basic features of the device
Head-of-Line blocking HOL blocking occurs when device output ports are overloaded with traffic coming
(HOL) from input ports. It may lead to data transfer delays and packet loss.
The ability to support the transmission of super-long frames, which allows data to be
Jumbo frames transmitted by a smaller number of packets. This reduces overhead, processing time
and interruptions.
ETS-1-10G-A 2. Product Description 31
With flow control you can interconnect low-speed and high-speed devices. For avoid
Flow control
buffer overrun, the low-speed device can send PAUSE packets that will force the high-
(IEEE 802.3X) speed device to pause packet transmission.
You can combine multiple switches in a stack. In this case, switches are considered as
Operation in device a single device with shared settings. There are two stack topologies — ring and chain.
stack All ports of each stack unit must be configured from the master switch. Device
stacking allows for reducing network management efforts.
The switch creates an in-memory look-up table which contains mac-addresses and
MAC Address Table
due ports.
When learning is not available, the incoming data on a port will be transmitted to all
other ports of the switch. Learning mode allows the switch to analyse the frame,
Learning mode discover sender's MAC address and add it to the routing table. Then, if the destination
MAC address of an Ethernet frames is already in the routing table, that frame will be
sent only to the port specified in the table.
MAC Multicast support
This feature enables one-to-many and many-to-many data distribution. Thus, the
(MAC Multicast
frame addressed to a multicast group will be transmitted to each port of the group.
support)
Automatic Aging for
If there are no packets from a device with a specific MAC address in a specific period,
MAC Addresses
the entry for this address expires and will be removed. It keeps the switch table up to
(Automatic Aging for date.
MAC Addresses)
Static MAC Entries The network switch allows to define static MAC entries that will be saved in the
(Static MAC Entries) switching table.
Layer 2 Features
The following table lists second-layer functions and special aspects (OSI Layer 2).
ETS-1-10G-A 2. Product Description 32
This feature isolates the ports in a group (in a single switch) located in the same
Private VLAN Edge broadcast domain from each other, allowing traffic exchange with other ports that
are located in the same broadcast domain but do not belong to this group.
Enables isolation of devices located in the same broadcast domain within the entire
Private VLAN (light
L2 network. Only two port operation modes are implemented—Promiscuous and
version) Isolated (isolated ports cannot exchange traffic).
Spanning Tree Protocol is a network protocol that ensures loop-free network
topology by converting networks with redundant links to a spanning tree topology.
Spanning Tree Protocol
Switches exchange configuration messages using frames in a specific format and
selectively enable or disable traffic transmission to ports.
IEEE 802.1w Rapid
Rapid STP (RSTP) is the enhanced version of the STP that enables faster convergence
spanning tree protocol
of a network to a spanning tree topology and provides higher stability.
The protocol is used for increasing stability and reliability of data transmission
ERPS (Ethernet Ring
network having ring topology. It is realized by reducing recovery network time in
Protection Switching)
case of breakdown.Recovery time does not exceed 1 second. It is much less than
protocol network change over time in case of spanning tree protocols usage.
VLAN is a group of switch ports that form a single broadcast domain. The switch
VLAN
supports various packet classification methods to identify the VLAN they belong to.
ETS-1-10G-A 2. Product Description 33
The LACP enables automatic aggregation of separate links between two devices
(switch-switch or switch-server) in a single data communication channel.
Link aggregation with
The protocol constantly monitors whether link aggregation is possible; in case one
LACP link in the aggregated channel fails, its traffic will be automatically redistributed to
functioning components of the aggregated channel.
The device allows for link group creation. Link aggregation, trunking or IEEE 802.3ad
is a technology that enables aggregation of multiple physical links into one logical
link. This leads to greater bandwidth and reliability of the backbone 'switch-switch'
LAG group creation
or 'switch-server' channels. There are three types of balancing—based on MAC
addresses, IP addresses or destination port (socket).
A LAG group contains ports with the same speed operating in full-duplex mode.
Layer 3 Features
Table lists third-layer functions (OSI Layer 3).
Table 4 – Layer 3 Features description (Layer 3)
The switch administrator can add or remove static entries into/from the routing table.
Static IP routes
Address Resolution ARP maps the IP address and the physical address of the device. The mapping is
Protocol established on the basis of the network host response analysis; the host address is
requested by a broadcast packet.
RIP The dynamic routing protocol that allows routers to get new routing information from
(Routing Information the neighbour routers. This protocol detects optimum routes on the basis of hops
Protocol) count data.
IGMP Proxy is a feature that allows simplified routing of multicast data between
IGMP Proxy function
networks. IGMP is used for routing management.
A dynamic routing protocol that is based on a link-state technology and uses
OSPF protocol (Open
Dijkstra's algorithm to find the shortest route. OSPF protocol distributes information
Shortest Path First) on available routes between routers in a single autonomous system.
Virtual Router VRRP is designed for backup of routers acting as default gateways. This is achieved
Redundancy Protocol by joining IP interfaces of the group of routers into one virtual interface which will
(VRRP) be used as the default gateway for the computers of the network.
The Protocol-Independent Multicast protocols for IP networks were created to
address the problem of multicast routing. PIM relies on traditional routing protocols
PIM protocol (such as, Border Gateway Protocol) rather than creates its own network topology. It
uses unicast routing to verify RPF. Routers perform this verification to ensure loop-
free forwarding of multicast traffic.
QoS Features
Table 5 lists the basic quality of service features.
The switch supports egress traffic prioritization with queues for each port. Packets
Priority queues support
are distributed into queues by classifying them by various fields in packet headers.
802.1p standard specifies the method for indicating and using frame priority to
802.1p class of service ensure on-time delivery of time-critical traffic. 802.1p standard defines 8 priority
support levels. The switches can use 802.1p priority value to assign frames to priority queues.
ETS-1-10G-A 2. Product Description 35
Security features
Table 6 – Security features
A switch feature designed for protection from DHCP attacks. Enable filtering of DHCP
messages coming from untrusted ports by building and maintaining DHCP snooping
DHCP snooping
binding database. DHCP snooping performs functions of a firewall between untrusted
ports and DHCP servers.
An option to tell the DHCP server about the DHCP relay and port of the incoming
request.
DHCP Option 82
By default, the switch with DHCP snooping feature enabled identifies and drops all
DHCP requests with Option 82, if they were received via an untrusted port.
UDP Relay Broadcast UDP traffic forwarding to the specified IP address.
DHCP server performs centralised management of network addresses and
DHCP server features corresponding configuration parameters, and automatically provides them to
subscribers.
The switch feature that restricts and filters IP traffic according to the mapping table
IP Source address guard from the DHCP snooping binding database and statically configured IP addresses. This
feature is used to prevent IP address spoofing.
A switch feature designed for protection from ARP attacks. The switch checks the
Dynamic ARP message received from the untrusted port: if the IP address in the body of the
Inspection (Protection) received ARP packet matches the source IP address.
If these addresses do not match, the switch drops this packet.
L2 – L3 – L4 ACL (Access Using information from the level 2, 3, 4 headers, the administrator can configure up
Control List) to 1024 rules for processing or dropping packets.
Time-Based ACL Allow you to configure the time frame for ACL operation.
The key feature of blocking is to improve the network security; access to the switch
Blocked ports support port will be granted only to those devices whose MAC addresses were assigned for
this port.
Port based IEEE 802.1x authentication mechanism manages access to resources through an
authentication (802.1x external server. Authorized users will gain access to the specified network resources.
standard)
ETS-1-10G-A 2. Product Description 36
Uploading and Device parameters are saved into the configuration file that contains configuration
downloading the data for the specific device ports as well as for the whole system.
configuration file
The TFTP is used for file read and write operations. This protocol is based on UDP
Trivial File Transfer transport protocol.
Protocol (TFTP) The devices are able to download and transfer configuration files and firmware
images via this protocol.
SCP is used for file read and write operations. This protocol is based on SSH network
Secure Copy protocol protocol.
(SCP) The devices are able to download and transfer configuration files and firmware
images via this protocol.
Remote network monitoring (RMON) is an extension of SNMP that enables
monitoring of computer networks. Compatible devices gather diagnostics data using
Remote monitoring
the network management station. RMON is a standard MIB database that contains
(RMON) actual and historic MAC-level statistics and control objects that provide real-time
data.
Simple Network SNMP is used for monitoring and management of network devices. To control system
Management Protocol access, the community entry list is defined where each entry contains access
(SNMP) privileges.
Switches can be managed using CLI locally via serial port RS-232, or remotely via
Command Line telnet or ssh. Console command line interface (CLI) is an industrial standard. CLI
Interface (CLI) interpreter provides a list of commands and keywords that help the user and reduce
the amount of input data.
Syslog is a protocol designed for transmission of system event messages and error
Syslog
notifications to remote servers.
SNTP SNTP is a network time synchronization protocol; it is used to synchronize time on a
(Simple Network Time network device with the server and can achieve accuracy of up to 1 ms.
Protocol)
Traceroute is a service feature that allows the user to display data transfer routes in
Traceroute
IP networks.
Privilege level
The administrator can define privilege levels for device users and settings for each
controlled access
privilege level (read-only - level 1, full access - level 15).
management
ETS-1-10G-A 2. Product Description 37
The switch can block access to each management interface (SNMP, CLI). Each type of
access can be blocked independently:
Management interface
Telnet (CLI over Telnet Session)
blocking Secure Shell (CLI over SSH)
SNMP
Local authentication Passwords for local authentication can be stored in the switch database.
IP address filtering for Access via SNMP is allowed only for specific IP addresses that are the part of the SNMP
SNMP community.
RADIUS is used for authentication, authorization and accounting. RADIUS server uses
RADIUS client a user database that contains authentication data for each user. The switches
implement a RADIUS client.
(TACACS+) The device supports client authentication with TACACS+ protocol. The TACACS+
Terminal Access protocol provides a centralized security system that handles user authentication and
Controller Access a centralized management system to ensure compatibility with RADIUS and other
Control System authentication mechanisms.
SSH server functionality allows SSH clients to establish secure connection to the
SSH server
device for management purposes.
Macrocommand This feature allows the user to create sets of commands–macrocommands–and user
support them to configure the device.
Additional Features
Table lists additional device features.
The device can be used to test the optical transceiver. During testing, parameters such
Optical transceiver
as current and supply voltage, transceiver temperature are monitored.
diagnostics Implementation requires support of these functions in the transceiver.
This mechanism reduces power consumption of the switch by disabling inactive
Green Ethernet
electric ports.
General parameters
1x10/100/1000BASE-T (ООВ)
Interfaces
24x10GBASE-R (SFP+)/1000BASE-X (SFP)
Buffer memory 3 MB
RAM (DDR3) 1 GB
1
For each host in the ARP table, an entry is created in the routing table
ETS-1-10G-A 2. Product Description 39
Power consumption
max 68 W
ETS-1-10G-A 2. Product Description 40
Dimensions
430х275х44 mm
Operating temperature range -10 to +45°C
Storage temperature range -50 to +70оС
Before the first switch-on after storage at a tempera
Storage temperature range lower than -20оС or higher than +50оС, it is necessa
keep the switch at room temperature for at least
hours.
2.4 Design
This section describes the design of devices. Depicted front, rear, and side panels of the device,
connectors, LED indicators and controls.
Table 10 lists connectors, LEDs and controls located on the front panel of the switches.
Table 10 – Description of connectors, LEDs and controls located on ETS-1-10G-A front panel
6 USB port
ETS-1-10G-A 2. Product Description 42
Side panels of the device have air vents for heat removal. Do not block air vents. This may cause the
components to overheat, which may result in device malfunction. For recommendations on device
installation, see section 'Installation and connection'.
Light Indication
Ethernet interface status is represented by two LEDs: green LINK/ACT and amber SPEED. Location
of LEDs is shown in Figures 5, 6.
This section describes installation of the equipment into a rack and connection to a power supply.
1. Align four selected mounting holes in the support bracket with the corresponding holes in
the side panel of the device.
2. Use a screwdriver to screw the support bracket to the case.
3. Repeat steps 1 and 2 for the second support bracket.
Do not block air vents and fans located on the rear panel to avoid components overheating
and subsequent switch malfunction.
From the electric point of view, both places for power module installation are equivalent. In the
terms of device operation, the power module located closer to the edge is considered as the main module,
and the one closer to the centre—as the backup module. Power modules can be inserted and removed
without powering the device off. When an additional power module is inserted or removed, the switch
continues to operate without reboot.
ETS-1-10G-A 3. Installation and Connections 49
You can check the state of power modules by viewing the indication on the front panel of the switch
(see Section 0) or by checking diagnostics available through the switch management interfaces.
Power module fault indication may be caused not only by the module failure, but also by the
absence of the primary power supply.
1. Insert the top SFP module into a slot with its open side down, and the bottom SFP module
with its open side up.
2. Push the module. When it is in place, you should hear a distinctive 'click'.
BootROM 1.43
Booting from SPI flash
Running UBOOT...
The switch firmware will be automatically loaded two seconds after POST is completed. For
execution to specific procedures, you can use the startup menu. To do this, you will interrupt the startup
procedure by pressing <Esc> or <Enter>.
After successful startup, you will see the CLI interface prompt.
>lcli
Console baud-rate auto detection is enabled, press Enter twice to complete the
detection process
User Name:
Detected speed: 115200
User Name:admin
Password:***** (admin)
console#
To quickly get help for available commands, use key combination SHIFT+?.
ETS-1-10G-A 4. Initial Switch Configuration 54
Startup Menu
[1] Restore Factory Defaults
[2] Password Recovery Procedure
[3] Back
Enter your choice or press 'ESC' to exit:
Function Description
Restore Factory Defaults Restore the factory default configuration
Password Recovery Procedure Reset authentication settings
Back Resume startup
Switch operation in stacking mode Switch stack works as a single device and can include up to 8
devices of the same model with the following roles defined by their sequential number (UID):
− Master (device UID 1 or 2) manages all stack units.
− Backup (device UID 1 or 2) is controlled by the master. Replicates all settings, and takes
over stack management functions in case of the master device failure.
− Slave (device UID 3 or 8) is controlled by the master. Can't work in a standalone mode
(without a master device).
ETS-1-10G-A 4. Initial Switch Configuration 55
In stacking mode, switches use XG ports for synchronization. MES2308 andMES2308P use 1G optical
ports. These ports are not used for data transmission. There are two topologies for device synchronisation:
ring and linear. Ring topology is recommended for increased stack robustness.
By default, switch is master and XLG (XG) ports participate in data transmission.
console(config)#
Example
Configure ETS-1-10G-A for operating in a stacking mode. Set as the second unit and use te1-2
interfaces as stacking interfaces.
console#config
console(config)#stack configuration unit-id 2 links te1-2
console(config)#
console#
Topology is Chain
All unsaved changes will be lost after the device is rebooted. Use the following command
to save all changes made to the switch configuration:
console# write
During initial configuration, you can define which interface will be used for remote connection to
the device.
ETS-1-10G-A 4. Initial Switch Configuration 57
Username and password are required to log in for device administration. Use the following
commands to create a new system user or configure the username, password, or privilege level:
console# configure
console(config)# username name password password privilege {1-15}
Privilege level 1 allows access to the device, but denies configuration. Privilege level 15
allows both the access and configuration of the device.
Example commands to set admin's password as “RAD” and create the “operator” user with the
“pass” password and privilege level 1:
console# configure
console(config)# username admin password RAD
console(config)# username operator password pass privilege 1
console(config)# exit
console#
If the IP address is configured for the physical port or port group interface, this interface
will be deleted from its VLAN group.
ETS-1-10G-A 4. Initial Switch Configuration 58
If all switch IP addresses are deleted, you can access it via IP 192.168.1.239/24.
console# configure
console(config)# interface vlan 1
console(config-if)# ip address 192.168.16.144 /24
console(config-if)# exit
console(config)# ip default-gateway 192.168.16.1
console(config)# exit
console#
To verify that the interface was assigned the correct IP address, enter the following command:
IP Address I/F
I/F Status Type Directed Prec Redirect Status
admin/oper Broadcast
------------------ --------- ---------- ------- --------- ---- -------- ------
192.168.16.144/24 vlan 1 UP/DOWN Static disable No enable Valid
If there is a DHCP server in the network, you can obtain the IP address via DHCP. IP address can be
obtained from DHCP server via any interface—VLAN, physical port, port group.
Configuration example for obtaining dynamic IP address from the DHCP server on the VLAN 1
interface:
console# configure
console(config)# interface vlan 1
console(config-if)# ip address dhcp
ETS-1-10G-A 4. Initial Switch Configuration 59
console(config-if)# exit
console#
To verify that the interface was assigned the correct IP address, enter the following command:
To enable device administration via SNMP, you have to create at least one community string. The
switches support three types of community strings:
Most commonly used community strings are public with read-only access to MIB objects, and
private with read-write access to MIB objects. You can set the IP address of the management station for
each community.
Example of private community creation with read-write access and management station IP address
192.168.16.44:
console# configure
console(config)# snmp-server server
console(config)# snmp-server community private rw 192.168.16.44
console(config)# exit
console#
Use the following command to view the community strings and SNMP settings:
SNMP is enabled.
Version 3 notifications
Target Address Type Username
Security Udp Filter To Retries
Level Port name Sec
---------------- -------- ----------- -------- ----- ------- ----- ---------
System Contact:
System Location:
− Authentication – the process of matching with the existing account in the security system.
− Authorization (access level verification) – the process of defining specific privileges for the
existing account (already authorized) in the system.
− Accounting – user resource consumption monitoring.
The default user name is admin and default password is admin. The password is assigned by the
user. If you lose your password, you can restart the device and interrupt its startup via the serial port by
ETS-1-10G-A 4. Initial Switch Configuration 61
pressing the <Esc> or <Enter> keys in two seconds after the automatic startup message is displayed. The
Startup menu will open where you can initiate password recovery procedure ([2]).
To ensure basic security, you can define the password for the following services:
Enter console in response to the password prompt that appears during the registration in the
console session.
Enter telnet in response to the password prompt that appears during the registration in the telnet
session.
Enter ssh in response to the password prompt that appears during the registration in the SSH
session.
Banner configuration
For your convenience, you can specify a banner, a message with any information. For example:
Location: Bldg 3
ETS-1-10G-A 5. Device management. Command line interface 63
Switch settings can be configured in several modes. Each mode has its own specific set of
commands. Enter the ‘?’ character to view the set of commands available for each mode.
Switching between modes is performed by using special commands. The list of existing modes and
commands for mode switching:
Command mode (EXEC). This mode is available immediately after the switch starts up and you enter
your user name and password (for unprivileged users). System prompt in this mode consists of the device
name (host name) and the ‘>’ character.
console>
Privileged command mode (privileged EXEC). This mode is available immediately after the switch
starts up and you enter your user name and password. System prompt in this mode consists of the device
name (host name) and the ‘#’ character.
console#
Global configuration mode.This mode allows to specify general settings of the switch. Global
configuration mode commands are available in any configuration submode. Use the configure
command to enter this mode.
console# configure
console(config)#
Terminal configuration mode (line configuration).This mode is designed for terminal operation
configuration. You can enter this mode from the global configuration mode.
console>
console#
console>
show parser macro Displays the settings of the configured macros on the
[{brief | description device.
te_port: (1..8/0/1..32);
[interface {
tengigabitethernet group: (1..32);
te_port | port- word: (1..32
channel group}] | characters)
name word}]
console(config-if)#
console>
resume [connection] connection: (1..5)/the last Switch to another established TELNET session.
established session - connection – number of established telnet session.
show users [accounts] Display information on users that consume device
-
resources.
show sessions - Display information on open sessions to remote devices.
show system - Output system information.
show system id [unit unit] Display the serial number of the unit.
unit: (1..8)/-
- unit – the stack unit number.
show system [unit unit] Show switch system information.
unit: (1..8)/-
- unit – the stack unit number.
show system fans [unit unit] Display information about fan status.
unit: (1..8)/-
- unit – the stack unit number.
show system power-supply - Display information about power module state.
show system sensors - Display information about temperature sensors.
show version - Display the current firmware version.
show hardware version - Display the hardware version information.
ETS-1-10G-A 5. Device management. Command line interface 71
show system router - Display the total and used size of hardware tables (routing,
resources neighbours, interfaces).
show system tcam utilization Display TCAM memory (Ternary Content Addressable
[unit unit] unit: (1..8)/- Memory) resource load.
- unit – the stack unit number.
show tasks utilization - Display switch’s CPU utilization for each system process.
show tech-support [config | Display the device information for initial failure
memory] -
diagnostics.
The ‘Show sessions’ command shows all remote connections for the current session. This
command is used as follows:
console#
Tracing the route to RAD.com (148.21.11.69) form , 30 hops max, 18 byte packets
Type Esc to abort.
1 gateway.RAD (192.168.1.101) 0 msec 0 msec 0 msec
2 RADsrv (192.168.0.1) 0 msec 0 msec 0 msec
3 * * *
Field Description
1 The hop number of the router in the path to the specified network node.
gateway.RAD The network name of this router.
192.168.1.101 The IP address of the router.
The time taken by the packet to go to and return from the router. Specify for each packet
0 msec 0 msec 0 msec
transmission attempt.
The errors that occur during execution of the traceroute command are described in the table below.
Switch Telnet software supports special terminal management commands. To enter special
command mode during the active Telnet session, use key combination <Ctrl-shift-6>.
ETS-1-10G-A 5. Device management. Command line interface 73
You can also use additional options in the Telnet and SSH open session commands:
Table 32 – Keywords used in the Telnet and SSH open session commands
Option Description
/echo Locally enable the echo function (suppress console output).
/password Set the password for the SSH server
/quiet Suppress output of all Telnet messages.
/source-interface Specify the source interface.
Activate the processing of the stream that enables insecure TCP connection without
Telnet sequence control. The stream connection will not process Telnet options and
/stream could be used to establish connections to ports where UNIX-to-UNIX (UUCP) copy
programs or other non-telnet protocols are running.
/user Set the user name for the SSH server.
console(config)#
service tasks-utilization Allow the device to measure switch’s CPU utilization for each
system process.
/enabled
no service tasks-utilization Deny the device to measure switch’s CPU utilization for each
system process.
service cpu-utilization Allow the device to perform software based measurement
of the switch CPU load level.
/enabled
no service cpu-utilization Deny the device to perform software based measurement of
the switch CPU load level.
service cpu-input-rate Allow the device to change a speed of the incoming frames
processed by the switch CPU
-/disabled
no service cpu-input-rate Deny the device to programmatically measure the speed of
incoming frames processed by the switch’s CPU.
service cpu-rate-limits traffic Setting the incoming frames restriction for specific traffic
pps type.
traffic: (http, telnet, - pps – packets per second.
ssh, snmp, ip, link-local,
arp, arp-inspection, stp-
bpdu, routing, ip-
options,other-bpdu,
dhcp-snooping, igmp-
snooping, mld-
snooping, sflow, ace,
ip-error, other, vrrp));
pps: 8..2048
no service cpu-rate-limits Restore pps default value for the specific traffic.
traffic
service password-recovery Enable password recovery via‘password recovery procedure’
boot menu with saving configuration.
-/enabled
no service passwordrecovery Enable password recovery via‘password recovery procedure’
boot menu with deleting configuration.
link-flap prevention enable Enable link flapping prevention.
-/enabled
link-flap prevention disable Disable link flapping prevention.
service mirrorconfiguration Create a backup copy of the running configuration.
no service -/enabled Disable copying of the running configuration.
mirrorconfiguration
ETS-1-10G-A 5. Device management. Command line interface 75
system router resources ip_entries: Set the size of the routing table.
[ipentries ip_entries | (8..8024)/5120;
ipv6entries ipv6_entries | ipv6_entries:
ipm-entries ipm_entries | (32..8048)/1024;
ipmv6-entries ipmv6_entries | ipm_entries:
(8..8024)/512;
policy-ip-entries
ipmv6_entries:
ip_policy_routing_entries |
(32..8048)/512;
policy-ipv6-entries ip_policy_routin
ipv6_policy_routing_entries | g_entries:
vlan-mapping-entries (0..128)/64;
vlan_mapping_entries] ipv6_policy_rout
ing_entries:(0..
128)/64;
vlan_mapping_ent
ries:
(0..16272)/0
console(config)#
Keyword Description
Source or destination address for non-volatile memory. Non-volatile memory is used by default if
flash://
the URL address is defined without the prefix (prefixes include: flash:, tftp:, scp:…).
running-config Current configuration file.
mirror-config Copy of the running configuration file
startup-config Initial configuration file.
active-image Active image file
inactive-image Inactive image file
ETS-1-10G-A 5. Device management. Command line interface 77
console#
copy running-config Save the current configuration into the initial configuration.
-
startupconfig
copy running-config file Save the current configuration into the specified backup
-
configuration file.
copy startup-config file Save the initial configuration into the specified backup
-
configuration file.
boot config source_url Copy the configuration file from the server to the initial
-
configuration file.
dir [flash:path | dir_name] - Displays a list of files in the specified directory.
more {flash:file | Displays the contents of the file.
startupconfig | - startup-config – show the content of the initial
runningconfig | configuration file;
mirrorconfig | activeimage
- running-config – show the content of the current
| inactiveimage | logging |
configuration file;
file}
- flash: – display files from the flash memory of the device;
- mirror-config – show the current configuration file content
from the mirror;
file: (1..160) characters - active-image – display the current software image file
version.
- inactive-image – display the current inactive software
image file version.
- logging – display the log file content.
- file – file name;
rename url new_url url, new_url: (1..160) Change the file name.
characters - url – current filename; - new-url – new file name.
The TFTP server cannot be used as the source or destination address for a single copy command.
The switch starts an automatic DHCP-based update process if it is enabled and the name of the text
file (DHCP option 43, 125) containing the name of the firmware image was provided by the DHCP server.
The switch starts the DHCP-based automatic configuration process if the following conditions are
met:
− automatic configuration is allowed in the configuration;
ETS-1-10G-A 5. Device management. Command line interface 80
− the DHCP server response contains the IP address of the TFTP server (DHCP option 66) and the
name of the configuration file (DHCP option 67) in ASCII format.
console(config)#
console#
};
Natalie
host mes2124-test {
hardware ethernet a8:f9:4b:85:a2:00; #mac address of the switch
filename "mesXXX-test.cfg"; #switch configuration name
option image-filename 35265 18 1 16 "mesXXX-401.ros"; #name of the
text
file, that contains firmware
image name
next-server 192.168.1.3; #TFTFP server IP address
fixed-address 192.168.1.36; #switch IP address
}
console#
Table 40 – System time configuration commands in the Privileged EXEC mode
clock summer-time zone The daylight saving Specifies date and time when daylight saving time starts and
recurring {usa | eu | {first | change is disabled by ends for each year.
last | week} day month hh:mm default. - zone – abbreviation of the phrase (zone description);
{first | last | week} day month
- usa – set the daylight saving rules used in the USA (daylight
hh:mm} [offset]
saving starts on the second Sunday of March and ends on the
first Sunday of November, at 2am local time);
- eu – set the daylight saving rules used in EU (daylight saving
starts on the last Sunday of March and ends on the last
Sunday of October, at 1am GMT);
- hh – hours, mm – minutes;
- week – week of month;
- day – day of the week;
- month – month;
- offset – number of minutes added for the daylight saving
change.
Disable daylight saving change
no clock summer-time
no sntp server Delete the server from the NTP server list.
{ipv4_address | ipv6_address |
ipv6_link_local_address%{vlan
{integer} | ch {integer} | isatap
{integer} |
{physical_port_name}} |
hostname}
clock dhcp timezone Get the timezone and daylight saving data from the DHCP
server.
-/denied Prohibit the receipt of the timezone and daylight saving data
no clock dhcp
timezone from the DHCP server.
console(config-if)#
Table 43 – List of system time configuration commands in the interface configuration mode
Time zone:
Acronym is PST
Offset is UTC-8
Summertime:
Acronym is PDT
ETS-1-10G-A 5. Device management. Command line interface 86
Synchronization status is indicated by the additional character before the time value.
Example:
− The dot (.) means that the time is valid, but there is no synchronization with the SNTP server.
− No symbol means that the time is valid and time is synchronized.
− Asterisk (*) means that the time is not valid.
Unicast servers:
Server : 10.10.10.1
Source : Static
Stratum : 3
Status : up
Last Response : 10:37:38.0 UTC Jun 22 2016
Offset : 1040.1794181 mSec
Delay : 0 mSec
Anycast server:
Broadcast:
In the example above, the system time is synchronized with server 10.10.10.1, the last response is
received at 10:37:38; system time mismatch with the server time is equal to 1.04 seconds.
ETS-1-10G-A 5. Device management. Command line interface 87
console# configure
console(config)# time-range range_name, where
range_name – character (1...32) time interval identifier
console(config-time-range)#
periodic list hh:mm to hh:mm Set the time interval within one day of the week or each day
{all | weekday} hh: (0..23);
of the week.
mm: (0..59);
no periodic list hh:mm to weekday: (mon…sun) Delete time interval
hh:mm {all | weekday}
Set a time interval within a week.
periodic weekday hh:mm to
weekday hh:mm hh: (0..23);
mm: (0..59);
weekday: (mon…sun) Delete time interval
no periodic weekday hh:mm to
weekday hh:mm
console# configure
console(config)# interface {tengigabitethernet te_port | oob | port-
channel group | range {…} | loopback loopback_id }
ETS-1-10G-A 5. Device management. Command line interface 88
console(config-if)#
This mode is available from the configuration mode and designed for configuration of interface
parameters (switch port or port group operating in the load distribution mode) or the interface range
parameters.
Command Purpose
interface tengigabitethernet te_port For configuring10G interfaces
interface port-channel group For configuring channel groups
For configuring control interfaces (control interface is not available
interface oob
for all switches)
interface loopback loopback_id For configuring virtual interface
where:
– group – a sequential number of a group, total number in accordance with table (‘Link aggregation
(LAG)’ string);
– te_port – sequential number of 10G interface specified as follows: 1..8/0/1.. 32;
– loopback_id – sequential number of virtual interface corresponding to table (‘Number of virtual
Loopback interfaces’ string).
Interface entry
1..8/0/1..N
The commands entered in the interface configuration mode are applied to the selected interface.
Below are given the commands for entering in the configuration mode of the 10th Ethernet
interface located on the first stack unit and for entering in the configuration mode of channel group 1.
console# configure
console(config)# interface tengigabitethernet 1/0/10
console(config-if)#
console# configure
console(config)# interface port-channel 1
console(config-if)#
ETS-1-10G-A 5. Device management. Command line interface 89
Commands entered in this mode are applied to the selected interface range.
Below are given the commands for entering in the configuration mode of the Ethernet interface
range from 1 to 10 and for entering in the configuration mode of all port groups.
console# configure
console(config)# interface range tengigabitethernet 1/0/1-10
console(config-if)#
console# configure
console(config)# interface range port-channel 1-32
console(config-if)#
duplex mode
Specify interface duplex mode (full-duplex connection, half-
duplex connection, Ethernet).
mode: (full, half)/full
no duplex Set the default value.
negotiation [cap1
Enable autonegotiation of speed and duplex on the
[cap2…cap5]] interface. You can define specific compatibilities for the
cap: (10f, 10h, 100f,
autonegotiation parameter; if these parameters are not
100h, 1000f, 10000f)
defined, all compatibilities are supported (Ethernet, port-
channel).
ETS-1-10G-A 5. Device management. Command line interface 90
console(config)#
errdisable recovery cause {all | Enable automatic interface activation after it is disconnected
loopackdetection | in the following cases:
portsecurity | - loopback-detection – loopback detection;
dot1xsrcaddress | acldeny |
- port-security –security breach for port security;
stpbpduguard |
- dot1x-src-address – MAC based user authentication failed;
stploopback-guard | udld |
storm-control | linkflapping} - acl-deny – non-compliance with access lists (ACL);
- stp-bpdu-guard – BPDU Guard activation (unauthorized
BPDU packet transfer on the interface);
- stp-loopback-guard – loopback detection using the STP;
-/denied - udld – UDLD protection activation;
- storm-control – broadcast storm;
- link-flapping – link flapping.
no errdisable recovery cause Set the default value.
{all | loopackdetection |
portsecurity |
dot1xsrcaddress | acldeny |
stpbpduguard |
stploopback-guard | udld |
storm-control | linkflapping}
errdisable recovery interval Specify the time period for automatic interface reactivation.
seconds:
seconds (30..86400)/300
no errdisable recovery interval seconds Set the default value.
snmp trap link-status Enables SNMP trap message transmission on interface link
/enabled status.
no snmp trap link-status Disables SNMP trap-message transmission.
Shows the reason for disabling the port or port group and
show errdisable interfaces { te_port: (1..8/0/1..32);
tengigabitethernet te_port group: (1..32) automatic activation status.
| port-channel group}
Flow Link
Ch Type Duplex Speed Neg control State
-------- ------- ------ ----- -------- ------- -----------
Po1 -- -- -- -- -- Not Present
Po2 -- -- -- -- -- Not Present
Po3 -- -- -- -- -- Not Present
Po4 -- -- -- -- -- Not Present
Po5 -- -- -- -- -- Not Present
Po6 -- -- -- -- -- Not Present
Po7 -- -- -- -- -- Not Present
Po8 -- -- -- -- -- Not Present
Po9 -- -- -- -- -- Not Present
Po10 -- -- -- -- -- Not Present
Po11 -- -- -- -- -- Not Present
Po12 -- -- -- -- -- Not Present
Po13 -- -- -- -- -- Not Present
Po14 -- -- -- -- -- Not Present
Po15 -- -- -- -- -- Not Present
Po16 -- -- -- -- -- Not Present
Po17 -- -- -- -- -- Not Present
Po18 -- -- -- -- -- Not Present
Po19 -- -- -- -- -- Not Present
Po20 -- -- -- -- -- Not Present
Po21 -- -- -- -- -- Not Present
Po22 -- -- -- -- -- Not Present
Po23 -- -- -- -- -- Not Present
Po24 -- -- -- -- -- Not Present
Po25 -- -- -- -- -- Not Present
Po26 -- -- -- -- -- Not Present
Po27 -- -- -- -- -- Not Present
Po28 -- -- -- -- -- Not Present
Po29 -- -- -- -- -- Not Present
Po30 -- -- -- -- -- Not Present
Po31 -- -- -- -- -- Not Present
Po32 -- -- -- -- -- Not Present
Link
Oob Type Duplex Speed Neg State
-------- ------------ ------ ----- -------- -----------
oob 1G-Copper -- -- -- Down
te1/0/5 0 0 0 0
ETS-1-10G-A 5. Device management. Command line interface 96
te1/0/6 0 2 0 2176
te1/0/7 0 1 0 4160
te1/0/8 0 0 0 0
………………………………………………………………………………………………………………………………………………………………….
Alignment Errors: 0
FCS Errors: 0
Single Collision Frames: 0
Multiple Collision Frames: 0
SQE Test Errors: 0
Deferred Transmissions: 0
Late Collisions: 0
Excessive Collisions: 0
Carrier Sense Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Symbol Errors: 0
Received Pause Frames: 0
ETS-1-10G-A 5. Device management. Command line interface 97
Counter Description
InOctets The number of bytes received.
InUcastPkts The number of unicast packets received.
InMcastPkts The number of multicast packets received.
InBcastPkts The number of broadcast packets received.
OutOctets The number of bytes sent.
OutUcastPkts The number of unicast packets sent.
OutMcastPkts The number of multicast packets sent.
OutBcastPkts The number of broadcast packets sent.
Alignment Errors The number of frames that failed integrity verification (whose number of bytes
mismatches the length) and frame check sequence validation (FCS).
FCS Errors The number of frames whose byte number matches the length that failed frame check
sequence (FCS) validation.
Single Collision Frames The number of frames involved in a single collision, but transmitted successfully.
Multiple Collision Frames The number of frames involved in multiple collisions, but transmitted successfully.
Deferred Transmissions The number of frames for which the first transmission attempt was delayed due to busy
transmission media.
Late Collisions The number of cases when collision is identified after transmitting the first 64 bytes of
the packet to the communication link (slotTime).
Excessive Collisions The number of frames that were not sent due to excessive number of collisions.
Carrier Sense Errors The number of cases when the carrier control state was lost or not approved during the
frame transmission attempt.
Oversize Packets The number of received packets whose size exceeds the maximum allowed frame size.
Internal MAC Rx Errors The number of frames for which a reception fails due to an internal MAC receive error.
ETS-1-10G-A 5. Device management. Command line interface 98
Symbol Errors For an interface operating at 100Mbps, the number of cases there was as invalid data
symbol when a valid carrier was present.
For an interface operating in 1000Mbps half-duplex mode, the number of cases when
receiving instrumentation was busy for a time period equal or greater than the slot size
(slotTime) during which there was at least one occurrence of an event that caused the
PHY to indicate Data reception error or Carrier extend error on the GMII.
For an interface operating in 1000Mbps full-duplex mode, the number of times when
receiving instrumentation was busy for a time period equal or greater than the
minimum frame size (minFrameSize), and during which there was at least one
occurrence of an event caused the PHY to indicate Data reception error on the GMII.
Received Pause Frames The number of control MAC frames with PAUSE operation code received.
Transmitted Pause The number of control MAC frames with PAUSE operation code sent.
Frames
console(config)#
console# configure
ETS-1-10G-A 5. Device management. Command line interface 99
This mode is available in the global configuration mode and designed for configuration of VLAN
parameters.
map mac mac_address Tether a single or a range of MAC addresses to MAC address
{host | mask} macs- group.
group group
mask: (9..48)
no map mac Remove mapping.
mac_address {host |
mask}
console# configure
console(config)# interface {vlan vlan_id |range vlan VLANlist}
ETS-1-10G-A 5. Device management. Command line interface 100
console(config-if)#
This mode is available in the global configuration mode and designed for configuration of VLAN
interface or VLAN interface range parameters.
Below are given the commands for entering in the configuration mode of the VLAN 1 interface and
for entering in the configuration mode of VLAN 1, 3, 7 group.
console# configure
console(config)# interface vlan 1
console(config-if)#
console# configure
console(config)# interface range vlan 1,3,7
console(config-if)#
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console# configure
console(config)# interface {tengigabitethernet te_port | oob | port-
channel group | range {…}}
console(config-if)#
ETS-1-10G-A 5. Device management. Command line interface 101
This mode is available from the configuration mode and designed for configuration of interface
parameters (switch port or port group operating in the load distribution mode) or the interface range
parameters.
switchport trunk Add the number of VLAN as a Default VLAN for the interface.
native vlan vlan_id vlan_id: All untagged traffic arriving at this port is routed to this
(1..4094)/1 VLAN.
- vlan_id – VLAN ID.
ETS-1-10G-A 5. Device management. Command line interface 102
switchport general Add a port VLAN identifier (PVID) for the main interface.
pvid vlan_id vlan_id: - vlan_id – VLAN port ID.
(1..4094)/1 - if
no switchport general
default VLAN is Set the default value.
set
pvid
switchport general Set a classification rule for the main interface based on
map protocols-group protocol mapping.
group vlan vlan_id - group – group number ID;
vlan_id:
(1..4094) - vlan_id – VLAN ID.
no switchport general group: (1.. 2147483647) Remove a classification rule.
map protocols-group
group
ETS-1-10G-A 5. Device management. Command line interface 103
switchport general Set a classification rule for the main interface based on MAC
map macsgroup group address mapping.
vlan_id:
vlan vlan_id (1..4094) - group – group number ID;
group: - vlan_id – VLAN ID.
no switchport general (1..2147483647). Remove a classification rule.
map macs-group group
switchport general Set a classification rule for the main interface based on
map protocols-group protocol mapping.
group vlan vlan_id vlan_id: - group – group number ID;
(1..4094) - vlan_id – VLAN ID.
no switchport general group: (1.. 2147483647) Remove a classification rule.
map protocols-group
group
switchport general Set a classification rule for the main interface based on IP
map subnets-group address mapping.
group vlan vlan_id vlan_id:
(1..4094)
no switchport general group: (1.. 2147483647) Remove a classification rule.
map subnets-group
group
switchport customer Enable the receipt of multicast traffic from the specified
multicast-tv vlan add VLANs (other than the user interface VLAN) on the interface
vlan_list together with other port users that receive multicast traffic
from these VLANs.
- vlan_list – list of VLAN IDs. To define a VLAN range, enter values
vlan_list: (2..4094, all). separated by commas or enter the starting and ending values
separated by a hyphen ’-’.
switchport customer Forbid the interface to receive multicast traffic.
multicast-tv vlan
remove vlan_list
switchport protected- Put the port in isolation mode within the port group.
port
-
no switchport Restore the default value.
protectedport
ETS-1-10G-A 5. Device management. Command line interface 104
console#
show vlan internal Show VLAN list for internal use by the switch.
usage -
console#
Table 55 – EXEC mode commands
show interfaces Show port status: Show port status: in Private VLAN Edge
protectedports mode, in the private-vlan-edge community.
te_port: (1..8/0/1..32);
[tengigabitethernet
te_port | port- group: (1..32)
channel group |
detailed]
Created by: D-Default, S-Static, G-GVRP, R-Radius Assigned VLAN, V-Voice VLAN
Po1-8
2 2 S
3 3 S
4 4 S
5 5 S
6 6 S
8 8 S
Gathering information...
Name: te1/0/1
Switchport: enable
Administrative Mode: access
Operational Mode: not present
Access Mode VLAN: 1
Access Multicast TV VLAN: none
Trunking Native Mode VLAN: 1
Trunking VLANs: 1-3
4-4094 (Inactive)
General PVID: 1
General VLANs: none
General Egress Tagged VLANs: none
General Forbidden VLANs: none
General Ingress Filtering: enabled
General Acceptable Frame Type: all
General GVRP status: disabled
Customer Mode VLAN: none
Customer Multicast TV VLANs: none
Private-vlan promiscuous-association primary VLAN: none
Private-vlan promiscuous-association Secondary VLANs: none
Private-vlan host-association primary VLAN: none
Private-vlan host-association Secondary VLAN: none
Classification rules:
− Three types of PVLAN ports can be configured on the switches: promiscuous – port capable
of exchanging data between any interface, including isolated and community PVLAN ports;
− isolated – port that is completely isolated from other ports within the same PVLAN, but not
from the same ports. PVLANs block all traffic going to isolated ports except for traffic on
the promiscuous side; packets on the isolated side can only be transmitted to promiscuous
ports;
− community – group of ports that can exchange data between each other and these
interfaces are separated at layer 2 of the OSI model from all other community interfaces as
well as isolated ports within the PVLAN.
ETS-1-10G-A 5. Device management. Command line interface 107
The process of performing the function of additional port separation using Private VLAN technology
is shown in the figure 15.
Command line prompt in the Ethernet, VLAN, port group interface configuration mode is as follows:
console# configure
console(config)# interface {tengigabitethernet te_port | port-channel
group | range {…} | vlan vlan_id}
console(config-if)#
switchport private- Add primary and secondary vlan to the host interface.
vlan hostassociation You cannot add more than one secondary vlan to one
primary_vlan primary_vlan: host interface.
secondary_vlan (1..4094)
secondary_vlan:
no switchport (1..4094) Delete primary and secondary VLANs.
private-vlan host-
association
private-vlan {primary | Enable the Private VLAN mechanism and set the interface
isolated | community} type.
Disable Private VLAN mechanism.
no private-vlan
IP interface configuration
An IP-interface is created when an IP-address is assigned to any of the device interfaces
tengigabitethernet, oob, port-channel or vlan.
ETS-1-10G-A 5. Device management. Command line interface 109
console# configure
console(config)# interface ip A.B.C.D
console(config-ip)#
This mode is available in the configuration mode and designed for configuration of IP interface
parameters.
console# configure
console(config)#interface PortChannel 1
console(config-if)#ip address 100.0.0.1 /24
console(config-if)#exit
console(config)# interface ip 100.0.0.1
console(config-ip)# directed-broadcast
Selective Q-in-Q
This functionality allows to add an external SPVLAN (Service Provider's VLAN), replace the Customer
VLAN, and deny traffic based on configurable filtering rules by internal VLAN (Customer VLAN) numbers.
A list of rules is created for the device, based on which the traffic will be processed.
ETS-1-10G-A 5. Device management. Command line interface 110
console# configure
console(config)# interface { tengigabitethernet te_port | port-channel
group | range {…}}
console(config-if)#
console#
ETS-1-10G-A 5. Device management. Command line interface 111
Create a rule based on which the external tag of an incoming package 11 will be replaced by 10.
console# configure
console(config)# interface tengigabitethernet 1/0/1
console(config-if)# selective-qinq list ingress override vlan 10
ingressvlan 11
console(config-if)# end
The switch evaluates the rate of incoming broadcast, multicast and unknown unicast traffic for port
with enabled Broadcast Storm Control and drops packets if the rate exceeds the set maximum value.
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
no storm-control
multicast Disables multicast traffic control.
no storm-control
unicast Disables unicast traffic control.
no storm-control
broadcast Disables broadcast traffic control.
console#
Enable control of broadcast, multicast and unicast traffic on the 3rd Ethernet interface. Set the
speed for monitored traffic to 5000 kbps: for broadcast, 30% bandwidth for all multicast, 70% for
unknown unicast.
console# configure
console(config)# interface TengigabitEthernet 1/0/3
console(config-if)# storm-control broadcast kbps 5000 shutdown
console(config-if)# storm-control multicast level 30 trap
console(config-if)# storm-control unicast level 70 trap
If you have configured the interface, you should return the default settings to add it to the
group.
Adding interfaces to the link aggregation group is only available in Ethernet interface configuration
mode.
console(config-if)#
console# configure
console(config)#
console>
To enable the operation of the interface in a static group, use the command channel-group
{group} mode on in the configuration mode of the corresponding interface.
To enable the interface work via LACP protocol use the command channelgroup {group}
mode auto in the configuration mode of the corresponding interface.
console(config)#
console(config-if)#
ETS-1-10G-A 5. Device management. Command line interface 116
console#
Create the first port group working on the LACP protocol and including two Ethernet interfaces –
3 and 4. Speed of the group is 1000 Mbps. Set the system priority – 6, priorities 12 and 13 for
ports 3 and 4 respectively.
console# configure
console(config)# lacp system-priority 6
console(config)# interface port-channel 1
console(config-if)# speed 10000
console(config-if)# exit
console(config)# interface TengigabitEthernet 1/0/3
ETS-1-10G-A 5. Device management. Command line interface 117
Command line prompt in the Ethernet, port group, VLAN, Loopback interface configuration mode
is as follows:
console(config-if)#
ip address dhcp Obtaining the IP address for the configurable interface from the
- DHCP server.
Not used for loopback-interface.
ETS-1-10G-A 5. Device management. Command line interface 118
no ip address dhcp Restrict the use of DHCP to obtain an IP address from the selected
interface.
console(config)#
console#
console>
console(config)#
ETS-1-10G-A 5. Device management. Command line interface 120
console(config-if)#
console#
IPv6 protocol
Switches support operation via IPv6. Support for IPv6 is an important advantage, as IPv6 is designed
to completely replace IPv4 addressing in the future. In comparison with IPv4, IPv6 has an extended
address space – 128 bits instead of 32. The IPv6 address is 8 blocks, separated by a colon, each block
contains 16 bits, recorded as four hexadecimal numbers.
In addition to increasing the address space, IPv6 protocol has a hierarchical addressing scheme,
provides route aggregation, simplifies the routing table, while the efficiency of the router is increased by
a mechanism to detect neighboring nodes.
The local IPv6 (IPv6Z) addresses in the switch are assigned to the interfaces, so the following format
is used when using IPv6Z addresses in command syntax:
<ipv6-link-local-address>%<interface-name>
where:
interface-name – interface name:
interface-name = vlan<integer> | ch<integer> |<physical-port-name>
integer = <decimal-number> | <integer><decimal-number>
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name = tengigabitethernet (1..8/0/1..32)
If the value of a group or several groups in a row in the IPv6 address is zero - 0000, then
these groups can be omitted. For example, the address
FE40:0000:0000:0000:0000:0000:AD21:FE43 can be shortened to FE40::AD21:FE43. 2
separated zero groups cannot be shortened due to ambiguity.
EUI-64 is an identifier based on the MAC address of the interface, which is 64 lower bits of
the IPv6 address. The MAC address is split into two 24-bit parts, between which the FFFE
constant is added.
console(config)#
console (config-if)#
ETS-1-10G-A 5. Device management. Command line interface 124
ipv6 address autoconfig By default, automatic Enable automatic configuration of IPv6 addresses on the
configuration is interface. Addresses are configured according to the
enabled, no addresses prefixes received in Router Advertisement messages.
no ipv6 address autoconfig have been assigned. Sets the default value.
ipv6 address Defines the local IPv6 address of the interface. Master bits
ipv6_address/prefix_length of local IP addresses in IPv6 – FE80::
link-local Local address by
no ipv6 address default: (FE80::EUI64) Removes the local IPv6 address.
[ipv6_address/prefix-length
link-local]
ipv6 nd dad attempts Defines the number of demand messages sent by the
attempts_number interface to the communicating device in case of a
(0..600)/1
duplicate (collision) IPv6 address.
no ipv6 nd dad attempts Returns the default value.
ipv6 unreachables Enabling ICMPv6 messages about unreachability of the
-/enabled recipient when packets are sent to a specific interface.
no ipv6 unreachables Sets the default value.
ipv6 mld version version Defining the interface version of the MLD protocol.
version: (1..2)/2
no ipv6 mld version Sets the default value.
console#
console#
console(config)#
console#
show hosts [name] Displays the default domain name, list of DNS servers, static and
name: (1..158) cached matches of network host names and IP addresses.
characters When a network node name is used in the command, the
corresponding IP address is displayed.
Use DNS servers at 192.168.16.35 and 192.168.16.38 addresses, set the default domain name – ets:
сonsole# configure
console(config)# ip name-server 192.168.16.35 192.168.16.38
console(config)# ip domain name ets
Establish static matching: The network node named RAD.ets has an IP address of 192.168.16.39:
сonsole# configure
console(config)# ip host RAD.ets 192.168.16.39
ETS-1-10G-A 5. Device management. Command line interface 128
ARP configuration
ARP (Address Resolution Protocol) – channel layer protocol that performs the function of
determining the MAC address based on the IP address contained in the request.
console#
ip_address format: Displays the ARP table entries: all entries, filter by IP address; filter
show arp [ip-address
A.B.C.D by MAC address; filter by interface.
ip_address] [mac-address
mac_addres] mac_address format: - ip_address – IP address;
[tengigabitethernet H.H.H or H:H:H:H:H:H - mac_address – MAC address.
te_port | or H-H-H-H-H-H;
portchannel group | te_port: (1..8/0/1..32);
oob] group: (1..32)
Shows the global ARP configuration and the ARP configuration of
show arp
configuration - the interfaces.
Add a static record to the ARP table: IP address 192.168.16.32, MAC address 0:0:C:40:F:BC, set the
lifetime of dynamic records in the ARP table to 12000 seconds:
сonsole# configure
console(config)# arp 192.168.16.32 00-00-0c-40-0f-bc tengigabitethernet
1/0/2
сonsole(config)# exit
сonsole# arp timeout 12000
GVRP configuration
GARP VLAN Registration Protocol (GVRP) – VLAN registration protocol The protocol allows VLAN
identifiers to be distributed over the network. The main function of the GVRP protocol is to detect
information about VLAN-networks absent in the switch database when receiving GVRP messages. When
the switch receives information about missing VLANs, it adds them to its database.
console(config)#
Table 85 – Global mode configuration commands
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console# configure
console(config)# interface {tengigabitethernet te_port | port-channel
group}
console(config-if)#
Table 86 – Ethernet, VLAN, port group interface configuration mode commands
console#
console>
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console# configure
console(config)# interface {tengigabitethernet te_port | port-channel
group}
console(config-if)#
console(config)#
When setting STP parameters forward-time, hello-time, max-age, the condition must be met:
2*(Forward-Delay - 1) >= Max-Age >= 2*(Hello-Time + 1).
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Enables root protection for all STP binding trees on the selected
spanning-tree guard
{root | loop | none} port.
- root – denies the interface from being the root port of the switch;
- loop – enables additional protection against loops on the
interface. In case if the interface is in a state other than Designated
-/global configuration
and stops receiving BPDU, the interface is blocked;
- none – disables all Guard functions on the interface.
Use global configuration.
no spanning-tree
guard
console#
ETS-1-10G-A 5. Device management. Command line interface 137
clear spanning-tree Restarts the protocol migration process. The STP tree is
detectedprotocols recalculated again.
[interface { te_port: (1..8/0/1..32);
tengigabitethernet group: (1..32).
te_port | port-
channel group}]
console#
Table 96 – EXEC mode commands
MSTP configuration
console(config)#
ETS-1-10G-A 5. Device management. Command line interface 138
spanning-tree mst Sets the priority for this switch over others using a shared
instance_id priority MSTP instance.
priority - instance_id – MST instance;
instance_id: (1..15); - priority – switch priority.
priority:
(0..61440)/32768 The priority value should be a multiple of 4096.
spanning-tree mst Sets the maximum amount of hops for BPDU packet that are
maxhops hop_count required to build a tree and to keep its structure information.
If the packet has already passed the maximum amount of
hops, it is dropped on the next hop.
hop_count: (1..40)/20 - hop_count – maximum number of transit sites for a BPDU
package.
no spanning-tree mst Sets the default value.
maxhops
console (config-mst)#
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 99 – Ethernet, VLAN, port group interface configuration mode commands
spanning-tree mst Sets the path value through the selected interface for a
instance_id cost cost particular instance of MSTP.
- instance-id – MSTP instance identifier.
instance_id: (1..15);
cost: (1..200000000) - cost – path cost.
no spanning-tree mst Sets the value based on the port speed and the method for
instance_id cost determining the value of the track, see table 94
priority: (0..240)/128
Sets the default value.
no spanning-tree
portpriority
ETS-1-10G-A 5. Device management. Command line interface 141
console#
clear spanning-tree Restarts the protocol migration process. The STP tree is
detectedprotocols recalculated.
interface { te_port: (1..8/0/1..32);
tengigabitethernet group: (1..32).
te_port | port-
channel group}
Enable STP support, set the RSTP bind tree priority value to 12288, forward-time interval to 20
seconds, 'Hello; broadcast message interval to 5 seconds, bind tree lifetime to 38 seconds. Show
STP configuration:
console(config)# spanning-tree
console(config)# spanning-tree mode rstp
console(config)# spanning-tree priority 12288
console(config)# spanning-tree forward-time 20
console(config)# spanning-tree hello-time 5
console(config)# spanning-tree max-age 38
console(config)# exit
Interfaces
Name State Prio.Nbr Cost Sts Role PortFast Type
--------- -------- --------- -------- ------ ---- -------- -----------------
te1/0/1 enabled 128.1 100 Dsbl Dsbl No -
te1/0/2 disabled 128.2 100 Dsbl Dsbl No -
te1/0/5 disabled 128.5 100 Dsbl Dsbl No -
te1/0/6 enabled 128.6 4 Frw Desg Yes P2P (RSTP)
te1/0/7 enabled 128.7 100 Dsbl Dsbl No -
te1/0/8 enabled 128.8 100 Dsbl Dsbl No -
te1/0/9 enabled 128.9 100 Dsbl Dsbl No -
gi1/0/1 enabled 128.49 100 Dsbl Dsbl No -
Po1 enabled 128.1000 4 Dsbl Dsbl No -
console(config)#
console(config-erps)#
sub-ring vlan vlan_id [tc- Enables the MAC table cleaning signal to be sent to the main
propogation] ring when the ring is reconstructed.
(1..4094)
Disables the MAC table cleaning signal to be sent to the main
no sub-ring vlan vlan_id
ring when the ring is reconstructed.
timer guard value Sets a timer for blocking outdated R-APS messages.
value:(10..2000) ms,
multiple of 10/500 ms
no timer guard Sets the default value:
Sets a delay timer for the switch's response to a change in
timer holdoff
state. Instead of reacting to an event, a timer is activated,
value value:(0..10000) ms,
after which the switch informs about its status. Designed to
multiple of 100 with an
reduce packet flood in port flapping.
accuracy of 5 ms/0 ms
no timer holdoff Sets the default value:
Sets a timer that runs on the RPL Owner switch in revertive
timer wtr value
mode. It is used to prevent frequent protective tap-change
value:(1..12) min/5 min operations due to failure signals.
no timer wtr Sets the default value:
switch forced Forces the start of the protective ring changeover, blocking
{west | east} the specified port.
-/no
no switch forced Canceling the ring changeover force.
switch manual Manual locking of the specified west (east) port and
{west | east} unblocking of east (west).
-/no
no switch manual Reset the manual lockdown.
console#
Value/Default
Command Action
value
show erps [vlan Request information about the general status of ERPS or
vlan_id: (1..4094) the state of the specified ring.
vlan_id]
LLDP configuration
The main function of Link Layer Discovery Protocol (LLDP) is the exchange of information about
status and specifications between network devices. Information that LLDP gathers is stored on devices
and can be requested by the master computer via SNMP. Thus, the master computer can model the
network topology based on this information.
The switches support transmission of both standard and optional parameters, such as:
− device name and description;
− port name and description;
− MAC/PHY information;
− etc.
lldp hold-Multiplier Specify the amount of time for the receiver to keep LLDP
number packets before dropping them.
This value will be transmitted to the receiving side in the
LLDP update packets; and should be an increment for the
number: (2..10)/4 LLDP timer. Thus, the lifetime of LLDP packets is calculated
by the formula: TTL = min(65535, LLDP-Timer * LLDP-
HoldMultiplier)
no lldp hold- Sets the default value.
multiplier
lldp lldpdu {filtering | flooding} Specify the LLDP packet processing mode when LLDP is disabled on
the switch:
- filtering – LLDP packets are filtered if LLDP is disabled on the
-/filtering switch;
- flooding – LLDP packets are transmitted if LLDP is disabled on the
switch.
no lldp lldpdu Sets the default value.
lldp med fast-start Set the number of PDU LLDP repetitions for quick start defined by
repeatcount number LLDP-MED.
number: (1..10)/3
no lldp med fast-start repeat- Sets the default value.
count
lldp med network-policy Specify a rule for the network-policy parameter (device network
number: (1..32);
number application [vlan policy). This parameter is optional for the LLDP MED protocol
application: (voice,
vlan_id] [vlan-type {tagged | extension.
voice-signaling,
untagged}] [up priority] [dscp - number – sequential number of a network policy rule;
guest-voice,
value] - application – main function defined for this network policy ruleю
guest-voice-signaling,
- vlan_id – VLAN identifier for this rule;
softphone-voice,
- tagged/untagged – specify whether the VLAN used by this rule is
video-conferencing,
tagged or untagged.
streaming-video,
- priority – the priority of this rule (used on the second layer of OSI
video-signaling);
model);
vlan_id: (0..4095);
- value – DSCP value used by this rule.
priority: (0..7);
no lldp med network-policy Remove the created rule for the network-policy parameter.
value: (0..63)
number
ETS-1-10G-A 5. Device management. Command line interface 147
lldp notifications interval Specify the maximum LLDP notification transfer rate.
seconds seconds: (5..3600)/5 - seconds – time period during which the device can send at
sec most one notification.
no lldp notifications interval Sets the default value.
console(config-if)#
ETS-1-10G-A 5. Device management. Command line interface 148
The LLDP packets received through a port group are saved individually by these port groups.
LLDP sends different messages to each port of the group.
LLDP operation is independent from the STP state on the port; LLDP packets are sent and
received via ports blocked by STP.
If the port is controlled via 802.1X, LLDP works only with authorized ports.
show lldp med Displays LLDP MED protocol extension configuration for all
configuration physical interfaces or specific interfaces only.
[tengigabitethernet te_port: (1..8/0/1..32);
te_port | oob |
detailed]
show lldp local { Displays LLDP information announced by this port.
te_port: (1..8/0/1..32);
tengigabitethernet te_port |
oob}
show lldp local Show TLVs LLDP restart state.
tlvsoverloading te_port: (1..8/0/1..32);
[tengigabitethernet te_port |
oob]
show lldp neighbors Show information on the neighbour devices on which LLDP
te_port: (1..8/0/1..32);
[tengigabitethernet te_port | is enabled.
oob]
show lldp statistics Show LLDP statistics.
te_port: (1..8/0/1..32);
[tengigabitethernet te_port |
oob | detailed]
Set the following tlv fields for the te1/0/10 port: port-description, sytem-name, system-
description. Add the control address 10.10.10.70 for this interface.
console(config)# configure
console(config)# interface tengigabitethernet 1/0/10
console(config-if)# lldp optional-tlv port-desc sys-name sys-desc
console(config-if)# lldp management-address 10.10.10.70
ETS-1-10G-A 5. Device management. Command line interface 151
Field Description
Timer Specify how frequently the device will send LLDP updates.
Specify the amount of time (TTL, Time-To-Live) for the receiver to keep LLDP packets
Hold Multiplier
before dropping them: TTL = Timer * Hold Multiplier.
Specify the minimum amount of time for the port to wait before sending the next LLDP
Reinit delay
message.
Specify the delay between the subsequent LLDP frame transmissions initiated by
Tx delay
changes of values or status.
Port Port number.
State Port operation mode for LLDP.
TLV options
Possible values:
PD – Port description;
Optional TLVs
SN – System name;
SD – System description;
SC – System capabilities.
Address Device address sent in LLDP messages.
ETS-1-10G-A 5. Device management. Command line interface 152
Field Description
Port Port number.
Device ID Name or MAC address of the neighbour device.
Port ID Neighbour device port identifier.
System name Device system name.
Capabilities This field describes the device type:
B – Bridge;
R – Router;
W – WLAN Access Point;
T – Telephone;
D – DOCSIS cable device;
H – Host;
r – Repeater;
O – Other.
System description Neighbour device description.
Port description Neighbour device port description.
Management address Device management address.
Auto-negotiation Specify if the automatic port mode identification is supported.
support
Auto-negotiation status Specify if the automatic port mode identification support is enabled.
Auto-negotiation Specify the modes supported by automatic port discovery function.
Advertised Capabilities
Operational MAU type Operational MAU type of the device.
ETS-1-10G-A 5. Device management. Command line interface 153
− VoIP equipment is configured to send tagged packets, with Voice VLAN ID configured on
the switch.
− VoIP equipment transmits untagged DHCP requests. The response from the DHCP server
includes an option 132 (VLAN ID), with which the device automatically assigns itself a VLAN
for marking traffic (Voice VLAN).
List of VoIP equipment OUI manufacturers dominating the market.
OUI Manufacturer
00:E0:BB 3COM
00:03:6B Cisco
00:E0:75 Veritel
00:D0:1E Pingtel
00:01:E3 Siemens
00:60:B9 NEC/ Philips
00:0F:E2 Huawei-3COM
00:09:6E Avaya
Voice VLAN can be activated on ports operating in trunk and general mode.
console(config)#
voice vlan cos cos Sets the COS that marks the frames belonging to the Voice
[remark] VLAN.
cos: (0-7)/6
no voice vlan cos Restore the default value.
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 110 – Commands of Ethernet interface configuration mode
For IGMP Snooping to be active, the 'bridge multicast filtering' function must be enabled
(see section 0 Multicast addressing rules).
Identification of ports, which connect multicast routers, is based on the following events:
– IGMP requests has been received on the port;
– Protocol Independent Multicast (PIM/PIMv2) packets has been received on the port;
– Distance Vector Multicast Routing Protocol (DVMRP) packets has been received on the port;
– MRDISC protocol packets has been received on the port;
– Multicast Open Shortest Path First (MOSPF) protocol packets has been received on the port.
ip igmp snooping vlan vlan_id Enables IGMP Snooping only for the specific interface on
vlan_id: (1..4094) the switch.
By default, the function - vlan_id – VLAN ID.
no ip igmp snooping vlan is disabled Disables IGMP Snooping only for the specific VLAN
vlan_id interface on the switch.
ETS-1-10G-A 5. Device management. Command line interface 156
ip igmp snooping vlan vlan_id Registers multicast IP address in the multicast addressing table
static ip_multicast_address and statically add group interfaces for the current VLAN.
[interface { tengigabitethernet - vlan_id – VLAN ID.
te_port | port-channel group}] vlan_id: (1..4094); - ip_multicast_address – group IP address.
te_port: (1..8/0/1..32); Interfaces must be separated by “–” and “,”.
no ip igmp snooping vlan group: (1..32) Removes a multicast IP address from the table.
vlan_id static ip_address
[interface { tengigabitethernet
te_port | port-channel group}]
ip igmp snooping vlan Enables automatic identification of ports with connected
vlan_id mrouter learn multicast routers for this VLAN group.
pim-dvmrp - vlan_id – VLAN ID.
vlan_id: (1..4094)
allowed by default Disables automatic identification of ports with connected
no ip igmp snooping
vlan vlan_id mrouter multicast routers for this VLAN group.
learn pimdvmrp
ip igmp snooping vlan vlan_id Enables igmp-query generation by the switch with in the
querier vlan_id: (1..4094); specific VLAN.
-/request issuance is
no ip igmp snooping vlan disabled Disables igmp-query generation by the switch within the
vlan_id querier specific VLAN.
ip igmp snooping vlan vlan_id Sets IGMP version that will be used as base for forming
querier version {2 | 3} IGMP queries.
-/IGMPv3
no ip igmp snooping vlan Sets the default value.
vlan_id querier version
ETS-1-10G-A 5. Device management. Command line interface 157
ip igmp snooping vlan vlan_id Specifies a source IP address for IGMP querier. Querier is
querier address ip_address adevice that transmits IGMP queries.
no ip igmp snooping vlan vlan_id: (1..4094) Sets the default value. By default, if the IP address is
vlan_id querier address configured for VLAN it is used as source IP address of the
IGMP Snooping Querier.
ip igmp snooping vlan vlan_id Enables IGMP Snooping Immediate-Leave on the current
immediate-leave [hostbased] VLAN. It means that the port must be immediately deleted
from the IGMP group after receiving IGMP leave message.
- host-based – ‘fast-leave’ mechanism can only work if all
vlan_id: (1..4094);
users connected to the port unsubscribed from the group
-/disabled
(usage count is conducted on the base of Source MAC
addresses in the IGMP port headers).
no ip igmp snooping vlan Disables IGMP Snooping Immediate-Leave on the current
vlan_id immediate-leave VLAN.
console(config-if)#
ip igmp query-interval Sets timeout for sending main queries to all multicast
seconds members to check the activity of multicast group
seconds:
(30..18000)/125 sec
members.
no ip igmp query-interval Sets the default value.
console(config-if)#
Table 113 – Commands of Ethernet interface configuration mode
console#
ETS-1-10G-A 5. Device management. Command line interface 159
show ip igmp snooping Shows information on IGMP Snooping for the current
interface vlan_id vlan_id: (1..4094)
interface.
show ip igmp snooping groups Shows information on learnt multicast groups.
[vlan vlan_id]
[ipmulticastaddress vlan_id: (1..4094)
ip_multicast_address]
[ipaddress IP_address]
show ip igmp snooping cpe Shows the table of mapping between customer VLAN
vlans [vlan vlan_id] vlan_id: (1..4094)
equipment and TV VLAN.
Enable the IGMP snooping function on the switch. Enable automatic identification ofports with
connected multicast routers for VLAN 6. Increase robustness value to 4. Set maximum query
response time of 15 seconds.
console# configure
console (config)# ip igmp snooping
console (config-if)# ip igmp snooping vlan 6 mrouter learn pim-dvmrp
console (config)# interface vlan 6
console (config-if)# ip igmp robustness 4
console (config-if)# ip igmp query-max-response-time 15
bridge multicast forbidden Prohibits the port to dynamically join a multicast group.
forward-all {add | remove} { - add – add ports/aggregated ports to the list of ports which are not
te_port: (1..8/0/1..32);
tengigabitethernet te_port | enabled to transmit all multicast packets;
group: (1..32)
port-channel group} - remove – remove the port group/aggregated ports from the a
By default, ports are
'deny' rule.
enabled to dynamically
Interfaces must be separated by “–” and “,”.
join a multicast group.
no bridge multicast forbidden Restore the default value.
forward-all
bridge multicast ip-address Registers IP address in the multicast addressing table and statically
ip_multicast_address {add | add/remove interfaces to/from the group.
remove} { tengigabitethernet - ip_multicast_address – group IP address;
te_port: (1..8/0/1..32);
te_port | port-channel group} - add – add ports to the group;
group: (1..32)
- remove – remove ports from the group;
Interfaces must be separated by “–” and “,”.
no bridge multicast ip-address Removes a multicast IP address from the table.
ip_multicast_address
bridge multicast forbidden Prohibits the port to dynamically join a multicast group.
ipaddress - ip_multicast_address – group IP address;
ip_multicast_address {add | - add – add port(s) into the banned list;
remove} { tengigabitethernet - remove – remove port(s) from the banned list.
te_port: (1..8/0/1..32);
te_port | port-channel group} Interfaces must be separated by “–” and “,”.
group: (1..32)
You have to register multicast groups prior to defining
prohibited ports.
no bridge multicast forbidden Restore the default value.
ip-address
ip_multicast_address
bridge multicast source Sets the mapping between the user IP address and a multicast
ip_address group address in the multicast addressing table and statically add/remove
ip_multicast_address {add | interfaces to/from the group.
remove} { tengigabitethernet - ip_address – source IP address;
te_port: (1..8/0/1..32);
te_port | port-channel group} - ip_multicast_address – group IP address;
group: (1..32)
- add – add ports to the source IP address group;
- remove – remove ports from the group of the source IP address.
no bridge multicast source Restore the default value.
ip_address group
ip_multicast_address
bridge multicast forbidden Disables adding/removal of mappings between the user IP address
source ip_address group and a multicast address in the multicast addressing table for a
ip_multicast_address {add | specific port.
remove} { tengigabitethernet - ip_address – source IP address;
te_port: (1..8/0/1..32);
te_port | port-channel group} - ip_multicast_address – group IP address;
group: (1..32)
- add – prohibit adding ports to the source IP address group;
- remove – disable port removal from the source IP address group.
no bridge multicast forbidden Restore the default value.
source ip_address group
ip_multicast_address
ETS-1-10G-A 5. Device management. Command line interface 162
bridge multicast ipv6 mode Sets the multicast data transmission mode for IPv6 multicast
{mac-group | ip-group | packets.
ipsrcgroup} - mac-group – multicast transmission based on VLAN and MAC
addresses;
-/mac-group - ip-group – multicast transmission with filtering based on VLAN and
the recipient address in IPv6 format;
- ip-src-group – multicast transmission with filtering based on VLAN
and the sender address in IPv6 format.
no bridge multicast ipv6 mode Sets the default value.
bridge multicast ipv6 Registers multicast IPv6 address in the multicast addressing table
ipaddress and statically add/remove interfaces to/from the group.
ipv6_multicast_address {add | - ipv6_multicast_address – group IP address;
remove} { tengigabitethernet te_port: (1..8/0/1..32); - add – add ports to the group;
te_port | port-channel group} group: (1..32) - remove – remove ports from the group;
Interfaces must be separated by “–” and “,”.
no bridge multicast ipv6 Removes a multicast IP address from the table.
ipaddress
ipv6_multicast_address
bridge multicast ipv6 Deny the connection of the port(s) to a multicast IPv6 address.
forbidden ip-address - ipv6_multicast_address – group IP address;
ipv6_multicast_address {add | - add – add port(s) into the banned list;
te_port: (1..8/0/1..32);
remove} { tengigabitethernet - remove – remove port(s) from the banned list.
group: (1..32)
te_port | port-channel group} Interfaces must be separated by “–” and “,”.
no bridge multicast ipv6 Restore the default value.
forbidden ip-address
ipv6_multicast_address
bridge multicast ipv6 source Sets the mapping between the user IPv6 address and a multicast
ipv6_address group address in the multicast addressing table and statically add/remove
ipv6_multicast_address {add | interfaces to/from the group.
remove} { tengigabitethernet - ipv6_address – source IP address;
te_port: (1..8/0/1..32);
te_port | port-channel group} - ipv6_multicast_address – group IP address;
group: (1..32)
- add – add ports to the source IP address group;
- remove – remove ports from the group of the source IP address.
no bridge multicast ipv6 Restore the default value.
source ipv6_address group
ipv6_multicast_address
bridge multicast ipv6 Disables adding/removal of mappings between the user IPv6
forbidden source ipv6_address address and a multicast address in the multicast addressing table
group ipv6_multicast_address for a specific port.
{add | remove} { - ipv6_address – source IPv6 address;
tengigabitethernet te_port | te_port: (1..8/0/1..32); - ipv6_multicast_address – group IPv6 address;
port-channel group} group: (1..32) - add – prohibit adding ports to the source IPv6 address group;
- remove – disable port removal from the source IPv6 address
group.
no bridge multicast ipv6 Restore the default value.
forbidden source ipv6_address
group ipv6_multicast_address
ETS-1-10G-A 5. Device management. Command line interface 163
ETS-1-10G-A 5. Device management. Command line interface 164
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console# configure
console(config)# interface {tengigabitethernet te_port | port-channel
group | range {…}}
console(config-if)#
Table 116 – Ethernet, VLAN, port group interface configuration mode commands
console(config)#
mac address-table static Adds the source MAC address into the multicast addressing
mac_address vlan vlan_id table.
interface { tengigabitethernet - mac_address – MAC address;
te_port | port-channel group} - vlan_id – VLAN number;
[permanent | - permanent – this MAC address can only
deleteonreset | be deleted with the no bridge address
deleteontimeout | secure] vlan_id: (1..4094);
command;
te_port: (1..8/0/1..32);
- delete-on-reset – the address will be
group: (1..32)
deleted after the switch is restarted;
- delete-on-timeout – the address will be deleted after a
timeout;
- secure – the address can only be deleted with the no
bridge address command or when the port returns to
the learning mode (no port security).
no mac address-table static Removes a MAC address from the multicast addressing table.
[mac_address] vlan vlan_id
bridge multicast Specifies what will be done with multicast packets from the
reservedaddress reserved address.
mac_multicast_address - mac_multicast_address – multicast MAC address;
{ethernet-v2 ethtype | llc sap | - ethtype – Ethernet v2 packet type;
llc-snap pid ] {discard | bridge} - sap – LLC packet type;
ethtype:
(0x0600..0xFFFF);
- pid – LLC-Snap packet type;
sap: (0..0xFFFF); - discard – drop packets;
pid: (0..0xFFFFFFFFFF) - bridge – bridge packet transmission mode.
no bridge multicast Sets the default value.
reservedaddress
mac_multicast_address
[ethernet-v2 ethtype | llc sap |
llc-snap pid]
console#
console>
show bridge multicast Shows filter configuration for unregistered multicast addresses.
te_port: (1..8/0/1..32);
unregistered
group: (1..32);
[tengigabitethernet te_port |
vlan_id: (1..4094)
port-channel group]
show bridge multicast mode Shows multicast addressing mode for the selected interface or for
[vlan vlan_id] vlan_id: (1..4094) all VLAN interfaces.
- vlan_id – VLAN ID.
show bridge multicast Shows the rules defined for multicast reserved addresses.
-
reserved-addresses
Enable multicast address filtering on the switch. Set the MAC address aging time to 400 seconds,
enable forwarding of unregistered multicast packets on the switch port 11.
console # configure
console(config) # mac address-table aging-time 400
console(config) # bridge multicast filtering
console(config) # interface tengigabitethernet 1/0/11
console(config-if) # bridge multicast unregistered forwarding
no ipv6 mld snooping vlan Disables MLD Snooping Immediate-Leave on the current
vlan_id immediate-leave VLAN.
ipv6 mld snooping querier Enables support for issuing igmp-query requests.
-/disabled
no ipv6 mld snooping querier Disables support for issuing igmp-query requests.
Ethernet, port group, VLAN interface (interface range) configuration mode commands
Command line prompt in the Ethernet, port group, VLAN configuration mode is as follows:
console(config-if)#
Table 121 – Ethernet, port group, VLAN interface (interface range) configuration mode commands
console#
ETS-1-10G-A 5. Device management. Command line interface 170
The number of multicast groups supported by IGMP Proxy is given in the table .
console(config)#
ETS-1-10G-A 5. Device management. Command line interface 171
Command line prompt in the Ethernet, VLAN, port group interface configuration mode is as follows:
console(config-if)#
Table 124 – Ethernet, VLAN, port group interface configuration mode commands
console#
IP Forwarding is enabled
IP Multicast Routing is enabled
IGMP Proxy is enabled
Global Downstream interfaces protection is enabled
SSM Access List Name: -
RP (rendezvous point) – rendezvous point where multicast sources will be logged and a route
created from the source S (itself) to the group G: (S, G).
BSR (bootsrtap router) – mechanism for collecting information about RP candidates, forming an RP
list for each multicast group and sending the list within the domain. Multicast routing configuration based
on IPv4.
console(config)#
console(config-if)#
Specify the interval within which the switch sends join or prune
ip (ipv6) pim
messages.
joinpruneinterval interval
interval: (1..18000)/60 - interval – join, prune messages transmission interval.
seconds Returns the default value.
no ip (ipv6) pim
joinpruneinterval
console#
Basic configuration of PIM SM with static RP (1.1.1.1). The routing protocol must be configured
previously.
console# configure
console(config)# ip multicast-routing
console(config)# ip pim rp-address 1.1.1.1
AAA mechanism
To ensure system security, the switch uses AAA mechanism (Authentication, Authorization,
Accounting).
− Authentication – the process of matching with the existing account in the security system.
− Authorization (access level verification) – the process of defining specific privileges for the
existing account (already authorized) in the system.
− Accounting – user resource consumption monitoring.
The SSH mechanism is used for data encryption.
console(config)#
aaa accounting
-/Accounting is disabled by Enables accounting for 802.1x sessions.
default.
dot1x startstop Accounting will be enabled when the user logs in,
group radius and will be disabled when the user logs out,
corresponding to the start and stop values in
RADIUS messages (for RADIUS protocol message
parameters, see Table 130).
In the multiple sessions mode, start/stop messages
are sent for all users; in the multiple hosts mode –
only for authenticated users (see 802.1x Section).
aaa accounting commands -/by default, accounting Enables accounting CLI commands via TACACS+ protocol.
stop-only group tacacs+ the commands is disabled
To grant the client access to the device, even if all authentication methods failed, use the
'none' method.
Table 130 – RADIUS protocol accounting message attributes for control sessions
Attribute Attribute
Attribute presence in presence in Description
Start message Stop message
User-Name (1) Yes Yes User identification.
The IP address of the switch used for Radius server
NAS-IP-Address (4) Yes Yes
sessions.
An arbitrary value included in all session
Class (25) Yes Yes
accounting messages.
The IP address of the switch used for control
Called-Station-ID (30) Yes Yes
sessions.
Calling-Station-ID (31) Yes Yes User IP address.
Acct-Session-ID (44) Yes Yes Unique accounting identifier.
Acct-Authentic (45) Yes Yes Specify the method for client authentication.
ETS-1-10G-A 5. Device management. Command line interface 180
Table 131 – RADIUS protocol accounting message attributes for 802.1x sessions
Attribute Attribute
Attribute presence in presence in Description
Start message Stop message
User-Name (1) Yes Yes User identification.
The IP address of the switch used for Radius server
NAS-IP-Address (4) Yes Yes
sessions.
NAS-Port (5) Yes Yes The switch port the user is connected to.
An arbitrary value included in all session
Class (25) Yes Yes
accounting messages.
Called-Station-ID (30) Yes Yes IP address of the switch.
Calling-Station-ID (31) Yes Yes User IP address.
Acct-Session-ID (44) Yes Yes Unique accounting identifier.
Acct-Authentic (45) Yes Yes Specify the method for client authentication.
Show how long the user is connected to the
Acct-Session-Time (46) No Yes
system.
Acct-Terminate-Cause (49) No Yes The reason why the session is closed.
Nas-Port-Type (61) Yes Yes Show the client port type.
console(config-line)#
ETS-1-10G-A 5. Device management. Command line interface 181
password password
Specifies the terminal password.
- encrypted – encrypted password (for example, an
[encrypted] password: (0..159)
characters
encrypted password copied from another device).
no password Removes the terminal password.
console#
show users accounts - Shows local user database and their privileges.
ETS-1-10G-A 5. Device management. Command line interface 182
console>
All commands from this section are available to the privileged users only.
RADIUS
RADIUS is used for authentication, authorization and accounting. RADIUS server uses a user
database that contains authentication data for each user. Thus, RADIUS provides more secure access to
network resources and the switch itself.
encrypted radius-
secret_key: (0..128) - secret_key – authentication and encryption key for RADIUS
characters; data exchange;
server host {ipv4address
priority: (0..65535)/0; - priority – RADIUS server priority (the lower the value, the
| ipv6-address | hostname}
type: (login, dot1.x, all)/
[authport auth_port] higher the server priority);
all
[acctport acct_port] - type – the type of usage of the RADIUS server;
[timeout timeout] - encrypted – set the key in the encrypted form.
[retransmit retries] If timeout, retries, time, secret_key parameters are not specified in
[deadtime time] [key the command, the current RADIUS server uses the values
secret_key] [priority configured with the following commands.
priority] [usage type]
no radius-server host Removes the selected server from the list of RADIUS servers
{ipv4address | ipv6-address | used.
hostname}
[encrypted] radius- Specifies the default authentication and encryption key for
server key [key] RADIUS data exchange between the device and RADIUS
key: (0..128)
environment.
characters/default key
is an empty string - encrypted – set the key in the encrypted form.
no radius-server key Sets the default value.
radius-server Optimizes RADIUS server query time when some servers are
deadtime deadtime unavailable. Set the default time in minutes the RADIUS
deadtime: (0..2000)/0 client of the switch will not poll unavailable servers.
min Sets the default value.
no radius-server
deadtime
ETS-1-10G-A 5. Device management. Command line interface 184
console#
show radius server Shows RADIUS statistics, user information, RADIUS server
{statistics | group | configuration.
accounting |
configuration | nas | -
rejected | secret |
user}
ETS-1-10G-A 5. Device management. Command line interface 185
Set global values for the following parameters: server reply interval - 5 seconds, RADIUS server
discovery attempts - 5, time the switch RADIUS client will not poll unavailable servers - 10
minutes, secret key - secret. Add a RADIUS server located in the network node with the following
parameters: IP address 192.168.16.3, server authentication port 1645, server access attempts -
2.
console# configure
console (config)# radius-server timeout 5
console (config)# radius-server retransmit 5
console (config)# radius-server deadtime 10
console (config)# radius-server key secret
console (config)# radius-server host 196.168.16.3 auth-port 1645
retransmit 2
Global values
--------------
TimeOut : 5
Retransmit : 5
Deadtime : 10
Source IPv4 interface :
Source IPv6 interface :
TACACS+ protocol
The TACACS+ protocol provides a centralized security system that handles user authentication and
a centralized management system to ensure compatibility with RADIUS and other authentication
mechanisms. TACACS+ provides the following services:
− Authentication. Provided during login by user names and user-defined passwords.
− Authorization. Provided at login time. After the authentication session is complete, an
authentication session is started using a validated username, and user privileges are also
checked by the server.
ETS-1-10G-A 5. Device management. Command line interface 186
console(config)#
console#
ETS-1-10G-A 5. Device management. Command line interface 187
Switches allow you to configure the SNMP protocol for remote monitoring and device management.
The device supports SNMPv1, SNMPv2 and SNMPv3 protocol version.
console(config)#
ETS-1-10G-A 5. Device management. Command line interface 188
community: (1..20) Sets the value of community string for data exchange via SNMP
snmp-server community
characters; protocol.
community [ro | rw |
su] [ipv4_address | encrypted_community: - community – community string (password) for the access via SNMP;
(1..20) characters; - encrypted – set the community string in the encrypted form;
ipv6_address | ipv6z_address]
формат ipv4_address: - ro – read-only access;
[mask mask | prefix
A.B.C.D; - rw – read and write access;
prefix_length]] [view
ipv6_address format: - su – admin access;
view_name]
X:X:X:X::X. - view_name – defines a name for the SNMP view rule, which must
ipv6z_address format: be pre-defined with the snmp-server view command. Identifies the
snmp-server objects available to the community;
X:X:X:X::X%<ID>;
communitygroup
mask: - - ipv4_address, ipv6_address, ipv6z_address – device IP address;
community group_name - mask – IPv4 address mask, which determines which bits of the
/255.255.255.255;
[ipv4_address | ipv6_address | packet source address are compared with the specified IP address;
prefix_length:
ipv6z_address] [mask mask | - prefix_length – the number of bits that are prefix of IPv4 address;
(1..32)/32;
prefix prefix_length] - group_name – defines a group name to be pre-defined with the
view_name: (1..30)
characters; snmp-server group command. Identifies the objects available to the
group_name: (1..30) community.
characters
snmp-server view Creates or edits a review rule for SNMP – allowing rule or
view_name OID {included restricting browser server access to OID.
| excluded} - OID – MIB object identifier, represented in the form of an
ASN.1 tree (string of the form 1.3.6.2.4 may include reserved
words, for example: system, dod). With the symbol *, you can
view_name: (1..30)
characters designate a family of subtrees: 1.3.*.2);
- include – OID is included in the rule for review;
- exclude – OID is excluded from the rule for review.
no snmp-server view Removes the review rule for SNMP.
viewname [OID]
ETS-1-10G-A 5. Device management. Command line interface 189
encrypted snmp-server
username: (1..20) Creates an SNMPv3 user.
user username characters - username - username;
groupname {v3 | groupname: (1..30) - groupname – group name;
characters
remote host v3 - engineid-string – ID of the remote SNMP device to which the
engineid-string: (5..32)
[encrypted] [auth user belongs;
{md5|sha} auth- characters
password] } password: (1..32) - auth–password – password for authentication and key
symbols generation;
md5: - md5 – md5 key;
16 or 32 bytes - sha– sha key;
sha: - host – host IP address/name.
20 or 36 Removes the SNMP-v3 user.
no snmp-server user bytes
username [remote format
engineid-string]
IPv4: A.B.C.D
IPv6: X:X:X:X::X
IPv6z:
X:X:X:X::X%<ID>
Creates an SNMP group or table of SNMP users and SNMP view rules.
snmp-server group
- v1, v2, v3 – SNMP v1, v2, v3 security model;
group_name {v1 | v2 |
v3 {noauth | auth | - noauth, auth, priv – authentication type used by SNMP v3 protocol
priv} [notify (noauth – no authentication, auth – unencrypted authentication,
notify_view]} [read priv – encrypted authentication);
group_name: (1..30) - notify_view – the name of the browsing rule that is allowed
read_view] [write characters;
write_view] to define SNMP agent messages - inform and trap;
notify_view: (1..32)
characters;
- read_view – the name of the view rule that is only allowed
read_view: (1..32) to read the contents of the switch's SNMP agent;
characters; write_view: - write_view – the name of the view rule that is allowed to enter data
(1..32 characters) and configure the contents of the switch's SNMP agent.
no snmp-server group Deletes the SNMP group
groupname {v1 | v2 |
v3 [noauth | auth |
priv]}
snmp-server filter filter_name Creates or edits an SNMP filter rule that filters inform and trap
OID {included | excluded} messages sent to the SNMP server.
- filter_name – SNMP filter name;
- OID – MIB object identifier, represented in the form of an
ASN.1 tree (string of the form 1.3.6.2.4 may include reserved
filter_name: (1..30)
characters
words, for example: system, dod. With the symbol *, you can
designate a family of subtrees: 1.3.*.2);
- include – OID is included in the rule for filtering;
- exclude – OID is excluded from the rule for filtering.
no snmp-server filter Removes the SNMP filter rule.
filter_name [OID]
snmp-server host Defines settings for sending notification messages to inform
{ipv4_address | ipv6_address | and trap SNMP server.
hostname} [traps | informs] - community – SNMPv1/2c community string for sending
[version {1 | 2c | 3 {noauth |
notification messages;
auth | priv}] {community | hostname: (1..158) - username – SNMPv3 user name for authentication;
username} [udp-port port] characters
[filter filter_name] [timeout - version – defines the message type trap - trap SNMPv1, trap
community: (1..20) SNMPv2, trap SNMPv3;
seconds] [retries retries] characters;
- auth – specifies the authenticity of the unencrypted package;
username: (1..20)
characters
- noauth – does not specifies the authenticity of the package;
port: (1..65535)/162; - priv – specifies the authenticity of the encrypted package;
filter_name: (1..30) - port – SNMP server UDP port
characters; - seconds – the waiting period for confirmations before
seconds: (1..300)/15; resending inform messages;
retries: (0..255)/3 - retries – the number of attempts to transmit inform
messages, in the absence of confirmation.
no snmp-server host Removes the settings for sending notification messages
{ipv4_address | ipv6_address | inform and trap SNMPv1/v2/v3 to the server.
hostname} [traps | informs]
snmp-server engineid local Creates the local SNMP device identifier – engineID.
{engineid_string | default} - engineid_string – SNMP device name;
engineid_string: (5..32) - default – when using this setting, the engine ID will be
characters automatically created based on the MAC address of the
device.
no snmp-server engineid local Removes local SNMP device ID – engine ID
snmp-server sourceinterface Specifies a device interface whose IP address will be used as the
{traps | informs} { default source address for message exchange with SNMP server.
tengigabitethernet te_port |
te_port: (1..8/0/1..32);
port-channel group | loopback
loopback_id: (1..64);
loopback_id | vlan vlan id}
group: (1..32)
no snmp-server Deletes a device interface.
sourceinterface [traps |
informs]
ETS-1-10G-A 5. Device management. Command line interface 191
console(config-if)#
show snmp views view_name: (1..30) Shows the SNMP review rules.
[view_name] characters
show snmp groups group_name: (1..30) Shows the SNMP groups.
[group_name] characters
show snmp filters [filter_name] filter_name: (1..30) Shows the SNMP filters.
characters
show snmp users [user_name] user_name: (1..30) Shows the SNMP users.
characters
console(config)#
rmon table-size
hist_entries: Sets the maximum size of RMON tables.
(20..32767)/270; - history – maximum number of rows in the history table;
{history hist_entries |
log_entries: - log – maximum number of rows in the table of entries.
log log_entries}
(20..32767)/100 Value change will take effect after the switch is
restarted.
no rmon table-size Sets the default value.
{history | log}
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 143 – Ethernet, VLAN, port group interface configuration mode commands
console>
Port te0/10
Dropped: 8
Octets: 878128 Packets: 978
Broadcast: 7 Multicast: 1
ETS-1-10G-A 5. Device management. Command line interface 196
Parameter Description
Dropped Number of detected events when packets were discarded.
The number of data bytes (including bad packet bytes) received from the network
Octets
(excluding frame bits but including checksum bits).
Packets The number of packets received (including bad, broadcast and multicast packets).
Broadcast The number of broadcast packets received (correct packets only).
Multicast The number of multicast packets received (correct packets only).
The number of packets received that have an incorrect checksum, either with an integer
CRC Align Errors number of bytes (FCS checksum error) or an uninteger number of bytes (Alignment error),
ranging from 64 to 1,518 bytes inclusive.
Collisions Estimates the number of collisions on a given Ethernet segment.
The number of packets received is less than 64 bytes long (excluding frame bits but
Undersize Pkts
including checksum bits) but otherwise correctly generated.
The number of packets received is more than 1518 bytes long (excluding frame bits but
Oversize Pkts
including checksum bits) but otherwise correctly generated.
The number of packets received that are less than 64 bytes long (excluding frame bits, but
Fragments including checksum bits) that have an invalid checksum either with an integer number of
bytes (FCS checksum errors) or an uninteger number of bytes (Alignment errors).
The number of packets received that are more than 1518 bytes long (excluding frame bits,
Jabbers but including checksum bits) that have an invalid checksum either with an integer number
of bytes (FCS checksum errors) or an uninteger number of bytes (Alignment errors).
The number of packets received (including bad packets) that are 64 bytes long (excluding
64 Octet
frame bits, but including checksum bits).
The number of packets received (including bad packets) that are from 65 to 127 bytes long
65 to 127 Octets
inclusive (excluding frame bits, but including checksum bits).
The number of packets received (including bad packets) that are from 128 to 255 bytes
128 to 255 Octets
long inclusive (excluding frame bits, but including checksum bits).
The number of packets received (including bad packets) that are from 256 to 511 bytes
256 to 511 Octets
long inclusive (excluding frame bits, but including checksum bits).
ETS-1-10G-A 5. Device management. Command line interface 197
The number of packets received (including bad packets) that are from 512 to 1023 bytes
512 to 1023 Octets
long inclusive (excluding frame bits, but including checksum bits).
The number of packets received (including bad packets) that are from 1024 to 1518 bytes
1024 to 1518 Octets
long inclusive (excluding frame bits, but including checksum bits).
Parameter Description
Index An index that uniquely identifies an entry.
Interface The Ethernet interface on which the polling is running.
Interval The interval in seconds between surveys.
Requested Samples Requested number of counts that can be saved.
Granted Samples Allowed (remaining) number of counts that can be saved.
Owner The owner of current entry.
Parameter Description
Time Date and time of entry creation.
ETS-1-10G-A 5. Device management. Command line interface 198
The number of data bytes (including bad packet bytes) received from the network
Octets
(excluding frame bits but including checksum bits).
Packets The number of packets received (including bad packets) during the entry formation period.
The number of good packets received during the formation period of the broadcast
Broadcast
address entry.
The number of good packets received during the formation period of the multicast address
Multicast
entry.
Estimate the average bandwidth of the physical layer on a given interface during the entry
Utilization
formation period. Throughput is estimated at up to a thousand percent.
The number of packets received during the entry formation period that have an incorrect
CRC Align checksum, either with an integer number of bytes (FCS checksum error) or an uninteger
number of bytes (Alignment error), ranging from 64 to 1,518 bytes inclusive.
Estimate the number of conflicts on a given Ethernet segment during the entry formation
Collisions
period.
The number of packets received during the entry formation period is less than 64 bytes
Undersize Pkts
long (excluding frame bits but including checksum bits) but otherwise correctly generated.
The number of packets received during the entry formation period is more than 1518 bytes
Oversize Pkts
long (excluding frame bits but including checksum bits) but otherwise correctly generated.
The number of packets received during the entry formation period that are less than 64
bytes long (excluding frame bits, but including checksum bits) that have an invalid
Fragments
checksum either with an integer number of bytes (FCS checksum errors) or an uninteger
number of bytes (Alignment errors).
The number of packets received during the entry formation period that are more than
1518 bytes long (excluding frame bits, but including checksum bits) that have an invalid
Jabbers checksum either with an integer number of bytes (FCS checksum errors) or an uninteger
number of bytes (Alignment errors).
The number of events detected when packets were discarded during the entry formation
Dropped
period.
Parameter Description
Index An index that uniquely identifies an entry
OID Controlled variable OID
Owner The user that created the entry.
Alarm 1
-------
OID: 1.3.6.1.2.1.2.2.1.10.1
Last sample Value: 878128
Interval: 30
Sample Type: delta
Startup Alarm: rising
Rising Threshold: 8700000
Falling Threshold: 78
Rising Event: 1
Falling Event: 1
Owner: CLI
Parameter Description
OID Controlled variable OID.
The value of the variable in the last control interval. If the method of selecting variables is
Last Sample Value absolute – it is an absolute value of the variable, if delta – it is the difference between the
values of the variable at the end and beginning of the control interval.
The interval in seconds during which data are sampled and compared to the upper and
Interval
lower limits.
Method of selecting the specified variables and calculating the value for comparison with
the boundaries. Absolute method – the absolute value of the selected variable will be
compared to the boundary at the end of the investigated interval. Delta method– the
Sample Type
value of the selected variable at the last selection will be subtracted from the current value
and the difference will be compared with the borders (difference between the variable
values at the end and at the beginning of the control interval).
ETS-1-10G-A 5. Device management. Command line interface 200
Instructions for generating events in the first control interval. Defines the rules of
generating emergency events for the first control interval by comparing the selected
variable with one or both boundaries.
rising – generate a single uplink border emergency event if the value of the selected
variable in the first control interval is greater than or equal to this border.
Startup Alarm
falling – generate a single downlink border emergency event if the value of the selected
variable in the first control interval is less than or equal to this border.
rising-falling – generate a single uplink and/or downlink emergency event if the value of
the selected variable in the first control interval is greater than or equal to the uplink
and/or downlink border.
The value of the uplink border. When the value of the selected variable in the previous
rising threshold control interval was less than the given boundary, and in the current control interval is
greater than or equal to the boundary value, then a single event is generated.
The value of the downlink border. When the value of the selected variable in the previous
falling threshold control interval was greater than the given boundary, and in the current control interval is
less than or equal to the boundary value, then a single event is generated.
Rising Event The index of the event used when the uplink border is crossed.
Falling Event The index of the event used when the downlink border is crossed.
Owner The user that created the entry.
Parameter Description
Index An index that uniquely identifies an event.
Description A comment describing the event.
The type of notification the device generates for this event:
none – do not generate notifications,
Type log – generate table entry,
trap – send SNMP trap,
log-trap – generate a table entry and send SNMP trap.
Community SNMP community string to forward trap.
Owner The user that created the event.
ETS-1-10G-A 5. Device management. Command line interface 201
Time and date of generation of the last event. If no events were generated, this value will
Last time sent
be zero.
Parameter Description
Index An index that uniquely identifies an entry.
Description A comment describing the event.
Time Time at which the entry is generated.
console(config)#
Command line prompt in the access control list configuration mode is as follows:
console#
Access configuration
console(config)#
The keys generated by the crypto key generate rsa and crypto key generate dsa commands
are stored in a closed configuration file.
console# configure
console(config)# crypto key pubkey-chain ssh
console(config-pubkey-chain)#
Command line prompt in the individual public key generation mode is as follows:
console# configure
console(config)# crypto key pubkey-chain ssh
console(config-pubkey-chain)# user-key RAD rsa
console(config-pubkey-key)#
key-string row Creates the public key for a specific user. The key is
key_string entered line by line.
- - key_string – key part.
To notify the system that the key is entered, type the
“key-string row” command without any characters.
Commands given in this section are available to the privileged users only.
console#
Enable SSH server on the switch. Enable the use of public keys. Create an RSA key for the RAD user:
console# configure
console(config)# ip ssh server
console(config)# ip ssh pubkey-auth
console(config)# crypto key pubkey-chain ssh
console(config-pubkey-chain)# user-key RAD rsa
console(config-pubkey-key)# key-string
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWlAl4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ZNX
fZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1gkTwml7
ETS-1-10G-A 5. Device management. Command line interface 208
5QR9gHujS6KwGN2QWXgh3ub8gDjTSqmuSn/Wd05iDX2IExQWu08licglk02LYciz+Z4TrEU/9
FJxwPiVQOjc+KBXuR0juNg5nFYsY0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA6w9o44t6+AIN
EICBCCA4YcF6zMzaT1wefWwX6f+Rmt5nhhqdAtN/4oJfce166DqVX1gWmNzNR4DYDvSzg0lDn
wCAC8Qh
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
console(config)#
console# configure
console(config)# line {console|telnet|ssh}
console(config-line)#
exec-timeout minutes minutes: (0..65535)/10 Specify the interval the system waits for user input. If the user
[seconds] min; does not input anything during this interval, the console exits.
no exec-timeout seconds: (0..59)/0 sec Sets the default value.
console#
no logging on -/logging is enabled Disables logging of debug messages and error messages.
When registration is disabled, debug and error messages
will be sent to the console.
logging host {ip_address | Enables transmission of alarm and debug messages to the
host} [port port] [severity remote SYSLOG server.
level] [facility facility] - ip_address– IPv4 or IPv6 address of the SYSLOG server;
[description text] host: (1..158) characters - host – SYSLOG server network name;
port: (1..65535)/514;
- port – port number for SYSLOG messages;
level: (see Table 163);
- level – importance level of messages sent to the SYSLOG
facility:
server;
(local0..7)/local7;
text: (1..64) characters
- facility – service sent in messages;
- text – SYSLOG server description.
no logging host {ip_address | Removes the selected server from the list of SYSLOG
host} servers used.
logging console [level]
Enables the transmission of alarm or debug messages of a
level: (Table selected importance level to the console.
163)/informational
no logging console Disables sending alarm or debug messages to the console.
logging origin-id {string | Defines the parameter to be used as the host identifier in
hostname | ip | ipv6} -/no syslog messages.
no logging origin-id Use the default value.
logging source-interface { Use the IP address of the specified interface as a source in
tengigabitethernet te_port te_port: (1..8/0/1..32);
loopback_id: (1..64);
SYSLOG IP packets.
| port-channel group |
group: (1..32);
loopback loopback_id | vlan
vlan_id} vlan_id: (1..4094)
no logging source-interface Use the IP address of the outgoing interface.
logging source-interface-ipv6 { Use the IPv6 address of the specified interface as a source
tengigabitethernet te_port te_port: (1..8/0/1..32); in SYSLOG IP packets.
| port-channel group | loopback_id: (1..64);
loopback loopback_id | vlan group: (1..32);
vlan_id}
vlan_id: (1..4094)
no logging source-interface- Use the IPv6 address of the outgoing interface.
ipv6
Each message has its own importance level; the table 163 shows the types of messages in
descending order of their importance.
Table 164 – Privileged EXEC mode command to view the log file
clear logging file - Removes all messages from the log file.
show logging file Displays log status, alarms and debug messages recorded in the log
-
file.
show logging Displays log status, alarms and debug messages recorded in the
-
internal buffer.
show syslog-servers - Displays settings for remote syslog servers.
If more than one physical interface is mirrored, traffic may be lost. No loss is guaranteed only
when mirroring one physical interface
– A port cannot be a control port and a controlled port at the same time;
– A port cannot be a member of a port group;
– There must be no IP interface for this port;
– The GVRP shall be disabled on this port.
monitor session session_id Adds the specified mirror port for the selected monitoring session.
source interface rx – copy the packets received by the controlled port;
tengigabitethernet te_port session_id: (1..7); tx – copy the packets transmitted by the controlled port;
[rx | tx | both] te_port: (1..8/0/1..32): both – copy all packets from a controlled port.
monitor session session_id Disables the monitoring function for the interface.
source interface
tengigabitethernet te_port
monitor session session_id Adds the specified mirror vlan for the selected monitoring session.
source vlan vlan_id
vlan_id: (1..4094);
session_id: (1..7) Disables the monitoring function for the interface.
no monitor session session_id
source vlan vlan_id
monitor session session_id Adds as a source vlan with previously mirrored traffic for the selected
source remote vlan vlan_id monitoring session.
vlan_id: (1..4094);
session_id: (1..7)
no monitor session session_id Disables the monitoring function for the interface.
source remote vlan vlan_id
console(config)#
no sflow receiver id ipv6_address format: Removes the address of the sflow statistics collection server.
X:X:X:X::X.
ipv6z_address format:
X:X:X:X::X%<ID>;
url: (1..158) characters
sflow receiver Specifies a device interface whose IP address will be used as the
{sourceinterface | default source statistics collection address.
sourceinterface-ipv6} {
vlan_id: (1..4094)
tengigabitethernet te_port |
te_port: (1..8/0/1..32);
port-channel l group |
loopback_id: (1..64);
loopback loopback_id | vlan
group: (1..32)
vlan_id | oob}
no sflow receiver Removes the explicit specification of the interface from which sflow
sourceinterface statistics will be sent
console# configure
console(config)# interface { tengigabitethernet te_port | }
console(config-if)#
console>
console# configure
console(config)# sflow receiver 1 10.0.80.1
console(config)# interface range tengigabitethernet 1/0/1-24
console(config-if-range)# sflow flowing-sample 1 10240
console (config-if)# sflow counters-sampling 240 1
It is possible to automatically control the state of communication lines. For this purpose, the switch
periodically polls the optical interface parameters and compares them with the thresholds set by the
transceiver manufacturers. The switch generates warning and alarm messages when parameters are out
of acceptable limits.
console>
Transceiver information:
Vendor name: OEM
Serial number: S1C53253701833
Connector type: SC
Type: SFP/SFP+
Compliance code: BaseBX10
Laser wavelength: 1550 nm
Transfer distance: 20000 m
Diagnostic: supported
Parameter Value
Temp Transceiver temperature.
Voltage Transceiver power supply voltage.
Current Current deflection on the transmission.
Output Power Output power on the transmission (mW).
Input Power Input power on the reception (mW).
LOS Loss of signal.
the required addresses, the port should be locked, protecting it from receiving packets with unexplored
MAC addresses. Thus, when a blocked port receives a packet and the MAC address of the packet source
is not associated with that port, the protection mechanism is activated, depending on which the following
measures can be taken: unauthorized packets arriving at the blocked port are forwarded, discarded, or
the port that received the packet is disabled. The Locked Port security feature allows to save a list of
learned MAC addresses in a configuration file, so that this list can be restored after the device reboots.
There is a limit on the number of MAC addresses that can be learned by a port that uses
the security feature.
show ports security Shows current dynamic addresses for blocked ports.
addresses {
tengigabitethernet te_port: (1..8/0/1..32);
te_port | port-channel group: (1..32)
group | detailed}
ETS-1-10G-A 5. Device management. Command line interface 221
set interface active Activates the interface disabled by the port protection
{ tengigabitethernet te_port: (1..8/0/1..32); function (the command is available only to the privileged
te_port | port-channel group: (1..32) user).
group}
Enable protection function on 15th Ethernet interface. Set an address limit of 1 address. After
learning the MAC address, block the new address learning function for the interface in order to
discard packets with unlearned source MAC addresses. Save the learned address to a file.
console# configure
console(config)# interface tengigabitethernet 1/0/15
console(config-if)# port security
console(config-if)# port security max 1
Connect the client to the port and learn the MAC address.
console(config-if)# port security discard
console(config-if)# port security mode lock
Authentication based on 802.1x standard provides switch users authentication through an external
server based on the port to which the client is connected. Only authenticated and authorized users can
transmit and receive data. Authentication of port users is performed by the RADIUS server via the EAP
(Extensible Authentication Protocol).
EAP (Extensible Authentication Protocol) performs tasks to authenticate the remote client,
while defining the authentication mechanism.
ETS-1-10G-A 5. Device management. Command line interface 223
dot1x timeout eap- Defines the time interval in seconds during which the EAP
timeout period server waits for a response from the EAP client before
resending the request.
dot1x timeout Defines the period of time that the requestor waits until
supplicant-held- authentication is restarted after receiving a FAIL
period period response from the Radius server.
period: (1..65535) /60
Dot1x timeout quiet- Sets the period during which the switch remains silent
period period after unsuccessful authentication.
During the silent period, the switch does not accept or
period: (10..65535)/60
sec initiate any authentication messages.
No dot1x timeout Sets the default value.
quietperiod
dot1x timeout tx- Sets the period during which the switch waits for a
period period response or EAP identification from the client before
period: (30..65535)/30 resending the request.
sec Sets the default value.
No dot1x timeout tx-
period
Dot1x timeout Sets the period during which the switch expects a
servertimeout period response from the authentication server.
period: (1..65535)/30
seconds Sets the default value.
No dot1x timeout
servertimeout
Dot1x timeout Sets the time period of inactivity of the client, after which
silenceperiod period the client becomes unauthorized.
period: (60..65535)
sec/not specified Sets the default value.
No dot1x timeout
silenceperiod
ETS-1-10G-A 5. Device management. Command line interface 225
Value/Default
Command Action
value
dot1x unlock client Block the client with the specified MAC-address on the port
tengigabitethernet te_port: at achievement of a threshold of the maximum possible
(1..8/0/1..32); attempts of authentification.
te_port mac_address
show dot1x interface Shows 802.1X status for the switch or the specified
{tengigabitethernet te_port: interface.
te_port | (1..8/0/1..32);
oob}
show dot1x statistics Shows 802.1X statistics for the selected interface.
te_port:
interface {
tengigabitethernet (1..8/0/1..32);
te_port | oob}
Enable 802.1x switch authentication mode. Use a RADIUS server to authenticate clients on IEEE
802.1X interfaces. For 8th Ethernet interface use 802.1x authentication mode.
console# configure
console(config)# dot1x system-auth-control
console(config)# aaa authentication dot1x default radius
console(config)# interface tengigabitethernet 1/0/8
console(config-if)# dot1x port-control auto
ETS-1-10G-A 5. Device management. Command line interface 226
Show 802.1x status for the switch, for 8th Ethernet interface.
Authentication is enabled
Authenticating Servers: Radius
Unauthenticated VLANs:
Authentication failure traps are disabled
Authentication success traps are disabled
Authentication quiet traps are disabled
te1/0/8
Host mode: multi-host
Port Administrated Status: auto
Guest VLAN: disabled
Open access: disabled
Server timeout: 30 sec
Port Operational Status: unauthorized*
* Port is down or not present
Reauthentication is disabled
Reauthentication period: 3600 sec
Silence period: 0 sec
Quiet period: 60 sec
Interfaces 802.1X-Based Parameters
Tx period: 30 sec
Supplicant timeout: 30 sec
Max req: 2
Authentication success: 0
Authentication fails: 0
Parameter Description
Port Port number.
Admin mode 802.1X authentication mode: Force-auth, Force-unauth, Auto.
Oper mode Port operation mode: Authorized, Unauthorized, Down.
Reauth Control Reauthentication control.
Reauth Period Period between re-authentications.
Username when using 802.1X. If the port is authorized, the current user name is displayed.
Username If the port is not authorized, the name of the last successfully authorized user on the port
is displayed.
Quiet period Period during which the switch remains silent after unsuccessful authentication.
Period during which the switch waits for a response or EAP identification from the client
Tx period
before resending the request.
ETS-1-10G-A 5. Device management. Command line interface 227
Maximum number of attempts to transmit EAP requests to the client before restarting the
Max req
authentication process.
Supplicant timeout Period between repeated transmissions of protocol requests to the EAP client.
Server timeout Period during which the switch expects a response from the authentication server.
Session Time The time it takes the user to connect to the device.
Mac address User MAC address.
Authentication Method Method of authentication of the established session.
Termination Cause The reason why the session is closed.
The current value of the state automaton of the authenticator and the state output
State
automaton.
Authentication success The number of successful authentication messages received from the server.
Authentication fails The number of unsuccessful authentication messages received from the server.
VLAN The VLAN group is assigned to the user.
Filter ID Identifier of the filtering group.
EapolFramesRx: 12
EapolFramesTx: 8
EapolStartFramesRx: 1
EapolLogoffFramesRx: 1
EapolRespIdFramesRx: 4
EapolRespFramesRx: 6
EapolReqIdFramesTx: 3
EapolReqFramesTx: 5
InvalidEapolFramesRx: 0
EapLengthErrorFramesRx: 0
LastEapolFrameVersion: 1
LastEapolFrameSource: 00:00:02:56:54:38
Parameter Description
The number of valid packets of any type of EAPOL (Extensible Authentication Protocol
EapolFramesRx
over LAN) accepted by the given authenticator.
The number of correct packets of any type of EAPOL protocol transmitted by the data
EapolFramesTx
authenticator.
EapolStartFramesRx The number of EAPOL Start packets received by the given authenticator.
ETS-1-10G-A 5. Device management. Command line interface 228
EapolLogoffFramesRx The number of EAPOL Logoff packets received by the given authenticator.
EapolRespIdFramesRx The number of EAPOL Resp/Id packets received by the given authenticator.
The number of response packets (except Resp/Id) of the EAPOL received by this
EapolRespFramesRx
authenticator.
EapolReqIdFramesTx The number of EAPOL Resp/Id packets transmitted by the given authenticator.
The number of request packets (except Resp/Id) of the EAPOL transmitted by this
EapolReqFramesTx
authenticator.
The number of EAPOL packets of the unrecognized type received by this
InvalidEapolFramesRx
authenticator.
The number of EAPOL packets of incorrect length received by the given
EapLengthErrorFramesRx
authenticator.
The version of the EAPOL protocol received in the most recent package at the
LastEapolFrameVersion
moment.
LastEapolFrameSource Source MAC address accepted in the most recent package at the moment.
console(config)#
dot1x traps Enables trap messages to be sent when the client is not
authentication authenticated.
failure [802.1x | mac
| web]
-/disabled
no dot1x traps Sets the default value.
authentication
failure
dot1x traps Enables sending trap messages when the user has exceeded
authentication quiet the maximum allowed number of unsuccessful
-/disabled authentication attempts.
no dot1x traps Sets the default value.
authentication quiet
console(config-if)#
dot1x violation-mode Sets the action to be performed when a device whose MAC
{restrict | protect | address is different from the client's MAC address attempts
shutdown} [trap freq] to access the interface.
- restrict – packets with a different MAC address than the
client's MAC address are forwarded without the source
address being learned;
- protect – packets with a different MAC
-/protect; address than the client's MAC address are
freq: (1..1000000)/1 rejected;
sec - shutdown – port disables, packets with a different MAC
address than the client's MAC address are rejected;
- freq – frequency of generated SNMP trap messages
when unauthorized packets are received.
The command is ignored in Multiple hosts mode.
no dot1x Sets the default value.
singlehostviolation
dot1x max-hosts hosts Sets the maximum number of hosts that have been
authenticated.
hosts: (1..4294967295)
no dot1x max-hosts Returns the default value.
dot1x max-login- Sets the number of unsuccessful login attempts, after which
attempts num the client is blocked.
num: (0, 3..10)/0 0 – infinite number of attempts
no dot1x Returns the default value.
maxloginattempts
console#
To use Option 82, the DHCP relay agent function must be enabled on the device. The IP dhcp
relay enable command in global configuration mode is used to enable the DHCP relay agent
(see the corresponding documentation section).
For the DHCP Snooping function to work correctly, all used DHCP servers must be connected
to 'trusted' switch ports. To add a port to the list of 'trusted' uses the IP dhcp snooping trust
command in the interface configuration mode. For safety reasons, all other switch ports must
be 'untrusted'.
console(config)#
no ip dhcp information option Disables the device to add option 82 when running DHCP.
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 185 – Ethernet, VLAN, port group interface configuration mode commands
console#
console#
console# configure
console(config)# ip dhcp relay enable
console(config)# ip dhcp information option
Interface Trusted
----------- ------------
te0/17 yes
IP-source Guard
The IP Source Guard function is designed to filter the traffic received from the interface based on
the DHCP snooping table and static IP Source Guard matches. Thus, IP Source Guard allows to prevent IP
address spoofing in packets.
Since the IP address protection control function uses DHCP snooping tables, it makes sense
to use this function by pre-configuring and enabling DHCP snooping.
The IP Source Guard function must be enabled globally for the interface as well.
console(config)#
ip source-guard tcam Defines how often the device accesses internal resources in
retriesfreq {seconds | order to write inactive protected IP addresses to the
never} memory.
seconds: (10..600)/60 - never – prohibits recording inactive protected IP addresses
sec to the memory.
no ip source-guard Sets the default value.
tcam retries-freq
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 189 – Ethernet, VLAN, port group interface configuration mode commands
console#
console#
show ip source-guard The command displays the sender's IP addresses that are
inactive - not active.
ETS-1-10G-A 5. Device management. Command line interface 238
Interface State
--------- ------
te0/4 Enabled
te0/21 Enabled
te0/22 Enabled
Enable IP address protection to filter traffic based on DHCP snooping table and static IP Source
Guard matches. Create a static table entry for the Ethernet 12 interface: Client IP address –
192.168.16.14, MAC address – 00:60:70:4A:AB:AF. Interface in the 3rd VLAN group:
console# configure
console(config)# ip dhcp snooping
console(config)# ip source-guard
console(config)# ip source-guard binding 0060.704A.ABAF 3 192.168.16.14
tengigabitethernet 1/0/12
ARP Inspection
The ARP Inspection function is dedicated to defense against attacks which use ARP (for instance,
ARP-spoofing – ARP traffic interception). ARP Inspection is implemented on the basis of static
correspondence between IP and MAC addresses defined for VLAN group.
The port configured as 'untrusted' for the ARP Inspection function must also be 'untrusted' for
the DHCP snooping function or the MAC address and IP address matching for this port must be
configured statically. Otherwise, this port will not respond to ARP requests.
For untrusted ports, IP and MAC address matches are checked.
console(config)#
ETS-1-10G-A 5. Device management. Command line interface 239
ip arp inspection Provides specific checks for monitoring the ARP protocol.
validate Source MAC address: For ARP queries and responses, the
MAC address in the Ethernet header of the MAC source
address in the ARP content is verified.
Destination MAC address: For ARP responses, the
correspondence of the MAC address in the Ethernet header
- to the destination MAC address in the ARP content is
checked.
IP address: The contents of the ARP packet are checked for
incorrect IP addresses.
no ip arp inspection Prohibits specific checks for monitoring the ARP protocol.
validate
ip arp inspection Assigns a list of static ARP matches for the specified VLAN.
list assign vlan_id
vlan_id: (1..4094)
no ip arp inspection Removes the list of static ARP matches for the specified VLAN.
list assign vlan_id
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 193 – Ethernet, VLAN, port group interface configuration mode commands
Shows statistics for the following types of packets that have been
show ip arp
inspection statistics processed using the ARP function:
[vlan vlan_id] vlan_id: (1..4094) - forwarded packets;
- dropped packets;
- IP/MAC Failures.
Clears the ARP Inspection control statistics.
clear ip arp
inspection statistics vlan_id: (1..4094)
[vlan vlan_id]
console# configure
console(config)# ip arp inspection list create spisok
console(config-ARP-list)# ip 192.168.16.98 mac-address 0060.70AB.CCCD
console(config-ARP-list)# exit
console(config)# ip arp inspection list assign 11 spisok
console(config)#
ip dhcp relay address Specifies the IP address of an available DHCP server for the
ip_address DHCP Relay agent.
Up to eight servers can
be specified Removes the IP address from the list of DHCP servers for the
no ip dhcp relay
address [ip_address]
DHCP Relay agent.
console# configure
console(config)# interface vlan vlan_id
console(config-if)#
ETS-1-10G-A 5. Device management. Command line interface 243
Ethernet switches can operate as a DHCP client (obtaining its own IP address from a DHCP server)
or as a DHCP server. In case the DHCP server is disabled, the switch can work with DHCP Relay.
A type of command line query in the DHCP server static address configuration mode:
console# configure
console(config)# ip dhcp pool host name
console(config-dhcp)#
ETS-1-10G-A 5. Device management. Command line interface 245
lease {days [hours The lease time of the IP address that is assigned from
[minutes]] | DHCP.
infinite} - infinite – lease time is unlimited;
- days – amount of days;
-/1 day
- hours – amount of hours;
- minutes – amount of minutes.
no lease Set the default value.
ETS-1-10G-A 5. Device management. Command line interface 246
Configuration mode commands for DHCP server pool and static DHCP server addresses
netbios-node-type {b- Defines the Microsoft NetBIOS host type for DHCP
node | pnode | m- clients:
node | h-node} - b-node – broadcast;
By default, the type of
- p-node – point-to-point;
NetBIOS host is not
defined. - m-node – combined;
- h-node – hybrid.
no netbios-node-type Sets the default value.
next-server-name name It is used to specify to a DHCP client the server name from
name: (1..64) which a download file is to be obtained.
characters Sets the default value.
no next-server-name
bootfile filename Specifies the name of the file used to start up the DHCP
filename: (1..128) client.
characters Sets the default value.
no bootfile
show ip dhcp View the IP addresses that the DHCP server will not assign
excludedaddresses - to DHCP clients.
ETS-1-10G-A 5. Device management. Command line interface 248
show ip dhcp pool View the configuration for static DHCP server addresses:
name: (1..32 - ip_address – client IP address;
host [ip_address |
name] characters) - name – name of the address DHCP pool.
View the DHCP address pool configuration of the DHCP
show ip dhcp pool name: (1..32
server:
network [name] characters)
- name – name of the address DHCP pool.
show ip dhcp binding Viewing IP addresses that are mapped to physical
[ip_address] - addresses of clients, as well as lease time, destination
method and status of IP addresses.
show ip dhcp server View the DHCP server statistics.
statistics -
show ip dhcp View the active IP addresses issued by the DHCP server.
allocated -
Configure a DHCP pool named test and specify for DHCP clients: domain name – test.ru, default
gateway – 192.168.45.1 and DNS server – 192.168.45.112.
console#
console# configure
console(config)# ip dhcp pool network test
console(config-dhcp)# address 192.168.45.0 255.255.255.0
console(config-dhcp)# domain-name test.ru
console(config-dhcp)# dns-server 192.168.45.112
console(config-dhcp)# default-router 192.168.45.1
The ACL based on IPv6, IPv4 and MAC addresses should have different names.
IPv6 and IPv4 lists can work together on the same physical interface. An ACL list based on
MAC addressing cannot be matched with lists for IPv4 or IPv6. Two lists of the same type
cannot work together on the interface.
ETS-1-10G-A 5. Device management. Command line interface 249
Commands for creating and editing ACL lists are available in global configuration mode.
The command line in the global configuration mode has the form:
console (config)#
ip access-list Create a new advanced ACL list for IPv4 addressing and enter
extended access_list the configuration mode (if the list with this name has not
been created yet), or enter the configuration mode of the
previously created list.
no ip access-list Deleting the extended ACL list for IPv4 addressing.
extended access_list
access_list: (0..32)
symbols Create a new standard ACL list for IPv6 addressing.
ipv6 access-list
access_list {deny | - deny – prohibit the passage of packages with the specified
permit} {any | parameters;
ipv6_address - permit – enable the passage of packages with the specified
[ipv6_address_prefix]} parameters.
no ipv6 access-list Remove a new standard ACL list for IPv6 addressing.
access_list
ipv6 access-list Create a new advanced ACL list for IPv6 addressing and enter
extended access_list the configuration mode (if the list with this name has not
been created yet), or enter the configuration mode of the
previously created list.
no ipv6 access-list Deleting the extended ACL list for IPv6 addressing.
extended access_list
ETS-1-10G-A 5. Device management. Command line interface 250
mac access-list Create a new ACL list for MAC addressing and enter the
extended access_list configuration mode (if the list with this name has not been
created yet), or enter the configuration mode of the
previously created list.
no mac access-list Deleting the ACL list for MAC addressing.
extended access_list
time-range time_name Enter the time-range configuration mode and define time
intervals for the access list.
- time_name – time-range configuration
time_name: (0..32)
symbols
profile name.
no time-range Deletion of the set timerange configuration.
time_name
In order to activate the ACL list, you must link it to the interface. The interface using the list can be
either an Ethernet interface or a port group.
The command line in the Ethernet, VLAN, port group configuration mode looks like:
console(config-if)#
The command line in the Priveleged Exec mode has the form:
console#
Zero all ACL list counters, or counters for ACL lists of a given
clear access-lists counters
te_port: (1..8/0/1..32); interface.
[tengigabitethernet te_port |
group: (1..32);
port-channel group | vlan
vlan_id: (1..4094);
vlan_id]
console#
console#
ETS-1-10G-A 5. Device management. Command line interface 252
console# configure
console(config)# ip access-list extended RADAL
console(config-ip-al)#
Table 208 – Basic parameters used in commands
icmp_type The type of ICMP messages used to filter ICMP packets. Possible
types of messages in icmp_type field: echo-reply, destination-
unreachable, source-quench, redirect, alternate-host-address,
echo-request, router-advertisement, router-solicitation, time-
exceeded, parameter-problem, timestamp, timestamp-reply,
- information-request, information-reply, address-mask-request,
address-mask-reply, traceroute, datagram-conversion-error,
mobile-host-redirect, mobile-registration-request, mobile-
registration-reply, domain_name-request, domain_name-reply,
skip, photuris, or the numeric value of the message type, in the
range (0 - 255).
icmp_code The code of ICMP protocol messages used to filter ICMP packets.
ICMP message code
Possible message codes of the icmp_code field: (0 – 255).
igmp_type The type of IGMP messages used to filter IGMP packets. Possible
types of messages in the igmp_type field: host-query, host-report,
IGMP message type dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-
report-v3, or the numeric value of the message type, in the range
(0 - 255).
destination_port Destination UDP/TCP port Possible TCP port field values: bgp (179), chargen (19), daytime
source_port (13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp
(21), ftp-data (20), gopher (70), hostname (42), irc (194), klogin
(543), kshell (544), lpd (515), nntp (119), pop2 (109), pop3 (110),
smtp (25), sunrpc (1110, syslog (514), tacacs-ds (49), talk (517),
telnet (23), time (37), uucp (117), whois (43), www (80);
For UDP port: biff (512), bootpc (68), bootps (67), discard (9), dnsix
Source UDP/TCP port (90), domain (53), echo (7), mobile-ip (434), nameserver (42),
netbios-dgm (138), netbios-ns (137), on500-isakmp (4500), ntp
(123), rip (520), snmp (161), snmptrap (162), sunrpc (111), syslog
(514), tacacs-ds (49), talk (517), tftp (69), time (37), who (513),
xdmcp (177).
Either a numeric value (0 – 65535).
list_of_flags If the flag must be set for the filtering condition, a '+' sign is placed
in front of it, if not, a '-' sign is placed. Possible flags: +urg, +ack,
TCP flags +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn и -fin. When using
multiple flags in a filter condition, the flags are merged into one
line without spaces, for example: +fin-ack.
disable_port Disables the port from which the package was received that meets
Port disabling
the conditions of any deny command with the field described in it.
log_input Enables sending information messages to the system log when a
Sending messages
package that matches a record is received.
offset_list_name Name of the list of user Sets the list of user templates to be used to recognize packages. A
templates template list can be defined for each ACL list.
ace-priority The index specifies the position of a rule in the list and its priority.
Entry priority The smaller the index, the higher the priority rule. The range of
permissible values (1...2147483647).
ETS-1-10G-A 5. Device management. Command line interface 254
The parameter 'any' is used to select the entire parameter range except for dscp and IP-
precedence.
Once at least one entry has been added to the ACL list, the last deny any any any entry is
added by default, which means ignoring all packets that do not meet the ACL conditions.
Command Action
Adds an allowing filtering record for the protocol. Packets that
permit protocol {any | source source_wildcard}
meet the entry conditions will be processed by the switch.
{any | destination destination_wildcard} [dscp
dscp | precedence precedence] [timerange
time_name] [acepriority index]
Adds an allowing filtering record for the IP. Packets that meet the
permit ip {any | source_ip source_ip_wildcard}
entry conditions will be processed by the switch.
{any | destination_ip destination_ip_wildcard}
[dscp dscp | precedence precedence]
[timerange range_name] [ace priority index]
Adds an allowing filtering record for the ICMP. Packets that meet
permit icmp {any | source source_wildcard}
the entry conditions will be processed by the switch.
{any | destination destination_wildcard}
{any | icmp_type} {any | icmp_code} [dscp
dscp | ipprecedence precedence]
[timerange time_name] [ace-priority
index] [offsetlist offset_list_name]
[vlan vlan_id]
ETS-1-10G-A 5. Device management. Command line interface 255
Adds an allowing filtering record for the IGMP. Packets that meet
permit igmp {any | source source_wildcard}
the entry conditions will be processed by the switch.
{any | destination destination_wildcard}
[igmp_type] [dscp dscp | precedence
precedence] [timerange time_name]
[acepriority index]
permit tcp {any | source source_wildcard} {any | Adds an allowing filtering record for the TCP. Packets that meet
source_port} {any | destination destination_wildcard} the entry conditions will be processed by the switch.
{any | destination_port} [dscp dscp | precedence
precedence] [matchall list_of_flags] [timerange
time_name] [acepriority index]
no permit tcp {any | source source_wildcard } {any | Removes a previously created record.
source_port} {any | destination destination_wildcard}
{any | destination_port} [dscp dscp | precedence
precedence] [matchall list_of_flags] [time-range
time_name]
permit udp {any | source source_wildcard} {any | Adds an allowing filtering record for the UDP. Packets that meet
source_port} {any | destination destination_wildcard} the entry conditions will be processed by the switch.
{any | destination_port} [dscp dscp | precedence
precedence] [timerange time_name] [ace-
priority index]
no permit udp {any | source source_wildcard} {any | Removes a previously created record.
source_port} {any | destination destination_wildcard}
{any | destination_port} [dscp dscp | precedence
precedence] [timerange time_name]
deny protocol {any | source source_wildcard} {any | Adds a deny filtering record for the protocol. Packets that meet
destination destination_wildcard} [dscp dscp | the entry conditions will be blocked by the switch. If the disable-
precedence precedence] [timerange time_name] port keyword is used, the physical interface that receives the
[disableport | loginput] [ace-priority index] package will be disabled. When using the log-input keyword, a
message will be sent to the system log.
no deny protocol {any | source source_wildcard} {any | Removes a previously created record.
destination destination_wildcard} [dscp dscp |
precedence precedence] [timerange time_name]
[disableport | loginput]
ETS-1-10G-A 5. Device management. Command line interface 256
Adds a deny filtering record for the IP. Packets that meet the
deny ip {any | source_ip source_ip_wildcard} {any |
entry conditions will be blocked by the switch. If the disable-port
destination_ip destination_ip_wildcard} [dscp dscp |
keyword is used, the physical interface that receives the package
precedence precedence] [timerange range_name]
will be disabled. When using the log-input keyword, a message
[disableport | loginput] [ace-priority index] will be sent to the system log.
Removes a previously created record.
no deny ip {any | source_ip source_ip_wildcard} {any |
destination_ip destination_ip_wildcard} [dscp dscp |
precedence precedence] [timerange range_name]
[disableport | loginput]
deny icmp {any | source source_wildcard} {any | Adds a deny filtering record for the ICMP. Packets that meet the
destination destination_wildcard} {any | icmp_type} entry conditions will be blocked by the switch. If the disable-port
{any | icmp_code} [dscp dscp | precedence keyword is used, the physical interface that receives the package
precedence] [timerange time_name] will be disabled. When using the log-input keyword, a message
[disableport | loginput] [acepriority index] will be sent to the system log.
no deny icmp {any | source source_wildcard} {any | Removes a previously created record.
destination destination_wildcard} {any | icmp_type}
{any | icmp_code} [dscp dscp | precedence
precedence] [timerange time_name]
[disableport | loginput]
deny igmp {any | source source_wildcard} {any | Adds a deny filtering record for the IGMP. Packets that meet the
destination destination_wildcard} [igmp_type] [dscp entry conditions will be blocked by the switch. If the disable-port
dscp | precedence precedence] [timerange keyword is used, the physical interface that receives the package
time_name] [ace-priority index] [disable-port | log- will be disabled. When using the log-input keyword, a message
input] will be sent to the system log.
no deny igmp {any | source source_wildcard} {any | Removes a previously created record.
destination destination_wildcard} [igmp_type] [dscp
dscp | precedence precedence] [timerange
time_name] [disable-port | log-input]
Adds a deny filtering record for the TCP. Packets that meet the
deny tcp {any | source source_wildcard}
entry conditions will be blocked by the switch. If the disable-port
{any | source_port} {any | destination
keyword is used, the physical interface that receives the package
destination_wildcard} {any | destination_port}
will be disabled. When using the log-input keyword, a message
[dscp dscp | precedence precedence] will be sent to the system log.
[matchall list_of_flags] [time-range
time_name] [acepriority index]
[disable-port | log-input]
deny udp {any | source source_wildcard} {any | Adds a deny filtering record for the UDP. Packets that meet the
source_port} {any | destination destination_wildcard} entry conditions will be blocked by the switch. If the disable-port
{any | destination_port} [dscp dscp | precedence keyword is used, the physical interface that receives the package
precedence] [timerange time_name] [ace-priority will be disabled. When using the log-input keyword, a message
index] [disable-port | log-input] will be sent to the system log.
no deny udp {any | source source_wildcard} {any | Removes a previously created record.
source_port} {any | destination destination_wildcard}
{any | destination_port} [dscp dscp | precedence
precedence] [timerange time_name] [disable-port
| log-input]
Creates a list of user templates with the username name. The
offset-list offset_list_name {offset_base offset mask
name can be from 1 to 32 characters. One command can contain
value} …
up to thirteen templates depending on the selected access list
configuration mode (set system mode command), including the
following parameters:
- offset_base – base offset. Possible values:
l3 – start of the offset from the beginning of the IP header;
l4 – start of the offset from the end of the IP header.
- offset – data byte offset within a package. The base offset is
taken as the beginning of the countdown;
- mask – mask. Only those byte bits for which '1' is set in the
corresponding mask bits take part in the packet analysis;
- value – required value.
Deletes the previously created list.
no offset-list offset_list_name
console#
console# configure
console(config)# ipv6 access-list MESipv6
console(config-ipv6-al)#
deny Deny action Creates a deny filter rule in the ACL list.
protocol The field is intended for specifying the protocol (or all protocols)
on the basis of which the filtering will be performed. When
selecting a protocol, the following options are possible: icmp, tcp,
Protocol
udp, or the numerical value of the protocol – icmp (58), tcp (6),
udp (17).
The IPv6 value is used to match any protocol.
source_prefix/length Specifies the IPv6 address and the length of the network prefix (0-
Source address and length
128) (number of high bits of address) of the packet source.
destination_prefix/length Destination address and Specifies the IPv6 address and the length of the network prefix (0-
length 128) (number of high bits of address) of the packet destination.
dscp Defines the value of diffserv's DSCP field. Possible message codes
DSCP field in L3 header
of dscp field: (0 – 63).
precedence IP priority Defines the IP traffic priority: (0-7).
time_name Profile name of Defines the configuration of time intervals.
configuration time-range
icmp_type It is used to filter ICMP packets. Possible types and numerical
values of the icmp_type field messages: destination-unreachable
(1), packet-too-big (2), time-exceeded (3), parameter-problem
ICMP message type (4), echo-request (128), echo-reply (129), mld-query (130), mld-
report (131), mldv2-report (143), mld-done (132), router-
solicitation (133), router-advertisement (134), nd-ns (135), nd-na
(136).
icmp_code ICMP message code It is used to filter ICMP packets. Possible field values (0 – 255).
destination_port Destination UDP/TCP port Possible TCP port field values: bgp (179), chargen (19), daytime
source_port (13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp
(21), ftp-data (20), gopher (70), hostname (42), irc (194), klogin
(543), kshell (544), lpd (515), nntp (119), pop2 (109), pop3 (110),
smtp (25), sunrpc (1110, syslog (514), tacacs-ds (49), talk (517),
telnet (23), time (37), uucp (117), whois (43), www (80);
For UDP port: biff (512), bootpc (68), bootps (67), discard (9), dnsix
Source UDP/TCP port
(90), domain (53), echo (7), mobile-ip (434), nameserver (42),
netbios-dgm (138), netbios-ns (137), on500isakmp (4500), ntp
(123), rip (520), snmp (161), snmptrap (162), sunrpc (111), syslog
(514), tacacs-ds (49), talk (517), tftp (69), time (37), who (513),
xdmcp (177).
Either a numeric value (0 – 65535).
list_of_flags If the flag must be set for the filtering condition, a '+' sign is placed
TCP flags in front of it, if not, a '-' sign is placed. Possible flags: +urg, +ack,
+psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn и -fin.
disable-port Disables the port from which the package was received that meets
Port disabling
the conditions of any deny command with the field described in it.
log-input Enables sending information messages to the system log when a
Sending messages
package that matches a record is received.
ace-priority Rule index in the table, the smaller is the index, the higher is the
Rule index
priority rule: (1..2147483647).
ETS-1-10G-A 5. Device management. Command line interface 259
The parameter 'any' is used to select the entire parameter range except for dscp and IP-
precedence.
Once at least one entry has been added to the ACL list, the last entry added to the list is the
entry
permit-icmp any any nd-ns any
permit-icmp any any nd-na any
deny ipv6 any any
The first two allow searching for neighboring IPv6 devices using ICMPv6, and the last two
allow ignoring all packets that do not meet the ACL conditions.
Table 211 – Commands used to configure the ACLs based on IPv6 addressing
Command Action
permit protocol {any | source_prefix/length} {any | Adds an allowing filtering record for the protocol. Packets that
destination_prefix/length} [dscp dscp | precedence meet the entry conditions will be processed by the switch.
precedence] [time-range time_name] [ace-priority index]
no permit protocol {any | source_prefix/length} {any | Removes a previously created record.
destination_prefix/length} [dscp dscp | precedence
precedence] [time-range time_name]
permit icmp {any | source_prefix/length} {any | Adds an allowing filtering record for the ICMP. Packets that
destination_prefix/length} {any | icmp_type} {any | meet the entry conditions will be processed by the switch.
icmp_code} [dscp dscp | precedence precedence]
[timerange time_name] [ace-priority index]
no permit icmp {any | source_prefix/length} {any | Removes a previously created record.
destination_prefix/length} {any | icmp_type} {any |
icmp_code} [dscp dscp | precedence precedence]
[timerange time_name]
permit tcp {any | source_prefix/length} {any | Adds an allowing filtering record for the TCP. Packets that meet
source_port} {any | destination_prefix/length} {any | the entry conditions will be processed by the switch.
destination_port} [dscp dscp | precedence precedence]
[timerange time_name] [matchall list_of_flags]
[acepriority index]
no permit tcp {any | source_prefix/length} {any | Removes a previously created record.
source_port} {any | destination_prefix/length} {any |
destination_port} [dscp dscp | precedence precedence]
[timerange time_name] [matchall list_of_flags]
permit udp {any | source_prefix/length} {any | Adds an allowing filtering record for the UDP. Packets that meet
source_port} {any | destination_prefix/length} {any | the entry conditions will be processed by the switch.
destination_port} [dscp dscp | precedence precedence]
[timerange time_name] [ace-priority index]
no permit udp {any | source_prefix/length} {any | Removes a previously created record.
source_port} {any | destination_prefix/length} {any |
destination_port} [dscp dscp | precedence precedence]
[timerange time_name]
ETS-1-10G-A 5. Device management. Command line interface 260
deny protocol {any | source_prefix/length} {any | Adds a deny filtering record for the protocol. Packets that meet
destination_prefix/length} [dscp dscp | precedence the entry conditions will be blocked by the switch. If the disable-
precedence] [timerange time_name] [disableport | port keyword is used, the physical interface that receives the
loginput] [ace-priority index] package will be disabled. When using the log-input keyword, a
message will be sent to the system log.
no deny protocol {any | source_prefix/length} {any | Removes a previously created record.
destination_prefix/length} [dscp dscp | precedence
precedence] [timerange time_name] [disableport |
loginput]
deny icmp {any | source_prefix/length} {any | Adds a deny filtering record for the ICMP. Packets that meet the
destination_prefix/length} {any | icmp_type} {any | entry conditions will be blocked by the switch. If the disable-
icmp_code} [dscp dscp | precedence precedence] port keyword is used, the physical interface that receives the
[timerange time_name] [disableport | loginput] package will be disabled. When using the log-input keyword, a
[acepriority index] message will be sent to the system log.
no deny icmp {any | source_prefix/length} {any | Removes a previously created record.
destination_prefix/length} {any | icmp_type} {any |
icmp_code} [dscp dscp | precedence precedence]
[timerange time_name] [disableport | loginput]
deny tcp {any | source_prefix/length} {any | source_port} Adds a deny filtering record for the TCP. Packets that meet the
{any | destination_prefix/length} {any | destination_port} entry conditions will be blocked by the switch. If the disable-
[dscp dscp | precedence precedence] [matchall port keyword is used, the physical interface that receives the
list_of_flags] [timerange time_name] [disableport | package will be disabled. When using the log-input keyword, a
loginput] [ace-priority index] message will be sent to the system log.
no deny tcp {any | source_prefix/length} {any | Removes a previously created record.
source_port} {any | destination_prefix/length} {any |
destination_port} [dscp dscp | precedence precedence]
[matchall list_of_flags] [timerange time_name]
[disableport | loginput]
deny udp {any | source_prefix/length} {any | Adds a deny filtering record for the UDP. Packets that meet the
source_port} {any | destination_prefix/length} {any | entry conditions will be blocked by the switch. If the disable-
destination_port} [dscp dscp | precedence precedence] port keyword is used, the physical interface that receives the
[matchall list_of_flags] [timerange time_name] package will be disabled. When using the log-input keyword, a
[disableport | loginput] [ace-priority index] message will be sent to the system log.
no deny udp {any | source_prefix/length} {any | Removes a previously created record.
source_port} {any | destination_prefix/length} {any |
destination_port} [dscp dscp | precedence precedence]
[matchall list_of_flags] [timerange time_name]
[disableport | loginput]
ETS-1-10G-A 5. Device management. Command line interface 261
console#
console# configure
console(config)# mac access-list extended MESmac
console(config-mac-al)#
destination Destination address Specifies the MAC address of the packet destination.
destination_wildcard The bitmap applied to the The mask determines the bits of the MAC addresses that should
destination MAC address of be ignored. Units should be written to the values of the ignored
a packet. bits. The mask is used similarly to the source_wildcard mask.
vlan_id vlan_id: (0..4095) A VLAN subnet of filtered packets.
cos cos: (0..7) Class of Service (CoS) of filtered packages.
cos_wildcard The mask determines the bits of the CoS that should be ignored.
Units should be written to the values of the ignored bits. For
Bitmask applicable to the
example, to use CoS 6 and 7 in a filter rule, you need to specify the
Class of Sservice (CoS) of
value of 6 or 7 in the CoS field, and the value of 1 in the mask field
the packets being filtered
(7 in binary representation - 111, 1 - 001, it turns out that the last
bit will be ignored, ie CoS can be either 110 (6) or 111 (7)).
eth_type eth_type: (0..0xFFFF) Ethernet type of packet filtered in hexadecimal record.
disable-port Disables the port from which a package meeting the deny
-
command conditions was received.
log-input Enables sending information messages to the system log when a
Sending messages
package that matches a record is received.
time_name Profile name of Defines the configuration of time intervals.
configuration time-range
offset_list_name Sets the list of user templates to be used to recognize packages. A
Byte offset from key point
template list can be defined for each ACL list.
ace-priority Rule index in the table, the smaller is the index, the higher is the
Rule index
priority rule: 1-2147483647.
The parameter 'any' is used to select the entire parameter range except for dscp and IP-
precedence.
Once at least one entry has been added to the ACL list, the last deny any any entry is added
by default, which means ignoring all packets that do not meet the ACL conditions.
Table 213 – Commands used to configure the ACLs based on MAC addressing
Command Action
permit {any | source source-wildcard} {any |
Adds an allowing filtering record. Packets that meet the
destination destination_wildcard} [vlan vlan_id] entry conditions will be processed by the switch.
[cos cos cos_wildcard] [eth_type] [time-range
time_name] [acepriority index] [offset-
list offset_list_name]
The command line in the global configuration mode has the form:
console (config)#
ETS-1-10G-A 5. Device management. Command line interface 264
The command line in the Ethernet, port group configuration mode looks like:
console (config-if)#
Table 215 – Configuration command for interface protection against DoS attacks
QoS configuration
Global mode configuration commands
console(config)#
qos aggregate-policer
Defines a configuration template that allows to limit the
aggregate_policer_name channel bandwidth while at the same time guaranteeing a
committed_rate_kbps certain data rate.
excess_burst_byte When operating with bandwidth, the algorithm of the
[exceedaction {drop marked 'basket' is used. The task of the algorithm is to make
| policed-dscp- a decision: to transmit the packet or reject it. The
transmit}]
parameters of the algorithm are the rate of receipt (CIR) of
markers in the 'basket' and volume (CBS) of the 'basket'.
- committed-rate-kbps – the average traffic speed. This
speed is guaranteed when transmitting information;
aggregate_policer_name: - committed-burst-byte – the size of the restraining
(1..32) characters; threshold in bytes;
committed_rate_kbps: - drop – the package will be rejected when the 'basket' is
(3..57982058) kbps; overflowing;
excess_burst_byte: - policed-dscp-transmit – if the 'basket' is overflowing, the DSCP
(3000..19173960) bytes value will be overridden.
You cannot delete a strategy template if it is used in a
strategy map; you must remove the strategy template
assignment before deleting it: no police aggregate aggregate-
policer-name.
no qos aggregate-
Removes the channel speed control setting template.
policer
aggregate_policer_name
wrr-queue cos-map
queue_id: (1..8); Defines CoS values for outbound traffic queues.
cos1…cos8: (0..7);
queue_id cos1…cos8
Default CoS values for
no wrr-queue cos-map queues: Sets the default value.
[queue_id] CoS = 1 – queue 1
CoS = 2 – queue 2
CoS = 0 – queue 3
CoS = 3 – queue 4
CoS = 4 – queue 5
CoS = 5 – queue 6
CoS = 6 – queue 7
CoS = 7 – queue 8
wrr-queue bandwidth weight: (0..255)/1 Assigns weight to outgoing queues used by the WRR
weight1..weight8 By default, the weight of (Weighted Round Robin) mechanism.
no wrr-queue bandwidth each queue is 1 Sets the default value.
ETS-1-10G-A 5. Device management. Command line interface 268
no qos trust
Sets the default value.
qos map dscp- Fills the DSCP remarking table. For incoming packets with
mutation in_dscp to specified values, DSCP sets new DSCP values.
out_dscp in_dscp: (0..63);
out_dscp: (0..63) - in-dscp – defines up to 8 DSCP values, values are separated by a
By default the change space character.
map is empty, i.e. the
- out-dscp – defines up to 8 new DSCP values, values are
DSCP values for all
separated by a space character.
incoming packets remain
unchanged
Only valid for qos basic mode.
ETS-1-10G-A 5. Device management. Command line interface 270
rate-limit vlan vlan_id rate Sets the speed limit for incoming traffic for a given VLAN.
vlan_id: (1..4094);
burst - vlan_id – VLAN number:
rate: (3..57982058) kbps; - rate – average traffic rate (CIR);
burst: (3000..19173960) - burst – the size of the limiting threshold (speed limit) in bytes.
bytes/128 kB
no rate-limit vlan vlan_id Removes the incoming traffic rate limiting.
The type of request from the command line of the mode of editing the list of traffic classification
criteria:
console# configure
console(config)# class-map class-map-name [match-all | match-any]
console(config-cmap)#
Table 217 – Edit mode commands for the traffic classification criteria list
The type of request from the command line of the mode of editing the strategy of traffic
classification:
console# configure
console(config)# policy-map policy-map-name
console(config-pmap)#
ETS-1-10G-A 5. Device management. Command line interface 271
Table 218 – Edit mode commands for the traffic classification strategy
no class class_map_name
Removes the class-map traffic classification rule from the
strategy.
console# configure
console(config)# policy-map policy-map-name
console(config-pmap)# class class-map-name [access-group acl-name]
console(config-pmap-c)#
no police Removes the channel rate control settings template from the
traffic classification rule.
Command line prompt in the Ethernet or port group interface configuration mode is as follows:
console(config-if)#
Table 220 – Ethernet, VLAN, port group interface configuration mode commands
traffic-shape committed_rate Sets the speed limit for outgoing traffic through the interface.
committed_rate:
[committed_burst] - committed_rate – average traffic speed, kbps;
(64..1000000) kbps;
- committed_burst – the size of the limiting threshold (speed limit)
committed_burst:
in bytes.
(4096..16762902) bytes
no traffic-shape Removes the speed limit for outgoing traffic through the interface.
traffic-shape queue queue_id Sets the traffic speed limit for the outbound queue interface.
queue_id: (0..8);
committed_rate - committed_rate – average traffic speed, kbps;
committed_rate:
[committed_burst] - committed_burst – the size of the limiting threshold (speed limit)
(36..1000000) kbps;
in bytes.
committed_burst:
no traffic-shape queue Removes the traffic speed limit for the outbound queue interface.
(4096..16769020) bytes
queue_id
qos trust [cos | dscp | Enables the basic qos mechanism for the interface.
cosdscp] - cos – port trusts 802.1p User priority value;
- dscp – port trusts DSCP value in IPv4/IPv6 packets;
/enabled
- cos-dscp – The port trusts both levels, but DSCP has priority over
802.1p.
no qos trust Disables the basic qos mechanism for the interface.
rate-limit rate [burst burst] rate: (64..10000000) Sets the incoming traffic rate limiting.
no rate-limit kbps; Removes the incoming traffic rate limiting.
burst:
(3000..19173960)
bytes/128 kB
qos cos default_cos Sets the default CoS value for the port (CoS applied to all non-
default_cos: (0..7)/0 tagged traffic passing through the interface).
no qos cos Sets the default value.
console#
show qos aggregatepolicer Shows average speed settings and bandwidth limits
[aggregate_policer_name] aggregate_policer_name:
(1..32) symbols
for traffic classification rules.
Only valid for qos advanced mode.
show qos interface [buffers | Shows QoS parameters for the interface.
queuing | policers | shapers] - vlan_id – VLAN number;
[tengigabitethernet te_port | - te_port – Ethernet XG1-XG12 interfaces number;
port-channel group | vlan - group – port group number;
te_port: (1..8/0/1..32);
vlan_id] - buffers – buffer settings for interface queues;
group: (1..32);
- queueing – queue processing algorithm (WRR or EF), weight for
vlan_id: (1..4094)
WRR queues, service classes for queues and priority for EF;
- policers – configured traffic classification strategies for the
interface;
- shapers – speed limit for outgoing traffic.
show qos map [dscpqueue | Shows information about replacing fields in packets used by QOS.
dscp-dp | policed-dscp | - dscp-queue – DSCP and queue matching table;
dscpmutation] - - dscp-dp – DSCP and Reset Priority (DP) mark matching table;
- policed-dscp – DSCP remarking table;
- dscp-mutation – DSCP-to-DSCP changes table.
Enable QoS advanced mode. Distribute traffic by queue, packets with DSCP 12 first, packets with
DSCP 16 second. 8th queue is a priority. Create a strategy to classify traffic by list of ACL, allowing
the transfer of TCP-packets with DSCP 12 and 16 and limiting the speed – the average speed is
1000 kbps, the limit threshold is 200000 bytes. Use this strategy on Ethernet interfaces 14 and
16.
console#
console# configure
console(config)# ip access-list tcp_ena
console(config-ip-al)# permit tcp any any any any dscp 12
console(config-ip-al)# permit tcp any any any any dscp 16
console(config-ip-al)# exit
console(config)# qos advanced
console(config)# qos map dscp-queue 12 to 1
console(config)# qos map dscp-queue 16 to 2
console(config)# priority-queue out num-of-queues 1
console(config)# policy-map traffic
console(config-pmap)# class class1 access-group tcp_ena
console(config-pmap-c)# police 1000 200000 exceed-action drop
console(config-pmap-c)# exit
console(config-pmap)# exit
console(config)# interface tengigabitethernet 1/0/14
console(config-if)# service-policy input traffic
console(config-if)# exit
console(config)# interface tengigabitethernet 1/0/16
ETS-1-10G-A 5. Device management. Command line interface 275
QoS statistics
Global mode configuration commands
console(config)#
console#
Field Description
Shows the origin of the route:
C C – Сonnected (route taken from directly connected and functioning interface),
S – Static (static route listed in the routing table).
10.9.1.0/24 Network address.
The first value in brackets is the administrative distance (the more trust the router has, the
[5/2]
less trust the source has), the second number is the route metric.
via 10.0.1.2 Specifies the IP address of the next router through which the route to the network passes.
00:39:08 Defines the time when the route was last updated (hours, minutes, seconds).
Vlan 1 Defines the interface through which the route to the network passes.
RIP configuration
RIP ( Routing Information Protocol) — internal protocol that allows routers to dynamically update
routing information from neighboring routers. This is a very simple protocol based on the application of a
remote routing vector. As a remote vector protocol, RIP periodically sends updates between neighbors,
thus building the network topology. Each update transmits information about the distance to all networks
to a nearby router. The switch supports RIP version 2.
ETS-1-10G-A 5. Device management. Command line interface 278
console(config)#
console(config-ip)#
Table 229 – IP interface configuration mode commands
ip rip default- Sets the metric for the default route broadcast via RIP.
information originate
metric metric: (1..15)/1;
By default, the function Sets the default value.
no ip rip is disabled
defaultinformation
originate
ip rip authentication Defines a set of keys that can be used for authentication.
keychain key_chain
key_chain: (1..32
no ip rip characters) Sets the default value.
authentication
keychain
console#
Enable RIP for the 172.16.23.0 subnet (switch IP address 172.16.23.1) and MD5 authentication
using the mykeys set of keys:
сonsole#
сonsole# configure
сonsole(config)# router rip
сonsole(config-rip)# network 172.16.23.1
сonsole(config-rip)# interface ip 172.16.23.1
сonsole(config-if)# ip rip authentication mode md5
сonsole(config-if)# ip rip authentication key-chain mykeys
console(config)#
ipv6 distance ospf Sets the administrative distance for OSPF, OSPFv3 routes.
{interas | intra-as} - inter-as – for autonomous external systems
distance - intra-as – into the autonomous system
distance: (1..255)
no ipv6 distance ospf Returns the default values.
{interas | intra-as}
console(router_ospf_process)#
console(ipv6 router_ospf_process)#
area A.B.C.D stub [nosummary] Sets the stub type for the specified zone. Zone
is a set of networks and routers with the same
identifier.
A.B.C.D: router ID in
- no-summary – do not send
the format of IPv4
information on aggregated
address
external routes.
no area A.B.C.D stub Sets the default value.
ETS-1-10G-A 5. Device management. Command line interface 285
area A.B.C.D nssa [nosummary] Sets the NSSA type for the specified zone.
[translatorstabilityinterval - no-summary – do not accept information on
interval] [translator-role aggregated external routes within the NSSA area;
{always | candidate}] - interval – specifies the time
interval (per second) during
which the translator will perform
A.B.C.D: router ID in its functions after it discovers
the format of IPv4 that the translator is another
address; edge router.
- translator-role – determines how the
interval: positive
integer; router will operate in the Translator mode
(Type-7 LSA to Type-5 LSA):
- always – in forced permanent mode;
- candidate – in the translator selection
mode.
no area A.B.C.D nssa Sets the default value.
/enabled
console(config-ip)#
console(config-if)#
show ip ospf
process_id: Displays information about the OSPF neighbor with the
[process_id] neighbor
(1..65536); specified address.
A.B.C.D: The IP
A.B.C.D address of the
neighbor
show {ip | ipv6} ospf Displays configurations for all OSPF interfaces.
process_id:
[process_id]
(1..65536)
interface
show {ip | ipv6} ospf Displays configuration for a specific OSPF interfaces.
process_id:
[process_id]
(1..65535);
interface [ip_int |
brief]
show {ip | ipv6} ospf process_id: Displays the status of the OSPF protocol database.
[process_id] database (1..65535)
show {ip | ipv6} ospf Displays the parameters and current status of virtual links.
process_id:
virtuallinks
(1..65535)
[process_id]
Command line prompt in the Ethernet, VLAN, port group interface configuration mode is as follows:
ETS-1-10G-A 5. Device management. Command line interface 290
console(config-if)#
Table 236 – Ethernet, VLAN or port group interface configuration mode commands
console#
Table 237 – Privileged EXEC mode commands
Configure the IP address 10.10.10.1 on VLAN 10, use this address as the virtual router address.
Enable VRRP protocol on VLAN interface.
To enter the Startup menu, you must interrupt the download by pressing the <Esc> or <Enter> key
within the first two seconds after the autoBOOT message appears (after the POST procedure is
completed).
Startup Menu
[1] Restore Factory Defaults
[2] Password Recovery Procedure
[3] Back
Enter your choice or press 'ESC' to exit:
To exit the menu and load the device press <5>, or <Esc>.
If no menu item is selected within 15 seconds (default), the device will continue booting. You
can increase the waiting time by using console commands.
№ Name Description
Restore Factory Defaults This procedure is used to delete the device configuration. Restores the default
<1> Restore factory defaults configuration.
This procedure is used to recover the lost password, it allows you to connect to the
device without password.
To restore the password, press the <2> key, the password will be ignored when
Password Recovery Procedure connecting to the device later.
<2> Password recovery Current password will be ignored!
Press the [enter] key to return to the Startup menu.
==== Press Enter To Continue ====
Back To exit the menu and load the device press <Enter>, or <Esc>.
<3> Exit from the menu
ETS-1-10G-A 6. Service Menu, Change of Firmware 294
Firmware update
The device is loaded from a file of system software, which is stored in flash memory. When updating
a new system software file is stored in a dedicated memory area. When booting, the device launches the
active system software file.
To view the current version of system firmware running on your device, enter the show version
command:
Active-image: flash://system/images/image1.ros
Version: 5.5.4
Commit: 25503143
MD5 Digest: 6f3757fab5b6ae3d20418e4d20a68c4c
Date: 03-Jun-2016
Time: 19:54:26
Inactive-image: flash://system/images/_image1.ros
Version: 5.5.4
Commit: 16738956
MD5 Digest: d907f3b075e88e6a512cf730e2ad22f7
Date: 10-Jun-2016
Time: 11:05:50
The new firmware version will become active after the switch is rebooted.
To view data on software versions and their activity, enter the show bootvar command:
console#show bootvar
Active-image: flash://system/images/image1.ros
Version: 5.5.4
MD5 Digest: 0534f43d80df854179f5b2b9007ca886
Date: 01-Mar-2016
Time: 17:17:31
Inactive-image: flash://system/images/_image1.ros
Version: 5.5.4
MD5 Digest: b66fd2211e4ff7790308bafa45d92572
Date: 26-Feb-2016
Time: 11:08:56
console# reload
This command will reset the whole system and disconnect your current
session. Do you want to continue (y/n) [n]?
The MSTP allows you to build many interconnecting trees for individual VLAN groups on the LAN
switches, which allows you to load balance. For simplicity, consider the case of three switches combined
in a ring topology.
Vlan 10, 20, 30 should be combined in the first instance of MSTP, vlan 40, 50, 60 should be
combined in the second instance. It is necessary that VLAN traffic 10, 20, 30 between the first and
second switches is transmitted directly and VLAN traffic 40, 50, 60 is transmitted in transit through
switch 3. Switch 2 is to be assigned to the root of the Internal Spanning Tree (IST) in which service
information is transmitted. Switches are combined in a ring using te1 and te2 ports. Below is a diagram
depicting a logical network topology.
Figure A.1 – Configuring the protocol for the multiple spanning trees
ETS-1-10G-A A. Examples of Application and Device Configuration 297
When one of the switches fails or a channel breaks, many MSTP trees are rebuilt to minimize the
impact of a failure. Below is the switch configuration process. For faster setup, a common configuration
template is created, which is uploaded to the TFTP server and subsequently used to configure all
switches.
console# configure
console(config)# vlan database
console(config-vlan)# vlan 10,20,30,40,50,60
console(config-vlan)# exit
console(config)# interface vlan 1
console(config-if)# ip address 192.168.16.1 /24
console(config-if)# exit
console(config)# spanning-tree mode mst
console(config)# interface range TengigabitEthernet 1/0/1-2
console(config-if)# switchport mode trunk
console(config-if)# switchport trunk allowed vlan add 10,20,30,40,50,60
console(config-if)# exit
console(config)# spanning-tree mst configuration
console(config-mst)# name sandbox
console(config-mst)# instance 1 vlan 10,20,30
console(config-mst)# instance 2 vlan 40,50,60
console(config-mst)# exit
console(config)# do write
console(config)# spanning-tree mst 1 priority 0
console(config)# exit
console#copy running-config tftp://10.10.10.1/mstp.conf
The 'MulticastTV VLAN' feature allows you to use a single VLAN on the carrier's network to transmit
multicast traffic and deliver that traffic to users even if they are not members of that VLAN. With the
'Multicast TV VLAN' function, the load on the operator's network can be reduced by not duplicating
multicast data, for example when providing an IPTV service.
The application scheme of the function assumes that the user ports work in 'access' or 'customer'
mode and belong to any VLAN except the multicast-tv VLAN. Users can only receive multicast traffic from
a multicast-tv VLAN and cannot transmit data on that VLAN. In addition, the switch must be configured
with a source port for multicast traffic, which must be a member of the multicast-tv VLAN.
2. Configure VLAN users (VID 100-124), multicast-tv VLAN (VID 1000), VLAN management (VID
1200):
4. Configure the uplink port by allowing multicast, user and management traffic:
Selective-qinq configuration
Adding SVLAN
The switch configuration example shown here shows how to add a SVLAN 20 tag to all incoming
traffic except VLAN 27.
vlan database
vlan 20,27
exit
!
interface tengigabitethernet1/0/5
switchport mode general
switchport general allowed vlan add 27 tagged
switchport general allowed vlan add 20 untagged
switchport general ingress-filtering disable
selective-qinq list ingress permit ingress_vlan 27
selective-qinq list ingress add_vlan 20
exit
!
!
end
CVLAN spoofing
VLAN spoofing tasks are quite common in data networks (e.g., there is a typical configuration for
access layer switches, but user traffic, VOIP and management traffic need to be transmitted in different
VLANs in different directions). In this case, it would be convenient to use the CVLAN substitution
function to replace typical VLANs with VLANs for the required direction. Below is the configuration of
the switch where VLAN 100, 101 and 102 are replaced by 200, 201 and 202. Reverse substitution should
be done on the same interface:
vlan database
vlan 100-102,200-202
exit
ETS-1-10G-A A. Examples of Application and Device Configuration 300
!
interface tengigabitethernet 1/0/1
switchport mode trunk
switchport trunk allowed vlan add 200-202
selective-qinq list egress override_vlan 100 ingress_vlan 200
selective-qinq list egress override_vlan 101 ingress_vlan 201
selective-qinq list egress override_vlan 102 ingress_vlan 202
selective-qinq list ingress override_vlan 200 ingress_vlan 100
selective-qinq list ingress override_vlan 201 ingress_vlan 101
selective-qinq list ingress override_vlan 202 ingress_vlan 102
exit!end
ETS-1-10G-A B. Console Cable 301
B Console Cable
0x22DF 0x8145 0x889e 0x88cb 0x88e0 0x88f4 0x8808 0x881d 0x8832 0x8847
0x22E0 0x8146 0x88a8 0x88cc 0x88e1 0x88f5 0x8809 0x881e 0x8833 0x8848
0x22E1 0x8147 0x88ab 0x88cd 0x88e2 0x88f6 0x880a 0x881f 0x8834 0x8849
0x22E2 0x8203 0x88ad 0x88ce 0x88e3 0x88f7 0x880b 0x8820 0x8835 0x884A
0x22E3 0x8204 0x88af 0x88cf 0x88e4 0x88f8 0x880c 0x8822 0x8836 0x884B
0x22E6 0x8205 0x88b4 0x88d0 0x88e5 0x88f9 0x880d 0x8824 0x8837 0x884C
0x22E8 0x86DD 0x88b5 0x88d1 0x88e6 0x88fa 0x880f 0x8825 0x8838 0x884D
0x22EC 0x86DF 0x88b6 0x88d2 0x88e7 0x88fb 0x8810 0x8826 0x8839 0x884E
0x22ED 0x885b 0x88b7 0x88d3 0x88e8 0x88fc 0x8811 0x8827 0x883A 0x884F
0x22EE 0x885c 0x88b8 0x88d4 0x88e9 0x88fd 0x8812 0x8828 0x883B 0x8850
0x22EF 0x8869 0x88b9 0x88d5 0x88ea 0x88fe 0x8813 0x8829 0x883C 0x8851
0x22F0 0x886b 0x88ba 0x88d6 0x88eb 0x88ff 0x8814 0x882A 0x883D 0x8852
0x22F1 0x8881 0x88bf 0x88d7 0x88ec 0x8800 0x8815 0x882B 0x883E 0x9999
0x22F2 0x888b 0x88c4 0x88d8 0x88ed 0x8801 0x8816 0x882C 0x883F 0x9c40
Process
Process description
name
Additional actions in the stack (getting information about the stack, displaying,
BOXM
exchanging messages, changing Unit ID)
BRGS Bridge Security – ARP Inspection, DHCP Snooping, DHCP Relay Agent, IP Source Guard
Bridge Management: STP, FDB operations (add, delete records), mirroring, port/VLAN
BRMN
configuration, GVRP, GARP, LLDP, IGMP Snooping, IP multicast
DHCp Ping
Dinstant Manager – obtaining information from remote units (firmware version, uptime,
DMNG
active firmware image installation)
Dispatcher – processing events from remote units about changes in the status of fans,
DSPT power supplies, temperature sensors, SFP-transceivers. Receiving messages from remote
units about their firmware version, serial number, MD5.
ESTC Logging of events about traffic exceeding thresholds on CPU (cpu input-rate detailed)
EVLC Port state change event processing, lower level, higher transmission
EVRT RX Training
Processing packet receiving events from switch to CPU, lower layer, packet transfer to
EVRX
layer 2
EVTX Processing end of packet sending events from CPU to switch, lower level
Stack Events – link changed event handling, address update from remote units in the
HSES
master
IT60
IT61
Tasks for interrupt handling
IT64
IT99
MNGT Autotests
NBBT N-Base
Setting the limit of packet interception speed on the CPU, maintaining statistics on
NSCT
intercepted packets
Periodic signal generation for polling tables MAC, VLAN, ports, multicast, routing,
NTPL
prioritization
NTST Adding and removing units in the stack, resetting unit default state, at the network level
ETS-1-10G-A D. Description of the switch processes 309
NVCT Supporting task for VCT. Runs the test and tracks port state changes.
The task is to track and notify changes to the specific interface parameters required for
OBSR
LLDP, CDP and other protocols.
RCLA
Remote CLI server
RCLB
SETX Getting packet termination events from CPU to switch, lower level
SFMG sFlow Manager – processing IP address change events, CLI/SNMP requests, timers
SSTC Logging of events about traffic exceeding thresholds on CPU (cpu input-rate detailed)
SW2M FDB Address Update event processing, port blocking in case of port errors
www.rad.com | radcare-online.rad.com
Publication No. 751-207-06/20