Switch Zte 2
Switch Zte 2
2.8.23.A
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION
Copyright © 2011 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
I
3.5.3 Setting Privileged Mode Key ................................................................... 3-10
3.5.4 Setting Telnet Username and Password................................................... 3-10
3.5.5 Setting System Time ...............................................................................3-11
3.5.6 Setting System Console User Connection Parameters...............................3-11
3.5.7 Setting System Telnet User Connection Parameters ..................................3-11
3.5.8 Allowing Multiple Users to Configure System at the Same Time .................3-11
3.6 Viewing System Information ...............................................................................3-11
3.6.1 Viewing Hardware and Software Versions of the System............................3-11
3.6.2 Viewing Running Configuration ............................................................... 3-12
II
5.1 IP Address Configuration .................................................................................... 5-1
5.1.1 IP Address Overview ................................................................................ 5-1
5.1.2 Configuring IP Address ............................................................................. 5-2
5.1.3 IP Address Configuration Example ............................................................ 5-3
5.2 ARP Configuration.............................................................................................. 5-3
5.2.1 ARP Overview ......................................................................................... 5-3
5.2.2 Configuring ARP ...................................................................................... 5-3
5.2.3 ARP Configuration Example...................................................................... 5-4
III
7.2.7 Configuring Outer VLAN Value .................................................................. 7-8
7.2.8 Configuring Traffic Mirroring ...................................................................... 7-8
7.2.9 Configuring Tail-Drop................................................................................ 7-9
7.2.10 Configuring Traffic Statistics .................................................................... 7-9
7.3 QoS Configuration Example.............................................................................. 7-10
7.3.1 Typical QoS Configuration Example......................................................... 7-10
7.3.2 Policy Routing Configuration Example ......................................................7-11
7.4 QoS Maintenance and Diagnosis ...................................................................... 7-12
IV
10.2.4 Managing DOT1X Authentication Access User ....................................... 10-6
10.2.5 Managing Multiple Domains Configuration ............................................. 10-6
10.2.6 Configuring 802.1x VLAN Hopping ........................................................ 10-7
10.3 DOT1X Configuration Example........................................................................ 10-8
10.3.1 Dot1x Radius Authentication Application ................................................ 10-8
10.3.2 Dot1x Trunk Authentication Application .................................................. 10-9
10.3.3 Dot1x Local Authentication Application ................................................. 10-11
10.3.4 DOT1X Multiple Domains Function .......................................................10-12
10.4 DOT1X Maintenance and Diagnosis ...............................................................10-12
V
13.3.1 SNMP Overview................................................................................... 13-5
13.3.2 Configuring SNMP................................................................................ 13-5
13.3.3 SNMP Configuration Example ............................................................... 13-8
13.4 RMON Configuration ...................................................................................... 13-8
13.4.1 RMON Overview .................................................................................. 13-8
13.4.2 Configuring RMON ............................................................................... 13-9
13.4.3 RMON Configuration Example .............................................................. 13-9
13.5 SysLog Configuration .................................................................................... 13-11
13.5.1 SysLog Overview ................................................................................ 13-11
13.5.2 Configuring SysLog ............................................................................. 13-11
13.5.3 Syslog Configuration Example..............................................................13-13
13.6 TACACS+ Configuration ................................................................................13-14
13.6.1 TACACS+ Overview ............................................................................13-14
13.6.2 Configuring TACACS+ .........................................................................13-14
13.6.3 TACACS Configuration Example ..........................................................13-17
VI
15.4 Cluster Management Maintenance and Diagnosis ............................................ 15-7
Figures............................................................................................................. I
Tables ............................................................................................................ III
VII
VIII
About This Manual
Purpose
This manual is ZXR10 5900E (V2.8.23.B) Series All Gigabit-Port Intelligent Routing
Switch User Manual (Basic Configuration Volume). This manual introduces basic
functions of ZXR10 5900E including configuration modes, network protocol configuration,
ACL configuration, network management configuration and security configuration.
Intended Audience
This manual is intended for the following engineers:
l on-site maintenance engineers
l network monitor engineers
l system maintenance engineer
Chapter Summary
Chapter 1 Safety Description This chapter describes the safety instructions and signs.
Chapter 2 Usage and Operation This chapter describes configuration mode, command mode and
command line use.
Chapter 3 System Management This chapter introduces system management, file system and
operation of switch and software version upgrade procedure in
detail.
Chapter 4 Interface Configuration This chapter describes interface configuration on ZXR10 5900E.
Chapter 5 Network Protocol This chapter describes IP address configuration and ARP
Configuration configuration on ZXR10 5900E.
Chapter 6 ACL Configuration This chapter introduces ACL concept, related configuration
command and configuration example.
Chapter 7 QOS Configuration This chapter introduces QOS concept, related configuration
command and configuration example.
Chapter 8 DHCP Configuration This chapter introduces DHCP concept, related configuration
command and configuration example.
Chapter 9 VRRP Configuration This chapter introduces VRRP concept, related configuration
command and configuration example.
I
Chapter Summary
Chapter 10 DOT1X Configuration This chapter introduces DOT1X concept, related configuration
command and configuration example.
Chapter 11 VBAS Configuration This chapter introduces VBAS concept, related configuration
command and configuration example.
Chapter 12 IPTV Configuration This chapter introduces IPTV concept, related configuration
command and configuration example.
Chapter 13 Network Management This chapter introduces NTP, RADIUS, SNMP ,RMON and
Configuration SysLog configuration.
Chapter 14 Switch Stack System This chapter describes the content and related knowledge of
stack system and related configuration.
Chapter 15 Cluster Management This chapter describes the content and related knowledge of
Configuration cluster management and related configuration.
Chapter 16 Security Configuration This chapter introduces security concept, related configuration
command and configuration example.
Chapter 17 POE Configuration This chapter introduces POE concept, related configuration
command and configuration example.
Related Documentation
l ZXR10 5900E (V2.8.23.B) Series All Gigabit-Port Intelligent Routing Switch Hardware
Manual
l ZXR10 5900E (V2.8.23.B) Series All Gigabit-Port Intelligent Routing Switch User
Manual (Basic Configuration Volume)
l ZXR10 5900E (V2.8.23.B) Series All Gigabit-Port Intelligent Routing Switch User
Manual (Ethernet Switching Volume)
l ZXR10 5900E (V2.8.23.B) Series All Gigabit-Port Intelligent Routing Switch User
Manual (IPv4 Routing Volume)
l ZXR10 5900E (V2.8.23.B) Series All Gigabit-Port Intelligent Routing Switch User
Manual (IPv6 Routing Volume)
II
Chapter 1
Safety Description
Table of Contents
Safety Introduction .....................................................................................................1-1
Symbol Descriptions...................................................................................................1-1
Caution!
It indicates that the fault will happen if safety is ignored.
Note:
It provides additional information.
1-1
1-2
2-1
1. Select Start > Programs > Accessories > Communications > HyperTerminal on
the PC screen to start the HyperTerminal, as shown in Figure 2-2 .
2. Input the related local information in the interface as shown in Figure 2-3.
3. After the Connection Description dialog box appears, enter a name and choose an
icon for the new connection, as shown in Figure 2-4.
2-2
4. Based on serial port connection to the console cable, choose COM1 or COM2 as the
serial port is to be connected, as shown in Figure 2-5 .
2-3
5. Enter the properties of the selected serial port as shown in Figure 2-6 . The port
property configuration includes: Bits per Second 9600, Data bit 8, Parity None, Stop
bit 1, Data flow control None.
Power on and boot ZXR10 5900 to initialize the system and to enter into configuration for
operational use.
Telnet access is set through user name and password. This enables unauthorized users
from accessing the switch through Telnet. Use the following command to configure the
user name and password.
username < username> password < password>
To strengthen the security of the switch, switch can limit telnet login of the users. Use the
following command to admit or refuse telnet’s IP address.
2-4
g. Type the correct user name and password at the prompt to enter into switch
configuration status.
2-5
Note:
a. ZXR10 5900 allows up to four Telnet users at a time.
b. Never modify/delete the IP address of the management Ethernet port during Telnet
configuration through the management port; otherwise, the Telnet connection will
be broken.
b. Configure the Telnet login user name and password through the console port.
c. Consider router as an example. Connect the router and the switch, ensuring that
the router can ping the IP address of the switch VLAN interface.
d. Run the telnet command on the router and input the IP address of the VLAN
interface to log in to the switch.
The current SSH protocol has two versions that incompatible each other: SSH v1.x and
SSH v2.x. ZXR10 5900 supports the SSH v2.0 that provides a safe remote login function.
SSH consists of server and client, ZXR10 5900 serves as SSH server and the host runs
SSH client to log in to the switch.
1. Execute the following command to enable the SSH server in ZXR10 5900. By default,
SSH server function is disabled.
2. Connect the host network interface to the switch Ethernet interface so that the host
can ping the IP of the switch VLAN interface.
3. Run the SSH client software (putty) on the host.
a. Set the IP and port number of the SSH server, as shown inFigure 2-9 .
2-6
2-7
4. Click Open to log in to the switch and input the correct user name and password
following the prompt.
The user enters switch configuration interface upon successful login.
NMS software supporting the SNMP shall be installed in the background NM server to
manage and configure ZXR10 5900.
2-8
Port configuration mode ZXR10(config-gei_1/x)# interface { < interface-name> | byname < by-name> }
(global configuration mode)
VLAN configuration ZXR10(config-vlan)# vlan { < vlan-id> | < vlan-name> } global configuration
mode mode
VLAN interface ZXR10(config-if)# interface { vlan < vlan-id> | < vlan-if> } global
configuration mode configuration mode
Standard ACL ZXR10(config-std-acl)# acl standard { number < acl-number> | name <
configuration mode acl-name> } global configuration mode
Extended ACL ZXR10(config-ext-acl)# acl extended { number < acl-number> | name <
configuration mode acl-name> } global configuration mode
L2 ACL configuration ZXR10(config-link-acl)# acl link { number < acl-number> | name < acl-name> }
mode global configuration mode
Hybrid ACL ZXR10(config-hybd-acl)# acl hybrid { number < acl-number> | name < acl-name>
configuration mode } global configuration mode
RIP address ZXR10(config-router-af)# address-family ipv6 vrf < vrf-name> RIP routing
configuration mode configuration mode
OSPF configuration ZXR10(config-router)# router ospf < process-id> global configuration mode
mode
2-9
BGP configuration ZXR10(config-router)# router bgp < as-number> global configuration mode
mode
BGP address ZXR10(config-router-af)# address-family { vpnv4 | { ipv4 vrf < vrf-name> } } BGP
configuration mode configuration mode
In any command mode, input a “?” mark behind the system prompt to view the list of
available commands in this command mode.
In the privileged mode, execute the disable command to return to the user mode.
In the user mode and privileged mode, execute the exit command to exit the switch. In
other command mode, execute the exit command to return to the previous mode.
In command modes other than the user mode and privileged mode, execute the end
command or press<Ctrl+z>to return to the privileged mode.
2-10
configure copy
ZXR10#co
3. Press Tab behind the character string. If the command or keyword beginning with this
character string is unique. This will complete the character string with space at the
end.
ZXR10#con<Tab>
ZXR10#configure (there is a space between the configure and cursor.)
4. Input ? behind the command, keyword and parameter. It shows the keyword or
parameter to be input next and its brief explanation. There is a space in front of the
question mark.
ZXR10#configure ?
terminal Enter configuration mode
ZXR10#configure
5. If incorrect command, keyword or parameter is input, the error isolation is offered with
^ in the user interface after you press ENTER. The ^ is below the first character of the
input incorrect command, keyword or parameter. An example is given below.
ZXR10#von ter
^
% Invalid input detected at '^' marker.
ZXR10#
At the end of the above example, the system prompts that the command is not complete
and other keyword or parameter should be input.
Note:
All commands in the command line operation are case-insensitive.
2-11
Command Function
In the privileged mode, execute the show history command to list the commands input the
latest in this mode.
2-12
3-1
2. This example shows how to create a directory ABC in the Flash and then delete it.
ZXR10#mkdir ABC /*Add a sub-directory of ABC in
current directory*/
ZXR10#dir /*view the information in current directory
and find the sub-directory of ABC*/
Directory of flash:/
attribute size date time name
3-2
3-3
3-4
Background of TFTP server is implemented. Start the TFTP server, and run copy on the
switch to backup/restore files or import/export configurations.
3-5
Run the following command to back up the configuration file in the Flash to the background
TFTP server:
ZXR10#copy flash: /cfg/startrun.dat
tftp: //168.1.1.1/startrun.dat
3-6
Note:
1. When use copy command to transfer FTP file between back host and switch, fisrt
configure host ip address in the same network segment that VLAN interface ip address
is in and the interface which host connects belongs to the vlan and can ping through
Vlan ip address.
2. Pay attention to the format requirement while editing startrun.dat with a text editor.
Type “c” in the Boot state, and press ENTER to enter the parameter modification state.
Change the boot mode to booting from the background FTP; change the FTP server
address to that of the background host; change the client and gateway addresses to
that of the management Ethernet port of the switch; set the subnet mask and FTP user
name and password pair. After the modification, the prompt ZXR10 Boot: appears.
[ZXR10 Boot]:c
'.' = clear field; '-' = go to previous field; ^D = quit
Boot Location [0:Net,1:Flash] : 0
/*0 means booting from the background FTP, 1 means botting from Flash*/
Port Number : 24
3-7
4. Type @, and press ENTER. Then the system automatically boot from the background
FTP server.
[ZXR10 Boot]:@
Loading... get file zxr10.zar[15922273] successfully!
file size 15922273.
/*Omitted*/
**********************************************************
Welcome to ZXR10 5928 Switch of ZTE Corporation
**********************************************************
ZXR10>
5. If the system starts successfully, the user can use the show version command to check
whether the new version is running in the memory. If not, booting from the background
server failed. The user must repeat steps 1 to 5.
6. Delete the old version file (zxr10.zar) from the Flash’s IMG directory with the delete
command. If there is enough space in the Flash, the user can reserve the old version
with another name.
7. Copy the new version file on the background FTP server to the Flash’s IMG directory
with the filename as zxr10.zar.
a. Set temporary Vlan interface which is interworking with the host (suppose IP
address is 168.4.168.1).
b. Set the host ip address (suppose ip address is 168.4.168.89) in the same network
segment that Vlan interface ip address is in. The interface which host connects
belongs to the vlan and can ping through Vlan ip address.
3-8
flash: /img/zxr10.zar
Starting copying file
.................................................................
.................................................................
......................................
file copied successfully.
ZXR10#
8. Check for the new version file in the Flash. If not found, the copying failed, when must
repeat step 8 to copy the version again.
9. Reboot ZXR10 5900, and follow step 4 to change the boot mode to booting from Flash,
when Boot path changes to /flash/img/zxr10.zar automatically.
Note:
can also change the boot mode to booting form Flash with the nvram imgfile-location
local command in the global configuration mode.
10. Type @ at the prompt ZXR10 Boot: and press ENTER to boot the system with the
new version in the Flash.
11. When the system is booted successfully, check the running version to confirm the
success of upgrade.
3-9
6. Copy the new version file on the background FTP server to the Flash’s IMG directory
with the filename as zxr10.zar.
7. Check for the new version file in the Flash’s IMG directory. If the new version file is
not found, the copy failed. The user must repeat step 5 to copy the version again.
8. When the system is rebooted successfully, check the running version to confirm the
success of upgrade.
Command Function
ZXR10(config)#enable secret { 0 < password> | 5 < password> | < This sets password.
password> }
ZXR10(config)#username < username> password < password> This sets Telnet user and password.
3-10
ZXR10#clock set < current-time> < month> < day> < year> This sets system time.
There are parameters absolute-timeout and absolute-timeout after line console and
line telnet. absolute-timeout refers to the time which is from the begin of connection to
connection timeout. idle-timeout refers to the idle timeout that after user last operation.
System will disconnect automatically when timeout. User should logon again if they
need to continue operating switch system process. By default, absolute-timeout is 1440
minutes and idle-timeout is 120 minutes.
3-11
3-12
Note:
The GE port and XGE port can’t support hot swap.
4-1
shutdown command sets the physical link state of the port to down, when the port’s link
indicator goes off. All ports are enabled by default.
4-2
ZXR10(config-gei_1/x) #negotiation auto [ speed [ 10| 100] ] This configures automatic negotiation
notification on an Ethernet port to 10M
or 100M.
When working mode of PHY is electrical interface, GE, FE, 10M, half-duplex and full-duplex
can be set if it can be notified.
When working mode of PHY is optical port, only half-duplex and full-duplex can be set if it
can be notified. The notification of speed can't be set.
Description:
Only GE port allows configuration of its duplex mode and rate. Disable auto-negotiation
on the port before the configuration.
4-3
Flow control is to restrict packet count sent to the Ethernet port within certain time period.
The port sends a pause packet when the receive buffer is full to tell the remote port not to
send any more packet to it within certain period. The Ethernet port can also receive pause
packets from other devices and do as required by the packets.
By default, maximum fame allowed on an Ethernet port is 1560-byte long and jumbo frames
are prohibited. Maximum frame allowed on an Ethernet port is 9216-byte long when jumbo
frame are permitted.
Port alias is set to uniquely identify a port with a mnemonic name. Port can be accessed
with its alias instead of the port name.
4-4
Broadcast traffic through an Ethernet port can be limited. Broadcast packets are dropped
when the traffic exceeds the limit so that the broadcast traffic through the Ethernet
port is kept in a reasonable range. This effectively suppresses broadcast storm, helps
avoid congestion and ensures normal provisioning of network services. Broadcast storm
suppression is implemented by setting the rate parameter, the lower the rate the smaller
the allowed broadcast traffic.
When multicast packet suppression function of ZXR10 5900 is enabled, port will take
multicast packet suppression according to configured allowed number of multicast packet
on an Ethernet port every second.
When unknowcast packet suppression function of ZXR10 5900 is enabled, port will take
unknowcast packet suppression according to configured allowed number of unknowcast
packet on an Ethernet port every second.
4-5
Command Function
Example
The output of the viewing interface running status command is as follows.
ZXR10#show interface brief
Interface portattribute mode BW(Mbits) Admin Phy Prot Description
gei_2/1 electric Duplex/full 1000 up up up none
gei_2/2 electric Duplex/full 1000 up up up none
gei_2/3 electric Duplex/full 1000 up up up none
gei_2/4 electric Duplex/full 1000 up up up none
gei_2/5 electric Duplex/full 1000 up up up none
gei_2/6 electric Duplex/full 1000 up up up none
gei_2/7 electric Duplex/full 1000 up down down none
gei_2/8 electric Duplex/full 1000 up down down none
Admin, Phy, and Prot indicate management, physical, and protocol status of interface
respectively. Only all three states are up, is interface in normal working status.
At the interface configuration mode, input shutdown , the Admin state of the interface will
turn down.
Table 4-1 lists some abnormal interface conditions and handling procedures.
4-6
ZXR10#show running-config interface < port-name> This displays Ethernet port configuration
information.
Example
1. It shows the state and statistics for port gei_1/2
ZXR10#show int gei_1/2
gei_1/2 is up, line protocol is up
Description is none
Keepalive set:10 sec
The port is electric
Duplex full
Mdi type:auto
VLAN mode is access, pvid 10 BW 100000 Kbits
Last clearing of "show interface" counters 0Day 0Hour 3Min 8Sec
120 seconds input rate : 0 Bps, 0 pps
120 seconds output rate: 0 Bps, 0 pps
Interface peak rate :
input 40 Bps, output 0 Bps
Interface utilization: input 0%, output 0%
/* Forward packets input/output statistics,
including error packet statistics */
Input:
Packets : 19 Bytes : 1501
Unicasts : 19 Multicasts: 0
Broadcasts : 0 Undersize : 0
Oversize : 0 CRC-ERROR : 0
Dropped : 0 Fragments : 0
Jabber : 0 MacRxErr : 0
Output:
Packets : 0 Bytes : 0
Unicasts : 0 Multicasts: 0
Broadcasts : 0 Collision : 0
LateCollision: 0
Total:
64B : 0 65-127B : 19
128-255B : 0 256-511B : 0
512-1023B : 0 1024-2047B: 0
4-7
Caution!
Line diagnosis and analysis will restart the tested port, when links of the port is broken and
then restored. This function is used only for faulty ports, and is not recommended for ports
connected to users.
4-8
Port mirroring function of ZXR10 5900E complies with the following rules:
l Support up to one group of ports (eight mirrored ports to the most).
l Support cross-board port mirroring, that is, the mirrored port and monitor port can be
on different interface boards.
l Support monitoring only sent/received data on the mirrored port.
l Support cross-equipment port mirroring , that is, mirrored port and monitor port can
be on different equipment.
l Support cross-tunnel port mirroring, that is , data flow from source port can be
encapsulated and forward by GRE tunnel configuration to the destination monitor
end.
1 ZXR10(config-if)#monitor session < session-number> source [ This sets mirror port for capturing
direction { both| tx| rx} ] in/out traffic of monitor port at
interface mode. The range of
session-number is 14.
2 ZXR10(config-if)#monitor session < session-number> desination This sets monitor port. The range of
session-number is 14.
3 ZXR10(config-if)#monitor session < session-number> desination [ This sets RSPAN monitor port. The
rspan-vlanid < vlanid> ] [ priority < priorityid > ] range of session-number is 14, the
range of vlanid is 14094, the range
of priorityid is 07.
4 ZXR10(config-if)#monitor session < session-number> desination This sets ERSPAN monitor port. The
erspan [ ttl < 1~255> ] [ flags{ disable| enable} ] [ tpid 0x8100] [ DSCP range of session-number is 14.
< 0~63> ]
5 ZXR10(config-if)#ZXR10(config)# show monitor session { all| < This displays configuration and
session-number> } status of port mirroring. The range
of session-number is 14.
4-9
4.2.3
1.
Figure 4-1 fei_1/3 fei_1/1 fei_1/2
Figure 4-1
ZXR10(config)#interface fei_1/1
ZXR10(config-if)#monitor session 1 source direction rx
ZXR10(config-if)#exit
ZXR10(config)#interface fei_1/2
ZXR10(config-if)#monitor session 1 source
ZXR10(config-if)#exit
ZXR10(config)#interface fei_1/3
ZXR10(config-if)#monitor session 1 destination
2. RSPAN
Figure 4-2 ZXR10 5900E RSPAN fei_1/1 fei_1/2 fei_1/3 RSPANVlanVlan 10 1
4-10
ZXR10(config)#interface fei_1/1
ZXR10(config-if)#monitor session 1 source direction rx
ZXR10(config-if)#exit
ZXR10(config)#interface fei_1/2
ZXR10(config-if)#monitor session 1 source
ZXR10(config-if)#exit
ZXR10(config)#interface fei_1/3
ZXR10(config-if)#monitor session 1 destination rspan-vlanid 10 priority 1
ZXR10(config)#interface fei_1/1
ZXR10(config-if)#monitor session 1 source direction rx
ZXR10(config-if)#exit
ZXR10(config)#interface tunnel1
ZXR10(config-if)# monitor session 1 destination erspan ttl 23
4-11
1 ZXR10(config)#loop-detect interface < port-name> [ enable | disable] This enables the loopback detection
function of one port or multiple ports.
2 ZXR10(config)#loop-detect interface < port-name> vlan < vlan-id> [ This configures the loopback
enable | disable] detection of Vlan in one port.
4-12
3 ZXR10(config)#loop-detect protect-interface < port-name> < enable | This configures the loopback
disable> detection port interface.
When a switch detects a loopback of
one port, switch deal with it according
to parameter protect-interface.
When parameter protect-interface is
enable, switch sets a alarm it has
detected a loopback but there will be
no operation. When the parameter
protect-interface is disable, the
switch will shutdown the port. After
enabling loopback detection, the
default parameter protect-interface
is disable.
6 ZXR10(config)#show loop-detect interface-detail < port-name> This displays detail of port which
enables loopback detection.
4-13
Configuration of Switch A:
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#switchport mode trunk
ZXR10(config-gei_1/1)#switchport trunk vlan 1-2
ZXR10(config-gei_1/1)#exit
ZXR10(config)#loop-detect interface gei_1/1 enable
ZXR10(config)#loop-detect protect-interface gei_1/1 enable
ZXR10(config)#loop-detect reopen-time 5
ZXR10(config)#loop-detect interface gei_1/1 vlan 1-2 enable
4-14
ZXR10(config-gei_1/x)#optical-inform monitor { enable | disable} SFP DOM polling test function need
to be enabled or disabled on interface
by command line. The default is
disabled. The polling diagnosis related
information will be viewed after it is
enabled. Otherwise the related optical
module information can't be showed.
Only support physical interface, 100M port, gigabit port and 10G port.
Example
This views optical module information of an interface.
ZXR10#Show optical-inform brief
Optical Optical
Interface Temperature Voltage Current Tx Power Rx Power
Name (Celsius) (Volts) (mA) (mW) (mW)
------------------------------------------------------------
gei_2/1/21 12.00 5.00 60.00 0.00 1.00
gei_2/1/22 12.00 5.00 60.00 0.00 1.00
gei_2/1/23 12.00 5.00 60.00 0.00 1.00
gei_2/1/24 12.00 5.00 60.00 0.00 1.00
4-15
The threshold is related to hardware optical module. If optical module and manufacturer
are different the viewed information will be different.
ZXR10#show optical-inform detail [ temperature | voltage | current | This views detailed threshold
rx-power | tx-power ] [ interface < interface-name> ] information of interface optical module
includes temperature, voltage, current,
sending and receiving power. This
supports single interface view and
single board view.
Parameter Description
Example
This views threshold information of interface optical module.
ZXR10#show optical-inform detail temperature
High Alarm High Warn Low Warn Low Alarm
Temperature Threshold Threshold Threshold Threshold
Port (Celsius) (Celsius) (Celsius) (Celsius) (Celsius)
-----------------------------------------------------------
gei_1/1 48.1 100.0 100.0 0.0 0.0
gei_1/2 34.9 100.0 100.0 0.0 0.0
4-16
The threshold is related to hardware optical module.If optical module and manufacturer
are different the viewed information will be different.
ZXR10#show optical-inform threshold-alarm [ interface < interface-name> ] This views threshold information of
interface optical module includes
temperature, voltage, current, sending
and receiving power. This supports
single interface view and single board
view.
Example
This views alarm information that optical module exceeds threshold.
ZXR10#Show optical-inform threshold-alarm
Description:
tem : temperature vol : volage cur: current
tx : transmit power rx : receive power
h-w : high-warning(+) h-a : high-alarm(++)
l-w : low-warning(-) l-a : low-alarm(--)
Interface Time in slot Threshold Violation Type(s) of Last Known
Name (DDDD:HH:MM:SS) (DDDD:HH:MM:SS) Threshold Violation
-------------------------------------------------------------
gei_2/1/22 14:57:27 04/29/2008 14:57:07 04/29/2008
tem h-w -52.00C>=-52.00C
14:57:07 04/29/2008 vol h-w 5.00V>=5.00V
14:57:07 04/29/2008 cur l-w 60.00mA<=80.00mA
14:57:07 04/29/2008 rx l-a -440.00dBm<=-333.01dBm
14:57:07 04/29/2008 rx l-a -440.00dBm<=-333.01dBm
gei_2/1/23 14:57:27 04/29/2008 14:57:07 04/29/2008
tem h-w -52.00C>=-52.00C
14:57:07 04/29/2008 vol h-w 5.00V>=5.00V
14:57:07 04/29/2008 cur l-w 60.00mA<=80.00mA
14:57:07 04/29/2008 rx l-a -440.00dBm<=-333.01dBm
14:57:07 04/29/2008 rx l-a -440.00dBm<=-333.01dBm
4-17
The threshold is related to hardware optical module. If optical module and manufacturer
are different the viewed information will be different.
4-18
Class A 0 8 24 0.0.0.0~
127.255.255.255
Class B 10 16 16 128.0.0.0~
191.255.255.255
Some Class A, B and C addresses are reserved for private networks. It is recommended
that the internal network should use the private network address. These addresses refer
to:
5-1
l Class A:10.0.0.0~10.255.255.255
l Class B:172.16.0.0~172.31.255.255
l Class C:192.168.0.0~192.168.255.255
This address classification method is to facilitate routing protocol designing. From this
method it can be known the network type just by the prefix characteristic bit of the IP
address. This method, however, cannot make the best of the address space. With
the dramatic expansion of Internet, problem of address shortage becomes increasingly
serious.
To make most of IP addresses, network can be divided into multiple subnets. Borrow some
bits from the highest bit of the host bit as the subnet bit. Remaining part of the host bit
still serves as the host bit. Thus, the structure of an IP address consists of three parts:
Network bits, subnet bits and host bits.
The network bits and subnet bits are used to uniquely identify a network. Use the subnet
mask to find which part in the IP address indicates network bits and subnet bits and which
part stands for host bits. The part with subnet mask of "1" corresponds to the network bits
and subnet bits of the IP address, while the part with subnet mask of "0" corresponds to
host bits.
The division of the subnet greatly improves the utilization of IP address, and alleviates the
problem of IP address shortage.
Regulations on IP addresses:
1. 0.0.0.0 is used when a host without an IP address is started. RARP, BOOTP and
DHCP are used to obtain the IP address. The address serves as the default route in
the routing table.
2. 255.255.255.255 is a destination address used for broadcast and cannot serve as a
source address.
3. 127.X.X.X is called the loop-back address.
4. Only an IP address with host bits being all "0" indicate the network itself. An IP address
with host bits being all "1" serves as the broadcast address of the network.
5. For a legal host IP address, the network part or the host part should not be all "0" or
all "1".
2 ZXR10(config-if-vlanX)#ip address < ip-address> < net-mask> [ < This sets IP address.
broadcast-address> ] [ secondary]
5-2
The show ip interface command can be used to view the IP address of the interface.
ZXR10(config-if-vlan1)#show ip interface
1 ZXR10(config)#arp protect { interface | mac | whole} limit-num < This configures ARP protection.
number>
5-3
5 ZXR10(config-if-vlanX)#set arp { static| permanent} < ip-address> This adds arp entry in
< hardware-address> static/permanent binding.
Command Function
ZXR10#clear arp-cache interface{ supervlan< id> | vlan< id> } [ < This deletes all dynamic arp entries in
ipaddress> | dynamic| permanet| static] from specific interface ARP buffer.
ARP entry of designated interface can be viewed with show arp [ < interface-name> ]
command.
The following example shows the ARP table of the layer 3 interface VLAN1.
ZXR10#show arp
Address Age(min) Hardware Addr Interface
10.1.1.1 - 000a.010c.e2c6 vlan1
10.1.100.100 18 00b0.d08f.820a vlan1
10.10.10.2 S 0000.1111.2222 vlan1
10.10.10.3 P 0000.1111.2221 vlan1
ZXR10#
The “-”of Age in the result indicates that it is the ARP of the switch vlan interface. The
arp is generated in the process of configuring switch vlan interface address. “s” indicates
that it is a static ARP, and “P” indicates that it is a permanent ARP added manually. The
number means the time since ARP updates last time.
5-4
6-1
Each ACL has an access list number to identify. The access list number is a number. The
access list number ranges of different types of ACLs are shown as follows:
l standard ACL: 1~99
l Extended ACL: 100~199
l L2 ACL : 200~299
l Hybrid ACL: 300~349
l Standard IPv6ACL: 2000~2499
l Extended IPv6ACL : 2500~2999
Each ACL has at best 100 rules, with the rule number range from 1 to 100.
ZXR10(config)#time-range < timerange-name> { < hh:mm:ss> to < This enables time range.
hh:mm:ss> < days-of-the-week> | from < hh:mm:ss> < mm-dd-yyyy> [ to <
hh:mm:ss> < mm-dd-yyyy> ] }
1 ZXR10(config)#acl standard { number < acl-number> | name < This enters the standard ACL
acl-name> } configuration mode.
6-2
2 ZXR10(config-std-acl)#rule < 1-100> { permit| deny} { < source> [ This configures the rules of ACL.
< source-wildcard> ] | any} [ time-range < timerange-name> ]
3 ZXR10(config-std-acl)#move < rule-no> { after | before} < rule-no> This moves a rule behind of another
rule.
Example
This example defines a standard ACL. The ACL permits packets from the network segment
192.168.1.0/24 to pass, but reject packets with the source IP address of 192.168.1.100.
ZXR10(config)#acl standard number 10
ZXR10(config-std-acl)#rule 1 deny 192.168.1.100 0.0.0.0
ZXR10(config-std-acl)#rule 2 permit 192.168.1.0 0.0.0.255
1 ZXR10(config)#acl extend { number < acl-number> | name < This enters the extended ACL
acl-name> } configuration.
2 ZXR10(config-ext-acl)#rule < rule-no> { permit| deny} { < This configures the rules based on
source> < source-wildcard> | any} { < dest> < dest-wildcard> | any} ICMP.
[ < icmp-type> [ icmp-code < icmp-code> ] ] [ { [ precedence <
pre-value> ] [ tos < tos-value> ] } | dscp < dscp-value> ] [ fragment] [
time-range < timerange-name> ]
3 ZXR10(config-ext-acl)#rule < rule-no> { permit| deny} { < This configures the rules based on
ip-number> | ip} { < source> < source-wildcard> | any} { < dest> < IP or IP protocol number (excluded
dest-wildcard> | any} [ { [ precedence < pre-value> ] [ tos < tos-value> ICMP, TCP, UDP)
] } | dscp < dscp-value> ] [ fragment] [ time-range < timerange-name> ]
4 ZXR10(config-ext-acl)#rule < rule-no> { permit| deny} { < source> This configures the rules based on
< source-wildcard> | any} [ < rule> < port> ] { < dest> < dest-wildcard> | TCP.
any} [ < rule> < port> ] [ established] [ { [ precedence < pre-value> ] [
tos < tos-value> ] } | dscp < dscp-value> ] [ fragment] [ time-range
< timerange-name> ]
5 ZXR10(config-ext-acl)#rule < rule-no> { permit| deny} { < source> This configures the rules based on
< source-wildcard> | any} [ < rule> < port> ] { < dest> < dest-wildcard> UDP.
| any} [ < rule> < port> ] [ { [ precedence < pre-value> ] [ tos <
tos-value> ] } | dscp < dscp-value> ] [ fragment] [ time-range <
timerange-name> ]
6 ZXR10(config-ext-acl)#move < rule-no> { after | before} < rule-no> This moves a rule behind another
rule.
6-3
Example
This shows an extended ACL to perform the following functions.
1. Permit UDP packets from the network segment 210.168.1.0/24, the destination IP
address 210.168.2.10, the source port 100 and the destination port 200 to pass.
2. Forbid the BGP packets from the network segment 192.168.2.0/24 passing.
3. Forbid all ICMP packets.
4. Forbid all packets with the IP protocol No. 8.
ZXR10(config)#acl extend number 150
ZXR10(config-ext-acl)#rule 1 permit udp 210.168.1.0 0.0.0.255
eq 100 210.168.2.10 0.0.0.0 eq 200
ZXR10(config-ext-acl)#rule 2 deny tcp 192.168.2.0 0.0.0.255
eq bgp any
ZXR10(config-ext-acl)#rule 3 deny icmp any any
ZXR10(config-ext-acl)#rule 4 deny 8 any any
1 ZXR10(config)#acl link number < acl-number> This enters the L2 ACL configuration
mode.
2 ZXR10(config-link-acl)#Rule < rule-no> { permit| deny} < This configures the rules of ACL.
protocol-number| any> [ cos< value> ] [ ingress { < source-mac> <
source-mac-wildcard> | any} [ vlan-id < vlan> ] ] [ engress{ < dest-mac>
< dest-mac-wildcard> | any} ] [ time-range < timerange-name> ]
3 ZXR10(config-link-acl)#move < rule-no> { after | before} < This moves a rule behind another
rule-no> rule.
Example
In this example, define a L2 ACL to permit IP packets with the source MAC address as
00d0.d0c0.5741 and the 802.1p as 5 from VLAN 10.
1 ZXR10(config)#acl hybrid { number < acl-number> | name < This enters the hybrid ACL
acl-name> } configuration.
6-4
2 ZXR10(config-hybd-acl)#rule < rule-no> { permit| deny} { < This configures the rules based on
ip-number> | ip} { < source> < source-wildcard> | any} { < dest> < IP or IP protocol number (excluded
dest-wildcard> | any} { [ any | < ether protocol> ] } [ cos < 0-7> ] [ < ICMP, TCP, UDP).
vlan-id> ] [ ingress < source-mac> < source-mac-wildcard> egress <
dest-mac> < dest-mac-wildcard> ] [ time-range < timerange-name> ]
3 ZXR10(config-hybd-acl)#rule < rule-no> { permit| deny} { < This configures the rules based on
source> < source-wildcard> | any} { [ < dest-ip> < dest-wildcard> | any { TCP.
ether-protocol} [ < vlan-id> ] [ cos< value> ] [ egress < dst-mac> <
dst-wildcard> ] [ ingress < sor-mac> < sor-wildcard> ] [ time-range<
range-name> ] ] [ eq < port-number> { < dst-mac> < dst-wildcard> | any}
< ether-protocol> [ < vlan-id> ] [ cos< value> ] [ egress< dst-mac> <
dst-wildcard> ] [ ingress < sor-mac> < sor-wildcard> ] [ time-range
< range-name> ] ] }
4 ZXR10(config-hybd-acl)#rule < rule-no> { permit| deny} { < This configures the rules based on
source> < source-wildcard> | any} { [ < dest-ip> < dest-wildcard> | any { UDP.
ether-protocol} [ < vlan-id> ] [ cos< value> ] [ egress < dst-mac> <
dst-wildcard> ] [ ingress < sor-mac> < sor-wildcard> ] [ time-range<
range-name> ] ] [ eq < port-number> { < dst-mac> < dst-wildcard> | any}
< ether-protocol> [ < vlan-id> ] [ cos< value> ] [ egress< dst-mac> <
dst-wildcard> ] [ ingress < sor-mac> < sor-wildcard> ] [ time-range
< range-name> ] ] }
5 ZXR10(config-hybd-acl)#move < rule-no> { after | before} < This moves a rule behind another
rule-no> rule.
Example
This shows an extended ACL to perform the following functions:
1. Permit UDP packets from the network segment 210.168.1.0/24, the destination IP
address 210.168.2.10, destination MAC address 00d0.d0c0.5741, the source port 100
and the destination port 200 to pass.
2. Forbid the BGP packets from the network segment 192.168.3.0/24 passing.
3. Forbid all packets with the MAC address 0100.2563.1425.
ZXR10(config)#acl hybrid number 300
ZXR10(config-hybd-acl)#rule 1 permit udp 210.168.1.0 0.0.0.255 Eq
100 210.168.2.10 0.0.0.0 eq 200 any Egress
00d0.d0c0.5741 0000.0000.0000
ZXR10(config-hybd-acl)#rule 2 deny tcp 192.168.3.0 0.0.0.255
Eq BGP any any
ZXR10(config-hybd-acl)#rule 3 deny any any any ingress
0100.2563.1425 0000.0000.0000
6-5
1 ZXR10(config)#ipv6 acl standard { number < acl-number> | name < This enters the basic ACL
acl-name> } configuration mode.
2 ZXR10(config-std-v6acl)#rule < 1-100> { permit| deny} { < source> This configures the rules of ACL.
| any} [ mac(< Source-mac> < Source wildcard bits> )] [ time-range
< timerange-name> ]
3 ZXR10(config-std-v6acl)#move < rule-no> { after | before} < This moves a rule behind another
rule-no> rule.
Example
In this example, define a ACL to permit IP packets with the network segment as
10.0.0.0.0.0.0.0/16 to pass.
ZXR10(config)# ipv6 acl standard number 2000
ZXR10(config-std-v6acl)# rule 1 permit 10::/16
1 ZXR10(config)#ipv6 acl extended { number < acl-number> | name < This enters ACL configuration mode.
acl-name> }
2 ZXR10(config-ext-v6acl)#rule < 1-maxRuleNo> { permit | deny} This configures the rules of ACL.
{ (icmp { < source/prefix> | any} { < destination/prefix> | any} ) | (<
protocol> { < source/prefix> | any} { < destination/prefix> | any} ) | (tcp{
< source/prefix> | any} [ < rule> { < 0-maxPortNo> | < tcpporttype> } ] {
< destination/prefix> | any} [ < rule> { < 0-maxPortNo> | < tcpporttype>
} ] ) | (udp{ < source/prefix> | any} [ < rule> { < 0-maxPortNo> | <
udpporttype> } ] { < destination/prefix> | any} [ < rule> { < 0-maxPortNo>
| < udpporttype> } ] ) } [ ingress(< Source mac address> < Source
wildcard bits> )] [ egress(< Destination mac address> < Destination
wildcard bits> )] [ { time-range < timerange-name> | event <
event-name> } ]
3 ZXR10(config-ext-v6acl)#move < rule-no> { after | before} < This moves a rule behind another
rule-no> rule.
Example
In this example, define a extended ipv6 ACL to permit IP packets with the source ip network
segment as 10.0.0.0.0.0.0.0/16 and destination ip network segment as 20.0.0.0.0.0.0.0/16
to pass and deny the packets with MAC address 0012.0001.0002 to pass.
ZXR10(config)# ipv6 acl extended 2500
6-6
2 ZXR10(config-if)#ip access-group < acl-number> in| out| vfp This applies ACL on physical port
and can bind inbound of port ,
outbound of port and vfp.
Note:
One physical port only can apply one ACL. The new configuration will cover the old one.
For example, on fei_1/1 configuration mode, the following two commands are configured.
ip access-group 10 in
ip access-group 100 in
Only ACL 100 takes effects.
2 ZXR10(config-vlanX)#ip access-group { < acl-number> < acl-name> This applies ACL on VLAN.
} in
Note:
1. Currently, ACL type that VLAN binds only supports IPv4 hybrid ACL
2. One VLAN can only apply one ACL, the new configuration will cover the old one. For
example, in vlan configuration mode, the following two commands are configured
ip access-group 300 in
ip access-group 305 in
only ACL 305 takes effects.
6-7
1 ZXR10(config)#acl standard { number < acl-number> | name < This enters ACL configuration mode.
acl-name> }
2 ZXR10(config-std-acl)#rule < 1-100> { permit| deny} { < source> [ This configures the rules of ACL.
< source-wildcard> ] | any} [ time-range < timerange-name> ]
Note:
Currently only IPv4 standard ACL, IPv4 extended ACL, IPv4 hybrid ACL and IPv4 layer 2
ACL support ACL renaming function.
1. Users of both department A and department B are forbidden to access the FTP server
and the VOD server in work time (9:00–17:00), but can access the Mail server at any
time.
2. Internal users can access the Internet through proxy 192.168.3.100, but users of
department A are forbidden to access the Internet in work time.
6-8
Configuration of switch:
/*Configure time range*/
ZXR10(config)#time-range en
ZXR10(config)#time-range working-time
ZXR10(config-tr)#periodic daily 09:00:00 to 17:00:00
6-9
6-10
7-1
address, IP protocol type, TCP source port No. TCP destination port No., UDP source
port No., UDP destination port No., ICMP type, ICMP code, DSCP, ToS, precedence,
source VLAN ID, Layer 2 Ethernet protocol type and 802.1p priority value.
ZXR10 5900 implements the Single Rate Three Color Marker (SrTCM) (RFC2697) and
Two Rate Three Color Marker (TrTCM) (RFC2698) functions, which both support the
color-blind and color-aware modes.
It assumes that packets are colorless in color-blind mode but assumes that packets are
marked in a color in color-aware mode. On the switch, each packet traversing the switch
will be assigned a color according to some principle (packet information). Maker colors
the IP packet according to result from Meter and the color is marked in DS field.
The following two methods will be described:
1. Single Rate Three Color Marker (SrTCM)
This algorithm is used in Diffserv traffic conditioner. SrTCM measures data flow
and marks packets according to three traffic parameters (Committed Information
Rate, CIR; Committed Burst Size, CBS; Excess Burst Size, EBS). We call the three
parameters as green, yellow and red marker respectively. A packet is green if its size
7-2
is less than CBS. A packet is yellow if its size is between CBS and EBS and is red if
its size exceeds EBS. By default, red packet is discarded.
2. Two Rate Three Color Marker (TrTCM)
This algorithm is used in Diffserv traffic conditioner. TrTCM measures IP data flow
and marks packets with green, yellow and red based on two types of rates (Peak
Information Rate, PIR and Committed Information Rate, CIR) and their related
committed burst size (CBS and PBS). A packet is marked in red if its size exceeds
PIR. A packet is marked in yellow is its size is between PIR and CIR and is marked in
green if its size is less than CIR.
7-3
WRR makes each queue investigated possibly and not “starved”. Each queue is
investigated at different time, that is, has different weight indicating the ratio of
resources obtained by each queue. Packets in the high priority queue have more
opportunities to be scheduled than the low priority queue.
Data priority is contained in the 802.1P label. If data entering the port is not marked with
an 802.1P label, a default 802.1p value will be assigned by the switch.
7-4
content of traffic statistics contains the number of packets received from the incoming
direction of the port.
ZXR10(config)#traffic-limit in < acl-number> rule-id < rule-no> cir < This configures traffic policy.
cir-value> cbs < cbs-value> ebs < ebs-value> [ pir < pir-value> ] [ mode
< mode> ] [ { [ drop-yellow] [ forward-red] [ remark-red-dp { high| low|
medium} ] [ remark-red-dscp< value> ] [ remark-yellow-dp { high| low|
medium} ] [ remark-yellow-dscp < value> ] } ]
Color rendering configuration parameters contain cir, cbs, ebs and pir. To use the
dual-rate marker algorithm, configure the pir parameter. The ebs parameter indicates the
pbs parameter stipulated in the protocol.
Parameter mode < mode> : blind indicates Color-Blind mode and aware indicates
Color-Aware mode.
Parameter drop-yellow: indicates dropping yellow packets; packets will be forwarded by
default.
Parameter forward-red: indicates forwarding red packets; packets will be forwarded by
default.
Parameter remark indicates remarking service parameter of packets with color:
l remark-red-dp: Remark drop precedence of red packets, priority parameter includes
high, medium and low.
l remark-red-dscp: Remark DSCP priority of red packets, priority parameter is 0~63.
l remark-yellow-dp: Remark yellow packet dp to parameter of high, medium or low.
l remark-yellow-dscp:Remark yellow packet’s dscp value from 0 to 63 and one value
can be chosen..
Example
This example shows the traffic policy of packets sent to the destination IP address of
168.2.5.5 on port of gei_1/1 and bandwidth is set to 10M.
ZXR10(config)#acl extended number 100
ZXR10(config-ext-acl)#rule 1 permit ip any
168.2.5.5 0.0.0.0
ZXR10(config-ext-acl)#exit
ZXR10(config)# traffic-limit in rule-id 1 cir
10000 cbs 2000 pir 10000 pbs 2000 mode blind
ZXR10(config)#interface gei_1/1
7-5
ZXR10(config-gei_1/x)#traffic-shape data-rate < rate-value> burst-size This configures traffic shaping for the
< value> port.
Example
This example shows the conduction of traffic shaping on port gei_1/1 and configures the
port rate as 20 M.
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#traffic-shape data-rate 20000 burst-size 4
Example
This example shows the conduction of queue bandwidth limit on port gei_1/1 and
configures maximum bandwidth limit of queue 1 as 20M and minimum bandwidth as 2M,
maximum bandwidth limit of queue 2 as 20M, minimum bandwidth limit of queue 3 as 2M.
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#traffic-shape queue 1 max-datarate-limit 20000
min-gua-datarate 2000
ZXR10(config-gei_1/1)#traffic-shape queue 2 max-datarate-limit 20000
ZXR10(config-gei_1/1)#traffic-shape queue 3 min-gua-datarate 2000
Command Function
ZXR10(config-gei_1/x)#queue-mode strict-priority| wrr < Queue This configures queue scheduling and
number> < Queue weight> default 802.1p priority of the port.
7-6
Example
This example shows the implementing of SP scheduling on the port gei_1/1. This
implements WRR scheduling on port gei_1/2 and configures the weight of queue 0 to
queue 7 sequentially as 10, 5, 8, 10, 5, 8, 9 and 10. Default 802.1p is configured on the
port gei_1/2 as 5.
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#queue-mode strict-priority
ZXR10(config-gei_1/1)#exit
ZXR10(config)#interface gei_1/2
ZXR10(config-gei_1/2)# queue-mode wrr 0 10 1 5 2 8 3 10 4 5 5 8 6 9 7 10
ZXR10(config-gei_1/2)#priority 5
ZXR10(config)#redirect in < acl-number> rule-id < rule-no> { cpu| This redirects the packets.
interface < port-name> | next-hop < ip-address> }
Example
This example shows the redirection of the packet whose source IP address is 168.2.5.5
on the port gei_1/4 to the port gei_1/3. In addition, it is to implement the policy routing to
packet whose destination IP address is 66.100.5.6 and specify the next-hop IP address as
166.88.96.56.
ZXR10(config)#priority-mark in < acl-number> rule-id < rule-no> { This configures priority marking.
dscp < dscp-value> | cos< cos-value> local-precedence < local-value>
drop-precedence < dropl-value> } }
7-7
Example
This example shows how to change the DSCP value of the packet whose source IP
address is 168.2.5.5 on the port gei_1/1 to 34 and selects the output queue to 4.
ZXR10(config)#acl standard number 10
ZXR10(config-std-acl)#rule 1 permit 168.2.5.5
ZXR10(config-std-acl)#exit
ZXR10(config)#priority-mark in 10 rule-id 1 dscp 34 cos
4 drop-precedence low
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#ip access-group 10 in
Command Function
ZXR10(config)#qos set acl-svlan-map acl { acl-number | acl-name} rule < This configures outer VLAN value of
rule-id> to out-vlanid-< vlan-id> traffic which matches ACL rule.
Example
This example shows how to configure outer vlan value of traffic which complies with rule
1 on gei_1/4 as 2000.
ZXR10(config)#acl standard number 10
ZXR10(config-std-acl)#rule 1 permit 168.2.5.5
ZXR10(config-std-acl)#exit
ZXR10(config)#interface gei_1/4
ZXR10(config-gei_1/4)#ip access-group 10 in
ZXR10(config-gei_1/4)#exit
ZXR10(config)#qos set acl-svlan-map acl 10
rule 1 to out-vlanid 2000
ZXR10(config)#traffic-mirror in < acl-number> rule-id < rule-no> { cpu| This configures traffic mirroring.
interface < interface-num> }
Example
This example shows the mirror data traffic whose source IP address is 168.2.5.6 on the
port gei_1/8 to the port gei_1/4.
ZXR10(config)#acl standard number 10
7-8
ZXR10(config)#qos tail-drop < session-index> queue-id < queue-id> < This configures the tail-drop parameter.
all-threshold> < yellow-threshold> < red-threshold>
To enable the tail-drop function on the port, use the following command.
drop-mode tail-drop < session-id>
Example
This example shows the configuration of tail-drop. In queue 1: Red packets tail-drop value
is 120. Yellow packets tail-drop value is 120. all packets tail-drop value is 240. This is
configured on the port gei_1/8.
ZXR10(config)#qos tail-drop 1 queue-id 1 240 120 120
ZXR10(config)#interface gei_1/8
ZXR10(config-gei_1/8# drop-mode tail-drop 1
ZXR10(config)#traffic-statistics < acl-number> rrulle-iid < rule-no> This configures traffic statistics.
pkt-type { all| green| red| yellow} statistics-type { byte| packet}
Example
This example shows the conduction of traffic statistics to data whose destination IP address
network segment is 67.100.88.0/24 on the port gei_1/8.
ZXR10(config)#acl extend number 100
ZXR10(config-ext-acl)#rule 1 permit ip 168.2.5.5 0.0.0.0 any
ZXR10(config-ext-acl)#rule 2 permit ip any 67.100.88.0 0.0.0.255
ZXR10(config-ext-acl)#exit
ZXR10(config)#traffic-statistics 100 rule-id 2 pkt-type all statistics-type byte
ZXR10(config)#interface gei_1/8
7-9
Switch configuration:
7-10
As shown in Figure 7-3, Users on both sub-networks are connected to the switch and
there are two available ISP egresses. It is required to select different egresses based on
IP addresses of users as follows: Users on the sub-network 10.10.0.0/24 use the ISP1
egress. Users on the sub-network 11.11.0.0/24 use the ISP2 egress.
7-11
Switch configuration:
/*Define an ACC, which describes users in 10.10.0.0/24
network segment and 11.11.0.0/24 network segment*/
ZXR10(config)#acl standard number 10
ZXR10(config-std-acl)#rule 1 permit 10.10.0.0 0.0.0.255
ZXR10(config-std-acl)#rule 2 permit 11.11.0.0 0.0.0.255
ZXR10(config-std-acl)#exit
7-12
4. To display table configuration information that 802.1P user priority maps to switch local
precedence, use the following command.
show qos cos-drop-map
Example
ZXR10(config)#acl standard number 1
ZXR10(config-std-acl)#rule 1 permit 100.1.1.1
ZXR10(config-std-acl)#exit
ZXR10(config)#traffic-limit in 1 rule-id 1 cir 10000 cbs 2000
ebs 2000 mode blind
ZXR10(config)#show qos
traffic-limit in 1 rule-id 1 cir 10000 cbs 2000 ebs 2000 mode blind
ZXR10(config)#qos conform-dscp 1 0 7 2
ZXR10(config)#show qos conform-dscp
qos conform-dscp 1 0 7 2
ZXR10(config)#qos cos-local-map 1 2 3 4 5 6 7 0
ZXR10(config)#show qos cos-local-map
qos cos-local-map 1 2 3 4 5 6 7 0
ZXR10(config)#qos cos-drop-map 2 1 0 2 1 1 0 1
ZXR10(config)#show qos cos-drop-map
qos cos-drop-map 2 1 0 2 1 1 0 1
7-13
7-14
Usually Dynamic allocation method is adopted. The valid time segment of using the
address is called lease period. Once the lease period expires, the host must request
the server for continuous lease. The host cannot continue to lease until it accepts the
request, otherwise it must give up unconditionally.
Routers do not send the received broadcast packet from a sub-network to another by
default. But the router as the default gateway of the client host must send the broadcast
8-1
packet to the sub-network where the DHCP server locates when the DHCP server and
client host are not in the same sub-network. This function is called DHCP relay.
ZXR10 5900 can act as a DHCP server or DHCP relay to forward DHCP information but
it cannot use both functions at the same time.
DHCP makes IP address allocation more convinent. But with the wide application of DHCP
service, some problem happens. Firstly, DHCP service allows multiple DHCP servers to be
in a subnet, which means that administrator can't assure that client doesn't get IP address
from illegal DHCP server set by some clients but only gets legal IP address from DHCP
server set by administrator. Secondly, in subnet deployed DHCP service, the host which
is designated legal IP address, subnet mask and gateway can access network normally.
But DHCP server will still allocate this IP address to other hosts possibly. It will lead to
address collision and affect the normal distribution of IP address. DHCP snooping function
is enabled for ZXR10 5900 to prevent bogus DHCP server from being laid in network, and
in this case, the port connecting to DHCP server must be set to trusted port. What’s more,
dynamic ARP inspection technology can be used together to prevent illegal IP and MAC
address binding, thus ensuring normal assignment of IP addresses by DHCP server.
2. To configure conflict time in ip pool or delete the orginal configuration, use the following
commands.
8-2
3. To configure reserving address in IP pool or delete the original configuration, use the
following commands.
2 ZXR10(config-ip-pool)#no exclude < low_ip_addr> [ < hig_ip_addr> This deletes the original
] configuration.
<low_ip_addr >the begin low
address of reserving address or a
specific address.
<Hig_ip_add r> the highest address
of reserving address range. This
command parameter must be a
subset of this address pool.
1 ZXR10(config-ip-pool)#network < net_number> < net_mask> This adds all suitable IP addresses
to IP pool.
<net_numberr > a specific subnet
network number, <net_maskr >
subnet mask.
5. To configure IP pool range or delete corresponding IP address range , use the following
commands.
8-3
2. To configure binding table between MAC address and ip address or delete the original
configuration, use the following commands.
2 ZXR10(config-dhcp-pool)#no binding < mac_addr> < ip_addr> [ This deletes the original
vrf-instance < instance_ namer> ] configuration.
3. To configure a default route or delete the configured content, use the following
commands.
8-4
2 ZXR10(config-dhcp-pool)#no default-router < ip_addr> [ < This deletes the configured content.
ip_addr> ] [ < ip_addr> ]
4. To configure DNS server or delete the corresponding configuration, use the following
commands.
1 ZXR10(config-dhcp-pool)#dns-server < ip_addr> [ < ip_addr> ] [ < This configure DNS server address.
ip_addr> ] This command can configure up to 8
DNS server addresses.
2 ZXR10(config-dhcp-pool)#no dns-server < ip_addr> [ < ip_addr> This deletes the corresponding
] [ < ip_addr> ] configuration.
5. To bind the specific ip pool with dhcp pool or delete binding relationship, use the
following command.
1 ZXR10(config)#lease-time [ [ infinite] | [ < days> < hours> < minutes> This configurse ip address
]] lease-time.
<days> 0~365
<hours> 0~23
<minutes> 0~59
infinite
The default is 60 minutes.
8-5
Command Function
ZXR10(config-dhcp-pool)#option < option_code> [ [ ascii < string> ] | [ This configures other options.
hex < hex_num> ] | [ ip < ip_addr> ] ] <option_code> configured optional
code,1~254.
<string> NVT ASCII character string.
<hex_num> hexadecimal number.
<ip_addr> IP Address
1 ZXR10(config)#ip dhcp policy < policy_name> < priority> This enters policy configuration
mode.
<policy_namer> name of policy,
1~16 characters.
<priority> priority.
2 ZXR10(config)#no ip dhcp policy < policy_name> < priority> This deletes name corresponding
policy configuration.
2. To bind the policy to a dhcp-pool or delete binding relationship, use the following
command.
3. To configure relay agent address or delete the configuration, use the following
commands.
8-6
2. To enable DHCP working mode on the interface, use the following command.
Command Function
ZXR10(config-if-vlanX)#ip dhcp mode [ server | relay | proxy] Relay: enalbe DHCP Relay on the
interface;
server: enable DHCP Server on the
interface;
proxy:enable DHCP Proxy on the
interface.
After enabling built-in DHCP Relay process, system processes IP address request
sent from DHCP client on the interface and allocate IP address for DHCP Client
dynamically by external DHCP Server configured in the interface.
After enabling built-in DHCP Proxy process, system will process IP address request
sent from DHCP client on the interface, allocate IP address for DHCP Client
dynamically by external DHCP Server configured in the interface and replace the
long lease with short lease to client. When DHCP Client sending continue-to-rent
request, if the long lease allocated by DHCP Server is not timeout, DHCP Proxy will
response DHCP Client directly and won't send continue-to-rent request to external
DHCP Server to relieve the burden of external DHCP Server.
Only one function among system built-in DHCP Server function, DHCP Relay function
and DHCP Proxy function can be run on the same interface.
3. To bind policy to an interface or delete configuration, use the following commands.
4. To configure DHCP user quota on interface or cancel this configuration, use the
following command.
8-7
1 ZXR10(config-if-vlanX)#ip dhcp user quota < limit-value> This configures DHCP user quota
on interface, that is , the maximum
number of DHCP Client on the
interface. <limit-value> DHCP user
quota 1~2048.
The default: no quota.
As for DHCP Server, DHCP user quota is used to limit the max number of DHCP users
on an interface, thus limiting the number of IP addresses assigned on the interface.
As for DHCP Relay, DHCP Relay standard mode doesn't support DHCP user quota,
thus user quota doesn't take effect. But if DHCP Relay is configured forwarding in
safety mode, DHCP Relay will make DHCP user quota configuration valid.
5. To configure the interface select outside DHCP Server policy or cancel this policy, use
the following command.
1 ZXR10(config-if-vlanX)#ip dhcp helper-address policy vclass-id This configures the interface select
outside DHCP Server policy.
The default is to select DHCP Server
in ip dhcp relay server command on
the interface.
2 ZXR10(config-if-vlanX)#no ip dhcp helper-address policy vclass-id This cancels this interface select
outside DHCP Server policy.
7. To enable DHCP log print switch or stop DHCP print function, use the following
command.
8-8
1 ZXR10(config)#ip dhcp snooping binding < mac> vlan < vlan> < ip This adds user binding entry to
address> < interface-number> expiry < 2147483647> binding-database manually.
<mac> user MAC address
<vlan> the VLAN user belongs to,
1~4096input the range.
<ip address> DHCP binding IP
address.
<interface-number> physical
interface numbersuch as fei, gei and
smartgroup.
2 ZXR10(config)#no ip dhcp snooping binding < mac> vlan < vlan> < This deletes user binding entry
ip address> < interface-number> from DHCP SNOOPING binding
database.
2. To delete the entry of DHCP SNOOPING binding table on layer 2 interface manually,
use the following command.
Command Function
ZXR10(config)#ip dhcp snooping clear [ < interface-number> ] This deletes the entry of DHCP
SNOOPING binding table on layer 2
interface manually.
<interface-number> physical interface
numbersuch as fei, gei and smartgroup.
8-9
5. To configure the 82 option format or delete the configured 82 option format and restore
the default format, use the following command.
1 ZXR10(config)#ip dhcp snooping information format { china-tel | This configures 82 option format
dsl-forum} which is inserted when DHCP
SNOOPING is configured,
china-tel: China Telecom 82 option
format.
dsl-forum:DSL forum 82 option
format.
The default is China Telecom 82
option format.
6. To configure the policy of forwarding DHCP data packet 82 option or cancel the policy,
use the following command.
1 ZXR10(config)#ip dhcp snooping information policy { keep | replace} This configures the policy of
forwarding DHCP data packet 82
option.
keep: keep the original 82 option
and transparently transmit.
replace: replace the original 82
option.
8-10
7. To configure DHCP SNOOPING ramble function and allow user to switch on different
ports, use the following command.
8. To configure the interface connects to DHCP SERVER as trust interface, use the
following command.
1 ZXR10(config)#ip dhcp snooping trust < interface-number> This configures DHCP SERVER
interface as trust interface.
<interface-number> physical
interface numbersuch as fei, gei and
smartgroup.
2 ZXR10(config)#no ip dhcp snooping trust < interface-numbe> This cancels DHCP SERVER
interface as trust interface.
9. To enable DHCP SNOOPING on the specific VLAN, use the following command.
1 ZXR10(config)#ip dhcp snooping vlan < vlan> This enables DHCP SNOOPING on
the specific VLAN.
<vlan> the VLAN user belongs to,
1~4094input the range.
2 ZXR10(config)#no ip dhcp snooping vlan < vlan> This cancels DHCP SNOOPING on
the specific VLAN.
8-11
1 ZXR10(config-if-vlanX)#ip dhcp relay agent < ip-address> This configures the DHCP agent ip
address on the interface.
< ip-address> DHCP agent IP
address on the interface, in dotted
decimal notation.
Before enabling DHCP Relay to forward user DHCP request to external DHCP Server,
it is needed to configure IP address of DHCP Agent, which is one of the IP addresses
of interfaces where DHCP Client locates.
External DHCP Server will assign IP address according to IP address of DHCP Agent
to make them in the same subnet. DHCP reply packet returned to DHCP client by
DHCP server is forwarded by DHCP Agent. Therefore, a route pointing to the subnet
where DHCP Agent locates needs to be configured on external DHCP Server.
2. To configure the outside DHCP server ip address on the interface or delete outside
DHCP Server address on the interface, use the following command.
Standard forwarding mode conforms to DHCP standard protocol. After user obtains
corresponding IP address, DHCP process will not process subsequent unicast
interaction any more, such as security inspection. At the same time, writing ARP
table function is invalid for standard mode. Standard forwarding mode performance
will be better for big consumer number because it does not deal with the subsequent
unicast interaction.
Security forwarding mode combines DHCP standard protocol with ZTE patent
technology to control and manage all interaction of DHCP client and outside DHCP
SERVER such as security check. Therefore, DHCP process can work in all DHCP
interaction. At the same time, it supports ARP writing function. System default Relay
forwarding mode is standard forwarding mode.
3. To configure the retry time that DHCP Relay applies from outside DHCP Server or
recover default retry time, use the following command.
8-12
1 ZXR10(config)#ip dhcp relay server retry < limit-values> <limit-value> the retry time that
DHCP Relay applies from outside
DHCP Server. The range is 5~1000.
The value is 10 by default.
2 ZXR10(config)#no ip dhcp relay server retry This recovers default retry time.
4. To configure the specific domain name DHCP CLient applies from outside DHCP
Server, use the following command.
1 ZXR10(config)#ip dhcp relay server vclass-id < domain name> < <domain name> domain name that
ip-address> { standard | security} DHCP Client request packet carries.
<ip-address>outside DHCP Server
ip address, in dotted decimal notation
standard: comply with DHCP
standard protocol forwarding mode
security: ZTE security forwarding
mode.
2 ZXR10(config)#no ip dhcp relay server vclass-id < domain name> < <domain name> domain name that
ip-address> DHCP Client request packet carries.
<ip-address>outside DHCP Server
ip address, in dotted decimal notation
1 ZXR10(config)#ip dhcp relay forward reply unrestricted This configurse unrestricted DHCP
user message on DHCP Relay
standard mode.
2 ZXR10(config)#no ip dhcp relay forward reply unrestricted This restricts DHCP user message
and recovers default mode.
DHCP client continuous rent is launched by DHCP client. For that DHCP client
does not send continuous rent message, if can receive ACK message that DHCP
Server response to client, it is taken for granted that DHCP client is on-line and send
transparently this message to client.
6. To configure the insert 82 option when the DHCP process is in relay forwarding or
cancel the insert of 82 option, use the following command.
8-13
1 ZXR10(config)#ip dhcp relay information option This configures the insert 82 option
when the DHCP process is in relay
forwarding.
The default: 82 option is not inserted.
2 ZXR10(config)#no ip dhcp relay information option This cancels the insert 82 option.
7. To configure the DHCP process when the insert 82 option has been configured in the
DHCP process in relay forwarding data and host should configure the insert 82 option
or delete configured 82 option handle policy, use the following command.
1 ZXR10(config)#ip dhcp relay information policy { keep | replace} keep: keep the original 82 option
and transparently transmit.
replace: replace the original 82
option.
The default is to keep the original 82
option and transparently transmit.
8. To configure DHCP client server-id that DHCP Relay responses or cancel DHCP client
server-id that DHCP Relay responses, use the following command.
1 ZXR10(config)#ip dhcp relay security client server-id < ip-address> This configures DHCP client
server-id that DHCP Relay response.
<ip-address> server-id ip addressin
dotted decimal notation.
2 ZXR10(config)#no ip dhcp relay security client server-id This cancels DHCP client server-id
that DHCP Relay responses.
1 ZXR10(config)#ip dhcp relay snooping enable This enables DHCP Relay Snooping.
DHCP Relay Snooping is disabled
by default.
2 ZXR10(config)#no ip dhcp relay snooping enable This cancels DHCP Relay Snooping
function.
10. To enable DHCP network packet that all reply on the interface, use the following
command.
8-14
1 ZXR10(config-if-vlanX)#ip dhcp relay snooping packet reply This enables DHCP network packet
that all reply on the interface.
2 ZXR10(config-if-vlanX)#no ip dhcp relay snooping packet reply This command disables DHCP
network packet that all reply on the
interface.
11. To enable DHCP network packet that all request on the interface, use the following
command.
1 ZXR10(config-if-vlanX)#ip dhcp relay snooping packet request This enables DHCP network packet
that all request on the interface.
2 ZXR10(config-if-vlanX)#no ip dhcp relay snooping packet request This disables DHCP network packet
that all request on the interface.
12. To enable the interface as DHCP Relay trust or disable the interface as DHCP Relay
trust, use the following command.
1 ZXR10(config-if-vlanX)#ip dhcp relay snooping trust This enables the interface as DHCP
Relay trust.
2 ZXR10(config-if-vlanX)#no ip dhcp relay snooping trust This disables the interface as DHCP
Relay trust.
13. To enable DHCP Relay Snooping Trust or disable DHCP Relay Snooping Trust, use
the following command.
1 ZXR10(config)#ip dhcp relay snooping trust enable This enables DHCP Relay Snooping
Trust.
2 ZXR10(config)#no ip dhcp relay snooping trust enable This disables DHCP Relay Snooping
function.
Command Function
ZXR10(config-if-vlanX)#ip dhcp client class-id { WORD | hex} This enables class-id of dhcp client on
the interface.
8-15
3. To configure hostname of dhcp client on the interface, use the following command.
Command Function
ZXR10(config-if-vlanX)#ip dhcp client hostname WORD This configures hostname of dhcp client
on the interface.
4. To configure lease information of dhcp client on the interface, use the following
command.
Command Function
ZXR10(config-if-vlanX)#ip dhcp client lease { 0-365 | infinite } This configures lease information of
dhcp client on the interface.
5. To configure request information of dhcp client on the interface, use the following
command.
Command Function
8-16
R1 configuration:
ZXR10(config)#interface vlan 10
ZXR10(config-if-vlan10)#ip dhcp mode server
ZXR10(config-if-vlan10)#ip address 10.10.1.1 255.255.255.0
ZXR10(config-if-vlan10)#exit
ZXR10(config)#ip pool pool1
ZXR10(config-ip-pool)#range 10.10.1.10 10.10.1.100 255.255.255.0
ZXR10(config-ip-pool)#exit
ZXR10(config)#ip dhcp pool dhcp1
ZXR10(config-dhcp-pool)#ip-pool pool1
ZXR10(config-dhcp-pool)#exit
ZXR10(config)#ip dhcp policy p1 1
ZXR10(config-dhcp-policy)#dhcp-pool dhcp1
ZXR10(config-dhcp-policy)#default-route 10.10.1.1
ZXR10(config-dhcp-policy)#exit
ZXR10(config)#interface vlan 10
ZXR10(config-if-vlan10)#ip dhcp policy p1
ZXR10(config)#ip dhcp enable
8-17
R1 configuration:
ZXR10(config)#interface vlan10
ZXR10(config-if-vlan10)#ip dhcp mode relay
ZXR10(config-if-vlan10)#ip address 10.10.1.1 255.255.255.0
ZXR10(config-if-vlan10)#ip dhcp relay agent 10.10.1.1
ZXR10(config-if-vlan10)#ip dhcp relay server 10.10.2.2
ZXR10(config-if-vlan10)#exit
ZXR10(config)#ip dhcp enable
8-18
the user, it is illegal DHCP server. Both ports gei_1/1 and gei_1/2 are in vlan 100. Enable
the DHCP snooping function in the switch can prevent set illusive DHCP server.
Now it is needed to enable DHCP Snooping function in vlan 100 and configure the interface
gei_1/1 be trust interface. This is shown in Figure 8-3.
R1 configuration:
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#switch access vlan 100
ZXR10(config-gei_1/1)#exit
ZXR10(config)#interface gei_1/2
ZXR10(config-gei_1/2)#switch access vlan 100
ZXR10(config-gei_1/2)#exit
ZXR10(config)#ip dhcp snooping enable
ZXR10(config)#ip dhcp snooping vlan 100
ZXR10(config)#ip dhcp snooping trust gei_1/1
8-19
R1 configuration:
ZXR10(config)#ip dhcp snooping enable
ZXR10(config)#ip dhcp snooping vlan 100
ZXR10(config)#vlan 100
ZXR10(config-vlan100)#ip arp inspection
8-20
8-21
8-22
These routers can be configured into multiple groups for mutual backup. The hosts in the
domain use different IP addresses as gateway to implement data load balance.
Command Function
9-1
This configures multiple virtual addresses in a VRRP group and the linked host can
use any address as gateway for communication.
2. To configure VRRP priority on the interface, use the following command.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> prirority < priority> This configures VRRP priority on the
interface.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> preempt [ delay < milliseconds> To configure whether preemption is
] enabled on the interface, use the
following command.
4. To configure the time interval for sending VRRP notifications on the interface, use the
following command.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> advertise [ msec] < interval> This configures the time interval for
sending VRRP notifications on the
interface.
5. To configure how to learn about the time interval for sending VRRP packets on the
interface, use the following command.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> learn This configures how to learn about the
time interval for sending VRRP packets
on the interface.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> authentication < string> This configures authentication character
string on the interface.
7. To configure VRRP up-flow link track function, use the following command.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> track < track-num> [ This configures VRRP up-flow link track
decrement< priority> ] function.
9-2
Command Function
ZXR10(config-if-vlanX)#vrrp < group> mode { private | standard} This configures the mode of virtual
device
9. To configure virtual device vrrp protocol message out-interface, use the following
command.
Command Function
ZXR10(config-if-vlanX)#vrrp < group> out-interface < interfacename> This configures virtual device vrrp
protocol message out-interface.
R1 configuration:
ZXR10_R1(config)#interface vlan 1
ZXR10_R1(config-if-vlan1)#ip address 10.0.0.1 255.255.0.0
9-3
ZXR10_R1(config-if-vlan1)#vrrp 1 ip 10.0.0.1
R2 configuration:
ZXR10_R2(config)#interface vlan 1
ZXR10_R2(config-if-vlan1)#ip address 10.0.0.2 255.255.0.0
ZXR10_R2(config-if-vlan1)#vrrp 1 ip 10.0.0.1
R1 configuration:
ZXR10_R1(config)#interface vlan 1
ZXR10_R1(config-if-vlan1)#ip address 10.0.0.1 255.255.0.0
ZXR10_R1(config-if-vlan1)#vrrp 1 ip 10.0.0.1
ZXR10_R1(config-if-vlan1)#vrrp 2 ip 10.0.0.2
R2 configuration:
ZXR10_R2(config)#interface vlan 1
ZXR10_R2(config-if-vlan1)#ip address 10.0.0.2 255.255.0.0
ZXR10_R2(config-if-vlan1)#vrrp 1 ip 10.0.0.1
ZXR10_R2(config-if-vlan1)#vrrp 2 ip 10.0.0.2
9-4
9-5
9-6
10-1
priority and access control list of the user. Once the user passes authentication, the
authentication server delivers user-related information to the authentication system
which creates a dynamic access control list. The above parameters are used to
measure subsequent traffic of the user. Authentication server and RADIUS server
communicate with each other through the RADIUS protocol.
Command Function
ZXR10(config-nas)#create aaa < rule-id> [ port < port-name> ] [ vlan This creates an AAA control entry.
< vlan-id> ]
Command Function
Command Function
ZXR10(config-nas)#aaa < rule-id> control { dot1x| dot1x-relay} { enable| This enables/disables dot1x
disable} authentication or trunk.
Command Function
ZXR10(config-nas)#aaa < rule-id> authentication { local| radius} This selects an authentication mode.
Command Function
ZXR10(config-nas)#aaa < rule-id> protocol { pap| chap| eap} This selects an authentication protocol.
Command Function
ZXR10(config-nas)#aaa < rule-id> keepalive { enable [ period < This configures the keepalive interval.
period-value > ] | disable}
10-2
Command Function
ZXR10(config-nas)#aaa < rule-id> accounting { enable| disable} This configures whether to enable
accounting.
8. To configure whether multiple users are allowed and limitation on the number of users,
use the following command.
Command Function
ZXR10(config-nas)#aaa < rule-id> multiple-hosts { enable [ max-hosts This configures whether multiple users
< host-number> ] | disable} are allowed and limitation on the
number of users.
9. To configure the default ISP server name, use the following command.
Command Function
ZXR10(config-nas)#aaa < rule-id> default-isp < isp-name> This configures the default ISP server
name.
10. To configure whether to conduct full name accounting, use the following command.
Command Function
ZXR10(config-nas)#aaa < rule-id> fullaccount { enable| disable} This configures whether to conduct full
name accounting.
Command Function
ZXR10(config-nas)#aaa < rule-id> groupname < group-name> This configures a group name.
12. To bind an AAA control entry with the radius server group, use the following command.
Command Function
ZXR10(config-nas)#aaa < rule-id> radius-server authentication< This binds an AAA control entry with
group-number > the radius server group.
13. To configure binding radius accounting server group, use the following command.
Command Function
ZXR10(config-nas)#aaa < rule-id> radius-server accounting < This configures binding radius
group-number > accounting server group.
14. To configure authentication mode as local or radius server mode, use the following
command.
10-3
Command Function
ZXR10(config-nas)#aaa < rule-id> authentication { local| radius} This configures authentication mode as
local or radius server mode.
Command Function
ZXR10(config-nas)#aaa < rule-id> authorization { auto| unauthorized| This configures authorization mode.
authorized}
Command Function
ZXR10(config-nas)#dot1x re-authentication { enable [ period < period This configures dot1x period for
> ] | disable} re-authentication.
2. To configure the quiet period of dot1x authentication, use the following command.
Command Function
ZXR10(config-nas)#dot1x quiet-period < period > This configures the quiet period of
dot1x authentication.
3. To configure the sending period of dot1x authentication, use the following command.
Command Function
Command Function
5. To configure dot1x authentication server timeout time, use the following command.
Command Function
10-4
6. To configure the maximum times of requests for dot1x client, use the following
command.
Command Function
Command Function
ZXR10(config-nas)#create localuser < user-id> [ name < user-name> ] [ This creates a local user.
password < user-password> ]
Command Function
3. To bind the user with the port, use the following command.
Command Function
ZXR10(config-nas)#localuser < user-id> port < port-name> This binds the user with the port.
4. To bind the user with the VLAN, use the following command.
Command Function
ZXR10(config-nas)#localuser < user-id> vlan < vlan-id> This binds the user with the VLAN.
5. To bind the user with the MAC address, use the following command.
Command Function
ZXR10(config-nas)#localuser < user-id> mac < mac-address> This binds the user with the MAC
address.
6. To configure whether to charge the local user, use the following command.
Command Function
ZXR10(config-nas)#localuser < user-id> accounting { enable| disable} This configures whether to charge the
local user.
10-5
Command Function
ZXR10(config-nas)#show clients [ device < device-number> | index < This displays all dot1x authentication
client-index> | mac < mac-address> | port < port-name> | vlan < vlan-id> ] users.
Command Function
ZXR10(config-nas)#clear client [ index < client-index> | port < port-name> This deletes a specific user.
| vlan < vlan-id> ]
Command Function
Command Function
Command Function
Command Function
10-6
Command Function
Command Function
Command Function
Command Function
Command Function
ZXR10(config-nas)#aaa < rule-id> default-isp < isp-name> [ default ] This configures ISP name in rule.
ZXR10(config-nas)#no aaa < rule-id> default-isp [ < isp-name> ] This deletes ISP name in rule.
Command Function
ZXR10(config-nas)#no aaa < rule-id> domaindelimiter This cancels domain separator in rule.
10-7
Command Function
10-8
sending, and packets can be resent for five times at most. Direct the system to remove
the user domain name from the user name and then send it to the RADIUS server.
Switch configuration:
ZXR10(config)#radius authentication-group 1
ZXR10(config-authgrp-1)#server 1 10.1.1.1 key aaazte port
<auth server port num >
ZXR10(config-authgrp-1)#server 2 10.1.1.2 key aaazte port
<auth server port num >
ZXR10(config-authgrp-1)#exit
ZXR10(config)#radius accounting-group 1
ZXR10(config-acctgrp-1)#server 1 10.1.1.1 key aaazte port
<acct server port num >
ZXR10(config-acctgrp-1)#server 2 10.1.1.2 key aaazte port
<acct server port num >
ZXR10(config-acctgrp-1)#exit
ZXR10(config)# nas
ZXR10(config-nas)#dot1x re-authentication enable period 5
ZXR10(config-nas)#dot1x max-request 5
ZXR10(config-nas)#create aaa 1 port gei_1/1
ZXR10(config-nas)#aaa 1 authentication radius
ZXR10(config-nas)#aaa 1 control dot1x enable
ZXR10(config-nas)#aaa 1 authorization auto
ZXR10(config-nas)#aaa 1 accounting enable
ZXR10(config-nas)#aaa 1 multiple-hosts enable
ZXR10(config-nas)#aaa 1 default-isp zte163.net
ZXR10(config-nas)#aaa 1 fullaccount disable
ZXR10(config-nas)#aaa 1 radius-server authentication 1
ZXR10(config-nas)#aaa 1 radius-server accounting 1
ZXR10(config-nas)#aaa 1 authen radius
10-9
The criteria is that Internet resources can only be accessed through the authentication host
and only enterprise network resources can be accessed by other hosts.
l Divide the hosts in the enterprise into a sub-network (or multiple sub-networks), where
the hosts can access each other.
l Enable the 802.1X trunk function on the Ethernet switch inside the sub-network and
enable 802.1X authentication on the Ethernet port of the sub-network gateway.
l Do not charge users inside the enterprise, and only authenticate them on the Radius
server. The master/slave authentication servers are 10.1.1.1/10.1.1.2 respectively. It
is assumed that the enterprise uses the 2826E Ethernet switch inside it and gateway
uses the ZXR10 5900.
2826E configuration:
10-10
In the above configuration, the local authentication function on the ZXR10 5900 is enabled
to implement the application requirement of the enterprise. According to the above
configuration, only 00d0.d0d0.1234, 00d0.d0d0.1456 and 00d0.d0d0.1689 network card
addresses can be accessed and the Internet access duration of these three users, named
as A0001, A0002 and A0003, is summed up. The duration is recorded on the Radius
server.
10-11
10-12
11-1
11-2
Note:
In this example, vlan1 which enables VBAS should include at least two interfaces, one
connection user and another BRAS enquipment. In this example gei_1/1 is used to
connect BRAS equipment.
11-3
11-4
Command Function
2. To set the max preview counts on global, use the following command.
Command Function
ZXR10(config-nas)#iptv control prvcount count This sets the max preview counts on
global.
3. To set the least preview interval on global, use the following command.
Command Function
12-1
4. To set the max preview time on global, use the following command.
Command Function
5. To set the period of global reset preview counts, use the following command.
Command Function
ZXR10(config-nas)#iptv control prvcount reset-period This sets the period of global reset
preview counts.
Command Function
Command Function
ZXR10(config)#create iptv channel [ general < 256> | special < 0-255> ] This creates channels of IPTV.
Channel number is 0~256. 0~255 are special channels. Each channel must designate
a multicast address. 256 is general channel and needn't to designate multicast
address.
2. To set the name of a channel, use the following command.
Command Function
ZXR10(config)#iptv channel < 0-256> name This sets the name of a channel.
Command Function
Command Function
12-2
Command Function
Command Function
ZXR10(config)#iptv cac-rule < 1-256> name This sets the name of CAC rule.
Command Function
ZXR10(config)#iptv cac-rule < 1-256> prvcount This sets maximum preview counts of
rules. The default is global maximum
preview count.
Command Function
ZXR10(config)#iptv cac-rule < 1-256> prvtime This sets maximum preview time of
rules. The default is global maximum
preview time.
5. To set the least preview interval of rules, use the following command.
Command Function
ZXR10(config)#iptv cac-rule < 1-256> prvinterval This sets the least preview interval
of rules. The default is global least
preview interval.
Command Function
ZXR10(config)#iptv cac-rule < 1-256> right This sets the right rule to channel.
Command Function
12-3
2. User which connects to port gei_1/1 in Vlan 1 is the preview user of multicast group
224.1.1.1. Max preview time is 2 minutes. Least preview interval is for 20 seconds.
Max preview counts are 10. Vlan ID of multicast group is 100. Configuration is shown
below:
ZXR10(config-nas)# iptv control enable
ZXR10(config-nas)# create iptv channel special 1 address 224.1.1.1
ZXR10(config-nas)# iptv channel 1 mvlan 100
ZXR10(config-nas)# iptv channel 1 name cctv1
ZXR10(config-nas)# create iptv cac-rule 1 port gei_1/1 vlan 1
ZXR10(config-nas)# iptv cac-rule 1 prvcount 10
ZXR10(config-nas)# iptv cac-rule 1 prvtime 120
ZXR10(config-nas)# iptv cac-rule 1 prvinterval 20
ZXR10(config-nas)# iptv cac-rule 1 right preview 1
3. User which connects to port gei_1/1 wants to view all multicast groups in Vlan 100.
Configuration is shown below:
ZXR10(config-nas)# iptv control enable
ZXR10(config-nas)# create iptv channel general 256
ZXR10(config-nas)# iptv channel 256 mvlan 100
ZXR10(config-nas)# create iptv cac-rule 1 port gei_1/1
ZXR10(config-nas)# iptv cac-rule 1 right order 256
4. Port gei_1/1 only permits receiving the requesting packets of multicast group
224.1.1.1. Vlan ID of this multicast group is 100. Configuration is shown below:
ZXR10(config-nas)# iptv control enable
ZXR10(config-nas)# create iptv channel special 1 address 224.1.1.1
ZXR10(config-nas)# iptv channel 1 mvlan 100
12-4
show iptv client [ { port< portno> | vlan < vlanid> | device < devno> } ]
12-5
12-6
Command Function
ZXR10(config)#rmon collection statistics < index> [ owner < string> ] This defines a time server. Priority must
be selected. Each server priority is
different and the range is 1~5; Version
is option , the range is 1~3 , the default
is 3. Key is valid when authentication
is enabled and option; Lock/unlock is
used to configure if server is locked and
option.
13-1
Command Function
3. To configure the source address used by the NTP in the process of sending a
synchronization time request, use the following command.
Command Function
Command Function
Command Function
ZXR10 Configuration:
ZXR10(config)#interface vlan24
ZXR10(config-if-vlan24)#ip address 192.168.2.2 255.255.255.0
ZXR10(config-if-vlan24)#exit
ZXR10(config)#ntp enable
13-2
Command Function
Command Function
13-3
8 ZXR10(config-authgrp-1)#server < ipaddress> key < keystr> port This configures radius server and its
< portnum> parameter.
Command Function
ZXR10#debug radius { accounting { event| error| data | packet < This displays RADIUS debugging
group-number| all> } | authentication { event| error| data | packet < information.
group-number| all> } | user user-nam| all| exception}
ZXR10#show accounting local-buffer { group group-number| name This displays the content of accounting
radiusname| session session-id| user user-name| sum| all} packets in local buffer.
ZXR10#clear accounting local-buffer [ group number | all] This clears the content of accounting
packets in local buffer.
ZXR10(config)#radius accounting-group 1
ZXR10(config-acct-group-1)#algorithm round-robin
ZXR10(config-acct-group-1)#calling-station-format 2
ZXR10(config-acct-group-1)#deadtime 5
13-4
ZXR10(config-acct-group-1)#local-buffer enable
ZXR10(config-acct-group-1)#max-retries 5
ZXR10(config-acct-group-1)#nas-ip-address 10.1.1.4
ZXR10(config-acct-group-1)#server 1 10.2.1.3 key uas
ZXR10(config-acct-group-1)#server 2 12.1.2.3 key uas
ZXR10(config-acct-group-1)#timeout 10
Command Function
ZXR10(config)#snmp-server community < community-name> [ view < This sets the SNMP packet community.
view-name> ] [ ro| rw]
Both read-only and read-write are limited by the view. Operations can only be
conducted in the permitted view range. If parameter view is omitted use default view
and use parameter ro if ro/rw are omitted.
2. To define a SNMPv2 view, use the following command.
Command Function
ZXR10(config)#snmp-server view < view-name> < subtree-id> { included| This defines a SNMPv2 view.
excluded}
13-5
3. To set the system handler contract mode (SysContact) of the MIB object, use the
following command.
Command Function
ZXR10(config)#snmp-server contact < mib-syscontact-text> This sets the system handler contract
mode (SysContact) of the MIB object.
SysContact is a management variable of the system group in the MIB II and it records
ID and contact mode of the relevant personnel of the managed equipment.
4. To set the location (SysLocation) of the MIB object, use the following command.
Command Function
SysLocation is a management variable of the system group in the MIB II and is used
to indicate the location of the managed equipment.
5. To set the types of TRAP allowed for sending, use the following command.
Command Function
ZXR10(config)#snmp-server enable trap [ < notification-type> ] This sets the types of TRAP allowed for
sending.
Command Function
ZXR10(config)#snmp-server host [ mng] < ip-address> [ trap| inform] [ This sets the TRAP destination host.
version { 1| 2c| 3 { auth| noauth| priv} } ] < community-name> [ udp-port <
udp-port> ] [ …< trap-type> ]
ZXR10 5900 supports five kinds of ordinary traps: SNMP, bgp, OSPF, RMON and
stalarm.
7. To use ACL to control the host that can access the switches through SNMP protocol,
use the following command.
Command Function
ZXR10(config)#snmp-server access-list < acl-number> This uses ACL to control the host that
can access the switches through SNMP
protocol.
13-6
Command Function
ZXR10(config)#snmp-server context < context name > This defines context name of SNMP.
Command Function
10. To configure safe mode group of user, use the following command.
Command Function
ZXR10(config)#snmp-server group < groupname> v3 { auth| noauth| priv} This configures safe mode group of
[ context < context-name> match-prefix| match-exact ] [ read < readview> ] user.
[ write < writeview> ] [ notify < notifyview> ]
11. To set the maximum packet size of SNMP, use the following command.
Command Function
ZXR10(config)#snmp-server packetsize < 484-1400> This sest the maximum packet size of
SNMP.
Command Function
13. To configure the users which are allowed to access SNMP engine, use the following
command.
Command Function
ZXR10(config)#snmp-server user < username> < groupname> v3 This configures the users which are
[ encrypted] [ auth { md5| sha} < auth-password> [ priv des56 < allowed to access SNMP engine.
priv-password> ] ]
Command Function
13-7
Command Function
Command Function
Command Function
Command Function
13-8
Command Function
ZXR10(config-gei_1/x)#rmon collection statistics < index> [ owner < This enables the interface statistics
string> ] function (only for Ethernet) .
Command Function
ZXR10(config)#rmon alarm < index> < variable> < interval> { delta| This sets an alarm and MIB object.
absolute} rising-thershold < value> [ < event-index> ] falling-threshold <
value> [ < event-index> ] [ owner < string> ]
3. To enable the history collection function of the interface, use the following command.
Command Function
ZXR10(config-gei_1/x)#rmon collection history < index> [ owner < This enables the history collection
string> ] [ buckets < bucket-number> ] [ interval < seconds> ] function of the interface.
Command Function
ZXR10(config)#rmon event < index> [ log] [ trap < community> ] [ This configures an event.
description < string> ] [ owner < string> ]
5. To display RMON configuration and relevant information, use the following command.
Command Function
ZXR10(config)#show rmon [ alarms] [ events] [ history] [ statistics] This displays RMON configuration and
relevant information.
Assume that n computers are linked to the port gei_1/1 and when these computers
communicate on the sub-network. We can view traffic statistics data through NMS
software and view RMON statistics information with the show command.
ZXR10#show rmon statistics
13-9
13-10
Configure an alarm control entry and wait for 10s, and then view RMON event contents
with the show command.
ZXR10#show rmon event
Event 1 is active, owned by rmontest
Description is test
Event firing causes log and trap to community rmontrap,
last fired 05:40:20
Current log entries:
index time description
1 05:40:14 test
ZXR10#
Command Function
Command Function
ZXR10(config)#logging buffer < buffer-size> This sets the log buffer size.
13-11
Command Function
ZXR10(config)#logging mode < mode> [ < interval> ] This sets log clearance mode.
4. To set the log level displayed on the console interface of telnet interface, use the
following command.
Command Function
ZXR10(config)#logging console < level> [ filter map-name] This sets the log level displayed on the
console interface of telnet interface.
5. To set the log level saved in log buffer, use the following command.
Command Function
ZXR10(config)#logging level < level> This sets the log level saved in log
buffer.
6. To set the background FTP log server parameter, use the following command.
Command Function
ZXR10(config)#logging ftp < level> [ mng] < ftp-server> < username> This sets the background FTP log
< password> [ < filename> ] server parameter.
7. To set parameters of alarm information which is sent to trap server, use the following
command.
Command Function
ZXR10(config)#logging trap < level> < community> [ mng] < host-address> This sets parameters of alarm
information which is sent to trap server.
8. To set parameters to pack information in alarm buffer to file and send it to ftp server,
use the following command.
Command Function
ZXR10(config)#logging filesavetime { everyday < hh:mm:ss> | interval This sets parameters to pack
< hh:mm:ss> | month < monthday> < hh:mmm:ss> | week < weekday> < information in alarm buffer to file and
hh:mm:ss> } [ mng] < ftp sever> < username> < password> < alarm file prefix> send it to ftp server.
Command Function
ZXR10(config)#syslog-server host < ip-address> [ fport < fport> ] [ lport < This sets background syslog server
lport> ] [ alarmlog| alarmlog| alarmlog] parameters.
13-12
Command Function
ZXR10(config)#show logging alarm { [ typeid < type> ] [ start-date < This displays log information.
date> ] [ end-date < date> ] [ level < level> ] }
Now, the supported alarm information types contain ENVIROMENT, BOARD, PORT,
ROS, DATABASE, OAM, SECURITY, OSPF, RIP, BGP, DRP, TCP-UDP, IP, IGMP,
TELNET, ARP, ISIS, ICMP, SNMP and RMON.
11. To save alarm logging information in location flash: data/log.dat, use the following
command.
Command Function
Command Function
Command Function
ZXR10(config)#logging on
ZXR10(config)#logging buffer 100
ZXR10(config)#logging mode FULLCLEAR
ZXR10(config)#logging console warnings
ZXR10(config)#logging level errors
ZXR10(config)#logging ftp notificational 168.1.70.100
target target zxralarm.log
ZXR10(config)# syslog-server host 192.168.0.100
13-13
Command Function
Command Function
Command Function
ZXR10(config-sg)#server < ip-addr> [ port < 1025~65535> ] This configures TACACS+ server group
member.
13-14
Parameter Description
Command Function
ZXR10(config)#tacacs-client < ip-addr> [ port < 1025~65535> This configures Tacacs+ client IP
address which is used to communicate
with Tacacs+ server. Configuration is
deleted with no command.
Parameter Description
<ip-addr> Client IP
Command Function
ZXR10(config)#tacacs-server host < ip-addr> [ port < integer> ] [ timeout This configures TACACS server
< integer> ] [ key < string> ] parameter. Configuration is deleted
with no command.
Parameter Description
port Port number for TCP connection. The default value is 49.
key Encryption key between NAS and TACACS+ server. The configuration here
will invalidate the global configuration.
6. To configure global TACACS+ protocol encryption key, use the following command.
13-15
Command Function
Parameter Description
<key> Encryption key used in exchanging packets between NAS and server.
Length: 1~63 characters (without space). The key defined in the server
must be same as this one.
Command Function
Parameter Description
8. To configure connection timeout for TACACS+ server, use the following command.
Command Function
Parameter Description
13-16
Command Function
ZXR10(config)#aaa group server tacacs+ < group-name> This enters into AAA server group
configuration mode. Server group
configuration is deleted with no
command.
Parameter Description
13-17
13-18
14-1
If an independent device enables stack it is stack system itself and the main device is itself.
If two stack systems can be combined together an independent switch can be added into
an existing stack system to increase the member number of this stack system.
If a stack member in the stack system is replaced by the switch with the same model and
the member ID of this switch is same as that of the original stack member, this switch
will implement the same configuration that is same as the configuration of replaced stack
member.
When two running stack systems combine together, a main device will be selected from the
two main devices for the reason that the two stack systems have their own main devices.
The selection rule is same as the one that the main device is selected from stack members.
The main device selected again and roles and configuration of all stack members in which
the main device is. All members of the stack system which fails in selection will restart and
join this stack system. During this joining process, these switch member IDs will possibly
be allocated again. After joining, they will implement the configuration of the main device
selected again.
If neither original main device nor original standby device is in the separate stack system
all members of this stack system will restart. In addition, because the configuration of each
stack system is same IP address will be in collision. IP address of the new stack system
need to be modified. If the stack system is not be divided intentionally the operation is as
follows:
1. Turn off powers of all switches in the new stack system.
2. Connect these switches with the original stack system.
3. Open the power of these switches.
When all switches in the stack system are opened or stack system is reset, only some
stack members can join main device election. If stack member start time gap is in 15s it
14-2
can join the main device election. Otherwise the device only can become stack member.
All stack members can join the process of main device renewed election.
When the main device has been elected and the original main device has joined stack
system again, the original main device can not be the current main device again but
member device.
14-3
It is recommended that the priority of the device with the highest software version is
configured the highest. Therefore it can be the main device and other member devices
can automatically upgrades the latest software.
Reference Information
1. The function of enabling MAC switching.
In stack system, the MAC address of main device is that of whole system. When main
device leaves, standby device will be the main device. Meanwhile, its MAC address
will replace MAC address of original main device to be that of the whole system. Now a
14-4
nvram stack-machine-id 1
Command Function
14-5
14-6
There is only one command switch in a cluster. Command switch can collect equipment
topology and establish a cluster automatically. After the cluster is established, command
switch provides a management channel for cluster to manage member switch. Member
switch serves as a candidate switch before being added into cluster. Switch which does
not support cluster management is called independent switch.
15-1
Switching rule of four types switches in the cluster is shown in Figure 15-2.
15-2
Command Function
2. To configure time interval of transmitting ZDP packets, use the following command.
Command Function
3. To configure the valid holding time of ZDP information, use the following command.
Command Function
ZXR10(config)#zdp holdtime < time> This configures the valid holding time
of ZDP information.
15-3
Command Function
2. To conduct ZTP topology collection on different VLANs, use the following command.
Command Function
3. To set the hops of ZTP topology collection, use the following command.
Command Function
ZXR10(config)#ztp hop < number> This sets the hops of ZTP topology
collection.
4. To set each hop delay in sending ZTP protocol packets, use the following command.
Command Function
ZXR10(config)#ztp hop-delay < time> This sets each hop delay in sending
ZTP protocol packets.
5. To set delay in sending ZTP protocol packets on the port, use the following command.
Command Function
ZXR10(config)#ztp port-delay < time> This sets delay in sending ZTP protocol
packets on the port.
Command Function
7. To set ZTP timing topology collection time, use the following command.
Command Function
15-4
Command Function
ZXR10(config)#group switch-type { candidate | independent | (commander This sets the switch to command,
[ (ip-pool < ip_addr> ( { mask < ip_addr> | length < mask_len> } ] ) } candidate or independent switch and
allocates an IP address pool to cluster.
Command Function
ZXR10(config)#group name < name > This changes the cluster name.
Command Function
ZXR10(config)#group handtime < time> This sets the cluster handshake time.
4. To set the holding time between the member and command switch on the command
switch, use the following command.
Command Function
ZXR10(config)#group holdtime < time> This sets the holding time between the
member and command switch on the
command switch.
Command Function
ZXR10(config)#group member { ( ( mac < mac_addr> ) [ member < This adds a specific equipment or MAC
mem_id> ] ) | ( device < device_id> ) } address as a member on the command
switch.
Command Function
ZXR10(config)#group reset-member { all | < member_id> } This restarts the member on the
command switch.
2. To save the member on the command switch, use the following command.
15-5
Command Function
ZXR10(config)#group save-member { all | < member_id> } This saves the configuration for member
on the command switch.
3. To delete the member configuration file from the command switch, use the following
command.
Command Function
ZXR10(config)#group erase-member { all | < member_id> } This deletes the member configuration
file from the command switch.
4. To configure the tftp server on the cluster, use the following command.
Command Function
ZXR10(config)#group tftp-server < ip_addr> This configures the tftp server on the
cluster.
5. To configure the alarm receiver on the cluster, use the following command.
Command Function
15-6
6. Log in to Member 1 with the rlogin member 1 command in the privilege mode, and log
in from Member 1 to the command switch with the rlogin commander command on
DUT A.
show ztp
3. To display cluster configuration information, use the following command.
show group
4. To display ZDP neighbor, use the following command.
show zdp neighbour [ interface < interface> | mac < mac-address> ]
15-7
15-8
16-1
IP Source Guard based on IP address is configured on the gei_1/2 interface mode. After
getting IP address dynamically, PC can only pass the data packet with source IP address
that is distributed by DHCP server.
Configuration of R1:
ZXR10(config)#ip dhcp snooping enable
ZXR10(config)#ip dhcp snooping vlan 100
ZXR10(config)#ip dhcp snooping trust gei_1/1
XR10(config)#interface gei_1/2
ZXR10(config-gei_1/2)#ip dhcp snnoping ip-source-guard ip-base
IP Source Guard based on MAC address is configured on the gei_1/2 interface mode.
Afer getting IP address dynamically, PC can only pass the data packet with source MAC
address that is local host NIC card.
Configuration of R1:
16-2
IP Source Guard based on MAC address is configured on the gei_1/2 interface mode.
After getting IP address dynamically, PC can only pass the data packet with source MAC
address that is local host NIC card and source IP address that is distributed by DHCP
server.
Configuration of R1:
ZXR10(config)#ip dhcp snooping enable
ZXR10(config)#ip dhcp snooping vlan 100
ZXR10(config)#ip dhcp snooping trust gei_1/1
ZXR10(config)#interface gei_1/2
ZXR10(config-if)#ip dhcp snnoping ip-source-guard mac-ip-base
According to known or predictable attack and virus on the switch, we can take many
kinds of measures to make switch have self-protection and safeguarding network security
capability. The main function of control plane security is to monitor the packet uploading
rate, generate alarm on abnormal rate uploading packet and remind network manager to
pay attention to possible packet attack to CPU. So that network manager can decide if
discard this packet on the interface or limit speed and filter unreasonable packet.
16-3
Command Function
Command Function
Command Function
ZXR10(config-gei_1/x)#protocol-protect alarm mode < protocol name> < This configures a certain protocol
alarm-limit > packet alarm threshold as 30s.
The alarm-limit range is 1000-18000.
This command is also configured in the interface mode. It is used to modify a certain
protocol packet alarm threshold in a certain physical port. When the number of specific
protocol packet exceeds this threshold in 30s, an alarm message is sent to user. The
default value is 3000.
4. To configure protocol packet passing peak/average speed, use the following
command.
Command Function
16-4
Command Function
This command is used to configure a certain port type which is uni or nni. The default
is nni.
The above commands supporting protocol includes:
pim igmp icmp arpreply arprequest udld, group mng vbase lldp, dhcp lacp bpdu snmp,
na ns ra rs.
Note:
The discard of some protocol packets will make the corresponding service invalid.
2. This example shows how to configure icmp protocol packet passing peak/average
speed.
Zxr10#conf t
Zxr10(config)#inter gei_1/1
Zxr10(config-gei_1/1)# protocol-protect peak-rate mode icmp 500
Zxr10(config-gei_1/1)# protocol-protocol average-mode mode icmp 250
16-5
1 ZXR10(config)#show protocol-protect packet-config < interfacename> This views a certain port type and
the protocol packet configuration
and receiving statistics on this port.
3 ZXR10#clear protocol-protect { packets-count | buckets-count} < This clears protocol statistic count
interfacename> on a certain port.
A/B/C are in the same broadcast domain, that is, the same network segment. When A
and B communicates with each other, ARP packet is sent first, which can be learned by
C. If C acts as man-in-the-middle to do malicious scanning, only sends free ARP to A to
inform that IP corresponding MAC address of B has been updated to that of C, the flow
from A to B is directly forwarded to C; Based on the same principle the flow from B to A can
be forwarded to C. After doing malicious scanning on packet, C modifies the destination
address as the real MAC address of B or A and return the packet to switch. The flow
16-6
between A and B can be forwarded normally and not be perceived. So that C completes
man-in-the-middle attack.
To avoid this bug, all ARP packets should be checked. Those that conform to the
qualification are forwared by software. The ARP packets that fail in check will be
discarded.
Based on this requirement, the following methods that prevents usual ARP attack are
added.
1. As for untrusted interface, DAI blocks all ARP packets and send them to upper layer
software for check.
2. The speed that ARP packet sent to CPU is configurable.
3. When DHCP SNOOPING is enabled, laye 2 IP ,MAC and port corresponding
relationship are checked. Illegal user will be discarded.
DAI detects ARP packet according to the binding relationship between IP and MAC
address which is stored in trust database. When DHCP SNOOPING of VLAN is open,
database is created by DHCP SNOOPING. If ARP packet is received from a trust port,
switch need not any detection and forwards packet directly. If ARP packet is received
from a untrust port, switch only forwards valid packet.
3 Zxr10(config)#ip arp inspection validate { [ des-mac] [ ip] [ src-mac] } This configures global ARP validate
inspection function.
4 Zxr10 (config-gei_1/x)#ip arp inspection limit < 1-100> This configures the limited speed of
interface.
As for untrusted interface, the default
is 15pps.
As for trusted interface, ARP packet
speed is not limited.
16-7
16-8
16-9
1 ZXR10(config)#mff user < A.B.C.D> < H.H.H> vlan < 1-4094> This configures MFF user statically
gateway < A.B.C.D > in manual mode.
2 ZXR10(config)#no mff user < A.B.C.D> vlan < 1-4094> This clears statically configured MFF
user.
6. To enable MFF gateway MAC address detection function, use the following
commands.
16-10
16-11
Command Illustration:
a. The command without option will view all MFF corresponding relationship.
b. The command with VLAN option will view all MFF corresponding relationship in
this VLAN.
c. The command with VLAN and user IP address option will view MFF corresponding
relationship of specific user.
d. Illustration to displayed command information:
Information Description
16-12
17-1
2 ZXR10(config-if)#poe pd-max-power [ 15.4 | 7.0 | 4.0 | ext.18| This configures port maximum
ext.27| ext.30.0] power.
This command only can be used
when this interface doesn't be
enabled PoE function.
The default is 15.4.
17-2
17-3
ZXR10(config)#int gei_2/1/5
ZXR10(config-gei_2/1/5)#poe priority high
ZXR10(config-gei_2/1/5)#poe pd-max-power ext.27
ZXR10(config-gei_2/1/5)#poe enhanced-mode enable
ZXR10(config-gei_2/1/5)#poe enable
ZXR10(config-gei_2/1/5)#exit
ZXR10(config)#poe overtemperature auto-recovery enable device-id 2
ZXR10(config)#poe power-threshold 88 device-id 2
1 ZXR10(config)#show poe config interface < infterface-name> This views interface PoE
configuration.
2 ZXR10(config)#show poe interface < infterface-name> This views interface PoE status
configuration.
3 ZXR10(config)#show poe device < device-id> This views PSE status information.
17-4
I
ZXR10 5900 Series User Manual (Basic Configuration Volume)
II
Tables
Table 2-1 COMMAND MODES ................................................................................. 2-9
Table 2-2 INVOKING A COMMAND........................................................................ 2-12
Table 4-1 Interface State Abnormal Condition ........................................................... 4-6
Table 5-1 IP ADDRESS RANGE FOR EACH CLASS ............................................... 5-1
III