ZXR10 5900E Series Easy-Maintenance MPLS PDF
ZXR10 5900E Series Easy-Maintenance MPLS PDF
ZXR10 5900E Series Easy-Maintenance MPLS PDF
XC e XC e
F- w F- w
PD
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Version: 3.00.11
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: [email protected]
h a n g e Vi h a n g e Vi
XC e XC e
F- w F- w
PD
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
LEGAL INFORMATION
Copyright © 2017 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Contents
About This Manual ......................................................................................... I
Chapter 1 Usage and Operation................................................................ 1-1
1.1 Connection Modes ............................................................................................. 1-1
1.1.1 FTP Connection Configurations................................................................. 1-1
1.1.2 TFTP Connection Configuration ................................................................ 1-8
1.1.3 Serial Port Connection............................................................................ 1-10
1.1.4 Telnet Connection Configuration.............................................................. 1-13
1.1.5 SSH Connection Configuration................................................................ 1-21
1.2 Command Modes............................................................................................. 1-25
1.3 Online Help...................................................................................................... 1-27
1.4 Command History ............................................................................................ 1-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures............................................................................................................. I
Glossary ........................................................................................................ III
III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
IV
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Intended Audience
This manual is intended for:
l Network planning engineer
l Debugging engineer
l Attendant
Chapter 1, Usage and Describes the interface type and interface naming rule. In addition,
Operation this chapter describes how to view interface information, interface
description information, and interface state.
Chapter 2, System Provides the commands of the ZXR10 5900E for managing and
Management manipulating the file system, and describes the methods for equipment
maintenance and version upgrade.
Chapter 3, Network Provides the common functions and configuration methods of network
Management management, including SNMP, NetFlow, sFlow, Syslog, alarm module,
performance management module, and Time Range module.
Chapter 4, CHM System Provides the overview and principles of CHM configuration, related
Configuration configuration and maintenance commands, and configuration examples.
Chapter 5, MAC Provides the overview and principles of MAC configuration, related
Configuration configuration and maintenance commands, configuration examples.
Chapter 6, MAC Address Provides the overview, composition, and classification of an MAC
Table Configuration address table, as well as the related configuration and maintenance
commands.
Chapter 7, RMON Provides the overview and principles of RMON configuration, related
Configuration configuration and maintenance commands.
Chapter 8, PoE Provides the overview and principles of PoE configuration, related
Configuration configuration and maintenance commands.
Conventions
This manual uses the following typographical conventions:
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 1
Usage and Operation
Table of Contents
Connection Modes .....................................................................................................1-1
Command Modes .....................................................................................................1-25
Online Help ..............................................................................................................1-27
Command History ....................................................................................................1-28
Users can use different connection modes based on the network type. The connection
modes are as follows:
l Console port: the primary mode for users to configure the ZXR10 5900E.
l Telnet/SSH mode: allows users to configure the ZXR10 5900E at any reachable place
in the network.
l NM workstation mode: If this mode is used, the corresponding NM software supporting
SNMP is required
l TFTP/FTP mode: allows users to download or upload the configuration file to update
the ZXR10 5900E's configuration.
1-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Figure 1-3 shows the network scenario for an FTP client. The IP address of the switch is
192.168.65.2/24, and the IP address of the PC is 192.168.65.1/24.
Command Function
Note:
To disable the FTP server, use the no form of this command.
Only the local and remote ports that are not used can be listened. By default,
port 21 is listened.
The following example shows how to enable the FTP server on port 2405:.
ZXR10(config)#ftp-server enable listen 2405
Command Function
1-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
The following example shows how to disconnect user 1 from the FTP server:
ZXR10(config)#ftp-server kick-user 1
Command Function
The /flash/ or /sd/ directory should be configured as the top directory and
granted with all permissions (some switches have no SD devices).
The following example shows how to configure the /flash/LOG/ as the top
directory and grant all permissions to it:
ZXR10(config)#ftp-server top-directory /flash/LOG/ read-write copy
Command Function
1-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
ftp_server user top directory Top directory that can be accessed by FTP users.
ftp_server user top directory ac- Permissions assigned to the top directory.
cess permissions
ftp_server max online user number Maximum number of online FTP users.
à Configuration Flow
1. Enable the FTP server function and listening port 21 on the ZXR10 5900E.
2. Configure the “/flash/LOG/” directory as the top directory of the FTP server.
3. Set the FTP username and password to zte/zte.
4. Test the FTP server function by uploading and downloading files through the
FTP server.
à Configuration Commands
Run the following commands on the ZXR10 5900E:
ZXR10#configure terminal
1-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
ZXR10(config)#ftp-server enable
ZXR10(config)#ftp-server top-directory /flash/LOG/
2. Click the OK button. The FileZilla server dialog box is displayed, see Figure 1-6.
1-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
3. Select Edit > Users from the menu. The Users dialog box is displayed, see
Figure 1-7.
Note:
By default, the General node is selected in the Page area.
1-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
Command Function
ZXR10#copy ftp [vrf <vrfname>] //HOST/filename Downloads files from the FTP
@username:password root: localfile [<listen_port server to a local directory.
>][{<ipv4-address>|<ipv6-address>}][interface This command supports IPv6
<interface-name>] addresses.
ZXR10#copy ftp [vrf <vrfname>] root: localfile Uploads local files to the FTP
//HOST/filename@username:passowrd [<listen_port server. This command supports
>][{<ipv4-address>|<ipv6-address>}][interface IPv6 addresses.
<interface-name>]
Log in to the file system of the ZXR10 5900E as the username/password of who/who,
and upload the startrun.dat file under the flash/DATA0 directory through the
service port to the FTP server with the IP address 192.168.109.6.
ZXR10#copy ftp root: /flash/DATA0/startrun.dat //
192.168.109.6/startrun.dat@who:who
1-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
The following example shows how to download the startrun.dat file from the FTP
server (192.168.109.6) by a user (who/who) and rename the file to startrun.bak.
ZXR10#copy ftp //192.168.109.6/startrun.dat@who:who root: /
flash/DATA0/startrun.bak
Start copying file
.
Got file successfully!Received 7197 bytes!
ZXR10#copy ftp [vrf <vrfname>] //<ipv6-add Copies the file from or to the
ress>/dir@username:password root: localfile FTP server. This command
3
[<listen_port>][{<ipv4-address>|<ipv6-address>}][interface supports IPv6 addresses.
<interface-name>]
1-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
2. Click Tftpd > Configure, and then click Browse on the displayed dialog box, select
a catalog to save version file or configuration file, such as IMG catalog on D disk, see
Figure 1-10.
3. Click OK to finish.
Command Function
ZXR10#copy tftp [ipv6][vrf This downloads files from TFTP server to the local device through
<vrfname>] //HOST/filename TFTP client.
root: localfile
1-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Command Function
ZXR10#copy tftp [ipv6][vrf This uploads files from the local device to the TFTP server through
<vrfname>] root: localfile TFTP client.
//HOST/filename
This example describes how to upload the file startrun.dat from device file system /flash
catalog to the TFTP server which IP address is 192.168.2.244.
ZXR10#copy tftp root: /flash/startrun.dat //192.168.4.244/startrun.dat
Starting copying file
.
File copying successful.
This example describes how to download the file startrun.dat from the TFTP server which
IP address is 192.168.4.244 and rename the file as startrun.bak.
ZXR10#copy tftp //192.168.4.244/startrun.dat root: /flash/startrun.bak
Starting copying file
.
File copying successful.
Command Function
ZXR10#copy tftp ipv6 [vrf <vrfname>] //<dst-ipv6-address>/file This downloads file from the
name root: <file-path> server which destination address
is <dst-ipv6-address> by TFTP.
ZXR10#copy tftp ipv6 [vrf <vrfname>] root: <file-path> This uploads local file to TFTP
//<dst-ipv6-address>/filename server.
Parameter Description
1-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
router COM interface. Serial connection configuration uses VT100 terminal mode, using
the HyperTerminal tool provided by Windows OS.
1. After connecting PC to M6000 correctly, click Start > Programs > Accessories >
Communications > HyperTerminal, see Figure 1-11.
2. Open the HyperTerminal, see Figure 1-12. Type the connection name and select the
desired icon.
3. Select the serial port (COM1 or COM2) that connects the configuration line, see Figure
1-13.
1-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
4. Set the port properties of the selected serial port. The properties are set as follows:
"Bits per second" is "9600", "Data bits" is "8", "Parity" is "None", "Stop bits" is "1", and
"Flow control" is "None", see Figure 1-14.
5. Click OK to accept the configuration and connect device by the selected COM
interface.
After configuring user name/password for serial port authentication, ZXR10 5900E requires
entering user name and password for login. In this way, the security is enhanced.
1-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
Command Function
Configuration Example
Enabling or disables serial port authentication,
ZXR10(config)#login_authentication enable
Command Function
ZXR10(config)#aaa-authentication-template 2002
ZXR10(config-aaa-authen-template)#aaa-authentication-type radius-local
ZXR10(config-aaa-authen-template)#authentication-radius-group 1
ZXR10(config-aaa-authen-template)#exit
1-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10(config)#aaa-authorization-template 2002
ZXR10(config-aaa-authen-template)#aaa-authorization-type radius-local
ZXR10(config-aaa-authen-template)#authorization-radius-group 1
ZXR10(config-aaa-authen-template)#exit
ZXR10(config)#system-user
ZXR10(config-system-user)#authorization-template 2
ZXR10(config-system-user-author-temp)#access-only lct qx dcn
ZXR10(config-system-user-author-temp)#bind aaa-authorization-template 2002
ZXR10(config-system-user-author-temp)#exit
ZXR10(config-system-user)#authentication-template 2
ZXR10(config-system-user-authen-temp)#bind aaa-authentication-template 2002
ZXR10(config-system-user-authen-temp)#bind access-list ipv4 acl
ZXR10(config-system-user-authen-temp)#exit
ZXR10(config-system-user)#user-default
ZXR10(config-system-user-default)# bind authentication-template 2
ZXR10(config-system-user-default)# bind authorization-template 2
ZXR10(config-system-user-default)#exit
ZXR10(config-system-user)#user-name zte
ZXR10(config-system-user-username)# bind authentication-template 2
ZXR10(config-system-user-username)# bind authorization-template 2
ZXR10(config-system-user-username)# password zte
ZXR10(config-system-user-username)# exit
ZXR10(config-system-user)# exit
In the following example, the IP address of the remote switch is 192.168.3.1 and the local
host can ping the remote switch successfully.
1. Run the telnet command on the local host, see Figure 1-15.
1-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
3. Enter the username and password for accessing the remote switch.
Configuring Telnet
To configure Telnet on the ZXR10 5900E, perform the following steps:
1-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10(config)#line telnet access-class [ipv4 | Specifies the name of the ACL bound to
ipv6]<acl-name> telnet connections.
6
To cancel the configuration, use the no
ZXR10(config)#no line telnet access-class [ipv4 |
form of this command.
ipv6]
1-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
ZXR10#line telnet dscp <dscp-value> Specifies the DSCP value for IPv4 or
14 IPv6 packets. The default DSCP value
is 0xc0.
ZXR10#clear line vty <vty-number> Takes offline one or more VTY users
15
forcedly.
For a description of the parameters in Steps 2 and 4, refer to the following table:
Parameter Description
<idle-time> Maximum idle online time (in minutes) of the serial port and
telnet connection, range: 1-1000.
For a description of the parameters in Steps 3 and 5, refer to the following table:
Parameter Description
<absolute-time> Maximum online time (in minutes) of the serial port and telnet
connection, range: 1-10000.
Parameter Description
Parameter Description
For a description of the parameters in Step 10, refer to the following table:
Parameter Description
1-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
For a description of the parameters in Step 11, refer to the following table:
Parameter Description
For a description of the parameters in Step 12, refer to the following table:
Parameter Description
For a description of the parameters in Step 13, refer to the following table:
Parameter Description
1-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
Parameter Description
For a description of the parameters in Step 14, refer to the following table:
Parameter Description
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
Maintaining Telnet
To maintain Telnet on the ZXR10 5900E, run the following commands:
Command Function
1-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Line: 0, Location: , Type: "" Line: terminal number, Location: client end address, Type:
client end terminal type
Length: 24 lines, Width: 80 columns The length of the serial port terminal is 24 lines, and the width
is 80 columns.
Console idle-timeout: 02:00:00 The maximum idle online time of the serial port is two hours.
Console absolute-timeout: 1d00h00m The maximum online time of the serial port is 24 hours.
Time since activation: 00:11:12 Time period from the login time.
History: enabled, history size: 10 The history record is valid. The size is 10.
Telnet server: enable, Listen port: 23 Enables the telnet function, and the listening port number is
23.
1-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
Line ID of the virtual terminal that the user logs in to. "*" indicates
that the terminal is a local terminal.
Host(s) When the switch logs in to the Telnet server, the IP address of
the Telnet server is displayed in the column. In other cases,
"idle" is displayed in this column.
Configuring SSH
To configure SSH on the ZXR10 5900E, perform the following steps:
1 ZXR10(config)#ssh server enable [listen Enables the SSH server function. This
{<22>|<49152-65535>}] function is disabled by default.
1-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10(config)#no ssh server access-class ipv4 Removes the binding between the IPv4
ACL and the SSH server.
ZXR10(config)#no ssh server access-class ipv6 Removes the binding between the IPv6
ACL and the SSH server.
4 ZXR10(config)#ssh server dscp <dscp-value> Specifies the DSCP value for IPv4 or
IPv6 packets. The default DSCP value
is 0xc0.
Parameter Description
Parameter Description
1-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
3. Select 2 from the Preferred SSH protocol version field, see Figure 1-18.
4. Click the Open button. The PuTTY window for login is displayed, see Figure 1-19.
1-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Maintaining SSH
To maintain SSH on the ZXR10 5900E, run the following command:
Command Description
ZXR10#show ssh
=================================================================
SSH configuration
=================================================================
SSH enable-flag configuration : disable
SSH version : 2
SSH listen port :
SSH DSCP value :
SSH IPv4 ACL name :
SSH IPv6 ACL name :
SSH rekey interval : 1(hours)
For a description of the parameters in the execution result, refer to the following table:
enable-flag configuration Whether the SSH function is enabled or not. "enable" means
that SSH function is enabled.
1-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
User Mode
When logging in to the system in HyperTerminal mode, the user enters the user mode
automatically. If using Telnet mode for login, a user enters into user mode after entering
the user name and password.
DOS prompt of user mode is host name of router followed by a ">", as follows (the default
host name is ZXR10):
ZXR10>
In user mode, a user can run commands, such as ping and telnet.
After logging in to the system through the telnet command, the user enters special mode,
and then returns to user mode. In this case, the user can query some system information.
The user can execute the following commands:
ZXR10>?
Exec commands:
disable Turn off privileged commands
enable Turn on privileged commands
exit Exit from current mode
login Login as a particular user
logout Exit from the EXEC
ping Send echo messages
ping6 Send IPv6 echo messages
query List all commands with the keywords in the current command mode
quit Quit from the EXEC
show Show running system information
ssh Open a ssh connection
ssh6 Open a ssh6 connection
telnet Open a telnet connection
telnet6 Open a telnet6 connection
trace Trace route to destination
1-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Privileged Mode
In user mode, enter enable command and corresponding password to enter privileged
mode.
ZXR10>enable 15
Password: (The input password will not be displayed on the screen)
ZXR10#
Commands in global configuration mode act on entire system, not merely on a protocol or
interface.
To return from global configuration mode to privileged mode, enter the exit or end command
or press <CTRL+Z>.
1-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
Routing protocols used are Routing Information Protocol (RIP), Open Shortest Path
First (OSPF), Intermediate System-to- Intermediate System (IS-IS) and Border Gateway
Protocol (BGP). In above example, OSPF is used.
To return from route configuration mode to global configuration mode enter the exit
command and to return from route configuration mode to privileged mode directly enter
the end command or press <CTRL+Z>.
1-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10#co
l Press Tab after character string, if command or keyword starting with this string is a
unique one, command or keyword is complemented and a space is added after it. For
example:
ZXR10#con<Tab>
ZXR10#configure (There is a space between "configure" and
the cursor)
l Enter a question mark (?) after a command, a keyword or a parameter, next keyword
or parameter to be entered is listed and also a brief explanation is given. For example:
ZXR10##configure ?
exclusive Configured exclusively, the terminal will lock system
configuration
terminal Enter configuration mode
l If a wrong command, keyword or parameter is entered, after pressing <ENTER>, user
interface will use a "^" symbol to isolate error. The "^" is displayed under first character
of incorrect command, keyword or parameter, see following example:
ZXR10#von ter
von ter
^
%Error 140303: Invalid input detected at '^' marker.
In the following example, assume that a clock is to be set and context-sensitive help is
used to check syntax for setting clock.
ZXR10#cl?
clear clock
ZXR10#clock ?
set Set current time (Local time)
ZXR10#clock set ?
hh:mm:ss Current time
ZXR10#clock set 13:32:00
%Error 140305: Incomplete command.
ZXR10#
In the end of above example, system prompts "Incomplete command", indicating that other
keywords or parameters must be entered.
ZXR10 5900E also allows abbreviation of a command or keyword into characters or a
string that uniquely identifies command or keyword. For example, show command can be
abbreviated sh or sho.
1-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Usage and Operation c u -tr a c k
To re-invoke a command from record buffer, conduct one of following operations as shown
below.
Command Function
Press <Ctrl+N> or the down arrow key This rolls the commands
downward. When the last
command line is reached, one
more operation will roll the
commands from the beginning of
the buffer cyclically.
Use the show history command in privileged configuration mode and latest several
commands in that mode will be listed.
ZXR10#show history
who
show processor
show ver
show history
1-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
1-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 2
System Management
Table of Contents
File System Management...........................................................................................2-1
System Information State ...........................................................................................2-3
Device Maintenance.................................................................................................2-14
Version Upgrade ......................................................................................................2-18
VSC Configuration....................................................................................................2-23
The file operations, such as copy, delete, are low speed device operations. Therefore,
when multiple terminals are used, to decrease the influence of one terminal operation to
another terminal operation, all operation of file system will be achieved by an independent
process. This process includes two working modules, one working module is responsible
for process all file operation commands and the returning and showing of corresponding
data, another working module with lower priority is responsible for perform several
persistent operations, copy, delete, format, mount and umount.
In addition, the function that show the content of file operation can be achieved by using
more command, and it also can be achieved by Telnet process. The advantage of Telnet
process is that it can reduce the communication processing in the system. However,
considering that file storage devices are used by other service boards and the file system
operation are possible to be required, therefore, all of the file operation commands is used
in file operation process.
2-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Command Function
2-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Command Function
ZXR10#show filesystem [all ] Displays the information about the partitions that can be operated
in the file system.
If the all parameter is specified, the information about the partitions
that can be operated on all boards is displayed.
Example
The following example shows how to operate a file:
ZXR10#rename startrun1.dat startrun.dat
Rename success.
2-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Configuration Example
This example describes how to set system host name as 5900e.
ZXR10(config)#hostname 5900e
5900e(config)#
Command Function
Configuration Example
2-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Command Function
Configuration Example
This example describes how to set ZXR10 5900E to support serial port authentication.
ZXR10(config)#login_authentication enable
ZXR10(config)#
This example describes how to set ZXR10 5900E to disable serial port authentication.
ZXR10(config)#login_authentication disable
ZXR10(config)#
6 ZXR10(config)#nvram imgfile-location {local | network This sets the starting file name.
<file-name>}
2-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Configuration Example
This example shows how to set the configuration message saved in EEPROM.
ZXR10(config)#nvram boot-password ?
WORD FTP password (3-16 characters)
ZXR10(config)#nvram boot-password ******
ZXR10(config)#nvram boot-server 168.0.0.178
ZXR10(config)#nvram boot-username 5950
ZXR10(config)#nvram default-gateway 168.0.0.1
ZXR10(config)#nvram en-password ******
ZXR10(config)#nvram imgfile-location network HMPU.set
Command Function
Configuration Example
ZXR10(config)#show system-info
System Description: ZXR10 ROSNG Version V2.00.31(4.2.24)
ZTE ZXR10 5928E-FI Software, 5900 Version: V3.00.11.B11, RELEASE SOFTWARE
Copyright (c) 2010-2020 by ZTE Corporation
Compiled 2015-01-09, 08:11:02
2-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
ib.zxr10systemconfig.zxr10SystemID.zxr10Switch-5928E-FI
Viewing the System Host Name, Welcome Information, and Serial Port Authentication
Information
To view the system host name, welcome information, and serial port authentication
information on ZXR10 5900E, use the following command:
Command Function
Configuration Example
ZXR10#show running-config pm-sys
!<pm-sys-config>
banner incoming #
123456#
!</pm-sys-config>
Command Function
Version set information includes the version number, supported products, compilation
date and time (format: day-month-year; in 24–hour notation), version path, and version
running time.
2-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
b. Basic information: For a main control board, the basic information includes the
main processor type, Bootrom version, memory and Flash size, baud rate of
a serial port, microcontroller version number of the clock subcard, Erasable
Programmable Logic Device version number of the clock subcard, Nvram, CPU
version number, FPGA version number, SD size, CPLD version number, board
type, and board name. For a line card, the basic information includes the main
processor type, Bootrom version, memory size, CPLD version number, port
quantity, board type, board type, status of the network processor, and availability
of the network processor.
Configuration Example
This example describes how to view device version information.
ZXR10(config)#show version
5928E-FI Software, 5900 Version: V3.00.11.B11, RELEASE SOFTWARE
Copyright (c) 2010-2020 by ZTE Corporation.
Compiled 2015-01-09, 08:11:02
System image files are:<ftp://168.0.0.178/HMPU.set>
System uptime is 0 days, 0 hours, 3 minutes
Command Function
Configuration Example
This example shows how to display information of the rack diagram.
ZXR10#show shelf-info
2-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
-------------------------------------------
0 T1 MP MASTER
Command Function
This shows the memory and CPU running state, including the CPU shelf, slot, CPU ID,
temperature, CPU occupancy rate during the latest 5 seconds, 1 minute and 5 minutes,
CPU occupancy peak rate in 1 minute (absolute granularity), physical content size, free
memory size and memory usage rate.
Configuration Example
This example describes how to view memory and CPU running state.
ZXR10#show processor
============================================================================
============================================================================
M : Master CPU
S : Slave CPU
Power : Power dissipation (Watt)
CPU(5s): CPU utility measured in the last 5 seconds
CPU(1m): CPU utility measured in 1 minute
CPU(5m): CPU utility measured in 5 minutes
Peak : CPU peak utility measured in 1 minute
PhyMem : Physical memory (Megabyte)
FreeMem: Free memory (Megabyte)
Mem : Memory usage ratio
=============================================================================
=============================================================================
Shelf Panel CPUID Power CPU(5s) CPU(1m) CPU(5m) Peak PhyMem FreeMem Mem
=============================================================================
MP(M) 0 1 0 N/A 15% 16% 15% 20% 2048 710 65.308%
----------------------------------------------------------------------------
2-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Command Function
Configuration Example
This example describes how to view the configuration message saved in EEPROM.
ZXR10#show nvram-info
nvram boot-username 3900
nvram boot-password ******
nvram boot-server 168.10.0.133
nvram default-gateway 168.10.0.1
nvram mng-ip-address 168.10.0.71 255.255.255.0
nvram imgfile-location local flash HMPU.set
nvram backup-imgfile
nvram update-back-flag 0xbf
Command Function
Configuration Example
The following is an example of showing the bootrom version information:
ZXR10#show bootrom
[MP(M) , shelf 0 ,physlot 4]
cpu 0
Bootrom Version : V1.00
Creation Date : 2011/3/15
Command Function
2-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Configuration Example
The following is an example of showing the loading and checking information of the flash
file system:
ZXR10#show flash-check
Master MP flash is loaded.
Master MP flash checked OK.
Slave MP has not started up
2-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Interface information:
ZXR10#show interface brief
Interface Portattribute Mode BW(Mbits) Admin Phy Prot Description
gei-0/1/1/1 electric Duplex/full 100 down up down none
gei-0/1/1/2 electric Duplex/full 100 down up down none
gei-0/1/1/3 electric Duplex/full 100 down up down none
à up
à down
à up
à down
à up
à down
l This example describes how to show the brief information of all L3 interfaces.
ZXR10#show ip interface brief
interface IP-Address Mask AdminStatus PhyStatus Protocol
2-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
The characters and their meanings of regular expression are shown below.
Character Description
$ It is the ending of character string. For example, abc$ only matches the abc
substring at the ending of character string.
| It permits any regular expressions at its both sides to match the destination
string. For example, a|b matches a or b.
* In the expression, the left character (or element) matches one or many times.
l This example describes how to show the description information of all ports.
ZXR10#show interface description
Interface AdminStatus PhyStatus Protocol Description
gei-0/1/1/1 up up up none
gei-0/1/1/2 up up up none
2-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
1. After the system powering up, enter Boot menu. In the first use, configure Boot
as follows: press any key to enter boot menu after the message "Hit any key to
stop autoboot" is displayed. Configure boot according to the following example.
Load the version after finishing the configuration.
2. Start the system manually after finishing the configuration.
2-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
3. System displays the prompt "ZXR10>" to indicate the starting is successful. Enter
enable command, and enter the enable password according to the prompt. Enter
privileged mode if passing the authentication.
Configuration Example
This example describes how to power on the system manually.
BootROM 1.20
Booting from NAND flash
High speed PHY - Version: 2.1.2 (COM-PHY-V20)
Update PEX Device ID 0x78260
High speed PHY - Ended Successfully
DDR3 Training Sequence - Ver 5.3.0
DDR3 Training Sequence - Run with PBS.
DDR3 Training Sequence - Ended Successfully
Status = MV_OK
BootROM: Image checksum verification PASSED
KUBoot 2.0.10.P9-svn47 (Jan 6 2014 - 16:42:05)
Marvell version: 2012_Q4.0
RAM Configuration:
Bank #0: 00000000 Bank #1: 00000000 Bank #2: 00000000 Bank
#3: 00000000 relocation Offset is: 6ff15000
Now running in RAM - U-Boot at: 7ff15000
NAND: <<>>flashIdx=12,---fo1:1144, fo2:88--
512 MiB
FPU not initialized
Modules Detected:
Not Marvell PHY id1 ffff id2 ffff
egiga0, egiga1, egiga2, egiga3
yaffs: Mounting /flash/
Bad block table found at page 262080, version 0x01
Bad block table found at page 262016, version 0x01
yaffs: restored from checkpoint
Hit any key to stop auto-boot: 0
[boot]: c
'.' = clear field; '-' = go to previous field; '^' = quit
Boot Location [0:Net,1:Flash,2:USB]: 0
Client IP : 168.0.0.59 168.0.0.59
Netmask : 255.255.255.0 255.255.255.0
Server IP : 168.0.0.178 168.0.0.178
Gateway IP : 168.0.0.1 168.0.0.1
FTP User : 59 59
FTP Password : ***
FTP Password Confirm : ***
Bootfile : HMPU.set
Enable Password :
2-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
2-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Client IP : 168.0.0.51
Netmask : 255.255.255.0
Server IP : 168.0.0.178
Gateway IP : 168.0.0.1
FTP User : 59
FTP Password :
Bootfile : HMPU.set
Enable Password :
MAC Address : 00.d0.d0.51.10.00
Loading....................
Reloading Device
To reload cards in the designated slot on ZXR10 5900E, use the following command.
Command Function
Parameter descriptions:
Parameter Description
Configuration Example
This example describes how to reload the system.
ZXR10#reload
Are you sure to reset the board?[yes/no]:y
BootROM 1.20
Booting from NAND flash
High speed PHY - Version: 2.1.2 (COM-PHY-V20)
Update PEX Device ID 0x78260
High speed PHY - Ended Successfully
DDR3 Training Sequence - Ver 5.3.0
DDR3 Training Sequence - Run with PBS.
DDR3 Training Sequence - Ended Successfully
Status = MV_OK
BootROM: Image checksum verification PASSED
KUBoot 2.0.10.P9-svn47 (Jan 6 2014 - 16:42:05) Marvell version: 2012_Q4.0
RAM Configuration:
Bank #0: 00000000 Bank #1: 00000000 Bank #2: 00000000 Bank #3: 00000000
2-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
If the version upgrading is not operated well, the upgrading will be failed, and the system
will be halted in severe case. Therefore, the maintenance staffs have to read this document
and learn the steps for version upgrading before performing version upgrading.
2-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
2-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
FTP Password :
Bootfile : bjmp.set
Enable Password :
Loading...
BOOT Description
3. After the system is started, enter the OAM man-machine interaction interface and
run show version to see whether the displayed version number is consistent with
the version number of the newly released version set file. If yes, it indicates that
the upgrade succeeded; otherwise, it indicates that the upgrade failed.
Run show version. The version number is "V3.00.11.B11" printed below:
ZXR10(config)#show version
5928E-FI Software, 5900 Version: V3.00.11.B11, RELEASE SOFTWARE
Copyright (c) 2010-2020 by ZTE Corporation.
Compiled 2015-01-09, 08:11:02
System image files are:<ftp://168.0.0.178/HMPU.set>
System uptime is 0 days, 0 hours, 3 minutes
2-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Now, the bjmp.set file can be seen in the img directory of the Flash. Run reload
to reload the system.
2. Modify the value of Boot Location among BOOT parameters to 1, so that the
version can be loaded from the Flash. In addition, set Bootfile to the img directory
of the Flash. After that, run b to load the system. Then the system can start the
new version in the img directory as follows:
ZXR10#reload
Are you sure to reset the board?[yes/no]:y
BootROM 1.20
Booting from NAND flash
High speed PHY - Version: 2.1.2 (COM-PHY-V20)
Update PEX Device ID 0x78260
High speed PHY - Ended Successfully
DDR3 Training Sequence - Ver 5.3.0
DDR3 Training Sequence - Run with PBS.
DDR3 Training Sequence - Ended Successfully
Status = MV_OK
2-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
2-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
command and method are the same as those in "Upgrading Version in Network
Mode".
In general cases, the device role election mechanism elects the device with the smallest
number as the primary device. If the primary device or the link between the devices in the
VSC system is down, the secondary device immediately takes over the VSC system. This
mechanism ensures normal system operation and traffic forwarding.
The ZXR10 5900E supports creating the VSC system through the configuration. The VSC
configuration items include the operation mode, member number, VSC domain, VSC port
and conflict detection. The ZXR10 5900E also supports the display of the configuration
and operation information of the VSC system.
VSC-related terms are as follows:
1. Running mode: independent or VSC.
l Independent mode: In this mode, the device can only operate as a single PC,
meaning that it cannot form a VSC with other devices.
l VSC mode: In this mode, the device can form a VSC with other devices through
interconnection.
2. Role: If the device operates in VSC mode, it can have the Master, Slave or Standby
role based on the function.
l Master: manages the VSC system.
l Slave: operates as the standby device of the master device.
If the master device is faulty, the system elects a new master device from slave
devices to take over the services of the original master device. A VSC has only
one master device.
2-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
6. VSC aggregation: After two independent VSC systems (typically two single VSC
systems) operating stably discover each other through a physical connection and the
necessary configuration, they are aggregated into a VCS system. This process is
known as VSC aggregation.
7. VSC splitting: After a VSC system is formed, if a link between the stack ports of two
devices is faulty, the physical connection between the two devices is broken. In this
case, the VSC system is split into two independent VSC systems. This process is
known as VSC splitting.
8. MAD detection: After the VSC is split, two VSC systems have the same layer-3
configuration (such as the IP address), causing address confliction and fault
escalation.
MAD detection is a mechanism meeting the above requirements. It can detect address
confliction, resolves faults, and restores the network. However, it does not detect link
faults.
Command Function
ZXR10(config-vsc)#vsc mode {cluster| This sets the operation mode of the device,
alone}[shelfid] required.
alone: the single-server mode, which means
that the device operating in this mode cannot
co-operate with other devices.
cluster: the cluster mode, which means that the
device operating in this mode can co-operate with
other devices (cluster members).
shelfid: the rack number of the VSC member,
optional. If this parameter is not set, the current
rack is configured by default.
2-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Command Function
ZXR10(config-vsc)#vsc port_group <group id Sets link binding in the port group of the VSC.
>[add | remove]<interface> <group id >: required, range: 1–2.
add: indicates to add an interface to the specified
port group.
remove: indicates to delete an interface from the
specified port group.
Example
1. Run the following commands to set the operation mode of the device to VSC:
2-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10(config)#vsc
ZXR10(config-vsc)#vsc mode ?
alone alone mode
vsc Cluster mode
ZXR10(config-vsc)#vsc mode vsc
ZXR10(config-vsc)#vsc write
ZXR10(config-vsc)#
2. Run the following commands to set the ID of the VSC member:
ZXR10(config)#vsc
ZXR10(config-vsc)#vsc memberid ?
<0-15> Vsc member id
ZXR10(config-vsc)#vsc memberid 0
ZXR10(config-vsc)#vsc write
ZXR10(config-vsc)#
3. Run the following commands to set the ID of the VSC domain:
ZXR10(config)#vsc
ZXR10(config-vsc)#vsc domain ?
<1-255> Vsc domain
ZXR10(config-vsc)#vsc domain 20
ZXR10(config-vsc)#vsc write
ZXR10(config-vsc)#
4. Run the following commands to set a VSC link port:
ZXR10(config-vsc)#vsc port_group ?
<1-2> Vsc port group number
ZXR10(config-vsc)#vsc port_group 1 ?
add Add port to vsc port group
remove Remove port from vsc port group
ZXR10(config-vsc)#vsc port_group 1 add ?
xlgeis- XLGigabit ethernet interface
ZXR10(config-vsc)#vsc port_group 1 add xlgeis-0/1/1/3/1
ZXR10(config-vsc)#vsc write
ZXR10(config-vsc)#
5. Run the following commands to add a mad port:
ZXR10(config)#vsc
ZXR10(config-vsc)#vsc mad_port ?
<1-2> Vsc mad port number
ZXR10(config-vsc)#vsc mad_port 1 gei-0/1/1/1
ZXR10(config-vsc)#vsc write
Command Function
2-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Command Function
ZXR10#show vsc next [shelfid] Displays the VSC configuration that will be in
effect after the system reboots.
ZXR10#show vsc link Displays the current statuses of the VSC links.
Parameter Description
Example
1. Run the following command to display the current VSC configuration:
ZXR10(config-vsc)#show vsc config
Mode: cluster
Memberid: 4
Domain: 100
Priority: 16
Mad port1: gei-4/1/1/27
Mad port2: gei-4/1/1/28
Vsc group number: 2
Groupid: 1
Group name: vsc group 1
Port number: 1
Port list:
Shelf Slot Subslot Port
---------------------------------
4 1 3 1
Groupid: 2
Group name: vsc group 2
Port number: 1
Port list:
Shelf Slot Subslot Port
---------------------------------
4 1 3 2
2. Run the following command to display the current operation information of the VSC
system:
ZXR10(config-vsc)#show vsc information
Vsc domain : 100
2-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Master MP : 4
Slave MP : 2
Vsc setup time : 2010/01/01-0:40:6
Vsc running time : 0d/5h/35m/18s
3. Run the following command to display the VSC configuration that will be in effect when
the system reboots:
ZXR10(config-vsc)#show vsc next
Mode: cluster
Memberid: 2
Domain: 0
Priority: 0
Mad port1: none
Mad port2: none
Vsc group number: 2
Groupid: 1
Group name: vsc group 1
Port number: 1
Port list:
Shelf Slot Subslot Port
---------------------------------
2 1 3 1
Groupid: 2
Group name: vsc group 2
Port number: 1
Port list:
Shelf Slot Subslot Port
---------------------------------
2 1 3 2
4. Run the following command to display current information of the VSC links:
ZXR10(config-vsc)#show vsc link
device 8 port 1 <---> device 2 port 1
device 2 port 2 <---> device 4 port 1
2-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
Note:
After the VSC function is configured, the vsc write command must be executed to save the
configuration, so that the configuration is valid if the device is restarted.
The show vsc config command isused to display the current valid VSC configuration.
The show vsc next command is used to display the saved VSC configuration that is applied
after the device is restarted.
Configuration Flow
Start the three devices. Ensure that the stack interfaces are up. Configure the VSC
function on S1, S2, and S3.
1. Set the three devices to operate in VSC mode.
2. Set the three devices to be in the same VSC domain.
3. Set different member IDs for the three devices.
4. Set different priorities for the devices. The device with the highest priority operates as
the master device, the device with the second highest priority operates as the slave
device, and the left device operates as the standby device.
5. Configure stack ports. A maximum of two port groups are supported. Each port group
contains only one port.
6. Save the VSC configuration.
7. Restart the devices. After the devices are restarted, the VSC system is created.
Configuration Commands
The configuration on S1 is as follows:
S1(config)#vsc
2-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Note:
For the initial configuration, the shelf ID of each device is 0. After the devices are restarted,
the configured shelf IDs (namely, member IDs) of the devices are valid.
Configuration Verification
After the three devices are restarted, only one of the devices (in general, S1) enters
command line mode. If all the devices enter command line mode or no device enters
command line mode, the VSC system is not created successfully. Run the show processor
or show interface brief command on S1. Information about S2 and S3 is displayed.
S1#show processor
================================================================================
================================================================================
M : Master CPU
S : Slave CPU
2-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
2-31
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
2-32
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 System Management c u -tr a c k
2-33
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
2-34
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 3
Network Management
Table of Contents
SNMP Configuration...................................................................................................3-1
NetFlow Configuration ..............................................................................................3-13
SFlow Configuration .................................................................................................3-28
SysLog Configuration ...............................................................................................3-33
Port Mirroring Configuration......................................................................................3-35
Alarm Module ...........................................................................................................3-40
Performance Management Module...........................................................................3-46
Time Range Module Configuration ...........................................................................3-49
3-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
5 ZXR10(config)#snmp-server enable trap Enables the agent to send traps and sets
[<trap-type>] the type of traps.
The trap type can be one of the following:
l BGP
l OSPF
l RMON
l SNMP
l stalarm
l VPN
l FTP-TFTP
3-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
l CONFIG
3-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
m],[sqa],[ipsec],[cgn],[vrrp],[ftp_tftp],[ping-trac
e],[gm]}]
14 ZXR10(config)#snmp-server security block <B Enables the security function. The SNMP
lock-Second><Detect-Try><Detect-Second>[when security function is disabled by default.
<Startup-Try>|< Startup-Second>]
3-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
ZXR10(config)#no snmp version {v1 | v2c | v3} Disables SNMP v1, v2c or v3.
Parameter Description
view <view-name> View name of the community string, range: 1-32 characters.
Parameter Description
3-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
udp-port <udpport> UDP port number for sending traps, range: 1-65535.
For a description of the parameters in Step 12, refer to the following table:
Parameter Description
<groupname> Name of the group associated with the user, range: 1-32
characters.
3-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
For a description of the parameters in Step 13, refer to the following table:
Parameter Description
For a description of the parameters in Step 14, refer to the following table:
Parameter Description
<Block-Second> Block time (the length of the idle period, in seconds), range:
1-65535.
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
<Idle-Timeout> Aging time (in seconds) of the dynamic trust user, range:
1-65535, default: 1800.
For a description of the parameters in Step 16, refer to the following table:
Parameter Description
For a description of the parameters in Step 17, refer to the following table:
Parameter Description
3-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
For a description of the parameters in Step 18, refer to the following table:
Parameter Description
Command Function
ZXR10#show snmp security trust-users Displays the dynamic trust users learnt by SNMP
and configured static trust users.
ZXR10#show snmp
0 SNMP packets input
0 Bad SNMP version errors
0 Unknown community name
0 Illegal operation for community name supplied
0 Number of requested variables
0 Number of altered variables
0 Get-request PDUs
0 Get-next PDUs
0 Set-request PDUs
0 SNMP packets output
3-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Too big errors An error is reported when the number of bytes in the packet
to be sent exceeds the packetsize value.
No such name errors Number of errors due to the user having no permissions to
access the system.
Bad values errors Invalid operation, and wrong parameters are set.
Trap PDUs SNMP Number of times that traps packets are sent.
The following is sample output from the show snmp config command:
3-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
input-limit 200 Sets the frequency (packet per second) at which the SNMP
server processes packets, range: 100 to 1000, default: 200.
The following is sample output from the show snmp engine-id command:
ZXR10#show snmp engine-id
the engine-id:830900020300010289d64401
The following is sample output from the show snmp group command:
ZXR10#show snmp group
groupName :a
sec_Model :v3
sec_Level :AUTH
readView :DefaultView
writeView :<no writeView specified>
notifyView:AllView
rowStatus :ACTIVE
contextName :a
contextMatch :match-exact
3-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
The following is sample output from the show snmp security command:
ZXR10#show snmp security
Access list about ipv4 has been configured.
No access list about ipv6 has been configured.
No static trust-user has been configured.
No dynamic trust-user has been learned.
The max idle timeout of dynamic trust-user is 65535.
All failed requests are logged.
Router is enable to watch for Attacks.
If more than 1 request failures occur in 65535 seconds or less,requests will be
disabled for 65535 seconds.
Router presently in Quiet-Mode, will remain in Quiet-Mode for 65530 seconds.
Denying requests from all sources, except from trust-user
The following is sample output from the show snmp security failures command:
ZXR10#show snmp security failures
Information about failures with the device
Source IPAddr Count Last TimeStamp
192.168.110.11 1 14:28:49 UTC Wed Sep 8 2010
The following is sample output from the show snmp security trust-users command:
ZXR10#show snmp security trust-users
Information about trust-users's with the device
Source IPAddr Last TimeStamp max-inac tive(seconds) dynamic/static
169.1.110.11 - - static
The following is sample output from the show snmp user command:
ZXR10#show snmp user
username :zte
engine-id :830900020300010289d64401
auth_type :NONE
group_name :nanjing(v3)
encryptType:NONE
storageType:NONVOLATILE
3-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
row_status :ACTIVE
Configuration Thought
1. Configure SNMP packet community. SNMPv1/v2c uses community authentication
mode. SNMP community is named by character string. Community has access
privileges, read-only or read-write.
2. Designate view name to the configured community string. Specify the default view
to the community if the view keyword uses the default setting. Specify ro privilege to
community if uses default setting in ro | rw keyword. It is only permitted that users
perform operation in the permitted view range no matter that ro or rw is specified. The
operation range is determined by view. Use DefaultView if view parameter is omitted.
Use ro privilege if ro/rw parameter is omitted.
3. Configure trap. Configure the type of trap to be sent and the sending destination host.
Trap is a kind of message without request sent by the managed device to NMS. It is
used to report some emergent and important events. By default, all kinds of trap are
permitted to send.
4. Configure SNMP v3 group and user if SNMP v3 is used.
Configuration Commands
The configuration of router is shown below,
ZXR10(config)#snmp-server packetSize 1400
ZXR10(config)#snmp-server engine-id 830900020300010289d64401
ZXR10(config)#snmp-server community public view AllView ro
ZXR10(config)#snmp-server host 61.139.48.18 inform version 2c public
udp-port 162 snmp
ZXR10(config)#snmp-server enable trap SNMP
ZXR10(config)#snmp-server enable trap VPN
ZXR10(config)#snmp-server enable trap BGP
ZXR10(config)#snmp-server enable trap OSPF
3-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Configuration Verification
Use the show command to check up the configuration.
ZXR10(config)#show snmp config
snmp-server packetsize 1400
snmp-server engine-id 830900020300010289d64401
snmp-server community public view AllView ro
snmp-server view AllView 1.3.6.1 included
snmp-server view DefaultView 1.3.6.1.2.1.1 included
snmp-server host 61.139.48.18 trap version 2c public udp-port 162
snmp-server host 61.139.48.18 inform version 2c public udp-port 162 snmp
snmp-server enable inform SNMP
snmp-server enable inform VPN
snmp-server enable inform BGP
snmp-server enable inform OSPF
snmp-server enable inform RMON
snmp-server enable inform STALARM
snmp-server enable trap SNMP
snmp-server enable trap VPN
snmp-server enable trap BGP
snmp-server enable trap OSPF
snmp-server enable trap RMON
snmp-server enable trap STALARM
l Network layout
3-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Netflow can count the information of network flow for a long time. Therefore, it can
trace and estimate the trend of network flow increasing or decreasing. Thus, add
or remove route devices or upgrade or degrade the bandwidth of route devices if
required. In this way, the network operation is more proper.
l Analyze new application
Netflow collects the network usage information of a new application protocol. By
means of information analyzing, network resource can be allocated to the new
application reasonably.
l Network monitor
Netflow has real time network monitor ability. It can locate fault by providing
information when network has fault, or it can find potential network problem.
NetFlow Principle
To provide network data collection, NetFlow performs the following task,
1. Configure NetFlow service on many interfaces on a switch to collect packets which
pass through these interfaces. To reduce system load, set a sample rate on both of
ingress and egress on the interfaces. For example, if the sample rate is 2000:1, then
sample one packet from every 2000 packets. NetFlow can sample unicast, multicast,
and MPLS packets respectively or hybridly.
2. NetFlow analyzes the sampled packet to obtain the following information,
l Packet information: For example, source / destination IP address, TOS field, and
source/ destination TCP/UDP port number.
l Route information: For example, next hop IP address.
l Other information: Packet ingress / egress interface index, and sample direction.
NetFlow takes flow as statistic object. The packets which belong to the same flow
are summarized and stored. NetFlow v5 uses octet to define the unique flow, and
NetFlow v9 permits that user defines flow by itself. For example, user can use source
and destination IP addresses to define a flow, then all the packets which have the
source and destination addresses are defined as a flow. People call the octet (source
and destination IP addresses) as key field. User also can configure non-key field to
obtain other information of the flow, such as packet number, bytes and next hop IP
address.
3. Netflow has buffer. The sampled packets are stored at buffer at first. The size of
every flow is the sum of all key fields and non-key fields. After a packet is analyzed,
find whether the flow already exists according to its key filed. If it already exists, then
update the flow's non-key field. If it does not exist, add the new flow into buffer. When
the flow stored at buffer satisfies the following conditions, it will be sent to remote
server.
l Send all flow to server when buffer is full.
l A flow is inactive if there is no packet belongs to the flow in a given time. Send
the flow to server. The given time is called active aging time. It can be configured
by user.
3-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
l For a long term active flow, the statistic information is sent to server once in a
while. The interval is called inactive aging time. It can be configured by user.
4. At present, ZXR10 5900E supports to send NetFlow v5, NetFlow v8 and NetFlow v9
packets to server. Since the format of NetFlow v5 is fixed, Netflow v5 only output the
fixed field flow information. NetFlow v9 supports user to customize key field or non-key
field. The NetFlow v9 packet is based on module. The module includes user-defined
key field and non-key field, and every module has a unique module ID. NetFlow sends
module to server circularly. When a server receives the NetFlow v9 packet including
flow information, it will find the corresponding module according to the contained mod-
ule ID.
5. On NetFlow server, the received flow information is usually stored at database, and
NetFlow analysis software can analyze the entity data.
3-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
refresh <packets> Resend the module according to the number of output netflow
packets. The default value is 20, and the range is 1 to 600.
timeout <seconds> Resend the module according to time. Unit: second. The
default value is 600, and the range is 1 to 86400.
3-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Parameter Description
source address prefix minimum-mask Specify destination IP address with a length as collective
<len> field, the len ranges 1 from 32
version Set the version field of the IP packet header as the one to
be collected.
Parameter Description
Parameter Description
tcp flags Set TCP flags as collective field (This field is not supported
at present)
3-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Parameter Description
first Set the system power up time when flow arrives at cache at
the first time as the collective field. The unit is ms.
last Set the system power up time when flow arrives at cache at
the last time as the collective field. The unit is ms.
The descriptions of the parameters used by step 10, 12, and 14 are the same as that of
the parameters used by step 4, 5, and 6.
Parameter Description
3-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Parameter Description
entries <num> Set the size of buffer is num. The num represents that the
number of flow which can be stored at the buffer. The range
is 16 to 8192, and the default value is 4096.
timeout<seconds> Set active aging time. The unit is second, the range is 600 to
604800, and the default value is 1800.
timeoutinactive<seconds> Set inactive aging time. The unit is second, the range is 600
to 604800, and the default value is 1800.
type normal Set the mode to send cache to normal mode (that is, sending
data according to the values of cache timeout active and
inactive).
Parameter Description
exporter <name> Associates a pre-set flow exporter policy. That is, the flow
monitor policy uses the flow exporter policy to output netflow
packets. If the flow exporter policy uses v5 output format,
the module used by the flow monitor has to be the pre-set
netflow-original
Parameter Description
record netflow-original Define v5 module in advance, the key field and non-key field
to be used have to be consistent with that of netflow v5.
3-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
ip flow monitor <name> Applies a pre-set netflow monitor policy on interface. The
configuration related to the monitor policy and cache size
cannot be modified after the pre-sent netflow monitor policy is
applied. To modify the configuration, the flow monitor policy
has to be deleted first. The following items can be modified,
flow active and inactive aging time, output policy.
unicast | multicast Set sampling packet type. The unicast means that sample
unicast packets, the multicast means that sample multicast
packets.
Command Function
ZXR10#show ip flow record [<name>| netflow-original] This shows flow record policy
information.
3-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
In all the outputs of the following commands, if the configurations are not the default
configurations, the configurations will be displayed. The default configurations are
displayed by beginning with the # mark.
This example shows what will be displayed after show ip flow exporter [<name>] is used.
ZXR10(config)#show ip flow exporter
flow exporter v5
transport udp 9995
export-protocol netflow-v5
#template data timeout 600
$
flow exporter v9
transport udp 9995
#export-protocol netflow-v9
#template data refresh 1
$
ZXR10(config)#show ip flow exporter v5
flow exporter v5
transport udp 9995
export-protocol netflow-v5
#template data timeout 600
$
transport udp 9995 The UDP port which receives netflow packet on server is
No.9995.
#template data timeout 600 The default retransmission time interval is 600 seconds
template data refresh 60 The module is retransmitted once when the flow exporter
outputs every 60 netflow packets.
This example shows what will be displayed after show ip flow interface [<interface-name>]
is used.
ZXR10(config)#show ip flow interface
interface gei-0/1/1/1
ip flow monitor src_and_dst_addr input
ip flow monitor test sampler determin_2000 unicast output
$
3-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ip flow monitor src_and_dst_addr Sample ingress IPv4 packets, the used flow monitor policy is
input src_and_dst_addr, and the default sampling rate is 1000:1,
random sampling. By default, sample unicast and multicast
packets.
ip flow monitor test sampler Sample egress IPv4 unicast packets, the used flow monitor
determin_2000 unicast output policy is test, the sampler policy used is determin_2000.
This example describes what will be displayed after show ip flow monitor [<name>] is used.
ZXR10(config)#show ip flow monitor
flow monitor test
#cache entries 4096
cache timeout active 6000
#cache timeout inactive 1800
#cache timeout update 1800
#cache type normal
record netflow-original
exporter v5
$
flow monitor src_and_dst_addr
cache entries 1024
#cache timeout active 1800
#cache timeout inactive 1800
#cache timeout update 1800
#cache type normal
record src_and_dst_addr
exporter v9
$
ZXR10(config)#show ip flow monitor test
flow monitor test
#cache entries 4096
cache timeout active 6000
#cache timeout inactive 1800
#cache timeout update 1800
#cache type normal
record netflow-original
exporter v5
$
3-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
#cache entries 4096 The cache size used by flow monitor is 4096
This example shows what will be displayed after show ip flow record [<name>| netflow-ori
gnial] is used.
ZXR10(config)#show ip flow record
flow record src_and_dst_addr
match ipv4 source address
match ipv4 destination address
collect flow direction
collect flow sampler
collect interface input
collect interface output
collect counter bytes
collect counter packets
$
flow record src_and_dst_port
match transport destination-port
match transport source-port
collect counter bytes long
collect counter packets
$
3-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
mode derterministic 1-out-of 2000 Use deterministic sampling, the sampling rate is 2000
3-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
l Configuration Thought
1. Configure flow exporter output, including server IP address, port number and pro-
tocol type.
2. Configure sampler sampling rate and sampling mode.
3. Configure the size of flow monitor cache, active overtime value and inactive
overtime value, bind the configured flow exporter to system v5 module.
4. Bind flow monitor policy to interface, configure sampling type and direction.
5. Send packets, view the received packets by traffic analyze software on server.
l Configuration Commands
ZXR10 configuration,
ZXR10#configure terminal
Enter configuration commands, one per line. End with CTRL/Z.
ZXR10(config)#flow exporter exp
ZXR10(config-flow-exporter)#destination 169.1.109.60
ZXR10(config-flow-exporter)#transport udp 2055
ZXR10(config-flow-exporter)#export-protocol netflow-v5
ZXR10(config-flow-exporter)#exit
ZXR10(config)#sampler sam
ZXR10(config-sampler)#mode deterministic 1-out-of 1024
ZXR10(config-sampler)#exit
ZXR10(config)#flow monitor mo
ZXR10(config-flow-monitor)#cache entries 4096
ZXR10(config-flow-monitor)#exporter exp
ZXR10(config-flow-monitor)#record netflow-original
ZXR10(config-flow-monitor)#cache timeout inactive 6000
ZXR10(config-flow-monitor)#cache timeout active 1800
ZXR10(config-flow-monitor)#exit
ZXR10(config)#interface gei-0/1/1/4
ZXR10(config-if)#ip flow monitor mo sampler sam unicast input
ZXR10(config-if)#exit
l Configuration Verification
3-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
l Configuration Thought
1. Configure flow exporter output, including server IP address, port number and
protocol type, module refresh time and refresh rate.
2. Configure match and collect of flow record policy.
3. Configure the size of flow monitor cache, active overtime value and inactive
overtime value, bind the configured flow exporter policy and flow record policy.
4. Configure sampler sampling rate and sampling mode.
5. Bind flow monitor policy to interface, configure sampling type and direction.
6. Send packets, view the received packets by traffic analyze software on server.
l Configuration Commands
ZXR10 configuration,
ZXR10(config)#flow exporter exp
3-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
ZXR10(config-flow-exporter)#destination 169.1.109.60
ZXR10(config-flow-exporter)#transport udp 2055
ZXR10(config-flow-exporter)#export-protocol netflow-v9
ZXR10(config-flow-exporter)#template data refresh 20
ZXR10(config-flow-exporter)#template data timeout 60
ZXR10(config-flow-exporter)#exit
ZXR10(config)#sampler sam
ZXR10(config-sampler)#mode deterministic 1-out-of 1024
ZXR10(config-sampler)#exit
ZXR10(config)#flow record rec
ZXR10(config-flow-record)#match ipv4 source address
ZXR10(config-flow-record)#match ipv4 destination address
ZXR10(config-flow-record)#match transport source-port
ZXR10(config-flow-record)#match transport destination-port
ZXR10(config-flow-record)#collect counter bytes
ZXR10(config-flow-record)#collect counter packets
ZXR10(config-flow-record)#exit
ZXR10(config)#flow monitor mo
ZXR10(config-flow-monitor)#cache entries 4096
ZXR10(config-flow-monitor)#cache timeout active 6000
ZXR10(config-flow-monitor)#cache timeout inactive 1800
ZXR10(config-flow-monitor)#exporter exp
ZXR10(config-flow-monitor)#record rec
ZXR10(config-flow-monitor)#exit
ZXR10(config)#interface gei-0/1/1/4
ZXR10(config-if)#ip flow monitor mo sampler sam unicast input
ZXR10(config-if)#end
l Configuration Verification
Check the configuration on ZXR10, as shown below.
3-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
SFlow Principles
To collect network data, SFlow does the following:
3-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
rate (only for packet sampling), and sampling interval (only for interface counter
information sampling).
Note:
Packet sampling refers to a process of sampling packets at the specified rate and
recording the header information of sampled packets (the MAC layer information,
switching information or routing information can also be recorded). The SFlow-capable
device only supports recording the header information of the packets.
For a description of the parameters in Steps 2 and 3, refer to the following table:
Parameter Description
vrf < vrf-name > Vrf is used if the SFlow server is in a VPN. The vrf-name
parameter is 1–32 bytes in length.
udp-port <port-num> Specifies the protocol for SFlow output is UDP and the
corresponding port number (default: 6343).
3-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
3-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Command Function
Configuration Thought
1. Configure the outputs of the flow receiver, including the server address, port number,
and protocol type.
2. Configure the packet sampling fs and sampling rate, and bind the receiver.
3. Configure the interface counter information sampling cp and the sampling interval, and
bind the receiver.
4. Configure both cp and fs sampling on the interface, and specify the fs sampling
direction.
5. Send packets and use the SFlow software to view the received packets on the server.
Configuration Process
The configuration on ZXR10 5900E is as follows:
ZXR10(config)#sflow receiver rtest
ZXR10(config-sflow-receiver)#destination ipv4-address 192.168.1.1
ZXR10(config-sflow-receiver)#transport udp-port 6343
3-31
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10(config-sflow-receiver)#exit
ZXR10(config)#sflow fs ftest
ZXR10(config-sflow-fs)#sample-rate 285
ZXR10(config-sflow-fs)#receiver rtest
ZXR10(config-sflow-fs)#exit
ZXR10(config)#sflow cp ctest
ZXR10(config-sflow-cp)#sample-interval 40
ZXR10(config-sflow-cp)#receiver rtest
ZXR10(config-sflow-cp)#exit
ZXR10(config)#interface gei-0/1/1/1
ZXR10(config-if)#sflow fs ftest input
ZXR10(config-if)#sflow cp ctest
ZXR10(config-if)#exit
Verification
View the configuration result on ZXR10 5900E as follows:
ZXR10(config)#show running-config sflow
! <SFLOW>
sflow receiver rtest
destination 192.168.1.1
$
sflow fs ftest
receiver rtest
sample-rate 285
$
sflow cp ctest
receiver rtest
sample-interval 40
$
interface gei-0/1/1/1
sflow cp ctest
sflow fs ftest input
$
! </SFLOW>
3-32
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
3-33
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Command Function
The output example of the show logging configuration command is shown as below:
ZXR10(config)#show logging configuration
syslog level DEBUGGING
syslog-server host 192.168.100.3 fport 514 lport 514 alarmlog
syslog-server facility kern
syslog-server source 192.168.100.100
3-34
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Configuration Thought
1. Connect SYSLOG server with switch.
2. Configure SYSLOG server alarm level.
3. Configure SYSLOG type.
4. Specify SYSLOG server address.
Configuration Commands
The configuration of switch is as follows:
ZXR10(config)#syslog level WARNINGS
/*Configure alarm level of SYSLOG as WARNINGS*/
ZXR10(config)#syslog-server facility syslog
/*Configure type of SYSLOG as SYSLOG*/
ZXR10(config)#syslog-server host 1.1.1.1
/*Configure IP address of SYSLOG server*/
Configuration Verification
After configuration, use the show command to check configuration.
ZXR10(config)#show running-config | include syslog
syslog level WARNINGS
syslog-server host 1.1.1.1 fport 514 lport 514 alarmlog cmdlog debugmsg
syslog-server facility syslog
3-35
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Port mirroring can copy a part of or all traffic of source port to a designated mirroring port
or destination port.
Configuring a session with ACL, then it will be considered as traffic mirror. Traffic mirror
collects the data packets filtered by ACL.
Traffic mirror supports applying standard and extended ACL to interface and specifying
the port direction (egress or ingress).
Port mirror modules are divided into local mirror and remote mirror.
l Local mirroring
3-36
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Port mirroring also provides backup tunnel for network transmission. As shown in Figure
3-5, the data transmitted by port 1 is also transmitted by port 3 at the same time. In this
way, even if port 1 has failure, the data of port 3 is available.
ZXR10(config)#no span apply session <num> source This releases specified session
interface <interface>[direction {both|rx|tx|cpu-both to source port.
|cpu-rx|cpu-tx }]
3-37
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Command Function
ZXR10#show span session {all |<session-num>} This displays the contents of all or
the specified session.
This example shows how to use show span session all command.
ZXR10(config)#show span session all
Session 1
------------
3-38
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Session 2
------------
Destination Port: gre_tunnel2 Port Status:inactive
ZXR10(config)#
Port Status Port state: active means that it is available for using, and
inactive means that it is unavailable for using.
3-39
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Configuration Thought
1. Connect a server to an unused port gei-0/1/1/7 on switch.
2. Configure port mirroring instance.
3. Configure the destination port of port mirroring as gei-0/1/1/7.
4. Configure the source port of port mirroring as gei-0/1/1/6 on the receiving direction.
Configuration Commands
ZXR10 configuration,
ZXR10(config)#span session 1
ZXR10(config-span-session)#default destination interface gei-0/1/1/7
ZXR10(config-span-session)#exit
ZXR10(config)#span apply session 1 source interface gei-0/1/1/6 direction rx
Configuration Verification
Check the configuration by using the show command.
ZXR10(config)#show running-config span
! <SPAN>
span session 1
default destination interface gei-0/1/1/7
!
span apply session 1 source interface gei-0/1/1/6 direction rx
! </SPAN>
The messages processed by alarm module include ordinary alarm and notification.
Ordinary alarm is recoverable, and notification is only to notify the happening of some
event.
The alarm which has been reported but not recovered already is called current alarm.
The alarm which has been reported and recovered already is called history alarm. The
notification is only to notify simply that some event happens, so there is no current and
history notifications.
Alarm module residents its alarm agent process in each line card and alarm server process
in main control board. Once hardware or program runs improperly, the service applications
will report the alarm to its alarm agent. Later, alarm agents report the alarm messages to
alarm server. Alarm server records alarm messages for back-end querying.
3-40
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
According to the configuration, alarm server reports the alarm messages selectively to
log mdoule, terminal, SNMP and SYSLOG. main control board also has alarm agent to
process the alarm events occurred in itself.
3-41
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
3-42
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Parameter Description
[datetime localtime | precisetime | This sets display mode of time of alarm event.
uptime]
Parameter Description
Parameter Description
3-43
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Parameter Description
<type> The type includes All, Console, ftp, snmp and syslog.
Command Function
ZXR10#show logging alarm {[level <alarmlevel>][start-time This shows the alarm records in
<date><time>][end-time <date><time>][typeid <type>]} the alarm log buffer. The alarm
information can be filtered by
level, combination of start-time
and end-time, or typeid.
ZXR10#show logfile {[username <string>][start-time < date>< This shows the history records of
time>][end-time < date>< time>][vtyno < string>][ip-adress < configuration operation commands
ip-address>]} in the command log buffer. The
log information can be filtered by
the combination of start-time and
end-time, ipadress, user, or vtyno.
3-44
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
This example shows what is be displayed after show logging configuration command is
used.
3-45
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
3-46
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
For a description of the parameter in Steps 2 and 6, refer to the following table:
Parameter Description
Parameter Description
Parameter Description
Example
The following example shows how to clear the accumulated performance values of all
interfaces:
ZXR10#clear statistics interface
The following example shows how to enable the one-minute peak-value on the gei-0/1/1/1
interface:
ZXR10(config-intf-statistics)#one_minute_peak_value_clear gei-0/1/1/1
The following example shows how to clear the one-minute peak-value on the gei-0/1/1/1
interface:
ZXR10#one_minute_peak_value_clear gei-0/1/1/1
The following example shows how to change the interval for the PMS to sample data on
the PMA to 30 seconds on sub-interfaces:
ZXR10(config)#performance update-interval 30s sub-interface
3-47
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Command Function
For a description of the parameters in the execute result, refer to the following table:
3-48
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Configuration Thought
1. Check the count of interface gei-0/1/1/1. To check the new count, clear the previous
count.
2. Modify the time interval of sampling data from PMS to PMA to control count update
time interval of gei-0/1/1/1.
Configuration Commands
1. Clear gei-0/1/1/1 interface count:
ZXR10#clear statistics interface gei-0/1/1/1
2. Set count update time of physical port such as gei-0/1/1/1 as 30 seconds.
ZXR10(config)#performance update-interval 30s ethernet
Configuration Verification
Check whether the configuration is valid.
ZXR10(config)#show running-config performance
! <PERFORMANCE>
performance update-interval 30s Ethernet
! </PERFORMANC>
3-49
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
3-50
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Parameter Description
start <time-date> Specifies the start time of the absolute time segment, in
"hh:mm:ss MM DD YY" format. The minimum time is 00:00:00
01-01-2001. The number of seconds must be a multiple of 15.
end <time-date> Specifies the end time of the absolute time segment, in
"hh:mm:ss MM DD YY" format. The minimum time is
00:00:00 01-01-2001. The number of seconds should be 59
or a multiple of 15.
Parameter Description
3-51
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Command Output
The following is sample output from the show time-range < time-range-name> command:
ZXR10#show time-range ta
Current time is 15:28:36 07-22-2009 Wednesday
time-range ta <inactive>
absolute start 10:05:15 07-17-2009 end 10:10:30 07-17-2009
periodic tuesday 10:04:15 to 10:05:30
periodic daily 10:05:15 to 10:06:30
Current time is 15:28:36 07-22-2009 The current system time is 15:28:36, 22th, July, 2009,
Wednesday Wednesday.
absolute start 10:05:15 07-17-2009 The start time of the absolute time segment rule for the ta
end 10:10:30 07-17-2009 time range is 10:05:15 07-17-2009 . The end time is 10:10:30
07-17-2009.
periodic tuesday 10:04:15 to 10:05:30 The time period of the first relative time segment rule for the
ta time range is from 10:04:15 to 10:05:30 on Tuesday.
3-52
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
periodic daily 10:05:15 to 10:06:30 The time period of the second relative time segment rule for
the ta time range is from 10:04:15 to 10:06:30 during each
day.
It can be seen that the current statuses of all time ranges and all associated time segment
rules are displayed.
3-53
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Create a time-range and bind it with ACL. Add rules to the ACL: The Telnet packets which
match IP addresses of PC1, the protocol types are TCP and port types are Telnet will be
denied in the time segment specified by time-range. Bind the ACL in ingress of gei-0/1/1/3
or egress of gei-0/1/1/2.
After the configuration above is finished, the bound ACL only takes effect in the time
segment specified by time-range. In this time segment, PC1 cannot logs in S1. However,
PC1 still can logs in S1 at other times.
Configuration Thought
1. Create a time-range. User can name the time-range by himself. Ensure that the name
length cannot be more than 31 characters.
2. Enter time-range configuration mode after time-range is created. Under time-range
configuration mode, add time segment.
3. According to the actual requirements, bind time-range to the corresponding ACL. The
ACL can take effect in the specified time segment.
Configuration Commands
The configuration of S1 is shown below.
1. Create a time-range.
S2(config)#time-range enable
/*This enables time-range function.
time-range cannot be created if time-range
function is disbaled.*/
S2(config)#time-range test
S2(config-tr)#
/*This creates a time-range and names it test.*/
2. Add time segment to the time-range
/*Absolute time segment can either take effect in or
before a specified time, or can take effect during
a specified time segment.*/
S1(config-tr)#absolute start 10:10:15 12-12-2012 end 10:10:15 12-12-2012
/* Starting at 10:10:15 on 12-12-2012 and ending at
10:10:15 on 12-12-2012.*/
3. Create ACL and bind it to the time-range.
S2(config)#ipv4-access-list test
S2(config-ipv4-acl)#rule 1 deny tcp 10.20.30.20 0.0.0.0
eq telnet 30.20.10.1 0.0.0.0 time-range test
3-54
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 Network Management c u -tr a c k
Configuration Verification
This shows the information of time-range, including the current system time, every
time-range name, the corresponding time segments, and the state of time-range (active
or inactive).
S1(config)#show time-range
Current time is 08:36:03 08-14-2009 Friday
time-range test <inactive>
periodic daily 09:00:00 to 17:00:00
3-55
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
3-56
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 4
CHM System Configuration
Table of Contents
CHM Overview ...........................................................................................................4-1
Configuring CHM........................................................................................................4-2
Maintaining CHM........................................................................................................4-3
CHM Configuration Examples ....................................................................................4-5
l Intelligent Client
Besides the basic functions (such as controlling fan rotation and power supply), an
intelligent client is also responsible for communicating with the IPMC and processing
related data inquiry requests.
4-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
For a description of the parameters in Step 2.1, refer to the following table.
Parameter Description
<speed> Speed.
For a description of the parameters in Step 2.2, refer to the following table.
Parameter Description
4-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 CHM System Configuration c u -tr a c k
For a description of the parameters in Step 2.4, refer to the following table.
Parameter Description
For a description of the parameters in Step 2.5, refer to the following table.
Parameter Description
For a description of the parameters in Step 2.6, refer to the following table.
Parameter Description
Command Function
4-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Status Indicates the fan status. The options include normal status and
warning status.
4-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 CHM System Configuration c u -tr a c k
Type Indicates the power type. The options include DC and AC.
Mode Indicates whether the power is on. "on" indicates the power is on;
"off" indicates the power is off.
Status Indicates the power status. The options include normal status
and warning status.
4-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10#show temperature
RENV : Remote environment temperature(Celsius degree)
LENV : Local environment temperature(Celsius degree)
TH : Threshhold temperature(Celsius degree)
Now use the set temperature command to change the CPU temperature alarm
threshold.
l Configuration Thought
1. Enter the environment configuration mode.
2. Use the set temperature to configure the related temperature.
4-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 CHM System Configuration c u -tr a c k
Run the set serial-number command to set the serial number of the fan or power
supply.
l Configuration Description
The initial status of the fan or power supply is as follows:
ZXR10#show fan
Shelf 0, Fan version:V1.1, Fan serial-number:
rpm:rounds per minute
ZXR10(config)#(config-environ)#show power
Total power: 31
Power : AC/DC output power(Watt)
Shelf Index PowerID SoftwareVer Present Type Mode Power Status Serial
-number
Run the set serial-number command to change the serial number of the fan or power
supply.
l Configuration Thought
1. Enters the environmental configuration mode.
4-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
2. Run the set serial-number command to configure the fan or power supply.
3. Run the show power or show fan command to check the configuration.
l Configuration Commands
Run the following commands on the ZXR10 5900E:
ZXR10#configure terminal
Enter configuration commands, one per line. End with CTRL/Z.
ZXR10(config)#environ
ZXR10(config-environ)#set serial-number fan 123456789012 1
ZXR10(config-environ)#set serial-number power 1 abc123456789 0
l Configuration Verification
4-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 5
MAC Configuration
Table of Contents
MAC Overview ...........................................................................................................5-1
Configuring a MAC Address ......................................................................................5-1
Maintaining MAC Addresses ......................................................................................5-6
MAC Configuration Example ......................................................................................5-8
An MAC address table is the key to the correct forwarding of data packets. It shows the
mapping between the MAC addresses of hosts and the ports of an Ethernet switch, and
specifies the direction to the destination host. When the Ethernet switch receives a data
frame, it checks whether the destination MAC address of the data frame plus a VLAN index
matches the MAC address table to obtain an egress for the frame. If no match is found in
the MAC address table, the switch broadcasts the data frame to all the ports in the VLAN
except the receiving port.
The MAC address management module is responsible for managing MAC address tables.
It supports VPLS and source MAC learning in chips and network processors. All software
and hardware forwarding tables are generated based on MAC address tables, so the MAC
address management module is the core in the switch system, and the stability of this
module ensures the stability of other modules.
5-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
5-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 MAC Configuration c u -tr a c k
Parameter Description
permanent The MAC address is added permanently and does not age out.
Note that this parameter takes effect after the system reboots.
5-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
all-owner-vlan Specifies all VLANs configured for the specified interface. The
mappings between the VLANs and MAC addresses are written
into the MAC address table.
Parameter Description
Parameter Description
Parameter Description
source The packets with the source MAC address being filtered.
both The packets with source and destination MAC addresses being
filtered.
destination The packets with the destination MAC address being filtered.
Parameter Description
Parameter Description
5-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 MAC Configuration c u -tr a c k
Parameter Description
Parameter Description
For a description of the parameters in Step 12, refer to the following table:
Parameter Description
For a description of the parameters in Step 13, refer to the following table:
Parameter Description
For a description of the parameters in Step 14, refer to the following table:
Parameter Description
enable Enables MAC address flapping between interfaces with the same
priority.
disable Disables MAC address flapping between interfaces with the same
priority.
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
enable Enables MAC address flapping between interfaces with the same
priority.
disable Disables MAC address flapping between interfaces with the same
priority.
5-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
For a description of the parameters in Step 16, refer to the following table:
Parameter Description
enable Enables MAC address flapping between interfaces with the same
priority.
disable Disables MAC address flapping between interfaces with the same
priority.
For a description of the parameters in Step 17, refer to the following table:
Parameter Description
enable Enables MAC address flapping between interfaces with the same
priority.
disable Disables MAC address flapping between interfaces with the same
priority.
For a description of the parameters in Step 18, refer to the following table:
Parameter Description
For a description of the parameters in Step 19, refer to the following table:
Parameter Description
Command Function
ZXR10#show mac table [{[{ dynamic | static | permanent Displays MAC addresses.
| src-filter | dst-filter | to-static| to-permanent}],[mac],[
interface] , [vlan <1-4094>]}]
5-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 MAC Configuration c u -tr a c k
Command Function
ZXR10#show mac port-information interface Displays the MAC status information of the
<interface-name> interface.
ZXR10#show mac count {mac-day | mac-hour| mac-max} Displays the historical peak of the number
of learned MAC addresses, as well as
related time and period-based statistics.
ZXR10#show mac flow vpls <vpls-name> Displays the actions taken when the
maximum number of MAC addresses is
exceeded in the VPLS instance.
ZXR10#show mac vpls summary Displays the MAC address statistics of all
VPLS instances.
The following is sample output from the show mac table command:
The following is sample output from the show mac aging-time command:
ZXR10(config-mac)#show mac aging-time
MAC global aging time is 200 seconds.
The following is sample output from the show mac learning command:
ZXR10(config-mac)#show mac learning interface gei-0/1/1/1
MAC interface gei-0/1/1/1 learning is enable.
5-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
ZXR10(config-mac)#
The following is sample output from the show mac limit-maximum command:
ZXR10(config-mac)#show mac limit-maximum
MAC limit-maximum is 64000.
ZXR10(config-mac)#
The following is sample output from the show mac higig-learn command:
ZXR10(config-mac)#show mac higig-learn
MAC higig learn enable.
The following is sample output from the show running-config mac command:
The following is sample output from the show mac port-information command:
The following is sample output from the show mac count mac-day command:
ZXR10(config)#show mac count mac-day
MACNum Time
----------------------
ZXR10(config)#show mac count mac-hour
MACNum Time
----------------------
0 : 2010-09-16 11:03:17 UTC
2 : 2010-09-16 12:00:00 UTC
2 : 2010-09-16 13:00:00 UTC
ZXR10(config)#clear max-number
5-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 MAC Configuration c u -tr a c k
Use the show running-config mac command to check the result of DUT1 configuration:
DUT1(config-mac)#show running-config mac
! <MAC>
mac
limit-maximum 4600
$
! </MAC>
DUT1(config-mac)#
5-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
5-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 6
MAC Address Table
Configuration
Table of Contents
MAC Address Table Overview ....................................................................................6-1
Configuring a MAC Address Table..............................................................................6-4
Maintaining and Diagnosing an MAC Address Table...................................................6-5
6-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
l from: MAC address of the device from where the packet is sent.
l time: the time period that the dynamic MAC address keeps alive.
When a switch performs layer-2 forwarding, it queries the MAC address table based on
the destination MAC address and VLAN contained in a data frame, to determine to which
port the data frame is to be forwarded.
When a switch performs layer–3 forwarding, it queries the MAC address table after
obtaining the MAC address corresponding to the IP address of the next hop, and similarly
determines to which port a data frame is to be forwarded.
6-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 6 MAC Address Table Configuration c u -tr a c k
Note:
à MAC address learning is to learn the source MAC address in the data frame,
instead of the destination MAC address.
à For MAC address learning, only unicast addresses can be learned. Broadcast or
multicast addresses cannot be learned.
If the switch does not receive any data frame from a device during the specified period
(the aging time), the switch assumes that the device has already left the network. In
this case, the switch deletes the corresponding MAC address from the MAC address
table. In this way, the MAC address table can be updated in time. MAC address aging
is applied only to dynamic MAC addresses.
6-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Command Function
Command Function
6-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 6 MAC Address Table Configuration c u -tr a c k
the port, and then disable the MAC address learning function. In this way, the port does
not learn MAC addresses dynamically any more.
Command Function
Command Function
Note:
To cancel the maximum number of MAC addresses for a port or switch, run the no form
of this command.
Command Function
During the MAC address filtration configuration, port name does not need to be specified.
The switch filters data frames from all ports.
6-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Command Function
ZXR10#show mac table [{[{dynamic| static| permanent | to-static|s This shows the MAC address
rc-filter| dst-filter| to-permanent}],[<mac-address>],[interface < table.
port-name>], [vlan < vlan-id>]}]
6-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 7
RMON Configuration
Table of Contents
RMON Overview ........................................................................................................7-1
Configuring RMON .....................................................................................................7-2
Maintaining RMON .....................................................................................................7-4
Principles
A detection system (called monitor) should be placed inside each subnetwork for
monitoring purposes. The monitor checks each packet over the network, and collects
statistics (for example, the total number of packets sent and total number of error packets)
and implements analysis on these packets.
RMON defines several physical groups based on the data and functions required by
subnetwork monitoring. In this example, RMON implements four physical groups:
1. Statistics group: collects statistics on error information for each subnetwork.
2. History group: stores the information periodically sampled from the statistics group.
3. Alarm group: allows administrators to set the sampling interval and enables the RMON
system to record the alarms triggered by counters.
4. Event group: records all events generated by the RMON system.
7-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
At the same time, RMON defines 10 groups that are logically consistent. These groups rely
on each other in implementation, and may contain tables from different physical groups.
In this example, the following logical groups are concerned:
1. Ethernet statistics group: stores Ethernet statistics from each monitored Ethernet
interface. This group contains the etherStatsTable.
2. History control group: periodically samples historical data from different networks. This
group contains the historyControlTable.
3. Ethernet history group: stores the periodically-sampled data from Ethernet for future
use. This group contains the etherHistorytable.
4. Alarm group: collects the statistics on the specified variable periodically, and compares
it with the pre-defined threshold. If the monitored variable exceeds the threshold, an
alarm is raised. The delay mechanism is used to restrict the number of alarms. This
group contains the alarmTable and should cooperate with the event group.
5. Event group: controls the generation of monitored events and determines whether to
inform the system. This group contains an eventTable and a logTable.
Parameter Description
7-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 RMON Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
7-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
Parameter Description
Command Function
Parameter Description
The following is sample output from the show rmon alarms command:
ZXR10(config-rmon)#show rmon alarms
Alarm 1 is valid, and owned by zte
Monitors interfaces.1.0,every 200 second(s)
Taking absolute samples, last value was 7
Rising-threshold is 100,assigned to event 0
Falling-threshold is 10,assigned to event 0
On startup enable rising or falling alarm
7-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 RMON Configuration c u -tr a c k
The following is sample output from the show rmon events command:
ZXR10(config-rmon-if)#show rmon events
Event 2 is valid, and owned by config
Description is zte
Event firing causes log and trap to community/user public, last fired 0w0d,00:00:00
Current log entries:
index time description
The following is sample output from the show rmon history command:
ZXR10(config-rmon-if)#show rmon history
historyControlEntry 1 is valid,and owned by monitor
Monitors ifEntry.1.2 (gei-0/1/1/1) every 30 seconds
Requested buckets is 10
Granted buckets is 50
The following is sample output from the show rmon statics command:
7-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
7-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 8
PoE Configuration
Table of Contents
PoE Overview ............................................................................................................8-1
Configuring PoE ........................................................................................................8-2
Maintaining PoE .........................................................................................................8-6
PoE Configuration Example........................................................................................8-7
8-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
The ZXR10 5950–36PM-H and ZXR10 5950–56PM-H switches support the PoE function.
l The ZXR10 5950-36PM-H provides 24 1000 Base-T electrical interfaces, four combo
interfaces, and two expansion slots. It supports PoE and PoE+. For PoE+, full-load
power supply complying with the 802.3at standard must be provided for two thirds
of the ports. The first four interfaces support PoE+ with a maximum of 60 W. The
ZXR10 5950-36PM-H supports modular dual-power and power-down protection, and
provides AC power supply and DC power supply.
l The ZXR10 5950-56PM-H provides 48 1000 Base-T electrical interfaces, and two
expansion slots. It supports PoE and PoE+. For PoE+, full-load power supply
complying with the 802.3at standard must be provided for 26 ports. The first four
interfaces support PoE+ with a maximum of 60 W. The ZXR10 5950-56PM-H
supports modular dual-power and power-down protection.
The ZXR10 5900E provides the following PoE functions:
1. Enables or disables the PoE function on ports.
2. Provides power supply with different powers on ports.
3. Supports port priorities. Power supply is preferentially provided for a port with a higher
priority.
4. Supports configuring the maximum output power for the device.
5. Supports PoE and PoE+. Some ports support 60 W PoE+.
6. Supports remote power supply for ports.
7. Supports configuring the PoE time range.
8. Supports port power detection. If the actual power is greater than the PSE-distributed
power, the device stops providing power supply for ports.
9. Supports stopping providing power supply for new PoE ports if the entire-device PoE
power is exceeded.
10. Supports displaying the PSE power supply state and PD power supply state, such as
whether power supply is provided, power, level, and temperature.
11. Supports testing consistency between 802.3AF and 802.3AT.
12. Supports testing the compatibility of devices connected to ports.
13. Supports over-temperature protection recovery.
14. Supports the PoE module alarm function.
15. Supports online upgrade of PoE power supply management software.
Command Function
8-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 PoE Configuration c u -tr a c k
Command Function
Command Function
Command Function
By default, the priority of each PoE port is critical (the highest priority), and the power
supply order depends on port number. The power supply is preferentially provided for a
port with a smaller port number. If the priorities of ports are different, the power supply is
provided based on priorities.
Command Function
Parameter description:
Parameter Description
8-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
There is a difference between the PSE power and the PD power. For example, if the PSE
power is set to 30 W, the actual PD power is about 25 W. The cause is that the PoE supply
voltage is low and the current is high, and then the power loss is great.
If the power supply is provided for the device operating in full-power state, much heat is
generated within a short period in the PD due to a large number of ports. Therefore, ensure
that fans of the PD are operating properly.
For the ZXR10 5950-36PM-H and ZXR10 5950-56PM-H, only the first four ports support
the power supply with a maximum of 60 W. Other ports support the power supply with a
maximum of 30 W.
8-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 PoE Configuration c u -tr a c k
Note:
The maximum power cannot be set to auto for the first four ports.
The device supports PoE with the minimum distance of 100 meters.
Command Function
Before configuring the PoE timer, you need to enable the timer function in time-rang
e mode and create the corresponding timer. You can run the show poe config interface
command to verify that the configuration is applied.
To configure the function that the PoE power supply is provided in the specified time period,
enter time-range configuration mode from global configuration mode, set the start time and
end time, enter PoE configuration mode, and bind the time range to the specified port.
Command Function
Parameter description:
Parameter Description
Command Function
Parameter description:
Parameter Description
8-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
Parameter Description
If the power supply is provided for the device operating in full-power state, the
over-temperature protection recovery function must be enabled for the device. When the
device detects that the temperature on a port is higher then 80ºC, the device stops PoE
and generates an alarm. After the temperature is lower, the device provides PoE again.
Configuring the Alarm Threshold for the Electric Energy Occupancy Rate
Command Function
Parameter description:
Parameter Description
Command Function
The show poe config interface command displays the PSE configuration power, and the
show poe interface displays the actual PD power. If the required PD power is greater than
the PSE configuration power, PoE must be disabled on ports.
8-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 PoE Configuration c u -tr a c k
Configuration Flow
1. Enter PoE configuration mode.
2. Enable the PoE function for the ports connected to IP phones.
Configuration Commands
The configuration on the ZXR10 5950-36PM-H is as follows:
ZXR10(config)#poe
ZXR10(config-poe)#interface gei-0/1/1/5
ZXR10(config-poe-if-gei-0/1/1/1)#enable
ZXR10(config-poe-if-gei-0/1/1/1)#exit
ZXR10(config-poe)#interface gei-0/1/1/28
ZXR10(config-poe-if-gei-0/1/1/28)#enable
ZXR10(config-poe-if-gei-0/1/1/28)#exit
Configuration Verification
Run the show poe interface command to view PoE power supply information on the ports.
ZXR10(config-poe)#show poe interface gei-0/1/1/5
power up : on
power device : delivering power
power device type : IEEE802.3 AF power device
802.3af classification : class 0
interface current-power : 4.3w
interface avg-power : 4.3w
interface peak-power : 4.4w
8-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
8-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures
Figure 1-1 ZXR10 5900E's Configuration Methods ................................................... 1-1
Figure 1-2 Network Scenario for the FTP Server....................................................... 1-2
Figure 1-3 Network Scenario for the FTP Client ........................................................ 1-2
Figure 1-4 FTP Server Configuration Example ......................................................... 1-4
Figure 1-5 Connect to Server Dialog Box .................................................................. 1-5
Figure 1-6 Filezilla Server Dialog Box ....................................................................... 1-6
Figure 1-7 Users Dialog Box ..................................................................................... 1-6
Figure 1-8 Target User Settings ................................................................................ 1-7
Figure 1-9 TFTP Server ............................................................................................ 1-9
Figure 1-10 Configure Dialogue Box ......................................................................... 1-9
Figure 1-11 Hyper Terminal Connection 1 ............................................................... 1-11
Figure 1-12 Connection Description ........................................................................ 1-11
Figure 1-13 Selecting a Serial Port ......................................................................... 1-12
Figure 1-14 COM Properties ................................................................................... 1-12
Figure 1-15 Running Telnet..................................................................................... 1-14
Figure 1-16 Telnet.Exe Window .............................................................................. 1-15
Figure 1-17 SSH Client Login Configuration............................................................ 1-23
Figure 1-18 SSH Client Select Version Configuration .............................................. 1-23
Figure 1-19 Successful Login Interface ................................................................... 1-24
Figure 2-1 VSC Configuration Example .................................................................. 2-29
Figure 3-1 SNMP Configuration Example Topology................................................. 3-12
Figure 3-2 NetFlow V5 Configuration Example........................................................ 3-25
Figure 3-3 NetFlow V9 Configuration Example........................................................ 3-26
Figure 3-4 SYSLOG Configuration Example Topology ............................................ 3-35
Figure 3-5 Port Mirroring Principle .......................................................................... 3-37
Figure 3-6 Port Mirroring Configuration Example .................................................... 3-39
Figure 3-7 Performance Management Configuration Example Topology
Diagram................................................................................................ 3-49
Figure 3-8 Time Range Configuration Example Topology........................................ 3-54
Figure 8-1 PoE Application Scenario......................................................................... 8-1
Figure 8-2 PoE Configuration Example ..................................................................... 8-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Figures c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Glossary
BGP
- Border Gateway Protocol
CPU
- Central Processing Unit
FTP
- File Transfer Protocol
IS-IS
- Intermediate System-to-Intermediate System
LLDP
- Link Layer Discovery Protocol
MAC
- Media Access Control
NM
- Network Management
NMS
- Network Management System
NVRAM
- Non-Volatile Random Access Memory
OSPF
- Open Shortest Path First
PDU
- Packet Data Unit
PMS
- Performance Management Subsystem
RFC
- Request For Comments
RIP
- Routing Information Protocol
RMON
- Remote Monitoring
SD
- Secure Digital memory card
SNMP
- Simple Network Management Protocol
III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Basic Configuration) c u -tr a c k
SSH
- Secure Shell
TCP/IP
- Transmission Control Protocol/Internet Protocol
TFTP
- Trivial File Transfer Protocol
UDP
- User Datagram Protocol
VTY
- Virtual Teletype
IV
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Version: 3.00.11
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: [email protected]
h a n g e Vi h a n g e Vi
XC e XC e
F- w F- w
PD
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
LEGAL INFORMATION
Copyright © 2015 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Contents
About This Manual ......................................................................................... I
Chapter 1 Static Route Configuration ...................................................... 1-1
1.1 Static Route Overview ........................................................................................ 1-1
1.2 Configuring a Static Route .................................................................................. 1-2
1.3 Maintaining Static Route ..................................................................................... 1-4
1.4 Static Route Configuration Examples................................................................... 1-6
1.4.1 Basic Static Route Configuration Example ................................................. 1-6
1.4.2 Static Route Summary Configuration Example ........................................... 1-8
1.4.3 Default Route Configuration Example ........................................................ 1-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures............................................................................................................. I
Glossary ........................................................................................................ III
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Intended Audience
This manual is intended for:
l Network planning engineers
l Commissioning engineers
l On-duty personnel
Chapter 1, Static Route Configuration Describes how to configure static route on the
ZXR10 5900E.
Conventions
This manual uses the following typographical conventions:
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 1
Static Route Configuration
Table of Contents
Static Route Overview ................................................................................................1-1
Configuring a Static Route..........................................................................................1-2
Maintaining Static Route.............................................................................................1-4
Static Route Configuration Examples .........................................................................1-6
1-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Command Function
Parameter Description
<next hop address> IP address of the next hop, in dotted decimal notation
Command Function
1-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Static Route Configuration c u -tr a c k
Parameter Description
<next hop address> IP address of the next hop, in dotted decimal notation
[global] Private network route can configure the next hop of public
network, only when the next hop of private network is
configured, it can be configured.
[metric <metric>] Metric value of route, range: 0-255, the default value is 0
Configuration Example
As show in Figure 1-1, S2 advertises 20.20.20.0/24 to S1. The static route to 30.2.0.0/16
can be configured on S1, the next hop is 20.20.20.2.
1-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Command Function
ZXR10(config)#ip route-static [vrf <vrf-name>] fast-reroute This enables the FRR function of
static routes.
The generation conditions for
the primary and standby routes
of static routes are: the same
destination address route with
different outgoing interfaces,
different administrative distances
or metric values.
Parameter Description
Command Function
ZXR10#show ip protocol routing [vrf <vrf_name>] This shows routing table of the
router. Vrf_name is the name of
vrf.
1-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Static Route Configuration c u -tr a c k
Command Function
ZXR10#show ip forwarding route [vrf <vrf_name>] This shows forwarding table of the
router. Vrf_name is the name of
vrf.
Use show ip protocol routing command to show global routing table of the router. Inspect
whether the configured static route exists in routing table. This command is often used for
routing protocol diagnose and maintenance.
This shows what will be displayed after show ip protocol routing is used.
ZXR10(config)#show ip protocol routing
Protocol routes:
status codes: *valid, >best, i-internal, s-stale
Use show ip forwarding route command to show forwarding table of router for inspecting
whether there is static route in forwarding table.
This shows what will be displayed after show ip forwarding route is used.
ZXR10(config)#show ip forwarding route
Status codes: *valid, >best, M: Master, S: Slave;
IPv4 Routing Table:
Dest Gw Interface Owner Pri Metric
10.10.10.0/24 10.10.10.1 vlan1 STAT 0 0
10.10.10.1/32 10.10.10.1 vlan1 ADDR 0 0
20.20.20.0/24 10.10.10.2 vlan1 ADDR 110 2
30.2.0.0/16 10.10.10.2 vlan1 DIRECT 1 0
224.0.0.0/4 224.0.0.0 NULL RIP 0 0
224.0.0.0/24 224.0.0.0 NULL DIRECT 0 0
1-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Gw Gateway
Configuration Process
There are three methods to configure static routes on S1.
l This configures IP address of the next hop.
S1(config)#ip route 140.1.1.0 255.255.255.0 10.6.1.18
l This configures the local egress interface and the direct next hop.
S1(config)#ip route 140.1.1.0 255.255.255.0 vlan1 10.6.1.18
Configuration on S2:
S2(config)#ip route 140.1.1.0 255.255.255.0 10.9.1.39
1-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Static Route Configuration c u -tr a c k
Configuration Check
Use show command to validate configuration.
Validate configuration on S1:
S1(config)#show ip protocol routing network 140.1.1.0
Protocol routes:
status codes: *valid, >best, i-internal, s-stale
If there are multiple paths to the same destination, a router can be configured with multiple
static routes with different administrative distances. However, routing table only displays
information about route with minimum distance because when router is informed of multiple
competition sources to a network, route with minimum administrative distance takes the
precedence.
Parameter <distance-metric> in static route configuration command about IP route can be
used to change administrative distance value of a static route. Supposing there are two
different routes from S1 to network section 140.1.1.0/24, the configuration is as follows:
S1(config)#ip route 140.1.1.0 255.255.255.0 10.6.1.18
S1(config)#ip route 140.1.1.0 255.255.255.0 10.6.1.1 20
Above commands are used to configure two different static routes arriving to the same
network segment. The first command does not configure administrative distance, so
default value “1” is used. The second command configures administrative distance of 20.
Since administrative distance of the first route is less than that of the second route, only
information about first route appears in routing table. That is, the switch sends packets to
destination network segment 140.1.1.0/24 through next-hop address 10.6.1.18 only. The
second route appears in routing table only when the first route fails and disappears from
the routing table. The two static routes can not have the same tag value, which go to the
same destination network but their next-hop is different.
Use show command to view on S1:
S1(config)#show ip protocol routing network 140.1.1.0
Protocol routes:
status codes: *valid, >best, i-internal, s-stale
1-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
As shown in Figure 1-3, S2 connects to two network segments 10.9.1.0/24 and 10.3.1.0/24.
If S1 wants to access these two network segments, it needs to have two static routes.
When there are lots of routes in routing table, people can use summary static route to
optimize S1's routing table.
Configuration Thought
Configure a static route whose destination address is 10.0.0.0 on S1. All the packets
transmitted to destination network segment 10.0.0.0/8 pass through 10.6.1.18. That is
to say, all the packets which destination address is 10.0.0.0/8 (sub networks 10.3.1.0/24
and 10.9.1.0/24) are sent to 10.6.1.18. In this way, multiple static routes with the same
destination can be summarized to a static route, which can optimize routing table.
Configuration Process
Configuration on S1:
S1(config)#ip route 10.0.0.0 255.0.0.0.0 10.6.1.18
Configuration Check
Use show command to view on S1:
1-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 Static Route Configuration c u -tr a c k
Configuration Thought
Default route configuration is completely the same as static route configuration and only
difference is that the network part and subnet mask part are all 0.0.0.0.
Configuration Process
Configuration on S1:
S1(config)#ip route 0.0.0.0 0.0.0.0 10.6.1.18
Configuration Check
Use show to view S1 routing table.
S1#show ip protocol routing
Protocol routes:
status codes: *valid, >best, i-internal, s-stale
1-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Here, if the next hop is configured as null interface, the route is black hole route.
Configuration on S1:
S1(config)#ip route 0.0.0.0 0.0.0.0 null1
Default route is not always a static route. It also can be routes of other protocols, such
as Border Gateway Protocol (BGP), Routing Information Protocol (RIP) and so on. When
default route is used in routing protocol configuration, default route varies with routing
protocols.
If default route is configured on a router where RIP runs, the RIP will advertise the default
route to its neighbor, and even route redistribution is not needed in RIP domain.
For BGP protocol, a router where the BGP runs will not inject the default route into its
neighbor automatically. For BGP to send the default route to BGP domain, the command
default-information-originate has to be used first, and then redistribute default route.
1-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 2
RIP Configuration
Table of Contents
RIP Overview .............................................................................................................2-1
Configuring RIP .........................................................................................................2-3
RIP Maintenance........................................................................................................2-8
RIP Configuration Example ......................................................................................2-13
2-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
2-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
3. When the switch which sends request receives the response message, it will process
the route update message information containing in response message.
l For an new route entry, the router adds the new route and IP address of the ad-
vertised router to its routing table.
l For an existent RIP route, the router replaces the original route entry only when
the new route has less hop count.
1. Enabling RIP
3 ZXR10(config-rip)#output-delay < packets>< delay> This sets the delay time for
sending RIP update packets.
2-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
<update> The interval for sending update, the unit is second, the
range is 1-65535, and the default value is 30 seconds.
Parameter Description
Configuration Example
ZXR10(config)#router rip
ZXR10(config-rip)#timers basic 5 15 15 30
ZXR10(config-rip)#output-delay 500 10
2-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
2-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
4 ZXR10(config-if)#ip rip authentication key <key> This sets the key for interface
plain text authentication.
The length of key is 1-16
characters.
To configure RIP packet MD5 authentication mode, perform the following steps.
Parameter Description
2-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
It is suggested that users do not change the default state of split horizon unless to
ensure to advertise route correctly. If the split horizon is disabled on serial port (and
the port connects to packet switching network), then those of all the related routers
and access servers have to be disabled.
4. Configuring route redistribution
To redistribute routes from a routing domain to RIP routing domain, perform the
following steps.
Parameter Description
metric <metric-value> Specifies the route metric to introduce the route. If it is not
specified, the default-metric is used. Its range is 1-16.
route-map <map-tag> The name of the route map for redistribution, 1-31
characters.
To specify RIP version for router receiving or sending packets, use the following
commands.
2-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
To specify the RIP version of packets to be sent or received by an interface, perform the
following commands.
RIP default state specified by version command can be ignored.
Parameter Description
2 The interface only sends RIPv2 packets. Here, broadcast or multicast mode can
be selected.
broadcast The interface send compatible packets to broadcast address. All of routes are natural
networks, and no supernetting route.
multicast The interface sends RIPv2 packets to multicast address. By using auto-summary,
sub network route can be sent.
2-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
Command Function
ZXR10(config)#show ip rip database [vrf <vrf-name>][network This shows the route entries
<ip-address>[mask <net-mask>]] generated by RIP.
ZXR10(config)#show ip rip networks [vrf <vrf-name>] This shows information of all RIP
interfaces.
Parameter Description
This example shows what will be displayed after show ip rip is used.
ZXR10#show ip rip
router rip
auto-summary
default-metric 1
distance 120
validate-update-source
version 2
flash-update-threshold 5
maximum-paths 1
output-delay 5 100
timers basic 30 180 180 240
network
10.0.0.0 0.255.255.255
2-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
default-metric This sets the default metric value for redistributing the routes
generated by other protocol to RIP routes.
Use no to restore the default value of 1.
This command can be used with redistribute command
together to make route selection protocol use the same
metric value for all redistributed routes.
Default metric helps to solve the route redistribution problem
caused by routes adopting different metric values. It can
provide a reasonable alternative method to ensure that the
redistribution can be performed successfully.
validate-update-source This enables the function that check the validity of source IP
address of the received RIP updating packet.
Use no to disable this function.
This command shows what will be displayed after show ip rip database is used.
ZXR10(config)#show ip rip database
Routes of rip:
h : is possibly down,in holddown time
2-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
InstanceID Instance number, only valid for OSPF instance and IS-IS
instance
Time It shows the existing time and timer state of the route.
This example shows what will be displayed after show ip rip interface is used.
ZXR10(config-rip)#show ip rip interface vlan1
vlan1 ip address:137.1.1.2/24 rip is enabled
receive version 1 2
send version 2
split horizon is effective
poison reverse is effective
send subnet only is ineffective
notify default unset
originate default unset
neighbor restrict is ineffective
interface is nomoral
authentication type:none
2-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
send subnet only This shows that after this command is used, the interface
only sends the information of the route which belongs to the
same sub network with itself, and it blocks the information of
the route which belongs to other sub network.
It applies to such a case that the lower router sends route
information to upper router. Only the information of local sub
network needs to be advertised. In this way, the route traffic
can be reduced a lot.
notify default The route entry sent by interface contains default route.
For parameter only, that means the route entry sent by
interface only contains default route.
This example shows what will be displayed after show ip rip neighbors is used.
ZXR10#show ip rip neighbors
neighbor address interface
10.1.1.15 vlan2
2-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
Configuration Thought
1. Configure interface IP addresses.
2. Configure RIP.
3. Enable RIP configurations on interfaces.
4. Test configuration result to make sure that neighborhood is established between S1
and S2. S1 and S2 can learn the routes advertised by the peer between each other.
Configuration Process
Configuration on S1:
S1(config)#interface vlan10
S1(config-if)#ip address 192.168.1.1 255.255.255.0
S1(config-if)#exit
S1(config)#interface vlan20
S1(config-if)#ip address 10.1.0.1 255.255.0.0
S1(config-if)#exit
S1(config)#router rip
S1(config-rip)#network 192.168.1.1 0.0.0.255
S1(config-rip)#network 10.1.0.1 0.0.255.255
S1(config-rip)#exit
Configuration on S2:
S2(config)#interface vlan10
S2(config-if)#ip address 192.168.1.2 255.255.255.0
S2(config-if)#exit
S2(config)#interface vlan20
2-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Check
After the configuration is finished, the following information needs to be displayed, that
indicates the neighborhood is established between S1 and S2, and they can learn routes
between each other.
Use show running-config rip on S1 to inspect whether RIP configuration is correct.
S1(config-rip)#show running-config rip
router rip
network 192.168.1.0 0.0.0.255
network 10.1.0.0 0.0.255.255
interface vlan10
$
interface vlan20
$
!
2-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 RIP Configuration c u -tr a c k
interface vlan10
$
!
2-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
2-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 3
OSPF Configuration
Table of Contents
OSPF Overview .........................................................................................................3-1
Configuring the OSPF Protocol ..................................................................................3-8
Maintaining the OSPF Protocol ................................................................................3-38
OSPF Configuration Examples.................................................................................3-45
OSPF Basic
An OSPF switch generates the routing table by setting up a link state database. The link
state databases of all OSPF switchs must be the totally same. Link state database is built
according to Link State Advertisements (LSAs) which are generated by all switchs and
spread over the whole OSPF network. There are many types of LSAs, and a complete
LSA set shows an accurate distribution diagram over the whole network.
3-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
OSPF Algorithm
OSPF uses cost as the metric. The cost is distributed to each port of a switch. A port
calculates the cost based on 100 M benchmark by default. The path cost to a particular
destination is the total cost of all links between the switch and the destination.
To generate a routing table by using LSA database, a switch runs the Dijkstra SPF
algorithm to construct the shortest path tree. switch is the root of the path tree. The
Dijkstra algorithm calculates the a path with the lowest cost to any node on the network.
switch saves the routes of the paths in the routing table.
Compared to RIP, OSPF does not simply broadcast all its routing information regularly.
An OSPF switch uses hello packets to keep the neighborhood. When a switch does not
receive any hello packets from a neighbor within a period of time (dead-interval), then it
will consider that the neighbor is not already alive.
OSPF routes are incrementally updated. switch sends the update information only when
topology changes. When the age of an LSA reaches 1800 seconds (LSA updating interval,
LSRefreshTime), switch sends an LSA updating packet.
3-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
2. Router dead-interval
The router dead-interval refers to the waiting time from the router receiving the last
hello packet to the router detecting that the neighbor is offline. The default router
dead-interval is four times of HELLO packet sending interval, which is applicable to all
network types.
3. Poll Interval
Poll interval only applies to NBMA network.
OSPF Neighbors
OSPF neighbors are a group of routers belonging to the same network. These routers
stipulate some configuration parameters. The routers must be neighbors to form
adjacency. To form adjacency, the routers have to be neighborhood.
Routers analyze their HELLO packets to make sure that the required parameters are
stipulated when they want to form neighborhood. The following parameters have to be
consistent so that the adjacent routers can set up neighborhood, area ID, area flag,
authentication information, HELLO packet sending interval and router dead interval.
Adjacency and DR
When two routers form an adjacency, they can exchange routing messages. Whether two
routers can form an adjacency depends upon network type connected to routers. The
network type of the connecting router decides whether two routers can form adjacency.
l There are only two routers in point-to point network or virtual links. The two routers
have to exchange the related routing information, so they can form an adjacency
automatically. A point-to-multipoint network can be regarded as a set of point-to-point
networks, so an adjacency is formed between each pair of routers.
l In a broadcast or an NBMA network, an adjacency may not be formed between two
neighbors. If adjacencies are already established among all routers (the number
of routers is "n" for example) on a network, each router will have "(n-1)" adjacent
connections and the network will have "n×(n-1)/2" adjacent connections.
In a large multi-access network, the router will be too heavy traffic if every one needs to
trace so many adjacent connections. Furthermore, the exchanging of routing information
between each adjacent routers wastes lots of network bandwidths.
Since a large multi-access network has a mass of redundancy information, OSPF defines
a DR and a BDR. The DR and BDR must form an adjacency with each OSPF router on
network. Each OSPF router only forms an adjacent relationships with DR and BDR. All
routers only send routing information to DR, and DR sends the information to other routers
in the same network segment. The two routers (neither DR nor BDR) do not establish an
adjacency between each other and neither will they exchange routing information. If the
DR stops working, the BDR will become a DR.
3-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
OSPF Area
To reduce the information size that each router stores and maintains and shield the range
that network changing influences on, OSPF divides a network into some minor parts.
Each router must have the complete information of the area where it locates. Area
Border Router (ABR) is used to transmit routing information between different areas. The
information is shared by areas. The routing information can be filtered on area edge,
which reduces the routing information stored in routers.
An area is identified with 32-bit unsigned number. Area 0 is reserved to identify backbone
network, and all other areas must be connected to area 0. The backbone area of OSPF
network has to be continuous. Routers can be one or multiple of the following types
according to its tasks in the area, as shown in Figure 3-1.
l Internal router
All interfaces of the router belong to the same OSPF area. An internal router only
generates a Router LSA and saves a Link-state Database (LSDB).
3-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
l Backbone router
A router that its one interface belongs to area 0 at least.
l ABR
A router that its one interface belongs to area 0 at least and one interface belongs to
other area at least.
All ABRs are backbone routers.
l Autonomous System Border Routers (ASBR)
The router has other routing protocols, such as static route, interface direct route and
RIP, IGRP and so on.
The advantages of area division are listed below:
l Since ABR generates LSAs according by using routes in its area after dividing areas,
the routes can be aggregated firstly according to the rule of IP addresses, and then
generate LSAs. In this way, the number of LSAs is reduced a lot in AS.
l After the area is divided, the changing of network topology is synchronized in the area
firstly. If the changing influences on the aggregated route, ABR will notify the changing
to other areas. In this way, most of topology changings are shielded in the area.
3-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Summary LSAs are sent out area, which describe some information of a route, such
as the destination address, mask and cost. A Network summary LSA is transmitted
to all areas except the area which generates the LSA.
l Type 4: ASBR summary LSA
The ASBR summary LSA is also generated by an ABR. It describes the route that
goes to the ASBR in the area. The content of ASBR Summary LSA is almost the
same to that of Network summary LSA. The only difference is that the destination
address described by ASBR summary LSA is ASBR (host route, the mask is 0.0.0.0).
A ASBR summary LSA is transmitted to all areas except the area which generates
the LSA.
l Type 5: External LSA of AS
The external LSA of AS is generated by an ASBR. It mainly describes the information
of an route which goes to the external AS. An external LSA of AS contains some
information, such as destination address, mask and cost and so on. External LSA of
AS is an unique type that is independent of area. An external LSA of AS is transmitted
in the whole AS (except STUB area).
l Type 7: External LSA of Not-So-Stubby Area (NSSA)
External LSA of NSSA only applies to NSSA.
l Type 9: Local non-transparent LSA
l Type 10: Area non-transparent LSA
OSPF operation depends on all the routers in one area which share a common link state
database. Therefore, all LSAs are flooded through the area and the processing must be
reliable. A router which receives LSAs from a special area will flood the LSAs to other
interfaces which belong to the i area.
LSAs do not have their own packets, and they are contained in Link state Update (LSU)
packets. A LSU can contain many LSAs.
When a router receives a LSU, it abstracts the LSA from the packet and inputs the LSA to
its database. Meanwhile, the router constructs its own LSU and sends the updated LSU
to its adjacent neighbor router(s).
OSPF uses Link State Acknowledgement (LSAck) to confirm whether each LSA is
successfully received by its neighbor. A LSAck has the header of an acknowledged LSA,
which provides sufficient information for uniquely identifying an LSA.
When a router sends a LSA to an interface, the LSA is recorded in the retransmission
queue of the interface.
The router will wait the maximum time interval to receive the LSAck of LSA. If the router
does not receive the LSAck in the specified time, it will retransmit the LSA.
The router can send the original LSU in unicast or multicast mode, but the retransmitted
LSU is must in unicast mode.
3-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
If the ABR also filters the LSA of type 3 and advertises a default route arriving to an AS
external destination address, the area is called totally stubby area.
Not-So-Stubby Area
A router in a stub area refuses LSAs of type 5, so ASBR is not a part of the stub area.
However, it is hoped that a stub area with an ASBR can be generated. In this way, routers
in the area can receive AS external routes from the ASBR belonging to the same area, but
the external routing information from other areas will be blocked.
To realize such an area, OSPF defines NSSA. In a NSSA, an ASBR generates LSAs of
type 7 instead the LSAs of type 5. The ABR can not send the LSAs of type 7 to other
OSPF areas. On the one hand, it blocks external routes to arrive the NSSA area at the
area border. On the other hand, it converts the LSAs of tyoe 7 into the LSAs of type 5 and
sends them to other areas.
OSPF Authentication
Authentication is used to exchange packets between two OSPF neighbors. The
authentication type should be consistent on the OSPF neighbors. Authentication type is
contained by all packets.
Authentication type "0" indicates no authentication, "1" indicates simple password
authentication and "2" indicates MD5 encryption authentication.
For plain text authentication, an interface only allows a password. The password of each
interface can be different, but the interfaces in a special network must have the same
passwords. The simple password is sent through OSPF packets in plain text mode.
DownBit
When Multiprotocol BGP (MP-BGP) routes are redistributed to OSPF vrf instance to
generate LSAs, the option fields of type-3 and type-5 LSAs must be marked as down bit.
The LSAs are displayed as Downward. This is a method to prevent routing loopback.
3-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
When a PE router detects that a LSA is already marked as down bit, the PE will not
participate in the OSPF route calculation. When OSPF routes are redistributed to BGP,
the LSAs with down bit are not redistributed to be BGP route.
max-metric
Considering the requirements for traffic management and so on, some routers need to act
as the terminal rather than transit points of the route. In order to add the nodes without the
capability of traversing to the network, the max-metric function is used.
For example, a router just restarts, and BGP route does not converge, use the max-metric
router-lsa on-startup wait-for-bgp command to avoid route black hole.
3-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Configuration Example
Enable the OSPF protocol on S1, S2 and S3, see Figure 3-2.
Router IDs are listed below:
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
3-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
......
Area 0.0.0.0 enable
Enabled for 00:00:05
Area has no authentication
Times spf has been run 1
Number of interfaces 1. Up 1
The OSPF protocol is enabled and configured on S1. The router ID is the IP address of
interface vlan1.
Run the following commands on S2. To set up an OSPF connection by using the loopback
address, the loopback address needs to be configured first, and then you need to enable
the OSPF process.
S2(config)#interface loopback1
S2(config-if-loopback1)#ip adderss 1.1.1.3 255.255.255.255
S2(config-if-loopback1)#exit
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 30.0.0.2 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 30.0.1.2 255.255.255.252
S2(config-if-vlan20)#exit
S2(config)#router ospf 10
S2(config-ospf-10)#network 30.0.0.0 0.0.0.3 area 0
S2(config-ospf-10)#network 30.0.1.0 0.0.0.3 area 0
S2(config-ospf-10)#exit
Run the following command to check the OSPF information. OSPF selects the IP address
of loopback 1 as the router ID automatically.
S2(config)#show ip ospf
OSPF 10 Router ID 1.1.1.3 enable
Enabled for 00:00:09,Debug on
Number of areas 0, Normal 0, Stub 0, NSSA 0
3-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Protocol routes:
status codes: *valid, >best, i-internal, s-stale
Dest NextHop RoutePrf RouteMetric Protocol
*> 1.1.1.4/0 192.168.14.2 115 20 isis-l2
*> 30.0.1.0/32 10.10.10.1 0 0 connected
*> 30.0.1.1/16 10.10.10.2 1 0 static
Configuration Example
3-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Modify the OSPF parameters on interfaces that run the OSPF protocol, see Figure 3-3.
Router IDs are listed below:
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
Enable the OSPF protocol on S1 and S2, and advertise the network segment.
Run the following commands on S1:
S1(config)#interface loopback1
S1(config-if-loopback1)#ip adderss 1.1.1.2 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 30.0.0.1 255.255.255.252
S1(config-if-vlan10)#exit
S1(config)#router ospf 10
S1(config-ospf-10)#network 30.0.0.0 0.0.0.3 area 0
S1(config-ospf-10)#router-id 1.1.1.2
S1(config-ospf-10)#exit
3-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
S1(config)#router ospf 1
S1(config-ospfv2-1)#interface vlan10
S1(config-ospfv2-1-if-vlan10)#hello-interval 20
/*Sets the interval for sending HELLO packets on the
specified interface to 20 seconds.*/
S1(config-ospfv2-1-if-vlan10)#dead-interval 80
/*Sets the duration for considering a neighbor to be dead
to 80 seconds.*/
S1(config-ospfv2-1-if-vlan10)#retransmit-interval 10
/*Sets the interval for retransmitting LSA to 10 seconds.*/
S1(config-ospfv2-1-if-vlan10)#retransmit-delay 2
/*Sets the delay for transmitting a link state update
packet to 2 seconds.*/
S1(config-ospfv2-1-if-vlan10)#cost 10
/*Sets the cost to 100.*/
S1(config-ospfv2-1-if-vlan10)#priority 10
/*Sets the interface priority to 10.*/
3-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
Configuration Example
Configure the authentication function on OSPF interfaces of S1 and S2, see Figure 3-4.
Router IDs are listed below.
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
In area 0, establish OSPF neighborhood between S1 and S2. In area 1, establish OSPF
neighborhood between S2 and S3.
Run the following commands on S1:
S1(config)#interface loopback1
S1(config-if-loopback1)#ip adderss 1.1.1.2 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 30.0.0.1 255.255.255.252
S1(config-if-vlan10)#exit
3-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
S1(config)#router ospf 10
S1(config-ospf-10)#router-id 1.1.1.2
S1(config-ospf-10)#network 30.0.0.0 0.0.0.3 area 0
S1(config-ospf-10)#exit
Enable the plain text authentication function on interfaces that belong to area 0, and set
the authentication password to zte.
Run the following commands on S1:
S1(config)#router ospf 10
S1(config-ospf-10)#area 0 authentication
S1(config-ospf-10)#interface vlan1
S1(config-ospf-10-if-vlan1)#authentication
S1(config-ospf-10-if-vlan1)#authentication-key zte
S1(config-ospf-10-if-vlan1)#exit
3-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S2(config-ospf-1)#interface vlan20
S2(config-ospf-1-if-vlan20)#authentication
S2(config-ospf-1-if-vlan20)#authentication-key zte
S2(config-ospf-1-if-vlan20)#exit
To check whether the authentication function is effective in area 0, run the show ip ospf
command.
S2(config)#show ip ospf
OSPF 10 Router ID 1.1.1.2 enable
Enabled for 02:37:38,Debug on
Number of areas 1, Stub 0, Transit 0
......
Area 0.0.0.0 enable
Enabled for 02:37:38
Area has simple password authentication
Times spf has been run 32
Number of interfaces 1. Up 1
Number of ASBR local to this area 0
Number of ABR local to this area 1
......
Enable the MD5 authentication function on interfaces that belong to area 1. The key ID is
1, and the authentication password is zte.
Run the following commands on S2:
S2(config)#router ospf 10
S2(config-ospf-10)#area 1 authentication message-digest
S2(config-ospf-10)#interface vlan20
S2(config-ospf-10-if-vlan20)#authentication message-digest
S2(config-ospf-10-if-vlan20)#message-digest-key 1 md5 zte
S2(config-ospf-10-if-vlan20)#exit
Run the following command on S3 to check the information of the OSPF interface. The
result shows that the authentication mode is MD5.
S3(config)#show ip ospf interface vlan10
OSPF Router with ID (1.1.1.4) (Process ID 10)
vlan1 is up
Internet Address 30.0.1.1 255.255.255.252 enable
3-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Up for 00:09:38
In the area 0.0.0.1 BDR
Cost 1, Priority 1, Network Type broadcast
Transmit Delay(sec) 1, Authentication Type message-digest
......
Parameter Description
default-cost <cost> Cost of the default route advertised to a stub area. Range:
0-65535.
Configuration Example
Set area 1 to a stub area, see Figure 3-5.
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
3-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S2(config)#interface loopback1
S2(config-if-loopback1)#ip adderss 1.1.1.3 255.255.255.255
S2(config-if-loopback1)#exit
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 30.0.0.2 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 30.0.1.1 255.255.255.252
S2(config-if-vlan20)#exit
S2(config)#router ospf 10
S2(config-ospf-10)#router-id 1.1.1.3
S2(config-ospf-10)#network 30.0.0.0 0.0.0.3 area 0
S2(config-ospf-10)#network 30.0.1.0 0.0.0.3 area 1
S2(config-ospf-10)#area 1 stub
S2(config-ospf-10)#exit
3-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
S3(config)#interface loopback1
S3(config-if-loopback1)#ip adderss 1.1.1.4 255.255.255.255
S3(config-if-loopback1)#exit
S3(config)#interface vlan10
S3(config-if-vlan10)#ip address 30.0.1.2 255.255.255.252
S3(config-if-vlan10)#exit
S3(config)#router ospf 10
S3(config-ospf-10)#router-id 1.1.1.4
S3(config-ospf-10)#network 30.0.1.0 0.0.0.3 area 1
S3(config-ospf-10)#area 1 stub
S3(config-ospf-10)#exit
To configure area 1 as a totally stubby area, run the following commands to modify the
configurations on S2:
S2(config)#router ospf 10
S2(config-ospf-10)#area 1 stub no-summary
S2(config-ospf-10)#exit
3-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameters Description
metric <metric-value> Cost for advertising a default LSA of type 7. Value: A 24-bit
integer, ranging from 1 to 16777214.
metric-type <type> Type of a default route LSA of type 7: ext-1 and ext-2.
Configuration Example
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
3-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
3-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S3(config)#interface loopback1
S3(config-if-loopback1)#ip adderss 1.1.1.4 255.255.255.255
S3(config-if-loopback1)#exit
S3(config)#interface vlan10
S3(config-if-vlan10)#ip address 30.0.1.2 255.255.255.252
S3(config-if-vlan10)#exit
S3(config)#router ospf 10
S3(config-ospf-10)#router-id 1.1.1.4
S3(config-ospf-10)#network 30.0.1.0 0.0.0.3 area 1
S3(config-ospf-10)#redistribute connected
S3(config-ospf-10)#area 1 nssa
S3(config-ospf-10)#exit
To prevent routing messages of type 3 from being advertised to the NSSA area, run the
following commands to modify the configurations on S2:
S2(config)#router ospf 10
S2(config-ospf-10)#area 1 nssa default-information-originate no-summary
Parameter Description
cost <cost-value> Metric for the range. Set the metric for the aggregation LSA.
Range: 1-16777214.
3-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Configuration Example
Configure the OSPF protocol on S1, S2 and S3. S2 operates as the ABR. Configure route
aggregation on S2, see Figure 3-7.
Router IDs are listed below.
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
3-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S2(config)#interface loopback1
S2(config-if-loopback1)#ip adderss 1.1.1.3 255.255.255.255
S2(config-if-loopback1)#exit
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 30.0.0.1 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 30.0.1.1 255.255.255.252
S2(config-if-vlan20)#exit
S2(config)#router ospf 1
S2(config-ospf-1)#router-id 1.1.1.3
S2(config-ospf-1)#network 30.0.0.0 0.0.0.3 area 1
S2(config-ospf-1)#network 30.0.1.0 0.0.0.3 area 0
S2(config-ospf-1)#exit
After the configuration, run the following command to check the routing table. Routes not
aggregated are displayed.
S3#show ip forwarding route
IPv4 Routing Table:
Dest Gw Interface Owner pri metric
1.1.1.2 30.0.1.1 vlan10 ospf 110 20
1.1.1.4 1.1.1.4 loopback1 address 0 0
2.2.2.0 30.0.1.1 vlan10 ospf 110 20
2.2.2.4 30.0.1.1 vlan10 ospf 110 20
30.0.0.0 30.0.1.1 vlan10 ospf 110 2
30.0.1.0 30.0.1.2 vlan10 direct 0 0
30.0.1.2 30.0.1.2 vlan10 address 0 0
S2(config)#router ospf 1
S2(config-ospf-1)#area 1 range 2.2.2.0 255.255.255.248 summary-link
S2(config-ospf-1)#exit
3-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
The default setting of "area 1 range 2.2.2.2 255.255.255.248 "is advertise. If not-advertise
is chosen, aggregated route of 2.2.2.0 network segment is not displayed on S3, and this
network segment cannot be pinged.
S2(config-ospf-1)#area 1 range 2.2.2.0 255.255.255.248
summary-link not-advertise
S2(config-ospf-1)#exit
S3(config)#show ip forwarding route
IPv4 Routing Table:
Dest Gw Interface Owner pri metric
1.1.1.4 1.1.1.4 loopback1 address 0 0
30.0.0.0 30.0.1.1 vlan10 ospf 110 2
30.0.1.0 30.0.1.2 vlan10 direct 0 0
30.0.1.2 30.0.1.2 vlan10 address 0 0
S3 does not learn the routing information from 2.2.2.0. The aggregated information of
2.2.2.0 still exists in S2 database, but the information is not advertised to other areas.
Configuration Example
Configure the OSPF on S1, S2 and S3. Advertise external routes of S1, and configure
ASBR route aggregation on S1, see Figure 3-8.
3-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
3-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 30.0.0.1 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 30.0.1.1 255.255.255.252
S2(config-if-vlan20)#exit
S2(config)#router ospf 1
S2(config-ospf-1)#router-id 1.1.1.3
S2(config-ospf-1)#network 30.0.0.0 0.0.0.3 area 1
S2(config-ospf-1)#network 30.0.1.0 0.0.0.3 area 0
S2(config-ospf-1)#exit
Run the following command to check the S2 routing table. An aggregated network segment
2.2.2.0/29 exists in the routing table.
S2(config)#show ip forwarding route
IPv4 Routing Table:
Dest Gw Interface Owner pri metric
1.1.1.2 30.0.0.2 vlan10 ospf 110 20
1.1.1.3 1.1.1.3 loopback1 address 0 0
2.2.2.0 30.0.0.2 vlan10 ospf 110 20
30.0.0.0 30.0.0.1 vlan10 direct 0 0
30.0.0.1 30.0.0.1 vlan10 address 0 0
30.0.1.0 30.0.1.1 vlan20 direct 0 0
30.0.1.1 30.0.1.1 vlan20 address 0 0
3-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Example
Enable OSPF on S1 and S2, enable route load balancing between S1 and S2, and
configure the maximum number of routes that can be supported by OSPF when the load
is shared in balanced mode to two.
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
3-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
S1(config-ospf-1)#exit
Run the following command to check the routing table of S1. Two OSPF routes 2.2.2.4/30
with the same destinations are displayed.
S1(config)#show ip forwarding route
IPv4 Routing Table:
Dest Gw Interface Owner pri metric
1.1.1.2 1.1.1.2 loopback1 address 0 0
2.2.2.0 2.2.2.2 vlan30 direct 0 0
2.2.2.2 2.2.2.2 vlan30 address 0 0
2.2.2.4 30.0.1.2 vlan20 ospf 110 2
2.2.2.4 30.0.0.2 vlan10 ospf 110 2
30.0.0.0 30.0.0.1 vlan10 direct 0 0
30.0.0.1 30.0.0.1 vlan10 address 0 0
30.0.1.0 30.0.1.1 vlan20 direct 0 0
30.0.1.1 30.0.1.1 vlan20 address 0 0
3-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
metric <metric-value> Metric value of the redistributed LSA. By default, use the
default metric. Range: 1-16777214.
metric-type <type> Metric-type of the redistributed LSA. Value: ext-1 and ext-2.
By default, it is ext-2.
Configuration Example
Redistribute RIP routes in area 0, see Figure 3-10.
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
3-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
3-31
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S3(config)#interface vlan20
S3(config-if-vlan20)#ip address 30.0.2.1 255.255.255.252
S3(config-if-vlan20)#exit
S3(config)#interface loopback1
S3(config-if-loopback1)#ip address 2.2.2.1 255.255.255.0
S3(config-if-loopback1)#exit
S3(config)#router rip
S3(config-rip)#network 30.0.1.0 0.0.0.3
S3(config-rip)#network 30.0.2.0 0.0.0.3
S3(config-rip)#network 2.2.2.0 0.0.0.255
S3(config-rip)#exit
3-32
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Parameter Description
metric-type <type> Type of the default route. Value: ext-1 and ext-2, default:
ext-2.
route-map <map-tag> Name of the route map for generating the default route.
Length: 1-16 characters.
3-33
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
<area-id> ID of the area through which the virtual link transits. The area
cannot be a stub area, an NSSA area, or area 0.
hello-interval <seconds> Interval (second) for sending HELLO packets on the virtual
link. Range: 1-8192, default: 10.
transmit-delay <seconds> Time delay (section) for transmitting a link state update
packet on the virtual link. Range: 1-8192, default: 1.
Configuration Example
Establish a virtual link between the interconnected interfaces of S2 and S3, see Figure
3-11.
Router IDs are listed below.
Device Router ID
S1 1.1.1.2
S2 1.1.1.3
S3 1.1.1.4
3-34
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
3-35
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuring Sham-link
Because the priority of an OSPF route is higher than that of a BGP route, an OSPF private
route is usually the first choice if both a public network route and an OSPF private network
route are available. However, comparing with the public network route, the private network
route is not suitable for carrying a large flow because its bandwidth is smaller. Therefore,
a mechanism is required to enable the public network to share the private network flow.
The public and private network can be selected flexibly to carry the flow.
As shown in Figure 3-12, S1 and S2 are in the same area. There are two types of LSAs
learnt by S1 when it accesses S2. One is LSAs of type 3 advertised by a PE router, another
is LSAs of type 1 flooded by area 0. In accordance with the OSPF route selection policy,
the route calculated by LSAs of type 1 is optimal, so the OSPF private network route is
selected. Sham-link is configured to enable the public network to share the flow.
3-36
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Parameter Description
Configuring max-metric
To configure max-metric on the ZXR10 5900E, perform the following steps:
3-37
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Command Function
3-38
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Command Function
3-39
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Domain ID type 0x5,value 0.0.0.1 The domain ID type is 0x5, and the value is 0.0.0.1.
Number of areas 2, Normal 2, Stub There are two areas: two normal areas, 0 stub area, and 0
0, NSSA 0 NSSA area.
The following is sample output from the show ip ospf interface command:
ZXR10(config)#show ip ospf interface
OSPF Router with ID (100.100.100.14) (Process ID 1)
vlan1 is up
Internet Address 100.100.100.14 255.255.255.0 enable
Up for 00:17:51
In the area 0.0.0.0 DR
Cost 1, Priority 1, Network Type broadcast
Transmit Delay(sec) 1, Authentication Type null
Timer intervals(sec) : Hello 10, Dead 40, Retransmit 5
Designated Router (ID) 100.100.100.14, Interface address 100.100.100.14
Backup Designated router (ID) 100.1.1.2, Interface address 100.100.100.12
Number of Neighbors 1, Number of Adjacent neighbors 1
100.1.1.2 BDR
vlan2 is up
Internet Address 1.1.1.1 255.255.255.0 enable
Up for 00:16:25
In the area 0.0.0.1 DR
Cost 1, Priority 1, Network Type broadcast
Transmit Delay(sec) 1, Authentication Type null
Timer intervals(sec) : Hello 10, Dead 40, Retransmit 5
Designated Router (ID) 100.100.100.14, Interface address 1.1.1.1
Backup Designated router (ID) 100.1.1.2, Interface address 1.1.1.10
Number of Neighbors 1, Number of Adjacent neighbors 1
100.1.1.2 BDR
For a description of the parameters in the execution result, refer to the following table:
3-40
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Parameter Description
Timer intervals(sec) : Hello 10, Dead The interval for sending Hello packets is 10 seconds, the
40, Retransmit 5 duration for considering a neighbor to be dead is 40 seconds,
and the interval for retransmitting LSAs is 5 seconds.
The following is sample output from the show ip ospf database command:
ZXR10#show ip ospf database
OSPF Router with ID (110.1.1.1) (Process ID 1)
Router Link States (Area 0.0.0.0)
Link ID ADV Router Age Seq# Checksum Link count
110.1.1.1 110.1.1.1 3 0x80000002 0x3dbe 1
Summary Net Link States (Area 0.0.0.0)
Link ID ADV Router Age Seq# Checksum
112.1.1.0 110.1.1.1 6 0x80000001 0xd99f
168.1.0.0 110.1.1.1 6 0x80000001 0xff43
Summary ASB Link States (Area 0.0.0.0)
Link ID ADV Router Age Seq# Checksum
168.1.1.3 110.1.1.1 6 0x80000001 0xc875
Router Link States (Area 0.0.0.1)
Link ID ADV Router Age Seq# Checksum Link count
110.1.1.1 110.1.1.1 3 0x80000025 0xf8f8 1
168.1.1.3 168.1.1.3 61 0x80000005 0x70e 2
Net Link States (Area 0.0.0.1)
Link ID ADV Router Age Seq# Checksum
168.1.1.1 110.1.1.1 1183 0x80000002 0x9787
Type-5 AS External Link States
Link ID ADV Router Age Seq# Checksum Tag
113.1.0.0 168.1.1.3 48 0x80000001 0xa0dd 0
111.1.0.0 110.1.1.1 272 0x80000001 0x4ae3 3489660928
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Link ID LSA ID
Checksum -
3-41
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
The following is sample output from the show ip ospf database router command:
ZXR10#show ip ospf database router
OSPF Router with ID (110.1.1.1) (Process ID 1)
Router Link States (Area 0.0.0.1)
Routing Bit Set on this LSA
LS age: 1700
Options: (No TOS-capability, No DC)
LS Type: Router Links
Link State ID: 110.1.1.1
Advertising Router: 110.1.1.1
LS Seq Number: 0x8000001f
Checksum: 0xf9e7
Length: 36
Number of Links: 1
Link connected to: a Stub Network
(Link ID) Network/subnet number: 110.1.0.0
(Link Data) Network Mask: 255.255.0.0
Number of TOS metrics: 0
TOS 0 Metrics: 1
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Link State ID -
Advertising Router -
Checksum -
Length -
The following is sample output from the show ip ospf database network command:
ZXR10#show ip ospf database network
OSPF Router with ID (110.1.1.1) (Process ID 1)
Net Link States (Area 0.0.0.1)
Routing Bit Set on this LSA
LS age: 789
Options: (No TOS-capability, No DC)
LS Type: Network Links
Link State ID: 168.1.1.1 (Address of Designated Router)
Advertising Router: 110.1.1.1
LS Seq Number: 0x80000002
Checksum: 0x9787
3-42
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Length: 32
Network Mask: /16
Attached Router: 110.1.1.1
Attached Router: 168.1.1.3
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Link State ID -
Advertising Router -
Checksum -
Length -
The following is sample output from the show ip ospf database summary command:
ZXR10#show ip ospf database summary
OSPF Router with ID (110.1.1.1) (Process ID 1)
Summary Net Link States (Area 0.0.0.0)
LS age: 129
Options: (No TOS-capability, No DC)
LS Type: Summary Links(Network)
Link State ID: 112.1.1.0 (Summary Network Number)
Advertising Router: 110.1.1.1
LS Seq Number: 0x80000001
Checksum: 0xd99f
Length: 28
Network Mask: /24
TOS: 0 Metric: 2
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Link State ID -
Advertising Router -
Checksum -
Length -
3-43
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
The following is sample output from the show ip ospf database external command:
ZXR10#show ip ospf database external
OSPF Router with ID (110.1.1.1) (Process ID 1)
Type-5 AS External Link States
LS age: 18
Options: (No TOS-capability, No DC)
LS Type: AS External Link
Link State ID: 111.1.0.0 (External Network Number)
Advertising Router: 110.1.1.1
LS Seq Number: 0x80000001
Checksum: 0x4ae3
Length: 36
Network Mask: /16
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 110.1.1.111
External Route Tag: 3489660928
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Link State ID LS ID
Advertising Router -
The following is sample output from the show ip ospf database asbr-summary command:
ZXR10#show ip ospf database asbr-summary
OSPF Router with ID (110.1.1.1) (Process ID 1)
Summary ASB Link States (Area 0.0.0.0)
LS age: 68
Options: (No TOS-capability, No DC)
LS Type: Summary Links(AS Boundary Router)
Link State ID: 168.1.1.3 (AS Boundary Router address)
Advertising Router: 110.1.1.1
LS Seq Number: 0x80000001
Checksum: 0xc875
Length: 28
Network Mask: /0
TOS: 0 Metric: 1
For a description of the parameters in the execution result, refer to the following table:
3-44
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Parameter Description
Link State ID LS ID
Advertising Router -
Checksum -
Configuration Thought
1. Configure IP addresses of the interconnected interfaces between S1 and S2, and
configure loopback interface IP address.
2. Add interfaces to OSPF area 0.
3. Configure load balancing on both S1 and S2. S1 and S2 can learn the loopback
address route advertised by the peer through two links.
Configuration Process
Configuration on S1:
S1(config)#interface vlan30
S1(config-if-vlan30)#ip address 11.22.1.1 255.255.255.0
S1(config-if-vlan30)#exit
S1(config)#interface vlan40
S1(config-if-vlan40)#ip address 11.22.10.1 255.255.255.0
S1(config-if-vlan40)#exit
S1(config)#interface loopback1
3-45
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration on S2:
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 11.22.1.2 255.255.255.0
S2(config-if-vlan10)#exit
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 11.22.10.2 255.255.255.0
S2(config-if-vlan20)#exit
S2(config)#interface loopback2
S2(config-if-loopback2)#ip address 1.1.1.22 255.255.255.255
S2(config-if-loopback2)#exit
S2(config)#router ospf 1
S2(config-ospf-1)#router-id 32.33.1.1
S2(config-ospf-1)#network 11.22.1.0 0.0.0.255 area 0
S2(config-ospf-1)#network 11.22.10.0 0.0.0.255 area 0
S2(config-ospf-1)#network 1.1.1.22 0.0.0.0 area 0
S2(config-ospf-1)#maximum-paths 2
S2(config-ospf-1)#exit
Configuration Check
The following content will be shown after the configuration above is finished. It shows that
S1 and S2 set up neighborhood already. S1 and S2 ping the loopback interface of the
peer between each other, and the pings are successful. It shows that the configuration is
successful.
S1#show ip ospf neighbor
OSPF Router with ID (1.1.1.32) (Process ID 1)
3-46
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Configuration Thought
1. Set up link between S1 and S2 in NSSA area 255, and set up link between S2 and S3
in area 0.
2. Redistribute direct-connected route on S3 and S1 respectively.
3. Configure NSSA default route advertisement on S2.
4. As a result, S1 can not learn the detailed route of S3 address, but there is a default
route pointing to S2. S3 can learn the direct-connected route redistributed by S1.
Configuration Process
Configuration on S1:
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 11.22.1.1 255.255.255.0
S1(config-if-vlan10)#exit
S1(config)#interface loopback1
S1(config-if-loopback1)#ip address 1.1.1.11 255.255.255.255
S1(config-if-loopback1)#exit
3-47
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S1(config)#router ospf 1
S1(config-ospf-1)#network 11.22.1.0 0.0.0.255 area 255
S1(config-ospf-1)#area 255 nssa
S1(config-ospf-1)#redistribute connected
S1(config-ospf-1)#exit
Configuration on S2:
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 11.22.1.2 255.255.255.0
S2(config-if-vlan20)#exit
S2(config)#interface vlan40
S2(config-if-vlan40)#ip address 33.22.1.2 255.255.255.0
S2(config-if-vlan40)#exit
S2(config)#router ospf 1
S2(config-ospf-1)#network 11.22.1.0 0.0.0.255 area 255
S2(config-ospf-1)#area 255 nssa default-information-originate
S2(config-ospf-1)#network 33.22.1.0 0.0.0.255 area 0
S2(config-ospf-1)#exit
Configuration on S3:
S3(config)#interface vlan50
S3(config-if-vlan50)#ip address 33.22.1.1 255.255.255.0
S3(config-if-vlan50)#exit
S3(config)#interface loopback1
S3(config-if-loopback1)#ip address 1.1.1.33 255.255.255.255
S3(config-if-loopback1)#exit
S3(config)#router ospf 1
S3(config-ospf-1)#redistribute connected
S3(config-ospf-1)#exit
Configuration Check
Use show ip forwarding route 1.1.1.33 on S1 to view whether S1 learns the detailed route
of S3.
S1(config)#show ip forwarding route 1.1.1.33
IPv4 Routing Table:
Dest Gw Interface Owner Pri Metric
Use show ip forwarding route 0.0.0.0 on S1 to view whether there is a default route pointing
to S2.
S1(config)#show ip forwarding route 0.0.0.0
IPv4 Routing Table:
Dest Gw Interface Owner Pri Metric
0.0.0.0/0 11.22.1.2 vlan20 OSPF 110 2
Use show ip forwarding route 1.1.1.11 to inspect whether S3 learns the detailed route of
S1.
3-48
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Configuration Thought
1. PE1 and CE1 establish OSPF neighbor relationship.
2. PE2 and CE1 establish OSPF neighbor relationship.
3. PE2 should not learn the link-state information related to vpn1.
Configuration Process
Configuration on PE1:
3-49
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
PE1(config)#interface loopback1
PE1(config-if-loopback1)#ip vrf forwarding vpn1
PE1(config-if-loopback1)#ip address 1.1.1.17 255.255.255.255
PE1(config-if-loopback1)#exit
PE1(config)#interface vlan1
PE1(config-if-vlan1)#ip vrf forwarding vpn1
PE1(config-if-vlan1)#ip address 100.101.102.17 255.255.255.0
PE1(config-if-vlan1)#exit
PE1(config)#router ospf 1 vrf vpn1
PE1(config-ospf-1)#network 1.1.1.17 0.0.0.0 area 0
PE1(config-ospf-1)#network 100.101.102.0 0.0.0.255 area 0
PE1(config-ospf-1)#exit
Configuration on CE1:
CE1(config)#interface loopback1
CE1(config-if-loopback1)#ip address 1.1.1.18 255.255.255.255
CE1(config-if-loopback1)#exit
CE1(config)#interface loopback2
CE1(config-if-loopback2)#ip address 2.2.2.18 255.255.255.255
CE1(config-if-loopback2)#exit
CE1(config)#interface vlan2
CE1(config-if-vlan2)#ip address 100.101.102.18 255.255.255.0
CE1(config-if-vlan2)#exit
CE1(config)#interface vlan3
CE1(config-if-vlan3)#ip address 100.102.102.18 255.255.255.0
CE1(config-if-vlan3)#exit
CE1(config)#router ospf 1
CE1(config-ospf-1)#network 1.1.1.18 0.0.0.0 area 0
CE1(config-ospf-1)#network 100.101.102.0 0.0.0.255 area 0
CE1(config-ospf-1)#exit
CE1(config)#router ospf 2
CE1(config-ospf-2)#network 2.2.2.18 0.0.0.0 area 0
CE1(config-ospf-2)#network 100.102.102.0 0.0.0.255 area 0
CE1(config-ospf-2)#exit
Configuration on PE2:
PE2(config)#interface loopback1
PE2(config-if-loopback1)#ip vrf forwarding vpn2
PE2(config-if-loopback1)#ip address 1.1.1.19 255.255.255.255
PE2(config-if-loopback1)#exit
PE2(config)#interface vlan4
PE2(config-if-vlan4)#ip vrf forwarding vpn2
PE2(config-if-vlan4)#ip address 100.102.102.17 255.255.255.0
PE2(config-if-vlan4)#exit
PE2(config)#router ospf 1 vrf vpn2
3-50
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 OSPF Configuration c u -tr a c k
Configuration Check
CE1 can learn the looback1 route advertised by PE1 and the loopback1 route advertised
by PE2. PE2 and PE1 cannot learn routes from each other. This indicates that the
multi-instance configuration takes effect.
CE1#show ip forwarding route ospf
IPv4 Routing Table:
Dest Gw Interface Owner Pri Metric
1.1.1.17/32 100.101.102.17 vlan2 ospf 110 2
1.1.1.18/32 100.102.102.17 vlan3 ospf 110 2
3-51
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
3-52
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 4
IS-IS Configuration
Table of Contents
IS-IS Overview ...........................................................................................................4-1
Configuring the IS-IS Protocol ..................................................................................4-11
Maintaining the IS-IS Protocol ..................................................................................4-23
IS-IS Configuration Examples...................................................................................4-28
IS-IS routers uses LSA to exchange routing information, set up and maintain link state
database. A LSP indicates the important information related to a router, including the area
and the connected network. SNP is used to ensure that LSPs can be transmitted reliably.
SNP contains the summary information of every LSP on the network. When a router
receives a SNP, it compares the SNP with its link state database. If the router loses a
4-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
LSP existing in the SNP, it will send a SNP in multicast mode to ask for the required LSP
from other routers on the network.
By using LSPs in conjunction with SNPs, IS-IS protocol can interact routes reliably on a
large network.
Likewise, IS-IS protocol also uses the Dijkstra SPF algorithm to calculate routes. Based
on the link state database, it uses the SPF algorithm to calculate the optimal route and
then adds the route to IP routing table.
l Area partition
The IS-IS dynamic route protocol uses a layered topology architecture. The network
consists two layers to reduce the load of the router. This architecture can better meet
the requirements of large scale network applications. For the architecture, see Figure
4-1.
The IS-IS architecture consists of two layers: L1 and L2. The L2 layer consists of L2
routers. It operates as the backbone network. The L1 layer consists of L1 routers and
L1/L2 routers. It operates as a non-backbone network. L1 routers can only exchange
routing information with L1 routers and L1/L2 routers in this area.
4-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
The IDP is defined by the ISO. It consists of the Authority and Format Identifier (AFI)
and the Initial Domain Identifier (IDI). AFI refers to the address allocation organization
and the address format. The IDI is used to identify the domain.
The DSP consists of the High Order DSP, SystemID and the SEL.
The length of the IDP and the DSP can be changed. The NSAP can be up to 20 bytes
in length and at least 8 bytes. The system ID identifies a unique host or a router in an
area. Its length is 48 bit (6 bytes) invariably. The SEL (NSAP Selector, sometimes it is
4-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
The IIH PDU sent by router RTA carries the type 240 TLV, in which, the neighbor's
three states are saved. When router RTB receives the packet, it confirms the next
neighbor state according to the state of its neighbor and the neighbor state in the TLV.
For the state changes, refer to Table 4-1.
- Down Init Up
4-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Init Init Up Up
To create a neighbor for L1, the intermediate system receives a L1 LAN IIH PDU
packet on the broadcast address AllL1ISs. It compares every area address in the
received IIH PDU with the locally configured area address. If the area addresses do
not match each other, the neighbor cannot be created.
When the intermediate system receives a LAN IIH PDU packet, it checks whether the
neighbor already exists in its neighbor database.
à The neighbor's MAC is similar to the MAC source address in the PDU.
à The neighbor system ID is consistent with that of the PDU.
à The neighbor types are also consistent with each other.
If the above conditions are complied with, the neighbor exists, and the intermediate
system updates the timer, priority, and neighbor area addresses according to the
values in the PDU. If the above conditions are not complied with, for example, the
MAC addresses are in consistent with each other, this packet is dropped.
If the neighbor type is not consistent with the system ID, this neighbor is considered
to be a new neighbor, and this neighbor is added to the neighbor database. The state
of this neighbor will be set to INIT. The intermediate system then checks the neighbor
TLV carried in the IIH PDU packet. If its MAC address is contained in the neighbor TLV,
the state of the neighbor is set to UP, and an IIH PDU packet is sent. The intermediate
system neighbor TLV of the PDU will carry the MAC address of the neighbor.
After the neighbor receives the IIH PDU packet, it performs the similar operations. If
this neighbor does not exists, the neighbor is added to its neighbor state database
and the state is set to INIT. The intermediate system queries its MAC address in the
IIH PDU packet and sets the state to UP. For the process, see Figure 4-4.
4-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
A DIS is the system that has the highest priority on a broadcast network. If the priorities
of all intermediate systems are the same, the intermediate system with the greatest
MAC address is the DIS. Generally, each network has two DISs: the L1 DIS and the
L2 DIS.
The conditions for electing a DIS are as follows:
à When the IS-IS process is started on a router, the DIS election is performed after
three Hello packets are sent
4-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
It is used to
à acknowledge the received LSP that is flooded on point-to-point links.
à apply for the complete LSP information for synchronizing the database on
broadcast links.
l TLV: Type/Length/Value. Type: Type of a specified field. Length: Length of a specified
field. Value: Information contents.
The TLV is carried in the PDU of the IS-IS, and is used to describe the extendable
fields.
The CSNP and PSNP have the same package format, and carry the LSP abstract
information respectively. The difference between them is that the CSNP advertised
4-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
by a router carries all LSP abstract information that is available in the router link state
database. But the PSNP only carries a subset of the information.
The SRM and the SSN are mainly used for router selection information diffusion and
database synchronization.
l Point-to-point links
The IS-IS protocol uses a reliable flooding mechanism on point-to-point links. On a
point-to-point link, there is only one neighbor router on the opposite end of the link,
and the router uses limited bandwidth to trace acknowledge messages sent by the
neighbor router.
The CSNP simplifies the database synchronization process. When the neighbor
relation between two connected routers is established for the first time, all CSNPs on
the point-to-point link are exchanged. Through comparing the CSNP with the local
database and the database of each neighbor router, the missing or expired LSP can
be confirmed.
Use the PSNP to apply for the missing or the LSP of the current version. If the router
finds that some neighbor routers lack the LSP, the router can flood the LSP. During the
flooding, use the SSN to identify that it is the PSNP that needs to be sent, and use the
SRM to identify that it is the LSP that needs to be sent. When the PSNP acknowledge
packet is received from the peer end, the SRM tag can be cleared. If the acknowledge
packet is not received, the corresponding packet is resent after timeout.
For the example of the diffusion process on point-to-point networks, see Figure 4-6.
The neighbor relation between RTB and RTC is normal, and RTA and RTB establish
the adjacent relation for the first time.
1. The process for establishing the adjacent relation and database synchronization
is as follows:
4-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
2. After the adjacent relation is established between RTB and RTA, the RTA
information is flooded to RTC. The process is as follows:
l Broadcast links
4-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
On broadcast links, LSP is diffused to adjacent routers on layer 1 and layer 2 through
broadcast addresses ALL L1S and ALL L2S. The diffusion on broadcast links does
not require reliable transmission.
Unreliable diffusion requires a mechanism to guarantee database synchronization.
The IS-IS router uses the DIS to broadcast CNSP periodically to implement database
synchronization on broadcast links.
The DIS controls the diffusion and database synchronization on broadcast links. The
IS-IS protocol does not require that the IS-Is routers can only establish adjacent
relation with DIS on broadcast links. After the hello packet is broadcasted and three
times of handshaking, adjacent relation can be established between routers. Three
times of handshaking means that all routers report the detected routers. The CSNP
sent by the DIS is transmitted periodically to ensure that all routers on the LAN
receives a copy. Through comparing the CNSP and that in the link state database,
the missing LSP and new version LSP can be recognized. The router can then send
the PSNP packet to apply for the LSP.
Broadcasting CSNP periodically consumes lots of bandwidth and thus the cost is high.
However, this is a simple reliable transmission policy on a broadcast link. You can
reduce the sending frequency by increasing the sending interval.
RTA and RTB are connected to the link, and RTC is the last router that is connected
to the link. The RTA link state database contains RTA.00-00, RTA.01-00(pseudo lsp),
and RTB.00-00, see Figure 4-7.
1. RTC generates an LSP (RTC.00-00) after RTA establishes the adjacent relation
with RTB. RTC then copies the LSP and saves it to its database. After this, RTC
diffuses another copy to the link through interface 3.
2. RTA that operates as the DIS advertises a CSNP to the link in broadcast mode.
3. After RTC receives the CSNP, it compares the CSNP with that in the local link
state database. It finds that three LSPs are unavailable: RTA.00-00, RTA.01-00,
and RTB.00-00. RTC sends a PSNP to the link to request for the LSPs.
4. RTA sends RTA.00-00, RTA.01-00, and RTB.00-00 in broadcast mode. After RTC
receives the copies, the RTC's database can be synchronized with the RTA's
database.
4-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Route-leaking
Attatch bit: The RFC1195 defines that if an L1/L2 router in an area is connected with a
router in another area, the L1/L2 router sets the ATT bit in its L1 LSP to inform the L1
router in this area that there is an egress. the L1 router in this area selects the nearest L2
on which the ATT bit is set as the egress of the area, and then a default route is generated.
The L1 router selects the nearest L1/L2 router as the egress of this area, but the nearest
route is not necessarily the optimum route, the second optimum route may be used.
Therefore, the RFC2966 defined the route-leaking. To avoid the use of second optimum
route, the routing information in the backbone area is leaked to the Level–1 area. Using
this method, the common areas also have the routing information of the entire IS-IS route
domain.
For the route-leaking operation, see Figure 4-8.
4-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
4-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
4-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
< narrow | wide > In narrow mode, six bits are used to carry the metric value.
In wide mode, 24 bits are used to carry the metric value. In
addition, more TLVs can be carried in wide mode.
The range for bringing the metric value in narrow mode is
smaller than that in wide mode. When devices are connected
and form neighbor relations, a topology may fail to be
established because of different metric styles.
Parameter Description
on-start-up { 5-86400 | auto | l 5-86400: After the router is restarted, the OL flag cannot
wait-for-bgp } be set after a period within this range.
l auto: The OL flag cannot be set after databases are
synchronized.
l wait-for-bgp: The OL flag cannot be set after the BGP
is synchronized.
suppress {all | external | interlevel} l all: Suppress the leakage of both external and internal
routes
l external: Suppress the local router to learn redistributed
routes
l interlevel: Suppress the leakage of internal routes
between level-1 and level-2.
4-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Parameter Description
metric-type <type> Metric type. Value: external and internal. Default, internal.
For a description of the parameters in Step 10, refer to the following table:
Parameter Description
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
4-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
4-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
4-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
4-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
At present, the ZXR10 5900E supports plain text and MD5 authentication modes.
To configure IS-IS authentication on the ZXR10 5900E, perform the following steps:
4-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
1 ZXR10(config)#router isis [process-id][ vrf < vrf-name>] Enters IS-IS route configuration
mode.
4-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Parameter Description
4-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
To configure IS-IS traffic engineering on the ZXR10 5900E, perform the following steps:
Configuring IS-IS GR
The IS-IS Graceful Restart (GR) function is used to guarantee that the forwarding process
can continue if the corresponding router is restarted. A neighbor router can process
messages when it is restarted. With this function, this process does not result in route
oscillation.
To configure the graceful-restart on the ZXR10 5900E, perform the following steps:
4-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Parameter Description
Command Function
ZXR10#show isis adjacency [up-time][ level-1 | level-2][process-id Displays the adjacency relations
<process-id>] and the status of current
neighbors.
ZXR10#show isis circuits [detail][process-id]show isis circuits Displays the information about the
[detail][process-id<process-id>] IS-IS interface.
4-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Command Function
ZXR10#show isis mpls traffic-eng tunnel [process-id<process-id>] Displays the usage of the IS-IS
tunnel.
Parameter Description
The following is sample output from the show isis adjacency command:
ZXR10(config-isis)#show isis adjacency
Process ID: 0
Interface System id State Lev Holds SNPA(802.2) Pri MT
gei-0/1/1/1 3333.3333.3333 UP L1 23 00E0.D021.0205 64
gei-0/1/1/2 3333.3333.3333 UP L2 24 00E0.D021.0203 64
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
The following is sample output from the show isis circuits command:
4-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
The following is sample output from the show isis database command:
4-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
The following is sample output from the show isis topology command:
ZXR10(config-isis-0)#show isis topology
4-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Process ID: 0
IS-IS paths to Level-1 routers
System id Metric Next-Hop Interface SNPA
2222.2222.2222 10 2222.2222.2222 vlan1 00E0.D021.0204
3333.3333.3333 --
IS-IS paths to Level-2 routers
System id Metric Next-Hop Interface SNPA
2222.2222.2222 10 2222.2222.2222 vlan2 00E0.D021.0205
3333.3333.3333 --
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Metric Metric value to the destination IS, "--" indicates itself, "**"
means that the route can not be calculated.
SNPA SNPA address of the next hop. P-P interface flag: "*ppp*".
The following is sample output from the show isis mpls traffic-eng tunnel command:
ZXR10(config)#show isis mpls traffic-eng tunnel
Process ID: 0
state codes: * the only next hop, ** one of next hops,
-not chosen as next hop
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
The following is sample output from the show isis fast-reroute-topology command:
4-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
4-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Configuration Thought
1. Configure IP addresses of interfaces
2. Configure IS-IS protocol
3. Enable IS-IS protocol on interface
4. Test the configuration result. Make sure that S1 and S2 can set up neighborhood
between each other and calculate topology correctly. Make sure that S1 and S2 can
ping the loopback interface of the peer between each other.
Configuration Process
Configuration ON S1:
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 192.168.2.1 255.255.255.0
S1(config-if-vlan10)#exit
S1(config)#interface loopback1
S1(config-if-loopback1)#ip address 192.168.3.1 255.255.255.0
S1(config-if-loopback1)#exit
S1(config)#router isis
S1(config-isis-0)#area 01
S1(config-isis-0)#system-id 00D0.D0C7.5460
S1(config-isis-0)#interface vlan10
S1(config-isis-0-if-vlan10)#ip router isis
S1(config-isis-0-if-vlan10)#exit
S1(config-isis-0)#interface loopback1
S1(config-isis-0-if-loopback1)#ip router isis
S1(config-isis-0-if-loopback1)#exit
Configuration ON S2:
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.2.2 255.255.255.0
S2(config-if-vlan10)#exit
S2(config)#interface loopback1
S2(config-if-loopback1)#ip address 192.168.6.1 255.255.255.0
S2(config-if-loopback1)#exit
S2(config)#router isis
S2(config-isis-0)#area 01
S2(config-isis-0)#system-id 00D0.D0C7.53E0
S2(config-isis-0)#interface vlan10
S2(config-isis-0-if-vlan10)#ip router isis
S2(config-isis-0-if-vlan10)#exit
S2(config-isis-0)#interface loopback1
S2(config-isis-0-if-loopback1)#ip router isis
S2(config-isis-0-if-loopback1)#end
4-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Check
After finishing the configuration above, the following content can be viewed on both S1
and S2. It means that S1 and S2 can set up neighborhood and calculate topology. Ping
the loopback address of the peer on S1 and S2 respectively.
Use show running-config isis on S1 to view whether the IS-IS configuration is correct.
S1(config)#show running-config isis
!
router isis
area 01
system-id 00D0.D0C7.5460
interface vlan10
ip router isis
$
interface loopback1
ip router isis
$
Use show isis adjacency on S1 to view whether the neighborhood is normal. After the
neighborhood is set up, UP will be shown under the field of state.
S1(config)#show isis adjacency
Interface System id State Lev Holds SNPA(802.2) Pri MT
gei-0/1/1/1 00D0.D0C7.53E0 UP/UP L1L2 8/7 0030.3144.5566 64/64
Use show isis topology on S1 to view whether the topology can be calculated correctly. If
the topology is calculated correctly, the following entry can be viewed on the command
output. If "–" is shown under the field of metric, it means the local router. If "**" is shown
under the field of metric, it means inaccessible.
S1(config)#show isis topology
IS-IS paths to Level-1 routers
System id Metric Next-Hop Interface SNPA
00D0.D0C7.53E0 10 00D0.D0C7.53E0 vlan10 0030.3144.5566
00D0.D0C7.5460 --
Use show isis circuits on S1 to view the interface information and the DIS election. The
UP means that the interface state is normal. The Down means that the interface state
is abnormal. For abnormal interface state, it is required that inspect the link state and IP
configuration.
S1(config)#show isis circuits
IS-IS interface database:
Interface State Lev CirId Level1-DR Level2-DR Pri(L1/L2)
4-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
S1#ping 192.168.6.1
sending 5,100-byte ICMP echoes to 192.168.6.1,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 12/22/54 ms.
S2#ping 192.168.3.1
sending 5,100-byte ICMP echoes to 192.168.3.1,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 10/20/52 ms.
4-31
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Thought
1. Configure IP addresses of interfaces.
2. Configure IS-IS protocol.
3. Enable IS-IS protocol on interfaces.
4. Enable route aggregation on S1.
5. Configure static route on S4 and redistribute default route.
6. Test the configuration. Make sure that the neighborhood is set up between S1 and S2,
between S2 and S3, and between S3 and S4 already and the topology is calculated
correctly. Ping the peer interface by one of any pair of interfaces successfully.
Configuration Process
Configuration on S1:
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 192.168.15.1 255.255.255.0
S1(config-if-vlan10)#exit
S1(config)#interface vlan20
S1(config-if-vlan20)#ip address 192.168.100.1 255.255.255.0
S1(config-if-vlan20)#exit
S1(config)#interface vlan30
S1(config-if-vlan30)#ip address 192.168.101.1 255.255.255.0
4-32
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
S1(config-if-vlan30)#exit
S1(config)#interface vlan40
S1(config-if-vlan40)#ip address 192.168.102.1 255.255.255.0
S1(config-if-vlan40)#exit
S1(config)#router isis
S1(config-isis-0)#area 01
S1(config-isis-0)#system-id 00D0.D0C7.5460
S1(config-isis-0)#is-type level-1-2
S1(config-isis-0)#interface vlan10
S1(config-isis-0-if-vlan10)#ip router isis
S1(config-isis-0-if-vlan10)#circuit-type level-2
S1(config-isis-0-if-vlan10)#exit
S1(config-isis-0)#interface vlan20
S1(config-isis-0-if-vlan20)#ip router isis
S1(config-isis-0-if-vlan20)#circuit-type level-2
S1(config-isis-0-if-vlan20)#exit
S1(config-isis-0)#interface vlan30
S1(config-isis-0-if-vlan30)#ip router isis
S1(config-isis-0-if-vlan30)#circuit-type level-2
S1(config-isis-0-if-vlan30)#exit
S1(config-isis-0)#interface vlan40
S1(config-isis-0-if-vlan40)#ip router isis
S1(config-isis-0-if-vlan40)#circuit-type level-2
S1(config-isis-0-if-vlan40)#exit
S1(config-isis-0)#summary-address 192.168.100.0 255.255.252.0
S1(config-isis-0)#exit
Configuration on S2:
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.15.2 255.255.255.0
S2(config-if-vlan10)#exit
S2(config)#interface vlan20
S2(config-if-vlan20)#ip address 192.168.14.1 255.255.255.0
S2(config-if-vlan20)#exit
S2(config)#router isis
S2(config-isis-0)#area 00
S2(config-isis-0)#system-id 00D0.D0C7.53E0
S2(config-isis-0)#is-type level-1-2
S2(config-isis-0)#interface vlan10
S2(config-isis-0-if-vlan10)#ip router isis
S2(config-isis-0-if-vlan10)#circuit-type level-2
S2(config-isis-0-if-vlan10)#exit
S2(config-isis-0)#interface vlan20
S2(config-isis-0-if-vlan20)#ip router isis
S2(config-isis-0-if-vlan20)#circuit-type level-2
4-33
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S2(config-isis-0-if-vlan20)#exit
Configuration on S3:
S3(config)#interface vlan10
S3(config-if-vlan10)#ip address 192.168.14.2 255.255.255.0
S3(config-if-vlan10)#exit
S3(config)#interface vlan20
S3(config-if-vlan20)#ip address 192.168.13.1 255.255.255.0
S3(config-if-vlan20)#exit
S3(config)#router isis
S3(config-isis-0)#area 02
S3(config-isis-0)#system-id EF00.AB00.DF12
S3(config-isis-0)#is-type level-1-2
S3(config-isis-0)#interface vlan10
S3(config-isis-0-if-vlan10)#ip router isis
S3(config-isis-0-if-vlan10)#circuit-type level-2
S3(config-isis-0-if-vlan10)#exit
S3(config-isis-0)#interface vlan20
S3(config-isis-0-if-vlan20)#ip router isis
S3(config-isis-0-if-vlan20)#circuit-type level-1
S3(config-isis-0-if-vlan20)#exit
Configuration on S4:
S4(config)#interface vlan10
S4(config-if-vlan10)#ip address 192.168.13.2 255.255.255.0
S4(config-if-vlan10)#exit
S4(config)#router isis
S4(config-isis-0)#area 02
S4(config-isis-0)#system-id 00DE.FD11.AD00
S4(config-isis-0)#is-type level-1
S4(config-isis-0)#interface vlan10
S4(config-isis-0-if-vlan10)#ip router isis
S4(config-isis-0-if-vlan10)#circuit-type level-1
S4(config-isis-0-if-vlan10)#exit
S4(config-isis-0)#exit
S4(config)#ip route 0.0.0.0 0.0.0.0 192.168.13.1
S4(config)#router isis
S4(config-isis-0)#default-information originate
S4(config-isis-0)#redistribute static metric 10
S4(config-isis-0)#end
Configuration Check
After the configuration above is finished, the following content can be viewed on one of
any pair of devices. It shows that the neighborhood is set up already and the topology is
4-34
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
calculated correctly. The peer interface can be pinged successfully by one end of any pair
of devices.
Use show ip protocol routing to view the default static route redistributed by S4 on S1.
S1(config)#show running-config isis
!
router isis
area 01
system-id 00D0.D0C7.5460
is-type level-1-2
summary-address 192.168.100.0 255.255.252.0
interface vlan10
ip router isis
circuit-type level-2-only
$
interface vlan20
ip router isis
circuit-type level-2-only
$
interface vlan30
ip router isis
circuit-type level-2-only
$
interface vlan40
ip router isis
circuit-type level-2-only
$
!
S1(config)#show isis adjacency
Interface System id State Lev Holds SNPA(802.2) Pri MT
gei-0/1/1/3 00D0.D0C7.53E0 UP L2 7 0030.3144.5566 64
S1(config)#show isis topology
IS-IS paths to Level-1 routers
System id Metric Next-Hop Interface SNPA
00D0.D0C7.5460 --
4-35
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
View S2 configuration:
S2(config)#show running-config isis
!
router isis
area 00
system-id 00D0.D0C7.53E0
is-type level-2-only
interface vlan20
ip router isis
circuit-type level-2-only
$
interface vlan10
ip router isis
circuit-type level-2-only
$
!
S2(config)#show isis topology
IS-IS paths to Level-1 routers
System id Metric Next-Hop Interface SNPA
4-36
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
View S3 configuration:
S3(config)#show running-config isis
!
router isis
area 02
system-id EF00.AB00.DF12
is-type LEVEL-1-2
interface vlan10
ip router isis
circuit-type level-2-only
$
interface vlan20
ip router isis
circuit-type level-1
$
!
View S4 configuration:
4-37
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S4(config)#show running-config
!
router isis
area 02
system-id 00de.fb11.ad00
is-type LEVEL-1
redistribute static ip metric 10
default-information originate
interface vlan10
ip router isis
circuit-type level-1
!
ip route 0.0.0.0 0.0.0.0 192.168.13.1
S4#ping 192.168.100.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.100.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 192/709/1148 ms
4-38
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 IS-IS Configuration c u -tr a c k
Configuration Thought
1. Establish neighbor relationship on vlan10 of S1 and vlan10 of S2 in Instance 100.
2. Establish neighbor relationship on vlan20 of S1 and vlan20 of S2 in Instance 200.
3. Redistribute direct-connected routes in the instances of S1. Check whether load
sharing is performed through different instances on S2. (Load sharing cannot be
performed, as the route with a smaller instance number of the same prefix has a
higher priority.)
Configuration Process
Configuration on S1:
S1(config)#router isis 100
S1(config-isis-100)#system-id 1111.0100.0000
S1(config-isis-100)#area 10
S1(config-isis-100)#redistribute connected
S1(config-isis-100)#interface vlan10
S1(config-isis-100-if-vlan10)#ip router isis
S1(config-isis-100-if-vlan10)#exit
S1(config-isis-100)#exit
S1(config)#router isis 200
S1(config-isis-200)#system-id 1111.0200.0000
S1(config-isis-200)#area 10
S1(config-isis-200)#redistribute connected
S1(config-isis-200)#interface vlan20
S1(config-isis-200-if-vlan20)#ip router isis
S1(config-isis-200-if-vlan20)#exit
S1(config-isis-200)#exit
Configuration on S2:
4-39
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S2(config-isis-200)#area 10
S2(config-isis-200)#interface vlan20
S2(config-isis-200-if-vlan20)#ip router isis
S2(config-isis-200-if-vlan20)#exit
S2(config-isis-200)#exit
Configuration Check
S1#show isis adjacency
Process ID: 100
Interface System id State Lev Holds SNPA(802.2) Pri MT
gei-0/1/1/1 S2 UP/UP L1L2 26/26 0021.8844.5541 64/64
Process ID: 200
Interface System id State Lev Holds SNPA(802.2) Pri MT
gei-0/1/1/2 S2 UP/UP L1L2 25/25 0021.8844.5541 64/64
The result shows that the traffic goes through vlan10, that is, the route with a smaller
instance number is preferred.
S2#show ip forwarding route isis-l2
IPv4 Routing Table:
Dest Gw Interface Owner Pri Metric
1.1.1.12/32 56.3.3.2 vlan10 isis_l2 115 10
88.6.5.5/32 56.3.3.2 vlan10 isis_l2 115 10
4-40
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 5
BGP Configuration
Table of Contents
BGP Overview............................................................................................................5-1
Configuring BGP ........................................................................................................5-4
Maintaining BGP ......................................................................................................5-55
BGP Configuration Examples ...................................................................................5-60
The session which is set up by BGP routers belonging to different ASs is called External
Border Gateway Protocol (EBGP) session, while a session which is set up between BGP
routers belonging to the same AS is called Internal Border Gateway Protocol (IBGP)
session.
An administrative area with independent routing policies is called an AS. The important
feature of an AS is that it has a unified internal route for another AS, and it has a consistent
topology for reachable destinations. The AS indicator is a value of 16-bit, ranging from 1
to 65535, where, 1–32767 are assignable, 32768–64511 are reserved, and 64512–65534
are used for private ASs (similar to private network addresses). When 16–bit AS number
5-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
is used, the AS number range is 1–65535. Current version also supports 32–bit AS which
is in the range of 1-4294967295.
à Next-hop
à Origin
2. Well-known discretionary attribute: The kind of attributes is not necessary
contained by route description.
à Local preference
à Atomic aggregate
3. Optional transitive attributes: This kind of attributes does not require that all BGP
examples support it. However, if it is supported, it can be transmitted to its BGP
neighbor. while, if it is not supported by the current router, it will be transmitted to
other BGP routers continuously.
à Aggregator
à Community
4. Optional nontransitive attribute: This kind of attributes shows that the routers
which do not support the attribute need to delete it.
Multi-Exit Discriminator (MED)
The kinds of BGP attributes can be expanded into 256 but not all attributes are used
together. The attributes can be used selectively and flexibly.
l BGP Message Type
à OPEN
It establishes BGP connection. The message includes BGP version number, local
AS number and the shortest hold time for negotiation, BGP ROUTER-ID and
other optional parameters.
à UPDATE
5-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
It sends BGP route updating packets. The message is sent only once route is
updated.
à KEEPALIVE
It confirms the peer status. The default sending interval is 60 seconds, and the
Hold-time is 180 seconds by default. Once the neighbor receives the KEEPALIVE
packet, the Hold-time timer will be reset. If the hold-time expires, then consider
that the neighbor is in abnormal status, and disconnect the BGP connection with
neighbor.
à NOTIFICATION
1. Idle State
It is the initial state. The BGP starts initialization after the protocol is activated. It
resets the timer, launches the first TCP connection and enters state 2.
2. Connect state
The BGP starts TCP connection and waits for the message of TCP successful
connection. If the connection is successful, then the BGP enters OpenSent state.
Otherwise, the BGP enters Active state.
5-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
3. Active state: The BGP always tries to establish TCP connection. If the connection
timer times out, then the BGP returns to Connect state. If TCP connection is
successful, then BGP enters OpenSent state.
4. OpenSent state
TCP connection is established already. The BGP sends the first OPEN packet
and waits for the reply from the peer. BGP examines the reply packet. If the BGP
finds error, it will send a NOTIFICATION packet and return to Idle state. If there
is no error in the reply packet, BGP will send a KEEPALIVE packet. KEEKALIVE
timer starts timing. The BGP enters into OpenConfirm state.
5. OpenConfirm state
The BGP waits for KEEPALIVE packet and resets the KEEPALIVE timer. When
the BGP receives a KEEPALIVE packet, it enters Established state.
6. Established state
Neighborhood is set up already. Router exchanges Update packet with its
neighbor, and meanwhile, the KEEPALIVE timer is reset.
In initial, the exchanging of routing information includes all BGP routes, that is, all
entries in BGP routing table will be exchanged. After the initial exchanging is finished,
the incremental and burst routing update is launched only when the route entries are
changed or been unavailable. The meaning of the so-called incremental is that not the
entity BGP table will be exchanged but only update the changed route entries. The
burst means that update routes only when the routing table is changed rather than
periodically route updating.
When a router sends route information to its neighbor, it will save the route entries sent
to neighbor at local. When the router receives a route updating packet, it will compare
updating packet with the locally saved routing entries. If this entry is not sent before,
then the router will send it to its neighbor. If the entry is sent already and better, the
router will send the entry to its neighbor and update its locally saved routing entries.
Compared with the conventional periodical routing table updating, this updating mode
saves the bandwidth a lot. Route updating is achieved by UPDATE packets.
During the process above, if the BGP connection fails to be established because of
any connection failure, authentication failure and route loopback and so on, the router
will send NOTIFICATION packet to its peer that close BGP session will be closed.
Later, the router enters Idle state.
5-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
their connection mode. Otherwise, if the two routers belong to different ASs, then they
adopt EBGP as their connection mode.
As shown in Figure 5-2, S1 and S2 are EBGP neighbors, S2 and S3 are IBGP neighbors.
5-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
<number> The AS system that the neighbor belongs to. The range of
a 2-byte AS number is 1-65535, and the range of a 4-byte
AS number is 1-4294967295.
Parameter Description
5-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Configuration Example
1. Set Up EBGP through Direct-Connected Address
As shown in Figure 5-3, S1 belongs to AS65000, and S2 belongs to AS65001.
Establish EBGP neighborhood between S1 and S2 through physical interfaces.
Configuration on S1:
S1#config terminal
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 129.213.1.1 255.255.255.252
S1(config-if-vlan10)#exit
S1(config)#router bgp 65000
S1(config-bgp)#neighbor 129.213.1.2 remote-as 65001
S1(config-bgp)#exit
Configuration on S2:
S2#config terminal
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 129.213.1.2 255.255.255.252
5-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S2(config-if-vlan10)#exit
S2(config)#router bgp 65001
S2(config-bgp)#neighbor 129.213.1.1 remote-as 65000
S2(config-bgp)#exit
5-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration on S1:
S1#config terminal
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 192.168.1.1 255.255.255.252
S1(config-if-vlan10)#exit
S1(config)#interface Loopback1
S1(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#router bgp 65000
S1(config-bgp)#neighbor 1.1.1.2 remote-as 65001
S1(config-bgp)#neighbor 1.1.1.2 ebgp-multihop ttl 5
S1(config-bgp)#neighbor 1.1.1.2 update-source loopback1
S1(config-bgp)#exit
S1(config)#ip route 1.1.1.2 255.255.255.255 192.168.1.2
Configuration on S2:
S2#config terminal
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.1.2 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#interface Loopback1
S2(config-if-loopback1)#ip address 1.1.1.2 255.255.255.255
S2(config-if-loopback1)#exit
S2(config)#router bgp 65001
S2(config-bgp)#neighbor 1.1.1.1 remote-as 65000
S2(config-bgp)#neighbor 1.1.1.1 ebgp-multihop ttl 5
5-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Note that if the number of hops is not designated behind ebgp-mulitihop, the
system will set TTL value as 1 by default.
To view the established BGP neighborhood, use the show ip bgp neighbor
command on S1.
S1#show ip bgp neighbor
BGP neighbor is 1.1.1.2, remote AS 65001, external link
BGP version 4, remote router ID 1.1.1.2
BGP state = Established, up for 00:01:01
hold time is 90 seconds, keepalive interval is 30 seconds
......
Connections established 1
Local host: 1.1.1.1, Local port: 179
Foreign host: 1.1.1.2, Foreign port: 1026
5-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Therefore, to keep the connectivity of the BGP, BGP routers have to set up a full
meshed network through IBGP session.
Parameter Description
Parameter Description
Parameter Description
5-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
1. The AS at where routers locate only has one egress, or it is a stub AS. That is to
say, the AS only has one point to connect to external network.
2. The AS at where routers locate is a transition type (that is to say, an AS can
connect to the third AS through the AS), but all routers of the AS run BGP.
The second condition is common. Since all routers have BGP information in AS, IGP
only needs to transmit routing information for local AS.
Synchronization function is enabled on router by default. Use no synchronization to
cancel synchronization function.
Configuration Example
As shown in Figure 5-5, S2 and S3 belong to the same AS. Set up IBGP connection
between S2 and S3 through Loopback addresses.
5-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration on S2:
S2#config terminal
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.2.1 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#interface Loopback1
S2(config-if-loopback1)#ip address 1.1.1.2 255.255.255.255
S2(config-if-loopback1)#exit
S2(config)#router bgp 65001
S2(config-bgp)#neighbor 1.1.1.3 remote-as 65001
S2(config-bgp)#neighbor 1.1.1.3 update-source loopback1
S2(config-bgp)#neighbor 1.1.1.3 next-hop-self
S2(config-bgp)#no synchronization
S2(config-bgp)#exit
S2(config)#router ospf 1
S2(config-ospfv2)#network 192.168.2.0 0.0.0.3 area 0
S2(config-ospfv2)#network 1.1.1.2 0.0.0.0 area 0
S2(config-ospfv2)#exit
Configuration on S3:
S3#config terminal
S3(config)#interface vlan10
S3(config-if-vlan10)#ip address 192.168.2.2 255.255.255.252
S3(config-if-vlan10)#exit
S3(config)#interface Loopback1
5-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Use show ip bgp neighbor to view the established BGP neighborhood on S2.
S2#show ip bgp neighbor
BGP neighbor is 1.1.1.3, remote AS 65001, internal link
BGP version 4, remote router ID 1.1.1.3
BGP state = Established, up for 00:01:25
hold time is 90 seconds, keepalive interval is 30 seconds
......
Connections established 1
last error code is 6
Local host: 1.1.1.2, Local port: 179
Foreign host: 1.1.1.3, Foreign port: 1096
5-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Configuration Example
This example shows how to configure BGP neighbor password authentication and
encrypt the password.
ZXR10(config)#router bgp 100
ZXR10(config-bgp)#neighbor 192.168.0.2 remote-as 100
ZXR10(config-bgp)#neighbor 192.168.0.2 password 789
ZXR10(config-bgp)#neighbor 192.168.0.2 password encrypt 123
ZXR10(config-bgp)#show running-config bgp
router bgp 100
neighbor 192.168.0.2 password encrypt u5pd4oR1YGR1E+My5y4ec1dbC7
eZf4gsX0qhVYXcb6KV1CMnm8VFlX9dcceOjgUYrxPGh3Gy7Rl8VxSlqtHcujwZ5qzj
LbVOkiKWz41nHPk=
!
l Restarting BGP Process
When BGP neighbor enters abnormal state, restart BGP neighbor process to recover.
To restart a BGP neighbor, use the following command in global configuration mode.
Command Function
Parameter Description
5-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
The routes to be advertised by BGP have to exist in IGP routing table already.
The common method of BGP route advertisement is to select the network segment to
advertise by the network command. This command specifies the destination network
segment and mask, and then the routes which match with the rule accurately will enter
into BGP routing table. The routes will be filtered and advertised.
5-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
For example, use network 18.0.0.0 255.0.0.0 in BGP. The network segments 18.0.0.0/8,
18.1.0.0/16 and 18.2.0.0/24 are added to BGP routing table. If these network
segments and subnetworks do not exist in routing table, then no route is injected to
BGP routing table. In order to cooperate with BGP route advertisement, it is required
that configure some static routes pointing to loopback address on router.
It is notable that not all routes injected to BGP routing table can be advertised. It
relates to BGP route filtering or routing policy.
In BGP, use network command to advertise known network to router. The known
network can be learned by direct-connected route, static route and dynamic route.
The usage of network in BGP is different to that of in IGP.
Configuration Example
As shown in Figure 5-6, S2 runs OSPF as IGP protocol. S2 requires that advertise
the network segment 18.0.0.0/8 advertised by OSPF to BGP.
5-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration on S2:
S2#config terminal
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.2.1 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#router bgp 65001
S2(config-bgp)#neighbor 192.168.2.2 remote-as 65000
S2(config-bgp)#network 18.0.0.0 255.255.255.0
S2(config-bgp)#exit
S2(config)#router ospf 1
S2(config-ospf)#network 18.0.0.0 0.255.255.255 area 0
S2(config-ospf)#exit
Configuration on S1:
S1#config terminal
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 192.168.2.2 255.255.255.252
S1(config-if-vlan10)#exit
S1(config)#router bgp 65000
S1(config-bgp)#neighbor 192.168.2.1 remote-as 65001
S1(config-bgp)#exit
The address under the entry of Next-hop is the next-hop address of BGP route. If the
address is represented as full zero, that means this route is generated by router itself.
The value under the Local-Pre is the priority level of route which is learned by BGP.
The default value is 100.
The field Path shows the origin of this route. Three types: IGP, EGP and incomplete.
Note:
à The symbol * indicates the route is available.
à The symbol > indicates the route is the optimized choice.
à The symbol i indicates the route is a IBGP route.
à The route without "i" indicates this is a EBGP route or local route.
5-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
The above example shows that the network segment 18.0.0.0/8 exists in BGP routing
table already. The next hop address is the interface 192.168.2.1 of S2.
l Redistributing Routes by redistribute Command
IGP needs to be configured on router already.
Full dynamic injection has to be chosen to advertise BGP routes when there are lots
of route entries and aggregation is not convenient.
When there are lots of route entries and aggregation is not convenient, use redistrib
ute command to redistribute one or more IGP protocol (RIP, OSPF and IS-IS) routes
to BGP.
Make sure that IGP does not redistribute the routes learnt by BGP to BGP again. Use
filter command to avoid loopback if it is necessary.
To redistribute routes on ZXR10 5900E, perform the following steps.
Parameter Description
Configuration Example
As shown in Figure 5-7, S2 runs OSPF as IGP protocol. It is required that redistribute
all OSPF routing information of S2 to BGP.
5-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration on S2:
S2#config terminal
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.2.1 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#router ospf 1
S2(config-ospfv2)#network 18.0.0.0 0.0.0.255 area 0
S2(config)#exit
S2(config)#router bgp 65001
S2(config-bgp)#neighbor 192.168.2.2 remote-as 65000
S2(config-bgp)#redistribute ospf-int
S2(config-bgp)#redistribute connected
S2(config)#exit
Add the OSPF external route to S2 and set the metric value as 5.
S2#config terminal
S2(config)#interface vlan10
S2(config-if-vlan10)#ip address 192.168.2.1 255.255.255.252
S2(config-if-vlan10)#exit
S2(config)#router ospf 1
S2(config-ospfv2)#network 18.0.0.0 0.0.0.255 area 0
5-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
S2(config)#exit
S2(config)#router bgp 65001
S2(config-bgp)#neighbor 1.1.1.1 remote-as 65000
S2(config-bgp)#redistribute ospf-ext metric 5
S2(config-bgp)#redistribute connected
S2(config)#exit
l Configuring Route Aggregation
To prevent route blackhole, aggregate the routes with the same mask on router in
route aggregation configuration.
BGP protocol aggregates the learnt routes to a route for advertisement. Thus, route
entries can be reduced a lot in routing table.
To configure route aggregation, perform the following steps.
Parameter Description
Configuration Example
1. Route Aggregation Configuration
5-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration on S1:
S1(config)#interface vlan10
S1(config-if-vlan10)#ip address 2.2.2.2 255.255.255.0
S1(config-if-vlan10)#exit
S1(config)#router bgp 100
S1(config-bgp)#neighbor 2.2.2.1 remote-as 300
S1(config-bgp)#aggregate-address 192.168.0.0 255.255.252.0 count 0 summary-only
S1(config-bgp)#redistribute ospf-int
S1(config-bgp)#redistribute connected
S1(config-bgp)#exit
S1(config)#router ospf 1
S1(config-ospfv2)#network 192.168.3.0 0.0.0.255 area 0
S1(config-ospfv2)#network 10.1.1.0 0.0.0.3 area 0
S1(config-ospfv2)#exit
5-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
After the aggregation, there is only one route in BGP routing table of S2 belonging
to AS300. It reduces the size of routing table.
If the command is used without summary-only, S2 will advertise the detailed routes
with the aggregated route.
S2#show ip bgp route
Status codes: *valid, >best, i-internal
Origin codes: i-IGP, e-EGP, ?-incomplete
In BGP routing table, there are four routes 192.168.0.0/24, 192.168.1.0/24 and
192.168.2.0/24, 192.168.3.0/24 except the aggregated route 192.168.0.0/22.
The parameter count <count> indicates the number of subnetworks which
are waiting to implement aggregation. <count> ranges from 0 to 255 and the
default value is 1, which means the number of subnetworks has to exist in
IGP. If the parameter is 0, that means advertise the route 192.168.0.0/22 when
any subnetwork of 192.168.0.0 255.255.252.0 appears in IGP routes. If the
parameter is 1 or other value, the following command is required using to specify
the related subnetwork segment.
aggregate-address <ip-address><net-mask> subnet <subnet-address><subnet-mask>
The above command means that the routing information can be aggregated and
advertised only when the specified subnetwork routing information appears in IGP
routing table and the route number satisfies the defined count number.
5-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
5-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
à No.5: LOCAL-PREF
It is transmitted within the local AS, indicating the priority of each path.
à No.6: ATOMIC_AGGREGATOR
à No.7: AGGREGATOR
à No.8: RFC1997 defines another common attribute: COMMUNITY
Here, No.1, 2 and 3 attribute are well-known mandatory attributes. No.5 and 6 are
well-konwn discretionary attributes. No.7 and 8 are optional transitive attributes. No.4
is optional nontransitive attribute. They have different priorities, LOCAL-PREF has the
highest priority, and the second one is AS-PATH and ORIGIN.
For other attributes used by BGP, please refer to FRC documentation.
Route map is used to control routing information, which redistributes routes between
routing areas by defining rules. The route map usually cooperates with the route
attributes to decide route.
To filter routes by route map, perform the following steps.
5-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
5-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Configuration Example
As shown in Figure 5-9, S1 and S2 set up EBGP connection between them. Configure
a route-map on S1. The route-map permits to advertise network 172.3.0.0/16 to
AS200, and set the MED value as 5.
Configuration on S1:
S1(config)#router bgp 100
S1(config-bgp)#neighbor 182.17.20.1 remote-as 200
S1(config-bgp)#network 172.3.0.0 255.255.0.0
S1(config-bgp)#network 172.5.0.0 255.255.0.0
S1(config-bgp)#network 172.7.0.0 255.255.0.0
S1(config-bgp)#neighbor 182.17.20.1 route-map MAP1 out
S1(config-bgp)#neighbor 182.17.20.1 send-med
S1(config-bgp)#exit
S1(config)#route-map MAP1 permit 10
S1(config-route-map)#match ip address 1
S1(config-route-map)#set ip metric 5
S1(config-route-map)#exit
S1(config)#ipv4-access-list 1
S1(config-ipv4-acl)#rule 10 permit 172.3.0.0 0.0.255.255
S1(config-ipv4-acl)#exit
5-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
When filtering route through route map, the match and set commands are usually used
together with route map. The match command defines the matching standard. The
set command defines the action satisfying matching standard.
Use the neighbor 182.17.20.1 send-med command to send MED attribute with
advertising routes to neighbor 182.17.20.1.
To view BGP routing table on S2, use the show ip bgp route command.
S2#show ip bgp route
Status codes: *-valid, >-best, i-internal,s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
Network Next Hop Metric LocPrf RtPrf Path
*>172.3.0.0/16 182.17.20.2 5 20 100 i
The above result shows that S2 learns the route from 172.3.0.0/16 only, and its MED
value is 5.
5-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Configuration Example
5-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
As shown in Figure 5-10, S1 and S2 are a pair of IBGP peers, S1 and S3 are a pair
of EBGP peers, S2 and S4 are a pair of EBGP peers, S2 and S4 are a pair of EBGP
peers. To avoid AS100 to act as transitive AS and prevent S1 from advertising network
segment 192.18.10.0/24 of AS300 to AS200, configure filter function on S1.
The route-map command and ACL are used to prevent S1 from advertising the route
with prefix 192.18.10.0/24 to AS200, that is, this route is filtered on S1. Therefore, S3
can not learn the route 192.18.10.0/24.
To view BGP routing table on S3, use the show ip bgp route command.
S3#show ip bgp route
Status codes: *-valid, >-best, i-internal,s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
Network Next Hop Metric LocPrf RtPrf Path
*>192.168.11.0/24 182.17.20.2 20 300 100 i
5-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
The above result shows S3 locating at AS200 does not learn the route pointing to
192.18.10.0/24.
l Restricting the Number of Route Advertisements Received by Neighbor
To restrict the number of route received by a neighbor, perform the following steps.
Parameter Description
drop-routes Drop the routes when the number of the received routes
exceeds the threshold value
warning-only Print the alarm when the number of the received routes
exceeds the threshold value
Configuration Example
As shown in Figure 5-11, S1 can receive 10 routes advertised by S2 at most, and it will
drop routes if more than 10 routes are received. S2 can receive 20 routes advertised
by S1, and neighborhood will be disconnected and set up again after 10 minutes if
more than 20 routes advertised by S1.
5-31
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration on S1:
S1(config)#router bgp 100
S1(config-bgp)#neighbor 10.1.1.1 remote-as 200
S1(config-bgp)#neighbor 10.1.1.1 maximum-prefix 10 drop-routes
Configuration on S2:
S2(config)#router bgp 200
S2(config-bgp)#neighbor 10.1.1.2 remote-as 100
S2(config-bgp)#neighbor 10.1.1.2 maximum-prefix 20 restart 1
Without the configuration of time for waiting reconnection (use parameter warning-onl
y) , when S1 advertises more than 20 routes to S2, S2 will display the alarm information
only.
Configuration on S2:
S2(config)#router bgp 200
S2(config-bgp)#neighbor 10.1.1.2 remote-as 100
S2(config-bgp)#neighbor 10.1.1.2 maximum-prefix 20 warning-only
l Filtering Routes by Using AS_PATH
AS-PATH is a well-known mandatory attribute. The attribute is a path filed, which is
composed of a series of AS numbers passing by a route pointing to one destination.
When the origin AS initiates a route to other external BGP peers, it will add its AS
number into the route. Subsequently, each route receiver will add its AS number into
route and place AS number on the head of AS sequence when sending the route to
other BGP peers.
BGP adopts AS-PATH as the factor of its route update to realize no-loop topology
of Internet. Each route contains a list with all passed AS numbers. When the route
is advertised to its origin AS, AS examines its AS number has been existed in AS
sequence, and it will not accept this route. Meanwhile, AS-PATH will be used for
deciding the optimum route. When multiple routes (their attributes except for AS-PATH
are the same) to the same destination are available, BGP will select a route with
the shortest path as the optimum route according to AS-PATH. Therefore, increasing
AS-PATH can affect BGP route selection.
When all routes of one or multiple AS require filtering, the filter method based on
AS-PATH is usually adopted.
5-32
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Parameter Description
Configuration Example
As shown in Figure 5-12, in Internet, the route to 10.10.0.0/24 of AS 100 is the optimum
path, and the path must be AS500→AS300→AS200→AS100.
5-33
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
By means of routing policy, AS_PATH is configured on the advertised route. Thus, the
route from AS 500 to AS 100 is changed.
To view BGP routing table on a router in AS500, use the show ip bgp route command.
ZXR10_AS500#show ip bgp route
Status codes: *valid, >best, i-internal
Origin codes: i-IGP, e-EGP, ?-incomplete
5-34
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
AS 500 realizes that there are 6 ASs passing by the route from AS 400 to AS 100, and
3 ASs passing by the route if it is from AS 300 to AS 100. Therefore, BGP will select
the routing that passes the less ASs if other priorities are the default settings. That is,
the routing that is from AS 300 to AS 100 satisfies the configuration requirement.
l Selecting Routes by Using LOCAL_PREF
Local_PREF is a well-known discretionary attribute. The default value is 100.
When a BGP router broadcasts routes to other BGP routers in the same AS, this
attribute shall be used. The value of attribute has influence on the path priority directly.
The route with the highest priority will be chosen as the optimum path. This attribute
also affects the local outbound traffic, and it is only used for local AS, that is, other
ASs will not affected by this attribute. Local-PREF is only exchanged between IBGP
neighbors, and it will not be advertised to EBGP neighbors.
5-35
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
Parameter Description
Configuration Example
As shown in Figure 5-13, S1, S2 and S3 adopts IBGP full connection. Use BGP
LOCAL-PREF attribute to meet the requirement that all egress services arrive AS300
by using the egress of S1.
5-36
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration on S1:
S1(config)#router bgp 600
S1(config-bgp)#no synchronization
S1(config-bgp)#neighbor 172.16.1.2 remote-as 300
S1(config-bgp)#neighbor 172.16.1.2 activate
S1(config-bgp)#neighbor 192.168.1.9 remote-as 600
S1(config-bgp)#neighbor 192.168.1.9 activate
S1(config-bgp)#neighbor 192.168.1.9 next-hop-self
S1(config-bgp)#neighbor 192.168.1.5 remote-as 600
S1(config-bgp)#neighbor 192.168.1.5 activate
S1(config-bgp)#neighbor 192.168.1.5 next-hop-self
S1(config-bgp)#neighbor 172.16.1.2 route-map Local_Pref in
S1(config-bgp)#exit
S1(config)#ipv4-access-list 1
S1(config-ipv4-acl)#permit any
S1(config)#route-map Local_Pref permit 10
S1(config-route-map)#match ip address 1
S1(config-route-map)#set local-preference 200
Configuration on S2:
S2(config)#router bgp 600
S2(config-bgp)#no synchronization
S2(config-bgp)#neighbor 172.16.0.2 remote-as 300
S2(config-bgp)#neighbor 172.16.0.2 activate
S2(config-bgp)#neighbor 192.168.1.1 remote-as 600
5-37
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Modify the Local_Pref value of S3 to specify an egress for the service. In this example,
the traffic going to 10.0.0.0/24 of AS300 are forwarded by S1 preferably. Therefore,
the route coming from S1 has higher Local_Pref value.
l Selecting Route by Using MED
MED is an optional nontransitive attribute. MED is used to affect the inbound service
flow. When there are many ingress in an AS, the one with the smallest MED will be
the ingress for external neighbor router entering AS. The default MED value is 0.
5-38
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
5-39
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Example
As shown in Figure 5-14, AS 100 and AS 400 are interconnected by two links.
Configure AS100 to make AS400 select link 1 to route to AS100 preferably.
5-40
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration on S2:
S2(config)#router bgp 400
S2(config-bgp)#neighbor 192.168.1.1 remote-as 100
S2(config-bgp)#neighbor 192.168.1.1 activate
S2(config-bgp)#neighbor 192.168.2.1 remote-as 100
S2(config-bgp)#neighbor 192.168.2.1 activate
S2(config-bgp)#exit
By means of MED modification, S2 selects the link 1 (MED value is 50 smaller than
that of link 2) to route to AS 100 preferably.
l Configuring BGP Community String Attributes
The community string attributes are optional transitive attributes. The community is a
group of destination routes with one or more common features. It has 4 bytes, the first
2 bytes are AS number and the last 2 bytes are identifier. When aggregate community
routes, the aggregated route inherits all the community attributes from all routes.
The definitions of several well-known community attributes are given as follows:
à local-AS: Advertise the route with this attribute to BGP neighbor routers in AS.
à Internet: Advertise the route with this attribute to all other routers.
5-41
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
Parameter Description
5-42
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Configuration Example
1. Marking the Routes with Community
As shown in Figure 5-15, AS600 configures attribute values for the route coming
from different ASs. The attribute of AS300 is 300:1, and attribute of AS400 is
400:1.
5-43
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
AS300 router (The following content omits configuration of port and IGP)
configuration:
ZXR10_AS300(config)#router bgp 300
ZXR10_AS300(config-bgp)#network 10.0.4.0 255.255.255.0
ZXR10_AS300(config-bgp)#neighbor 192.168.1.9 remote-as 200
ZXR10_AS300(config-bgp)#neighbor 192.168.1.9 activate
ZXR10_AS300(config-bgp)#neighbor 192.168.1.18 remote-as 600
ZXR10_AS300(config-bgp)#neighbor 192.168.1.18 activate
ZXR10_AS300(config-bgp)#network 10.0.4.0 255.255.255.0
ZXR10_AS300(config-bgp)#neighbor 192.168.1.18 route-map community out
ZXR10_AS300(config-bgp)#neighbor 192.168.1.18 send-community
ZXR10_AS300(config-bgp)#exit
ZXR10_AS300(config)#ip prefix-list AS200 seq 5 permit 10.0.3.0 24
ZXR10_AS300(config)#route-map Community permit 10
ZXR10_AS300(config-route-map)#match ip address prefix-list AS200
ZXR10_AS300(config-route-map)#set community 300:1
ZXR10_AS300(config-route-map)#exit
AS400 router (The following content omits configuration of port and IGP)
configuration:
5-44
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
The BGP routes received by AS600 device are marked, the routes coming from
AS300 are marked as 300:1, and the routes coming from AS400 are marked as
400:1.
AS600 router (The following content omits configuration of port and IGP)
configuration:
ZXR10_AS600(config)#router bgp 600
5-45
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
BGP select the route with higher Local_Pref value preferably. In this example, the
route from AS400 to 10.0.3.0/24 is selected.
5-46
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
à If the update message is sent by an EBGP neighbor, then advertise it to all clients
and non-clients.
à If the update message is sent by a non-client, then advertise it to clients.
à If the update message is sent by a RRC, then advertise it to all clients and
non-clients except the originator of this update message.
When multiple RRs are available in an AS, divide many RRs belonging to the same
AS to a cluster. An AS can have many clusters, and a cluster has one RR at least.
Note that RR is recommended to use only when every router holds more than 100
BGP sessions in an AS.
Parameter Description
Parameter Description
Configuration Example
As shown in Figure 5-16, S1, S2 and S3 are IBGP neighbors but they are not fully
connected. Configure a router reflector to make S3 forward the routes received by an
IBGP neighbor to another IBGP neighbor. Considering IBGP neighbors are not fully
interconnected in AS600, configure router reflector to avoid full interconnection.
5-47
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration on S1 (The following content omits the configuration of port and IGP):
S1(config)#router bgp 600
S1(config-bgp)#no synchronization
S1(config-bgp)#neighbor 172.16.1.2 remote-as 300
S1(config-bgp)#neighbor 172.16.1.2 activate
S1(config-bgp)#neighbor 192.168.1.5 remote-as 600
S1(config-bgp)#neighbor 192.168.1.5 activate
S1(config-bgp)#neighbor 192.168.1.5 next-hop-self
S1(config-bgp)#exit
Configuration on S2 (The following content omits the configuration of port and IGP):
S2(config)#router bgp 600
S2(config-bgp)#no synchronization
S2(config-bgp)#bgp cluster-id 3.3.3.3
S2(config-bgp)#neighbor 192.168.1.2 remote-as 600
S2(config-bgp)#neighbor 192.168.1.2 activate
S2(config-bgp)#neighbor 192.168.1.2 route-reflector-client
S2(config-bgp)#neighbor 192.168.1.6 remote-as 600
S2(config-bgp)#neighbor 192.168.1.6 activate
S2(config-bgp)#neighbor 192.168.1.6 route-reflector-client
S2(config-bgp)#exit
Configuration on S3:
S3(config)#router bgp 600
S3(config-bgp)#no synchronization
S3(config-bgp)#neighbor 172.16.0.2 remote-as 400
S3(config-bgp)#neighbor 172.16.0.2 activate
S3(config-bgp)#neighbor 192.168.1.1 remote-as 600
S3(config-bgp)#neighbor 192.168.1.1 activate
5-48
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
The function of route confederation is the same to that of RR. The route confederation
is used to reduce the number of BGP neighbor connections in an AS. Route
confederation divides an AS into many sub-ASs, and the IBGP routers in the AS
belong to different sub-ASs. IBGP is established inside each sub-AS, and EBGP is
established among sub-ASs. Sub-ASs are invisible to the external AS.
5-49
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Example
As shown in Figure 5-17, use confederation to avoid IBGP full connection in AS600.
Configuration on S2(The following content omits the configuration of port and IGP):
S2(config)#router bgp 65003
S2(config-bgp)#bgp confederation identifier 600
S2(config-bgp)#no synchronization
S2(config-bgp)#bgp confederation peers 65001 65002
S2(config-bgp)#neighbor 172.16.0.2 remote-as 65001
S2(config-bgp)#neighbor 172.16.0.2 activate
S2(config-bgp)#neighbor 192.168.1.10 remote-as 65003
S2(config-bgp)#neighbor 192.168.1.10 activate
S2(config-bgp)#neighbor 192.168.1.1 remote-as 65001
S2(config-bgp)#neighbor 192.168.1.1 activate
S2(config-bgp)#neighbor 172.16.2.2 remote-as 500
5-50
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration on S4(The following content omits the configuration of port and IGP):
S4(config)#router bgp 65002
S4(config-bgp)#bgp confederation identifier 600
S4(config-bgp)#no synchronization
S4(config-bgp)#network 10.0.0.0 255.255.255.0
S4(config-bgp)#bgp confederation peers 65003
S4(config-bgp)#neighbor 172.16.1.1 remote-as 65003
S4(config-bgp)#neighbor 172.16.1.1 activate
S4(config-bgp)#exit
The output above shows that there is a route pointing to AS500 on R4.
A larger AS is divided into some smaller ASs, and these samller ASs are connected
by EBGP. Each AS acts as an independent BGP AS to run IBGP.
A complete AS only runs an IGP protocol, and every sub-AS has IGP routing
information of all other sub-ASs.
l Configuring BGP Route Dampening
5-51
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
<reuse> Reuse value, the range is 1-20000, and the default value
750
Configuration Example
5-52
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Enable BGP route dampening function on router. Set the half-life is 30 minutes, the
re-use value is 500, and the suppress value is 2000, the maximum suppress time is
120 minutes.
ZXR10(config)#router bgp 100
ZXR10(config-bgp)#bgp dampening 30 500 2000 120
ZXR10(config-bgp)#network 203.250.15.0 255.255.255.0
ZXR10(config-bgp)#neighbor 192.208.10.5 remote-as 300
ZXR10(config-bgp)#exit
Use show ip bgp protocol to view the configuration of route dampening on router.
ZXR10#show ip bgp protocol
BGP router ID is 1.1.1.2, Local as is 1
Hold time is 90 seconds, KeepAlive time is 30 seconds
Default local preference is 100
Default export metric is 0
IPv4 IGP synchronization is disabled
IPv6 IGP synchronization is disabled
IGP synchronization is disabled
Default information advertise is disabled
Always compare med is disabled
Fast fallover is enabled
Client-to-client reflection is enabled
Enforce-first-as is enabled
IPv4 client-number: 1
Ipv4 unicast is activated
BGP FRR is disabled
BGP IPv6 frr is disabled
Router target is filtered
Graceful restart is disabled
As-path ignore is disabled
Router-id ignore is disabled
BGP advertise-active-only is disabled
BGP VPNv4 advertise-active-only is disabled
BGP IPv4 rib-only is disabled
BGP IPv6 rib-only is disabled
Route dampening enabled, halflife-time is 30,
reuse is 500, suppress is 2000, max-suppress-time is 120
Distance : external 20 internal 200
Here, the route dampening mechanism is activated. The half-life is 30 minutes, the
reuse value is 500, and the suppress value is 2000, and the maximum suppress time
is 120 minutes.
l Configuring BGP Peer Group
BGP peer group is to implement cluster management to BGP peer, which adds
peers into the uniform peer group and configure them. In this way, reduce the work
5-53
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
load of peer configuration, simply the configuration process and manage peers in
classification, improve the reliability and convenience of maintenance.
Parameter Description
Parameter Description
Parameter Description
Configuration Example
Create a BGP peer group. The name of the group is zte. In the AS100, add neighbors
192.168.0.2 and 192.168.0.3 to the group. Run the following command:
5-54
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Command Function
The following is sample output from the show ip bgp protocol command:
ZXR10#show ip bgp protocol
BGP router ID is 1.1.1.2, Local as is 1
Hold time is 90 seconds, KeepAlive time is 30 seconds
Default local preference is 100
Default export metric is 0
IPv4 IGP synchronization is disabled
IPv6 IGP synchronization is disabled
IGP synchronization is disabled
Default information advertise is disabled
Always compare med is disabled
Fast fallover is enabled
Client-to-client reflection is enabled
Enforce-first-as is enabled
IPv4 client-number: 1
Ipv4 unicast is activated
BGP FRR is disabled
BGP IPv6 frr is disabled
Router target is filtered
Graceful restart is disabled
As-path ignore is disabled
Router-id ignore is disabled
BGP advertise-active-only is disabled
BGP VPNv4 advertise-active-only is disabled
BGP IPv4 rib-only is disabled
5-55
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
Hold time is 90 seconds, KeepAlive The hold period is 90 seconds, and the keep-alive period is
time is 30 seconds 30 seconds.
Default local preference is 100 By default, the priority of the local router is 100.
Distance : external 20 internal 200 The external administrative distance is 20, and the internal
administrative distance is 200.
The following is sample output from the show ip bgp neighbor command:
ZXR10#show ip bgp neighbor
BGP neighbor is 129.213.1.2, remote AS 65001, external link
BGP version 4, remote router ID 129.213.1.2
BGP state = Established, up for 00:04:21
hold time is 90 seconds, keepalive interval is 30 seconds
Neighbor capabilities:
Route refresh: advertised and received
Address family IPv4 Unicast: advertised and received
All received 10 messages
0 updates, 0 errs
1 opens, 0 errs
9 keepalives
0 vpnv4 refreshs, 0 ipv4 refreshs, 0 ipv4 multicast refreshs, 0 ipv6 refreshs,
0 errs
0 notifications, 0 other errs
After last established received 8 messages
0 updates, 0 errs
0 opens, 0 errs
8 keepalives
0 vpnv4 refreshs, 0 ipv4 refreshs, 0 ipv4 multicast refreshs, 0 ipv6 refreshs,
0 errs
0 notifications, 0 other errs
All sent 10 messages
0 updates, 1 opens, 9 keepalives
0 vpnv4 refreshs, 0 ipv4 refreshs, 0 ipv4 multicast refreshs, 0 ipv6 refreshs,
0 notifications
After last established sent 8 messages
0 updates, 0 opens, 8 keepalives
0 vpnv4 refreshs, 0 ipv4 refreshs, 0 ipv4 multicast refreshs, 0 ipv6 refreshs,
5-56
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
0 notifications
For a description of the parameters in the execution result, refer to the following table:
Parameter Description
BGP neighbor is 129.213.1.2, remote The IP address of the BGP neighbor is 129.213.1.2. The peer
AS 65001, external link router belongs to AS65001, and it uses an EBGP connection.
BGP version 4, remote router ID BGP-4 is used. The ID of the peer BGP router is 129.213.1.2.
129.213.1.2
BGP state = Established, up for The neighbor status is Established. The session has been
00:04:21 established for 4 minutes and 21 seconds.
hold time is 90 seconds, keepalive The hold period is 90 seconds, and the keepalive period is
interval is 30 seconds 30 seconds.
Neighbor capabilities: The following content describes the capability of the peer
router.
All received 10 messages Ten messages are received. The messages include one
0 updates, 0 errs open message, nine keepalive messages. A VPNV4 route
1 opens, 0 errs update message is not received. There is no IPv4 route
9 keepalives update message, Notification message, and error message.
0 vpnv4 refreshs, 0 ipv4 refreshs,
0 ipv4 multicast refreshs, 0 ipv6
refreshs, 0 errs
0 notifications, 0 other errs
5-57
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
After last established received 8 Eight messages have been received since the neighborhood
messages is established for the last time. They are all keepalive
0 updates, 0 errs messages.
0 opens, 0 errs
8 keepalives
0 vpnv4 refreshs, 0 ipv4 refreshs,
0 ipv4 multicast refreshs, 0 ipv6
refreshs, 0 errs
0 notifications, 0 other errs
All sent 10 messages Ten messages are sent. The messages include 0 update
0 updates, 1 opens, 9 keepalives message, one open message and nine keepalive messages.
0 vpnv4 refreshs, 0 ipv4 refreshs,
0 ipv4 multicast refreshs, 0 ipv6
refreshs, 0 notifications
After last established sent 8 Eight messages have been sent since the neighborhood is
messages 0 updates, 0 opens, 8 established for the last time. The messages include 0 update
keepalives 0 vpnv4 refreshs, 0 ipv4 message, 0 open message and eight keepalive messages.
refreshs, 0 ipv4 multicast refreshs, 0
ipv6 refreshs, 0 notifications
All received nlri 0, unnlri 0, 0 accepted NLRI and unnlri messages are not received. The prefix of
prefixes unicast is not received.
All sent nlri 0, unnlri 0, 0 advertised NLRI and unnlri messages are not sent. A prefix of unicast
prefixes is advertised.
Connections established 1 A BGP connection with the peer is established once already.
Local host: 129.213.1.1, Local port: Local IP socket, including the local IP address and TCP port
179 number.
Foreign host: 129.213.1.2, Foreign Peer IP socket, including the peer IP address and TCP port
port: 1024 number.
The following is sample output from the show ip bgp route command:
5-58
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Parameter Description
Next Hop The nexthop of the BGP route. The nexthop represented
as full zero means that the route is generated by the local
router itself.
The following is sample output from the show ip bgp summary command:
ZXR10#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down(s) State/PfxRcd
1.1.1.1 4 2 14 13 00:06:06 6
1.1.1.3 4 1 6 9 00:02:33 2
For a description of the parameters in the execution result, refer to the following table:
5-59
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Parameter Description
As AS number of a neighbor.
S1 1.1.1.2/32
S2 1.1.1.3/32
S3 1.1.1.4/32
S4 1.1.1.1/32
S5 1.1.1.5/32
5-60
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration Flow
1. Configure a static route.
2. Configure an IGP (OSPF).
3. Enable BGP.
4. Configure a neighbor.
5. Modify a source address.
6. Configure route aggregation.
5-61
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
7. Configure multi-hops.
8. Cancel synchronization.
9. Configure a route-map to filter out specified routes.
10. Modify the metric value of the route to be advertised.
Configuration Commands
Run the following commands on S1:
S1(config)#interface loopback1
S1(config-if-loopback1)#ip address 1.1.1.2 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#interface vlan1
S1(config-if-vlan1)#ip address 11.1.1.2 255.255.255.252
S1(config-if-vlan1)#exit
S1(config)#interface vlan2
S1(config-if-vlan2)#ip address 13.1.1.1 255.255.255.252
S1(config-if-vlan2)#exit
S1(config)#router bgp 1
S1(config-bgp)#no synchronization
S1(config-bgp)#redistribute connected
S1(config-bgp)#neighbor 1.1.1.1 remote-as 2
S1(config-bgp)#neighbor 1.1.1.1 activate
S1(config-bgp)#neighbor 1.1.1.1 ebgp-multihop ttl 5
S1(config-bgp)#neighbor 1.1.1.1 update-source loopback1
S1(config-bgp)#neighbor 1.1.1.3 remote-as 1
S1(config-bgp)#neighbor 1.1.1.3 activate
S1(config-bgp)#neighbor 1.1.1.3 next-hop-self
S1(config-bgp)#neighbor 1.1.1.3 update-source loopback1
S1(config-bgp)#exit
S1(config)#ip route 1.1.1.1 255.255.255.255 11.1.1.1
S1(config)#ip route 1.1.1.3 255.255.255.255 13.1.1.2
5-62
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
S4(config)#interface loopback1
S4(config-if-loopback1)#ip address 1.1.1.1 255.255.255.255
S4(config-if-loopback1)#exit
S4(config)#interface vlan1
S4(config-if-vlan1)#ip address 11.1.1.1 255.255.255.252
S4(config-if-vlan1)#negotiation auto
S4(config-if-vlan1)#exit
S4(config)#interface vlan2
S4(config-if-vlan2)#ip address 10.1.1.1 255.255.255.0
5-63
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
S4(config-if-vlan2)#exit
S4(config)#router bgp 2
S4(config-bgp)#redistribute connected
S4(config-bgp)#redistribute static
S4(config-bgp)#network 10.1.1.0 255.255.255.0
S4(config-bgp)#aggregate-address 192.168.0.0 255.255.252.0 count 0 as-set
S4(config-bgp)#neighbor 1.1.1.2 remote-as 1
S4(config-bgp)#neighbor 1.1.1.2 activate
S4(config-bgp)#neighbor 1.1.1.2 ebgp-multihop ttl 5
S4(config-bgp)#neighbor 1.1.1.2 route-map test-static out
S4(config-bgp)#neighbor 1.1.1.2 send-med
S4(config-bgp)#neighbor 1.1.1.2 update-source loopback1
S4(config-bgp)#exit
S4(config)#ip route 1.1.1.2 255.255.255.255 11.1.1.2
S4(config)#ip route 192.168.100.0 255.255.255.0 10.1.1.2
S4(config)#ip route 192.168.1.0 255.255.255.0 10.1.1.2
S4(config)#ip route 192.168.0.0 255.255.255.0 10.1.1.2
S4(config)#ip route 192.168.3.0 255.255.255.0 10.1.1.2
S4(config)#ip route 192.168.2.0 255.255.255.0 10.1.1.2
S4(config)#ipv4-access-list 1
S4(config-ipv4-acl)#rule 1 permit 192.168.0.0 0.0.3.255
S4(config-ipv4-acl)#rule 2 permit 10.1.1.0 0.0.0.255
S4(config-ipv4-acl)#exit
S4(config)#route-map test-static permit 10
S4(config-route-map)#match ip address 1
S4(config-route-map)#set ip metric 33
S4(config-route-map)#exit
5-64
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration Verification
Run the following command to check the BGP routing table and route forwarding table on
S1.
S1#show ip bgp route
Status codes: *-valid, >-best, i-internal,s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
Network Next Hop Metric LocPrf RtPrf Path
*>1.1.1.2/32 1.1.1.2 0 ?
*>10.1.1.0/24 1.1.1.1 33 20 2 i
*>11.1.1.0/30 11.1.1.2 0 ?
*>i 12.1.1.0/30 1.1.1.3 100 200 ?
*>13.1.1.0/30 13.1.1.1 0 ?
*i 13.1.1.0/30 1.1.1.3 100 200 ?
*>i 14.1.1.0/30 1.1.1.3 0 100 200 3 ?
*>i 20.1.1.0/24 1.1.1.3 122 100 200 3 ?
*>192.168.0.0/22 1.1.1.1 33 20 2 i
*>192.168.0.0/24 1.1.1.1 33 20 2 ?
*>192.168.1.0/24 1.1.1.1 33 20 2 ?
*>192.168.2.0/24 1.1.1.1 33 20 2 ?
*>192.168.3.0/24 1.1.1.1 33 20 2 ?
Run the following command to check the BGP routing table and route forwarding table on
S2.
5-65
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Run the following command to check the BGP routing table and route forwarding table on
S3.
5-66
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
*>1.1.1.4/32 1.1.1.4 0 ?
*>10.1.1.0/24 1.1.1.3 20 1 2 i
*>11.1.1.0/30 1.1.1.3 20 1 ?
*>12.1.1.0/30 12.1.1.1 0 ?
*12.1.1.0/30 1.1.1.3 20 1 ?
*>13.1.1.0/30 1.1.1.3 20 1 ?
*>14.1.1.0/30 14.1.1.1 0 ?
*>20.1.1.0/24 14.1.1.2 122 110 ?
*>192.168.0.0/22 1.1.1.3 20 1 2 ?
*>192.168.0.0/24 1.1.1.3 20 1 2 ?
*>192.168.1.0/24 1.1.1.3 20 1 2 ?
*>192.168.2.0/24 1.1.1.3 20 1 2 ?
*>192.168.3.0/24 1.1.1.3 20 1 2 ?
Run the following command to check the BGP routing table and route forwarding table on
S4.
5-67
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
*>1.1.1.2/32 11.1.1.2 1 ?
*>10.1.1.0/24 10.1.1.1 0 i
*>11.1.1.0/30 11.1.1.1 0 ?
*11.1.1.0/30 1.1.1.2 20 1 ?
*>12.1.1.0/30 1.1.1.2 20 1 ?
*>13.1.1.0/30 1.1.1.2 20 1 ?
*>14.1.1.0/30 1.1.1.2 20 1 3 ?
*>20.1.1.0/24 1.1.1.2 20 1 3 ?
*>192.168.0.0/22 0.0.0.0 254 i
*>192.168.0.0/24 10.1.1.2 1 ?
*>192.168.1.0/24 10.1.1.2 1 ?
*>192.168.2.0/24 10.1.1.2 1 ?
*>192.168.3.0/24 10.1.1.2 1 ?
*>192.168.100.0/24 10.1.1.2 1 ?
Run the following command to test network connectivity between S4 and S5.
S4#ping 20.1.1.1
sending 5,100-byte ICMP echos to 20.1.1.1,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 0/4/20 ms.
S4#trace 20.1.1.1
tracing the route to 20.1.1.1
1 11.1.1.2 20 ms <20ms <20ms
2 13.1.1.2 <20ms <20ms <20ms
3 12.1.1.1 <20ms <20ms <20ms
4 14.1.1.2 <20ms <20ms <20ms
5-68
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
[finished]
S5#ping 10.1.1.2
sending 5,100-byte ICMP echos to 10.1.1.2,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 0/0/0 ms.
S5#trace 10.1.1.2
tracing the route to 10.1.1.2
1 14.1.1.1 <20ms <20ms <20ms
2 12.1.1.2 <20ms <20ms <20ms
3 13.1.1.1 <20ms <20ms <20ms
4 11.1.1.1 <20ms <20ms <20ms
5 * * *
[finished]
Run the following command to test network connectivity on a PC (IP address is 10.1.1.2
255.255.255.0).
C:\Documents and Settings\Administrator>ping 20.1.1.1
Pinging 20.1.1.1 with 32 bytes of data:
Reply from 20.1.1.1: bytes=32 time=1ms TTL=251
Reply from 20.1.1.1: bytes=32 time=1ms TTL=251
Reply from 20.1.1.1: bytes=32 time=1ms TTL=251
Reply from 20.1.1.1: bytes=32 time=1ms TTL=251
Ping statistics for 20.1.1.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 1ms, Average = 1ms
The test results above show that AS2 can communicate with AS3 normally.
5-69
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Commands
Run the following commands on S1:
S1(config)#router bgp 1
S1(config-bgp)#no synchronization
S1(config-bgp)#neighbor 172.16.1.2 remote-as 1
S1(config-bgp)#neighbor 172.16.1.2 next-hop-self
S1(config-bgp)#neighbor 172.16.20.1 remote-as 2
5-70
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
S4(config-bgp)#exit
Configuration Verification
Run the show ip bgp summary command to check the neighborhood on S4.
S4(config)#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down(s) State/PfxRcd
172.16.20.2 4 1 46 140 00:22:35 0
Run the show ip bgp route command to check the BGP routing table on S4.
Run the show ip bgp summary command to check the neighborhood on S1.
5-71
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Run the following command to check the BGP routing table on S1:
S1(config)#show ip bgp route
Status codes: *-valid, >-best, i-internal, s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
Network NextHop Metric LocPrf RtPrf Path
*> 192.16.0.0/16 172.16.20.1 20 i 2
Run the show ip bgp summary command to check the neighborhood on S2.
S2(config)#show ip bgp summary
Neighbor Ver As MsgRcvd MsgSend Up/Down(s) State/PfxRcd
183.16.20.2 4 3 46 140 00:22:35 0
172.16.1.1 4 1 46 140 00:22:35 1
Run the following command to check the BGP routing table on S2:
S2(config)#show ip bgp route
Status codes: *-valid, >-best, i-internal, s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
Network Next Hop Metric LocPrf RtPrf Path
*>i 192.16.0.0/16 172.16.1.1 20 i 2
Run the show ip bgp summay command to check the neighborhood on S5.
Run the following command to check the BGP routing table on S5:
S5(config)#show ip bgp route
Status codes: *-valid, >-best, i-internal, s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
Network Next Hop Metric LocPrf RtPrf Path
*> 192.16.0.0/16 173.16.20.2 20 i 1 2
5-72
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Configuration Flow
1. Establish EBGP neighbor relations among S1, S2, and S3. Set the priority of the route
learnt from S2 on S1 to 200.
2. Enable the BGP FRR function on S1.
Configuration Commands
Establish EBGP neighbor relations among S1, S2, and S3, and enable the FRR function
on S1. In the example, the priority of the route learnt from S2 on S1 is set to 200. The
optimal routing path for 1.1.1.150/32 advertised by S3 is S1→S2→S3.
Run the following commands on S1:
S1(config)#router bgp 1
S1(config-bgp)#neighbor 172.16.1.2 remote-as 2
S1(config-bgp)#neighbor 171.16.20.2 remote-as 3
5-73
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Verification
Run the show ip forwarding backup route command to check whether the configuration
can enable the FRR function:
Run the following command to check whether the BGP FRR function is enabled on S1:
S1#show ip forwarding backup route
IPv4 Backup Routing Table:
Dest Gw Interface Owner Pri Metric M/S Status
1.1.1.150/32 172.16.1.2 gei-0/1/1/1 BGP 20 0 M I
1.1.1.150/32 171.16.20.2 gei-0/1/1/2 BGP 20 0 S U
Configuration Flow
1. Establish IBGP neighbor relations among S1, S2, and S3.
2. Configure S2 as the RR, and set S1 and S3 as clients of S2.
3. Redistribute a route on S1 and advertise it to S2.
4. S2 reflects this route to S3.
Configuration Commands
Run the following commands on S1 (the configuration of the interface address is omitted):
S1(config)#router bgp 100
S1(config-bgp)#neighbor 1.1.1.2 remote-as 100
S1(config-bgp)#redistribute connected /*Redistribute a directly connected route
for ease of verifying a route*/
S1(config-bgp)#exit
Run the following commands on S2 (the configuration of the interface address is omitted):
S2(config)#router bgp 100
S2(config-bgp)#neighbor 1.1.1.1 remote-as 100
S2(config-bgp)#neighbor 2.1.1.2 remote-as 100
S2(config-bgp)#neighbor 1.1.1.1 route-reflector-client
5-74
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
Run the following commands on S3 (the configuration of the interface address is omitted):
S3(config)#router bgp 100
S3(config-bgp)#neighbor 2.1.1.1 remote-as 100
S3(config-bgp)#exit
Configuration Verification
S1(config-bgp)#show ip bgp route
Status codes: *-valid, >-best, i-internal, s-stale
Origin codes: i-IGP, e-EGP, ?-incomplete
5-75
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
Configuration Flow
1. Establish BGP relations between S1 and S3, and between S2 and S3.
2. Check active and standby routers status when S1 and S2 operate as VRRPs.
3. Configure a track samgr object in BGP mode.
Note:
For how to establish BGP neighbor relations between S1 and S3, and between S2 and
S3, refer to the BGP Configuration Example.
For how to check active and standby routers status when S1 and S2 operate as
VRRPs, refer to the VRRP Confguration section in the ZXR10 8900E (V3.01.01)
Series Core Switch Configuration Guide Configuration Guide (Reliability).
Configuration Commands
Run the following commands on S1
S1(config)#interface gei-0/1/1/1
S1(config-if-gei-0/1/1/1)#no shutdown
S1(config-if-gei-0/1/1/1)#ip address 13.13.13.1 255.255.255.0
5-76
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 BGP Configuration c u -tr a c k
S1(config-vrrp-if-gei-0/1/1/1)#exit
S1(config-vrrp)#exit
Configuration Verification
If S1 operates as the active router, traffic is forwarded from S1 to S3. If S1 is disconnected,
the traffic is forwarded from S2 to S3.
5-77
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
routes are limited, you can use the default configuration. If S1 or S2 is restarted, packets
forwarding is not interrupted.
Configuration Flow
1. Establish a BGP neighbor relation between S1 and S2.
2. Enable the graceful restart function on S1 and S2 respectively.
Configuration Commands
Run the following commands on S1:
S1(config)#interface loopback1
S1(config-if-loopback1)#ip address 172.20.96.1 255.255.255.255
S1(config-if-loopback1)#exit
S1(config)#interface gei-0/1/1/1
S1(config-if-gei-0/1/1/1)#ip address 25.60.61.60 255.255.255.252
S1(config-if-gei-0/1/1/1)#exit
S1(config)#router bgp 18004
S1(config-bgp)#neighbor 172.20.96.2 remote-as 18004
S1(config-bgp)#neighbor 172.20.96.2 update-source loopback1
S1(config-bgp)#bgp graceful-restart
Configuration Verification
If traffic can be forwarded properly after the active/standby switchover operation, the
configuration is performed correctly.
5-78
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures
Figure 1-1 Indirect Static Route Next Hop Configuration Example............................. 1-3
Figure 1-2 Static Route Configuration Example......................................................... 1-6
Figure 1-3 Static Route Summary Configuration Example......................................... 1-8
Figure 1-4 Default Route Configuration Example ...................................................... 1-9
Figure 2-1 RIP Configuration Example Topology ..................................................... 2-13
Figure 3-1 OSPF Router Type .................................................................................. 3-4
Figure 3-2 OSPF Basic Configuration Example......................................................... 3-9
Figure 3-3 OSPF Interface Attribute Configuration .................................................. 3-12
Figure 3-4 OSPF Authentication Configuration Example ......................................... 3-14
Figure 3-5 OSPF Stub Area Configuration Example................................................ 3-18
Figure 3-6 NSSA Area Configuration Example........................................................ 3-21
Figure 3-7 OSPF Inter-Area Route Aggregation Configuration Example ................. 3-23
Figure 3-8 Route Aggregation with Route Redistribution Configuration
Example ............................................................................................... 3-26
Figure 3-9 OSPF Route Load Balancing Configuration Example............................. 3-28
Figure 3-10 OSPF Redistribution Route Configuration Example.............................. 3-31
Figure 3-11 OSPF Virtual Link Configuration Example ............................................ 3-35
Figure 3-12 Sham-link............................................................................................. 3-36
Figure 3-13 OSPF Configuration Example One....................................................... 3-45
Figure 3-14 OSPF Configuration Example Two....................................................... 3-47
Figure 3-15 OSPF Multi-Instance Configuration Example ....................................... 3-49
Figure 4-1 IS-IS Architecture..................................................................................... 4-2
Figure 4-2 NSAP Address Architecture ..................................................................... 4-3
Figure 4-3 Three Times of Handshaking ................................................................... 4-4
Figure 4-4 Neighbor Establishment on a Broadcast Network..................................... 4-6
Figure 4-5 DIS on a Broadcast Network .................................................................... 4-6
Figure 4-6 Point-to-point Diffusion and Database Synchronization ............................ 4-8
Figure 4-7 Diffusion and Database Synchronization on a Broadcast Link ................ 4-10
Figure 4-8 Route-leaking ........................................................................................ 4-11
Figure 4-9 Single Area IS-IS Configuration Example............................................... 4-28
Figure 4-10 Multiple Area IS-IS Configuration Example........................................... 4-32
Figure 4-11 IS-IS Multi-Instance Configuration Example ......................................... 4-39
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Glossary
ABR
- Area Border Router
AD
- Administrative Domain
ASBR
- Autonomous System Boundary Router
BDR
- Backup Designate Router
BGP
- Border Gateway Protocol
CIDR
- Classless Inter-Domain Routing
CLNS
- ConnectionLess Network Service
DIS
- Designate IS
DR
- Designated Router
EBGP
- External Border Gateway Protocol
IBGP
- Interior Border Gateway Protocol
IGP
- Interior Gateway Protocol
IP
- Intelligent Peripheral
IS-IS
- Intermediate System-to-Intermediate System
ISO
- International Organization for Standardization
LSA
- Link State Advertisement
LSDB
- Link-state Database
III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IPv4 Routing) c u -tr a c k
LSP
- Link State Packet
LSU
- Link State Update
MAC
- Media Access Control
MED
- MULTI_EXIT_DISC
MP-BGP
- Multiprotocol BGP
NBMA
- Non-Broadcast Multiple Access
NSAP
- Network Service Access Point
NSSA
- Not-So-Stubby Area
OSI
- Open System Interconnection
OSPF
- Open Shortest Path First
PDU
- Protocol Data Unit
PE
- Provider Edge
RFC
- Remote Feature Control
RIP
- Routing Information Protocol
RR
- Router Reflector
SNP
- Sequence Num PDU
SPF
- Shortest Path First
TCP
- Transmission Control Protocol
TLV
- Type/Length/Value
IV
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Glossary c u -tr a c k
UDP
- User Datagram Protocol
VLSM
- Variable Length Subnet Mask
VPN
- Virtual Private Network
VRF
- Virtual Route Forwarding
VRRP
- Virtual Router Redundancy Protocol
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Version: 3.00.11
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: [email protected]
h a n g e Vi h a n g e Vi
XC e XC e
F- w F- w
PD
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
LEGAL INFORMATION
Copyright © 2015 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Contents
About This Manual ......................................................................................... I
Chapter 1 IP Address Configuration......................................................... 1-1
1.1 IP Address Overview .......................................................................................... 1-1
1.2 Configuring IP Address ....................................................................................... 1-2
1.3 Maintaining IP Address ....................................................................................... 1-2
1.4 IP Address Configuration Example ...................................................................... 1-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures............................................................................................................. I
Glossary ........................................................................................................ III
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Intended Audience
This manual is intended for:
Chapter 3, IP MTU Describes the overview and principles of MTU configuration, related
Configuration configuration and maintenance commands, and configuration examples.
Chapter 4, DHCP Describes the overview and principles of DHCP configuration, related
Configuration configuration and maintenance commands, and configuration examples.
Chapter 5, TCPv4 Describes the overview and principles of TCPv4 configuration, related
Configuration configuration and maintenance commands, and configuration examples.
Chapter 6, UDPv4 Describes the overview and principles of UDPv4 configuration, related
Configuration configuration and maintenance commands, and configuration examples.
Chapter 8, IPTV Describes the overview and principles of IPTV configuration, related
Configuration configuration and maintenance commands, and configuration examples.
Conventions
This manual uses the following typographical conventions:
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 1
IP Address Configuration
Table of Contents
IP Address Overview..................................................................................................1-1
Configuring IP Address...............................................................................................1-2
Maintaining IP Address...............................................................................................1-2
IP Address Configuration Example .............................................................................1-3
Network bits and subnet bits are used to uniquely identify a network. Use subnet mask to
find which part in IP address indicates network bits and subnet bits, which part stands for
host bits. The part with subnet mask of "1" corresponds to network bits and subnet bits of
IP address, while the part with subnet mask of "0" corresponds to host bits.
Division of subnets greatly improves utilization of IP addresses, which relieves the problem
of insufficient IP addresses to some extent.
1-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Command Function
ZXR10#show ip interface [ brief [ phy This shows the information of the IP address
|<interface-name >|[{ exclude | include}<line>]]] configured in the current interface.
1-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 IP Address Configuration c u -tr a c k
Parameter Description
line protocol is up It indicates whether the link layer protocol is available. The
up represents that the alink layer protocol state is available
while the down represents that the link layer protocol state
is unavailable.
1-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Flow
1. Configure IP addresses of the layer 3 vlan interface.
2. Test the configuration result to confirm that S1 and S2 can ping each other.
Configuration Commands
S1 configuration,
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface gei-0/1/1/1
S1(config-swvlan-if-gei-0/1/1/1)#switchport access vlan50
S1(config-swvlan-if-gei-0/1/1/1)#!
S1(config)#interface vlan50
S1(config-if-vlan50)#ip address 10.1.1.1 255.255.255.0
S1(config-if-vlan50)#exit
S2 configuration,
S2(config)#switchvlan-configuration
S2(config-swvlan)#interface gei-0/1/1/2
S2(config-swvlan-if-gei-0/1/1/2)#switchport access vlan50
S1(config-swvlan-if-gei-0/1/1/2)#!
S2(config)#interface vlan50
S2(config-if-vlan50)#ip address 10.1.1.2 255.255.255.0
S2(config-if-vlan50)#exit
Configuration Verification
Validate the configuration on S1,
S1#ping 10.1.1.2
sending 5,100-byte ICMP echoes to 10.1.1.2,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max=
129/185/200 ms.
1-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 2
IP Performance
Table of Contents
ICMP Response .........................................................................................................2-1
Clearing Static Data ...................................................................................................2-2
Configuring IP Source Route Options .........................................................................2-2
Enabling the ICMP Redirection Packet Function.........................................................2-3
Maintaining IP Performance .......................................................................................2-4
l Configuration Thought
1. Configure IP addresses of S1 and S2 interfaces.
2. Test configuration result to make sure that ICMP response (ping) is realized
between S1 and S2.
l Configuration Process
S1 configuration,
S1(config)#switchvlan-configuration
S1(config-swvlan)#interface gei-0/1/1/1
S1(config-swvlan-intf)#switchport access vlan 1
S1(config-swvlan-intf)#exit
2-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
S1(config)#interface vlan1
S1(config-if)#ip address 10.1.1.1 255.255.255.0
S2 configuration,
S2(config)#switchvlan-configuration
S2(config-swvlan)#interface gei-0/1/1/2
S2(config-swvlan-intf)#switchport access vlan 2
S2(config-swvlan-intf)#exit
S2(config)#interface vlan2
S2(config-if)#ip address 10.1.1.2 255.255.255.0
l Configuration Check
Validate the configuration on S1,
S1#ping 10.1.1.2
sending 5,100-byte ICMP echoes to 10.1.1.2,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 1/1/21 ms.
S2#ping 10.1.1.1
sending 5,100-byte ICMP echoes to 10.1.1.2,timeout is 2 seconds.
!!!!!
Success rate is 100 percent(5/5),round-trip min/avg/max= 1/1/21 ms.
Command Function
2-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 IP Performance c u -tr a c k
The source host specifies a path called source path by IP network. Software forwards the
packets according to the specified source path. This function is required when a packet
has to be transmitted by using the specified path. By default, source route processing is
executed.
To configure IP source route options on ZXR10 5900E, use the following commands.
Command Function
Example
The following example shows how to enable the ICMP redirection packet function on
interface vlan50:
ZXR10(config)#icmp-config
ZXR10(config-icmp)#interface vlan50
ZXR10(config-icmp-if)#ip redirect
2-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Command Function
2-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 3
IP MTU Configuration
Table of Contents
IP MTU Overview .......................................................................................................3-1
Configuring IP MTU....................................................................................................3-2
Maintaining IP MTU....................................................................................................3-2
IP MTU Configuration Example ..................................................................................3-3
However, IP MTU value cannot be set too small because each packet has a 40 bytes
header containing important control information. The header occupies lots of available
bandwidth if IP MTU value is smaller. For example, a good working 56k modem can upload
data at 4200bytes/second. If IP MTU value is set to 90 bytes, and the header occupies 40
bytes (44% of the size of the whole data packet). The utilization rate of bandwidth is very
low because 44% of 4200 (1428 bytes) bytes are used to transmit the header, only 2772
bytes are used to transmit user data. Therefore, it is necessary to configure an appropriate
IP MTU value.
3-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Command Function
For example: to view the IP MTU value of the vlan100 interface, run the following
command:
ZXR10(config-if-vlan100)#show ip interface vlan100
gre_tunnel1 AdminStatus is up, PhyStatus is up, line protocol is down
IP MTU 1000 bytes
3-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 IP MTU Configuration c u -tr a c k
Configuration Flow
1. Enter interface configuration mode.
2. Configure IP MTU value of the interface.
Configuration Commands
S1 configuration,
S1(config)#interface vlan100
S1(config-if-vlan100)#ip mtu 1300
S1(config-if-vlan100)#exit
Verification
Run the following command to verify the IP MTU value of the interface for VLAN100:
S1(config-if-vlan100)#show running-config-interface vlan100
!<INTERFACE>
interface vlan100
ip mtu 1300
$
!</INTERFACE>
As shown above, the IP MTU value of the interface for VLAN100 is 1300 bytes.
3-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
3-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 4
DHCP Configuration
The predecessor of DHCP BOOTP. BOOTP is applied for the network connecting to a
diskless PC. The PC connects to the network by using BOOTROM (the client), not starting
from a disk. BOOTP (the server) can establish TCP/IP environment automatically.
DHCP is the enhanced version of BOOTP. It has two parts, one is the server, and another is
the client. The DHCP service manages all the IP network configuration data in a centralized
way and processes DHCP requests coming from the client. The client uses the IP data
allocated by the server.
DHCP uses UDP as the transmission protocol. The host sends a message to port 67 of
the DHCP server, and the DHCP server replies a message to port 68 of the host. The
DHCP works in the following steps:
1. The host sends a broadcast packet DHCP Discover to request IP address and other
configuration parameters.
2. The DHCP server returns a unicast/broadcast DHCP Offer packet that contains a valid
IP address and the configurations.
3. The host selects the server that receives the DHCP Offer first, and then sends
a broadcast packet DHCP Request to the server, indicating that the related
configurations are accepted.
4. The selected DHCP server returns a unicast/broadcast DHCP Ack packet.
By now the host can use the IP address and configurations obtained from the DHCP server
for communication.
The IP addresses allocated by the DHCP server to the host fall into the following three
forms:
1. The administrator allocates an IP address to a specific host.
2. An IP address is allocated to a host randomly and permanently.
3. An IP address is allocated to a host for a certain period randomly.
Usually the third method is used. The valid time segment is called lease period. Once the
lease period expires, the host must request the server for renewing the lease. The host
cannot renew the lease until the server accepts the request. Otherwise, the host must give
up unconditionally.
A router does not forward the received broadcast packet from a subnet to another by
default. However, the router acting as the default gateway of the user host must send the
broadcast packet to the subnet where the DHCP server is located if the DHCP server and
the user host are not in the same subnet. This function is called DHCP relay.
ZXR10 5900E can act as a DHCP server or DHCP relay to forward DHCP information.
Table of Contents
4-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
4-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
ZXR10(config-ip-pool)#conflict-time <1-18000>
ZXR10(config-ip-pool)#network <network-number><ne
twork-mask>
4-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
ZXR10(config)#ip dhcp policy < policy-name>< priority> Binds the specified DHCP pool
to a DHCP policy.
ZXR10(config-dhcp-policy)#dhcp-pool<dhcppool-name>
ZXR10#kick-off ip dhcp server user [[interface <interface-n Gets users offline based on the
21 ame>]|[mac <mac-address>]|[ip <ip-address>[vrf-instance specified attribute (interface,
<vrf-name>]]] MAC address, or IP address).
For a description of the parameters in Step 12, refer to the following table:
Parameter Description
For a description of the parameters in Step 13, refer to the following table:
4-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Parameter Description
For a description of the parameters in Step 14, refer to the following table:
Parameter Description
<IP> IP address.
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
4-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
<ip-address> IP address.
For a description of the parameter in Step 16, refer to the following table:
Parameter Description
For a description of the parameter in Step 17, refer to the following table:
Parameter Description
Command Function
ZXR10#show ip local pool {[configure <pool-name> Displays the information about the
vrf-instance <instance name>] , [conflict-ip <pool-name> local address pool.
vrf-instance <instance name>] , [exclude-ip <pool-name>
vrf-instance <instance name>] , [statistics <pool-name> total],
[used-exclude-ip <pool-name> vrf-instance <instance name>] ,
[used-ip <pool-name> vrf-instance <instance name>]}
ZXR10# show ip dhcp server user [interface <interface-name>[ Displays the information about
total-count]]|[ total-count] current online users on the DHCP
server.
ZXR10#show ip dhcp packet statistic MP-0/1/0 {global | mgmt_eth | Displays statistics of DHCP
supervlan <1-4000>| vlan <1-4094>} packets sent and received.
4-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Command Function
Run the show ip dhcp configuration command to display the configuration of the DHCP
process module. The following shows the output of the show ip dhcp configuration
command:
DHCP process state information
process state :enable(running)
ramble state:disable
suppress_nak state:disable
max_hops: 4
DHCP server configure:
server support max user: 64000
server update arp: off
DHCP relay configure:
not insert relay option82 information in BOOTREQUEST.
relay option82 policy: replace
relay option82 format: china-tel
relay option82 user policy: interface
relay support max user: 64000
relay update arp: off
Field Description
server support max user Maximum number of users supported on the server.
server update arp Whether the ARP update function is enabled on the server.
not insert relay information in Whether Option82 is inserted. Here, it is not inserted.
BOOTREQUEST
4-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Field Description
relay information user policy Policy of Option82. There are two modes, uniform, and
interface.
relay support max user Maximum number of users supported on the relay.
relay update arp Whether the ARP update function is enabled on the relay.
Run the show ip local pool command to display the information about the local address
pool. The following shows the output of the show ip local pool command:
ZXR10(config)#show ip local pool
PoolName Begin End Mask Free Used
zte 20.1.1.1 20.1.1.100 24 100 0
TotalPool: 1
Field Description
Run the show ip dhcp server user command to display the information about the current
online users on the DHCP server. The following shows the output of the show ip dhcp
server user command:
ZXR10#show ip dhcp server user
CLIENT MAC addr: 0010.9400.0001
IP addr: 29.160.1.10
State: BOUND
Expiration: 11:16:07 06/07/2010
VRF:
CLIENT MAC addr: 0010.9400.0002
IP addr: 29.160.1.11
State: BOUND
Expiration: 11:16:07 06/07/2010
VRF:
ZXR10#show ip dhcp server user interface vlan1000 total-count
Current online users on this interface are: 2
ZXR10#show ip dhcp server user total-count
Current online users are: 2
4-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Run the show running-config command to display the configuration of the DHCP server or
relay on an interface. The following shows the output of the show running-config command:
ZXR10#show running-config vlan1000
!<Interface>
interface vlan1000
ip address 30.1.1.100 255.255.0.0
$
!</Interface>
!<ETHER_PORT>
interface vlan1000
!</ETHER_PORT>
!</DHCP>
dhcp
interface vlan1000
mode server
policy 1000
$
$
!</DHCP>
Field Description
Run the show ip dhcp packet statistic command to display statistics of DHCP packets sent
and received. The following shows the output of the show ip dhcp packet statistic command:
ZXR10#show ip dhcp packet statistic MP-0/1/0 global
----------------------------------------------
All received DHCP packet of the slot 1 is: 0
----------------------------------------------
Valid request packet: 0
DHCPDISCOVER: 2
DHCPREQUEST : 1
DHCPDECLINE : 0
DHCPRELEASE : 0
DHCPINFORM : 0
reply packet: 0
DHCPOFFER: 0
DHCPACK : 0
DHCPNAK : 0
4-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
----------------------------------------------
ZXR10#
Field Description
Run the show ip dhcp pool command to display the information about a DHCP pool. The
following shows the output of the show ip dhcp pool command:
ZXR10#show ip dhcp pool
PoolName IpPool LeaseTime DnsNum RouterNum OptionNum BindNum
1 ss 0 2 0 0 0 0 0
Total: 1
Field Description
Run the show ip dhcp policy command to display the information about a DHCP policy. The
following shows the output of the show ip dhcp policy command:
4-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
1 1 ss 1.1.1.1
Total: 1
Field Description
Option60 Option60
l In global configuration mode, configure IP Pool, DHCP Pool, DHCP Policy on S1, and
enable DHCP function.
l In interface configuration mode, configure IP address and DHCP server mode and
bind DHCP Policy on S1.
Configuration Flow
1. Configure IP pool. The range of address pool needs to be configured in a network
segment.
2. Configure DHCP Pool. DHCP Pool needs to bind with IP Pool and configures DNS,
lease-time, and default router.
3. Configure DHCP Policy. DHCP Policy is a policy option. Many priorities are supported
by a name for policy management.
4. Configure DHCP Server. Configure Server functional mode in DHCP interface mode
and bind the policy.
5. Enable DHCP globally.
4-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Commands
S1 configuration,
/*This configures IP Pool.*/
S1(config)#ip pool pool1
S1(config-ip-pool)#range 10.10.1.3 10.10.1.254 255.255.255.0
S1(config-ip-pool)#exit
Configuration Verification
View the configuration of IP Pool on S1.
4-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
TotalPool: 1
4-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
$
!</DHCP>
Under both of the conditions described above, the packets are transmitted to a new
destination (or DHCP Server) in unicast. Obviously, the new destination address is
configurable. In this way, DHCP packets can pass through many sub-networks.
When DHCP Relay finds a responding packet coming from DHCP Server, it inspects the
"Relay Agent", "Client hardware address" fields and so on. These fields provide enough
informations to DHCP Relay for transmitting responding packet to client PC.
4-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
The value of "Relay Agent" field (non-zero) is often used to identify a logical port for
transmitting responding packets. The responding packet will be discarded if the value
cannot match any logical port directly connecting to DHCP Relay.
Meanwhile, DHCP Relay inspects the value of broadcast identifier bit containing in "flag"
field. If the value is 1, it will broadcast the encapsulated packet. Otherwise, the packet will
be encapsulated and transmitted to DHCP Client in unicast way.
The message interaction procedure is shown in Figure 4-2.
In fact, from the begin to the end, there are several interaction procedures such like this.
The DHCP relay modifies the related fields in the DHCP message to modify the DHCP
broadcast message to a unicast message. It is responsible for the conversion between
the server and the client.
4-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
4-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
ZXR10(config)#ip dhcp relay server group < group-number> Configures a DHCP server
group, and binds the server
ZXR10(config-dhcpr-server-group)#server <server-
24
address to the group.
number><ip-address>{security | standard}[master][dscp
<dscp-number>]
4-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
ZXR10(config)#ip dhcp relay server policy group Enters DHCP relay server
<group-no> policy group configuration
mode.
ZXR10#kick-off ip dhcp relay user [[interface <interface-n Gets users offline from the relay
ame>]|[mac <mac-address>]|[ip <ip-address>[vrf-instance based on the specified attribute
28
<vrf-name>]]] (interface, MAC address, or IP
address).
4-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
For a description of the parameter in Step 11, refer to the following table:
Parameter Description
For a description of the parameters in Step 15, refer to the following table:
Parameter Description
For a description of the parameters in Step 17, refer to the following table:
Parameter Description
For a description of the parameters in Step 20, refer to the following table:
Parameter Description
For a description of the parameter in Step 21, refer to the following table:
Parameter Description
For a description of the parameter in Step 22, refer to the following table:
Parameter Description
For a description of the parameter in Step 23, refer to the following table:
4-19
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
<group-number> Serial number of the DHCP Relay server group bound to the
interface, range: 1–20.
For a description of the parameters in Step 24, refer to the following table:
Parameter Description
<group-number> Serial number of the DHCP Relay server group bound to the
interface, range: 1–20.
<dscp-number> Priority.
For a description of the parameters in Step 25, refer to the following table:
Parameter Description
<group-no> Serial number of the DHCP relay server policy group, range:
1–20.
For a description of the parameter in Step 26, refer to the following table:
Parameter Description
For a description of the parameters in Step 28, refer to the following table:
Parameter Description
4-20
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Parameter Description
Command Function
ZXR10#show ip dhcp relay user [interface <interface-name>[ Displays the information about
total-count]]|[ total-count] current online users on the DHCP
relay.
ZXR10#show ip dhcp packet statistic MP-0/1/0 {global | mgmt_eth | Displays statistics of DHCP
supervlan <1-4000>| vlan <1-4094>} packets sent and received.
ZXR10#show ip dhcp relay server group [<group-no>] Displays the information about a
DHCP relay server group.
ZXR10#show ip dhcp relay server policy [<policy_no>] Displays the information about a
DHCP relay server policy group.
Run the show ip dhcp configuration command to display the configuration of the DHCP
process module. The following shows the output of the show ip dhcp configuration
command:
DHCP process state information
process state: disable(stop)
ramble state: disable
suppress_nak state: disable
max_hops: 4
DHCP server configure:
server support max user: 64000
4-21
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
server support max user Maximum number of users supported on the server.
server update arp Whether the ARP update function is enabled on the server.
not insert relay option82 information Whether Option82 is inserted. Here, it is not inserted.
in BOOTREQUEST
relay option82 user policy Policy of user-configured Option82. There are two modes,
uniform, and interface.
relay support max user Maximum number of users supported on the relay.
relay update arp Whether the ARP update function is enabled on the relay.
4-22
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Field Description
Run the show ip dhcp packet statistic command to display statistics of DHCP packets sent
and received. The following shows the output of the show ip dhcp packet statistic command:
ZXR10#show ip dhcp packet statistic MP-0/1/0 global
-------------------------------------------------
All received DHCP packet of the slot 1 is: 0
-------------------------------------------------
Valid request packet: 0
DHCPDISCOVER: 2
DHCPREQUEST : 1
DHCPDECLINE : 0
DHCPRELEASE : 0
DHCPINFORM : 0
reply packet: 0
DHCPOFFER: 0
DHCPACK : 0
DHCPNAK : 0
--------------------------------------------------
ZXR10#
Field Description
4-23
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Field Description
Run the show ip dhcp relay server group command to display the information about a DHCP
relay server group. The following shows the output of the show ip dhcp relay server group
command:
ZXR10#show ip dhcp relay server group 1
group-no: 1 deadtime: 60 max-retries: 8 algorithm: round-robin
description:
DHCP server group server: 1 2.2.2.2 security dscp 0
ZXR10#
Field Description
deadtime Deadtime.
description Description.
DHCP server group server Information about the server, including the serial number of
the serve, IP address, mode, and DSCP value.
Run the show ip dhcp relay server policy command to display the information about a DHCP
relay server policy group. The following shows the output of the show ip dhcp relay server
policy command:
Field Description
VclassID Option60.
4-24
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Run the show ip dhcp relay information command to display the information about DHCP
relay option82. The following shows the output of the show ip dhcp relay information
command:
ZXR10#show ip dhcp relay information
DHCP relay information of all by user configuration are:
TYPE circuit-id-len remote-id-len
uniform 3 3
ZXR10#
Field Description
Run the show ip dhcp proxy client command to display the information about the lease
time of the DHCP proxy. The following shows the output of the show ip dhcp proxy client
command:
ZXR10#show ip dhcp proxy client
DHCP client configure information in proxy mode:
leasetime :33 seconds
ZXR10#
4-25
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
l In global configuration mode on S2, enable DHCP, configure IP Pool, DHCP Pool,
DHCP Policy and the route pointing to S1 interface network segment.
Configuration Flow
1. A route has to be required between the DHCP Server and the Relay interface (Global
static route can be used for testing).
2. For the configuration of server, see DHCP Server Configuration. In policy configura-
tion, Relay Agent is the IP address of Relay interface.
3. For Relay configuration, the parameters need to be configured in DHCP interface. IP
addresses of Relay interface and IP Pool corresponding to DHCP Server need to be
in the same network segment.
4. DHCP Relay configuration:
l Configure Relay mode.
l Enable Relay function in DHCP interface mode, configure Relay Agent to be the
IP address of Relay interface and configure Relay Server to be the IP address
of configured DHCP server. Make sure that the IP addresses of DHCP Server
interface and Relay interface are not in the same network segment but the IP
addresses of the allocated IP pool and Relay interface are in the same network
segment.
Configuration Commands
S1 configuration,
/*This configures Relay interface.*/
S1(config)#switchvlan-configuration
S1(config-swvlan)#vlan 1000
S1(config-swvlan-sub)#switchport pvid gei-0/1/1/1
S1(config-swvlan-sub)#exit
S1(config-swvlan)#exit
S1(config)#interface vlan1000
S1(config-if)#ip address 10.10.1.1 255.255.255.0
S1(config-if)#exit
/*Specify Server*/
S1(config)#ip dhcp relay server group 1
S1(config-dhcpr-server-group)#server 1 10.10.2.2 standard master
S1(config-dhcpr-server-group)#exit
4-26
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
S2 configuration,
4-27
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
S2(config-dhcp-policy)#exit
S2(config)#dhcp
Configuration Verification
Show IP Pool configuration on S2,
S2(config)#show ip local pool
PoolName Begin End Mask Free Used
pool1 10.10.1.3 10.10.1.254 24 252 0
TotalPool: 1
4-28
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
policy policy1
!</DHCP>
4-29
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
lease between the client and the relay is the short lease (L2). After receiving a response,
the server replaces L1 in the Lease Time field with L2 and sends packets to the client.
Therefore, the client uses the short lease, and the renew time and rebinding time
calculated based on the short lease.
If the client has retrieved an IP address, the DHCP relay proxy sets the state of the user
to BOUND, and sets the time-out interval of the state timer to L2. If the DHCP relay proxy
receives no request from the client when the timer expires, it is considered that the user
is disconnected. The DHCP relay proxy releases the data area of the user, and replaces
the client to send a DHCP Release message to the server, so that the server releases
the IP address of the user. The time-out interval of the binding state timer for the proxy is
shorter than that for the server, so the proxy can fast detect user disconnection and notify
the server to release the IP address as soon as possible.
The renewal interval and rebinding interval of the client are shorter than those returned
from the server, so the time when the client sends a renewal request or rebinding request
is earlier than the preset time, and requests are sent more frequently. To prevent the server
from being too busy due to frequent requests from the client, the proxy can use selectivity
determination.
When the DHCP relay proxy receives a renewal request from the client, if the state of the
user is BOUND, the proxy returns L2 to the client and resets the state timer. If the user
is in another state, the proxy returns no response. The proxy needs to check whether the
actual renewal time (calculated based on L1) of the client arrives. If yes, the proxy sends
a request to the server by using L1. If the server returns a DHCP ACK message, the L1
of the proxy is updated. If the server returns a DHCP NAK message, the data area of the
user is released.
4-30
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Parameter Description
4-31
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
1 ZXR10(config)#ip dhcp relay server group Configures a group that the external DHCP
<group-number> server of an interface belongs to and enters
DHCP relay server group configuration
mode.
Command Function
4-32
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
The following shows the output of the show ip dhcp configuration command:
ZXR10#show ip dhcp configuration
DHCP process state information
process state :enable(running)
ramble state:disable
suppress_nak state:disable
max_hops: 4
DHCP server configure:
server support max user: 64000
server update arp: default(off)
DHCP relay configure:
not insert relay option82 information in BOOTREQUEST.
relay option82 policy: default(replace)
relay option82 format: default(china-tel)
relay option82 user policy: interface
relay support max user: 64000
relay update arp: default(off)
Field Description
server support max user Indicates the maximum number of users on the server.
server update arp Indicates whether ARP entries can be added on the server.
not insert relay option82 information Indicates that Option82 is not inserted.
in BOOTREQUEST
relay option82 user policy Indicates the selected policy of user-configured Option82.
There are two modes, uniform mode and interface mode.
relay support max user Indicates the maximum number of users on the relay.
relay update arp Indicates whether ARP entries can be added on the relay.
4-33
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
On the interfaces of S1, the IP addresses, DHCP server address, and DHCP proxy mode
need to be configured. On the interfaces of S2, the IP addresses, and DHCP server mode
need to be configured, and a DHCP policy needs to be bound. On S2, DHCP needs to be
enabled. An IP pool, DHCP pool, DHCP policy, and route to the network segment of the
proxy interface on S1 need to be configured.
Configuration Flow
1. Configure proxy parameters on the DHCP interfaces. The IP address of the proxy
interface must be in the same network segment as the addresses in the IP pool
corresponding to the server.
2. Configure the proxy mode, and set the relay agent to the address of the proxy interface.
The relay server is set to the address of the server. The address of the server interface
and the address of the proxy interface are in different network segments. The address
of the proxy interface is in the same network segment as the addresses in the IP pool.
3. On the server, configure a route to the proxy interface.
4. Set the relay agent to the proxy interface when configuring a policy.
Configuration Commands
S1 configuration:
4-34
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
S1(config-dhcp)#enable
/*Set the DHCP mode of an interface and other attributes/*
S1(config-dhcp)#interface gei-0/1/1/1
S1(config-dhcp-if)#mode proxy
S1(config-dhcp-if)#relay agent 10.10.1.1
S1(config-dhcp-if)#relay server group 1
S1(config-dhcp-if)#exit
S1(config-dhcp)#exit
S2 configuration:
/*Enable DHCP*/
S2(config)#dhcp
S2(config-dhcp)#enable
S2(config-dhcp)#exit
S2(config)#interface gei-0/1/1/3
S2(config-if)#ip address 10.10.2.2 255.255.255.0
S2(config-if)#exit
/*Configure an IP pool*/
S2(config)#ip pool pool1
S2(config-ip-pool)#range 10.10.1.3 10.10.1.254 255.255.255.0
S2(config-ip-pool)#exit
/*Bind the IP pool to the DHCP pool*/
S2(config)#ip dhcp pool pool1
S2(config-dhcp-pool)#ip-pool pool1
S2(config-dhcp-pool)default-router 10.10.1.1
S2(config-dhcp-pool)#exit
/*Bind the DHCP pool to the DHCP policy*/
S2(config)#ip dhcp policy policy1 1
S2(config-dhcp-policy)#dhcp-pool pool1
S2(config-dhcp-policy)#relay agent 10.10.1.1
S2(config-dhcp-policy)#exit
S2(config)#dhcp
/*Set the DHCP mode of an interface/*
S2(config-dhcp)#interface gei-0/1/1/3
S2(config-dhcp-if)#mode server
S2(config-dhcp-if)#policy policy1
S2(config-dhcp-if)#exit
S2(config-dhcp)#exit
S2(config)#ip route 10.10.1.0 255.255.255.0 10.10.2.1
Configuration Verification
View the DHCP configuration of the specified interface on S1:
S1(config)#show running-config-interface
dhcp gei-0/1/1/1
4-35
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
!<DHCP>
dhcp
interface gei-0/1/1/1
mode proxy
relay server group 1
relay agent 10.10.1.1
!</DHCP>
DHCP snooping is a technology used to snoop into the validity of DHCP packets. Dynamic
ARP inspection is used to validate the security of ARP packets on network, and it can
prevent, record and drop ARP packets in which illegal IP addresses are bound to Medium
Access Control (MAC) addresses. The topology of DHCP snooping is shown in Figure
4-5.
4-36
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
When a DHCP server and a client are not on the same subnet and the client wants to obtain
an IP address from the DHCP server, it is necessary to use a DHCP relay agent to forward
the DHCP Request message. Before the DHCP relay agent forwards the DHCP message
of the client to the DHCP server, it can inserts some optional information so that the DHCP
server can know the client information more correctly. In this way, the IP address and other
parameter values can be assigned more flexibly according to the related policy.
4-37
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
The option is named DHCP relay agent information option, and the option number is 82.
Therefore, it is also called Option82. The related standard document is Request For
Comments (RFC) 3046.
Option82 is an extended application of DHCP options. It is only an extension. That whether
Option82 is contained does not affect the application of DHCP. In addition, it is necessary
to check whether the DHCP server supports Option82. If a DHCP server that does not
support Option82 receives packets containing Option82 information, or a DHCP server
that supports Option82 receives packets not containing Option82 information, the basic
DHCP service will not be affected.
To support the extended application brought by Option82, the DHCP server must support
Option82 and Option82 information must be inserted into the DHCP packets received.
When a DHCP Request message is received on an un-trusted port, no matter whether the
DHCP server and the client are in the same subnet, The switch on which DHCP snooping is
enabled can choose whether to insert Option82 information. By default, the switch inserts
Option82 information to the DHCP Request message received on the un-trusted port.
4-38
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
15 ZXR10(config-dhcp-snoop)#ip dhcp snooping verify mac Configures the ether mac and
bootp mac verification function
for DHCP snooping.
4-39
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
4-40
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
4-41
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
For a description of the parameter in Step 11, refer to the following table:
Parameter Description
4-42
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
For a description of the parameter in Step 12, refer to the following table:
Parameter Description
For a description of the parameters in Step 17, refer to the following table:
Parameter Description
For a description of the parameter in Step 18, refer to the following table:
Parameter Description
For a description of the parameter in Step 19, refer to the following table:
Parameter Description
For a description of the parameter in Step 20, refer to the following table:
Parameter Description
For a description of the parameter in Step 22, refer to the following table:
Parameter Description
For a description of the parameter in Step 24, refer to the following table:
Parameter Description
For a description of the parameter in Step 25, refer to the following table:
4-43
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
For a description of the parameters in Step 29, refer to the following table:
Parameter Description
infinite Permanent.
For a description of the parameter in Step 30, refer to the following table:
Parameter Description
For a description of the parameter in Step 31, refer to the following table:
Parameter Description
For a description of the parameter in Step 33, refer to the following table:
Parameter Description
For a description of the parameters in Step 35, refer to the following table:
Parameter Description
For a description of the parameter in Step 36, refer to the following table:
Parameter Description
4-44
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
For a description of the parameter in Step 37, refer to the following table:
Parameter Description
For a description of the parameter in Step 38, refer to the following table:
Parameter Description
For a description of the parameter in Step 40, refer to the following table:
Parameter Description
For a description of the parameter in Step 42, refer to the following table:
Parameter Description
For a description of the parameter in Step 47, refer to the following table:
Parameter Description
For a description of the parameters in Step 49, refer to the following table:
Parameter Description
4-45
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Command Function
ZXR10(config)#show ip dhcp snooping vlan [<vlan>] Displays the DHCP snooping state
of a VLAN.
ZXR10(config)#show ipv6 dhcp snooping database Displays the information about the
[<interface-name>] DHCPv6 snooping database.
ZXR10(config)#show ipv6 dhcp snooping vlan [<vlan>] Displays the DHCPv6 snooping
state of a VLAN.
Parameter Description
The following shows the output of the show ip dhcp snooping configure command:
4-46
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
The following shows the output of the show ip dhcp snooping database command:
ZXR10(config)#show ip dhcp snooping database smartgroup1
Current bind users are: 1
Index : 1
MAC addr: 0000.1111.2222
Vpls :
Layer : 2
External-vlan: 1
Internal-vlan: 0
State : static
Interface : smartgroup1
IP addr : 1.1.1.1 expiration infinite
Option82 :
Gateway IP : 2.2.2.2
The following shows the output of the show ip dhcp snooping ramble command:
ZXR10(config)#ip dhcp snooping ramble
ZXR10(config)#show ip dhcp snooping ramble
Current DHCP snooping user ramble state : enable
The following shows the output of the show ip dhcp snooping trust command:
Interface State
-------------------------------------------
gei_0/1/1/1 Trusted
The following shows the output of the show ip dhcp snooping vlan command:
ZXR10(config)#show ip dhcp snooping vlan
DHCP snooping state on VLANs
VLAN State
-------------------------------------------
1 disable
2 disable
10 enable
The following shows the output of the show ipv6 dhcp snooping configure command:
4-47
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
The following shows the output of the show ipv6 dhcp snooping database command:
ZXR10(config-dhcpv6-snoop)#show ipv6 dhcp snooping database
Current bind users are: 1
Index : 1
MAC addr: 0000.1111.2222
Vpls :
Vlan : 1
Internal-vlan: 0
State : static
Interface : smartgroup1
IPv6 addr : 2:3::2:3 expiration infinite
The following shows the output of the show ipv6 dhcp snooping interface command:
ZXR10(config)#show ipv6 dhcp snooping interface smartgroup1
Name : smartgroup1
Index : 13
Trust status : Untrusted
User quota : 2048
Packet speed : 2048(pps)
Sleep time : 3600(s)
Current bind users: 0
Interface-id :
The following shows the output of the show ipv6 dhcp snooping ramble command:
ZXR10(config-dhcpv6-snoop)#show ipv6 dhcp snooping ramble
Current DHCPv6 snooping user ramble state :disable
The following shows the output of the show ipv6 dhcp snooping trust command:
ZXR10(config)#show ipv6 dhcp snooping trust
Interface State
-------------------------------------------
gei_0/1/1/1 Trusted
The following shows the output of the show ipv6 dhcp snooping vlan command:
ZXR10(config)#show ipv6 dhcp snooping vlan
DHCPv6 snooping state on VLANs
VLAN State
-------------------------------------------
1 disable
2 disable
4-48
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
10 enable
Configuration Description
The network topology is shown in Figure 4-7.
Note:
The network topology is suitable for all the configuration examples in this section
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Enable and disable the DHCP snooping function globally.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping enable
ZXR10(config-dhcp-snoop)#no ip dhcp snooping enable
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP snooping global configuration information as follows:
ZXR10(config-dhcp-snoop)#show ip dhcp snooping configure
DHCP snooping configure information
Global state :enable(running)
Mac-verifying state :disable
Not insert relay information in BOOTREQUEST
Relay information policy :keep
Relay information format :china-tel
Support max user :2048
4-49
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Enable the DHCP snooping function globally.
3. Enable and disable the DHCP snooping function in a specified VLAN.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping enable
ZXR10(config-dhcp-snoop)#vlan 1
ZXR10(config-dhcp-snoop-vlan1)#ip dhcp snooping enable
ZXR10(config-dhcp-snoop-vlan1)#ip dhcp snooping disable
ZXR10(config-dhcp-snoop-vlan1)#exi
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP snooping states in VLANs as follows:
ZXR10(config)#show
ip dhcp snooping vlan
DHCP snooping state on VLANs
VLAN State
-------------------------------
1 enable
2 enable
3 enable
4 enable
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Enable the DHCP snooping function, and insert Option82 to DHCP packets. By
default, Option82 is not inserted.
4-50
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping information option
ZXR10(config-dhcp-snoop)#no ip dhcp snooping information option
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP snooping configuration information as follows:
ZXR10(config-dhcp-snoop)#show ip dhcp snooping configure
DHCP snooping configure
information
Global state :enable(running)
Mac-verifying state :disable
Not insert relay information in BOOTREQUEST
Relay information policy :keep
Relay information format :china-tel
Support max user :2048
Configuration Description
The network topology is shown in Figure 4-8.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Configure the format of Option82 inserted to DHCP packets, including CHINA-TEL and
DSL-FORUM. The default format is CHINA-TEL. Run the corresponding no command
to restore the default format.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping information format
{china-tel | dsl-forum}
ZXR10(config-dhcp-snoop)#no ip dhcp snooping information format
4-51
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Verification
Check the DHCP snooping configuration information as follows:
ZXR10(config-dhcp-snoop)#show ip dhcp snooping configure
DHCP snooping configure
information
Global state :enable(running)
Mac-verifying state :disable
Not insert relay information in BOOTREQUEST
Relay information policy :keep
Relay information format :china-tel
Support max user :2048
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Configure the policy to handle a DHCP packet when Option82 is has been inserted
to DHCP packets in which Option82 information exists. There are two policies,
maintaining Option82, or replacing Option82.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping information policy replace
ZXR10(config-dhcp-snoop)#ip dhcp snooping information policy keep
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP snooping configuration information as follows:
4-52
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Configure an interface on the DHCP server as a trusted interface. Configure other
interfaces as untrusted interfaces.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping trust gei-0/1/1/1
ZXR10(config-dhcp-snoop)#no ip dhcp snooping trust gei-0/1/1/1
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP snooping interface state as follows:
ZXR10(config)#show ip dhcp snooping trust
Interface State
---------------------------------------------------
gei-0/1/1/1 Trusted
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Add binding entities to the DHCP snooping database manually. Run the corresponding
no command to delete the binding entities from the database.
Configuration Commands
ZXR10config-dhcp-snoop)#vlan 2
ZXR10(config-dhcp-snoop-vlan2)#ip dhcp snooping binding
0010.9400.0001 1.2.3.4 gei-0/1/1/1 infinite
ZXR10(config-dhcp-snoop-vlan2)#no ip dhcp snooping binding 0010.9400.0001
Configuration Verification
Check the binding information in the DHCP Snooping database as follows:
4-53
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Clear the entities in the DHCP snooping database manually.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping clear
ZXR10(config-dhcp-snoop)#ip dhcp snooping clear gei-0/1/1/1
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the information in the DHCP Snooping database as follows:
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Enable the DHCP snooping roaming function, so that users can be changed over on
different physical interfaces. By default, the roaming function is disabled.
4-54
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping ramble
ZXR10(config-dhcp-snoop)#no ip dhcp snooping ramble
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the configuration information of the DHCP snooping roaming function as follows:
ZXR10(config-dhcp-snoop)#show ip dhcp snooping ramble
Current DHCP snooping user ramble state :
ramble state: enable
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Configure the maximum number of DHCP snooping users. By default, the maximum
number of users supported on a board is 2048.
3. Enable the DHCP snooping function globally.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#no ip dhcp snooping enable
ZXR10(config-dhcp-snoop)#ip dhcp snooping max-user 2
ZXR10(config-dhcp-snoop)#no ip dhcp snooping max-user
ZXR10(config-dhcp-snoop)#ip dhcp snooping enable
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP Snooping configuration information as follows:
4-55
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Description
Figure 4-7 shows the network topology.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Enable the ether mac and bootp mac verification function for DHCP snooping. If the
ether mac and bootp mac are not the same, the packet will be dropped.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping verify-mac
ZXR10(config-dhcp-snoop)#no ip dhcp snooping verify-mac
ZXR10(config-dhcp-snoop)#exit
Configuration Verification
Check the DHCP Snooping configuration information as follows:
ZXR10(config)#show ip dhcp snooping configure
DHCP snooping configure information
Global state :enable(running)
Mac-verifying state :disable
Not insert relay information in BOOTREQUEST
Relay information policy :keep
Relay information format :china-tel
Support max user :2
Configuration Description
Figure 4-7 shows the network topology. An available FTP or TFTP server must be provided
on the network.
Configuration Flow
1. Enter DHCP snooping configuration mode.
2. Configure the storage directory of the user binding table.
3. Start the write timer.
4. Configure the IP address of the FTP or TFTP server.
5. Configure the upload timer for the FTP or TFTP server.
6. Restore the use binding table through the local configuration if necessary after the
device is restarted.
4-56
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 DHCP Configuration c u -tr a c k
7. Restore the user binding table through downloading the table if necessary after the
device is restarted.
Configuration Commands
ZXR10(config)#dhcp-snoop
ZXR10(config-dhcp-snoop)#ip dhcp snooping file localdir /flash
ZXR10(config-dhcp-snoop)#ip dhcp snooping file timeout 5
ZXR10(config-dhcp-snoop)#ip dhcp snooping file server ftp //2.1.1.101/
dhcp.xml@root:root
ZXR10(config-dhcp-snoop)#ip dhcp snooping file upload time 10
ZXR10(config-dhcp-snoop)#ip dhcp snooping file localload
ZXR10(config-dhcp-snoop)#ip dhcp snooping file download
Configuration Verification
Check the DHCP snooping configuration information as follows:
ZXR10(config-dhcp-snoop)#show running-config dhcp-snoop
!<dhcp-snoop>
dhcp-snoop
ip dhcp snooping file localdir /flash
ip dhcp snooping file timeout 5
ip dhcp snooping file upload time 10
ip dhcp snooping file server ftp //2.1.1.101/dhcp.xml@root:root
vlan 2
ip dhcp snooping enable
$
$
!</dhcp-snoop>
4-57
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
4-58
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 5
TCPv4 Configuration
Table of Contents
TCPv4 Overview ........................................................................................................5-1
Configuring TCPv4 .....................................................................................................5-1
Maintaining TCPv4 .....................................................................................................5-4
5-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
5-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 TCPv4 Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
vrf <vrf-name> Name of the VRF instance which the IP address belongs to,
range: 1–16 characters.
5-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Command Function
ZXR10# show tcp brief Displays the brief information about all
TCP connections.
ZXR10# show tcp tcb <tcb-index> Displays the information about the
corresponding of a specified TCB.
ZXR10# show tcp synflood-protect statistics Displays statistics of the TCP SYN flood
protection function.
ZXR10# show tcp synflood-protect all Displays all information about the TCP
SYN flood protection function in the
system.
Run the show tcp command to display the information about TCP connections, including
local and remote IP address, port number, states of timers, and packets sent. The following
shows the output of the show tcp command:
ZXR10#show tcp
Stand-alone TCP connection from host 192.168.109.6
Connection state is ESTABLocal host: 192.168.5.1, Local port: 22
Foreign host: 192.168.109.6, Foreign port: 2335
5-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 TCPv4 Configuration c u -tr a c k
Field Description
SRTT: 555 ms, RTTO: 395 ms, KRTT: Times used for sending or receiving packets, and
395 ms minRTT: 10 ms, maxRTT: retransmission time-out period of the connection.
690 ms, ACK hold: 200 ms
Rcvd: 34 (out of order: 0), with data: Numbers of packets received and bytes.
21, total data bytes: 1636
Run the show tcp brief command to display the brief information about all TCP connections,
including TCB, and IP addresses of sender and receiver. The following shows the output
of the show tcp brief command:
5-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Field Description
Run the show tcp config command to display TCP configuration information, including the
wait time for establishing and disconnecting a connection, the length of the wait queue,
and the window size. The following shows the output of the show tcp config command:
ZXR10#show tcp config
TCP SYNWAIT: 30
TCP FINWAIT: 150
TCP WINDOWSIZE: 32768
Field Description
TCP SYNWAIT: 30 Wait time of SYN packets for the TCP connection, unit:
seconds.
TCP FINWAIT: 150 Wait time of FIN packets for the TCP connection, unit:
seconds.
TCP WINDOWSIZE: 32768 Size of the receiving window for the TCP connection, unit:
bytes.
Run the show tcp statistics command to display statistics at the TCP layer, including the
number of packets received, the number of error packets, and the numbers of various
packets. The following shows the output of the show tcp statistics command:
ZXR10#show tcp statistics
Rcvd: 2966 Total, 0 no port
0 checksum error, 0 bad offset, 0 too short
2955 packets (12107 bytes) in sequence
0 out-of-order packets (0 bytes)
0 packets (0 bytes) with data after window
0 packets after close
0 window probe packets, 2058 window update packets
38 dup ack packets, 0 ack packets with unsend data
2960 ack packets (12123 bytes)
5-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 TCPv4 Configuration c u -tr a c k
Field Description
Rcvd: 2966 Total, 0 no port 0 Total number of packets received, including the numbers of
checksum error, 0 bad offset, 0 too various packets, and error packets (for example, the packets
short,2955 packets (12107 bytes) in containing ports that do not exist, and packets containing
sequence,0 out-of-order packets (0 checksum errors or offset errors.)
bytes),0 packets (0 bytes) with data
after window,0 packets after close,0
window probe packets, 2058 window
update packets,38 dup ack packets,
0 ack packets with unsend data,2960
ack packets (12123 bytes)
Run the show tcp tcb <tcb-index> command to display the information about the
corresponding of a specified TCB. The following shows the output of the show tcp tcb
<tcb-index> command:
ZXR10#show tcp tcb 2
Stand-alone TCP connection from host 169.1.109.6
Connection state is ESTAB
Local host: 169.1.5.5, Local port: 23
Foreign host: 169.1.109.6, Foreign port: 4655
5-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Field Description
show tcp tcb 2 Displays the information about the corresponding of TCB
2. For the field descriptions, refer to that of the show tcp
command.
Run the show tcp synflood-protect config command to display configuration information
about the TCP SYN flood protection function, including whether the protection function is
enabled, the connection wait time, the number of half-connections, and the threshold of
total connections. The following shows the output of the show tcp synflood-protect config
command:
ZXR10# show tcp synflood-protect config
synflood-prevnet is enable
prevent means is quickening the tcp connect aging
and deleting the old tcp half connect
syn-waittime is 600 (seconds)
old-half-connect is 500
max-connect high limit is 90%
max-connect low limit is 70%
one-minute high limit is 80%
one-minute low limit is 50%
Field Description
prevent means is quickening the tcp Decrements the syn wait time, and deletes the old
connect aging and deleting the old half-connections.
tcp half connect
max-connect high limit is 90% The high threshold of total connections is 90.
one-minute low limit is 50% The low threshold of connections in one minute is 50.
Run the show tcp synflood-protect statistics command to display statistics of the TCP SYN
flood protection function. The following shows the output of the show tcp synflood-protect
statistics command:
ZXR10#show tcp synflood-protect statistics
MPU:Main Processing Unit
5-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 TCPv4 Configuration c u -tr a c k
Run the show tcp synflood-protect all command to display all information about the TCP
SYN flood protection function in the system. The following shows the output of the show
tcp synflood-protect all command:
ZXR10# show tcp synflood-protect all
configuration infomation:
syn-flood-prevnet is enable
prevent means is quickening the tcp connect
aging and deleting the old tcp half connect
syn-waittime is 600 (seconds)
old-half-connect is 500
max-connect high limit is 90%
max-connect low limit is 70%
one-minute high limit is 80%
one-minute low limit is 50%
statistics infomation:
MP:Manage Processor RP:Routing Processor
maxcon:current total connect maxhcon:current total half connect
onecon:oneminute connect onehcon:oneminute half connect
maxper:maxcon*100/tolcon*100% oneper:onecon*100/tolcon*100%
tolcon:max connect of the cpu allowed
CPU status maxcon maxhcon onecon onehcon tolcon maxper oneper
MP safety 2 0 0 0 3072 0f 0f(null)
For a description of the fields, refer to those of the show tcp synflood-protect config and
show tcp synflood-protect statics commands.
Run the show sockets commands to display all sockets. The following shows the output of
the show sockets command:
ZXR10#show sockets
Proto Local Address Foreign Address In Out State
IPv4 TCP 0.0.0.0:23 *:* 0 0 LISTEN
IPv4 UDP 0.0.0.0:3503 *:* 0 0
IPv4 RAW(112) 0.0.0.0:* *:* 0 0
IPv6 TCP 0:0:0:0:0:0:0:0:23 *:* 0 0 LISTEN
IPv6 UDP 0:0:0:0:0:0:0:0:161 *:* 0 0
IPv6 RAW(58) 0:0:0:0:0:0:0:0:33024 *:* 0 0
5-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
5-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 6
UDPv4 Configuration
UDPv4 is a kind of user data protocols. It is a simple data transmission protocol. Its
transmission mechanism is irresponsible that it sends the data out but cannot ensure
the data is received by destination. Additionally, its retransmission and error correction
functions are decided by the applications of upper layer.
6-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
6-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 7
Cluster Management
Configuration
Table of Contents
Cluster Management Overview ..................................................................................7-1
Configuring Cluster Management Configuration .........................................................7-1
Maintaining Cluster Management ...............................................................................7-3
Cluster Management Configuration Example..............................................................7-4
7-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
7-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 Cluster Management Configuration c u -tr a c k
Command Function
The following is a sample output from the show zdp neighbour command:
ZXR10(config)#show zdp neighbour
Peer-Mac Local-Port Hdtm Peer-Port Platform Hostname
--------------------------------------------------------------------------------
00D0.D087.1500 gei-0/1/1/5 164 gei-0/1/2/3 5900 5928#_102
7-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Flow
1. Create a ip pool of interface addresses.
2. Configure Switch1 as a command switch.
3. Configure Switch2 as a member switch.
Configuration Commands
Switch1 configuration:
ZXR10(config)#ip pool zte
ZXR10(config-ip-pool)#network 192.168.1.0 255.255.255.0
ZXR10(config-ip-pool)# exit
ZXR10(config)#interface vlan1
ZXR10(config)#exit
ZXR10(config)#group-management
ZXR10(config-gm)#ztp vlan 1
ZXR10(config-gm)#interface vlan1
ZXR10(config-gm-if-vlan1)#bind-ip-pool zte
ZXR10(config-gm-if-vlan1)#exit
ZXR10(config-gm)#group switch-type commander
ZXR10(config-gm)#ztp start
ZXR10(config-gm)#group member all-candidates
Switch2 configuration:
ZXR10(config)# group-management
ZXR10(config-gm)# ztp vlan 1
ZXR10(config-gm)# exit
Configuration Verification
ZXR10(config-gm)#show group members
Index MemID MacAddress IPAddr Mask Stat Hostname
----------------------------------------------------
1 1 0000.0205.0000 192.168.1.2 255.255.255.0 Up Mem1.ZXR10
7-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 8
IPTV Configuration
Table of Contents
IPTV Overview ...........................................................................................................8-1
Configuring IPTV ........................................................................................................8-3
Maintaining IPTV ........................................................................................................8-9
IPTV Configuration Example ....................................................................................8-14
8-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
The IPTV access and control process is as follows: A user client sends a report (join in) or
leave packet to the IPTV module. The IPTV module queries the corresponding CAC rule
according to the user port and the VLAN, and authenticates the channel rights requested
by the user. For the query packet received from a route port, the IPTV module queries the
corresponding CAC rule according to the route port and the VLAN, and authenticates the
query request. Authentication means to query the channel rights ( view, preview, query,
and deny) configured in a rule. After the rights is queried, the result is returned to the
IGMP Snooping for further processing. The following describes how the IGMP Snooping
processes different rights:
l For the view and preview rights: Add the port to which the user belongs to the
broadcast forwarding table.
l For the query rights: Broadcast the query packet to the VLAN to which the route port
belongs.
8-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
Parameter Description
8-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
8-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
8-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
8-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
Parameter Description
<bandwidth value> Bandwidth for the channel, range: 0–256, unit: Mbps.
Parameter Description
Parameter Description
Parameter Description
8-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Command Function
ZXR10(config-iptv)#clear client port < port-name> vlan< Deletes online IPTV users.
vlan-id> channel { id < channel-id>| id-list<channel-idlist>| name
< channel-name>}
8-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
Parameter Description
Command Function
ZXR10#show iptv cdr [record id-list <cdr-idlist>] Displays the information about
CDR configuration.
ZXR10#show iptv channel { all | name < channel-name>| id-list< Displays the information about
channel-idlist>} IPTV channels.
ZXR10#show iptv package [{ name < package-name>|id < Displays the information about an
package-id>}] IPTV service package.
ZXR10#show iptv rule{all |{port < port-name>[ vlan-id Displays the information about a
<vlan-id>][channel][package]}} CAC rule.
ZXR10#show iptv client {all |{port <port-name>| NPC Displays online IPTV users
<slot-no>[vlan-id <vlan-id>]}}
ZXR10#show iptv channel statistics [ channel-id < channel-id>] Displays channel statistics.
The following shows the output of the show iptv control command:
8-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Field Description
The following shows the output of the show iptv prw command:
ZXR10#show iptv prw
PrwEnable : disable
PrwOverCount-Cdr : disable
PrwRecognitionTime : 4
PrwAutoResetTime : 23:59:59
Field Description
The following shows the output of the show iptv cdr record id-list 2 command:
ZXR10#show iptv cdr record id-list 2
Index :2 Findex :54 Time_Stamp :2013/3/4 09:00:20
VlanId :100 Mvlan :4000 OnLine_Time(s):0
Sourceip :
Groupip :225.1.1.0
Validility :invalid
Cdrtype :preview
Leave reason :prw overcount leave
Field Description
8-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
Field Description
Validility Whether it is valid that the user watches programs on the port.
The following shows the output of the show iptv channel all command:
ZXR10#show iptv channel all
Id Name MVlan GroupIp
------ ------------------------------- --------- --
0 CHNAME0 1 225.0.0.0
1 CHNAME1 1 225.0.0.1
2 CHNAME2 1 225.0.0.2
3 CHNAME3 1 225.0.0.3
4 CHNAME4 1 225.0.0.4
5 CHNAME5 1 225.0.0.5
6 CHNAME6 1 225.0.0.6
7 CHNAME7 1 225.0.0.7
8 CHNAME8 1 225.0.0.8
9 CHNAME9 1 225.0.0.9
Field Description
Id Channel ID.
The following shows the output of the show iptv package command:
ZXR10#show iptv package
Pkgid Pkgname
----- ---------
0 ZTE
8-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Field Description
The following shows the output of the show iptv view-profile command:
ZXR10#show iptv view-profile
ViewprofileId ViewprofileName
------------- ---------------
0 DEFVAL
Field Description
The following shows the output of the show iptv rule command:
ZXR10#show iptv rule
MaxRuleNum: 2048
CurrentConfigTotal: 1 HistoryConfigTotal: 1
Id Port Vlan Mode Service Cdr ViewNum PrwNum QryNum PkgNum
---- -------- ----- ------- ------- ----- ------- ------ ------ ------
1 gei-0/1/1/22 package IN FALSE 0 0 0 0
Field Description
Id Rule ID.
8-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
The following shows the output of the show iptv channel statistics command:
ZXR10#show iptv channel statistics
ChannelNo CurPrwUser CurViewUser hisPrwUser hisViewUser
--------- ---------- ----------- ---------- -----------
0 0 0 0 0
1 0 0 0 0
2 0 0 0 0
3 0 0 0 0
4 2 0 0 0
5 0 0 0 1
6 0 4 0 0
7 0 0 0 0
8 0 0 0 0
9 0 0 0 0
Field Description
The following shows the output of the show iptv client command:
ZXR10#show iptv client all
Client View Channel Count: 1
ChanId GroupIp Port Vlan Rule Record TimeStamp
------ -------- ------------- ---------- ------ ------------ --
0 225.0.0.1 gei-0/1/1/2 200 5 2 2013/06/9 19:34:54
Field Description
8-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
Configuration Flow
1. Configure a traffic flow of IPTV channel
2. Enable IPTV
3. Configure inquiry permissions on a interface connected to network
4. Configure rules of users on a interface connected to users
Configuration Commands
SwitchA configuration:
ZXR10(config)#igmpsnoop
ZXR10(config-igmpsnoop)#vlan 22
ZXR10(config-igmpsnoop-vlan22)#igmp snooping enable
ZXR10(config-igmpsnoop-vlan22)#exit
ZXR10(config-igmpsnoop)#vlan 20
ZXR10(config-igmpsnoop-vlan20)#igmp snooping enable
ZXR10(config-igmpsnoop-vlan20)#exit
ZXR10(config-igmpsnoop)#vlan 100
ZXR10(config-igmpsnoop-vlan100)#igmp snooping enable
ZXR10(config-igmpsnoop-vlan100)#exit
ZXR10(config-igmpsnoop)#exit
ZXR10(config)#iptv
ZXR10(config-iptv)#channel mvlan 100 group 225.0.0.1 name cctv1
ZXR10(config-iptv)#control enable
ZXR10(config-iptv)#cac enable
ZXR10(config-iptv)#interface gei-0/1/1/2
ZXR10(config-iptv-if-gei-0/1/1/2)#iptv vlan 100 service start
ZXR10(config-iptv-if-gei-0/1/1/2)#iptv vlan 100 control-mode channel
ZXR10(config-iptv-if-gei-0/1/1/2)#iptv vlan 100 channel name cctv1 query
8-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 IPTV Configuration c u -tr a c k
ZXR10(config-iptv-if-gei-0/1/1/2)#exit
ZXR10(config-iptv)#interface gei-0/1/1/1
ZXR10(config-iptv-if-gei-0/1/1/1)#iptv vlan 20 service start
ZXR10(config-iptv-if-gei-0/1/1/1)#iptv vlan 20 control-mode channel
ZXR10(config-iptv-if-gei-0/1/1/1)#iptv vlan 20 channel name cctv1 permit
ZXR10(config-iptv-if-gei-0/1/1/1)#iptv vlan 22 service start
ZXR10(config-iptv-if-gei-0/1/1/1)#iptv vlan 22 control-mode channel
ZXR10(config-iptv-if-gei-0/1/1/1)#iptv vlan 22 channel name cctv1 permit
Configuration Verification
Check configuration of SwitchA.
ZXR10#show iptv channel all
Id Name MVlan GroupIp
------ -------- --------------- ------------
0 cctv1 100 225.0.0.1
ZXR10#show iptv rule
MaxRuleNum: 2048
CurrentConfigTotal: 2 HistoryConfigTotal: 2
Id Port Vlan Mode Service Cdr ViewNum PrwNum QryNum PkgNum
---- ------ ---- ------- ------- ----- ------- ------ ------ ------
1 gei-0/1/1/1 20 channel IN FALSE 1 0 0 0
2 gei-0/1/1/2 100 channel IN FALSE 0 0 1 0
8-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
8-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures
Figure 1-1 IP Address Configuration Example Topology........................................... 1-4
Figure 2-1 ICMP Response Configuration Example Topology ................................... 2-1
Figure 3-1 MTU Configuration Example Topology ..................................................... 3-3
Figure 4-1 DHCP Server Configuration Example Topology ..................................... 4-11
Figure 4-2 DHCP Message Interaction.................................................................... 4-15
Figure 4-3 DHCP Relay Configuration Example Topology ....................................... 4-25
Figure 4-4 DHCP Proxy Configuration Topology ..................................................... 4-34
Figure 4-5 Network Topology of DHCP Snooping.................................................... 4-37
Figure 4-6 DHCP Snooping Typical Application ...................................................... 4-37
Figure 4-7 Enabling DHCP Snooping Globally ........................................................ 4-49
Figure 4-8 Configuring DHCP Snooping Option82 Format ...................................... 4-51
Figure 7-1 Cluster Management Configuration Example ........................................... 7-4
Figure 8-1 IPTV Service Architecture ........................................................................ 8-2
Figure 8-2 IPTV Configuration Example .................................................................. 8-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Figures c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Glossary
ARP
- Address Resolution Protocol
BOOTP
- Bootstrap Protocol
CAC
- Channel Access Control
CAC
- Connection Admission Control
CDR
- Call Detail Record
DHCP
- Dynamic Host Configuration Protocol
DNS
- Domain Name System
DNS
- Domain Name Server
DSCP
- Differentiated Services Code Point
FTP
- File Transfer Protocol
ICMP
- Internet Control Message Protocol
IP
- Internet Protocol
IPTV
- Internet Protocol Television
MAC
- Media Access Control
MAN
- Metropolitan Area Network
MTU
- Maximum Transmission Unit
MVLAN
- Multicast Virtual Local Area Network
III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (IP Service) c u -tr a c k
RARP
- Reverse Address Resolution Protocol
RFC
- Request For Comments
SMS
- Service Management System
STB
- Set-top Box
TCB
- Transmission Control Block
TCP
- Transmission Control Protocol
TCP/IP
- Transmission Control Protocol/Internet Protocol
TFTP
- Trivial File Transfer Protocol
UDP
- User Datagram Protocol
URL
- Uniform Resource Locator
VLAN
- Virtual Local Area Network
VPN
- Virtual Private Network
VRF
- Virtual Route Forwarding
IV
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Version: 3.00.11
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: [email protected]
h a n g e Vi h a n g e Vi
XC e XC e
F- w F- w
PD
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
LEGAL INFORMATION
Copyright © 2015 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Contents
About This Manual ......................................................................................... I
Chapter 1 ARP Configuration.................................................................... 1-1
1.1 ARP Overview ................................................................................................... 1-1
1.2 ARP Limit Overview ........................................................................................... 1-2
1.3 Configuring ARP ................................................................................................ 1-3
1.4 Maintaining ARP ................................................................................................ 1-9
1.5 ARP Configuration Examples ............................................................................ 1-10
1.5.1 Permanent ARP Configuration Example .................................................. 1-14
1.5.2 Common ARP Attributes Configuration Example ...................................... 1-14
1.5.3 ARP Proxy Application............................................................................ 1-15
1.5.4 ARP Source Filter Application ................................................................. 1-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures............................................................................................................. I
Glossary ........................................................................................................ III
III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
IV
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Intended Audience
This manual is intended for:
Chapter 1, ARP Describes the ARP principle, and the configuration commands,
Configuration maintenance commands, and configuration examples of the ZXR10
5900E.
Chapter 2, VLAN Describes the VLAN principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 3, SuperVLAN Describes the SuperVLAN principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 4, Voice VLAN Describes the Voice VLAN principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 5, PVLAN Describes the PVLAN principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 6, QinQ Describes the QinQ principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 7, STP Describes the STP principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 8, LLDP Describes the LLDP principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 9, SmartGroup Describes the SmartGroup principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 10, SVLAN Describes the SVLAN principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 11, ZESR Describes the ZESR principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 12, ZESS Describes the ZESS principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 13, ZESR+ Describes the ZESR+ principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 14, LinkGroup Describes the LinkGroup principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 15, L2PT Describes the L2PT principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Chapter 16, GVRP Describes the GVRP principle, and the configuration commands,
Configuration maintenance commands, configuration examples of the ZXR10 5900E.
Conventions
This manual uses the following typographical conventions:
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
Constant Text that you type, program codes, filenames, directory names, and function names.
width
[] Optional parameters.
{} Mandatory parameters.
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 1
ARP Configuration
Table of Contents
ARP Overview............................................................................................................1-1
ARP Limit Overview ...................................................................................................1-2
Configuring ARP ........................................................................................................1-3
Maintaining ARP ........................................................................................................1-9
ARP Configuration Examples ...................................................................................1-10
ARP Principle
First, the source device broadcasts an ARP request containing the IP address of the
destination device. All devices in the network will receive ARP request. If a device finds
that the IP address in request matches its own IP address, it will send a reply containing
its MAC address to the source device. The source device obtains the MAC address of
the destination device through this reply.
To prevent the attacks from ARP virus, or to prevent that users connect devices to the
network randomly, permanent ARP entities can be configured on the device. A permanent
ARP entity takes effect immediately once the configuration is finished. It will not be lost
even if the device is reset.
User can configure ARP common attributions, such as clearing time, aging time, automatic
binding of dynamic ARP entities, and so on. ARP protection mode can also be configured.
1-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
ARP protection is based on a port or a device. If the number of entities in the ARP table is
more than the pre-configured ARP protection threshold, the excess ARP packets will be
discarded and the corresponding alarm will be printed to notify network administrators.
When there is a router (or several routers) between the devices for communication, it is
necessary to enable ARP proxy function on the switch.
When ARP source filter function is enabled, the device will search its routing table after
receiving an ARP packet. The device inspects whether there is a route that uses the
interface (on which this ARP packet is received) as the egress for the ARP packet with this
source IP. The ARP entity will be learnt if the route is found. Otherwise, the ARP packet
will be discarded. In this way, some virus attacks can be prevented.
1-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
the count is up to the threshold in the counting cycle, the device will notify the bottom to
stop forwarding ARP packets.
The limit relief is implemented by judging whether the limit times on the interfaces are up
through timer polling. If the limit time is up, the limit will be relieved. Otherwise, the limit is
still on.
Parameter Description
1-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
1-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
1-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
seconds The aging time of ARP entities in the ARP cache, range: 1
–2147483, unit: seconds, default: 14400 seconds.
Parameter Description
Parameter Description
<seconds> The aging time of ARP entities in the ARP cache, range: 1
–2147483, unit: seconds, default: 14400 seconds.
<ip-address> IP address.
Parameter Description
1-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
1-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuring DAI
To configure DAI on the ZXR10 5900E, perform the following steps:
1-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
Command Function
ZXR10#show ip arp inspection { vlan [{<1-4094>| disable | enable | Displays the DAI configuration
name <vlan-name>}]| interface [<interface-name>]| configure} information of protocol entities on
the switch.
ZXR10#show arp
Arp protect whole is disabled
The count is 1
IP Hardware Exter Inter Sub
Address Age Address Interface VlanID VlanID Interface
--------------------------------------------------------------------------
192.168.88.200 H 00e0.d021.0203 vlan10 N/A N/A N/A
1.1.1.1 P 0011.0011.0011 vlan1 N/A N/A N/A
2.2.2.2 D 0022.0022.0022 vlan2 N/A N/A N/A
1-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Field Description
IP Address IP address.
The following is sample output from the show running-config arp command:
ZXR10(config)#show running-config arp
!<ARP>
arp
interface vlan100
protect limit-num 100
timeout 3000
$
$
!</ARP>
ZXR10(config)#
The following is sample output from the show ip arp inspection command:
ZXR10#show ip arp inspection configure
Source Mac Validation : Disabled
Destination Mac Validation : Disabled
IP Address Validation : Enabled
l Configuration Commands
Method 1: Configure a permanent ARP entity in ARP configuration mode. Make sure
that an IP address has already been configured on the interface.
ZXR10(config)#arp
ZXR10(config-arp)#arp vlan400 permanent 120.1.1.1 0020.1122.3344
1-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
Method 2: Enter ARP interface configuration mode and then configure a permanent
ARP entity.
ZXR10(config-arp)#interface vlan400
ZXR10(config-arp-if)#arp permanent 120.1.1.3 0020.1122.3355
l Configuration Verification
Use the show command to view the configuration result, as shown below.
ZXR10(config)#show arp permanent
The count is 1
IP Hardware Exter Inter Sub
Address Age Address Interface VlanID VlanID Interface
--------------------------------------------------------------------------
1.1.1.1 P 0020.1122.3344 vlan400 N/A N/A N/A
1-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
learn-disable
no source-filtered
$
!
As shown in Figure 1-1, the ARP request cannot reach Host D, as a route does not
forward broadcast messages generally. In the condition that there is no ARP proxy,
the communication will fail.
When ARP proxy function is enabled on the switch, the router will request for valid IP
addresses except the IP address of the receiving interface on the switch. The switch
replies with the MAC address on the ingress interface of the ARP packet, as shown
below:
1-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
Therefore, a new entity is added into the ARP table of Host A, as shown below:
ZXR10(config)#show arp
The count is 2
IP Hardware Exter Inter Sub
Address Age Address Interface VlanID VlanID Interface
--------------------------------------------------------------------------
172.16.20.200 00:00:03 0000.0c94.36ab vlan10 N/A N/A gei-0/1/0/1
l Configuration Commands
The configuration to enable ARP proxy function on the router:
ZXR10(config-arp)#interface vlan10
ZXR10(config-arp-if)#proxy
ZXR10(config-arp-if)#exit
ZXR10(config-arp)#exit
ZXR10(config)#show running-config arp
arp
interface vlan10
proxy
$
!
1-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Commands
Method 1: Configure a permanent ARP entity in ARP configuration mode. Make sure that
an IP address has already been configured on the interface.
ZXR10(config)#arp
ZXR10(config-arp)#arp vlan400 permanent 120.1.1.1 0020.1122.3344
Method 2: Enter ARP interface configuration mode and then configure a permanent ARP
entity.
ZXR10(config-arp)#interface vlan400
ZXR10(config-arp-if)#arp permanent 120.1.1.3 0020.1122.3355
Configuration Verification
Use the show command to view the configuration result, as shown below.
ZXR10(config)#show arp permanent
The count is 1
IP Hardware Exter Inter Sub
Address Age Address Interface VlanID VlanID Interface
--------------------------------------------------------------------------
1.1.1.1 P 0020.1122.3344 vlan400 N/A N/A N/A
1-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
As shown in Figure 1-2, the ARP request cannot reach Host D, as a route does not
forward broadcast messages generally. In the condition that there is no ARP proxy, the
communication will fail.
1-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
When ARP proxy function is enabled on the switch, the router will request for valid IP
addresses except the IP address of the receiving interface on the switch. The switch
replies with the MAC address on the ingress interface of the ARP packet, as shown below:
Therefore, a new entity is added into the ARP table of Host A, as shown below:
ZXR10(config)#show arp
The count is 2
IP Hardware Exter Inter Sub
Address Age Address Interface VlanID VlanID Interface
--------------------------------------------------------------------------
172.16.20.200 00:00:03 0000.0c94.36ab vlan10 N/A N/A gei-0/1/0/1
Configuration Commands
The configuration to enable ARP proxy function on the router:
ZXR10(config-arp)#interface vlan10
ZXR10(config-arp-if)#proxy
ZXR10(config-arp-if)#exit
ZXR10(config-arp)#exit
ZXR10(config)#show running-config arp
arp
interface vlan10
proxy
1-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 1 ARP Configuration c u -tr a c k
$
!
Configuration Commands
The configuration is shown below:
ZXR10(config-arp)#interface vlan400
ZXR10(config-arp-if)#no source-filtered
/*Disable source filter*/
ZXR10(config-arp-if)#show running-config arp
arp
interface vlan400
no source-filtered
$
!
ZXR10(config-arp-if)#source-filtered
/*Enable source filter*/
ZXR10(config-arp-if)#show running-config arp
1-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
1-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 2
VLAN Configuration
Table of Contents
VLAN Overview..........................................................................................................2-1
Configuring a VLAN....................................................................................................2-2
Maintaining a VLAN....................................................................................................2-9
VLAN Basic Configuration Example .........................................................................2-11
VLAN Principle
The VLAN functions on a switch in the following four ways:
l VLAN allocated by interface
In this case, VLANs are allocated by interfaces on Ethernet switches. To be specific,
the VLAN to which each interface belongs is clearly specified. Allocating VLANs by
interface is one of the most widely used methods. The IEEE 802.1Q provides an
international standard for allocating VLANs by interfaces on Ethernet switches.
l VLAN allocated by MAC address
In this case, VLANs are allocated by the MAC address of each host. To be specific,
the group to which each host belongs is clearly specified. That is, the VLAN to which
an interface belongs is determined by querying and recording the MAC address of the
network adaptor on the host connected to the interface. Suppose that MAC address A
is configured by a switch to belong to VLAN 10. In this case, no matter which interface
on the switch is used to connect the host with MAC address A, the interface will be
allocated to VLAN 10. For example, if interface 1 is used to connect the host, interface
1 belongs to VLAN 10; if interface 2 is used to connect the host, interface 2 belongs
to VLAN 10.
l VLAN allocated by IP subnet
2-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
In this case, VLANs are allocated by subnet. To be specific, the VLAN to which an
interface belongs is determined by the IP address of the connected host. Unlike
the VLAN allocated by MAC address, an interface can be successfully added to the
original VALN for a same IP address, even though the MAC address is changed due to
replacement of network adaptor or other reasons. For the VLAN allocated by subnet,
the VLAN of a frame is determined by the subnet to which the frame belongs. To
achieve this, the switch must check the network-layer content of a received frame.
This kind of VLAN is like a switch, dividing subnets into different broadcast domains.
l VLAN allocated by network protocol
In this case, VLANs are allocated by protocol. To be specific, a physical network is
divided into multiple logical VLANs based on protocol. When an interface receives a
frame, its VLAN is determined by the protocol type in the packet. For example, IP,
IPX, and Appletalk may have their own independent VLAN. The IP broadcast frames
are sent only to all the interfaces in the IP VLAN.
This allocation method is quite flexible, which is the same as the advantage of
the VLAN allocated by subnet. It is applicable to the L3 network or the network
environment with various protocols.
VLAN Translation
VLAN translation is used in metropolitan area networks. The VLAN IDs of switches used
for edge access can be the same. VLAN translation can modify the same VLAN IDs to
different VLAN IDs, and then forwards packets through the uplink interface on the ZXR10
5900E. In this way, user isolation on L2 switches can be achieved.
The ZXR10 5900E supports ingress VLAN translation and egress VLAN translation.
2-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 VLAN Configuration c u -tr a c k
2-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
<vlan_id> Indicates the VLAN ID. The value of this parameter ranges
from 1 to 4094.
Parameter Description
<vlan_list> Indicates the VLAN list that supports batch configuration. The
value of this parameter ranges from 1 to 4094.
Parameter Description
<vlan_list> Indicates the VLAN list that supports batch configuration. The
value of this parameter ranges from 1 to 4094.
2-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 VLAN Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
2-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
2-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 VLAN Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
2-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
2-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 VLAN Configuration c u -tr a c k
Parameter Description
Command Function
2-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Command Function
The following is sample output from the show running-config switchvlan command:
ZXR10(config-swvlan)#show running-config switchvlan
! <switchvlan>
switchvlan-configuration
vlan 1
$
vlan 2
$
vlan 3
$
vlan 4
$
vlan 5
$
vlan 6
$
interface gei-0/1/1/1
switchport mode trunk
switchport trunk vlan 1-6
$
interface gei-0/1/1/2
switchport access vlan 5
$
interface gei-0/1/1/3
switchport mode hybrid
2-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 VLAN Configuration c u -tr a c k
The following is sample output from the show vlan translation command:
ZXR10(config-swvlan)#show vlan translation 1
SESS TRANSPORT INMAP OUTMAP INVLAN PRI OUTVLAN PRI ADV
-----------------------------------------------------------------
1 [I]gei-0/1/1/1 10 100 0
The following is sample output from the show vlan translate statistics session command:
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#vlan 10
ZXR10(config-swvlan-sub)#switchport pvid gei-0/1/1/1-2
ZXR10(config-swvlan-sub)#exit
ZXR10(config-swvlan)#vlan 20
2-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Thought
1. For packets with single tag 100 received on the ingress gei-0/1/1/1, after VLAN
translation, the tag is changed to 200.
2. For packets with dual tags (the inner tag is 100 and the outer tag is 200) received on
the ingress gei-0/1/1/1, after VLAN translation, the inner tag is changed to 101 and the
outer tag is changed to 201.
3. For packets with single tag 100 forwarded on the egress gei-0/1/1/3, after VLAN
translation, the tag is changed to 200.
2-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 2 VLAN Configuration c u -tr a c k
4. For packets with dual tags (the inner tag is 100 and the outer tag is 200) forwarded on
the egress gei-0/1/1/3, after VLAN translation, the inner tag is changed to 101 and the
outer tag is changed to 201.
Configuration Commands
1. The configuration for single-tag translation on the ingress:
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#vlan translate session-no 1 in
ZXR10(config-swvlan)#sate session-no 1 ingress-port gei-0/1/1/1
ZXR10(config-swvlan-trans-session-1)#ingress-invlan 100
ZXR10(config-swvlan-trans-session-1)#exgress-invlan 200
ZXR10(config-swvlan-trans-session-1)#exgress-outvlan untag
ZXR10(config-swvlan-trans-session-1)#
Configuration verification:
ZXR10(config-swvlan-trans-session-1)#show vlan translation
SESS TRANSPORT INMAP OUTMAP INVLAN PRI OUTVLAN PRI ADV
----------------------------------------------------------------------------
1 [I]gei-0/1/1/1 100 200 untag 0
ZXR10(config-swvlan-trans-session-1)#
2. The configuration for dual-tag translation on the ingress:
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#vlan translate session-no 2 in
ZXR10(config-swvlan)#sate session-no 2 ingress-port gei-0/1/1/1
ZXR10(config-swvlan-trans-session-1)#ingress-invlan 100
ZXR10(config-swvlan-trans-session-1)#ingress-outvlan 200
ZXR10(config-swvlan-trans-session-1)#exgress-invlan 101
ZXR10(config-swvlan-trans-session-1)#exgress-outvlan 201
ZXR10(config-swvlan-trans-session-1)#
Configuration verification:
ZXR10(config-swvlan-trans-session-1)#show vlan translation
SESS TRANSPORT INMAP OUTMAP INVLAN PRI OUTVLAN PRI ADV
----------------------------------------------------------------------------
1 [I]gei-0/1/1/1 100 200 101 201 0
ZXR10(config-swvlan-trans-session-1)#
3. The configuration for single-tag translation on the egress:
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#vlan translate session-no 2 exgress-port gei-0/1/1/3
ZXR10(config-swvlan-trans-session-1)#ingress-invlan 100
ZXR10(config-swvlan-trans-session-1)#exgress-invlan 200
ZXR10(config-swvlan-trans-session-1)#exgress-outvlan untag
ZXR10(config-swvlan-trans-session-1)#
Configuration verification:
2-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration verification:
ZXR10(config-swvlan-trans-session-1)#show vlan translation
SESS TRANSPORT INMAP OUTMAP INVLAN PRI OUTVLAN PRI ADV
----------------------------------------------------------------------------
1 [E]gei-0/1/1/3 100 200 101 201 0
ZXR10(config-swvlan-trans-session-1)#
2-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 3
SuperVLAN Configuration
Table of Contents
SuperVLAN Overview ................................................................................................3-1
Configuring a SuperVLAN ..........................................................................................3-2
Maintaining a SuperVLAN ..........................................................................................3-5
SuperVLAN Configuration Example............................................................................3-6
SuperVLAN Principle
SuperVLAN is advanced by Internet Society RFC 3069. After VLAN is introduced, different
VLANs cannot communicate with each other through L2 forwarding. The communication
is implemented through L3 routing. Thus, it is necessary to configure different IP address
segments between VLANs. To save IP addresses, SuperVLAN is used.
The principle of common VLAN is shown in Figure 3-1.
3-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
On the device, the ports connecting A, B,C and D belong to different VLANs. Therefore,
the different IP address segments are configured on A, B, C and D. The communications
are implemented through L3 route forwarding.
As shown in Figure 3-2, after SuperVLAN is used, VLAN 1 and VLAN 2 are bound to
SuperVLAN1, while VLAN 3 and VLAN 4 are bound to SuperVLAN2.
The network segment x.x.x.0/24 is configured on A and B, and x.x.y.0/24 network segment
is configured on C and D. SuperVLAN 1 acts as the ARP proxy between A and B, and
SuperVLAN2 acts as the ARP proxy between C and D. Therefore, the communications
between A and B, and between C and D can be implemented through L2 forwarding.
However, the communication between the hosts in different network segments (such as A
and C) still needs to be implemented through L3 forwarding.
In addition, each VLAN member of SuperVLAN is allocated an IP address segment.
To ensure the security, the packets will be discarded if the IP addresses of the packets
received by the SuperVLAN do not match the allocated IP address segment.
3-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 SuperVLAN Configuration c u -tr a c k
Parameter Description
3-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
enable Enables the function that SubVLAN broadcasts ARP for free.
disable Disables the function that SubVLAN broadcasts ARP for free.
On the ZXR10 5900E, use the following commands to bind SubVLANs to a specified
SuperVLAN in batches.
To bind SubVLAN to a specified SuperVLAN on ZXR10 5900E, perform the following steps:
Parameter Description
3-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 SuperVLAN Configuration c u -tr a c k
Parameter Description
Command Function
ZXR10(config)#show supervlan
SuperVLAN No: 10
ARP-Broadcast : Disable
Gratuitous-ARP-Broadcast : Enable
Inter-SubVLAN-Routing-IPv4: Enable
Inter-SubVLAN-Routing-IPv6: Enable
IP-POOL-Filter : Enable
ND-Broadcast : Disable
----------------------------------------
SubIntf : subvlan10
Field Description
ARP-Broadcast: Disable The function that SuperVLAN broadcasts ARP to all its
subVLANs is disabled.
Gratuitous-ARP-Broadcast: Enable The function that SuperVLAN broadcasts ARP to all its
subVLANs for free is enabled.
IP-POOL-Filter: Enable The function that SuperVLAN filter the source IP address
is enabled.
3-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Field Description
Field Description
From 1.1.1.1 To 1.1.1.255 The filter range of SuperVLAN IP pool is from 1.1.1.1 to
1.1.1.255.
3-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 3 SuperVLAN Configuration c u -tr a c k
Configuration Thought
1. Create a SuperVLAN interface.
2. Configure an IP address.
3. Input SuperVLAN interface name, and then enter SuperVLAN aggregation interface
configuration mode.
4. Disable ip-pool-filter.
5. Enable arp-broadcast.
6. Input the created SubVLAN interface, and then enter SUPERVLAN_SUBVLAN
configuration mode.
7. Bind this interface to SuperVLAN.
8. Configure IP-POOL on the SubVLAN.
Configuration Commands
The configuration of ZXR10:
ZXR10(config)#interface supervlan11
ZXR10(config-if)#ip address 192.11.1.1 255.255.255.0
ZXR10(config-if)#exit
ZXR10(config)#supervlan
ZXR10(config-supervlan)#interface supervlan11
ZXR10(config-supervlan-superif)#ip-pool-filter disable
ZXR10(config-supervlan-superif)#arp-broadcast enable
ZXR10(config-supervlan-superif)#exit
ZXR10(config-supervlan)#subvlan 2
ZXR10(config-supervlan-subvlan)#supervlan 11
ZXR10(config-supervlan-subvlan)#vlanpool 192.11.1.1 192.11.1.10
ZXR10(config-supervlan-subvlan)#exit
3-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Verification
Use the show command to check the configuration result, as shown below.
ZXR10#show supervlan
The total SuperVLAN number:1
SuperVLAN No: 11
ARP-Broadcast : Enable
Gratuitous-ARP-Broadcast : Enable
Inter-SubVLAN-Routing-IPv4: Enable
Inter-SubVLAN-Routing-IPv6: Enable
IP-POOL-Filter : Disable
ND-Broadcast : Disable
----------------------------------------
SubIntf : subvlan2
ZXR10#show running-config supervlan
! </SuperVLAN>
supervlan
interface supervlan11
arp-broadcast enable
inter-subvlan-routing enable
ip-pool-filter disable
$
subvlan 2
supervlan 11
vlanpool 192.11.1.1 192.11.1.10
$
! </SuperVLAN>
ZXR10(config)#show supervlan-pool
Addr-Begin Addr-End Supervlan-Name SubIntf-Name
192.11.1.1 192.11.1.10 supervlan11 subvlan2
3-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 4
Voice VLAN Configuration
Table of Contents
Voice VLAN Overview ................................................................................................4-1
Configuring a Voice VLAN ..........................................................................................4-2
Maintaining a Voice VLAN ..........................................................................................4-3
Voice VLAN Configuration Example ...........................................................................4-4
4-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
l In non-strict safety mode, source MAC addresses of packets with Voice VLAN tags
are checked. If the source MAC address of a packet does not match the MAC address
configured for voice data, the packet is discarded. Untagged packets are forwarded
properly.
l In normal mode, the switch forwards both voice and service packets properly. Voice
packets follow the forwarding mechanism of Voice VLANs, while non-voice packets
follow the forwarding mechanism of common VLANs.
For voice packets carrying non-Voice VLAN tags, if the VLAN translation function is
enabled for voice packets, non-Voice VLAN tags will be translated into Voice VLAN tags
and the voice packets are forwarded in the Voice VLAN.
ZXR10(config-voice-vlan)#oui <1-100><mac-addr><
2 Configures an OUI.
mac-mask>
Parameter Description
4-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 Voice VLAN Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Command Function
4-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
The following is sample output from the show running-config voice-vlan command:
ZXR10(config)#show running-config voice-vlan
!<voice-vlan>
voice-vlan-configuration
aging-time 76
interface gei-0/1/1/1
mode auto
security strict
session 1 ingress_invlan 1-22,30
voice-vlan 1 cos 1 dscp 2
$
interface gei-0/1/1/2
mode auto
session 1 ingress_invlan 100,200,256-4094
voice-vlan 4094 cos 5 dscp 5
$
oui 1 0000.0000.0001 ffff.ffff.ffff
$
!</voice-vlan>
Configurations on switch A:
/*Run the following command to configure the OUI for a Voice VLAN*/
Switch_A(config-voice-vlan)#oui 1 0000.1122.0001 ffff.ffff.0000
4-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 4 Voice VLAN Configuration c u -tr a c k
/*Run the following command to add a port to the Voice VLAN and configure the priority*/
Switch_A(config-voice-vlan-if-gei-0/1/1/1)#voice-vlan 100 cos 6 dscp 6
/*Run the following commands to configure the VLAN ID to be the same as the Voice VLAN
ID on the ports*/
Switch_A(config-swvlan-if-gei-0/1/1/1)#switchport mode trunk
Switch_A(config-swvlan-if-gei-0/1/1/1)#switchport trunk vlan 100
Switch_A(config-swvlan-if-gei-0/1/1/2)#switchport mode trunk
Switch_A(config-swvlan-if-gei-0/1/1/2)#switchport trunk vlan 100
/*Run the following command to configure the Voice VLAN to be strict safety mode*/
Switch_A(config-voice-vlan-if-gei-0/1/1/1)#security strict
Configurations on switch A:
/*Run the following command to configure the OUI for a Voice VLAN*/
Switch_A(config-voice-vlan)#oui 1 0000.1122.0001 ffff.ffff.0000
/*Run the following command to add a port to the Voice VLAN and configure the priority*/
Switch_A(config-voice-vlan-if-gei-0/1/1/1)#voice-vlan 100 cos 6 dscp 6
/*Run the following command to add a port to the Voice VLAN automatically*/
Switch_A(config-voice-vlan-if-gei-0/1/1/1)#mode auto tag save
/*Run the following command to configure the Voice VLAN to be non-strict safety mode*/
4-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Switch_A(config-voice-vlan-if-gei-0/1/1/1)#security instrict
/*Run the following commands to configure the VLAN list for the Voice VLAN*/
Switch_A(config-voice-vlan-if-gei-0/1/1/1)#session 1 ingress-vlan 10-20
4-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 5
PVLAN Configuration
Table of Contents
PVLAN Overview .......................................................................................................5-1
Configuring a PVLAN .................................................................................................5-2
PVLAN Maintenance ..................................................................................................5-3
PVLAN Configuration Example...................................................................................5-3
PVLAN Principle
The switch requires that all interfaces are isolated from each other according to network
application. That is, each interface will be allocated with a VLAN. Meanwhile, the number
of VLANs for the upper-layer device is limited and thus the VLANs from the switch cannot
be transparently transmitted. In this case, the working mode of the uplink interface on the
switch must be configured to access. PVLAN achieves port-based isolation in a VLAN. It
is easy to isolation users at layer 2, and it is unnecessary to allocate a VLAN ID for each
user. PVLAN is one of the features provided by the ZTE Ethernet switch. In the process
of cell access, the PVLAN allocates users into different VLANs to isolate the L2 packets
of these users.
The PVLAN uses the L2 VLAN structure and VLAN interfaces are classified into the
following types:
l Isolate port
l Promiscuous port
l Community port
5-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
An isolate port can communicate only with promiscuous ports, and isolate ports cannot
communicate with each other directly. A community port can communicate with other
community ports or promiscuous ports. Community ports cannot communicate with isolate
ports. Promiscuous ports can communicate with other ports for layer-2 communications.
In PVLAN applications, the ports connected to users are set to isolate ports, and the
ports connected to uplink switches are set to promiscuous ports. The users in the same
VLAN are isolated and users can communicate only with their own default gateway, which
ensures network security.
One ore more PVLANs exist on an Ethernet switch. Each PVLAN contains multiple isolate
interfaces and uplink promiscuous interfaces. For the upper-layer router, only several
PVLANs exist on the lower-layer switch and the upper-layer router does not concern the
VLAN to which each interface in the PVLAN belongs. This simplifies configuration and
saves VLAN resources. To be specific, all the isolate interfaces in one PVLAN belong to
a same subnet, which saves the number of subnets and IP addresses.
The PVLAN provides flexible configuration mode. To isolate L2 packets sent from users,
you can configure an isolate interface for each user and make each VLAN contain only the
connected interface of the user and the uplink interface. To restore communication based
on L2 packets between users, the ports connected to users can be divided into community
ports.
Parameter Description
5-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 5 PVLAN Configuration c u -tr a c k
Command Function
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#vlan 2
ZXR10(config-swvlan-sub)#switchport pvid gei-0/1/1/1-3
ZXR10(config-swvlan-sub)#exit
ZXR10(config-swvlan)#private-map session-id 1
ZXR10(config-swvlan-pvlan-session)#isolate gei-0/1/1/1-2
ZXR10(config-swvlan-pvlan-session)#promis gei-0/1/1/3
5-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
5-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 6
QinQ Configuration
Table of Contents
QinQ Overview...........................................................................................................6-1
Configuring QinQ .......................................................................................................6-1
QinQ Maintenance .....................................................................................................6-2
QinQ Configuration Example ......................................................................................6-2
6-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Command Function
Output descriptions:
inter-vlan: 3-0;exter-vlan: 7-0, The internal tag is 3 on gei-0/1/1/1.3, and the external tag is 7.
Configuration Thought
1. Create a sub-interface.
2. Enter sub-interface VLAN configuration mode.
3. Configure QinQ ID.
4. Configure an IP address on the sub-interface.
6-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 6 QinQ Configuration c u -tr a c k
Configuration Commands
The configuration of S1:
S1(config)#interface gei-0/1/1/2
S1(config-if)#sub-if-mode qinq
S1(config-subif)#exit
S1(config)#interface gei-0/1/1/2.1
S1(config-subif)#exit
S1(config)#vlan
S1(vlan-config)#interface gei-0/1/1/2.1
S1(subvlan-if-config)#qinq internal-vlanid 1 external-vlanid 2
S1(subvlan-if-config)#exit
S1(vlan-config)#exit
S1(config)#interface gei-0/1/1/2.1
S1(config-subif)#ip address 192.168.1.1 255.255.255.252
S1(config-subif)#exit
Configuration Verification
Use the show command to check the configuration result.
6-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
!<VLAN>
6-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 7
STP Configuration
Table of Contents
STP Overview ............................................................................................................7-1
Configuring STP.........................................................................................................7-4
STP Maintenance.......................................................................................................7-9
STP Configuration Examples....................................................................................7-12
7-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
broadcast storm.Figure 7-1 shows an example of packet cycling and multiplication caused
by a loop.
Suppose that site A does not send any packet. Thus, there is no address record of site A
in the address lists on switch 1 and switch 2. When site A sends a packet, both of the two
switches receive this packet, record the address on LANA, and then wait in the queue for
forwarding the packet to LANB. According to the rule of LAN, one of the two switches will
successfully forward the packet to LAN2. If such a switch is switch 1, switch 2 will receive
this packet again because switch 1 is transparent to switch 2, which is like sending the
packet from LANB rather than site A. In this case, switch 2 records the address of site A
on LANB and waits in the queue for forwarding the new packet to LANA. On the contrary,
if switch 2 successfully forwards the original packet to LANB at the beginning, switch 1 will
receive this packet again. When detecting that the packet from site A has been forwarded
to LANB, switch 1 will wait in the queue for forwarding the new packet to LANA. In this way,
the packet will continuously cycled in the loop. What is worse, if the packet is a broadcast
packet and there are other hosts connected to switch 1 and switch 2, the packet will be
multiplied each time when it is forwarded successfully, which finally results in broadcast
storm in the network.
To solve this problem, the IEEE develops a new protocol called 802.1D defining that a
bridge has the abilities of STP leaning and calculation. In addition, it has the abilities to
locate the fault of packet cycling and disconnect redundancy links.
Therefore, a transparent bridge must provide the following three working characteristics:
learning, forwarding, and eliminating of packet cycling.
Instruction to STP
The basic principle of the STP protocol is very simple. The loop dose not exist on the
trees growing in the nature. If the network can grow like a tree, the loop will not exist in
the network. Based on such a thought, the STP protocol defines the concepts including
Root Bridge, Root Port, Designated Port, and Path Cost. Its purpose is to cut redundancy
loops by constructing a natural tree and to implement link backup and the best path. In
addition, the STP protocol supports link backup in the network. When the network topology
7-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
changes, the STP protocol can automatically sense the changes, re-calculate the spanning
tree to generate a new one, and meanwhile confirm that no loop forward path exists.
As shown in Figure 7-2, the interface between S3 and S2 does not involve in data
forwarding. Therefore, the forward path for the information sent from the PC of user A in
the network is shown in the above figure. The specific content of the protocol will not be
described in this section. For details, see the IEEE 802.1D.
STP Principle
The STP protocol solves the loop problem for a transparent bridge. However, with the
development of applications and network technologies, its disadvantages are exposed
gradually. The main disadvantage of STP is the convergence speed. To improve this
disadvantage, the IEEE developed a 802.1W protocol standard as a supplement to the
802.1D. The IEEE 802.1W standard defines a new protocol, that is, Rapid Spanning Tree
Protocol (RSTP). There are three major modifications in the RSTP based on the STP.
Therefore, the convergence speed is faster than that of the STP.
l The RSTP defines two roles for the root port and the designated port, namely Alternate
Port (AP) and Backup Port (BP). These two ports will be used during fast switching.
When a root port or a designated port is unavailable, the AP or BP will be in data
forwarding state without any delay.
l By using the P/A mechanism, for a point-to-point link that connects only two switch
ports, the designated port can be in data forwarding state without any delay after
handshaking with the downlink bridge just once.
l A port that is directly connected to a terminal rather than a bridge is called an edge
port. Such a port can be in data forwarding state without any delay. However, manual
configuration is required because a bridge cannot sense whether a port is directly
connected to a terminal.
Both RSTP and STP belong to Single Spanning Tree (SST). That is to say, there is only
one spanning tree in the whole switch network. Therefore, a longer convergence time is
7-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
consumed in the case of a large-scale network. When the configuration of 802.1Q leads
to the asymmetric structure of VLAN in network bearer, SST affects the connectivity of
some VLANs in the network. Meanwhile, when a link is blocked in the case of SST, it does
not bear any traffic, which causes huge waste of bandwidth and cannot implement load
sharing.
The above disadvantages cannot be overcame by SST. Therefore, the multi-instance STP
protocol supporting VLAN emerges, that is, the Multiple Spanning Tree Protocol (MSTP)
defined in IEEE 802.1S.
MSTP introduces a concept of domain. A large network can be divided into multiple
domains based on configuration. Each domain applies a multi-instance spanning tree,
which improves the expansibility and stability of a spanning tree. When the spanning tree
in a domain changes, the changed information will be transmitted in the spanning tree of
the domain, which does not affect other domains. In this case, the whole network does
not re-calculate the topology of spanning trees. Meanwhile, the MSTP has the ability
to recognize VLANs. Multiple VLANs can be bound to one instance and these VLANs
use different forwarding paths, which decreases the occupancy of various resources and
implements load sharing. The principle of the CST, IST, or MSTI is similar to that of the
RSTP.
7-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
7-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
sstp Indicates the compatible STP mode (for single spanning tree).
Parameter Description
Parameter Description
vlans <vlan-range> Indicates the VLAN range. The value of this parameter
ranges from 1 to 4094.
7-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
Parameter Description
7-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
<instance range> Indicates the instance range. The value of this parameter
ranges from 0 to 63.
Parameter Description
Parameter Description
Parameter Description
7-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
Parameter Description
Parameter Description
Command Function
Output descriptions:
7-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
MST00
Spantree enabled protocol MSTP
Root ID: Priority 4096; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 15 sec;
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Designated p2p MSTP
gei-0/1/1/2 128.2 200000 Forward Designated p2p MSTP
gei-0/1/1/3 128.3 200000 Forward Designated p2p MSTP
gei-0/1/1/5 128.4 200000 Forward Designated Edge MSTP
Output descriptions:
Output descriptions:
7-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
Output descriptions:
7-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
---------------------------------------------------------
Port based information & statistics
---------------------------------------------------------
all BPDU xmitted 5086
all BPDU received 12
MST BPDU xmitted 5086
MST BPDU received 12
RST BPDU xmitted 0
RST BPDU received 0
config BPDU xmitted 0
config BPDU received 0
TCN BPDU xmitted 0
TCN BPDU received 0
discard BPDU 0
----------------------------------------------------------
Bridge based information
----------------------------------------------------------
spantree type ieee
multicast mac address 01-80-c2-00-00-00
bridge priority 4096
bridge mac address 00-00-01-00-00-06
bridge hello time 2 sec
bridge forward delay 5 sec
bridge max age 6 sec
bridge max hops 20
Output descriptions:
Port based information & statistics Indicates the statistics based on interface.
7-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
Configuration Thought
1. Configure the STP mode to MSTP and enable the STP function.
2. Configure the bridge priority of DUT1 to 32768 and that of DUT2 to 40960.
Configuration Commands
The configuration of DUT1:
DUT1(config)#spantree
DUT1(config-stp)#enable
DUT1(config-stp)#mode mstp
DUT1(config-stp)#mst priority 32768 instance 0
Configuration Verification
Use the show spantree instance 0 command to view the configuration result of DUT1:
DUT1(config-if)#show spantree instance 0
MST00
Spantree enabled protocol MSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
7-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
---------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Designated p2p MSTP
gei-0/1/1/2 128.2 200000 Forward Designated p2p MSTP
Use the show spantree instance 0 command to view the configuration result of DUT2:
DUT2(config)#show spantree instance 0
MST00
Spantree enabled protocol MSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
---------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Root p2p MSTP
gei-0/1/1/2 128.2 200000 Discard Alternate p2p MSTP
Configuration Thought
1. Configure the STP mode to RSTP.
2. Enable the STP function.
Configuration Commands
The configuration of DUT1:
7-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
DUT1(config)#spantree
DUT1(config-stp)#enable
DUT1(config-stp)#mode rstp
Configuration Verification
Use the show spantree instance 0 command to view the configuration result of DUT1:
DUT1(config-stp)#show spantree instance 0
MST00
Spantree enabled protocol RSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
---------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Designated p2p RSTP
gei-0/1/1/2 128.2 200000 Forward Designated p2p RSTP
Use the show spantree instance 0 command to view the configuration result of DUT2:
DUT2(config-stp)#show spantree instance 0
MST00
Spantree enabled protocol MSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
7-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
---------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Root p2p RSTP
gei-0/1/1/2 128.2 200000 Discard Alternate p2p RSTP
Configuration Thought
1. Configure the STP mode to SSTP.
2. Enable the STP function.
Configuration Commands
The configuration of DUT1:
DUT1(config)#spantree
DUT1(config-stp)#enable
DUT1(config-stp)#mode sstp
Configuration Verification
Use the show spantree instance 0 command to view the configuration result of DUT1:
DUT1(config-stp)#show spantree instance 0
MST00
Spantree enabled protocol SSTP
Root ID: Priority 32768; Address 0000.0100.0006
7-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 7 STP Configuration c u -tr a c k
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
---------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Designated p2p SSTP
gei-0/1/1/2 128.2 200000 Forward Designated p2p SSTP
Use the show spantree instance 0 command to view the configuration result of DUT2:
DUT2(config-stp)#show spantree instance 0
MST00
Spantree enabled protocol SSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
---------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Root p2p SSTP
gei-0/1/1/2 128.2 200000 Discard Alternate p2p SSTP
7-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
7-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 8
LLDP Configuration
Table of Contents
LLDP Overview ..........................................................................................................8-1
Configuring LLDP .......................................................................................................8-3
Maintaining LLDP .......................................................................................................8-6
LLDP Configuration Examples....................................................................................8-9
LLDP Principle
LLDP is defined in 802.1ab. As shown in Figure 8-1, LLDP works at the data link layer.
It is a neighbor discovery protocol that defines a standard for Ethernet devices (such as
switches, routers and wireless LAN access points). Through LLDP, an Ethernet device
can advertise its existence to other nodes on the network and save discovery information
of neighbor devices. The device sends the state information to other devices. The
information is stored on each port of all devices. If necessary, the device can send update
information to the neighbor devices that are connected directly, and the neighbor devices
store the information in standard SNMP MIBs.
8-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Network management systems can query the L2 connection information in the MIB. LLDP
does not configure or control network elements or traffic. It just reports the position of L2.
Another function defined in 802.1ab is that network management software can use the
information provided by LLDP to find conflicts at L2 network. At present, IEEE uses the
physical topologies, interfaces and entity MISs existing in IETF.
8-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 LLDP Configuration c u -tr a c k
information in the CACHE of SNMP MIB defined by IEEE. The information is invalid during
a period. The value of TTL to define the period is contained in the received packets.
LLDP makes network management systems be able to discover and simulate physical
network topologies correctly. LLDP devices send and receive advertisements, so the
devices save the information of the discovered neighbor devices. The advertisement data,
such as the management address, device type and port number of a neighbor device, is
helpful to know the type and interconnected interfaces of the neighbor device. An LLDP
device advertises its information to direct-connected neighbor devices periodically. It also
receives, refreshes and saves the advertisements from neighbor devices. The device
scans the CACHE every second. If no new packet is received during the hole-time period,
the information is aged.
l Chassis ID is the first mandatory TLV in an LLDPDU. It is the unique ID of a device that
supports to send LLDPDUs. It is recommended to use the chassis MAC address as
the chassis ID for a switch, and use the loopback address or an interface IP address
as the chassis ID for a router.
l Port ID is the second mandatory TLV in an LLDPPDU. It is the unique ID of port that
sends LLDPDUs. For a switch, it is recommended to use the port name as the port
ID, such as fei4/1.
l TTL is the third mandatory TLV in an LLDPPDU. It is the living time (in the unit of
second) of an LLDPPDU received by the peer. When a peer receives an LLDPPDU
of which the TTL is 0, the device deletes all related information.
l End of LLDPDU is the last mandatory TLV in an LLDPPDU. It defines the end of an
LLDPPDU.
8-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
8-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 LLDP Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
8-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
Command Function
The following is sample output from the show lldp config command:
ZXR10#show lldp config
-------------------------------
LLDP enable: enabledRxTx
LLDP helloTime: 30s
LLDP holdTime: 4
LLDP msgFastTx: 1s
LLDP txCreditMax: 5
LLDP txFastInit: 4
LLDP deadTime: 120s
LLDP maxNeighbor: 128
LLDP curNeighbor: 0
----------------------------
Field Description
8-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 LLDP Configuration c u -tr a c k
Field Description
The following is sample output from the show lldp entry command:
ZXR10#show lldp entry
--------------------------------------------------------
Local Port: gei-0/1/1/2 | Interface Name
Local Group MAC address: Nearest Bridge | MAC Address
Chassis ID: 00d0d0641000 | MAC Address
Peer Port: gei-0/1/1/2 | Interface Name
TTL: 96 | Time to live
Port Description: Port name gei-0/1/1/2, PortPhyStatus is up,
PortPhotoElectricityMode is electric, Pvid 830 Nearest Bridge
System Name: 56TM-64
System Description: 3.00.10., 56TM-64, 5900 Software, ZXR10 5950-56TM-H
System Capability: Bridge, Router
Management Address: IPv4 - 192.168.36.64, ifIndex - 15, OID - Null
Link Aggregation TLV: not enabled
MED Network Policy:
Application Type: Reserved
U: defined
T: untagged
X: Reserved
VLAN ID: 0
L2 Priority: 0
DSCP Value: 0
Field Description
8-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Field Description
The following is sample output from the show lldp neighbor command:
ZXR10#show lldp neighbor
Capability Codes:
N - Other, r - Repeater, B - Bridge, W - WLAN Access Point,
R - Router, T - Telephone, D - DOCSIS Cable Device,
S - Station Only, C - C-VLAN Component of a VLAN Bridge,
s - S-VLAN Component of a VLAN Bridge,
t - Two-port MAC Relay (TPMR)
Field Description
Holdtime hold-time.
Capability Capability.
Platform Platform.
The following is sample output from the show lldp statistic command:
8-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 LLDP Configuration c u -tr a c k
Field Description
l Configuration Thought
1. Enter LLDP configuration mode.
2. Enter an interface.
3. Enable LLDP.
l Configuration Commands
Enter an interface in LLDP configuration mode and then configure LLDP, as shown
below.
R1(config)#lldp
R1(config-lldp)#interface gei-0/1/0/1
R1(config-lldp-if-gei-0/1/0/1)#lldp enable
l Configuration Verification
Use the show lldp neighbor command to check the configuration result, as shown
below.
R1(config-if)#show lldp neighbor
Capability Codes:
N - Other, r - Repeater, B - Bridge, W - WLAN Access Point,
R - Router, T - Telephone, D - DOCSIS Cable Device,
S - Station Only
Local-Port Chassis-ID Holdtime Capability Platform Peer-Port
----------------------------------------------------------------------
gei-0/1/0/1 000101040507 92 B S Software gei-0/1/0/1
8-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
l Configuration Thought
1. Enter LLDP configuration mode.
2. Configure LLDP attributes.
l Configuration Commands
The configuration of R1:
R1(config)#lldp
R1(config-lldp)#maxneighbor 3
/*Configure the maximum number of system neighbors*/
R1(config-lldp)#hellotime 30000
/*Configure the intervals to send LLDP neighbor discovery packets*/
R1(config-lldp)#holdtime 8
/*Configure LLDP neighbor hold-time*/
R1(config-lldp)#lldp enable
/*Enable LLDP*/
R1(config-lldp)#lldp-rx enable
/*Enable LLDP receiving*/
R1(config-lldp)#lldp-tx enable
/*Enable LLDP sending*/
R1(config-lldp)#clearneighbor
/*Clear LLDP neighbor relationship that has been established*/
R1(config-lldp)#clearstatistic
/*Clear LLDP statistical information*/
l Configuration Verification
Use the show running-config lldp command to check the configuration result, as shown
below.
ZXR10(config-lldp)#show running-config lldp
! <LLDP>
lldp
hellotime 30000
holdtime 8
maxneighbor 3
! </LLDP>
8-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 8 LLDP Configuration c u -tr a c k
Configuration Thought
1. Enter LLDP configuration mode.
2. Enter an interface.
3. Enable LLDP.
Configuration Commands
Enter an interface in LLDP configuration mode and then configure LLDP, as shown below.
S1(config)#lldp
S1(config-lldp)#interface gei-0/1/1/1
S1(config-lldp-if-gei-0/1/1/1)#lldp enable
Configuration Verification
Use the show lldp neighbor command to check the configuration result, as shown below.
S1(config-if)#show lldp neighbor
Capability Codes:
N - Other, r - Repeater, B - Bridge, W - WLAN Access Point,
R - Router, T - Telephone, D - DOCSIS Cable Device,
S - Station Only
Local-Port Chassis-ID Holdtime Capability Platform Peer-Port
----------------------------------------------------------------------
gei-0/1/1/1 000101040507 92 B S Software gei-0/1/1/1
8-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Thought
1. Enter LLDP configuration mode.
2. Configure LLDP attributes.
Configuration Commands
The configuration of S1:
S1(config)#lldp
S1(config-lldp)#maxneighbor 3
/*Configure the maximum number of system neighbors*/
S1(config-lldp)#hellotime 30000
/*Configure the intervals to send LLDP neighbor discovery packets*/
S1(config-lldp)#holdtime 8
/*Configure LLDP neighbor hold-time*/
S1(config-lldp)#lldp enable
/*Enable LLDP*/
S1(config-lldp)#lldp-rx enable
/*Enable LLDP receiving*/
S1(config-lldp)#lldp-tx enable
/*Enable LLDP sending*/
S1(config-lldp)#clearneighbor
/*Clear LLDP neighbor relationship that has been established*/
S1(config-lldp)#clearstatistic
/*Clear LLDP statistical information*/
Configuration Verification
Use the show running-config lldp command to check the configuration result, as shown
below.
ZXR10(config-lldp)#show running-config lldp
! <LLDP>
lldp
hellotime 30000
holdtime 8
maxneighbor 3
! </LLDP>
8-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 9
SmartGroup Configuration
Table of Contents
SmartGroup Overview ................................................................................................9-1
Configuring SmartGroup.............................................................................................9-2
Maintaining a SmartGroup..........................................................................................9-7
SmartGroup Configuration Examples .........................................................................9-9
SmartGroup Principle
The link aggregation of SmartGroup is to aggregate several ports into an aggregation
group, thus to share out/in load among the member ports. This also improves the reliability
of the connections. Outwardly, the aggregation group seems as a port. Load sharing of link
aggregation supports load-sharing aggregation and non-load-sharing aggregation.Figure
9-1 shows a SmartGroup link aggregation.
9-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
9-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
9-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
9-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
9-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
<mode> Load sharing mode of LACP. The supported modes are dstip,
dst-mac, src-dst-ip, src-dst-mac, src-ip, src-mac, src-port,
dst-port, src-dst_port and enhance, and the default mode
is src_dst_mac.
Parameter Description
Parameter Description
on Static trunk. In this mode, the interface does not run LACP,
and it is necessary to set the mode to "on" on both ends.
Parameter Description
9-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
Parameter Description
Parameter Description
Parameter Description
Parameter Description
non-revertive No switchover.
Parameter Description
Parameter Description
Command Function
9-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter descriptions:
Parameter Description
The following is sample output from the show lacp 1 internal command (the aggregation
state of member ports in smatgroup1 is displayed):
Field Description
9-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
l Configuration Thought
1. Create smartgroup1 on S1, and create smartgroup1 on S2. Enter interface
configuration mode.
2. Configure the switch attribute of smartgroup1 on S1 and S2 in interface
configuration mode, and exit to global configuration mode.
3. Enter LACP configuration mode from global configuration mode, and then enter
the smartgroup interfaces.
4. Set the aggregation mode of smartgroup1 to LACP on S1 and S2. Configure load
sharing policy and the minimum number of members.
5. Enter LACP configuration mode from global configuration mode, and then enter
the physical interfaces.
6. Add the physical interfaces on S1 and S2 to the smartgroup1.
7. Configure LACP negotiation mode and time-out period on the member interfaces
of smartgroup1 on S1 and S2.
l Configuration Commands
The configuration of S1:
S1(config)#interface smartgroup1
S1(config-if)#switch attribute enable
S1(config-if)#exit
S1(config)#lacp
S1(config-lacp)#interface smartgroup1
S1(config-lacp-sg-if)#lacp mode 802.3ad
S1(config-lacp-sg-if)#lacp load-balance dst-mac
S1(config-lacp-sg-if)#lacp minimum-member 1
S1(config-lacp-sg-if)#exit
S1(config-lacp)#interface gei-0/2/0/5
S1(config-lacp-member-if)#smartgroup 1 mode active
S1(config-lacp-member-if)#lacp timeout short
S1(config-lacp-member-if)#exit
9-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
S1(config-lacp)#interface gei-0/2/0/9
S1(config-lacp-member-if)#smartgroup 1 mode active
S1(config-lacp-member-if)#lacp timeout short
S1(config-lacp-member-if)#exit
9-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
9-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
l Configuration Thought
1. Create smartgroup1 on S1, and create smartgroup1 on S2. Enter interface
configuration mode.
2. Configure the switch attribute of smartgroup1 on S1 and S2 in interface
configuration mode, and exit to global configuration mode.
3. Enter LACP configuration mode from global configuration mode, and then enter
the smartgroup interfaces.
4. Configure the same negotiation mode “on” on the smartgroup1 interfaces on S1
and S2.
5. Enter LACP configuration mode from global configuration mode, and then enter
the physical interfaces.
6. Add the physical interfaces on S1 and S2 to the smartgroup1.
l Configuration Commands
S2(config)#interface smartgroup1
S2(config-if)#switch attribute enable
S2(config-if)#exit
S2(config)#lacp
S2(config-lacp)#interface smartgroup1
S2(config-lacp-sg-if)#lacp mode on
9-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
S2(config-lacp-sg-if)#exit
S2(config-lacp)#interface gei-0/3/0/5
S2(config-lacp-member-if)#smartgroup 1 mode on
S2(config-lacp-member-if)#exit
S2(config-lacp)#interface gei-0/3/0/9
S2(config-lacp-member-if)#smartgroup 1 mode on
S2(config-lacp-member-if)#end
l Configuration Verification
Check the configuration on S1 and check whether the configuration takes effect.
S1#show lacp 1 internal
Smartgroup:1
Flags: *-Port is Active member Port
S-Port is requested in Slow LACPDUs F-Port is requested in Fast LACPDUs
A-Port is in Active mode P-Port is in Passive mode
Actor Agg LACPDUs Port Oper Port RX Mux
Port[Flags] State Interval Priority Key State Machine Machine
----------------------------------------------------------------------------
gei-0/2/0/9 ACTIVE 30 32768 0x11 0x3d N/A N/A
gei-0/2/0/5 ACTIVE 30 32768 0x11 0x3d N/A N/A
9-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Thought
1. Create smartgroup1 on S1, and create smartgroup1 on S2. Enter interface
configuration mode.
2. Configure the switch attribute of smartgroup1 on S1 and S2 in interface configuration
mode, and exit to global configuration mode.
3. Enter LACP configuration mode from global configuration mode, and then enter the
smartgroup interfaces.
4. Set the aggregation mode of smartgroup1 to LACP on S1 and S2. Configure load
sharing policy and the minimum number of members.
5. Enter LACP configuration mode from global configuration mode, and then enter the
physical interfaces.
6. Add the physical interfaces on S1 and S2 to the smartgroup1.
7. Configure LACP negotiation mode and time-out period on the member interfaces of
smartgroup1 on S1 and S2.
The configuration of S1:
S1(config)#interface smartgroup1
S1(config-if)#switch attribute enable
S1(config-if)#exit
S1(config)#lacp
S1(config-lacp)#interface smartgroup1
S1(config-lacp-sg-if)#lacp mode 802.3ad
S1(config-lacp-sg-if)#lacp load-balance dst-mac
S1(config-lacp-sg-if)#lacp minimum-member 1
S1(config-lacp-sg-if)#exit
S1(config-lacp)#interface gei-0/1/1/5
S1(config-lacp-member-if)#smartgroup 1 mode active
S1(config-lacp-member-if)#lacp timeout short
S1(config-lacp-member-if)#exit
S1(config-lacp)#interface gei-0/1/1/9
S1(config-lacp-member-if)#smartgroup 1 mode active
S1(config-lacp-member-if)#lacp timeout short
S1(config-lacp-member-if)#exit
9-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
S2(config)#lacp
S2(config-lacp)#interface smartgroup1
S2(config-lacp-sg-if)#lacp mode 802.3ad
S2(config-lacp-sg-if)#lacp load-balance dst-mac
S2(config-lacp-sg-if)#lacp minimum-member 1
S2(config-lacp-sg-if)#exit
S2(config-lacp)#interface gei-0/1/1/5
S2(config-lacp-member-if)#smartgroup 1 mode active
S2(config-lacp-member-if)#lacp timeout short
S2(config-lacp-member-if)#exit
S2(config-lacp)#interface gei-0/1/1/9
S2(config-lacp-member-if)#smartgroup 1 mode active
S2(config-lacp-member-if)#lacp timeout short
S2(config-lacp-member-if)#end
Configuration Verification
Check the configuration on S1 and check whether the configuration takes effect.
S1(config)#show lacp 1 internal
Smartgroup:1
Flags: * - Port is Active member Port
S - Port is requested in Slow LACPDUs F - Port is requested
in Fast LACPDUs
A - Port is in Active mode P - Port is in Passive
mode
Actor Agg LACPDUs Port Oper Port RX Mux
Port[Flags] State Interval Priority Key State Machine Machin
e
--------------------------------------------------------------------------------
gei-0/1/1/5 [FA*] ACTIVE 1 32768 0x111 0x3f CURRENT COLL
/*Port aggregation, Active means success; Inactive means failure*/
gei-0/1/1/9 [FA*] ACTIVE 1 32768 0x111 0x3f CURRENT COLL
9-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
lacp minimum-member 1
/*The minimum number of members aggregated successfully. When the
number of links aggregated successfully is not less than this
value, smartgroup is up.*/
interface gei-0/1/1/9
smartgroup 1 mode active
/*In 802.3ad mode, only when at least one end of the link is in
active mode will the aggregation succeeds.*/
lacp timeout short
interface gei-0/1/1/5
smartgroup 1 mode active
lacp timeout short
! </LACP>
9-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 9 SmartGroup Configuration c u -tr a c k
Configuration Thought
1. Create smartgroup1 on S1, and create smartgroup1 on S2. Enter interface
configuration mode.
2. Configure the switch attribute of smartgroup1 on S1 and S2 in interface configuration
mode, and exit to global configuration mode.
3. Enter LACP configuration mode from global configuration mode, and then enter the
smartgroup interfaces.
4. Configure the same negotiation mode “on” on the smartgroup1 interfaces on S1 and
S2.
5. Enter LACP configuration mode from global configuration mode, and then enter the
physical interfaces.
6. Add the physical interfaces on S1 and S2 to the smartgroup1.
Configuration Commands
The configuration of S1:
S1(config)#interface smartgroup1
S1(config-if)#switch attribute enable
S1(config-if)#exit
S1(config)#lacp
S1(config-lacp)#interface smartgroup1
S1(config-lacp-sg-if)#lacp mode on
S1(config-lacp-sg-if)#exit
S1(config-lacp)#interface gei-0/1/1/5
S1(config-lacp-member-if)#smartgroup 1 mode on
S1(config-lacp-member-if)#exit
S1(config-lacp)#interface gei-0/1/1/9
S1(config-lacp-member-if)#smartgroup 1 mode on
S1(config-lacp-member-if)#exit
S2(config)#interface smartgroup1
S2(config-if)#switch attribute enable
S2(config-if)#exit
S2(config)#lacp
S2(config-lacp)#interface smartgroup1
S2(config-lacp-sg-if)#lacp mode on
S2(config-lacp-sg-if)#exit
9-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
S2(config-lacp)#interface gei-0/1/1/5
S2(config-lacp-member-if)#smartgroup 1 mode on
S2(config-lacp-member-if)#exit
S2(config-lacp)#interface gei-0/1/1/9
S2(config-lacp-member-if)#smartgroup 1 mode on
S2(config-lacp-member-if)#end
Configuration Verification
Check the configuration on S1 and check whether the configuration takes effect.
S1#show lacp 1 internal
Smartgroup:1
Flags: *-Port is Active member Port
S-Port is requested in Slow LACPDUs F-Port is requested in Fast LACPDUs
A-Port is in Active mode P-Port is in Passive mode
Actor Agg LACPDUs Port Oper Port RX Mux
Port[Flags] State Interval Priority Key State Machine Machine
----------------------------------------------------------------------------
gei-0/1/1/9 ACTIVE 30 32768 0x11 0x3d N/A N/A
gei-0/1/1/5 ACTIVE 30 32768 0x11 0x3d N/A N/A
9-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 10
SVLAN Configuration
Table of Contents
SVLAN Overview .....................................................................................................10-1
Configuring an SVLAN ...........................................................................................10-10
Maintaining an SVLAN ...........................................................................................10-12
SVLAN Configuration Example...............................................................................10-14
SVLAN Principle
Currently, SVLAN is mainly implemented by VFP and IFP, based on which two types
of CLI configuration are provided. It is recommended that you use the SVLAN in VFP
mode because it can fully implement unicast forwarding in uplink and downlink directions.
Furthermore, with ACL rules, it can perform data filtering by packet type or IP address to
implement stream splitting in a better way. This section details the SVLAN in VFP mode.
SVLAN supports five service types. Users can flexibly choose a combination of these
10-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
service types according to their own network. This ensures that SVLAN applies proper
service types for different networking environments.
The following sections detail all the service types.
Service Type 1 (in1-out2)
As shown in Figure 10-1, an outer OVLAN can be added according to the designated inner
VLAN.
l In uplink direction:
The switch splits data streams received on the customer port according to the
carried inner VLANs. To be specific, the switch adds outer OVLANs for data streams
according to the carried inner VLANs and then forwards the data streams based on
the L2 forwarding principle and the outer VLANs.
l In downlink direction:
When receiving data streams with double tags on the uplink port, the switch forwards
them based on the L2 forwarding principle and the outer VLANs. The switch then
removes the outer tags when the data streams reach the customer port.
10-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
Note:
There is anther configuration type, namely IFP SVLAN. The switch learns the PVID by
using the function of MAC address learning and then redirects to the uplink port. Therefore,
in the downlink direction, data streams are broadcast in OVLANs as unknown unicast to
the customer port.
l In uplink direction:
The switch splits data streams received on the customer port according to the
carried inner VLANs. To be specific, the switch adds outer OVLANs for data streams
according to the carried inner VLANs and configures the 802.1Q property of OVLAN.
l In downlink direction:
When receiving data streams with double tags on the uplink port, the switch forwards
them based on the L2 forwarding principle and the outer VLANs. The switch then
removes the outer tags when the data streams reach the customer port.
10-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Note:
There is anther configuration type, namely IFP SVLAN. The switch learns the PVID by
using the function of MAC address learning and then redirects to the uplink port. Therefore,
in the downlink direction, data streams are broadcast in OVLANs as unknown unicast to
the customer port.
l In uplink direction:
The switch splits data streams received on the customer port according to the
carried inner VLANs. To be specific, the switch adds outer OVLANs for data streams
according to the carried inner VLANs and configures the 802.1Q property of OVLAN
as mapping of inner VLAN.
l In downlink direction:
When receiving data streams with double tags on the uplink port, the switch forwards
them based on the L2 forwarding principle and the outer VLANs. The switch then
removes the outer tags when the data streams reach the customer port.
10-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
Note:
There is anther configuration type, namely IFP SVLAN. The switch learns the PVID by
using the function of MAC address learning and then redirects to the uplink port. Therefore,
in the downlink direction, data streams are broadcast in OVLANs as unknown unicast to
the customer port.
l In uplink direction:
The switch splits data streams received on the customer port according to the carried
inner VLANs. To be specific, the switch transparently transmits the data streams with
inner VLANs without any data processing.
l In downlink direction:
When data streams with tags reach the uplink port, the switch forwards them based
on the L2 forwarding principle.
VFP:
l Just support a single port transparent transmission configuration type.
l For in-vlan any configuration type, It transparently transmits all the inner VLANs.
10-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
IFP:
l There are two configuration types, namely configuration based on a single session
(transparent transmission for only a single inner VLAN) and configuration based
on all sessions except single-tag to double-tag sessions (default-vlan-forwarding:
transparent transmission for all inner VLANs).
l If default-vlan-forwarding is required, this function must be configured at last. After
configuration, the configuration of IFP SVLAN does not take effect.
l The switch learns the PVID by using the function of MAC address learning and then
redirects to the uplink port. Therefore, in the downlink direction, data streams are
broadcast in inner VLANs as unknown unicast to the customer port.
Service Type 5 (int2-out2)
If the received packets carry double tags, the above mentioned transparent transmission
can implement In and Out with double tags.
Service Type 6 (untag-out1, supported only by SVLAN in IFP mode)
As shown in Figure 10-5, the switch adds tags for the data streams without any tag received
on the customer port. Unlike common ports that use only the default PVID, the switch can
add different tags for the data streams without any tag received on the customer port,
which omits the process of VLAN translation.
Figure 10-5 Service Type 6 (untag-out1, supported only by SVLAN in IFP mode)
l In uplink direction:
The switch splits data streams without any tag received on the customer port
according to their configurations. To be specific, the switch adds outer OVLANs for
the data streams and then forwards them based on the L2 forwarding principle.
10-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
l In downlink direction:
When data streams with tags reach the uplink port, the switch forwards them based
on the L2 forwarding principle and then removes their tags on the customer port.
Service Type 7 (untag-untag)
After the untagged packets pass through the untag to single-tag service, their tags are
removed on the uplink port to form the untag to untag service.
Service Type 8 (enhance vfp)
Packets with single tag is sent to the switch. The switch adds outer tags in accordance
with policies.
The switch modifies inner VIDs and adds outer VIDs according to the properties and VIDs
carried in the single-tag packets.
The switch deletes outer VIDs according to the properties and inner and outer VIDs carried
in the received packets.
For the received double-tag packets, the switch deletes their outer tags and modifies their
inner tags according to the policy.
For the received double-tag packets, the switch modifies their outer tags according to the
policy.
The switch modifies inner VIDs according to the properties and inner and outer VIDs carried
in the received packets.
The switch modifies inner and outer VIDs according to the properties and inner and outer
VIDs carried in the received packets.
For the received double-tag packets, the switch removes the inner or outer tags in
accordance with policies.
For the received untag packets, the switch adds inner and outer tags in accordance with
policies.
For the advanced VFP function, the customer port need not run the switchport qinq custo
mer command for configuration. customer refers to the updated OVLAN. In this case, the
switch forwards packets to the uplink port according to the updated OVLAN and the MAC
learns the updated OVLAN.
Note:
There is another configuration type, namely IFP SVLAN. The switch matches inner and
outer tags for the double-tag packets and then removes their outer tags. The customer
port need not run the switchport qinq customer command for configuration. customer refers
to the OVLAN before update. In this case, the switch forwards packets to the uplink port
according to the updated OVLAN and the MAC learns the OVLAN before replacement.
10-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
l Network Characteristics
1. A customer interface requires both the QinQ service and the transparent
transmission service.
2. The SmartGroup function is not enabled on the uplink interface and a BRAS and
a router exist in the uplink direction. In this case, a large number of packets
from PPPoE users are added with QinQ tags and then transmitted to the BRAS
for authentication. The packets from other private line users are transparently
transmitted to the router.
3. A network management VLAN is used to manage the T64G and its mounted
devices.
l Functions Implemented by SVLAN
1. The packets with a same OVLAN can be transmitted to different networks. In
addition, the packets are forwarded to the BRAS and router respectively based
on L2 unicast.
2. The packets with the network management VLAN can be transmitted over a same
network to a device, for example, BRAS. This facilitates the NMS to implement
centralized management.
3. Different OVLANs can be added for a same inner VLAN of different interfaces.
4. OVLANs can be added for different inner VLANs on a same interface.
5. OVLANs can be added for a same inner VLAN but different IP segments on a
same interface.
10-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
l Network Characteristics
1. A customer interface requires both the QinQ service and the transparent
transmission service.
2. The SmartGroup function is enabled on the uplink interface and a BRAS and
a router exist in the uplink direction. In this case, a large number of packets
from PPPoE users are added with QinQ tags and then transmitted to the BRAS
for authentication. The packets from other private line users are transparently
transmitted to the router. In addition, the uplink interfaces of the BRAS and T64G
are connected by using the SmartGroup function.
3. A network management VLAN is used to manage the T64G and its mounted
devices.
l Functions Implemented by SVLAN
10-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
ZXR10(config)#ipv4-access-list <acl-name><vlan-id>
3 Configures a VFP rule.
ZXR10(config-ipv4-acl)#rule <rule-id> per <ip-address>
4 ZXR10(config-svlan)#vfp<interface-name>
Configures descriptions of a
session<session-id> type <ipv4|link|ipv4-mixed|ipv6 |link >
VFP session.
description <str>
To configure the traffic statistics function for the SVLAN VFP on the ZXR10 5900E, perform
the following steps:
10-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
3 ZXR10#clear vfp statistics <interface name> session Clears session statistics for
<session-id> type <ipv4 | link | ipv4-mixed | ipv6 | link > the VFP.
To configure the enhanced VFP of an SVLAN on the ZXR10 5900E, perform the following
steps:
ZXR10(config)#ipv4-access-list <acl-name>
3 Configures a VFP rule.
ZXR10(config-ipv4-acl)#rule <rule-id> per <ip-address>
4 ZXR10(config-svlan)#vfp-extra <interface-name>
Configures descriptions of an
session<session-id> type <ipv4|link|ipv4-mixed|ipv6 |link >
enhanced VFP session.
description <str>
To configure the traffic statistics function for the enhanced SVLAN VFP on the ZXR10
5900E, perform the following steps:
3 ZXR10#clear vfp statistics <interface name> session Clears session statistics for
<session-id> type <ipv4 | link | ipv4-mixed | ipv6 | link > the enhanced VFP.
To configure the SVLAN IFP on the ZXR10 5900E, perform the following steps:
10-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Except the function of untag to single tag, the other SVLAN functions of the VFP and IFP
are the same. It is recommended that you use the SVLAN of VFP and meanwhile do not
configure two SVLANs with the same function provided by VFP and IFP.
SVLAN consists of IFP and VFP. VFP consists of common VFP and enhanced VFP. For
enhanced VFP, the downlink port cannot be set to a customer port.
When the same function can be accomplished by common VFP and enhanced VFP, it is
recommended that users use enhanced VFP. It is not recommended that users configure
common VFP and enhanced VFP on the same port.
Command Function
ZXR10#show vfp-config <interface name> type <acl type> Displays the VFP configuration
information on an interface.
10-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
Field Description
vfp gei-0/1/1/1 session 1 invlan 10 in type ipv4 name ipv4acl rule 1 ovlan 100
The following is sample output from the show vfp statistics gei-0/1/1/1 session 1 type ipv4
command:
ZXR10#show vfp statistics gei-0/1/1/1 session 1 type ipv4
session 1 statistics:
120s input rate : 1693971851Bps 13234155Pps
StreamCounters(update interval 10s)
In_Bytes 203276622080 In_Packets 1588098610
Field Description
120s input rate Number of bytes per 120 seconds, and number of packets
per 120 seconds.
10-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
The following is sample output from the show running-config pm-svlan command:
ZXR10(config-svlan)#show running-config pm-svlan
!<SVLAN>
svlan-configuration
vfp gei-0/1/1/1 session 1 invlan 10 in type ipv4 name ipv4acl rule 1 ovlan 100
vlan-qinq session-no 1 customer-port gei-0/1/1/2 uplink-port gei-0/1/1/4 in-vlan
200 ovlan 400
$
!</SVLAN>
The following is sample output from the show vlan-qinq brief command:
ZXR10(config-svlan)#show vlan-qinq brief
Count:1
Free Count:3999
Sess Customer Uplink Redirect Hvlan Ovlan Invlan
1 gei-0/1/1/2 gei-0/1/1/4 400 200
Field Description
Redirect Redirection.
Invlan Inner VLAN ID, such as 1–100, 200, or 300. The value untag
means packets without tags.
1. The packet with the tag of 10 received from customer interface gei-0/1/1/1 will be added
with inner and outer tags (inner tag: 10; outer tag: 997) on the ZXR10 5900Eand then
forwarded through uplink interface gei-0/1/1/2.
10-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
2. The packet with the tag of 11 received from customer interface gei-0/1/1/1 will be added
with inner and outer tags (inner tag: 11; outer tag: 998) on the ZXR10 5900E and then
forwarded through uplink interface gei-0/1/1/2.
3. The packet with the tag of 999 received from customer interface gei-0/1/1/1 will be
transparently transmitted through uplink interface gei-0/1/1/2.
If the traditional method of SVLAN configuration is used, the command output is shown
below:
SVLAN configuration on the ZXR10 5900E:
ZXR10(config-svlan)#vlan-qinq session-no 1 customer-port gei-0/1/1/1 uplink-port
gei-0/1/1/2 in-vlan 10 ovlan 997
ZXR10(config-svlan)#vlan-qinq session-no 2 customer-port gei-0/1/1/1 uplink-port
gei-0/1/1/2 in-vlan 11 ovlan 998
ZXR10(config-svlan)#vlan-qinq session-no 3 customer-port gei-0/1/1/1 uplink-port
gei-0/1/1/2 in-vlan 999 untag helper-vlan 4094
10-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
ZXR10(config-if)#no shutdown
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#interface gei-0/1/1/2
ZXR10(config-swvlan-intf)#switchport mode hybrid
ZXR10(config-swvlan-intf)#switchport hybrid vlan 997-998 tag
ZXR10(config-swvlan-intf)#switchport hybrid vlan 999 tag
ZXR10(config-swvlan-intf)#switchport hybrid vlan 4094 untag
ZXR10(config-swvlan-intf)#switchport qinq uplink
10-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 10 SVLAN Configuration c u -tr a c k
ZXR10(config-swvlan)#interface gei-0/1/1/1
ZXR10(config-swvlan-intf)#switchport mode hybrid
ZXR10(config-swvlan-intf)#switchport hybrid vlan 999 tag
ZXR10(config-swvlan-intf)#switchport hybrid vlan 997-998 untag
ZXR10(config-swvlan-intf)#switchport qinq customer
ZXR10(config)#interface gei-0/1/1/2
ZXR10(config-if)#no shutdown
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#interface gei-0/1/1/2
ZXR10(config-swvlan-intf)#switchport mode hybrid
ZXR10(config-swvlan-intf)#switchport hybrid vlan 997-998 tag
ZXR10(config-swvlan-intf)#switchport hybrid vlan 999 tag
10-17
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
10-18
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 11
ZESR Configuration
Table of Contents
ZESR Overview........................................................................................................11-1
Configuring a ZESR .................................................................................................11-6
Maintaining a ZESR .................................................................................................11-9
ZESR Configuration Example................................................................................. 11-11
11-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
ZESR Principle
In the case of a complete ZESR loop (the state of all links is up), the state of the ZESR
protocol is COMPLETE. If a fault occurs in the loop, the state of the ZESR protocol is
FAILED. Therefore, the link state of a loop determines the state of the ZESR protocol.
When the link state changes, the ZESR protocol performs link switching.
Fault detection mechanism of ZESR link: Its key mechanism is link-down. The Hello
timeout mechanism is not the default detection mechanism but it can be used after
configuration. As shown in Figure 11-2, when the interface between S3 and S4 is down,
S3 and S4 send link-down frames every 1s to the primary node S1 after detecting the
fault. After receiving the link-down frame, the S1 knows that a fault occurs on the link.
In the case of ZESR switching, the system performs operations on the interfaces and
instances protected by the domain. The instances described here are the same as those
of the STP. The ZESR uses the control VLAN as the unique ID of a domain and meanwhile
as the tag of a frame. To make full use of link bandwidth, multiple ZESR domains can be
configured on a same ring.
l ZESR Single-Ring Principle
11-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
11-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
timeout time (8s), it considers that the link recovers. In this case, the primary
node blocks the slave interface (if the fault occurs on the link connected to the
master interface on the primary node, the master interface must be enabled),
clears the bridge table of the slave interface, and sends an up-flush frame to the
transport node, notifying that the link recovers on the ring. After receiving the
up-flush frame, the transport node unblocks the interface and clears the bridge
table. When the loop changes fromFigure 11-4 to Figure 11-3, the link between
S3 and S4 recovers. In this case, S3 and S4 stop sending link-down frames. If
the primary node S1 does not receive the link-down frame within the timeout time,
it considers that the link recovers. To be specific, S1 blocks the slave interface,
clears the bridge table, and sends an up-flush frame from both the master and
slave interfaces. After receiving the up-flush frame, S2, S3, and S4 unblock the
interface and clear their own bridge table.
l ZESR Multi-Ring Principle
Figure 11-5 shows the ZESR multi-ring network topology.
S1, S2, S3, and S4 form a master ring. S1 acts as the primary node, and S3, S4, S5
and S6 act as a slave ring with the level and segment of 1. S5 acts as the primary
node, S3 and S4 acts as edge assistant nodes. In addition, S3, S4, S6, and S7 form
a slave ring with the level of 2 and the segment of 1. S3 acts as an edge assistant
node, S4 acts as an edge control node. For a slave ring configured with an edge
control node, the functions of this node are similar to those of the primary node. The
state of the slave ring is determined by the edge control node after calculation. During
configuration for a domain on the slave ring, either of the primary node or the edge
control node is deployed. When the state of a slave ring is COMPLETE, the interface
of the edge control node is blocked.
11-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
Fault troubleshooting and recovery for a master ring: In the ZESR multi-ring network
topology, the fault troubleshooting and recovery for the master ring with the level
and segment of 0 are the same as those in the ZESR single-ring network topology
(described in the section "ZESR Single-Ring Principle"). The fault troubleshooting
and recovery do not affect the state of the slave ring.
Fault troubleshooting and recovery for a slave ring: When detecting a link fault, the
node on the slave ring blocks the interface connected with the faulty link and then
sends a link-down frame to the primary node (or the edge control node) and the edge
assistance node at intervals. After receiving the link-down frame, the primary node
(or the edge control node) enables the slave interface (or the access interface on the
edge control node) and meanwhile sends a down-flush frame (in the case of the edge
control node, it sends a down-flush frame to the two interfaces at the primary level).
After receiving the down-flush frame, the transport node and the edge assistance node
on the slave ring clear their own bridge table. If the state of the edge assistance node
is COMPLETE, the access interface is also used to send a down-flush frame to the two
interfaces at the primary level. When the transport node at the upper layer receives
the down-flush frame from the ring at a lower layer, it clears the bridge table on the
ring interface. In some cases, protocol frames are not processed no matter it is a
single-ring network or a multi-ring network.
à When the state of the master node or the edge control node is FAILED, it takes
no actions while receiving the link-down frame from the same layer.
à When the state of the transport node or the edge assistance node is FAILED, it
takes no actions while receiving the down-flush frame from the same layer.
à When the state of the transport node or the edge assistance node is COMPLETE,
it takes no actions while receiving the up-flush frame from the current layer.
Fault troubleshoot and recovery for a slave ring: When detecting that a link recovers,
the node on the slave ring stops sending link-down frames. If the primary node (or
the edge control node) does not receive the link-down frame within the timeout time,
it considers that the link recovers. In this case, the primary node blocks the slave
interface (or, the edge control node blocks the access interface), clears the bridge
table on the slave interface (or access interface on the edge control node), and then
sends an up-flush frame to both the master and slave interfaces (access interface
and the two interfaces at the upper layer in the case of the edge control node). After
receiving the up-flush frame, the transport node or the edge assistance node on the
slave ring unblocks the interface and clears the bridge table of the ring interface. After
receiving the up-flush frame, the transport node at the upper layer clears the bridge
table.
Both the ZESR and the STP implement data forwarding and blocking by configuring
the status of an STP instance on the interface. Therefore, the ZESR and the STP
are mutually exclusive based on interface + instance. That is, an interface instance
managed by ZESR will not be calculated by the STP. However, its STP state will be
11-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
calculated by the ZESR. The protection instance used by the ZESR is configured
based on the STP protocol. Therefore, when the ZESR protocol is used, a protection
instance can take effect only after the STP is enabled globally. Except the interface
instances managed by the ZESR, the STP state of other interface instances is
managed by the STP protocol, which avoids a loop.
11-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
11-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
For the above ZESR commands, the parameter names are the same. Therefore, these
parameters will not be described repeatedly in the following tables. The ZESR uses control
VLAN as the unique ID of a domain.
A description of the parameters in Step 2 is as follows:
Parameter Description
snooping vpls {enable | disable} Enables or disables associating ZESR with VPLS.
Parameter Description
role {master | transit} Configures the role of a ZESR node, that is, primary node
or transport node.
level <1-2> seg <1-4> Configures the level and segment of the ZESR slave ring.
Parameter Description
preforward <9-600>[preup <0-500> Configures the preforward and preup time of a ZESR node.
The preup time is optional and can be configured only on the
primary node or the edge control node.
Parameter Description
zesr-switchtimes all Clears the statistics on switching times of all ZESR domains.
ctrl-vlan <1-4094> all Clears the statistics on switching times of all the levels and
segments for a specified ZESR domain.
ctrl-vlan <1-4094> major Clears the statistics on switching times of the master ring
for a specified ZESR domain.
ctrl-vlan <1-4094> level<1-2> seg Clears the statistics on switching times of a specified level
<1-4> and segment of the slave ring for a specified ZESR domain.
11-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
Note:
The control VLAN of ZESR is special. It can be used only by the ZESR. In addition to
the control VLAN trunked on a ring interface, other interfaces cannot use this VLAN. A
ZESR ring interface cannot work in the QinQ mode. In addition, to improve switching
performance, the detection mode of a ZESR interface must be configured to fast and the
function of broadcast and unicast suppression must be configured for all the ring interfaces
and traffic interfaces.
ZESR can be associated with VPLS for only boundary nodes at the access layer.
Command Function
Parameter descriptions:
Parameter Description
The following is sample output from the show zesr brief command:
11-9
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
restarttime: 120(s)
port detect: fast
protocol mac: normal
Field Description
level, seg Level and segment of a domain. For a main ring, the level is
output as major and the segment is not output.
The following is sample output from the show zesr ctrl-vlan <1-4094> command:
ZXR10(config)#show zesr ctrl-vlan 100
ctrl-vlan: 100 protectinstance: 1 snoop-vpls: disable
level: major
state: down
role: transit
port: smartgroup1(P) portstate: block
port: gei-0/1/1/6(S) portstate: block
preforward: 20(s)
switch-times: 1
Field Description
11-10
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
Field Description
ZXR10(config)#spantree
ZXR10(config-stp)#enable
ZXR10(config-stp)#mst vlans 1-1000 instance 1
If VLAN 4001 is used as the control VLAN of a ZESR domain and instance 1 is used as
the protection instance, the ZESR interface must trunk the control VLAN and the VLAN
contained in the protection instance. The detailed configuration is shown below.
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#interface gei-0/1/0/1
ZXR10(config-swvlan-intf)#switchport mode trunk
ZXR10(config-swvlan-intf)#switchport trunk vlan 4001,1-1000
ZXR10(config)#switchvlan-configuration
ZXR10(config-swvlan)#interface gei-0/1/0/1
ZXR10(config-swvlan-intf)#switchport mode trunk
ZXR10(config-swvlan-intf)#switchport trunk vlan 4001,1-1000
11-11
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Thought
1. Enter the ZESR config mode and configure the control VLAN and protection instance
of the ZESR domain.
2. Configure the level, segment, role, and interface of the ZESR node.
3. If there are other functional requirements, configure the ZESR properties further.
Configuration Commands
The configuration of S1:
ZXR10(config)#zesr
ZXR10(config-zesr)#zesr ctrl-vlan 4001 protect-instance 1
ZXR10(config-zesr)#zesr ctrl-vlan 4001 major-level role master gei-0/1/1/1 gei-0/1/1/2
The configuration of S3 and S4 is similar to that of S2 and therefore will not be described
again.
Configuration Verification
The configuration result on S1:
ZXR10(config)#show zesr ctrl-vlan 4001
11-12
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
11-13
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Thought
1. Enter the ZESR config mode and configure the control VLAN and protection instance
of the ZESR domain.
2. Configure the level, segment, role, and interface of the ZESR node.
3. If there are other functional requirements, configure the ZESR properties further.
Configuration Commands
The configuration of S3:
ZXR10(config)#zesr
ZXR10(config-zesr)#zesr ctrl-vlan 4001 protect-instance 1
/*master ring configuration*/
ZXR10(config-zesr)#zesr ctrl-vlan 4001 major-level role
transit gei-0/1/1/1 gei-0/1/1/2
/*slave ring configuration*/
ZXR10(config-zesr)#zesr ctrl-vlan 4001 level 1 seg 1 role
edge-assistant gei-0/1/1/3
11-14
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 11 ZESR Configuration c u -tr a c k
Configuration Verification
The configuration result on S4:
ZXR10(config)#show zesr ctrl-vlan 4001
ctrl-vlan: 4001 protectinstance: 1 snoop-vpls:disable
level: major
state: up
role: transit
port: gei-0/1/1/1(P) portstate: forward
port: gei-0/1/1/2(S) portstate: forward
preforward: 20(s)
switch-times: 1
level: 1 seg: 1
state: up
role: edge-control
port: gei-0/1/1/3 portstate: block
preforward: 20(s) preup: 2(s)
switch-times: 1
level: 1 seg: 1
state: up
role: edge-assistant
port: gei-0/1/1/3 portstate: forward
preforward: 20(s)
switch-times: 1
11-15
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
11-16
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 12
ZESS Configuration
Table of Contents
ZESS Overview........................................................................................................12-1
Configuring ZESS ....................................................................................................12-2
ZESS Maintenance ..................................................................................................12-4
ZESS Configuration Example ...................................................................................12-5
ZESS Principle
The ZESS uses a backup link to transmit data when the active link is faulty, which protects
network connectivity. In addition, the ZESS uses a protection instance to protect the data
transmitted over network. The instance used by the ZESS is the same as that used by the
STP.
12-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
When both of the active and standby links work normally, the ZESS blocks the standby link
and forwards data by using the active link. When the active link is faulty, the ZESS blocks
the active link and forwards data by using the standby link, and meanwhile clears the bridge
table of the active link. When the active link recovers, the ZESS perform operations bases
on the configured mode (revertive or non-revertive). In the revertive mode, the ZESS
blocks the standby link, enables the active link, and meanwhile clears the bridge table of
the standby link. In the non-revertive mode, the ZESS does not perform active/standby
switching.
Both the ZESS and the STP implement data forwarding and blocking by configuring
the status of an STP instance on the interface. Therefore, the ZESS and the STP are
mutually exclusive based on interface + instance. That is, an interface instance managed
by ZESS will not be calculated by the STP. However, its STP state will be calculated by
the ZESS. The protection instance used by the ZESS is configured based on the STP
protocol. Therefore, when the ZESS protocol is used, a protection instance can take
effect only after the STP is enabled globally. Except the interface instances managed by
the ZESS, the STP state of other interface instances is managed by the STP protocol,
which avoids a loop.
ZXR10(config-zess)#zess domain <1-16> preup <1-900> This configures the preup time
of ZESS. The default value is
2s
12-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 12 ZESS Configuration c u -tr a c k
For the above ZESS commands, the parameter names are the same. Therefore, these
parameters will not be described repeatedly in the following tables. The ZESS uses domain
ID as the unique ID of a domain.
The command parameters in step 2 are described as follows.
Parameter Description
protect-instance <0-64> Configures the protection instance of a domain, which is the same
as the STP instance in terms of parameter value.
Parameter Description
mode <revertive | non-revertive> Configures the revertive mode of a ZESS domain. The available
options are revertive and non-revertive. The default value is
revertive.
preup <1-900> Configures the preup time of a ZESS domain. The value of this
parameter ranges from 1s to 900s. The default value is 2s.
Parameter Description
port-detect {normal | fast} Configures the detection mode of a ZESS interface. The available
options are normal and fast. The default value is normal.
12-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Caution!
To improve the switching performance of ZESS, the detection mode of a ZESS interface
must be configured to fast. In addition, the properties of broadcast and unicast
suppression must be configured for the ZESS interface and the peer interface of the link.
In addition, the STP function must be disabled for the peer interface of the ZESS link.
Otherwise, data forwarding will be affected during switching.
Command Function
Parameter Description
12-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 12 ZESS Configuration c u -tr a c k
Configuration Thought
1. Enter the ZESS config mode and configure the ID and protection instance of the ZESR
domain.
2. Configure the interface and other parameters of a ZESR node.
3. If there are other functional requirements, configure the ZESS properties further.
Configuration Commands
The configuration of S1:
ZXR10(config)#zess
ZXR10(config-zess)#zess domain 1 protect-instance 1
ZXR10(config-zess)#zess domain 1 member primary gei-0/1/1/1 secondary gei-0/1/1/2
ZXR10(config-zess)#zess port-detect fast
/*If necessary, configure the ZESS properties, such as
the revertive mode and preup time.*/
ZXR10(config-zess)#zess domain 1 mode non-revertive
12-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Verification
The configuration result on S1:
ZXR10(config)#show zess domain 1
domain ID: 1 protectinstance: 1
state: up mode: non-revertive
port : gei-0/1/1/1(P) portstate: forward
port : gei-0/1/1/2(S) portstate: block
preup: 300(s) changeTimes : 0
port-detect mode: fast
12-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 13
ZESR+ Configuration
Table of Contents
ZESR+ Overview......................................................................................................13-1
Configuring ZESR+ ..................................................................................................13-3
ZESR+ Maintenance ................................................................................................13-4
ZESR+ Configuration Example.................................................................................13-5
As shown in Figure 13-1, two switches (S1 and S4) in the ring network are connected to
the SR and BRAS in the uplink direction, which implements protection for the upstream
links of the SR and BRAS. Suppose that the link from S1 to the SR is broken. In this case,
the traffic on this link will be automatically transmitted to the SR through S4. By using the
protection function with dual nodes and dual upstream links, the system can implement
switching within 50 ms when an upstream link is faulty.
13-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
ZESR+ Principle
When the dual-node and dual-uplink ZESR+ protocol is working, two roles are available:
primary node ZESS-MASTER and transport node ZESS-TRANSIT. The nodes use the
Hello packet and interface detection function to detect link status. When the link works
properly, the primary node blocks the slave interface and enables the master interface.
At this time, the transport node enables both of the master and slave interfaces. When
detecting a link fault, the transport node blocks the interface connected with the faulty link,
clears the bridge table, and sends a link-down frame to the primary node notifying the
fault information. After receiving the link-down frame, the primary node enables the slave
interface, clears the bridge table, and sends a down-flush frame. When detecting a link
fault, the primary node actively performs link switching. The format of frames used by the
ZESR+ and the specific meanings are the same as those of the ZESR. The ZESR+ is
quite similar to the ZESR master ring in terms of function. Therefore, the ZESR+ can work
together with the ZESR.
Figure 13-2 shows a typical network topology of the ZESR+ with dual nodes and dual
upstream links. S2 is a ZESS-MASTER node and S3 is a ZESS-TRANSIT node.
The ZESR+ protects upstream links and transport node S3 sends protocol packets to S2
through the master interface. Therefore, when the ZESR+ is working, you must configure
the master interface on the link where the two nodes are directly connected. Otherwise,
an error occurs in the protocol.
13-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 13 ZESR+ Configuration c u -tr a c k
Both the ZESR+ and the STP implement data forwarding and blocking by configuring the
status of an STP instance on the interface. Therefore, the ZESR+ and the STP are mutually
exclusive based on interface + instance. That is, an interface instance managed by ZESR+
will not be calculated by the STP. However, its STP state will be calculated by the ZESR+.
The protection instance used by the ZESR+ is configured based on the STP protocol.
Therefore, when the ZESR+ protocol is used, a protection instance can take effect only
after the STP is enabled globally. Except the interface instances managed by the ZESR+,
the STP state of other interface instances is managed by the STP protocol, which avoids
a loop.
13-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
The parameters of ZESR+ commands are almost the same as those of ZESR commands
in terms of parameter meaning. In a command, the role of a node is uniquely used to
distinguish whether a domain belongs to ZESR+ or ZESR.
The command parameters in step 3 are described as follows.
Parameter Description
role {zess-master | zess-transit} Configures the role of a ZESR+ domain node. ZESS-MASTER
refers to the primary node and ZESS-TRANSIT refers to a
transport node.
Command Function
Parameter Description
13-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 13 ZESR+ Configuration c u -tr a c k
restarttime: 120(s)
port detect: fast
protocol mac: normal
An example of the show zesr ctrl-vlan <1-4094> command output is shown below.
ZXR10(config)#show zesr ctrl-vlan 100
ctrl-vlan: 100 protectinstance: 1 snoop-vpls: disable
level: major
state: down
role: zess(T)
port: smartgroup1(P) portstate: block
port: gei-0/1/1/6(S) portstate: block
preforward: 20(s)
switch-times: 1
Caution!
During ZESR+ node configuration, because of special application scenarios of ZESR+,
you must configure the master interface to the link that directly connects the two nodes.
Other configuration requirements are similar to those of ZESR.
13-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Configuration Thought
1. Enter the ZESR config mode and configure the control VLAN and protection instance
of the ZESR domain.
2. Configure the level, segment, role, and interface of the ZESR/ZESR+ node.
3. If there are other functional requirements, configure the ZESR properties further.
These properties of ZESR are applicable to the ZESR+.
Configuration Commands
The configuration of S2:
ZXR10(config)#zesr
ZXR10(config-zesr)#zesr ctrl-vlan 4001 protect-instance 1
ZXR10(config-zesr)#zesr ctrl-vlan 4001 major-level role zess-master gei-0/1/1/1 gei-0/1/1/2
ZXR10(config-zesr)#zesr ctrl-vlan 4001 level 1 seg 1 role edge-assistant gei-0/1/1/3
ZXR10(config)#zesr
ZXR10(config-zesr)#zesr ctrl-vlan 4001 protect-instance 1
ZXR10(config-zesr)#zesr ctrl-vlan 4001 major-level role zess-transit gei-0/1/1/1 gei-0/1/1/2
ZXR10(config-zesr)#zesr ctrl-vlan 4001 level 1 seg 1 role edge-assistant gei-0/1/1/3
13-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 13 ZESR+ Configuration c u -tr a c k
Configuration Verification
The configuration result on S2:
ZXR10(config)#show zesr ctrl-vlan 4001
ctrl-vlan: 4001 protectinstance: 1 snoop-vpls: disable
level: major
state: up
role: zess(M)
port: gei-0/1/1/1(P) portstate: forward
port: gei-0/1/1/2(S) portstate: block
hello: 1(s) fail: 3(s)
preforward: 20(s) preup: 2(s)
switch-times: 1
level: 1 seg: 1
state: up
role: edge-assistant
port: gei-0/1/1/3 portstate: forward
preforward: 20(s)
switch-times: 1
level: 1 seg: 1
state: up
role: edge-assistant
port: gei-0/1/1/3 portstate: forward
preforward: 20(s)
switch-times: 1
13-7
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
13-8
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 14
LinkGroup Configuration
Table of Contents
LinkGroup Overview.................................................................................................14-1
Configuring LinkGroup .............................................................................................14-1
LinkGroup Maintenance ...........................................................................................14-2
LinkGroup Configuration Example ............................................................................14-3
14-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
Parameter Description
uplink <port> Configures the uplink interface. port refers to a physical interface
or a SmartGroup interface.
The command for clearing configuration in step 4 is the same as the above commands in
terms of description.
Command Function
Parameter Description
14-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 14 LinkGroup Configuration c u -tr a c k
Configuration Thought
1. Enter the LinkGroup config mode.
2. Configure the uplink interface and downlink interface of a LinkGroup.
Configuration Commands
ZXR10(config)#linkage
ZXR10(config-linkage)#group 1 downlink gei-0/1/1/3
ZXR10(config-linkage)#group 1 downlink gei-0/1/1/4
ZXR10(config-linkage)#group 1 uplink gei-0/1/1/1
ZXR10(config-linkage)#group 1 uplink gei-0/1/1/2
Configuration Verification
ZXR10(config)#show linkage-group 1
Group 1
Uplink Interfaces:
Interface: gei-0/1/1/1 Status: up
Interface: gei-0/1/1/2 Status: up
Downlink Interfaces:
Interface: gei-0/1/1/3 Status: up
Interface: gei-0/1/1/4 Status: up
It indicates that the uplink interface and downlink interface are configured successfully.
14-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
14-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 15
L2PT Configuration
Table of Contents
L2PT Overview.........................................................................................................15-1
Configuring L2PT .....................................................................................................15-2
Maintaining L2PT .....................................................................................................15-3
L2PT Configuration Example....................................................................................15-4
L2PT Principle
As shown in Figure 15-1, the destination MAC address of the BPDU packets sent from
fei-0/1/0/1 on customer switch A is substituted by the MAC address configured by the users
on edge switch B. After that, the packets are broadcast in the VLAN of the receiving port.
The packets pass across the service provider network, and arrive at edge switch C. On
edge switch C, the original destination MAC addresses of the BPDU packets are restored,
and then the packets are sent to fei-0/1/0/4 of customer switch D from fei-0/1/0/3. It looks
like that customer switch A and customer switch D are connected directly. In this way,
BPDU packets of layer-2 management protocols are transmitted transparently on layer-2
switching networks.
15-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Parameter Description
15-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 15 L2PT Configuration c u -tr a c k
Parameter Description
Parameter Description
Command Function
The following is sample output from the show l2pt information command:
ZXR10(config-l2pt)#show l2pt information
All substituted ports: 1
Default protect pps: 100
Protocol Default destination MAC Substituted destination
stp 0180.c200.0000 0123.4567.8989
lldp 0180.c200.000e 0123.4567.8979
Field Description
All substituted ports Number of ports where the destination MAC address
substitution function is enabled.
Protocol Type of the protocol for which the destination MAC address
substitution function is enabled.
The following is sample output from the show l2pt information <interface-name> command:
ZXR10(config-l2pt-if)#show l2pt information gei-0/1/1/1
Interface: gei-0/1/1/1
Destination MAC rewrite: Enable
Protect packages per second: 50
Substituted protocol: stp
15-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Field Description
Destination MAC rewrite Whether the destination MAC address substitution function
is enabled on the interface.
Protect packages per second Rate threshold of protocol packets on the interface.
Substituted Type of the protocol for which the destination MAC address
substitution function is enabled on the interface.
Configuration Flow
1. Enable STP on switch A and switch D.
2. Enable the destination MAC address substitution for STP BPDU packets on switch B
and switch C. Enable the substitution on the interfaces.
Configuration Commands
Configuration for Switch A:
Switch A(config)#spantree
Switch A(config-stp)#enable
Switch A(config-stp)#mode mstp
Switch A(config-stp)#mst priority 32768 instance 0
Switch A(config-stp-if-gei-0/1/1/1)#enable
15-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 15 L2PT Configuration c u -tr a c k
Switch D(config-stp)#enable
Switch D(config-stp)#mode mstp
Switch D(config-stp)#mst priority 40960 instance 0
Switch D(config-stp-if-gei-0/1/1/4)#enable
Configuration Verification
Verify the result of configuration for switch A through the show spantree instance 0 command
as follows:
DUT1(config-if)#show spantree instance 0
MST00
Spantree enabled protocol MSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
--------------------------------------------------------------------------
gei-0/1/1/1 128.1 200000 Forward Designated p2p MSTP
Verify the result of configuration for switch D through the show spantree instance 0 command
as follows:
DUT2(config)#show spantree instance 0
MST00
Spantree enabled protocol MSTP
Root ID: Priority 32768; Address 0000.0100.0006
Hello-Time 2 sec; Max-Age 6 sec
Forward-Delay 5 sec;
15-5
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Interface Prio.Nbr
Name Port ID Cost State Role Type Bound
--------------------------------------------------------------------------
gei-0/1/1/4 128.1 200000 Forward Root p2p MSTP
15-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Chapter 16
GVRP Configuration
Table of Contents
GVRP Overview .......................................................................................................16-1
Configuring GVRP....................................................................................................16-2
Maintaining GVRP....................................................................................................16-2
GVRP Configuration Example ..................................................................................16-3
GVRP Overview
GARP VLAN Registration Protocol (GVRP) is an application protocol defined by GARP. It
dynamically maintains VLAN information on switches based on the protocol mechanism
of GARP. Each switch supporting the GVRP function can receive VLAN registration
information from other switches and dynamically update the local VLAN registration
information, including the VLANs on the switch and the ports in each VLAN. Each
switch supporting the GVRP function can send the local VLAN registration information
to other switches, so that all devices supporting the GVRP function in the same
switching network reach an agreement on intercommunity in VLAN configuration as
needed. VLAN registration information transmitted through GVRP includes static VLAN
information manually configured on the local device and dynamic VLAN information
from other switches. With the GVRP function, VLAN information on different switches
can be dynamically maintained and updated through the protocol. Users only need to
configure VLAN information on a few switches, and the configuration can be applied
on the entire network. Users do not need to spend a lot of time in topology analysis
and configuration management. The protocol dynamically transmits VLAN information
and adds configuration to the corresponding ports based on VLAN configuration on the
network.
GVRP provides the following port registration types, normal, fixed, and forbidden.
16-1
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
1. Normal: A port whose registration type is normal can process received GVRP
messages. On this port, VLANs can be created and registered, and VLAN registration
can be canceled.
2. Fixed: A port whose registration type of a port is fixed ignores all GVRP messages, but
the port remains registration state. VLANs can be created and registered manually.
VLAN registration is disallowed on the port, and VLANs known on this port cannot be
registered on other ports.
3. Forbidden: A port whose registration type of a port is forbidden ignores all GVRP
messages. The registration state of the port is EMPTY. On this port, registration of all
VLANs is canceled, and VLANs are disallowed to be created or registered.
Command Function
The following is sample output from the show gvrp statistics interface <interface-name>
command:
16-2
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k Chapter 16 GVRP Configuration c u -tr a c k
The following is sample output from the clear gvrp statistics all command:
ZXR10#clear gvrp statistics all
ZXR10#show gvrp statistics interface gei-0/1/1/1
GVRP is enabled.
InterfaceName Status RegMode LastPduOrigin VLAN FailedReg
---------------------------------------------------------------------------
gei-0/1/1/1 Enabled Normal 0000.0000.0000 0
16-3
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
Switch_B(config-garp)#gvrp enable
/*Enable the GVRP function on an interface*/
Switch_B(config-garp)#interface gei-0/1/1/2
Switch_B(config-garp-if-gei-0/1/1/2)#gvrp enable
Switch_B(config-garp)#interface gei-0/1/1/3
Switch_B(config-garp-if-gei-0/1/1/3)#gvrp enable
/*Configure the registration mode of the interface*/
Switch_B(config-garp)interface gei-0/1/1/2
Switch_B((config-garp-if-gei-0/1/1/2)#garp registration fixed
/*Configure the VLAN attribute on the interface*/
Switch_B(config)#switchvlan-configuration
Switch_B(config-swvlan)#interface gei-0/1/1/2
Switch_B(config-swvlan-if-gei-0/1/1/2)#switchport mode trunk
Switch_B(config-swvlan-if-gei-0/1/1/2)#switchport trunk vlan 200
Switch_B(config)#switchvlan-configuration
Switch_B(config-swvlan)#interface gei-0/1/1/3
Switch_B(config-swvlan-if-gei-0/1/1/3)#switchport mode trunk
Switch_B(config-swvlan-if-gei-0/1/1/3)#switchport trunk vlan 300
16-4
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Figures
Figure 1-1 Topology of ARP Proxy Application ........................................................ 1-12
Figure 1-2 Topology of ARP Proxy Application ........................................................ 1-16
Figure 2-1 Network Topology with VLAN ................................................................. 2-11
Figure 2-2 VLAN Translation Configuration Example .............................................. 2-12
Figure 3-1 VLAN Configuration on Device without SuperVLAN ................................. 3-1
Figure 3-2 Configuration on Device with SuperVLAN ............................................... 3-2
Figure 3-3 SuperVLAN Configuration Example ......................................................... 3-7
Figure 4-1 Voice VLAN Networking Topology (Manual Mode) ................................... 4-4
Figure 4-2 Voice VLAN Networking Topology (Automatic Mode) ............................... 4-5
Figure 5-1 Network Topology with PVLAN................................................................. 5-3
Figure 6-1 QinQ Configuration Example.................................................................... 6-2
Figure 7-1 Packet Cycling and Multiplication ............................................................. 7-2
Figure 7-2 STP Network Topology ............................................................................ 7-3
Figure 7-3 Configuring Multiple STP ....................................................................... 7-13
Figure 7-4 Configuring Fast STP............................................................................. 7-14
Figure 7-5 STP Network Topology (Example 3)....................................................... 7-16
Figure 8-1 LLDP System Structure ........................................................................... 8-2
Figure 8-2 LLDP Neighbor Configuration Example.................................................... 8-9
Figure 8-3 LLDP Attribute Configuration Example ................................................... 8-10
Figure 8-4 LLDP Neighbor Configuration Example.................................................. 8-11
Figure 8-5 LLDP Attribute Configuration Example ................................................... 8-12
Figure 9-1 SmartGroup Link Aggregation.................................................................. 9-2
Figure 9-2 802.3ad Mode Configuration .................................................................... 9-9
Figure 9-3 ON Mode Configuration ......................................................................... 9-12
Figure 9-4 802.3ad Mode Configuration .................................................................. 9-14
Figure 9-5 ON Mode Configuration ......................................................................... 9-17
Figure 10-1 Service Type 1 (in1-out2) ..................................................................... 10-2
Figure 10-2 Service Type 2 (in1-out2 pri designated) .............................................. 10-3
Figure 10-3 Service Type 3 (in1-out2 pri mapping).................................................. 10-4
Figure 10-4 Service Type 4 (in1-out1) ..................................................................... 10-5
Figure 10-5 Service Type 6 (untag-out1, supported only by SVLAN in IFP
mode) ................................................................................................... 10-6
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Glossary
ACL
- Access Control List
ARP
- Address Resolution Protocol
BPDU
- Bridge Protocol Data Unit
GARP
- Generic Attribute Registration Protocol
GVRP
- GARP VLAN Registration Protocol
IP
- Internet Protocol
L2PT
- Layer 2 Protocol Tunnel
LACP
- Link Aggregation Control Protocol
LACPDU
- Link Aggregation Control Protocol Data Unit
LLDP
- Link Layer Discovery Protocol
LLDPDU
- Link Layer Discovery Protocol Data Unit
MAC
- Media Access Control
MAN
- Metropolitan Area Network
MEN
- Metro Ethernet Network
MPLS
- Multiprotocol Label Switching
MSTP
- Multiple Spanning Tree Protocol
OUI
- Organizationally Unique Identifier
III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k ZXR10 5900E Series Configuration Guide (Link Layer) c u -tr a c k
PVLAN
- Private Virtual Local Area Network
QoS
- Quality of Service
STP
- Spanning Tree Protocol
SVLAN
- Selective Virtual Local Area Network
TCP/IP
- Transmission Control Protocol/Internet Protocol
TLV
- Type/Length/Value
VLAN
- Virtual Local Area Network
VPLS
- Virtual Private LAN Service
VPN
- Virtual Private Network
ZESR
- ZTE Ethernet Switch Ring
ZESS
- ZTE Ethernet Smart Switch
IV
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Version: 3.00.11
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: [email protected]
h a n g e Vi h a n g e Vi
XC e XC e
F- w F- w
PD
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
LEGAL INFORMATION
Copyright © 2015 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
Contents
About This Manual ......................................................................................... I
Chapter 1 Interface Introduction ............................................................... 1-1
1.1 Interface Types .................................................................................................. 1-1
1.2 Interface Naming Rule ........................................................................................ 1-1
1.3 Viewing Interface Information .............................................................................. 1-2
1.4 Viewing Interface Description .............................................................................. 1-4
Figures............................................................................................................. I
Glossary ........................................................................................................ III
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to
to
k
k
lic
lic
C
C
w
w
m
m
w w
w
w
o
o
.d o .c .d o .c
c u -tr a c k c u -tr a c k
II
PD
er
er
!
!
W
W
O
O
N
N
y
y
bu
bu
to