204-4142-00 - DmSwitch EDD SII - Configuration Guide
204-4142-00 - DmSwitch EDD SII - Configuration Guide
204-4142-00 - DmSwitch EDD SII - Configuration Guide
Revision History
Revision 1.0 2012/06/15
204.4087.02
Contact Information
• Support:
• E-mail: [email protected]
• Phone: +55 51 3358-0122
• Fax: +55 51 3358-0101
• Sales:
• E-mail: [email protected]
• Phone: +55 51 3358-0100
• Fax: +55 51 3358-0101
• Internet:
• www.datacom.ind.br
• Address:
• DATACOM - Telemática
• Av. França, 735 - Porto Alegre, RS - Brasil
• CEP: 90230-220
Table of Contents
1. Introduction..........................................................................................................................................??
Switch Features and software Description.......................................................................................??
DmView presentation for Metro Ethernet Network Management ...................................................??
System Defaults ...............................................................................................................................??
2. General System Configuration ...........................................................................................................??
3. Managing Firmware and Configuration ...........................................................................................??
Firmware ..........................................................................................................................................??
Configuration ...................................................................................................................................??
Uploading Configuration Settings....................................................................................................??
Copying and Restoring Configuration Settings................................................................................??
4. DmView.................................................................................................................................................??
Installation........................................................................................................................................??
First Steps.........................................................................................................................................??
Navigation ........................................................................................................................................??
5. Equipment Settings..............................................................................................................................??
General configuration.......................................................................................................................??
Management configuration ..............................................................................................................??
Port operation (Configuration) .........................................................................................................??
Port Operation (Visualization) .........................................................................................................??
Backup Link .....................................................................................................................................??
CFM .................................................................................................................................................??
PWE3 TDM .....................................................................................................................................??
VLANs .............................................................................................................................................??
6. Device ....................................................................................................................................................??
General .............................................................................................................................................??
Ports .................................................................................................................................................??
Transceivers......................................................................................................................................??
Temperature / Fans ...........................................................................................................................??
Backup-Link.....................................................................................................................................??
Remote Devices ...............................................................................................................................??
CFM .................................................................................................................................................??
7. Fault Information.................................................................................................................................??
Managers information ......................................................................................................................??
MAC Address information...............................................................................................................??
Counters Information .......................................................................................................................??
8. Port Configuration...............................................................................................................................??
Displaying Port Information ............................................................................................................??
Configuring Interface Connections ..................................................................................................??
Port Broadcast Control.....................................................................................................................??
Configuring Port Monitoring ...........................................................................................................??
Configuring Rate Limits...................................................................................................................??
Displaying Port Statistics .................................................................................................................??
Address Table Settings .....................................................................................................................??
iii
9. SNTP .....................................................................................................................................................??
10. System Logs........................................................................................................................................??
11. Managing Security.............................................................................................................................??
Local User Management ..................................................................................................................??
Authentication Settings ....................................................................................................................??
HTTP and HTTPS Configuration ....................................................................................................??
Configuring the Secure Shell - SSH.................................................................................................??
Restricting Management Access ......................................................................................................??
12. SNMP ..................................................................................................................................................??
Configuring SNMP Community Access Strings..............................................................................??
Setting SNMP Traps.........................................................................................................................??
13. Link Aggregation ...............................................................................................................................??
Static Port-Channel Configuration ...................................................................................................??
LACP................................................................................................................................................??
14. VLAN ..................................................................................................................................................??
IEEE 802.1Q VLANs ......................................................................................................................??
Displaying VLAN Information ........................................................................................................??
VLAN Creation................................................................................................................................??
Adding VLAN Static Member Ports................................................................................................??
VLAN Interface Configuration ........................................................................................................??
15. Spanning Tree ....................................................................................................................................??
How STP Works...............................................................................................................................??
Differences Between RSTP and STP ...............................................................................................??
Displaying STA Information............................................................................................................??
Configuring STA ..............................................................................................................................??
16. Ethernet Automatic Protection Switching Configuration..............................................................??
Enabling EAPS Globally .................................................................................................................??
Disabling EAPS Globally ................................................................................................................??
Creating an EAPS Domain ..............................................................................................................??
Deleting an EAPS Domain ..............................................................................................................??
Enabling EAPS for Domain .............................................................................................................??
Disabling EAPS for Domain............................................................................................................??
Adding a Control VLAN..................................................................................................................??
Deleting a Control VLAN................................................................................................................??
Adding a Protected VLAN...............................................................................................................??
Deleting a Protected VLAN .............................................................................................................??
Configuring Failtime ........................................................................................................................??
Configuring Hellotime .....................................................................................................................??
Configuring EAPS Mode .................................................................................................................??
Configuring EAPS Port ....................................................................................................................??
Removing EAPS Port Configuration ...............................................................................................??
Configuring EAPS Name .................................................................................................................??
Displaying EAPS Summary.............................................................................................................??
Displaying EAPS Information .........................................................................................................??
iv
17. Class of Service Configuration .........................................................................................................??
Setting the Default Priority for Interfaces ........................................................................................??
Mapping CoS Values to Egress Queues ...........................................................................................??
Selecting the Queue Mode ...............................................................................................................??
Setting the Maximum Bandwidth for CoS Queues..........................................................................??
Loading Auto-QoS Configuration....................................................................................................??
18. Packet Filters......................................................................................................................................??
Displaying Filter Information ..........................................................................................................??
Creating and Editing Filters .............................................................................................................??
19. IGMP ..................................................................................................................................................??
Configuring IGMP ...........................................................................................................................??
20. Static Routing.....................................................................................................................................??
Router Interfaces ..............................................................................................................................??
Static Routes ....................................................................................................................................??
Hardware Tables...............................................................................................................................??
v
List of Tables
1-1. System Defaults..................................................................................................................................??
2-1. RJ45 Console Pin Out ........................................................................................................................??
2-2. Editing Commands .............................................................................................................................??
5-1. Level code description table ...............................................................................................................??
17-1. Mapping CoS Priority Values to Egress Queues ..............................................................................??
17-2. Priority Level Descriptions...............................................................................................................??
17-3. Traffic Types, Packet Labels and Egress Queues .............................................................................??
18-1. Mapping IP Precedence....................................................................................................................??
vi
Chapter 1. Introduction
1
DmView presentation for Metro Ethernet Network
Management
DmView is the Network Management Integrated System developed to supervise and configure DmSwitch
equipments, providing functions for managing and supervising, faults, configuration, performance, inven-
tory and security. DmView has functionalities to manage several types of networks (such as PDH, SDH,
Metro Ethernet). Centralized management is achieved through DmSwitch DmView Network Management
System, which offers a graphical user interface to monitoring the state and condition of the unit, network’s
conditions as well as configuration and inventory management functions.
This manual presents functionalities of the DmSwitch - EDD integrated with DmSwitch Management
System (DmView) and its configuration through it as well as via CLI’s equipment for Metro-Ethernet
networks.
1
System Defaults
Next table shows the DmSwitch System’s Defaults.
Password =
"admin"
Normal Exec Level Username = "guest"
Password = "guest"
RADIUS Disabled
Authentication
TACACS Disabled
Authentication
802.1x Port Disabled
Authentication
Management IP Address 192.168.0.25/24
CLI Management Telnet Enabled
SSH Disabled
Web Management HTTP Server Enabled
Traps Disabled
Server Enabled
1
Chapter 1. System Defaults
2
Chapter 2. General System Configuration
To gain access to DmSwitch2104 via Console or DmView, an IP must be previously configured.
• Via Console
Pin Console Comunication: The physical interface CONSOLE accepts an RJ45 connector respecting
RS232 pattern; its pin out is showed below.
RJ45 Signal
1 Tx+
2 Tx-
3 Rx+
6 Rx-
4,5,7,8 Not connected
• Logging on CLI
You can loggin on CLI through a direct connection using a serial cable with the default parameters
shown on introduction chapter. If you want use a telnet connection, you need to configure an IP address
on your machine in the same subnet used by default on the switch.
• EXEC MODE - Lets you display configurations and do some general changes such as clock, files and
make debuging.
• CONFIG MODE - Lets you make configuration changes to the device for individual ports, VLANs,
routing and other configuration areas.
• Scroll Control
By default, the CLI uses a paginate mode to display text lines who exceed the limit your terminal
window can show and , if this is your case, you need to press <space> to show the next page or press
<enter> to show the next line . In some cases, this feature can be unnecessary and you can disable with
the next example in the CONFIG MODE.
DmSwitch2104#configure
DmSwitch2104(config)#no terminal paging
DmSwitch2104(config)#exit
DmSwitch2104#
3
Chapter 2. General System Configuration
• Word Help: When a "?" is placed in the middle of the word (show run?) in order to complete a
term.
• Syntax Command Help: When a "?" is placed after a space (configure ?) in order to complete
the syntax.
• Using the CLI, in any place you can enter <tab> or <?> to get help to comands available or complete
the current command as below.
DmSwitch2104#
DmSwitch2104#configure
DmSwitch2104(config)#interface vlan <?>
all All VLANS
range Range of VLANS
1-4094 VLAN ID
DmSwitch2104(config)#interface vlan 10
DmSwitch2104(config-if-vlan-10)#<?>
exit Exit from interface configuration mode
help Description of the interactive help system
interface Interface Configuration
ip IP Configuration
mac-address-table L2 address table configuration
name Set VLAN name
no Reverse a setting
set-member Set VLAN members
show Show running system information
shutdown Deactivate VLAN
vrrp VRRP Interface configuration commands
DmSwitch2104(config-if-vlan-10)#sh<Tab>
show shutdown
DmSwitch2104(config-if-vlan-10)#sh<?>
show Show running system information
shutdown Deactivate VLAN
DmSwitch2104(config-if-vlan-10)#end
DmSwitch2104#
If you enter enough characters of a command to avoid ambiguity, the switch understand what your
are triyng to do and accepts them. If you enter <tab> from an unique and partial name, the CLI
completes the command for you as the next example.
DmSwitch2104#show run<tab>
DmSwitch2104#show running-config
4
Chapter 2. General System Configuration
Command Attributes
• Hostname - Sets the switch’s administrative name.
• Location - Sets the switch’s location name, used for SNMP purposes.
• Contact - Sets the switch’s contact name, used for SNMP purposes.
• System Up Time - The time elapsed from the last reboot.
• IP Address Mode - Choose whether the switch will use a static or dynamic IP address for manage-
ment access through VLAN 1.
• Gateway IP Address - Configure a gateway IP address if you want to access this switch from
different networks.
• MAC Address - The MAC address from the CPU.
• Reset- Choose this option to perform a warm reboot.
Note: Although the switch can be configured to be accessed by any other set of VLANs, the only one
that can use DHCP is the default VLAN 1.
New users can be registered to gain access to the CLI and access-levels can be set to prevent non-
authorized people from accessing the equipment.
There are two access-levels to configure, being 0 the Normal Exec and 15 the Privileged Exec. Moreover
the password can be encrypted or in plain text. To register a new user to access the command line, follow
the steps below.
The following example configures the user netmgmt, password mgmtaccess in plain text and privileged
access mode.
5
Chapter 2. General System Configuration
Via CLI
DmSwitch2104#configure
DmSwitch2104(config)#username netmgmt password 0 mgmtaccess
DmSwitch2104(config)#username netmgmt access-level 15
DmSwitch2104#
In order to check the users previously configured, use the command show users. Checking logged users
can be done by using the command show managers. Inserting no as a prefix and followed by the user
will remove the user.
• Via telnet
The DmSwitch2104 management can also be executed via telnet through any one of its network inter-
faces. The equipment should be accessible on IP level before accessing it via telnet. The management
via telnet is identical to the one executed by DmSwitchs serial port.
An out-of-band management port (MGMT ETH) can be configured to give customer access. MGMT
ETH default IP is 192.168.0.25/24; MGMT IP can be changed using the following commands.
To check the configuration above, use the command show ip. Inserting no as a prefix for this command
will remove mgmt-eth IP.
It is possible to configure an IP to any VLAN and grant in-band access via TELNET protocol. The
following figure shows VLAN 1 IP configuration.
6
Chapter 2. General System Configuration
ICMP packets (ping) can be sent to check connectivity, as well as a traceroute command can be executed
to verify the path of the link.
Ping:
DmSwitch2104#ping 172.16.10.206
PING 172.16.10.206 (172.16.10.206): 56 data bytes
64 bytes from 172.16.10.206: icmp_seq=0 ttl=128 time=1.1 ms
64 bytes from 172.16.10.206: icmp_seq=1 ttl=128 time=0.7 ms
64 bytes from 172.16.10.206: icmp_seq=2 ttl=128 time=0.7 ms
64 bytes from 172.16.10.206: icmp_seq=3 ttl=128 time=0.7 ms
Traceroute:
DmSwitch2104#traceroute 172.16.10.206
traceroute to 172.16.10.206 (172.16.10.206), 30 hops max, 40 byte
packets
1 172.16.10.206 1.31918e-315 ms * 6.36599e-314 ms
The next example shows how to configure an IP address to the default VLAN. Also, is showed how add
a default-gateway and a primary/secondary dns servers.
You can see these configurations directly on the configuration file entering show running-config.
The next example shows how to add a dynamic ip address to the default VLAN. After is showed
renewing and releasing with the DHCP server.
Using DHCP configuration, you can’t see the addresses in use in the running configuration. So, you can
enter the commands below.
DmSwitch2104#show vlan id 1
VLAN: 1 [DefaultVlan]
7
Chapter 2. General System Configuration
Type: Static
Status: Active
IP Address: 192.168.10.1/24
Aging-time: 300 sec.
Learn-copy: Disabled
MAC maximum: Disabled
Proxy ARP: Disabled
Members: All Ethernet ports (static, untagged)
Forbidden: (none)
DmSwitch2104#show ip default-gateway
Default gateway: 192.168.10.254
DmSwitch2104#show ip dns-servers
DNS servers: 192.168.10.250
DmSwitch2104#
The next example shows how to perform a warm reboot via CLI.
8
Chapter 3. Managing Firmware and
Configuration
This chapter will help you dealing with firmware and storing/transfering configuration.
Firmware
You can upload firmware from a TFTP server. You can also set the switch to use new firmware without
overwriting the previous version.
Command Attributes
• TFTP Server IP Address - The IP address of a TFTP server.
• File Name - The file name should not contain slashes (\ or /), the leading letter of the file name
should not be a period (.), and the maximum length for file names on the TFTP server is 127 characters
or 31 characters for file on the switch. (Valid characters: A-Z, a-z, 0-9, ".", "-", "_")
• Source/Destination Unit - Specifies the switch stack unit number.
• Destination/Startup File Name - Allows specification of filenames already in memory, or
the creation of a new filename. (Valid characters: A-Z, a-z, 0-9, ".", "-", "_")
• Source File Name - Allows you to specify the name of the chosen source file.
The next example shows how to upload firmware via CLI. Updating Equipment’s firmware:
Example 3-1. Uploading System Software from a TFTP Server via CLI.
DmSwitch2104#copy tftp 172.16.31.50 EDDfw1.im firmware
# After firmware update the system will be restarted. Continue? <y/N> y
# Fetching image...
DmSwitch2104#
9
Chapter 3. Uploading System Software from a TFTP Server
IP configuration above shows an untagged out going traffic, so it is not necessary to configure VLAN on
the terminal ethernet interface (computer). For a tagged out going traffic the command is set-member
tagged ethernet 1.
Terminal module is sensible for capital letters. The commands should be typed according to the form
showed in this manual.
10
Configuration
Copy config to TFTP
Besides copying firmware and bootloader to the equipment, it is possible to send pre-defined configura-
tions to TFTP server being them:
• Running-config:
Via CLI
# DmSwitch2104#copy running-config tftp 172.16.31.50 EDD_config1.im
# DmSwitch2104#
• Startup-config:
Via CLI
# DmSwitch2104#copy startup-config tftp 172.16.31.50 EDD_config2.im
# DmSwitch2104#
In order to initialize the equipment using a configuration from TFTP server use the command copy tftp
172.16.31.50 EDD_config2.im .
DmSwitch - EDD’s flash has 2 indexes to place different configurations. The configurations that can be
stored in flash are the following:
• Running-config:
The following example will store running-config named runconfig into the first flash index:
Via CLI
# DmSwitch2104#copy running-config flash-config 1 runconfig
# Saving configuration in flash 1...
# Done.
# DmSwitch2104#
• Startup-config:
The following example will store startup-config named startconf into the first flash index, overwriting
the stored file above:
Via CLI
11
Chapter 3. Configuration
Being the startup-config already stored in one of the indexes, the command above copied the flash index
2 to flash index 1. Checking flash-config can be done by using the command show flash-config <flash
index number> if config is available.
It is possible to write the startup-config into the running-config and vice versa. Use the command copy
<startup-config/running-config> <running-config/startup-config>.
By the time DmSwitch - EDD has its two indexes filled up with a configuration, it is possible to start
the equipment with one of them; use the command select startup-config <flash index number> to select
between them.
To erase a flash index use the command erase flash-config <index number>.
Before overwriting files, a comparison can be made between the chosen configurations using the
# DmSwitch2104#diff
# default-config Default configuration
# flash-config Flash configuration
# running-config Current system configuration
# startup-config Startup configuration
#
# DmSwitch2104#diff startup-config
# default-config Default configuration
# flash-config Flash configuration
# running-config Current system configuration
# startup-config Startup configuration
#
# DmSwitch2104#diff startup-config running-config
12
Uploading Configuration Settings
There are 2 memory positions in the switch where configurations can be stored.
• Uploading a configuration
The following example shows how to upload a configuration file into flash position 1 via CLI.
The next example show how to upload a configuration to switch via CLI and set it as the startup
configuration.
Via web, it is possible to upload a configuration to the Running position of the switch and it will be
applied immediately but not saved.
The next example shows how to upload a configuration via CLI and apply it without storing in flash.
Example 3-5. Via CLI, downloading a configuration and applying it without storing in flash.
DmSwitch2104#copy tftp 192.168.0.1 my_new_config.bin running-config
DmSwitch2104#
13
Copying and Restoring Configuration Settings
• Downloading configuration
Via web, to download a configuration from the switch is as easy as clicking on the corresponding link
and selecting the place to save on your computer.
The next example shows how to dowload a configuration from the switch to a TFTP server by using the
CLI.
Via web, this operation is performed by clicking on the Running link and selecting the place where
to save.
The following example shows how to download a current configuration from the switch to a TFTP
server by using the CLI.
The next example shows how to copy a configuration from one position in flash to another via CLI.
14
Chapter 3. Copying and Restoring Configuration Settings
Note: Via web, this can be done by selecting a startup configuration and rebooting the equipment.
15
Chapter 4. DmView
Installation
Execute the initialization program to install the software. Click next, accept the License Term and choose
a directory where the software will be installed. After that, a screen will appear as showed on Figure 4-1,
asking which DmView component will be installed.
config/img/DmSwitchEDD-17_3.jpg
16
First Steps
The first step, after installation, is to add the network element on the application, allowing its management.
The element should be accessible via IP network to the management equipment, enabling to manage it
via DmView.
The DmView can be started through menu: Start - Program - DmView - DmView x.x* - DmView Login.
*x.x. indicates DmView version installed in the machine.
By selecting this item, DmView Poller and DmView Event Receiver will be automatically launched. The
firstone is responsible for the polling execution on the elements and the second one for the traps reception,
which were sent by the equipment. As soon as these two processes are initialized on the background, a
screen will appear as showed below.
config/img/DmSwitchEDD-18_2.jpg
As standard, the username is "administrator" and the application password is "administrator" too. For
login, just type them and click in Login. If there isn’t any typing error, a screen Network Browser will
appear (Figure 4-3). In such case, the elements will be registered and/or accessed.
config/img/DmSwitchEDD-18_3.jpg
Initially the sites map opens empty in the root site. New sites and equipment can be added through the
Edit menu item: Add Location. Clicking with the mouse right button this option is also visualized. Specify
the name of the site that is being created and then click on the OK button.
17
Chapter 4. First Steps
At the site where one wants to add the equipment (Figure 4-3), click on Edit menu: Add Devices, or click
with the mouse right button on the map, where this option will be also available.
config/img/DmSwitchEDD-19_2.jpg
With the Add Device window opened (Figure 4-4), the user should insert equipment IP in the Hostname
field and later click on Contact. If the element is with connectivity, the description will appear in the
Devices Found section, otherwise a message will be prompted that it was not possible to contact device.
18
Navigation
Equipment’s bayface
Accessing the bayface of the equipment can be done by right-clicking on the equipment on equipment
site’s map and choosing the option Navigate to... of the suspended menu or by a double clicking on the
chosen device.
• EDD’s bayface is showed below
config/img/DmSwitchEDD-20_3.jpg
config/img/DmSwitchEDD-20_4.jpg
19
Chapter 5. Equipment Settings
To configure the equipment, click on Configuration - Device config. The DmSwitch - EDD settings will
open (Figure 5-1).
General configuration
The General tab on the Device config window on DmView shows the following settings:
config/img/DmSwitchEDD-21_3.jpg
• Hostname
config/img/DmSwitchEDD-21_4.jpg
Via CLI
DmSwitch2104(config)#hostname EDD-Switch
EDD-Switch(config)#
• Clock Timezone
20
Chapter 5. General configuration
config/img/DmSwitchEDD-22_2.jpg
Via CLI
Setting clock, date and time zone can be done by the following commands:
DmSwitch2104#clock timezone BRA -3 0
• Authentication
First Method: Defines a first method for user authenticating in equipment (local/radius).
Second Method: In case of first method fails the switch tries a new method for authentication.
config/img/DmSwitchEDD-22_3.jpg
Via CLI
Setting clock, date and time zone can be done by the following commands:
DmSwitch2104(config)#authentication login
# local radius tacacs
21
Chapter 5. General configuration
• Logging
The embedded syslog agent allows the registering of system events. You can check the event logs in
order to debug or control user access. Depending on the type of event it can be saved to the system
RAM, flash, sent to a remote log server or to an e-mail address. There are few commands to configure
embedded syslog agent and they are listed below:
• Logging on;
• Logging facility;
• Logging history;
• Logging host;
• Logging sendmail;
• Logging trap;
The following table shows the possible codes to be used for the logging events.
22
Chapter 5. General configuration
config/img/DmSwitchEDD-25_2.jpg
• Logging on
The following command enables the logging of events. This example shows how to enable event log-
ging.
DmSwitch2104#logging on
Logging configuration can be checked by entering the command show logging. Inserting no as a prefix
for this command will disable the logging of events.
23
Chapter 5. General configuration
• Logging history
Log-level: Defines the range of log levels that will be saved into the specified memory (from 0 to
7).
This example shows how to configure a range from 0 to 3 of log levels to be saved in flash memory.
# DmSwitch2104(config)#logging history
# flash Events stored in flash
# ram Events stored in RAM
# DmSwitch2104(config)#logging history flash
# 0-7 Log level
# DmSwitch2104(config)#logging history flash 3
# DmSwitch2104(config)#
To verify the logs from flash or RAM use the command show log <flash/ram>. In order to delete
logs from flash or RAM use the command clear logging <flash/ram>. Inserting no as a prefix for this
command will disable logging in the specified memory.
• Logging trap
Log-level: Defines the log range that will be sent by trap (from 0 to 7).
This example shows how to configure the range of log levels that will be sent by traps:
# DmSwitch2104(config)#logging trap
# 0-7 Events to be sent to remote server
#
# DmSwitch2104(config)#logging trap 3
# DmSwitch2104(config)#
The configuration above can be showed by entering the command show logging. Inserting no as a prefix
for this command will disable the sending of logs to a remote server.
• Logging host
24
Chapter 5. General configuration
This example shows how to specify the IP address of the remote syslog server.
# DmSwitch2104(config)# logging host
# <ipaddress> Destination host
#
# DmSwitch2104(config)#logging host 192.168.0.230
# DmSwitch2104(config)#
The configuration above can be showed by entering the command show logging. Inserting no as a prefix
for this command will remove the configuration of a remote syslog server.
• Logging facility
The command below sets the facility type for remote logging. This example shows how to set the
facility type 18 for remote logging.
The configuration above can be showed by entering the command show logging. Inserting no as a prefix
for this command will disable the facility type for remote logging.
• Send Mail
• Send Mail: Enable/Disable sending of log via e-mail.
• Server: Sets a SMTP server.
• Source: Sets a source e-mail address.
• Destination: Define a destination e-mail address.
• Level: Sets level for sent logs.
config/img/DmSwitchEDD-27_2.jpg
25
Chapter 5. General configuration
• Logging sendmail
• Host ip-address: Specifies the IP address of the SMTP Server (Optional).
• Level log-level: Defines the range of log levels that will be sent by email (Optional/from
0-7).
• Source-email email address: Specifies the email address to use for the "from" field
(Optional).
• Destination-email email-address: Specifies the recipient email address of
messages(Optional).
This example shows how to configure an e-mail to use for the "from" field.
# DmSwitch2104(config)#logging sendmail
# destination-email Recipient of messages
# host SMTP server to use
# level Priority of events to send
# source-email Email address to use for the "from" field
# <enter> Enable SMTP event handling
#
# DmSwitch2104(config)#logging sendmail source-email [email protected]
# DmSwitch2104(config)#
The configuration above can be showed by entering the command show logging. Inserting no as a
prefix for this command will disable the sending of logs via e-mail or delete the specified configura-
tion used for sending e-mails.
• Monitor Destination
config/img/DmSwitchEDD-28_2.jpg
26
Chapter 5. General configuration
Via CLI
# DmSwitch2104#monitor destination 4
# DmSwitch2104(config)#
27
Management configuration
Management tab in Device config window in DmView shows the following settings:
• Default Gateway: A default gateway can be configured for the Metro-Ethernet Network.
• CPU DoS Protect: A rate of packets per second that are sent to the CPU can be configured to
prevent the system from external attacks (flooding prevent).
• CPU Protocols Priorities: A priority can be set for the tunneling of protocols.
config/img/DmSwitchEDD-29_2.jpg
Configuration of the features above can be made using the CLI of the equipment, its commands are showed
below:
• Default-gateway
config/img/DmSwitchEDD-29_3.jpg
Via CLI
# DmSwitch2104#ip default-gateway 172.16.255.254
# DmSwitch2104(config)#
28
Chapter 5. Management configuration
To visualize the default-gateway previously configured, use the command show ip default-gateway.
Inserting no as a prefix for this command will remove the default gateway.
config/img/DmSwitchEDD-30_2.jpg
Via CLI
# DmSwitch2104#cpu-dos-protect rate-limit 1000
# Rate-limit misconfiguration may cause management loss and disrupt the
# operation of some protocols. Are you sure? y/N y and enter
# DmSwitch2104(config)#
To visualize the cpu dos rate previously configured, use the command show cpu-dos-protect. Inserting
no as a prefix for this command will disable the cpu-dos-protect.
config/img/DmSwitchEDD-30_3.jpg
29
Chapter 5. Management configuration
Via CLI
# DmSwitch2104#cpu protocol priority tunnel 5
# DmSwitch2104(config)#
To visualize cpu protocols priorities previously configured, use the command show cpu protocol priority
tunnel.
• DHCP
config/img/DmSwitchEDD-30_4.jpg
Via CLI
It is recommended to not configure neither a low rate, that can cause loss of management nor high rate
that can allow external packet flooding.
# DmSwitch2104#ip address dhcp
# DmSwitch2104(config)#
• VLAN
• QinQ: Enable Double Tagging.
• TPID: Configure Tag Protocol ID.
config/img/DmSwitchEDD-31_2.jpg
30
Chapter 5. Management configuration
Via CLI
# DmSwitch2104(config)#vlan qinq
# DmSwitch2104(config)#
# DmSwitch2104(config)#vlan tpid 0x8100
# DmSwitch2104(config)#
To visualize tagging information previously configured, use the command show cpu-dos-protect.
Inserting no as a prefix for this command will remove tagging configuration.
• Remote Devices
# RDM Global: Enable Remote Devices Management globally.
config/img/DmSwitchEDD-32_3.jpg
Via CLI
It is recommended to not configure neither a low rate, that can cause loss of management nor high rate
that can allow external packet flooding.
# DmSwitch2104#remote-devices enable
# DmSwitch2104(config)#
To visualize remote-devices information previously configured, use the command show remote-devices.
Inserting no as a prefix for this command will disable remote management.
31
Port operation (Configuration)
The Port tab on Device Config window on DmView allows the configuration of each port general setting
as well as provisioning and protection for the Metro-Ethernet network. The screen shows the following
settings:
config/img/DmSwitchEDD-33_2.jpg
Configuration
• Port: Shows which port is being configured.
config/img/DmSwitchEDD-33_3.jpg
General
• Operation: Enable/Disable port status.
• Auto-Negotiation: Enable/Disable auto-negotiation on the interface.
• Jumbo Frames: Enable/Disable jumbo frame processing by the interface.
• Description: A description can be used for the interface.
• Flow-Control: Configure flow-control on forced mode (no auto-negotiation).
• Capabilities: Configure interface capabilities during auto-negotiation.
• Speed: Shows the link speed configuration.
• Duplex Mode: Shows the duplex mode configuration.
• Native VLAN: Shows the VLAN tag that the untagged incoming packets will receive on that port.
• QinQ: Shows the double tagging mode for the packets, either internal or external.
32
Chapter 5. General
• Internal: Configures Double Tagging internal mode. VLAN tag is only inserted if packet doesn’t
have a TPID which matches the configured TPID for that interface.
• External: Configures Double Tagging external mode. VLAN tag is always inserted on received
packets.
config/img/DmSwitchEDD-34_2.jpg
Via CLI
• Auto-negotiation
# DmSwitch2104(config)#interface ethernet 1
# DmSwitch2104(config-if-eth-1/1)#negotiation
# DmSwitch2104(config-if-eth-1/1)#
• Jumbo Frames
# DmSwitch2104(config)#interface ethernet 1
# DmSwitch2104(config-if-eth-1/1)#switchport jumbo-frames
# DmSwitch2104(config-if-eth-1/1)#
• Description
# DmSwitch2104(config)#interface ethernet 1
# DmSwitch2104(config-if-eth-1/1)#description
# <text> Interface description
# DmSwitch2104(config-if-eth-1/1)#description Porto Alegre
# DmSwitch2104(config-if-eth-1/1)#
• Flow control
# DmSwitch2104(config)#interface ethernet 2
# DmSwitch2104(config-if-eth-1/2)#flow-control
# receive Enable flow control reception
# transmit Enable flow control transmission
# <enter> Enable flow control reception and transmission
33
Chapter 5. General
# DmSwitch2104(config-if-eth-1/2)#flow-control receive
# DmSwitch2104(config-if-eth-1/2)#
• Capabilities
# DmSwitch2104(config)#interface ethernet 1
# DmSwitch2104(config-if-eth-1/1)#capabilities flow-control
# receive Advertise support of flow control reception
# transmit Advertise support of flow control transmission
# <enter> Advertise support of flow control reception andtransmission
# DmSwitch2104(config-if-eth-1/1)#capabilities flow-control transmit
# DmSwitch2104(config-if-eth-1/1)#
Speed and Duplex Mode settings are only available if auto-negotiation is off. Inserting no as a prefix
for this command will set speed-duplex to its default configuration (100MHalf).
• Native VLAN
# DmSwitch2104(config)#interface vlan 3
# DmSwitch2104(config-if-vlan-3)#interface ethernet 5
# DmSwitch2104(config-if-eth-1/5)#switchport native vlan 3
# DmSwitch2104(config-if-eth-1/5)#
Inserting no as a prefix for this command will remove native VLAN configuration from the port.
• QinQ
# DmSwitch2104(config)#interface ethernet 5
# DmSwitch2104(config-if-eth-1/5)#switchport qinq
# external Configure Double Tagging external mode
# internal Configure Double Tagging internal mode
# DmSwitch2104(config-if-eth-1/5)#switchport qinq external
# DmSwitch2104(config-if-eth-1/5)#
All the status above can be showed by using the command show interfaces status. In global configu-
ration, QinQ can be set to all ports by using the command vlan QinQ. Inserting no as a prefix for this
command will disable QinQ Vlan.
34
Chapter 5. General
• Vlan tpid
In global configuration, use vlan tpid command to configure Tag Protocol ID for all ethernet interfaces.
The TPID is the first two bytes in the VLAN tag which also corresponds to the Ethertype field on
untagged packets.
# DmSwitch2104(config)#vlan tpid
# 0x0000-0xFFFF Tag Protocol ID
# DmSwitch2104(config)#vlan tpid 0x9100
# DmSwitch2104(config)#
• Mac-Address-Table Static
A static entry can be set to the MAC address table. This will force packets with a specified destination
MAC address and VLAN to be always forwarded to the specified interface. This example shows how
to add a static MAC address on ethernet port 1 and VLAN 1:
# DmSwitch2104(config)#mac-address-table static 00-01-02-03-04-05 ethernet 1 vlan 1
# DmSwitch2104(config)#
To verify the configuration above use the command show mac-address-table. The no command form
removes a static entry from the MAC address table. A command can be use to clear mac-address-table
but only the learned entries; use the command clear mac-address-table.
• Mac-Address-Table Ageing-Time
It is possible to set the length of time before removing unused dynamic entries in the MAC address
table. This example shows how to changes the global ageing time to 1000 seconds.
# DmSwitch2104#mac-address-table ageing-time 1000
# DmSwitch2104(config)#
All the status above can be showed using the command show interfaces switchport. As pattern, all
ports are enabled for VLAN 1 on the switch. To verify the configuration above use the command show
mac-address-table ageing-time. The no command form returns the ageing time to the default value
<300sec>.
35
OAM
EDD enables managed access connections according to IEEE 802.3ah (Ethernet First Mile - Operations,
Administration and Maintenance). In general, OAM provides capacity of monitoring the physical net
integrity and quickly determines a link failure location. OAM configuration can be set by the following
commands:
Configuration:
• Port: Shows which port is being configured (for more details, see Figure 25).
oam
config/img/DmSwitchEDD-37_2.jpg
Via CLI
OAM:
# DmSwitch2104(config)#interface ethernet 3
# DmSwitch2104(config-if-eth-1/3)#oam
# DmSwitch2104(config-if-eth-1/3)#
OAM Mode:
# DmSwitch2104(config)#interface ethernet 3
# DmSwitch2104(config-if-eth-1/3)#oam mode
# active Configure as an active port
# passive Configure as a passive port
# DmSwitch2104(config-if-eth-1/3)#oam mode active
# DmSwitch2104(config-if-eth-1/3)#
36
Chapter 5. OAM
The status above can be showed using the command show oam detail. Inserting no as a prefix for this
command will remove OAM configuration.
• Storm Control
Configuration:
• Port: Shows which port is being configured (for more details, see Figure 25).
Storm Control:
• Broadcast: Enable/Disable broadcast storm-control..
• DLF (Multicast/Unicast): Enable/Disable DLF storm-control..
• Rate (kbit/s): Sets maximum bandwidth value in Kbps. (Range: 0-1048576).
config/img/DmSwitchEDD-38_2.jpg
Via CLI
Storm Control:
# DmSwitch2104(config)#interface ethernet 2
# DmSwitch2104(config-if-eth-1/2)#switchport storm-control
# broadcast Enable broadcast storm-control
# dlf Enable storm-control for Destination Lookup Failure packets (unicast/multicast)
# multicast Configure multicast storm-control
#
# DmSwitch2104(config-if-eth-1/2)#switchport storm-control broadcast
# DmSwitch2104(config-if-eth-1/2)#
The status above can be showed using the command show interfaces switchport. Inserting no as a
prefix for this command will remove storm-control configuration.
• Trap Enable
37
Chapter 5. OAM
It is possible to configure EDD to send traps when a status changes. Traps configuration can be set by
the following commands:
Configuration:
• Port: Shows which port is being configured (for more details, see Figure 25).
Trap enable:
• Link-Up/Link-Down: Enables sending trap when a link status changes.
• Non-Homologated-Transceiver: Enables sending trap when the SFP is non-homologated.
• Transceiver-Presence: Enables sending trap when a transceiver is inserted.
• Unidirectional Link Detected: Enables sending trap when a unidirectional link is de-
tected.
• Unidirecional Link Recovered: Enables sending trap when a unidirectional link is recov-
ered.
• All: Enables sending all type of traps.
config/img/DmSwitchEDD-39_2.jpg
Via CLI
Trap Enable:
# DmSwitch2104(config-if-eth-1/2)#trap-enable
# dying-gasp-received Issue dying gasp event received traps
# link-up-down Issue link-up or link-down traps
# non-homologated-transceiver Issue non-homologated-transceiver traps
# transceiver-presence Issue transceiver-presence traps
# unidir-link-detected Issue unidirectional link detected traps
# unidir-link-recovered Issue unidirectional link recovered traps
# <enter> Issue all traps
#
# DmSwitch2104(config-if-eth-1/2)#trap-enable
# DmSwitch2104(config-if-eth-1/2)#
Inserting no as a prefix for this command will remove all types of trap sending.
38
Chapter 5. OAM
39
Port Operation (Visualization)
Port Operation tab has a View button, the view window shows everything previously configured for the
ports such as general settings, provisioning and protection.
config/img/DmSwitchEDD-40_2.jpg
QoS Settings
EDD uses an internal Priority ID (PID) to classify the packets regarding its priority. The PID is not
retransmitted in any field of the packet in the outgoing traffic from the switch.
config/img/DmSwitchEDD-41_2.jpg
DmSwitch - EDD has the following methods for marking and rowing the packets:
• Sched-Mode;
• Port-Based;
• DSCP/802.1p;
• CoS Mapping;
• Sched-Mode Configuration
Sched mode is used to set the scheduling algorithm. Sched Mode Configuration window shows the
following settings:
40
Chapter 5. QoS Settings
• Mode:
WRR-Weighted Round Robin: This mode allows a priority configuration to each queue.
HQP-High Queue Preempt: This mode uses the same configuration as WRR to the first three
queues but the fourth is set as SP (Strict Priority). The other three queues will be analyzed only when
the SP queue is empty.
config/img/DmSwitchEDD-47_3.jpg
Via CLI
The status above can be showed using the command show qos queue sched-mode. Inserting no as a
prefix for this command will disable sched-mode configuration.
• Port Based
Enabling this option, the PID is set regarding its Ethernet port. It is a Global configuration where which
port can have an assigned PID. The Port-Based window shows the following settings:
• Port: Shows which port is being configured.
• Default Priority: Sets a priority from 0 to 7 to the selected port. (0 - Low priority, 7 - High
priority).
41
Chapter 5. QoS Settings
config/img/DmSwitchEDD-42_3.jpg
Via CLI
Default-Priority:
# DmSwitch2104(config)#interface ethernet 5
# DmSwitch2104(config-if-eth-1/5)#switchport priority default 3
# DmSwitch2104(config-if-eth-1/5)#
The status above can be showed using the command show interfaces switchport. Inserting no as a
prefix for this command will remove the default priority previously configured.
• DSCP / 802.1p
This window allows enabling DSCP and 802.1p classification, where the classification settings are
made per port. The DSCP / 802.1p window shows the following settings
• Port: Shows the port that is being configured.
• DSCP: Can be enabled by checking the checkbox.
• 802.1p: Can be enabled by checking the checkbox.
config/img/DmSwitchEDD-43_2.jpg
Via CLI
42
Chapter 5. QoS Settings
• 802.1p to CoS
This option uses the VLAN tag to determine the PID. This mode allows a tag remapping, thus the
packet tagged with PID X will be managed as being tagged with a PID Y, this remapping only occur
internally so the outgoing packet will keep its first priority, PID X. The 802.1p to CoS window shows
the following settings:
• 802.1p column: Shows the eight priority levels of the 802.1p tagging.
• CoS Priority column: It is possible to choose the weight that each packet will receive inter-
nally (from 0 to 7).
config/img/DmSwitchEDD-44_2.jpg
Via CLI
The following example shows how to map CoS priority 3 to queues 5, 6 and 7.
# DmSwitch2104(config)#qos map 802.1p-cos range 5 7 to 3
# DmSwitch2104(config)#
The status above can be showed using the command show qos map 802.1p-cos.
• DSCP to CoS
PID is classified regarding the DSCP field in the IP header. A mapping process is used to convert DSCP
into PID. The 802.1p to CoS window shows the following settings:
• CoS Priority column: Shows the eight priority levels that the DSCP marked packets are be-
ing classified.
• DSCP column: It is possible to configure a range of DSCP demarcation regarding the CoS priority
(ranges from 0 to 63).
43
Chapter 5. QoS Settings
config/img/DmSwitchEDD-44_3.jpg
Via CLI
The following example shows how to map DSCP range from 0 to 7 to queue 5.
# DmSwitch2104(config)#qos map dscp-cos range 0 7 to 5
# DmSwitch2104(config)#
The status above can be showed using the command show qos map dscp-coss.
• CoS Mapping
It is possible to configure which queue, in the CoS map, the PID is being placed to. CoS Mapping
window shows the following settings:
• Priority column: Shows the eight priority levels to be configured.
• Queue column: It shows which queue the PIDs will be placed into (from 0 to 3).
config/img/DmSwitchEDD-45_2.jpg
Via CLI
The following example shows how to map CoS priorities 1, 4 and 5 to the queue 2.
# DmSwitch2104(config)#cfm enable
# DmSwitch2104(config)#qos queue cos-map 2 priority 1 4 5
# DmSwitch2104(config)#
44
Chapter 5. QoS Settings
The status above can be showed using the command show qos queue cos-map.
45
Backup Link
DmSwitch - EDD allows the configuration of backup links for the interfaces. As soon as the equipment
identifies a link down, backup interface takes over the traffic. The entire configuration above can be
showed by using the command show running-config. Backup-Link Mapping window shows the following
settings:
• Configuration/Visualization
• Main Port: Select/Show a unit/port to be the main port of a backup-link.
• Alternative Port: Select/Show the alternative unit/port to be part of a backup-link.
• Preemption Delay(s): Configure/Show the time that the equipment will wait until switching
to main port, when it returns from a fail status.
• Preemption Mode: Select the preemption mode between forced and off.
config/img/DmSwitchEDD-46_2.jpg
Via CLI
The following instructions exemplify how to configure interface ethernet 6 as backup-link of interface
ethernet 5.
# DmSwitch2104(config)#interface ethernet 5
# DmSwitch2104(config-if-eth-1/5)#switchport backup-link
# interface Configure an interface to act as a backup link
# preemption Configure preemption properties
# DmSwitch2104(config-if-eth-1/5)#switchport backup-link interface ethernet 6
# DmSwitch2104(config-if-eth-1/5)#
Inserting no asa prefix for this command will remove backup-link configuration.
46
CFM
Connectivity Fault Management protocol can be configured on equipment via DmView. CFM window
shows the following settings:
config/img/DmSwitchEDD-47_2.jpg
config/img/DmSwitchEDD-47_3.jpg
Via CLI
Inserting no asa prefix for this command will remove maintenance domain configuration.
47
Chapter 5. CFM
config/img/DmSwitchEDD-48_2.jpg
Via CLI
This example shows how to configure a MA named MA_1 and a VLAN list range from VLAN 1 to
VLAN 16.
# DmSwitch2104(config)#cfm md MD_1
# DmSwitch2104(config-cfm)#ma MA_1 1 16
# DmSwitch2104(config-cfm-ma)#
Inserting no asa prefix for this command will remove maintenance association configuration.
config/img/DmSwitchEDD-49_2.jpg
48
Chapter 5. CFM
Via CLI
Inserting no asa prefix for this command will command will disable AIS.
config/img/DmSwitchEDD-50_2.jpg
Via CLI
# DmSwitch2104(config-cfm)#ma MA_1 1 16
# DmSwitch2104(config-cfm-ma)#mep-list 1 2
49
Chapter 5. CFM
Inserting no asa prefix for this command will remove MEP configuration.
config/img/DmSwitchEDD-50_3.jpg
Via CLI
# DmSwitch2104(config-cfm-ma)#mip ethernet 4
# DmSwitch2104(config-cfm-ma)#mip ethernet 5
# DmSwitch2104(config-cfm-ma)#
Inserting no asa prefix for this command will remove MIP configuration.
50
PWE3 TDM
TDM configurations like line type, idle byte information, clock source, tests can be made via DmView.
Note: PWE3 TDM configuration can be seen in the window below: A few configurations for PWE3
TDM can be checked in this chapter, for more information about PWE3 please check chapter ?.
config/img/DmSwitchEDD-51_2.jpg
config/img/DmSwitchEDD-52_2.jpg
51
Chapter 5. PWE3 TDM
Via CLI
The next example shows how to enable operation and configure Line Type:
# DmSwitch2104(config)#interface tdm 1
# DmSwitch2104(config-if-tdm-1/1)#enable tdm 1
# DmSwitch2104(config-if-tdm-1/1)#line-type e1 pcm31
Inserting no as a prefix for line-type command will set line-type to its default, unframed.
Inserting no as a prefix for idle-byte command will set idle-byte to its default, 255.
• Sync Source
• Clock source type: Select equipment’s clock source.
• Interface: Select the interface (Default:1)
• Enable operation: Configure the maximum filters for PDV (Packet Delay Variation).
config/img/DmSwitchEDD-52_3.jpg
Via CLI
# DmSwitch2104(config)sync-source transmit-clock-source internal
# DmSwitch2104(config-if-tdm-1/1)#
• Bundle Configuration
• TDM BERT: Performs a 2^9 bert test towards the TDM network.
• Ethernet BERT: Performs a 2^9 bert test towards the Ethernet network.
52
Chapter 5. PWE3 TDM
• Local digital loop: Performs an LDL test for TDM and ETH interface. (Loop for both
directions).
config/img/DmSwitchEDD-53_2.jpg
Via CLI
# DmSwitch2104(config-if-bundle-1/1)#test
# bert-error jitter rtd_eth tdm_bert_2^9
# eth_bert_2^9 ldl rtd_tdm
# DmSwitch2104(config-if-bundle-1/1)#test rtd_tdm
# RTD TDM: 820 us
# DmSwitch2104(config-if-bundle-1/1)#
53
VLANs
The following window shows VLAN group’s attributes. Tests can be set as configuration thus the test will
remain on even rebooting the equipment.
config/img/DmSwitchEDD-54_2.jpg
54
Chapter 6. Device
DmSwitch - EDD Device information can be accessed via EDD’s View Window by clicking on Fault and
selecting Device Information option as showed below:
config/img/DmSwitchEDD-55_3.jpg
General
General information such as device, firmware and flash info can be checked as showed below:
config/img/DmSwitchEDD-56_2.jpg
• Via CLI
Device:
DmSwitch2104#show system
Firmware:
55
Chapter 6. General
DmSwitch2104#show firmware
DmSwitch2104#show firmware build
Flash:
DmSwitch2104#show flash
56
Ports
Port information such as general config, OAM status, negotiated status and peer information can be
checked as showed below:
• General: Shows interface name, model, MAC address, link and port administration status, speed and
duplex-mode as well as the capabilities.
• OAM: Shows local and remote discovery, local and remote events and its link status.
• Negotiated Capabilities: Shows link events, configured loopback status, unidirectional link support
status and variable retrieval.
• Peer Information: It shows peer vendor name, model as well as the operation mode.
config/img/DmSwitchEDD-57_2.jpg
• Via CLI
To see interface counters such as input/output octets, unicast, errors, use the command show interfaces
counters. Clearing this table can be done by using the command clear interface counters.
57
Transceivers
The following window shows transceivers information as well as the signal diagnosis.
• Vendor Information: Vendor screen shows the vendor name, transmission media type, standard of
connection and type of connector.
• Digital Diagnostic: Signal diagnosis shows the status of temperature, tension, current of the signal and
potency of transmission and reception.
config/img/DmSwitchEDD-58_2.jpg
• Via CLI
58
Temperature / Fans
Temperature and fans status are showed on the window bellow.
config/img/DmSwitchEDD-58_3.jpg
• Via CLI
If the selected port has a non-homologated transceiver, the port will be disabled. In order to show
equipment’s temperature and fan status use the command:
DmSwitch2104#show hardware-status
59
Backup-Link
Backup-Link information, such as Main port, Alternative port and its status are showed on the screen
below:
config/img/DmSwitchEDD-59_2.jpg
60
Remote Devices
Remote devices information can be checked in the window below.
config/img/DmSwitchEDD-60_2.jpg
• Configuration
• Global Enable: Status of Remote Devices configuration.
• Devices VLAN
• VLAN ID: VLAN used for the Remote management protocol.
• IP address: IP assigned by the remote equipment.
• Default Gateway: Default Gateway assigned by the remote equipment.
• Detected Devices
• Interface: Interface used for the link with the remote equipment.
• State: State of OAM protocol. Shows if the local equipment was identified by the remote equip-
ment.
• OUI: Remote’s Organizationally Unique Identifier.
• OID: Remote equipment’s model identification.
• Vendor Number: Remote equipment’s vendor number.
• MAC Adress: Remote equipment’s MAC address.
• Factory ID: Remote equipment’s factory ID.
• Remote Interface: Equipment remote’s interface.
61
CFM
Connectivity Fault Management information can be checked on the window below.
MEPs
• MD: Maintenance Domain name.
• MA: Maintenance Association name.
• MEP: Maintenance End Point ID.
config/img/DmSwitchEDD-61_2.jpg
• Via CLI
62
Chapter 6. CFM
The configuration above is in sequence of steps being MD configuration the first and MEP configura-
tionthe last.
63
Chapter 7. Fault Information
It is possible to check the overall information of configuration, status and processing by accessing the
menu Fault in the bayface of the equipment. CPU processing information can be checked either via
DmView or via terminal. The access to this information is explained below:
config/img/DmSwitchEDD-63_3.jpg
config/img/DmSwitchEDD-64_2.jpg
To visualize cpu’s free memory use the command show cpu memory.
To check active processes and its status use the command show cpu usage .
Via CLI
Processing information can be checked via CLI by entering the command below:
DmSwitch2104#show cpu usage
64
Chapter 7. Managers information
Managers information
Connected managers can be checked by accessing the following path:
config/img/DmSwitchEDD-65_2.jpg
The window below shows the username, uptime and process ID for the connected user.
config/img/DmSwitchEDD-65_3.jpg
Via CLI
This information can be checked via CLI as well as by entering the following command:
DmSwitch2104#show managers
65
MAC Address information
MAC address table information can be checked by accessing the following path:
config/img/DmSwitchEDD-66_2.jpg
Static and Learned MAC addresses as well as its configuration/information can be checked in the window
below.
config/img/DmSwitchEDD-67_2.jpg
Via CLI
This information can be accessed via CLI by entering the following command:
DmSwitch2104#show mac-address-table
66
Counters Information
Counters information for all interfaces can be seen by accessing the following path:
config/img/DmSwitchEDD-67_3.jpg
config/img/DmSwitchEDD-68_2.jpg
Via CLI
This information can be checked via CLI by entering the following command:
DmSwitch2104#show interfaces counters detail
67
Chapter 8. Port Configuration
Field Description
• Port - Interface number.
• Name - Displays interface label.
• Type - Indicates the port type.
• Admin Status - Displays whether the interface is administratively enabled or not.
• Oper Status - Indicates if the link is Up or Down.
• Speed Duplex Status - Displays the current speed and duplex status.
• Flow Control Status - Indicates the type of flow control currently in use.
• Autonegotiation - Displays whether autonegotiation is enabled or not.
• Port-Channel Member1 - Shows if port is a port-channel member.
• Creation2 - Shows if a port-channel is manually configured or dynamically set via LACP.
config/img/DmView.png
68
Chapter 8. Displaying Port Information
DmSwitch2104#
69
Configuring Interface Connections
You can use the Port Configuration or Port-Channel Configuration page to enable/disable and interface,
set autonegotiation and the interface capabilities to advertise, or manually fix the speed, duplex mode, and
flow control.
Field Description
• Name - Fill in a label for the interface.
• Admin - Set the interface’s administrative status.
• Speed Duplex - Select the speed and duplex configuration. This option is only valid when autone-
gotiation is disabled.
• Flow Control - Set the forced flow control use in the interface. This option is only valid when
autonegotiation is disabled.
• Autonegotiation - Allows autonegotiation to be enabled or disabled. When auto-negotiation is
enabled, you need to specify the capabilities to be advertised. When autonegotiation is disabled, you
can force the settings for speed, mode, and flow control. The following capabilities are supported.
• 10half - Supports 10 Mbps half-duplex operation
• 10full - Supports 10 Mbps full-duplex operation
• 100half - Supports 100 Mbps half-duplex operation
• 100full - Supports 100 Mbps full-duplex operation
• 1000full - Supports 1000 Mbps full-duplex operation
• flowcontrol - Supports flowcontrol operation
• MTU - Set the maximum transfer unit for the interface. MAC frames with payloads larger than the MTU
will be discarded.
• LACP - Enables LACP in the interface.
• Port-Channel - Indicates if a port is a member of a port-channel.
config/img/DmView.png
70
Chapter 8. Configuring Interface Connections
DmSwitch2104(config-if-eth-1/1)#shutdown
DmSwitch2104(config-if-eth-1/1)#no shutdown
DmSwitch2104(config-if-eth-1/1)#no negotiation
DmSwitch2104(config-if-eth-1/1)#speed-duplex 100half
DmSwitch2104(config-if-eth-1/1)#flowcontrol
DmSwitch2104(config-if-eth-1/1)#negotiation
DmSwitch2104(config-if-eth-1/1)#capabilities 100half
DmSwitch2104(config-if-eth-1/1)#capabilities 100full
DmSwitch2104(config-if-eth-1/1)#capabilities flowcontrol
DmSwitch2104(config-if-eth-1/1)#
71
Port Broadcast Control
Broadcast storms may occur when a device on your network is malfunctioning, or if application programs
are not well designed or properly configured. If there is too much broadcast traffic on your network,
performance can be severely degraded or everything can come to complete halt.
You can protect your network from broadcast storms by setting a threshold for broadcast traffic. Any
broadcast packets exceeding the specified threshold will then be dropped.
Field Description
• Port - Interface number.
• Type - Indicates the port type.
• Protect Status - Shows whether or not broadcast storm control has been enabled. (Default: En-
abled)
• Threshold - Threshold in packets per second. (Range: 0-262143 packets per second; Default: 500
packets per second)
• Port-Channel - Shows if port is configured as a port-channel.
config/img/DmView.png
72
Chapter 8. Port Broadcast Control
73
Configuring Port Monitoring
You can mirror traffic from any source port to a target port for real-time analysis. You can then attach
a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a
completely unobtrusive manner.
Command Usage
• Monitor port speed should match or exceed source port speed, otherwise traffic may be dropped from
the monitor port.
• All monitor sessions have to share the same destination port.
• When monitoring port traffic, the target port must be included in the same VLAN as the source port.
Command Attributes
• Mirror Sessions - Displays a list of current mirror sessions.
• Source Unit - The unit whose port traffic will be monitored.
• Source Port - The port whose traffic will be monitored.
• Type - Allows you to select which traffic to mirror to the target port, Rx (receive), or Tx (transmit).
• Target Unit - The unit whose port will "duplicate" or "mirror" the traffic on the source port.
• Target Port - The port that will "duplicate" or "mirror" the traffic on the source port.
74
Configuring Rate Limits
This function allows the network manager to control the maximum rate for traffic transmitted or received
on a port. Rate limiting is configured on ports at the edge of a network to limit traffic coming into or out of
the network. Traffic that falls within the rate limit is transmitted, while packets that exceed the acceptable
amount of traffic are dropped.
Rate limiting can be applied to individual ports or port-channel. When an interface is configured with this
feature, the traffic rate will be monitored by the hardware to verify conformity. Non-conforming traffic is
dropped, conforming traffic is forwarded without any changes.
Command Attribute
• Port/Port-Channel - Displays the port number.
• Rate - Sets the rate limit in kilobits per second. Must be multiple of 64. (Range: 64-1000000)
• Burst - Sets the maximum burst size in kilobits. Must be power of 2. (Range: 32-4096)
75
Displaying Port Statistics
You can display standard statistics on network traffic from the interfaces. Interfaces and Ethernet-like
statistics display errors on the traffic passing through each port. This information can be used to identify
potential problems with the switch (such as a faulty port or unusually heavy loading). All values displayed
have been accumulated since the last system reboot, and are shown as counts per second.
Displaying Port Statistics via DmView
• Open Caminho ???
config/img/DmView.png
Ether-like stats:
Alignment errors : 0
FCS errors : 0
Single Collision frames : 0
Multiple collision frames : 0
SQE Test errors : 0
Deferred transmissions : 0
Late collisions : 0
Excessive collisions : 0
Internal mac transmit errors : 0
Internal mac receive errors : 0
76
Chapter 8. Displaying Port Statistics
RMON stats:
Drop events : 0
Octets : 5277449
Packets : 22784
Broadcast packets : 532
Multi-cast packets : 231
Undersize packets : 0
Oversize packets : 1242
Fragments : 0
Jabbers : 0
CRC align errors : 0
Collisions : 0
Packet size <= 64 octets : 1129
Packet size 65 to 127 octets : 15352
Packet size 128 to 255 octets : 2283
Packet size 256 to 511 octets : 1228
Packet size 512 to 1023 octets : 1071
Packet size 1024 to 1518 octets: 479
DmSwitch2104#
77
Address Table Settings
Switches store the addresses for all known devices. This information is used to pass traffic directly between
the inbound and outbound ports. All the addresses learned by monitoring traffic are stored in the dynamic
address table. You can also manually configure static addresses that are bound to a specific port.
A static address can be assigned to a specific interface on this switch. Static addresses are bound to the
assigned interface and will not be moved. When a static address is seen on another interface, the address
will be ignored and will not be written to the address table.
Command Attributes
• Static Address Counts* - The number of manually configured addresses.
• Current Static Address Table - Lists all the static addresses.
• Interface - Port or Port-Channel associated with the device assigned a static address.
• MAC Address - Physical address of a device maped to this interface.
• VLAN - ID of configured VLAN (1-4094).
config/img/DmView.png
Example 8-7. Adding a static entry to the address table via CLI.
DmSwitch2104(config)#mac-address-table static 00-e0-29-94-24-de ethernet 1/1 vlan 1
DmSwitch2104(config)#
78
Displaying the Address Table
The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for
traffic entering the switch. when the destination address for inbound traffic is found in the database, the
packets intended for that address are forwarded directly to the associated port. Otherwise, the traffic is
flooded to all ports.
Command Attributes
• Interface - Indicates a port or port-channel.
• MAC Address - Physical address associated with this interface.
• VLAN - ID of configured VLAN (1-4094).
• Address Table Sort Key - You can sort the information displayed based on MAC address,
VLAN or interface (port or port-channel).
config/img/DmView.png
Example 8-8. Displaying the Address Table entries for port 1 via CLI.
DmSwitch2104#show mac-address-table interface ethernet 1
# Total MAC Addresses for this criterion: 1
#
# 802.1p
# Interface MAC Address VLAN Priority Type
# ---------- ----------------- ---- -------- -------
# Eth 1/ 1 00:E0:52:B8:10:79 1 - Learned
DmSwitch2104#
79
Clearing the Address Table
With the following commands, it is possible to delete entries in the switch MAC Address Table.
Command Attributes
• Ethernet - Indicates a ethernet interface where MAC addresses will be deleted.
• VLAN - ID of configured VLAN. All its MAC addresses will be deleted.
• Port-channel - All MAC address belonging to a port-channel will be deleted.
80
Changing Aging Time
You can set the aging time for entries in the dynamic address table.
Command Attributes
• Aging Status - Enables/disables the function.
• Aging Time - The time after which a learned entry is discarded. (Range: 10-1000000 seconds; De-
fault: 300 seconds)
config/img/DmView.png
81
Chapter 9. SNTP
The task of manual adjusting and maintaining of internal system clocks in a large or wide spread net-
work of devices can become difficult. In this context, the use of Simple Network Time Protocol (SNTP)
can be very helpful. SNTP is a simple distributed protocol intended to synchronize clocks of network
devices. Using the UDP port 123, a SNTP client contacts a time server and synchronize its clock and date
automatically. Remember that the system logs use the configured clock for generating the logs date and
time.
Command Attributes
• SNTP Client - Sets the state of the SNTP client.
• SNTP Polling Interval (16-16384) - The interval between 2 synchronization polls.
• SNTP Server - The IP address of a SNTP server.
• Current Time - The time and date currently used by the switch .
• Time Zone - Displays the name of time zone used, with the respective time offset.
• Clock Set - Use this option when the SNTP client is disabled, to configure a local time and date.
• Time Zone Set - Choose this option to configure a time zone and offset for your location.
• Name - the name of your time zone, any string will be accepted. Do not use spaces.
• Hours - offset in hours of your location.
• Minutes - offset in minutes of your location.
config/img/DmView.png
82
Chapter 9. SNTP
* Note: When the SNTP client is enabled, the local (Clock Set) options will always be overwritten on the next SNTP synchroniza-
tion polling.
config/img/DmView.png
83
Chapter 10. System Logs
The embedded syslog agent allows the registering of system events. You can check the event logs in order
to debug problems or control user access, for example. Depending on the type of event, it can be saved to
the system RAM, flash, sent to a remote log server or destination e-mail address.
Command Attributes
• Ram Logs - Displays the logs saved in RAM.
• Flash Logs - Displays the logs saved in flash.
• System Log Status - Check Enabled to start processing system logs.
• Flash Level (0-7) - Sets the range of log severity that will be saved to flash.
• Ram Level (0-7) - Sets the range of log severity that will be saved to RAM.
• Remote Log Status - Check Enabled to enable the sending of logs to a remote log server.
• Remote Facility (16-23) - Sets the remote facility type.
• Remote Level (0-7) - Sets the range of log severity that will be sent to the remote log server.
• SMTP Status - Check Enabled to enable the sending of log messages by e-mail.
• SMTP Level (0-7) - Sets the range of log severity that will be sent to the destination e-mail.
• Source e-mail - Sets the source e-mail address inserted in messages.
• Destination e-mail - Sets the destination e-mail address.
• SMTP Servers - Sets a new SMTP server IP address.
84
Chapter 10. System Logs
config/img/DmView.png
config/img/DmView.png
85
Chapter 10. System Logs
Local logging:
FLASH level: error (3)
RAM level: info (6)
SMTP logging:
Status: Disabled
Level: warn (4)
Source email:
Remote logging:
Status: Enabled
Facility: 23
Level: info (6)
config/img/DmView.png
86
Chapter 10. System Logs
config/img/DmView.png
Local logging:
FLASH level: error (3)
RAM level: info (6)
SMTP logging:
Status: Enabled
Level: warn (4)
Source email: [email protected]
Destination email:
Address 1: [email protected]
Servers:
Server 1: 192.168.10.1
Remote logging:
Status: Enabled
Facility: 23
Level: info (6)
DmSwitch2104(config)#
87
Chapter 10. System Logs
88
Chapter 11. Managing Security
Security is a very important issue in networks. This switch has a complete set of features that allows you
to improve the security of your network:
• Local User Management: This switch maintains a local user database so a user can be authenticated
locally on the switch.
• Remote User Authentication: An user can be authenticated using a Remote Authentication Dial-in User
Service (RADIUS) or Terminal Access Controller Access Control System Plus (TACACS+) server.
• Secure Web Access: By using the Secure Hypertext Transfer Protocol (HTTPS), a secure encrypted
session is established between a manager and the switch.
• Secure Shell: The Secure Shell (SSH) is a protocol that provides encrypted connections to a remote host.
The use of this protocol allows to establish a secure connection between your host computer and this
switch.
• Secure Network Access: By implementing the IEEE 802.1x port authentication this switch allows to
restrict the access to the network for authorized users only.
• Management Restricted Access: A network filter can be configured in order to avoid access to manage-
ment interfaces from any undesired network IP address.
89
Chapter 11. Local User Management
config/img/DmView.png
Note: The use of strong passwords is highly recommended. In order to create a strong password you
have to use strings that are a combination of letters, numbers and symbols (@, #, $, %, etc.). Pass-
words are case-sensitive, a strong password should contain letters in both uppercase and lowercase.
Strong passwords do not contain words found in a dictionary.
90
Authentication Settings
This switch allows you to configure multiple authentication methods in order to improve security, avail-
ability and scalability. By default, the local users database is used to configure access rights. You can also
use a remote authentication server using RADIUS or TACACS+ protocols to execute the authentication
task. A remote authentication server maintains a database with authorized usernames and passwords and
is accessed by the switch when an user tries to log in to the switch’s management interface (via Web
access, SSH, Telnet and console port).
You can also configure multiple authentication servers in order to increase availability in case of server
failure. The servers will be contacted by the switch in the same order specified by the configuration
parameters. You can choose up to three different methods (Local, RADIUS and TACACS+).
Command Attributes
• Login - Choose the order of searching for users. The Local option will only be skipped when a user-
name entered is not present in the local database. RADIUS and TACACS+ options will only be skipped
when the respective servers are down.
91
Chapter 11. Authentication Settings
* (Note that an ACCESS REJECT message received from a authentication server does not generate a skip action and will always
result in authentication denial)
.
config/img/DmView.png
92
Chapter 11. Authentication Settings
• The next example demonstrates how to select an authentication method, configure two different RA-
DIUS servers (for fail-over purposes) and a TACACS+ server.
93
HTTP and HTTPS Configuration
The HTTPS server embedded in this switch allows the establishment of a secure encrypted web connection
between an authenticated (privileged) manager and the switch’s web configuration interface. Both the
secure HTTPS and the conventional HTTP server can be used simultaneously, in order to access the
secure interface use https://switch[:port_number] instead of http://switch in your web
browser. Note that when an encrypted connection is established a locked padlock should appear in your
web browser bar. The web browsers recommended for use with the web interface are Internet Explorer
6.x or above and Mozilla Firefox 1.03 and above.
Command Attributes
• HTTP Status - Choose whether the web server will be enabled or not.
• HTTP Port Number (1-65535) - Enter a valid port number or leave the default value. (Default:
80)
• HTTPS Status - Choose weather the secure web server will be enabled or not.
• HTTPS Port Number (1-65535) - Enter a valid port number or leave the default value. (Default:
443)
• HTTP and HTTPS Connections Maximum Number (1-32) - Enter a limit number of pos-
sible simultaneous connections. (Default: 8)
config/img/DmView.png
94
Chapter 11. Replacing the Secure Certificate
The replacement of the default SSL Secure Certificate is highly recommended for security reasons. In
order to replace this certificate you must generate or obtain an unique certificate (preferably from a rec-
ognized certification authority), private key and password and save them in a tftp server.
Replacing the Secure Certificate via CLI
• The next example shows how to replace the default secure certificate by the new certificate file "Certifi-
cateFileName" with the private key file "PrivateKeyFileName" and password "passwd" from a TFTP
server 192.168.10.160. Note that the switch must be rebooted in order to the new certificate become
available.
95
Configuring the Secure Shell - SSH
The Secure Shell (SSH) is a protocol designed for logging into and executing commands on a remote
network host.The SSH protocol can be considered a secure alternative to telnet because its connections
are encrypted. Due to its higher security, you should consider the use of SSH instead of telnet whenever
possible.
This switch has an embedded SSH server that allows you to remotely log in and execute commands
(just like a telnet connection, but in a secure way). It is also possible to log in using a public/private key
mechanism instead of entering an user and password.
* Note: In order to use the SSH remote login you will need first to generate a public key.
Command Attributes
• SSH Server Status - Choose whether the SSH server will be enabled or not.
• SSH Authentication Timeout (0-600) - The amount of time in seconds the SSH server
will wait for a response from a client during authentication. (Default: 120 seconds)
• SSH Server-Key Size (512-896)[ - Specifies the SSH server key size. (Range: 512-896 bits).
Server key is a private key that is never shared outside the switch. Host key is shared with the SSH client,
and is fixed at 1024 bits.]
• SSH Connections Maximum Number (1-32) - Enter a limit number of possible simultaneous
connections. (Default: 8)
config/img/DmView.png
96
Chapter 11. SSH Server Settings
• The next example enables the SSH server using a timeout of 120 seconds and server key size of 768
bits. It also limits the number of possible simultaneous connections in 8.
97
SSH Host-Key Settings
Command Attributes
• Public-Key of Host-Key - A 512 bits value that will be used by the client in order to establish
an encrypted terminal connection to the switch’s SSH server.
• RSA - Hexadecimal RSA fingerprint value.
• DSA - Hexadecimal DSA fingerprint value.
config/img/DmView.png
98
Restricting Management Access
By default, this switch allows access to the management interface to any authenticated user. In order to
improve security, it is very interesting to restrict access only to management machines. This task can be
accomplished by creating an IP filter entry that allows only some network clients to access the manage-
ment interfaces. You can create IP filters for any management interface, including Web Configuration,
SNMP, Telnet and SSH.
Command Attributes
• HTTP IP Filter List - The current list of IPs allowed to access the Web Configuration interface.
• SNMP IP Filter List - The current list of IPs allowed to access the SNMP Configuration inter-
face.
• Telnet IP Filter List - The current list of IPs allowed to access the Telnet Configuration
interface.
• SSH IP Filter List - The current list of IPs allowed to access the SSH Configuration interface
• IP Address - An IP address in the format A.B.C.D/M, where M is the network mask that establishes
a sequence of allowed machines (one or more).
config/img/DmView.png
99
Chapter 12. SNMP
The Simple Network Management Protocol (SNMP) is a widely used communication protocol built for
remote management and monitoring of network equipment (e.g. switches, routers, modems, etc.). A Net-
work Management Station (NMS) running an SNMP application accesses the built-in SNMP agent of the
remote managed device by reading from and writing to a called community. The community access string
act as a password for the NMS, allowing read-only or read-write access rights. Only network devices that
have configured community access strings can be managed/monitored via SNMP. Some SNMP network
devices can also be configured to automatically send information (called traps) about special events (e.g.
interface status up/down) to the NMS. This switch incorporates an onboard SNMP agent that regularly
monitors its hardware and software modules as well as its interfaces, allowing a NMS to manage/monitor
it via SNMP. It can also be configured to send SNMP traps to a remote NMS.
Read/Write - NMS is authorized to change and retrieve SNMP MIB objects from the switch.
Read-Only - NMS is authorized only to retrieve SNMP MIB objects from the switch.
• SNMP Community Capability - Display the maximum number of community strings supported
by the switch.
config/img/DmView.png
100
Chapter 12. Configuring SNMP Community Access Strings
101
Setting SNMP Traps
A Trap is a notification sent by a SNMP agent to a NMS indicating that an important event has occurred.
In order to implement this functionality, you must set the NMS IP addresses and community names as
well as the SNMP trap version format to be sent.
This switch can send several types of traps and up to five NMS can be configured to handle this traps. The
traps the switch can send are:
• Power-On
• Link-Up/Link-Down
• Authentication
• Cold and Warm Start
• Configuration change or save
• Fan status change
• Forbidden access
• Login fail and success
• SFP presence
• Stack attach and detach
• Alarm status change
• Traps lost
Command Attributes
• Network Management Station Capability - Display the maximum number of NMS trap
receivers supported by the switch.
• Trap Receiver IP Address - The IP address of a NMS that will receive the traps sent by this
switch.
• Trap Receiver Community String - Traps will be sent to the NMS pertaining to this com-
munity string.
• Trap Version - Choose whether to send traps as SNMP v1 or 2c.
• Enable Power-On Traps - Send a trap when the switch is Powered-On.
• Enable Link-Up/Link-Down Traps - Send a trap when a link becomes Up or Down.
• Enable Authentication Traps - Send a trap each time a invalid SNMP community string is
submitted during the SNMP authentication procedure.
• Current - This box displays the already configured trap managers.
102
Chapter 12. Setting SNMP Traps
config/img/DmView.png
103
Chapter 13. Link Aggregation
The link aggregation feature allows you to create resilient logical links on the network, improving avail-
ability and performance. A link aggregation port acts as a single link for management purposes, though
being generally composed of more than one physical link. By combining multiple links into one logical
link, Link Aggregation can drastically improve the bandwidth available. It can be used to fix bottlenecks
on the network, alleviate traffic exchanged among switches or even improve availability and bandwidth
for access servers.
The most common types of link aggregation are static port-channels and dynamic port-channels. Static
port-channels have to be manually configured at both ends of the port-channel, and the switch or network
interface must comply with the Cisco EtherChannel standard. Dynamic port-channels use Link Aggre-
gation Control Protocol (LACP), defined by IEEE 802.3ad standard. Ports configured with LACP auto-
matically create port-channels with other LACP devices. When more than eight ports constitute a single
port-channel (static or dynamic) each new added port will be stated as standby, i.e, will only be used in
case one of the 8 ports fail.
104
Figure 13-2. Port-Channel with Active and Standby Ports
* Notes:
* - You must configure and treat port-channels as point-to-point links. Multipoint Aggregations (aggregations among more than two
systems) will not work properly.
* - Link Aggregation is supported only on point-to-point links operating in full duplex mode. Use of half duplex operation is not
recommended.
* - All links in a port-channel must operate at the same data rate (e.g. 10 Mb/s,100 Mb/s, or 1000 Mb/s).
* - In order to prevent a network loop creation, first configure the port-channel member ports and then connect the cables. In order to
prevent data loss while removing a port from a port-channel, remove the cable first, then remove the port via management software.
* - RSTP, VLAN, IGMP, GVRP settings are made for the entire port-channel.
This switch supports the following Link Aggregation features:
• Cisco EtherChannel for static port-channels
• IEEE 802.3ad LACP - Link Aggregation Control Protocol
• Maximum port-channels per stack: 32
• Maximum forwarding ports per port-channel: 8
• Maximum standby ports per port-channel: unlimited
105
Chapter 13. Static Port-Channel Configuration
config/img/DmView.png
DmSwitch2104#
106
Chapter 13. Static Port-Channel Configuration
* Note: A new Port-Channel uses the configuration from the first port that is added to it. The following added ports will use the
port-channel active configuration. When removed from the port-channel, ports will use the default configuration.
107
LACP
Configuring LACP
Command Attributes
• Admin Key - A unique key shared among ports on the same port-channel. Different port-channels
should have different keys.
• Port Priority - When more than 8 ports are constituting an aggregate, the lower the value, the
more likely that the port will be in the active state.
• Enabled - Enable this option so this port will be able to automatically negotiate port-channels with
LACP.
config/img/DmView.png
108
Displaying LACP Information
config/img/DmView.png
Aggregator id 1 (channel-group 1)
109
Displaying LACP Port Internal Information
Field Description
• Oper Key - Value of the operational key for the port-channel.
• Admin Key - Value of the administrative key for the port-channel.
• LACP Port Priority - Value of the LACP port priority within this port-channel.
• Flags - Flags indicating the port’s mode.
• Port State - Set of actor’s state parameters.
config/img/DmView.png
Aggregator id 1 (channel-group 1)
110
Displaying LACP Port Neighbors Information
Field Description
• System ID - System ID used by the neighbor.
• Flags - Flags indicating the neighbor port mode.
• LACP Port Priority - LACP port priority assigned to this interface within the channel group.
• Oper Key - Value of the neighbor operational key for the port-channel.
• Port Number - Port number of the neighbor peer.
• Port State - Set of neighbor port state parameters.
config/img/DmView.png
Aggregator id 1 (channel-group 1)
Partner’s information:
111
Chapter 14. VLAN
Virtual Local Area Networks (VLANs) are logical groups of network nodes implementing separate Layer
2 broadcast domains. Each VLAN is considered a unique broadcast domain, i.e., each network node will
only be able to communicate with other nodes that are contained inside the VLAN. A Layer 3 device (e.g,
a router) will be necessary in order to establish a connection between different VLANs. In large networks,
VLANs help to contain broadcast traffic, optimizing the network resources usage. By Isolating network
groups into VLANs you can also improve network security.
This switch supports the following VLAN features:
• Maximum of 4094 VLANs
• Port Overlapping
• Multiple VLAN membership
• Bridging between VLAN aware and VLAN unaware equipment
• Port-and-Protocol based VLAN
• MAC-Based VLAN
• Q-in-Q
A Tagged Trunk is a port that is usually connected to another switch and multiplexes two or more VLAN
frames across the network. In order to create a tagged trunk, you must add a port as a tagged member of
the VLANs that you want traffic passing through.
A Port-Based non-overlapping VLAN is the most simple way to implement VLANs. For each switch port
is assigned one Port VLAN ID that identifies the port group membership. For example, you can create
VLANs Marketing and Engineering (IDs 2 and 3 respectively), so people from Marketing department
will not be able to communicate via Layer 2 with people from Engineering department. Then you can
112
Chapter 14. IEEE 802.1Q VLANs
assign the ports 1-10 for Marketing VLAN and 11-20 to Engineering VLAN. The main advantages using
this method are the easy start-up configuration and centralized administration. However, with the growing
number of VLANs and port utilization/reassignment, this technique becomes harder to manage.
The next table exemplifies a network design based on Port-Based non-overlapping VLAN. In this scenario,
both Marketing and Engineering personnel will have granted access to is own servers and printers but will
not be able to communicate to each other.
Port-based non-overlapping VLANs also have problems extending along other switches, because requires
using an exclusive port for each VLAN connection to another switch. This scenario can become a problem
when using the Spanning-Tree Algorithm, because it will probably block all redundant paths between
switches.
113
Chapter 14. IEEE 802.1Q VLANs
The use of 802.1Q VLANs allows the Port-Overlapping use. This mean that ports can belong to more
than one VLAN, allowing, for example, printers or servers to be shared among separate VLANs. The
only requirement is that the device’s network card using port-overlapping must be 802.1Q compliant.
114
Example 14-2. Port-Overlapping VLAN Design
The next table exemplifies a network design based on Port-Overlapping VLAN feature. In this scenario,
both Marketing and Engineering personnel will have granted access to the shared printer and server but
will not be able to communicate to each other. Note that the shared resources (server, printer, etc..) must
have 802.1Q network interface cards (VLAN-aware devices).
Q-in-Q
Usually, the service provider costumer has specific VLANs on its network and want to communicate with
its other remote VLANs through the provider network . One way to resolve this problem is to directly
forward the costumer tagged traffic into the provider network. This solution brings one problem: with the
growing demand of VLANs by the clients, the 4094 VLANs address space would be quicly exausted.
Another way to resolve this issue is by using the Q-in-Q feature.
115
Chapter 14. Q-in-Q
Q-in-Q is an encapsulation method that allows a service provider to offer transparent tunneling of client
VLANs data through its core network. This is done by adding a second outer VLAN tag, also called Metro
Tag. All client VLAN-tagged frames are marked with its specific Metro Tag (assigned transparently by the
service provider) and then switched through the provider network until reach its destination (the remote
client interconnection point), where the Metro Tag is extracted and the original tagged frame is forwarded.
116
When to Create 802.1Q VLANs
Use 802.1Q tagged VLANs only when connecting VLAN aware devices (e.g 802.1Q compliant
switches/network cards). Setting a port as tagged for a specific VLAN means that the switch will always
forward a tagged frame out this port when receiving a frame for this VLAN in another member port.
Access ports connected to hosts that are VLAN unaware must be set to untagged.
117
Rules for Creating 802.1Q VLANs
When creating 802.1Q VLANs keep in mind that:
• Each VLAN has its own unique VID;
• One port can belong to any tagged or untagged 802.1Q VLAN;
• One port must belong to at least one VLAN (either tagged or untagged);
• When the interface Acceptable Frame Type parameter is set to tagged, the PVID value is ig-
nored.
118
Three Basic Steps to Configure 802.1Q VLANs
Follow this three basic steps to successfully configure VLANs
• Create one VLAN ID for each VLAN you need;
• Add ports to created VLANs: each port must be configured as tagged, untagged, forbidden or not
member, respecting the mentioned rules;
• Configure each port separately: assign a PVID and the acceptable frame format to be received by the
port.
119
Displaying VLAN Information
Use the VLAN Configuration page to see separate information for each VLAN on the switch.
Field Description
• VLAN ID - Displays all the currently configured VLAN IDs (static or dynamic learnt).
• IP Address - Displays the IP Address currently configured (optional).
• Type - Displays how the VLAN was added to the switch:
• Egress Ports - The current set, type and tagging type of member ports.
config/img/DmView.png
120
VLAN Creation
The VLAN Configuration page allows you to create a VLAN by specifying a valid VID. You can also
configure a VLAN name up to 32 characters. You must set the VLAN status to Active if you want it to
forward frames. You can edit a VLAN status by selecting the desired VLAN and changing its status box.
You can also create an IP address for accessing the management interface from this VLAN.
Command Attributes
• VLAN ID - Choose a valid VLAN ID (range: from 2 to 4094).
• IP Address - Fill in a valid IP address and Subnet Mask (optional) This address will be used in order
to access the management interface from this VLAN.
• State - Select whether to Activate or Suspend the frame forwarding for this VLAN.
• Remove - Destroy the selected VLAN. All ports which are using this PVID will be transferred to the
DefaultVlan PVID 1.
* Notes:
* - Only the PVID of the ports which were using the destroyed VLAN ID will be changed to PVID 1. Ports which were exclusively
egress members (either tagged or untagged) of the destroyed VLAN will be also automatically set to untagged member of VLAN 1.
* - The VLAN 1 (DefaultVlan ), Dynamic VLANs entries and Static VLANs with dynamic member ports can not be removed or
disabled.
config/img/DmView.png
121
Chapter 14. VLAN Creation
122
Adding VLAN Static Member Ports
The Static Table Page allows you to add/remove/change the static VLAN port membership. Add ports
as tagged if there are only VLAN-aware devices connected to this VLAN. If there are VLAN-unaware
devices connected choose the untagged option. Configure a VLAN as Forbidden to avoid the port to learn
this VLAN by GVRP.
Command Attributes
• VLAN ID - ID of the VLAN. (1-4094)
• VLAN Name (optional) - Display the VLAN name for administrative-only purposes. (1-32 characters)
• Status - Select Active to begin forwarding of frames or Suspended to stop forwarding for the
specific VLAN
• Port - Port Number
• Membership - Select the appropriate VLAN membership for each port or port-channel. Note that you
can not change separately ports grouped into port-channels. You can configure port-channels by using
the last table on this page.
* Note: Although you are not allowed to remove a dynamic member port, you can change it to a static type.
config/img/DmView.png
123
Chapter 14. Adding VLAN Static Member Ports
124
VLAN Interface Configuration
The VLAN Interface Configuration Page allows you to configure VLAN-related properties for switch
ports. Port-Channel member ports are configured on the VLAN Port-Channel Configuration page.
Command Attributes
• PVID - The Port VLAN ID must be set to a already created VID and is assigned only to untagged
frames received on this port. . If the port is configured to accept tagged frames only, there is no sense
to configure this parameter, so any change to it will be ignored.
• Acceptable Frame Type - The frame type the port will accept to receive. Choose All to accept
both tagged and untagged frames. Selecting Tagged will force the switch to discard received untagged
frames.
• Ingress Filtering - Enable this option to make the switch discard incoming tagged frames from
VLANs that the port is not member. Disable this option to make the switch flood non-member incoming
frames (note that frames from forbidden VLANs will always be discarded).
• Port-Channel Member - Displays the port aggregation membership. Note that port-channel mem-
ber ports are configured on the VLAN Port-Channel Configuration page.
config/img/DmView.png
125
Chapter 15. Spanning Tree
In a bridged network the use of a Spanning Tree Algorithm (STA) is usually vital to improve network
dependability and resiliency. The main purpose of this algorithm is to avoid the creation of network loops
while guaranteeing end-user availability. In fact, active network loops in a bridged network are highly un-
desired because they bring problems like Broadcast Storms and Duplicate Unicast Frame Transmissions.
However, network managers usually need to implement redundant links in order to improve dependability.
By allowing the assignment of network backup links, a STA can also improve network resiliency. Being
implemented on the Layer 2, the first standard for a Spanning Tree Protocol (STP) was released by the
IEEE committee 802.1D. The next standard, Rapid Spanning Tree Protocol (RSTP) was released under
the 802.1W IEEE specification and it is a major improve to the old and slow STP. You should consider
using the RSTP protocol implementation whenever possible.
This switch supports the following STA features:
• IEEE 802.1D STP - Spanning Tree Protocol (per VLAN)
• IEEE 802.1w RSTP - Rapid Spanning tree Protocol (per VLAN)
• IEEE 802.1s MSTP - Multiple Spanning Tree Protocol
126
Chapter 15. How STP Works
127
Differences Between RSTP and STP
RSTP is a improvement to the legacy STP. It is able to reduce the time until convergence and reconfig-
uration of the topology occurs by implementing alternate and backup type ports, reducing port states,
enabling explicit proposal/agreement sequences on new designated ports and enabling instant forward-
ing on edge ports. The topology change mechanism was also improved, allowing a rapid propagation of
topology change information along the network.
RSTP is fully compatible with legacy STP bridges. Whenever a STP bridge is detected by a RSTP bridge,
the later will automatically start to send STP compatible BPDUs, guaranteeing a stable and loop-free
network.
128
Displaying STA Information
The STA Information pages allow you to see the parameters and states related to STA.
Spanning-tree information
-------------------------
Spanning tree mode: RSTP
MST name: test
MST revision: 1
DmSwitch 3000#
129
Displaying STA Instance Information
Use the STA Instance Information page to see the STA instance parameters configured on the switch.
Field Description
• Spanning Tree Mode - Whether the STA instance is RSTP (recommended), STP (legacy STP
compatibility mode) or MSTP.
• Spanning Tree State - The STA instance State.
• Bridge ID - The bridge ID of the instance. (Will be submitted by this switch in the next root bridge
election). It is the concatenation of the configured bridge priority and the bridge MAC address.
• Max Age - When the Max Age timer expires on a port, this port starts the process to become a Desig-
nated Port for its segment. If it is the root port, a new root port election will be executed.
• Hello Time - The time interval between two consecutive configuration messages sent by the root
bridge.(Or by this bridge, when it becomes the root bridge).
• Forward Delay - In a worst case scenario, the STA instance waits the expiration of this timer to
transit a port from blocking state to learning state, and from learning state to forwarding state.
• Designated Root -The root bridge ID of the spanning tree instance topology. (When STA is not
enabled for an instance, this value is equal to the bridge ID of it).
• Root port - The bridge port number that leads to the root bridge.
• Root path Cost - The path cost to reach the root bridge.
• Number of Topology Changes - Number of reconfigurations of the spanning tree instance
topology.
• Last Topology Change - Time elapsed since the last Topology Change.
• Members - The VLAN IDs of the spanning tree instance.
Example 15-2. Displaying Spanning Tree Information choosing an Instance via CLI:
DmSwitch 3000#show spanning-tree 1
Spanning-tree 1 information
---------------------------------------------------------------
Spanning tree mode: RSTP
Spanning tree state: Enabled
Priority: 0
Bridge Hello Time (sec.): 2
Bridge Max Age (sec.): 20
Bridge Forward Delay (sec.): 15
Root Hello Time (sec.): 2
Root Max Age (sec.): 20
Root Forward Delay (sec.): 15
Designated Root: 0.0004df0000eb
Current root port: 0
Current root cost: 0
Number of topology changes: 0
Last topology changes time (sec.) 5201
Members: VLAN 1
---------------------------------------------------------------
130
Chapter 15. Displaying STA Instance Information
131
Displaying STA Instance Port Information
Use the STA Instance Port Information page to see the STA instance port parameters configured.
Field Description
• STA Admin State - Displays weather the STA instance is enabled on the port or not.
• Role - Shows the port role: Designated (when it transmits traffic to/from this LAN segment through
this bridge to the root bridge), Root (a port that is part of the active topology that leads to the root
bridge), Alternate or Backup (a port that provides a redundant path on this switch or to another switch
in case a active root or designated port fails) and Disabled when the port does not participate in the
spanning tree instance.
• State - Shows the port state: Blocking (the port does not forward frames), Learning (the port does not
forward frames but learns MAC addresses), Forwarding (the port is forwarding frames).
• Designated Cost - In order to select the best path possible that leads to the root bridge, the STA
uses this parameter to calculate the cost along a port to the root bridge. The port with the lowest des-
ignated cost will be selected. This is the cost reported by the designated port on the LAN segment this
port is attached to.
• Priority - In case the designated cost being equal or greater on more than one port on the switch, the
port with the lowest priority value (highest priority) will be selected as member of the active topology.
Whenever more than one port present the same designated cost and priority, the port with lowest number
will be selected.
• Path Cost - Faster ports should be configured with lower path costs than slower ports.
• Designated Port - Priority and number of the designated port on the LAN segment this port is
attached to.
• Designated Root - Root bridge ID received from the designated bridge of the LAN this port is
attached to.
• Designated Bridge - Bridge ID of the designated bridge of the LAN segment this port is attached
to.
• Admin Edge Port - If enabled, the port is considered not to be attached to another bridge, so fast
transition to forwarding state will be achieved.
• Admin Link Type - Choose Point-to-Point if this port is directly attached to another bridge.
Choose Shared if this port is connected to a shared LAN segment (a segment with three or more
bridges, connected by a Hub). Leaving the Auto option will result in a point-to-point type link when
the port is forced (or auto-negotiates) to full-duplex communication and results in a shared type link
when half-duplex mode is operational.
• Oper Edge Port - The operational status of the edge (fast forwarding) mode.
• Oper Link Type - The operational link type of the port (see the Admin Link Type parameter above
for a detailed description of this filed)
132
Chapter 15. Displaying STA Instance Port Information
Example 15-3. Displaying Spanning Tree Port Information by selecting an Instance via CLI:
DmSwitch 3000#show spanning-tree 1 ethernet 1/1
Eth 1/ 1 information
---------------------------------------------------------------
STA admin state: Enabled
Role: Disabled
State: Disabled
Path cost: 200000
Priority: 128
Designated cost: 0
Designated port: 128.1
Designated Root: 0.000000000000
Designated Bridge: 0.000000000000
Admin edge port: Disabled
Admin Link type: auto
Oper edge port: Disabled
Oper Link type: point-to-point
DmSwitch 3000#
133
Configuring STA
• To configure the MST revision to 1 and set its name to "test", the next example illustrates it:
134
Configuring STA Instance Properties
Use the STA Instance Configuration page to configure each instance of the STA parameters such as state
and timers.
Command Attributes
• Spanning Tree State - Enables/Disables the spanning tree instance state.
• Priority - Set the desired Bridge Priority of the instance. This value will be used by STA in order to
elect the spanning tree root bridge. Lower values represents higher priorities to become the root bridge.
If all devices on the network use the same priority, the one with the lowest MAC address will be elected
the root bridge.
- Default: 32768 - Range: 0-61440, in steps of 4096. - Options: 0, 4096, 8192, 12288, 16384, 20480,
24576, 28672, 32768, 36864,40960, 45056, 49152, 53248, 57344, 61440
• Hello Time - Set the time interval (in seconds) used by the STA instance (only while being the root
bridge) between sending BPDUs.
• Maximum Age - Set the Maximum Age parameter (in seconds) for this instance that will be sent on
BPDUs by this switch while being the root bridge.
• Forward Delay - Set the Forward Delay parameter (in seconds) for this instance that will be sent
on BPDUs by this switch while being the root bridge.
• VLAN Members - Set the VLAN IDs to add it to a spanning tree instance.
* Note: Timer values are selected by default and can be changed as required.
• To add VLAN 1 to spanning tree instance 1, the next example illustrates it:
135
Configuring STA Instance Port Properties
The STA Instance Port Configuration allows you to set specific STA Port parameters for an instance.
Command Attributes
• Spanning Tree - Enables/Disables the STA on this port for an specific instance. Default: Enabled
• Priority - Set the priority of the port in steps of 16. Default: 128
• Path Cost - Set the path cost. Recommended values are: For 10 Mb/s links - Path Cost 2.000.000
For 100 Mb/s links - Path Cost 200.000 For 1 Gb/s links - Path Cost 20.000 For 10 Gb/s links - Path
Cost 2.000
• Admin Link Type - Choose Point-to-Point when the port is connected to only one bridge
partner. Choose Shared when the port is connected to more than one bridge partner (e.g a port con-
nected to a Hub with 3 bridges ). Choose Auto to let the switch choose the Admin Link Type based on
the link duplex state from the port. Default: Auto
• Admin Edge Port (Fast Forwarding) - Enable this option whenever the port is attached to
a end-station (not a bridge). Default: Disabled
136
Chapter 16. Ethernet Automatic Protection
Switching Configuration
The EAPS protocol provides fast protection switching to layer 2 switches interconnected in an Ethernet
ring topology, such as a metropolitan area network (MAN) or large campuses. EAPS protection switching
is similar to what can be achieved with the Spanning Tree Protocol (STP), but offers the advantage of
converging in less than a second when a link in the ring breaks.
To take advantage of the Spatial Reuse technology and broaden the use of the ring’s bandwidth, EAPS
supports multiple EAPS domains running on the ring at the same time.
EAPS operates by declaring an EAPS domain on a single ring. Any VLAN that warrants fault protection
is configured on all ring ports in the ring, and is then assigned to an EAPS domain. On that ring domain,
one switch, or node, is designated the master node, while all other nodes are designated as transit nodes.
One port of the master node is designated the master node’s primary port (P) to the ring; another port
is designated as the master node’s secondary port (S) to the ring. In normal operation, the master node
blocks the secondary port for all non-control traffic belonging to this EAPS domain. If the master node
detects a break in the ring, it unblocks its secondary port and allows data traffic to be transmitted and
received through it.
EAPS fault detection on a ring is based on a single control VLAN per EAPS domain. This EAPS domain
provides protection to one or more data-carrying VLANs called protected VLANs. The control VLAN is
used only to send and receive EAPS messages; the protected VLANs carry the actual data traffic.As long
as the ring is complete, the EAPS master node blocks the protected VLANs from accessing its secondary
port.
When the master node detects a failure, it declares a "failed" state and opens its logically blocked sec-
ondary port on all the protected VLANs. The master node also flushes its forwarding database (FDB)
and sends a message on the control VLAN to all of its associated transit nodes to flush their forwarding
databases.
137
Chapter 16. Enabling EAPS Globally
138
Disabling EAPS Globally
Disabling EAPS Globally via Web
• Open LAYER 2 - EAPS - EAPS Global Configuration. Unmark EAPS globally
enabled for the switch. Click Apply.
139
Creating an EAPS Domain
The name parameter is a character string of up to 32 characters that identifies the EAPS domain to be
created. EAPS domain names and VLAN names must be unique. Do not use the same name string to
identify both an EAPS domain and a VLAN.
Creating an EAPS via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Mark Create a new
domain and put the name of the new domain in the text box. Click Apply.
140
Deleting an EAPS Domain
Using the following command you will be able to delete EAPS.
Deleting an EAPS via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain to remove,
mark Remove this domain and click Apply.
141
Enabling EAPS for Domain
Using the following command you will be able to enable EAPS. EDP must be enabled on the switch and
EAPS ring ports.
Enabling EAPS for Domain via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
enable, mark Enabled for Domain Operation. Click Apply.
142
Disabling EAPS for Domain
Using the following command you will be able to disable EAPS for domain. Select the domain you want
to disable, unmark Enabled for Domain Operation. Click Apply.
Disabling EAPS for Domain via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
disable, unmark Enabled for Domain Operation. Click Apply.
143
Adding a Control VLAN
You must configure one control VLAN for each EAPS domain. The control VLAN is used only to send
and receive EAPS messages.
The VLAN that will act as the control VLAN must be configured as follows:
• The VLAN must NOT be assigned an IP address, to avoid loops in the network.
• Only ring ports may be added as members of the control VLAN.
• The ring ports of the control VLAN must be tagged. This ensures that EAPS control VLAN traffic is
serviced before any other traffic and that control VLAN messages reach their intended destinations.
• The control VLAN must be assigned a QoS profile of QP8 with the QoS profile priority setting
HighHi.
144
Deleting a Control VLAN
Using the following command you will be able to delete a control VLAN.
Deleting a Control VLAN via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Choose (none) in Control VLAN. Click Apply.
145
Adding a Protected VLAN
You must configure one or more protected VLANs for each EAPS domain. The protected VLANs are the
data-carrying VLANs.
When you configure the VLAN that will act as a protected VLAN, the ring ports of the protected VLAN
must be tagged (except in the case of the default VLAN). As long as the ring is complete, the master node
blocks the protected VLANs on its secondary port.
Adding a Protected VLAN via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Choose a VLAN ID in Protected VLANs. Click Add.
146
Deleting a Protected VLAN
Using the following command you will be able to delete a protected VLAN.
Deleting a Protected VLAN via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Choose a VLAN ID in Protected VLANs. Click Remove.
147
Configuring Failtime
Use the failtime keyword and its associated seconds parameter to specify the amount of time the
master node waits before declaring a failed state and opens the logically blocked VLANs on the secondary
port. seconds must be greater than the configured value for hellotime. The default value is three
seconds.
Increasing the failtime value provides more protection against frequent "flapping" between the com-
plete state and the failed state by waiting long enough to receive a health-check packet when the network
is congested.
When the master node declared a failed state, it also flushes its forwarding database (FDB) and sends a
"flush FDB" message to all the transit switches on the ring by way of the control VLAN. The reason for
flushing the FDB is so that the switches can relearn the new directions to reach layer 2 end stations via
the reconfigured topology.
Configuring Failtime via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Put the new value in Fail timer interval and click Apply.
148
Configuring Hellotime
Use hellotime keyword and its associated seconds parameter to specify the amount of time the
master node waits between transmissions of health-check packets on the control VLAN. Increasing the
hellotime value keeps the processor from sending and processing too many health-check packets.
Increasing the hellotime value should not affect the network convergence time, because transit nodes
are already sending "link down" notifications.
This command applies only to the master node. If you configure the polling timers for a transit node, they
will be ignored. If you later reconfigure that transit node as the master node, the polling timer values will
be used as the current values.
Configuring Hellotime via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Put the new value in Hello timer interval and click Apply.
149
Configuring EAPS Mode
Using the following command you will be able to set the EAPS mode of the node.
Configuring EAPS Mode via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Mark Master or Transit for Mode for the domain and click Apply.
150
Configuring EAPS Port
Each node on the ring connects through two ring ports. One port must be configured as the primary port;
the other must be configured as the secondary port.
Configuring EAPS Port via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. For both ports, select in Primary Port and Secondary Port the Unit and Port or
Port-Channel. Click Apply.
151
Removing EAPS Port Configuration
Unconfiguring an EAPS port sets its internal configuration state to INVALID, which causes the port to
appear in the Idle state with a port status of Unknown when you use the show eaps detail command
to display the status information about the port.
Removing EAPS Port Configuration via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want
to configure. For both ports, just select (none) for Port and Port-Channel in Primary Port or
Secondary Port to remove the configuration.
152
Configuring EAPS Name
Using the following command you will be able to rename an existing EAPS domain.
Configuring EAPS Name via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the domain you want to
configure. Mark Rename the domain and insert the new domain name in the text box.
153
Displaying EAPS Summary
Displays EAPS domains and associated info such as Domain Name, Domain State, EAPS Mode, Enabled
State, Control VLAN and VLAN ID and the Number of Protect VLANs in the domain. This is helpful
when viewing the status info for large number of EAPS domains quickly.
Displaying EAPS Summary via CLI
• The next example illustrates how to Display EAPS Summary via CLI.
DmSwitch 3000(config)#
154
Displaying EAPS Information
If you enter show eaps command without a keyword, the command displays less than with the detail
keyword.
Use the optional domain name parameter to display status information for a specific EAPS domain.
The output displayed by this command depends on whether the node is a transit node or a master node.
The display for a transit node contains information fields that are not shown for a master node. Also, some
state values are different on a transit node than on a master node.
Displaying EAPS Information via Web
• Open LAYER 2 - EAPS - EAPS Domain Configuration. Select the Domain Name to see
the configuration.
DmSwitch 3000(config)#
155
Chapter 17. Class of Service Configuration
Class of Service (CoS) allows you to specify which data packets have greater precedence when traffic is
buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each
port. Data packets in a port’s high-priority queue will be transmitted before those in the lower-priority
queues. You can set the default priority for each interface, and configure the mapping of frame priority
tags to the switch’s priority queues.
Command Attributes
• Default Priority * - The priority that is assigned to untagged frames received on the specified
interface. (Range: 0-7; Default: 0)
• Number of Egress Traffic Classes - The number of queue buffers provided for each port.
156
Chapter 17. Setting the Default Priority for Interfaces
157
Mapping CoS Values to Egress Queues
This switch processes Class of Service (CoS) priority tagged traffic by using eight priority queues for each
port, with service schedules based on Strict Priority(SP), Round Robin (a exception of WRR), Weighted
Round Robin (WRR) and Weighted Fair Queuing (WFQ). Up to eight separate traffic priorities are defined
in IEEE 802.1p. The default priority levels are assigned according to recommendations in the IEEE 802.1p
standard as shown in the following table.
Queue 1 2 3 4 5 6 7 8
Priority 0 1 2 3 4 5 6 7
The priority levels recommended in the IEEE 802.1p standard for various network applications are shown
in the following table. However, you can map the priority levels to the switch’s output queues in any way
that benefits application traffic for your own network.
Command Attributes
• Priority - CoS value. (Range: 0-7, where 7 is the highest priority)
• Traffic Class * - Output queue buffer. (Range: 1-8, where 8 is the highest CoS priority queue)
158
Chapter 17. Mapping CoS Values to Egress Queues
159
Selecting the Queue Mode
Once packets are mapped into CoS queues, they are forwarded depending upon the scheduling algorithm
selected. The five possible configurations are:
• SP + WRR
• SP + WFQ
• SP - Strict Priority services the egress queues in sequential order. Any packets residing in the higher
priority queues are transmitted first. Only when these queues are empty, packets of the next lower
priority are allowed to be transmitted.
• RR - Round-Robin is a particular case from the Weighted Round-Robin mode (all the queues with
weight one ). In this configuration packets in each of the CoS queues have an equal opportunity to
send packets. Even though several packets may be available in a higher-priority queue, it will only be
allowed to send a packet after all the other queues get their chance.
• WRR - Weighted Round-Robin shares bandwidth at the egress ports by using the queue configured
weights. All queues are programmed with weights according to desired packet distribution. The unit
of the weights is one packet, not depending the packet size. The bandwidth distribution between two
queues weighted by one and nine is not, necessarily, 10% and 90%. The distribution will be one packet
to the first queue for nine packets to the second queue.
• WFQ - Weighted Fair Queuing scheduler mode provides a certain bandwidth minimum to all queues.
Configured guaranteed bandwidth is first supplied per queue and any ramaining badwidth up to the
configured maximum bandwidth is distributed in round-robin fashion.
In any schedule mode, one or more queues can be seted as strict priority queue (Combination Queuing).
This queues always will have their packets transmitted first, until it get empty. After that others queues
will have their chance according to the schedule mode rules.
Selecting the Queue Mode via CLI
• The next examples shows how to select the schedule mode via CLI.
160
Chapter 17. Selecting the Queue Mode
161
Setting the Maximum Bandwidth for CoS Queues
This switch can limit the bandwidth in the egress port queues. This setting, unlike the port schedule mode
that must be configured by groups, can assume diferentre values per port per queue. This value is always
respected independent of the selected schedule mode or minimum bandwidth.
Setting the Maximum Bandwidth for CoS queues via CLI
• The next example shows how to set the maximum bandwidth to a port via CLI.
Example 17-5. Setting the Service Weight for Traffic Classes via CLI
DmSwitch 3000(config)#qos max-bw 10000 unlimited 30000 40000 50000 60000
unlimited unlimited ethernet 1/20
DmSwitch 3000(config)#exit
DmSwitch 3000(config)#show qos config ethernet 20
------+-------+------+--------+--------+--------+----------+
PORT | QUEUE | MODE | MAX-BW | MIN-BW | WEIGHT | SP-QUEUE |
------+-------+------+--------+--------+--------+----------+
1/20 | 1 | WRR | 10048 | ------ | 1 | NO |
1/20 | 2 | WRR | unlimi | ------ | 2 | NO |
1/20 | 3 | WRR | 30016 | ------ | 4 | NO |
1/20 | 4 | WRR | 40000 | ------ | 6 | NO |
1/20 | 5 | WRR | 50048 | ------ | 8 | NO |
1/20 | 6 | WRR | 60032 | ------ | 10 | NO |
1/20 | 7 | WRR | unlimi | ------ | 12 | NO |
1/20 | 8 | WRR | unlimi | ------ | 14 | NO |
------+-------+------+--------+--------+--------+----------+
DmSwitch 3000#
162
Loading Auto-QoS Configuration
This switch uses the Strict Priority (SP) algorithm as the schedule mode of auto-QoS. Enabling auto-QoS,
filters are created and CoS Precedences assigned based on DSCP label on the ingress packets to reproduce
in the egress queues a behavior as described in the following table.
163
Chapter 17. Loading Auto-QoS Configuration
164
Chapter 18. Packet Filters
In this chapter will be shown how to create packet filters. Some examples will be given showing that are
more than one way to create the same filter because some parameters have no order of precedence. This
chapter purpose is to give you an overview of what can be done to control packet flow through the switch.
165
Figure 18-1. This figure gives an idea of the protocol parts that are analysed by the filters.
166
Chapter 18. Displaying Filter Information
167
Chapter 18. Displaying Filter Information
Actions: vlan 5
Matches: All packets
Ingress:
DmSwitch 3000#
168
Creating and Editing Filters
Command Attributes
• New - Creates a new filter.
• ID - Selects a filter to edit by its ID.
Filter Matching
Command Attributes
• 802.1p - Make the switch find matches by 802.1p priority.
• All - Matches all traffic. (Default option for new filters)
• Destination IP - Find matches by packet destination IP address.
• Destionation MAC - Find matches by packet destination MAC address.
• Destionation Port - Find matches by packet destination Port.
• DSCP - Matches by IP DSCP field.
• Ethertype - Selects packets by EtherType field.
• Protocol - Matches by L4 protocol from IP type field.
• Source IP - Find matches by packet source IP address.
• Source MAC - Find matches by packet source MAC address.
• Source Port - Find matches by packet source Port.
• ToS Bits - Selects packets by IP ToS lower bits value.
• ToS Precedence - Matches by IP ToS Precedence.
• VLAN - The switch will find matches based on the VLAN ID specified.
Example 18-2. Creating a filter via CLI which matches packets with 802.1p priority.
DmSwitch 3000(config)#filter new match 802.1p 3 action permit
Filter 1 created.
DmSwitch 3000(config)#
169
Matching all packets
Creating a filter via CLI which matches all packets
• The next example show how to create a filter via CLI which matches all packets.
Example 18-3. Creating a filter via CLI which matches all packets.
DmSwitch 3000(config)#filter new match all action permit
Filter 2 created.
DmSwitch 3000(config)#
170
Matching by destination IP
Creating a filter via CLI which matches packets by their destination/source IP
• The next example show how to create a filter via CLI which matches packets by their destination IP.
Example 18-4. Creating a filter via CLI which matches packets by their destination IP.
DmSwitch 3000(config)#filter new match destination-ip 192.168.10.0 255.255.255.0 action permit
Filter 3 created.
DmSwitch 3000(config)#
171
Matching by destination/source MAC address
Creating a filter via CLI which matches packets by their destination MAC address
• The next example show how to create a filter via CLI which matches packets by their destination MAC
address. Followed by the MAC address, a bitmask must be supplied. In this example, all traffic from
the products of DATACOM manufacturer (00-04-DF) will be accepted by the switch.
172
Matching by destination/source port
Creating a filter via CLI which matches packets by their destination port
• The next example show how to create a filter via CLI which matches packets by their destination port.
Example 18-6. Creating a filter via CLI which matches packets by their destination port.
DmSwitch 3000(config)#filter new match destination-port 0-22 action permit
Filter 5 created.
DmSwitch 3000(config)#
173
Matching by IP DSCP field
Creating a filter via CLI which matches packets by their IP DSCP field
• The next example show how to create a filter via CLI which matches packets by their IP DSCP field
Example 18-7. Creating a filter via CLI which matches packets by their IP DSCP field
DmSwitch 3000(config)#filter new match dscp 60 action permit
Filter 6 created.
DmSwitch 3000(config)#
174
Selecting packets by EtherType field
Creating a filter via CLI that selects packets by EtherType field
• The next example show how to create a filter via CLI that selects packets by EtherType field. This filter
permits IPv6 (0x86DD) traffic.
Example 18-8. Creating a filter via CLI that selects packets by EtherType field.
DmSwitch 3000(config)#filter new match ethertype 0x86DD action permit
Filter 7 created.
DmSwitch 3000(config)#
175
Matching by L4 protocol
Creating a filter via CLI that matches by L4 protocol
• The next example show how to create a filter via CLI that matches by L4 protocol. In this filter, the IP
type field will be used to match.
176
Selecting packets by IP ToS lower bits
Creating a filter via CLI that selects packets by IP ToS lower bits
• The next example show how to create a filter via CLI that selects packets by its IP ToS lower bits with
value 12.
Example 18-10. Creating a filter via CLI that selects packets by IP ToS lower bits.
DmSwitch 3000(config)#filter new match tos-bits 12 action permit
Filter 9 created.
DmSwitch 3000(config)#
177
Matching by IP ToS Precedence
Creating a filter via CLI that matches packets by IP ToS Precedence
• The next example show how to create a filter via CLI that matches packets by IP ToS Precedence.
Example 18-11. Creating a filter via CLI that matches packets by IP ToS Precedence.
DmSwitch 3000(config)#filter new match tos-precedence 5 action permit
Filter 10 created.
DmSwitch 3000(config)#
178
Selecting traffic by packet VLAN ID
Creating a filter via CLI which selects traffic by packet VLAN ID
• The next example show how to create a filter via CLI which selects traffic by packet VLAN ID.
Example 18-12. Creating a filter via CLI which selects traffic by packet VLAN ID.
DmSwitch 3000(config)#filter new match vlan 5 action permit
Filter 11 created.
DmSwitch 3000(config)#
179
Filtering Actions
Command Attributes
• Permit - Gives permission for some kind of traffic.
• Deny - Denies traffic.
• Monitor - Monitors packets.
• 802.1p - Sets a 802.1p priority value.
• 802.1p from ToS - Sets a 802.1p priority from IP ToS Precedence.
• Drop Precedence - Internally sets packet drop precedence.
• DSCP - Sets Differentiated Services Code Point.
• ToS - Sets IP ToS Precedence value.
• ToS from 802.1p - Sets IP ToS Precedence from 802.1p priority.
• VLAN - Sets the defined VLAN ID to the packet.
Giving Permission
Creating a filter via CLI that gives permission
• The next example show how to create a filter via CLI that gives permission.
is the same as
DmSwitch 3000(config)#filter new enable match destination-ip 192.168.200.254 255.255.255.0
action permit
Filter 12 created.
DmSwitch 3000(config)#
180
Revoking Access
Creating a filter via CLI that denies traffic
• The next example show how to create a filter via CLI that denies traffic.
181
Monitoring Traffic
Creating a filter via CLI to monitor traffic
• The next example show how to create a filter via CLI to monitor traffic. In this example, packets coming
from ethernet 1 will me monitored to ethernet 12.
182
Setting 802.1p Priority Value
Creating a filter via CLI with a 802.1p priority value
• The next example show how to create a filter via CLI with a 802.1p priority value.
Example 18-16. Creating a filter via CLI with a 802.1p priority value.
DmSwitch 3000(config)#filter match ethertype 0x0800 action 802.1p 2
Filter 15 created.
DmSwitch 3000(config)#
183
Setting 802.1p Priority from IP ToS Precedence
Creating a filter via CLI with a 802.1p priority from IP ToS Precedence
• The next example show how to create a filter via CLI which sets the 802.1p priority value derived from
the IP ToS Precedence table.
Example 18-17. Creating a filter via CLI with a 802.1p priority from IP ToS Precedence.
DmSwitch 3000(config)#filter new match destination-port 22 action 802.1p-from-tos
Filter 16 created.
DmSwitch 3000(config)#
184
Dropping Precedence
Creating a filter via CLI for packet drop precedence
• The next example show how to create a filter via CLI for packet drop precedence.
Example 18-18. Creating a filter via CLI for packet drop precedence.
DmSwitch 3000(config)#filter match dscp 33 new action drop-precedence
Filter 17 created.
DmSwitch 3000(config)#
185
Setting Differentiated Services Code Point
Creating a filter via CLI with Differentiated Services Code Point
• The next example show how to create a filter via CLI with Differentiated Services Code Point.
Example 18-19. Creating a filter via CLI with Differentiated Services Code Point.
DmSwitch 3000(config)#filter new match protocol tcp action dscp 60
Filter 18 created.
DmSwitch 3000(config)#
186
Setting IP ToS Precedence value
The Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different
priority levels ranging from highest priority for network control packets to lowest priority for routine traf-
fic. The default IP Precedence values are mapped one-to-one to Class of Service values (i.e., Precedence
value 0 maps to CoS value 0, and so forth). Bits 6 and 7 are used for network control, and the other bits
for various application types. ToS bits are defined in the following table.
Example 18-20. Creating a filter via CLI with IP ToS Precedence value.
DmSwitch 3000(config)#filter new match source-port 80 action tos 2
Filter 19 created.
DmSwitch 3000(config)#
187
Setting IP ToS Precedence from 802.1p Priority
Creating a filter via CLI with IP ToS Precedence from 802.1p priority
• The next example show how to creating a filter via CLI with IP ToS Precedence from 802.1p priority.
Example 18-21. Creating a filter via CLI with IP ToS Precedence from 802.1p priority.
DmSwitch 3000(config)#filter new match 802.1p 1 action tos-from-802.1p
Filter 20 created.
DmSwitch 3000(config)#
188
Setting a VLAN ID to a packet
Creating a filter via CLI that sets packet VLAN ID
• The next example show how to create a filter via CLI that sets packet VLAN ID.
Example 18-22. Creating a filter via CLI that sets packet VLAN ID.
DmSwitch 3000(config)#filter new match vlan 2 action vlan 5
Filter 21 created.
DmSwitch 3000(config)#
189
Filtering Ingress
Command Attributes
• Ingress Ethernet - Defines from where the packets will come. (Default: none)
Creating a filter via CLI that gives permission to a packet selecting it by its ingress port
• The next example show how to create a filter via CLI that allows packets coming from ethernet 10.
Example 18-23. Creating a filter via CLI that selects packets by its ingress port.
DmSwitch 3000(config)#filter new action permit ingress ethernet 10
Filter 22 created.
DmSwitch 3000(config)#
Creating a filter via CLI that denies packets coming from a defined port
• The next example show how to create a filter via CLI that denies packets coming from ethernet 10.
Example 18-24. Creating a filter via CLI that selects packets by its ingress port.
DmSwitch 3000(config)#filter new action deny ingress ethernet 10
Filter 23 created.
DmSwitch 3000(config)#
190
Remarked Filters
Command Attributes
• Remark - Adds a remark or a descriptive text to the filter.
191
Setting Priorities to Filters
The act of setting priorities is basically used to solve problems with filters with the same matches and
conflicting actions. For example, if you have two filters with matches for an IP packet with actions of
deny and permit respectively then the only the filter with the higher priority will be applied. The range of
priorities varies between 0 and 14 and the higher value the higher will be the priority set to the filter.
Command Attributes
• Priority - Adds a priority to a filter.
192
Chapter 19. IGMP
This chapter describes the advantages of using multicast and how to configure Internet Group Manage-
ment Protocol (IGMP) snooping and query on the DmSwitch 3000.
Multicast is a feature that allows a more efficient use of real-time applications such as streaming video
or videoconferecing on the network. There are typically three types of transmission techniques used to
implement this kind of applications: broadcast, unicast and multicast.
In the broadcast scenario, the streaming server sends only one copy of the stream to all hosts on the
network. In this case, traffic will be sent even to clients that are not interested in receiving the data stream,
generating waste of bandwidth.
193
Chapter 19. IGMP
In the unicast scenario, we usually have a streaming server that sends packets to all desired clients on the
network. In this case, multiple copies of the same data streaming are sent separately from the server to
each client. Note that this approach leads to a traffic overload on the server link as the number of clients
grows.
In the multicast scenario, the streaming server does not have to establish a separate connection with each
client, it simply registers its multicast service with the local switch and starts to send the data stream.
The clients equally register with the local switch or router its multicast group and start to receive the data
stream. IGMP can be used in order to do the registration task on the network.
194
Figure 19-3. Multicast Traffic
The IGMP snooping feature allows the switch to snoop on multicast group membership reports sent
by multicast clients and servers to the multicast router, so it can forward traffic only to the registered
interfaces, alleviating the load on the server link and improving the overall network performance.
If there is no multicast routing on other router/switches in the network, this switch can also act as an
IGMP Snooping and Querier, in order to actively discover multicast clients on the network and establish
an efficient multicast topology. Acting as a querier, the switch sends IGMP queries in order to discover
where are the multicast clients. A static IGMP router interface can also be configured on a port, indicating
the presence of a multicast router/switch querier on the network. Static multicast entries can also be
entered, allowing a more strict control over the multicast registration procedure.
This switch supports the following IGMP features:
• IGMP versions 1, 2 and 3
• IGMP Snooping
• IGMP Snooping and Querier
195
Configuring IGMP
This switch can be configured to snoop IGMP membership report messages. You can additionally config-
ure it to act as a IGMP querier. Use the querier option when there is no other querier on the network or
when using a backup querier scheme.
Command Attributes
• IGMP Status - Enables/Disables the IGMP Snooping option on the switch.
• Querier Status - Choose if the switch will act as a IGMP Snooping and Querier.
• IGMP Query Count (2-10) - Sets the number of queries without response the switch waits be-
fore removing the multicast entries from its forwarding table.
• IGMP Query Interval (60-125) - Sets the time interval between sending queries.
• IGMP Report Delay (5-25) - Set the maximum response time a host waits before replying with
a membership report to a querier.
• IGMP Query Timeout (300-500) - Sets the time interval the switch waits for a query before
removing the mrouter entry from its forwarding table.
• IGMP Version(1,2,3) - Sets the IGMP version used by the switch.
• IGMP Query IP Address - Sets the IP address used by the switch when sending IGMP queries.
* Note: In some cases where more than one switch is configured as querier on the network, the switch with the lowest IP address will
be elected as querier. When the IGMP IP is not configured, the switch will use the first available IP from its IP interfaces. IGMP
querier functions will not work without a source IP address.
196
Chapter 19. Configuring IGMP Snooping and Querier
197
Configuring IGMP Static Entries
In order to ensure that a multicast router or multicast group will be permanently registered on the switch,
you can configure static entries on the interfaces connected to routers or multicast clients. By doing this,
every port configured and connected to a multicast router will register all the multicast groups inside the
corresponding VLAN. This means that every membership report will be forwarded to the multicast router,
so it will be able to forward multicast traffic properly.
By configuring a static multicast IP entry on an interface, the switch will always forward multicast traffic
for this group on this port, independently on the reception of membership reports for this group.
Command Attributes
• Interface - Selects whether a port or a port-channel will be configured.
• VLAN ID - Choose the VLAN that will propagate the multicast traffic for this entry.
• Port or Port-Channel - Selects the interface that will be attached to a multicast router or multicast
group.
• Multicast IP Address - Sets the group multicast IP address that will be registered on the inter-
face.
Figure 19-5. Configuring IGMP Static Multicast Router Port via Web
Example 19-2. Configuring IGMP Static Multicast Router Port via CLI
DmSwitch 3000(config)#ip igmp snooping vlan 1 mroute ethernet 1
DmSwitch 3000(config)#
198
Chapter 19. Configuring IGMP Static Entries
199
Displaying IGMP Information
200
Displaying IGMP Static Information
Displaying IGMP Static Information via Web
• Open IGMP Snooping - Static Multicast Router Port Configuration or IGMP
Snooping - IGMP Member Port Table .
201
Chapter 20. Static Routing
This switch provides wire-speed layer 3 (IP) routing. It can work with static routes, and it can also ex-
change information with others routers on the network using RIP (Routing Information Protocol) and
OSPF (Open Shortest Path First) protocols, dynamically building and maintaining its routing table.
Router Interfaces
The switch routes packets between router interfaces. A router interface is simply a VLAN that has an IP
address assigned to it.
202
Static Routes
Static routes are manually entered into the routing table. They can be used to reach networks not advertised
by routers, or in simple configurations where it is not desirable to run routing protocols.
Command Attributes
• Subnet - Network subnet (IP address/prefix length).
• Gateway - IP address of gateway.
203
Hardware Tables
In this switch routing is done by hardware, using two tables:
Hardware Tables
• A host table, which maps directly connected hosts’ IP addresses to MAC/VLAN/Port.
• A longest prefix match (LPM) table, which maps subnets to gateway MAC/VLAN/Port.
204