Amer.com SS3GR50i User manual

SS3GR50i / SS3GR26i
L3 Gigabit Ethernet Switch
With IP Stacking
CONFIGURATION GUIDE
(ver 2.1)

Phone: 1-800-262-9703
info@amer.com
support@amer.com
© Amer.com Corp., 1997-2008 All rights reserved. No part of this publication may be reproduced in
any form or by any means or used to make any derivative such as translation, transformation, or
adaptation without permission from Amer.com, as stipulated by the United States Copyright Act of
1976.
Amer.com reserves the right to make changes to this document and the products which it describes
without notice. Amer.com shall not be liable for technical or editorial errors or omissions made herein;
nor for incidental or consequential damages resulting from the furnishing, performance, or use of this
material.
Amer.com is a registered trademark of Amer.com. All other trademarks and trade names are
properties of their owners.

Overview
SS3GR50i/26i L3 Gigabit Ethernet Switch is a high performance routing switch released can
be deployed as an aggregation device for enterprise and campus networks.
SS3GR50i/26i L3 Gigabit Ethernet Switch supports a variety of network interfaces from
100Mb, 1000Mb to 10 GB Ethernet.
We strongly recommend you to read through this manual before starting the installation
and configuration to avoid possible malfunction or damage to the switch.

TABLE OF CONTENTS
Chapter 1 Switch Management............................................................................................10
1.1 Management Options..................................................................................................... 10
1.1.1 Out-Of-Band Management .........................................................................................10
1.1.2 In-band Management .................................................................................................13
1.1.3 Management Via Telnet..............................................................................................13
1.1.4 Management Via HTTP..............................................................................................15
1.2 Management Interface ................................................................................................... 17
1.2.1 CLI Interface...............................................................................................................17
1.2.2 Configuration Modes ..................................................................................................17
1.2.3 Configuration Syntax ..................................................................................................21
1.2.4 Shortcut Key Support .................................................................................................21
1.2.5 Help Function .............................................................................................................22
1.2.6 Input Verification.........................................................................................................23
1.2.7 Fuzzy Match Support..................................................................................................23
Chapter 2 Basic Switch Configuration................................................................................25
2.1 Basic Configuration........................................................................................................ 25
2.2 Telnet Management........................................................................................................ 25
2.2.1 Telnet..........................................................................................................................25
2.2.2 SSH27
2.3 Configurate Switch IP Addresses................................................................................... 29
2.3.1 Switch IP Addresses Configuration Task List..............................................................29
2.4 SNMP Configuration ...................................................................................................... 30
2.4.1 Introduction To SNMP.................................................................................................30
2.4.2 Introduction to MIB .....................................................................................................32
2.4.3 Introduction to RMON.................................................................................................33
2.4.4 SNMP Configuration Task List....................................................................................33
2.4.5 Typical SNMP Configuration Examples ......................................................................36
2.4.6 SNMP Troubleshooting...............................................................................................37
2.5 Switch Upgrade..............................................................................................................37
2.5.1 Switch System Files ...................................................................................................38
2.5.2 BootROM Upgrade.....................................................................................................38
2.5.3 FTP/TFTP Upgrade....................................................................................................40
Chapter 3 Cluster Configuration..........................................................................................49
3.1 Introduction to cluster network management ................................................................. 49

3.2 Cluster Network Management Configuration Sequence ................................................ 49
3.3 Examples of Cluster Administration ............................................................................... 51
3.4 Cluster Administration Troubleshooting.......................................................................... 52
Chapter 4 Port Configuration...............................................................................................54
4.1 Introduction to Port......................................................................................................... 54
4.2 Network Port Configuration Task List ............................................................................. 54
4.3 Port Configuration Example ........................................................................................... 56
4.4 Port Troubleshooting...................................................................................................... 56
Chapter 5 Port Isolation Function Configuration...............................................................58
5.1 Introduction to Port Isolation Function............................................................................ 58
5.2 Task Sequence of Port Isolation..................................................................................... 58
5.3 Typical Examples of Port Isolation Function................................................................... 59
Chapter 6 Port Loopback Detection Function Configuration............................................61
6.1 Introduction to Port Loopback Detection Function ......................................................... 61
6.2 Port Loopback Detection Function Configuration Task List ............................................ 61
6.3 Port Loopback Detection Function Example .................................................................. 62
6.4 Troubleshooting Help on Port Loopback Detection ........................................................ 63
Chapter 7 Port Channel Configuration................................................................................64
7.1 Introduction to Port Channel .......................................................................................... 64
7.2 Port Channel Configuration Task List............................................................................. 65
7.3 Port Channel Example ................................................................................................... 66
7.4 Port Channel Troubleshooting........................................................................................ 68
Chapter 8 Jumbo Configuration ..........................................................................................69
8.1 Jumbo Introduction ........................................................................................................ 69
8.2 Jumbo Configuration Task Sequence ............................................................................ 69
Chapter 9 VLAN Configuration ............................................................................................70
9.1 VLAN Configuration ....................................................................................................... 70
9.1.1 Introduction to VLAN ..................................................................................................70
9.1.2 VLAN Configuration Task List.....................................................................................71
9.1.3 Typical VLAN Application............................................................................................73
9.2 GVRP Configuration....................................................................................................... 74
9.2.1 Introduction to GVRP..................................................................................................74
9.2.2 GVRP Configuration Task List ....................................................................................75
9.2.3 Typical GVRP Application...........................................................................................75
9.2.4 GVRP Troubleshooting...............................................................................................77
9.3 Dot1q-tunnel Configuration ............................................................................................ 77

9.3.1 Dot1q-tunnel Introduction ...........................................................................................77
9.3.2 Dot1q-tunnel Configuration.........................................................................................78
9.3.3 Typical Applications Of The Dot1q-tunnel...................................................................79
9.3.4 Dot1q-tunnel Troubleshooting.....................................................................................80
9.4 VLAN-translation Configuration...................................................................................... 80
9.4.1 VLAN-translation Introduction.....................................................................................80
9.4.2 VLAN-translation Configuration..................................................................................80
9.4.3 Typical application of VLAN-translation ......................................................................81
9.4.4 VLAN-translation Troubleshooting..............................................................................82
9.5 Dynamic VLAN Configuration ........................................................................................ 82
9.5.1 Dynamic VLAN Introduction........................................................................................82
9.5.2 Dynamic VLAN Configuration.....................................................................................83
9.5.3 Typical Application Of The Dynamic VLAN.................................................................85
9.5.4 Dynamic VLAN Troubleshooting.................................................................................86
9.6 Voice VLAN Configuration.............................................................................................. 86
9.6.1 Voice VLAN Introduction.............................................................................................86
9.6.2 Voice VLAN Configuration..........................................................................................87
9.6.3 Typical Applications Of The Voice VLAN .................................................................... 87
9.6.4 Voice VLAN Troubleshooting......................................................................................88
Chapter 10 MAC Table Configuration.................................................................................... 89
10.1 Introduction to MAC Table............................................................................................ 89
10.1.1 Obtaining MAC Table................................................................................................89
10.1.2 Forward or Filter.......................................................................................................91
10.2 Mac Address Table Configuration Task List.................................................................. 92
10.3 Typical Configuration Examples ................................................................................... 93
10.4 Troubleshooting ........................................................................................................... 93
10.5 MAC Address Function Extension................................................................................ 94
10.5.1 MAC Address Binding...............................................................................................94
Chapter 11 MSTP Configuration............................................................................................ 97
11.1 MSTP Introduction........................................................................................................ 97
11.1.1 MSTP Region............................................................................................................97
11.1.2 Port Roles.................................................................................................................98
11.1.3 MSTP Load Balance.................................................................................................99
11.2 MSTP Configuration Task List ...................................................................................... 99
11.3 MSTP Example .......................................................................................................... 102
11.4 MSTP Troubleshooting............................................................................................... 106

Chapter 12 QoS Configuration............................................................................................. 107
12.1 Introduction to QoS .................................................................................................... 107
12.1.1 QoS Terms..............................................................................................................107
12.1.2 QoS Implementation...............................................................................................108
12.1.3 Basic QoS Model....................................................................................................109
12.2 QoS Configuration Task List....................................................................................... 112
12.3 QoS Example............................................................................................................. 116
12.4 QoS Troubleshooting ................................................................................................. 118
Chapter 13 PBR Configuration............................................................................................. 119
13.1 Introduction to PBR.................................................................................................... 119
13.2 PBR configuration ...................................................................................................... 119
13.3 PBR examples ........................................................................................................... 119
Chapter 14 Flow-based Redirection ....................................................................................121
14.1 Introduction to Flow-based Redirection...................................................................... 121
14.2 Flow-based Redirection Configuration Task Sequence.............................................. 121
14.3 Flow-based Redirection Examples............................................................................. 122
14.4 Flow-based Redirection Troubleshooting Help........................................................... 122
Chapter 15 L3 Forward Configuration................................................................................. 124
15.1 Layer 3 Interface ........................................................................................................ 124
15.1.1 Introduction to Layer 3 Interface ............................................................................. 124
15.1.2 Layer 3 Interface Configuration Task List ...............................................................124
15.2 IP Configuration ......................................................................................................... 125
15.2.1 Introduction to IPv4, IPv6 .......................................................................................125
15.2.2 IP Configuration......................................................................................................127
15.2.3 IP Configuration Examples .....................................................................................133
15.2.4 IPv6 Troubleshooting..............................................................................................137
15.3 IP Forwarding............................................................................................................. 137
15.3.1 Introduction to IP Forwarding..................................................................................137
15.3.2 IP Route Aggregation Configuration Task............................................................... 138
15.4 URPF ......................................................................................................................... 138
15.4.1 URPF Introduction..................................................................................................138
15.4.2 URPF Configuration Task Sequence...................................................................... 139
15.4.3 URPF Troubleshooting ...........................................................................................139
15.5 ARP............................................................................................................................ 140
15.5.1 Introduction to ARP.................................................................................................140
15.5.2 ARP Configuration Task List...................................................................................140

15.5.3 ARP Troubleshooting..............................................................................................141
Chapter 16 ARP Scanning Prevention Function Configuration........................................ 142
16.1 Introduction to ARP Scanning Prevention Function ................................................... 142
16.2 ARP Scanning Prevention Configuration Task Sequence .......................................... 142
16.3 ARP Scanning Prevention Typical Examples ............................................................. 145
16.4 ARP Scanning Prevention Troubleshooting Help ....................................................... 145
Chapter 17 Prevent ARP, ND Spoofing Configuration .......................................................147
17.1 Overview.................................................................................................................... 147
17.1.1 ARP ( Address Resolution Protocol).......................................................................147
17.1.2 ARP Spoofing.........................................................................................................147
17.1.3 How to prevent void ARP/ND Spoofing for our Layer 3 Switch...............................147
17.2 Prevent ARP, ND Spoofing configuration ................................................................... 148
17.3 Prevent ARP, ND Spoofing Example.......................................................................... 149
Chapter 18 ARP GUARD Configuration............................................................................... 151
ARP GUARD Introduction .................................................................................................. 151
ARP GUARD Configuration Task List................................................................................. 152
Chapter 19 Arp local proxy Configuration..........................................................................153
Introduction to Arp local proxy function .............................................................................. 153
arp local proxy function configuration task list.................................................................... 154
Typical examples of arp local function ............................................................................... 154
Help on arp local proxy function troubleshooting ............................................................... 155
Chapter 20 DHCP Configuration..........................................................................................156
20.1 Introduction to DHCP ................................................................................................. 156
20.2 DHCP Server Configuration ....................................................................................... 157
20.3 DHCP Relay Configuration ........................................................................................ 159
20.4 DHCP Configuration Example.................................................................................... 160
20.5 DHCP Troubleshooting .............................................................................................. 162
Chapter 21 DHCP option 82 Configuration......................................................................... 164
21.1 Introduction to DHCP option 82 ................................................................................. 164
21.1.1 DHCP option 82 Message Structure.......................................................................164
21.1.2 option 82 Working Mechanism ...............................................................................165
21.2 DHCP option 82 Configuration Task List .................................................................... 166
21.3 DHCP option 82 Application Examples ...................................................................... 168
21.4 DHCP option 82 Troubleshooting Help ...................................................................... 170
Chapter 22 DHCP snooping Configuration......................................................................... 172
22.1 Introduction to DHCP Snooping ................................................................................. 172

22.2 DHCP Snooping Configuration Task Sequence ......................................................... 172
22.3 DHCP Snooping Typical Application .......................................................................... 175
22.4 DHCP Snooping Troubleshooting Help ...................................................................... 176
22.4.1 Monitor And Debug Information..............................................................................176
22.4.2 DHCP Snooping Troubleshooting Help...................................................................176

Chapter 1 Switch Management
1.1 Management Options
After purchasing the switch, the user needs to configure the switch for network management.
SS3GR50I/26I series Switch provides two management options: in-band management and
out-of-band management.
1.1.1 Out-Of-Band Management
Out-of-band management is the management through Console interface. Generally, the user will
use out-of-band management for the initial switch configuration, or when in-band management is
not available. For instance, the user must assign an IP address to the switch via the Console
interface to be able to access the switch through Telnet.
The procedures for managing the switch via Console interface are listed below:
Step 1: Setup the environment:
Fig 1-1 Out-of-band Management Configuration Environment
As shown in Fig 1-1, the serial port (RS-232) is connected to the switch with the serial cable
provided. The table below lists all the devices used in the connection.
Device Name Description
PC machine Has functional keyboard and RS-232, with terminal
emulator installed, such as HyperTerminal included in

Windows 9x/NT/2000/XP.
Serial port cable One end attach to the RS-232 serial port, the other end to
the Console port.
SS3GR50I/26I series Functional Console port required.
Step 2:Entering the HyperTerminal
Open the HyperTerminal included in Windows after the connection established. The example
below is based on the HyperTerminal included in Windows XP.
1) Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
2) Type a name for opening HyperTerminal, such as “Switch”.
Fig 1-2 Opening HyperTerminal
3) In the “Connecting using” drop-list, select the RS-232 serial port used by the PC, e.g. COM1,
and click “OK”.
Fig 1-4 Opening HyperTerminal
4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for “Parity

checksum”, “1” for stop bit and “none” for traffic control;or,you can also click “Restore default”
and click “OK”.
Fig 1-5 Opening HyperTerminal
Step 3 :CLI interface
Power on the switch, the following appears in the HyperTerminal windows, that is the CLI
configuration mode for SS3GR50I/26I series Switch.
Testing RAM...
0x077C0000 RAM OK
Loading MiniBootROM...
Attaching to file system ...
Loading nos.img ... done.
Booting......
Starting at 0x10000...
Attaching to file system ...
……
--- Performing Power-On Self Tests (POST) ---
DRAM Test....................PASS!
PCI Device 1 Test............PASS!
FLASH Test...................PASS!
FAN Test.....................PASS!
Done All Pass.
------------------ DONE ---------------------
Current time is SUN JAN 01 00:00:00 2006
……
SS3GR50I>
The user can now enter commands to manage the switch. For a detailed description for the
commands, please refer to the following chapters.

1.1.2 In-band Management
In-band management refers to the management by login to the switch using Telnet. In-band
management enables management of the switch for some devices attached to the switch. In the
case when in-band management fails due to switch configuration changes, out-of-band
management can be used for configuring and managing the switch.
1.1.3 Management Via Telnet
To manage the switch with Telnet, the following conditions should be met:
1) Switch has an IP address configured
2) The host IP address (Telnet client) and the switch’s VLAN interface IP address is in the
same network segment.
3) If not 2), Telnet client can connect to an IP address of the switch via other devices, such
as a router.
SS3GR50I/26I series Switch is a Layer 3 switch that can be configured with several IP
addresses. The following example assumes the shipment status of the switch where only VLAN1
exists in the system.
The following describes the steps for a Telnet client to connect to the switch’s VLAN1 interface
by Telnet.
Fig 1-6 Manage the switch by Telnet
Step 1: Configure the IP addresses for the switch and start the Telnet Server function on the
switch.
First is the configuration of host IP address. This should be within the same network segment as
the switch VLAN1 interface IP address. Suppose the switch VLAN interface IP address
10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run “ping 10.1.128.251”
from the host and verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below. Before in-band
management, the switch must be configured with an IP address by out-of-band management (i.e.

Console mode), The configuration commands are as follows (All switch configuration prompts
are assumed to be “switch” hereafter if not otherwise specified):
Switch>
Switch>en
Switch#config
Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.128.251 255.255.255.0
Switch(Config-if-Vlan1)#no shutdown
To enable the Telnet Server function, users should type the CLI command telnet-server enable in
the global mode as below:
Switch>enable
Switch#config
Switch(config)# telnet-server enable
Step 2: Run Telnet Client program.
Run Telnet client program included in Windows with the specified Telnet target.
Fig 1-7 Run telnet client program included in Windows
When accessing a switch with IPv6 address, it is recommended to use the IE6 or Firefox
browser v1.5 or newer version. For example, if the IPv6 address of the switch is “3ffe:506:1:2::3”,
enter the switch address at the address bar: http://[3ffe:506:1:2::3], where the address should be
in the square brackets.
Step 3: Login to the switch
Login to the Telnet configuration interface. Valid login name and password are required,
otherwise the switch will reject Telnet access. This is a method to protect the switch from
unauthorized access. As a result, when Telnet is enabled for configuring and managing the
switch, username and password for authorized Telnet users must be configured with the
following command:

username <user> password {0|7} <password>.
Assume an authorized user in the switch has a username of “test”, and password of “test”, the
configuration procedure should like the following:
Switch>en
Switch#config
Switch(config)#username test password 0 test
Enter valid login name and password in the Telnet configuration interface, Telnet user will be able
to enter the switch’s CLI configuration interface. The commands used in the Telnet CLI interface
after login is the same as that in the Console interface.
Fig 1-8 Telnet Configuration Interface
1.1.4 Management Via HTTP
To manage the switch via HTTP, the following conditions should be met:
1) Switch has an IP address configured
2) The host IP address (HTTP client) and the switch’s VLAN interface IP address are in the
same network segment;
3) If 2) is not met, HTTP client should connect to an IP address of the switch via other
devices, such as a router.
Similar to management via Telnet, as soon as the host succeeds to ping an IP address of
the switch and to type the right login password, it can access the switch via HTTP. The
configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP function on the switch.
For configuring the IP address on the switch through out-of-band management, see the
relevant chapter.
To enable the WEB configuration, users should type the CLI command ip http server in the
global mode as below:
Switch>en
Switch#config
Switch(config)#ip http server

Step 2: Run HTTP protocol on the host.
Open the Web browser on the host and type the IP address of the switch.Or run directly the
HTTP protocol on the Windows. For example, the IP address of the switch is “10.1.128.251”.
Fig 1-9 Run HTTP Protocol
Step 3: Logon to the switch
To logon to the HTTP configuration interface, valid login user name and password are required;
otherwise the switch will reject HTTP access. This is a method to protect the switch from the
unauthorized access. Consequently, in order to configure the switch via HTTP, username and
password for authorized HTTP users must be configured with the following command in the
global mode:
username <username> password <show_flag> <password>.
Suppose an authorized user in the switch has a username as “test”, and password as “test”. The
configuration procedure is as below:
Switch>en
Switch#config
Switch(config)# username test password 0 test
The Web login interface is as below:
Fig 1-10 Web Login Interface
Input the right username and password, and then the main Web configuration interface is shown
as below.

Fig 1-11 Main Web Configuration Interface
1.2 Management Interface
1.2.1 CLI Interface
CLI interface is familiar to most users. As aforementioned, out-of-band management and Telnet
login are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration commands.
Those commands are categorized according to their functions in switch configuration and
management. Each category represents a different configuration mode. The Shell for the switch
is described below:
zConfiguration Modes
zConfiguration Syntax
zShortcut keys
zHelp function
zInput verification
zFuzzy match support
1.2.2 Configuration Modes

Fig 1-12 Shell Configuration Modes
1.2.2.1 User Mode
On entering the CLI interface, entering user entry system first. If as common user, it is defaulted
to User Mode. The prompt shown is “Switch>“, the symbol “>“ is the prompt for User Mode.
When disable command is run under Admin Mode, it will also return to the User Mode.
Under User Mode, no configuration to the switch is allowed, only clock time and version
information of the switch can be queries.
1.2.2.2 Admin Mode
To Admin Mode sees the following: In user entry system, if as Admin user, it is defaulted to
Admin Mode. Admin Mode prompt “Switch#” can be entered under the User Mode by running the
enable command and entering corresponding access levels admin user password, if a password
has been set. Or, when exit command is run under Global Mode, it will also return to the Admin
Mode. SS3GR50I/26I series Switch also provides a shortcut key sequence "Ctrl+z”, this allows
an easy way to exit to Admin Mode from any configuration mode (except User Mode).
Under Admin Mode, when disable command is run, it will return to User Mode. When exit
command is run, it will exit the entry and enter user entry system direct. Next users can reenter
the system on entering corresponding user name and password.
Under Admin Mode, the user can query the switch configuration information, connection status
and traffic statistics of all ports; and the user can further enter the Global Mode from Admin Mode
to modify all configurations of the switch. For this reason, a password must be set for entering

Admin mode to prevent unauthorized access and malicious modification to the switch.
1.2.2.3 Global Mode
Type the config command under Admin Mode will enter the Global Mode prompt
“Switch(config)#”. Use the exit command under other configuration modes such as Interface
Mode, VLAN mode will return to Global Mode.
The user can perform global configuration settings under Global Mode, such as MAC Table, Port
Mirroring, VLAN creation, IGMP Snooping start, GVRP and STP, etc. And the user can go further
to Interface Mode for configuration of all the interfaces.
1.2.2.4 Interface Mode
Use the interface command under Global Mode can enter the interface mode specified.
SS3GR50I/26I series Switch provides three interface type: VLAN interface, Ethernet port and
port-channel, and accordingly the three interface configuration modes.
Interface
Type
Entry Prompt Operates Exit
VLAN
Interface
Type interface
vlan <Vlan-id>
command under
Global Mode.
Switch(Config-if-V
lanx)#
Configure
switch IPs, etc
Use the exit
command to
return to
Global Mode.
Ethernet Port Type interface
ethernet
<interface-list>
command under
Global Mode.
Switch(Config-
ethernetxx)#
Configure
supported
duplex mode,
speed, etc.
of Ethernet
Port.
Use the exit
command to
return to
Global Mode.
port-channel Type interface
port-channel
<port-channel-nu
mber> command
under Global
Mode.
Switch(Config-if-
port-channelx)#
Configure
port-channel
related
settings such
as duplex
mode, speed,
etc.
Use the exit
command to
return to
Global Mode.
1.2.2.5 VLAN Mode

Using the vlan <vlan-id> command under Global Mode can enter the corresponding VLAN Mode.
Under VLAN Mode the user can configure all member ports of the corresponding VLAN. Run the
exit command to exit the VLAN Mode to Global Mode.
1.2.2.6 DHCP Address Pool Mode
Type the ip dhcp pool <name> command under Global Mode will enter the DHCP Address Pool
Mode prompt “Switch(Config-<name>-dhcp)#”. DHCP address pool properties can be configured
under DHCP Address Pool Mode. Run the exit command to exit the DHCP Address Pool Mode
to Global Mode.
1.2.2.7 Route Mode
Routing
Protocol
Entry Prompt Operates Exit
RIP
Routing
Protocol
Type router
rip
command
under
Global
Mode.
Switch(Config-Router-Rip)# Configure
RIP protocol
parameters.
Use the
“exit”
command to
return to
Global
Mode.
OSPF
Routing
Protocol
Type router
ospf
command
under
Global
Mode.
Switch(Config-Router-Ospf)# Configure
OSPF
protocol
parameters.
Use the
“exit”
command to
return to
Global
Mode.
1.2.2.8 ACL Mode
ACL type Entry Prompt Operates Exit
Standard IP
ACL Mode
Type
access-list ip
command
Switch(Config-Std-Nacl-
a)#
Configure
parameters
for
Use the “exit”
command to
return to
This manual suits for next models
1
Table of contents
Other Amer.com Network Router manuals