Dasan V5824G User manual

V5824G
GPON OLT system
User Manual

UMN:CLI User Manual
V5824G
2
※Copyright 2016 ⓒDASAN Network Solutions, Inc.
Issued by Technical Documentation Team
Korea
Technical modifications possible.
Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

User Manual UMN:CLI
V5824G
3
Summary of Changes
Changes for Issue 5:
Contents of update
Chapter/Section
Reason for Update
4.1.7
“Limiting the Number of login attempts” Chapter added.
4.2.2
“Authentication Interface” related CLI updated.
4.2.4
“Automated Blocking of IP Host Chapter added.
4.3.5
“Displaying Interface” related CLI updated.
4.3.6
“Interface Identifier“Chapter added.
4.4.7
“Displaying IPv6 Interface“Chapter updated.
5.1.1
“Selecting Port Type“Chapter updated.
5.2.10.1
“Packet Statistics“Chapter updated.
5.2.12
“Port Debounce Timer“Chapter added.
6.1.4.1
“Configuring NTP Server”Chapter updated.
6.1.4.2
“Configuring NTP Authentication Chapter added.
6.2.1
“Displaying System Configuration”Chapter updated.
6.3.6
“MAC Count Chapter added.
6.3.10
“Debugging Information” Chapter added.
6.3.11.2
“CPU Packet Filtering“ Chapter added.
7.1.2
“SNMP Community” Chapter updated.
7.1.5
“SNMP Com2sec“ Chapter updated.
7.1.12.2
“SNMP Trap Host“ Chapter updated.
7.1.12.3
“Enabling SNMP Trap“ Chapter added.
7.1.13.4
“Generic Alarm Severity“ Chapter added.
7.4.7
“Displaying Syslog Status Chapter updated.
7.5.4.4
“Policy Action” Chapter added.
7.5.8
“Displaying Admin Rule“ Chapter updated.
7.6.6
“Displaying EFM OAM Configuration“ Chapter updated.
7.17.5
“Debugging ICMP for IPv6“Chapter added.
7.21.5
“Access List Filter Configuration”Chapter added.
7.22
“sFlow Monitoring Chapter added.
8.1.4
“Subnet-based VLAN“Chapter updated.
8.3.5.1
“Path-cost Method” Chapter updated.
8.7
“Generic Attribute Registration Protocol (GARP)“Chapter
added.
8.10.1
“MAC Flood Guard“Chapter added.
8.14
“Configuring PPPoE Tag Option Format“Chapter added.
8.18
“Enhanced Transmission Selection Chapter added.
9.3.1.7
“Displaying MRIB VIF Information“Chapter added.

UMN:CLI User Manual
V5824G
4
Chapter/Section
Reason for Update
9.3.2.6
“PIM Join/Prune Interval“Chapter updated.
10.1.7
“Displaying MLD Information“Chapter updated.
11.1.2.7
“Graceful Restart“Chapter updated.
11.1.10.1
“Session Reset of All Peers“Chapter updated.
11.1.10.6
“Session Reset of Route Flap Chapter added.
11.1.10.7
“Session Reset of VPNv4 BGP Connection“Chapter
added.
11.1.14.1
“Displaying BGP Information“Chapter updated.
11.2.19.1
“Displaying OSPF Protocol Information“Chapter added.
11.4.13
“Authentication Key“Chapter updated.
12.1.19
“OMCC Monitoring“Chapter updated.
12.1.21
“Transceiver Type Configuration Chapter added.
12.2.18
“ONU CoS Remarking“Chapter added.
12.2.23
“Displaying ONU Information“Chapter updated.
12.2.25
“Generic Status Portal (GSP) Chapter added.
12.3.7
“Assigning IP Host of SNMP Agent“Chapter added.
12.3.8
“SNMP Trap Host“Chapter added.
12.4.3.6
“UNI Port Configuration“Chapter updated.
12.11.2
“IGMP Configurations“Chapter updated.
12.14
“GPON Debug“Chapter updated.

User Manual UMN:CLI
V5824G
5
Issue History
Issue
Number
Date
Update
01
03/2014
Initial release (NOS version 1.03 #0011)
02
11/2014
Issue 2 (NOS version 1.05)
03
02/2016
Issue 3 (NOS version 1.08 #0063)
04
03/2016
Issue 4 (NOS version 1.08 #0074)
05
05/2017
Issue 5 (NOS version 1.10 #0093)
Contents of update
Changes made between issue3 and issue 4:
Chapter/Section
Reason for Update
10
“IPv6 Multicast” Chapter added.
10.1
“Multicast Listener Discovery (MLD)” added.
10.1.1
MLD Version related CLI added.
10.1.2
“MLD Querier’s Robustness Variable” added.
10.1.3
Clearing MLD Entry related CLI added.
10.1.4
MLD Debug related CLI added.
10.1.5
MLD Access Control related CLI added.
10.1.6
MLD Querier Configuration related CLI added.
10.1.7
Displaying MLD Information related CLI added.
10.2
“IPv6 Multicast Functions” added.
10.2.1
Multicast Forwarding Database related function added.
10.2.2
“MLD Snooping Basic”added.
10.2.3
MLD Snooping related CLI added.
10.2.4
“MLD State Limit” added.
10.2.5
MLD Snooping Debug related CLI added.
10.3
“IPv6 Multicast Routing” added.
10.3.1
IPv6 MRIB related CLI added.
10.3.2
PIMv6 related CLI added.
10.3.3
Rendezout Point (RP) related CLI added.
10.3.4
Bootstrap Router related CLI adde.
10.3.5
Source Registration related CLI added.
10.3.6
“IPv6 SPT Switchover” added.
10.3.7
Cisco’s Router Interoperability related IPv6 CLI added.
10.3.8
IPv6 PIM Debug related CLI added.

UMN:CLI User Manual
V5824G
6
Chapter/Section
Reason for Update
10.3.9
Sorce Specific Multicast (SSM) related CLI added.
10.3.10
“IPv6 Prefix Lists” added.
Changes made between issue2 and issue 3:
Chapter/Section
Reason for Update
12.1.19
Relevant CLI added.
12.2.23
ONU video-status related CLI added.
4.3.6
“Interface Identifier” added.
4.3.4
“Interface Description” added.
11.1.2.7
Restarting the configured graceful for BGP, OSPF, RIP
related CLI added.
3.1.2
“quote”command added.
6.3.20
Disabling all debugging related CLI added.
11.1.10.1
Resetting the session of specific group related CLI added.
11.2.1
Restating the OSPF process related CLI added in step2.
4.3.3
Clearing the IPv4 stale routes related CLI added.
7.12
“Max Host” chapter added.
11.6
“Vertual Routing and Forwarding (VRF)” chapter added.
Changes made between issue1 and issue 2:
Chapter/Section
Reason for Update
3.3.2
Relevant CLI added.
4.1.4
“Login Password Recovery Process”added.
4.1.8
Relevant CLI added.
4.4
“Assigning an IPv6 Address”added.
5.2.7
“Network Service Port”added.
5.2.9
“Port Crossover”added.
6.1.8
IPv6-related CLI added.
6.1.10
Relevant CLI added.
6.2.1
Relevant CLI added.
6.3.1
IPv6-related CLI added.
6.3.3
IPv6-related CLI added.
6.3.9
Relevant CLI added.
7.1.10
“SNMP Engine ID”added.
7.1.11
“SNMPv3 Notification”added.
7.1.12.2
IPv6-related CLI updated.
7.1.12.3
Relevant CLI updated.

User Manual UMN:CLI
V5824G
7
Chapter/Section
Reason for Update
7.1.12.5
“SNMP Trap Message Logging and Thrshold”added.
7.3.4
“Simple RMON Event Configuration”added.
7.4.1
IPv6-related CLI added.
7.5.2.2
IPv6-related CLI added.
7.5.6.2
IPv6-related CLI added.
7.11
Relevant CLI added.
7.15.2
“ARP Request Message Interval”added.
7.16
“IPv6 Neighbor Discovery”added.
7.21.6
“Named Access List for IPv6 address”
8.5.5.2
The information note for DHCP option format changed.
8.5.6.2
The information note added.
8.6
“DHCP for IPv6” added.
8.10.4
The description of invalid traffic guard updated.
9.3.1.1
IPv6 multicast routing CLI added.
9.3.1.3
IPv6-related CLI added.
11.1.1.6
“IPv4 unicast address” added.
11.1.5.10
“Enabling the Exchange of Neighbor’s Information” added.
10.2.13
“redistribute subnet”option added.
11.3
“Open Shortest Path First Version 3 (OSPFv3)”added.
11.5
“Routing Information Protocol Next Generation (RIPng)”
added.
12.1.19
“OMCC Monitoring”added.
12.1.22.4
“GPON profile count”added.
12.2.1.6
“ONU Service Mode”added.
12.2.2
IPv6-related CLI added.
12.2.14
Relevant CLI added.
11.2.18
“ONU Extended VLAN Tagging Operation” added.
12.2.20
Relevant CLI added.
12.2.20
Authentication attributes added for RADIUS message type
'Access-Accept', on Tab. "RADIUS Authentication
Message Type"
12.2.21
“CFM OAM for ONU management”added.
12.2.23
Relevant CLI added.
11.3.2.7
“IGMP Configuration”added.
11.3.2.8
“Rate-limit Configuration”added.
12.3.2.10
“CPU Packet Limit”added.
12.3.2.11
“DLF Trap to CPU”added.
12.3.2.12
“MAC Full Policy”added.
12.3.2.13
“ONT Auto-configuration and Service Provisioning”added.

User Manual UMN:CLI
V5824G
9
Contents
1Introduction.......................................................................................37
1.1 Audience .............................................................................................37
1.2 Document Structure.............................................................................37
1.3Document Convention .........................................................................38
1.4 Document Notation..............................................................................38
1.5 Virus Protection ...................................................................................39
1.6 GPL/LGPLWarranty and Liability Exclusion ........................................39
2System Overview ..............................................................................41
2.1 System Features..................................................................................42
3Command Line Interface (CLI).........................................................45
3.1 Configuration Mode .............................................................................45
3.1.1 Privileged EXEC View Mode.......................................................................46
3.1.2 Privileged EXEC Enable Mode...................................................................46
3.1.3 Global Configuration Mode.........................................................................47
3.1.4 Bridge Configuration Mode.........................................................................47
3.1.5 DHCP Pool Configuration Mode .................................................................48
3.1.6 DHCP Option Configuration Mode..............................................................48
3.1.7 DHCP Option 82 Configuration Mode.........................................................49
3.1.8 Interface Configuration Mode......................................................................49
3.1.9 Rule Configuration Mode ............................................................................50
3.1.10 RMON Configuration Mode.........................................................................50
3.1.11 Router Configuration Mode.........................................................................51
3.1.12 Route-Map Configuration Mode..................................................................51
3.1.13 GPON Configuration Mode.........................................................................52
3.1.13.1 GPON-OLT Configuration Mode ....................................................................52
3.1.13.2 ONU Profile Configuration Mode....................................................................52
3.2 Configuration Mode Overview..............................................................53
3.3 Useful Tips...........................................................................................54
3.3.1 Listing Available Command.........................................................................54
3.3.2 Calling Command History...........................................................................56
3.3.3 Using Abbreviation......................................................................................58
3.3.4 Using Command of Privileged EXEC Enable Mode...................................58
3.3.5 Exit Current Command Mode .....................................................................58
3.3.6 The Command Execution Limit...................................................................59
4System Connection and IP Address................................................60
4.1 System Connection..............................................................................60
4.1.1 System Login ..............................................................................................60
4.1.2Password for Privileged EXEC Enable Mode.............................................60
4.1.3 Changing Login Password..........................................................................61
4.1.4 Login Password Recovery Process............................................................62
4.1.5 Management for System Account...............................................................63
4.1.5.1 Creating System Account...............................................................................63
4.1.5.2 Security Level.................................................................................................64
4.1.6 Limiting Number of Users ...........................................................................67
4.1.7 Limiting the Number of login attempts ........................................................68

UMN:CLI User Manual
V5824G
10
4.1.8 Auto Log-out............................................................................................... 68
4.1.9 Telnet Access............................................................................................. 69
4.1.10 System Rebooting...................................................................................... 70
4.1.10.1 Manual System Rebooting.............................................................................70
4.1.10.2 System Rebooting Scheduler ........................................................................70
4.1.11 Auto Reset Configuration........................................................................... 71
4.1.11.1 CPU Load......................................................................................................71
4.1.11.2 Memory..........................................................................................................72
4.2 System Authentication.........................................................................73
4.2.1 Authentication Method ............................................................................... 73
4.2.2 Authentication Interface ............................................................................. 73
4.2.3 PrimaryAuthentication Method.................................................................. 74
4.2.4 Automated Blocking of IP Host .................................................................. 74
4.2.5 RADIUS Server.......................................................................................... 75
4.2.5.1 RADIUS Server for System Authentication....................................................75
4.2.5.2 RADIUS Server Priority..................................................................................75
4.2.5.3 Timeout of Authentication Request ................................................................75
4.2.5.4 Frequency of Retransmit................................................................................75
4.2.6 TACACS+ Server....................................................................................... 76
4.2.6.1 TACACS+ Server for System Authentication .................................................76
4.2.6.2 TACACS+ Server Priority...............................................................................76
4.2.6.3 Timeout of Authentication Request ................................................................76
4.2.6.4 Additional TACACS+ Configuration ...............................................................76
4.2.7 Accounting Mode ....................................................................................... 77
4.2.8 Displaying System Authentication.............................................................. 78
4.3 Configuring Interface...........................................................................79
4.3.1 Enabling Interface...................................................................................... 79
4.3.2 Assigning IP Address to Network Interface................................................ 79
4.3.3 Static Route and Default Gateway............................................................. 80
4.3.4 Interface Description .................................................................................. 81
4.3.5 Displaying Interface.................................................................................... 82
4.3.6 Interface Identifier ...................................................................................... 82
4.3.7 Enabling Interface Overlapping.................................................................. 82
4.4 Assigning an IPv6 Address..................................................................84
4.4.1 Enabling Interface...................................................................................... 86
4.4.2 Assigning IPv6 Address to Network Interface............................................ 87
4.4.3 Assigning Link Local Address to Network Interface................................... 88
4.4.4 Static Route and Default Gateway............................................................. 89
4.4.5 Enabling IPv6 Processing.......................................................................... 90
4.4.6 IPv6 Interface Mode................................................................................... 90
4.4.7 Displaying IPv6 Interface ........................................................................... 91
4.5 Secure Shell (SSH).............................................................................92
4.5.1 SSH Server ................................................................................................ 92
4.5.1.1 Enabling SSH Server.....................................................................................92
4.5.1.2 Displaying On-line SSH Client.......................................................................92
4.5.1.3 Disconnecting SSH Client..............................................................................92
4.5.1.4 Assigning Specific Authentication Key...........................................................92
4.5.1.5 Displaying Connection History of SSH Client.................................................93
4.5.2 SSH Client.................................................................................................. 93
4.5.2.1 Login to SSH Server......................................................................................93

User Manual UMN:CLI
V5824G
11
4.5.2.2 Secured File Copy..........................................................................................93
4.5.2.3 Authentication Key.........................................................................................93
4.6 802.1x Authentication ..........................................................................95
4.6.1 802.1x Authentication..................................................................................96
4.6.1.1 Enabling 802.1x .............................................................................................96
4.6.1.2 RADIUS Server..............................................................................................96
4.6.1.3 Authentication Mode ......................................................................................97
4.6.1.4 Authentication Port.........................................................................................98
4.6.1.5 Force Authorization ........................................................................................98
4.6.1.6 Interval for Retransmitting Request/Identity Packet .......................................98
4.6.1.7 Interval of Authentication................................................................................98
4.6.1.8 Number of Requests to RADIUS Server ........................................................99
4.6.1.9 Interval of Request to RADIUS Server...........................................................99
4.6.2 802.1x Re-Authentication............................................................................99
4.6.2.1 Enabling 802.1x Re-Authentication................................................................99
4.6.2.2 Interval of Re-Authentication........................................................................100
4.6.2.3 Interval of Requesting Re-Authentication.....................................................100
4.6.2.4 802.1x Re-Authentication.............................................................................100
4.6.3 Initializing Authentication Status................................................................101
4.6.4 Restoring Default Value ............................................................................101
4.6.5 Displaying 802.1x Configuration...............................................................101
4.6.6 802.1x User Authentication Statistics........................................................101
4.6.7 Sample Configuration ...............................................................................102
5Port Configuration ..........................................................................103
5.1 Port Basic..........................................................................................103
5.1.1 Selecting Port Type...................................................................................103
5.2 Ethernet Port Configuration ...............................................................103
5.2.1 Enabling Ethernet Port..............................................................................103
5.2.2 Auto-Negotiation .......................................................................................104
5.2.3 Transmit Rate............................................................................................104
5.2.4 Duplex Mode.............................................................................................104
5.2.5 Flow Control..............................................................................................105
5.2.6 Port Description ........................................................................................105
5.2.7 Network Service Port ................................................................................105
5.2.8 L2 Port Bridge...........................................................................................105
5.2.9 Port Crossover..........................................................................................106
5.2.10 Traffic Statistics.........................................................................................106
5.2.10.1 Packet Statistics...........................................................................................107
5.2.10.2 CPU Statistics ..............................................................................................107
5.2.10.3 Protocol Statistics.........................................................................................108
5.2.11 Port Information ........................................................................................109
5.2.12 Port Debounce Timer................................................................................109
5.3 Port Mirroring.....................................................................................110
6System Environment ...................................................................... 113
6.1 Environment Configuration ................................................................113
6.1.1 Host Name................................................................................................113
6.1.2 Time and Date...........................................................................................113
6.1.3 Time Zone.................................................................................................114

UMN:CLI User Manual
V5824G
12
6.1.4 Network Time Protocol (NTP) ...................................................................115
6.1.4.1 Configuring NTP Server............................................................................... 115
6.1.4.2 Configuring NTP Authentication................................................................... 116
6.1.5 Simple Network Time Protocol (SNTP).....................................................117
6.1.6 Terminal Configuration..............................................................................118
6.1.7 Login Banner.............................................................................................118
6.1.8 DNS Server...............................................................................................119
6.1.9 Fan Operation .......................................................................................... 120
6.1.10 Enabling FTP/TFTP Connection.............................................................. 120
6.1.11 Disabling Daemon Operation................................................................... 120
6.1.12 FTP Bind Address .................................................................................... 121
6.1.13 System Threshold .................................................................................... 122
6.1.13.1 CPU Load....................................................................................................122
6.1.13.2 Port Traffic ...................................................................................................122
6.1.13.3 Fan Operation..............................................................................................123
6.1.13.4 System Temperature....................................................................................123
6.1.13.5 System Memory...........................................................................................124
6.1.13.6 System/SFP Module Operation ...................................................................124
6.1.14 Enabling DMI Module............................................................................... 125
6.2 Configuration Management...............................................................126
6.2.1 Displaying System Configuration............................................................. 126
6.2.2 Writing System Configuration................................................................... 126
6.2.3 Auto-Saving.............................................................................................. 127
6.2.4 System Configuration File........................................................................ 127
6.2.5 Restoring Default Configuration............................................................... 128
6.2.6 Core Dump File........................................................................................ 129
6.3 System Management ........................................................................130
6.3.1 Network Connection................................................................................. 130
6.3.2 IP ICMP Source Routing.......................................................................... 132
6.3.3 Tracing Packet Route............................................................................... 133
6.3.4 Displaying User Connecting to System.................................................... 134
6.3.5 MAC Table................................................................................................ 134
6.3.6 MAC Count............................................................................................... 135
6.3.7 System Running Time.............................................................................. 135
6.3.8 System Information.................................................................................. 135
6.3.9 System Memory Information.................................................................... 135
6.3.10 Debugging Information............................................................................. 136
6.3.11 CPU Packet Management........................................................................ 137
6.3.11.1 CPU Packet Limit.........................................................................................137
6.3.11.2 CPU Packet Filtering ...................................................................................137
6.3.12 Running Process...................................................................................... 140
6.3.13 Displaying System Software .................................................................... 140
6.3.14 Displaying Installed OS............................................................................ 141
6.3.15 Default OS................................................................................................ 141
6.3.16 Switch Status............................................................................................ 141
6.3.17 Forwarding Information Base (FIB) Table ................................................ 141
6.3.18 Tech Support Information......................................................................... 142
6.3.19 System Boot Information.......................................................................... 142
6.3.20 Network Service Module (NSM) Daemon Debugging ............................. 143
7Network Management.....................................................................144

User Manual UMN:CLI
V5824G
13
7.1 Simple Network Management Protocol (SNMP) ................................144
7.1.1 SNMP Service...........................................................................................144
7.1.2 SNMP Community.....................................................................................144
7.1.3 SNMP Agent Administrator .......................................................................145
7.1.4 Assigning IP Address of SNMPAgent ......................................................146
7.1.5 SNMP Com2sec........................................................................................146
7.1.6 SNMP Group.............................................................................................147
7.1.7 SNMP View Record ..................................................................................147
7.1.8 Permission to Access SNMP View Record...............................................148
7.1.9 SNMP Version 3 User...............................................................................148
7.1.10 SNMP Engine ID.......................................................................................149
7.1.11 SNMPv3 Notification.................................................................................149
7.1.11.1 Configuring SNMP Target.............................................................................149
7.1.11.2 SNMP Notification Type ...............................................................................149
7.1.12 SNMP Trap................................................................................................149
7.1.12.1 SNMP Trap Mode.........................................................................................149
7.1.12.2 SNMP Trap Host..........................................................................................149
7.1.12.3 Enabling SNMP Trap....................................................................................149
7.1.12.4 Displaying SNMP Trap.................................................................................149
7.1.12.5 SNMP Trap Message Logging and Threshold..............................................149
7.1.13 SNMPAlarm..............................................................................................149
7.1.13.1 Alarm Notify Activity .....................................................................................149
7.1.13.2 Alarm Severity Criterion ...............................................................................149
7.1.13.3 Default Alarm Severity..................................................................................149
7.1.13.4 Generic Alarm Severity ................................................................................149
7.1.13.5 Displaying SNMP Alarm...............................................................................149
7.1.14 SNMP Message Logging ..........................................................................149
7.1.15 Disabling SNMP........................................................................................149
7.1.16 Displaying SNMP Configuration................................................................149
7.2 Link Layer Discovery Protocol (LLDP) ...............................................149
7.2.1 LLDP Operation ........................................................................................149
7.2.2 Enabling LLDP..........................................................................................149
7.2.3 LLDP Operation Type................................................................................149
7.2.4 Basic TLV..................................................................................................149
7.2.5 LLDP Message..........................................................................................149
7.2.6 Reinitiating Delay......................................................................................149
7.2.7 Displaying LLDP Configuration.................................................................149
7.3 Remote Monitoring (RMON) ..............................................................149
7.3.1 RMON History...........................................................................................149
7.3.1.1 Source Port of Statistical Data......................................................................149
7.3.1.2 Subject of RMON History.............................................................................149
7.3.1.3 Number of Sample Data...............................................................................149
7.3.1.4 Interval of Sample Inquiry.............................................................................149
7.3.1.5 Activating RMON History..............................................................................149
7.3.1.6 Deleting Configuration of RMON History......................................................149
7.3.1.7 Displaying RMON History.............................................................................149
7.3.2 RMON Alarm.............................................................................................149
7.3.2.1 Subject of RMON Alarm...............................................................................149
7.3.2.2 Object of Sample Inquiry..............................................................................149
7.3.2.3 Absolute and Delta Comparison...................................................................149

UMN:CLI User Manual
V5824G
14
7.3.2.4 Upper Bound of Threshold...........................................................................149
7.3.2.5 Lower Bound of Threshold...........................................................................149
7.3.2.6 Standard of the First Alarm ..........................................................................149
7.3.2.7 Interval of Sample Inquiry............................................................................149
7.3.2.8 Activating RMON Alarm...............................................................................149
7.3.2.9 Deleting Configuration of RMON Alarm .......................................................149
7.3.3 RMON Event............................................................................................ 149
7.3.3.1 Event Community ........................................................................................149
7.3.3.2 Event Description.........................................................................................149
7.3.3.3 Subject of RMON Event...............................................................................149
7.3.3.4 Event Type...................................................................................................149
7.3.3.5 Activating RMON Event...............................................................................149
7.3.3.6 Deleting Configuration of RMON Event .......................................................149
7.3.4 Simple RMON Event Configuration ......................................................... 149
7.4 Syslog...............................................................................................149
7.4.1 Syslog Output Level................................................................................. 149
7.4.2 Facility Code ............................................................................................ 149
7.4.3 Syslog Bind Address ................................................................................ 149
7.4.4 Debug Message for Remote Terminal ..................................................... 149
7.4.5 Disabling Syslog....................................................................................... 149
7.4.6 Syslog Local Message Configuration....................................................... 149
7.4.7 Displaying Syslog Status.......................................................................... 149
7.5 Rule and QoS....................................................................................149
7.5.1 How to Operate QoS................................................................................ 149
7.5.2 Packet Classification................................................................................ 149
7.5.2.1 Flow Creation...............................................................................................149
7.5.2.2 Configuring Flow..........................................................................................149
7.5.2.3 Applying and modifying Flow.......................................................................149
7.5.2.4 Class Creation.............................................................................................149
7.5.3 Packet Conditioning................................................................................. 149
7.5.3.1 Policer Creation...........................................................................................149
7.5.3.2 Packet Counter............................................................................................149
7.5.3.3 Rate-limit......................................................................................................149
7.5.3.4 Applying and modifying Policer....................................................................149
7.5.4 Rule Action............................................................................................... 149
7.5.4.1 Policy Creation.............................................................................................149
7.5.4.2 Metering.......................................................................................................149
7.5.4.3 Policy Priority...............................................................................................149
7.5.4.4 Policy Action ................................................................................................149
7.5.4.5 Setting CoS and ToS values........................................................................149
7.5.4.6 Attaching a Policy to an interface.................................................................149
7.5.4.7 Applying and Modifying Policy.....................................................................149
7.5.5 Displaying Rule ........................................................................................ 149
7.5.6 Admin Rule............................................................................................... 149
7.5.6.1 Creating Admin Flow for packet classification..............................................149
7.5.6.2 Configuring Admin Flow...............................................................................149
7.5.6.3 Applying and modifying Admin Flow ............................................................149
7.5.6.4 Class Creation.............................................................................................149
7.5.7 Admin Rule Action.................................................................................... 149
7.5.7.1 Admin Policy Creation .................................................................................149

User Manual UMN:CLI
V5824G
15
7.5.7.2 Admin Policy Priority....................................................................................149
7.5.7.3 Admin Policy Action......................................................................................149
7.5.7.4 Applying and Modifying Admin Policy...........................................................149
7.5.8 Displaying Admin Rule..............................................................................149
7.5.9 Scheduling ................................................................................................149
7.5.9.1 Scheduling mode .........................................................................................149
7.5.9.2 Weight and Quantum...................................................................................149
7.5.9.3 Maximum and Minimum Bandwidth .............................................................149
7.5.9.4 Limiting traffic and buffer..............................................................................149
7.5.9.5 DSCP-to-CoS Mapping................................................................................149
7.5.9.6 The Traffic of Queue.....................................................................................149
7.5.9.7 Displaying QoS ............................................................................................149
7.6 EFM OAM..........................................................................................149
7.6.1 Enabling EFM OAM ..................................................................................149
7.6.2 OAM Link Monitoring ................................................................................149
7.6.3 EFM OAM Mode .......................................................................................149
7.6.4 OAM Loopback .........................................................................................149
7.6.5 OAM Unidirection......................................................................................149
7.6.6 Displaying EFM OAM Configuration.........................................................149
7.7 NetBIOS Filtering...............................................................................149
7.8 Martian Filtering.................................................................................149
7.9Max Host ...........................................................................................149
7.10 Port Security......................................................................................149
7.10.1 Port Security on Port.................................................................................149
7.10.2 Port Security Aging ...................................................................................149
7.10.3 Displaying Port Security............................................................................149
7.11 Outband Management Port Security..................................................149
7.12 Max Host ...........................................................................................149
7.13 MAC Table.........................................................................................149
7.14 MAC Filtering.....................................................................................149
7.14.1 Default MAC Filter Policy..........................................................................149
7.14.2 Configuring MAC Filter Policy...................................................................149
7.14.3 Listing MAC Filter Policy...........................................................................149
7.14.4 Displaying MAC Filter Policy.....................................................................149
7.15 Address Resolution Protocol (ARP)...................................................149
7.15.1 ARP Table .................................................................................................149
7.15.1.1 Registering ARP Table .................................................................................149
7.15.1.2 Displaying ARP Table...................................................................................149
7.15.2 ARP Request Message Interval................................................................149
7.15.3 ARP Alias ..................................................................................................149
7.15.4 ARP Inspection .........................................................................................149
7.15.4.1 ARP Access List...........................................................................................149
7.15.4.2 Enabling ARP Inspection Filtering................................................................149
7.15.4.3 ARP Address Validation ...............................................................................149
7.15.4.4 ARP Inspection on Trust Port.......................................................................149
7.15.4.5 ARP Inspection Log-buffer...........................................................................149
7.15.4.6 Displaying ARP Inspection...........................................................................149
7.15.5 Gratuitous ARP .........................................................................................149
7.15.6 Proxy ARP.................................................................................................149

UMN:CLI User Manual
V5824G
16
7.16.10Static IPv6 Neighbor Entry....................................................................... 149
7.16.11 IPv6 Neighbor Discovery (ND) Inspection ............................................... 149
7.16.11.1 ND Access List.............................................................................................149
7.16.11.2 Enabling ND Inspection Filtering..................................................................149
7.16.11.3 ND Inspection on Trust Port.........................................................................149
7.16.11.4 ND Inspection Log-buffer.............................................................................149
7.16.11.6 Displaying ND Inspection.............................................................................149
7.16.12Gratuitous ND .......................................................................................... 149
7.16.13ND Alias ................................................................................................... 149
7.17 ICMP Message Control .....................................................................149
7.17.1 Blocking Echo Reply Message ................................................................ 149
7.17.2 Interval for Transmit ICMP Message........................................................ 149
7.17.3 ICMP Destination Unreachable Message................................................ 149
7.17.4 ICMP Redirect Message .......................................................................... 149
7.17.5 Debugging ICMP for IPv6 ........................................................................ 149
7.18 TCP Flag Control...............................................................................149
7.18.1 RST Configuration.................................................................................... 149
7.18.2 SYN Configuration ................................................................................... 149
7.19 The Utilization on L3 table.................................................................149
7.20 Packet Dump.....................................................................................149
7.20.1 Packet Dump by Protocol......................................................................... 149
7.20.2 Packet Dump with Option......................................................................... 149
7.20.3 Debug Packet Dump................................................................................ 149
7.20.4 Displaying Dump Packets........................................................................ 149
7.20.5 Dump File................................................................................................. 149
7.21 Access List........................................................................................149
7.21.1 Standard Access List................................................................................ 149
7.21.2 Extended Access List............................................................................... 149
7.21.3 Named Access List................................................................................... 149
7.21.4 Access List Range ................................................................................... 149
7.21.5 Access List Filter Configuration ............................................................... 149
7.21.5.1 Filters Using Standard IPACLs....................................................................149
7.21.5.2 Filters Using Extended IP ACLs...................................................................149
7.21.5.3 Filters Using Extended MAC ACLs ..............................................................149
7.21.5.4 Applying ACL Filters to Interface..................................................................149
7.21.5.5 ACL Logging................................................................................................149
7.21.5.6 Resequencing IP/MAC ACLs.......................................................................149
7.21.6 Named Access List for IPv6 address ....................................................... 149
7.21.7 Displaying Access List Entries ................................................................. 149
7.22 sFlow Monitoring...............................................................................149
7.22.1 sFlow Setting............................................................................................ 149
7.22.1.1 sFlow Function Setup ..................................................................................149
7.22.1.2 sFlow Agent Setting.....................................................................................149
7.22.1.3 Sample Packet Header Size Setting............................................................149
7.22.1.4 Counter Interval Setting...............................................................................149
7.22.1.5 Sampling Rate Setting.................................................................................149
7.22.1.6 Receiver of Index Setting.............................................................................149
7.22.1.7 Displaying sFlow Setting..............................................................................149
7.22.2 sFlow Receiver Setting ............................................................................ 149

User Manual UMN:CLI
V5824G
17
7.22.2.1 sFlow Receiver Setting ................................................................................149
7.22.2.2 Collect-IP Address and Port Setting.............................................................149
7.22.2.3 Datagram Size .............................................................................................149
7.22.2.4 User Name...................................................................................................149
7.22.2.5 Timeout........................................................................................................149
8System Main Functions..................................................................149
8.1 Virtual Local Area Network (VLAN)....................................................149
8.1.1 Port-based VLAN......................................................................................149
8.1.1.1 Creating VLAN.............................................................................................149
8.1.1.2 Specifying PVID ...........................................................................................149
8.1.1.3 Adding Port to VLAN....................................................................................149
8.1.1.4 Deleting VLAN..............................................................................................149
8.1.2 Protocol-based VLAN ...............................................................................149
8.1.3 MAC-based VLAN.....................................................................................149
8.1.4 Subnet-based VLAN .................................................................................149
8.1.5 Tagged VLAN............................................................................................149
8.1.6 VLAN Description......................................................................................149
8.1.7 VLAN Precedence ....................................................................................149
8.1.8 Displaying VLAN Information....................................................................149
8.1.9 QinQ VLAN Mapping ................................................................................149
8.1.9.1 TPID Configuration.......................................................................................149
8.1.9.2 One-to-One VLAN Mapping between S-VID and C-VID ..............................149
8.1.9.3 One-to-Two VLAN Mapping between S-VID and C-VID...............................149
8.1.9.4 Two-to-One VLAN Mapping between S-VID and C-VID...............................149
8.1.9.5 Two-to-Two VLAN Mapping between S-VID and C-VID...............................149
8.1.9.6 Double Tagging Operation............................................................................149
8.1.9.7 Double Tagging Configuration......................................................................149
8.1.9.8 Inner Tag Configuration................................................................................149
8.1.9.9 Displaying VLAN Mapping and Translation..................................................149
8.1.10 Layer 2 Isolation........................................................................................149
8.1.10.1 Port Isolation................................................................................................149
8.1.10.2 Shared VLAN...............................................................................................149
8.1.11 Sample Configuration ...............................................................................149
8.2 Link Aggregation (LAG)......................................................................149
8.2.1 Port Trunk..................................................................................................149
8.2.1.1 Configuring Port Trunk.................................................................................149
8.2.1.2 Disabling Port Trunk.....................................................................................149
8.2.1.3 Displaying Port Trunk...................................................................................149
8.2.2 Link Aggregation Control Protocol (LACP) ...............................................149
8.2.2.1 Configuring LACP ........................................................................................149
8.2.2.2 Distribution Mode.........................................................................................149
8.2.2.3 Operation Mode ...........................................................................................149
8.2.2.4 Priority of Switch ..........................................................................................149
8.2.2.5 Manual Aggregation.....................................................................................149
8.2.2.6 BPDU Transmission Rate.............................................................................149
8.2.2.7 Administrational Key ....................................................................................149
8.2.2.8 Port Priority ..................................................................................................149
8.2.2.9 Displaying LACP Configuration....................................................................149
8.3 Spanning Tree Protocol (STP) ...........................................................149

UMN:CLI User Manual
V5824G
18
8.3.1 STP Operation ......................................................................................... 149
8.3.1.1 Root Switch..................................................................................................149
8.3.1.2 Designated Switch.......................................................................................149
8.3.1.3 Designated Port and Root Port....................................................................149
8.3.1.4 Port Priority..................................................................................................149
8.3.2 RSTP Operation....................................................................................... 149
8.3.2.1 Port States...................................................................................................149
8.3.2.2 BPDU Policy................................................................................................149
8.3.2.3 Rapid Network Convergence.......................................................................149
8.3.2.4 Compatibility with 802.1d.............................................................................149
8.3.3 MSTP Operation ...................................................................................... 149
8.3.3.1 MSTP...........................................................................................................149
8.3.4 STP Mode ................................................................................................ 149
8.3.5 STP Basic Configuration.......................................................................... 149
8.3.5.1 Path-cost Method.........................................................................................149
8.3.5.2 Edge Ports...................................................................................................149
8.3.5.3 BPDU Transmit hold count...........................................................................149
8.3.5.4 Port Priority..................................................................................................149
8.3.5.5 Link Type .....................................................................................................149
8.3.5.6 Enabling STP configuration on the Port.......................................................149
8.3.5.7 Displaying Configuration..............................................................................149
8.3.6 Configuring MSTP.................................................................................... 149
8.3.6.1 MST Region.................................................................................................149
8.3.6.2 Enabling MSTP configuration ......................................................................149
8.3.6.3 Root Switch..................................................................................................149
8.3.6.4 Path-cost......................................................................................................149
8.3.6.5 Port Priority..................................................................................................149
8.3.6.6 Displaying Configuration..............................................................................149
8.3.7 Configuring PVSTP.................................................................................. 149
8.3.7.1 Enabling PVSTP..........................................................................................149
8.3.7.2 Root Switch..................................................................................................149
8.3.7.3 Path-cost......................................................................................................149
8.3.7.4 Port Priority..................................................................................................149
8.3.7.5 Displaying Configuration..............................................................................149
8.3.8 Root Guard............................................................................................... 149
8.3.9 Loop Guard .............................................................................................. 149
8.3.10 Topology Change Detection..................................................................... 149
8.3.11 Restarting Protocol Migration................................................................... 149
8.3.12 Loop Back Detection................................................................................ 149
8.3.13 BPDU Configuration................................................................................. 149
8.3.13.1 Hello Time....................................................................................................149
8.3.13.2 Forward Delay Time.....................................................................................149
8.3.13.3 MaxAge.......................................................................................................149
8.3.13.4 BPDU Hop Count.........................................................................................149
8.3.13.5 BPDU Filtering.............................................................................................149
8.3.13.6 BPDU Guard................................................................................................149
8.3.14 Sample Configuration............................................................................... 149
8.4 Loop Detection..................................................................................149
8.5 Dynamic Host Configuration Protocol (DHCP)...................................149
8.5.1 DHCP Server............................................................................................ 149
8.5.1.1 DHCP Pool Creation....................................................................................149

User Manual UMN:CLI
V5824G
19
8.5.1.2 DHCP Subnet...............................................................................................149
8.5.1.3 Range of IPAddress ....................................................................................149
8.5.1.4 Default Gateway...........................................................................................149
8.5.1.5 IP Lease Time..............................................................................................149
8.5.1.6 DNS Server..................................................................................................149
8.5.1.7 Manual Binding ............................................................................................149
8.5.1.8 Domain Name..............................................................................................149
8.5.1.9 DHCP Server Option....................................................................................149
8.5.1.10 Static Mapping..............................................................................................149
8.5.1.11 Recognition of DHCP Client.........................................................................149
8.5.1.12 IP Address Validation ...................................................................................149
8.5.1.13 Authorized ARP............................................................................................149
8.5.1.14 Prohibition of 1:N IPAddressAssignment....................................................149
8.5.1.15 Ignoring BOOTP Request ............................................................................149
8.5.1.16 DHCP Packet Statistics................................................................................149
8.5.1.17 Setting DHCP Pool Size...............................................................................149
8.5.1.18 Displaying DHCP Pool Configuration...........................................................149
8.5.2 DHCP Address Allocation with Option 82 .................................................149
8.5.2.1 DHCP Class Capability ................................................................................149
8.5.2.2 DHCP Class Creation...................................................................................149
8.5.2.3 Relay Agent Information Pattern ..................................................................149
8.5.2.4 Associating DHCP Class..............................................................................149
8.5.2.5 Range of IPAddress for DHCP Class..........................................................149
8.5.3 DHCP Lease Database.............................................................................149
8.5.3.1 DHCP Database Agent.................................................................................149
8.5.3.2 Displaying DHCP Lease Status....................................................................149
8.5.3.3 Deleting DHCP Lease Database..................................................................149
8.5.4 DHCP Relay Agent....................................................................................149
8.5.4.1 DHCP Helper Address..................................................................................149
8.5.4.2 Smart Relay Agent Forwarding ....................................................................149
8.5.4.3 DHCP Server ID Option ...............................................................................149
8.5.4.4 DHCP Relay Statistics..................................................................................149
8.5.5 DHCP Option ............................................................................................149
8.5.5.1 Entering DHCP Option Mode.......................................................................149
8.5.5.2 Configuring DHCP Option Format................................................................149
8.5.5.3 Deleting DHCP Option Format.....................................................................149
8.5.5.4 Displaying DHCP option...............................................................................149
8.5.5.5 Different DHCP option Code Configurations ................................................149
8.5.6 DHCP Option 82 .......................................................................................149
8.5.6.1 Enabling DHCP Option 82............................................................................149
8.5.6.2 Option 82 Sub-Option ..................................................................................149
8.5.6.3 Option 82 Reforwarding Policy.....................................................................149
8.5.6.4 Option 82 Trust Policy..................................................................................149
8.5.7 DHCP Snooping........................................................................................149
8.5.7.1 Enabling DHCP Snooping............................................................................149
8.5.7.2 DHCP Trust State.........................................................................................149
8.5.7.3 DHCP Filter on Trust Port.............................................................................149
8.5.7.4 DHCP Rate Limit..........................................................................................149
8.5.7.5 DHCP Lease Limit........................................................................................149
8.5.7.6 Source MAC Address Verification ................................................................149
8.5.7.7 Static DHCP Snooping Binding ....................................................................149

UMN:CLI User Manual
V5824G
20
8.5.7.8 DHCP Snooping Database Agent................................................................149
8.5.7.9 ARP Inspection Start Time...........................................................................149
8.5.7.10 DHCP Snooping with Option82....................................................................149
8.5.7.11 DHCP Snooping Option...............................................................................149
8.5.7.12 Displaying DHCP Snooping Configuration...................................................149
8.5.8 IP Source Guard ...................................................................................... 149
8.5.8.1 Enabling IP Source Guard...........................................................................149
8.5.8.2 Static IP Source Binding ..............................................................................149
8.5.8.3 Displaying IP Source Guard Configuration ..................................................149
8.5.9 DHCP Client............................................................................................. 149
8.5.9.1 Enabling DHCP Client..................................................................................149
8.5.9.2 DHCP Client ID............................................................................................149
8.5.9.3 DHCP Class ID............................................................................................149
8.5.9.4 Host Name...................................................................................................149
8.5.9.5 IP Lease Time..............................................................................................149
8.5.9.6 Requesting Option.......................................................................................149
8.5.9.7 Forcing Release or Renewal of DHCP Lease..............................................149
8.5.9.8 Displaying DHCP Client Configuration.........................................................149
8.5.10 DHCP Filtering ......................................................................................... 149
8.5.10.1 DHCP Packet Filtering.................................................................................149
8.5.10.2 DHCP Server Packet Filtering .....................................................................149
8.5.11 Debugging DHCP..................................................................................... 149
8.6 Dynamic Host Configuration Protocol (DHCP) for IPv6 .....................149
8.6.1 DHCPv6 Server........................................................................................ 149
8.6.1.1 Creating DHCPv6 address Pool ..................................................................149
8.6.1.4 Range of IPv6 Address................................................................................149
8.6.1.5 DHCPv6 Options .........................................................................................149
8.6.1.6 Enabling DHCPv6 Server on Interface ........................................................149
8.6.1.7 Displaying DHCPv6 Information ..................................................................149
8.6.2 DHCPv6 Snooping................................................................................... 149
8.6.2.1 Enabling DHCPv6 Snooping........................................................................149
8.6.2.2 DHCPv6 Snooping Port State......................................................................149
8.6.2.4 DHCP Lease Limit .......................................................................................149
8.6.2.6 DHCP Snooping Option...............................................................................149
8.6.2.7 Displaying DHCPv6 Snooping Configuration...............................................149
8.6.3 DHCPv6 Relay Agent............................................................................... 149
8.6.3.1 DHCPv6 Relay Agent Destination................................................................149
8.6.4 DHCPv6 Option........................................................................................ 149
8.6.4.1 Entering DHCPv6 Option Mode...................................................................149
8.6.4.2 Configuring DHCPv6 Option Format............................................................149
8.6.4.3 Deleting DHCPv6 Option Format.................................................................149
8.6.4.4 Displaying DHCPv6 option...........................................................................149
8.6.5 Debugging DHCPv6................................................................................. 149
8.7 Generic Attribute Registration Protocol (GARP) ................................149
8.7.1 Basic Configuration of GARP................................................................... 149
8.7.1.1 GVRP/GMRP Timers...................................................................................149
8.7.2 GARP VLAN Registration Protocol (GVRP) ............................................ 149
8.7.2.1 Enabling GVRP............................................................................................149
8.7.2.2 GVRP Registration Mode.............................................................................149
8.7.2.3 GVRP PDUs Transmission..........................................................................149
Other manuals for V5824G
1
Table of contents
Other Dasan Network Hardware manuals