FoxGate S95 SERIES User manual

S95xx
Duak Stack Ethernet Switch
Manual version: 2.0.04
Firmware version: 6.2.98.0
FoxGate
2012
Configuration Guide

Content
1
Content
CONTENT .......................................................................................................1
1. SWITCH MANAGEMENT.....................................................................19
1.1 MANAGEMENT OPTIONS .......................................................................19
1.1.1 Out-Of-Band Management ......................................................................19
1.1.2 In-band Management...............................................................................22
1.2 CLI INTERFACE....................................................................................28
1.2.1 Configuration Modes...............................................................................29
1.2.2 Configuration Syntax...............................................................................31
1.2.3 Shortcut Key Support..............................................................................32
1.2.4 Help Function ...........................................................................................33
1.2.5 Input Verification......................................................................................33
1.2.6 Fuzzy Match Support...............................................................................34
2. BASIC SWITCH CONFIGURATION.....................................................35
2.1 BASIC CONFIGURATION ........................................................................35
2.2 TELNET MANAGEMENT .........................................................................36
2.2.1 Telnet.........................................................................................................36
2.2.2 SSH............................................................................................................38
2.3 CONFIGURE SWITCH IPADDRESSES......................................................39
2.3.1 Switch IP Addresses Configuration Task List ......................................40
2.4 SNMP CONFIGURATION .......................................................................41
2.4.1 Introduction to SNMP ..............................................................................41
2.4.2 Introduction to MIB..................................................................................42
2.4.3 Introduction to RMON..............................................................................43
2.4.4 SNMP Configuration................................................................................44
2.4.5 Typical SNMP Configuration Examples.................................................47
2.4.6 SNMP Troubleshooting............................................................................48
2.5 SWITCH UPGRADE................................................................................49
2.5.1 Switch System Files ................................................................................49

Content
2
2.5.2 BootROM Upgrade...................................................................................50
2.5.3 FTP/TFTP Upgrade...................................................................................53
3. FILE SYSTEM OPERATIONS..............................................................62
3.1 INTRODUCTION TO FILE STORAGE DEVICES............................................62
3.2 FILE SYSTEM OPERATION CONFIGURATION TASK LIST.............................62
3.3 TYPICAL APPLICATIONS ........................................................................64
3.4 TROUBLESHOOTING..............................................................................64
4. CLUSTER CONFIGURATION..............................................................65
4.1 INTRODUCTION TO CLUSTER NETWORK MANAGEMENT .............................65
4.2 CLUSTER NETWORK MANAGEMENT CONFIGURATION SEQUENCE.............65
4.3 EXAMPLES OF CLUSTER ADMINISTRATION..............................................69
4.4 CLUSTER ADMINISTRATION TROUBLESHOOTING .....................................70
5. PORT CONFIGURATION.....................................................................71
5.1 INTRODUCTION TO PORT .......................................................................71
5.2 NETWORK PORT CONFIGURATION TASK LIST .........................................71
5.3 PORT CONFIGURATION EXAMPLE ..........................................................74
5.4 PORT TROUBLESHOOTING ....................................................................75
6. PORT ISOLATION FUNCTION CONFIGURATION .............................76
6.1 INTRODUCTION TO PORT ISOLATION FUNCTION .......................................76
6.2 TASK SEQUENCE OF PORT ISOLATION....................................................76
6.3 PORT ISOLATION FUNCTION TYPICAL EXAMPLES ....................................77
7. PORT LOOPBACK DETECTION FUNCTION CONFIGURATION ......79
7.1 INTRODUCTION TO PORT LOOPBACK DETECTION FUNCTION ....................79
7.2 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION TASK LIST ......80
7.3 PORT LOOPBACK DETECTION FUNCTION EXAMPLE ................................81
7.4 PORT LOOPBACK DETECTION TROUBLESHOOTING .................................82
8. ULDP FUNCTION CONFIGURATION..................................................83
8.1 INTRODUCTION TO ULDP FUNCTION......................................................83
8.2 ULDP CONFIGURATION TASK SEQUENCE ..............................................84

Content
3
8.3 ULDP FUNCTION TYPICAL EXAMPLES ...................................................87
8.4 ULDP TROUBLESHOOTING ...................................................................88
9. LLDP FUNCTION OPERATION CONFIGURATION ............................90
9.1 INTRODUCTION TO LLDP FUNCTION ......................................................90
9.2 LLDP FUNCTION CONFIGURATION TASK SEQUENCE...............................91
9.3 LLDP FUNCTION TYPICAL EXAMPLE .....................................................94
9.4 LLDP FUNCTION TROUBLESHOOTING....................................................94
10. PORT CHANNEL CONFIGURATION...................................................96
10.1 INTRODUCTION TO PORT CHANNEL......................................................96
10.2 BRIEF INTRODUCTION TO LACP..........................................................97
10.2.1 Static LACP Aggregation ......................................................................98
10.2.2 Dynamic LACP Aggregation.................................................................98
10.3 PORT CHANNEL CONFIGURATION TASK LIST ........................................99
10.4 PORT CHANNEL EXAMPLES ..............................................................100
10.5 PORT CHANNEL TROUBLESHOOTING .................................................103
11. MTU CONFIGURATION .....................................................................104
11.1 INTRODUCTION TO MTU....................................................................104
11.2 MTU CONFIGURATION TASK SEQUENCE ............................................104
12. EFM OAM CONFIGURATION............................................................105
12.1 INTRODUCTION TO EFM OAM...........................................................105
12.2 EFM OAM CONFIGURATION .............................................................108
12.3 EFM OAM EXAMPLE .......................................................................110
12.4 EFM OAM TROUBLESHOOTING ........................................................ 111
13. BPDU-TUNNEL CONFIGURATION ...................................................113
13.1 INTRODUCTION TO BPDU-TUNNEL.......................................................113
13.1.1 bpdu-tunnel function...........................................................................113
13.1.2 Background of bpdu-tunnel................................................................113
13.2 BPDU-TUNNEL CONFIGURATION TASK LIST .........................................114
13.3 EXAMPLES OF BPDU-TUNNEL.............................................................114

Content
4
13.4 BPDU-TUNNEL TROUBLESHOOTING ....................................................116
14. LLDP-MED .........................................................................................117
14.1 INTRODUCTION TO LLDP-MED.........................................................117
14.2 LLDP-MED CONFIGURATION TASK SEQUENCE .................................117
14.3 LLDP-MED EXAMPLE .....................................................................120
14.4 LLDP-MED TROUBLESHOOTING ......................................................122
15. PORT SECURITY...............................................................................124
15.1 INTRODUCTION TO PORT SECURITY...............................................124
15.2 PORT SECURITY CONFIGURATION TASK LIST.................................124
15.3 EXAMPLE OF PORT SECURITY ......................................................125
15.4 PORT SECURITY TROUBLESHOOTING ............................................126
16. DDM CONFIGURATION.....................................................................127
16.1 INTRODUCTION TO DDM ...................................................................127
16.1.1 Brief Introduction to DDM...................................................................127
16.1.2 DDM Function.......................................................................................128
16.2 DDM CONFIGURATION TASK LIST......................................................129
16.3 EXAMPLES OF DDM.........................................................................131
16.4 DDM TROUBLESHOOTING.................................................................135
17. VLAN CONFIGURATION ...................................................................136
17.1 VLAN CONFIGURATION ....................................................................136
17.1.1 Introduction to VLAN...........................................................................136
17.1.2 VLAN Configuration Task List............................................................137
17.1.3 Typical VLAN Application....................................................................140
17.1.4 Typical Application of Hybrid Port.....................................................141
17.2 GVRP CONFIGURATION....................................................................143
17.2.1 Introduction to GVRP ..........................................................................143
17.2.2 GVRP Configuration Task List............................................................144
17.2.3 Example of GVRP.................................................................................145
17.2.4 GVRP Troubleshooting........................................................................147
17.3 DOT1Q-TUNNEL CONFIGURATION ......................................................148
17.3.1 Introduction to Dot1q-tunnel ..............................................................148

Content
5
17.3.2 Dot1q-tunnel Configuration................................................................149
17.3.3 Typical Applications of the Dot1q-tunnel..........................................150
17.3.4 Dot1q-tunnel Troubleshooting ...........................................................151
17.4 VLAN-TRANSLATION CONFIGURATION...............................................151
17.4.1 Introduction to VLAN-translation.......................................................151
17.4.2 VLAN-translation Configuration.........................................................151
17.4.3 Typical application of VLAN-translation............................................152
17.4.4 VLAN-translation Troubleshooting....................................................153
17.5 DYNAMIC VLAN CONFIGURATION......................................................154
17.5.1 Introduction to Dynamic VLAN...........................................................154
17.5.2 Dynamic VLAN Configuration.............................................................154
17.5.3 Typical Application of the Dynamic VLAN ........................................156
17.5.4 Dynamic VLAN Troubleshooting........................................................157
17.6 VOICE VLAN CONFIGURATION..........................................................158
17.6.1 Introduction to Voice VLAN ................................................................158
17.6.2 Voice VLAN Configuration..................................................................159
17.6.3 Typical Applications of the Voice VLAN............................................160
17.6.4 Voice VLAN Troubleshooting..............................................................161
17.7 MULTI-TO-ONE VLAN TRANSLATION CONFIGURATION........................161
17.7.1 Introduction to Multi-to-One VLAN Translation................................161
17.7.2 Multi-to-One VLAN Translation Configuration..................................161
17.7.3 Typical application of Multi-to-One VLAN Translation.....................162
17.7.4 Multi-to-One VLAN Translation Troubleshooting.............................163
17.8 SUPER VLAN CONFIGURATION.........................................................163
17.8.1 Introduction to Super VLAN................................................................163
17.8.2 Super VLAN Configuration .................................................................166
17.8.3 Typical Application of Super VLAN....................................................167
17.8.4 Super VLAN Troubleshooting.............................................................168
18. MAC TABLE CONFIGURATION........................................................169
18.1 INTRODUCTION TO MAC TABLE.........................................................169
18.1.1 Obtaining MAC Table...........................................................................169
18.1.2 Forward or Filter...................................................................................171
18.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST .............................172

Content
6
18.3 TYPICAL CONFIGURATION EXAMPLES ................................................173
18.4 MAC TABLE TROUBLESHOOTING ......................................................174
18.5 MAC ADDRESS FUNCTION EXTENSION ..............................................174
18.5.1 MAC Address Binding.........................................................................174
18.6 MAC NOTIFICATION CONFIGURATION ................................................177
18.6.1 Introduction to MAC Notification .......................................................177
18.6.2 MAC Notification Configuration.........................................................177
18.6.3 MAC Notification Example..................................................................178
18.6.4 MAC Notification Troubleshooting.....................................................179
19. MSTP CONFIGURATION...................................................................180
19.1 INTRODUCTION TO MSTP .................................................................180
19.1.1 MSTP Region........................................................................................180
19.1.2 Port Roles .............................................................................................182
19.1.3 MSTP Load Balance.............................................................................182
19.2 MSTP CONFIGURATION TASK LIST....................................................182
19.3 MSTPEXAMPLE..............................................................................187
19.4 MSTP TROUBLESHOOTING...............................................................191
20. QOS CONFIGURATION.....................................................................192
20.1 INTRODUCTION TO QOS....................................................................192
20.1.1 QoS Terms ............................................................................................192
20.1.2 QoS Implementation............................................................................193
20.1.3 Basic QoS Model..................................................................................194
20.2 QOSCONFIGURATION TASK LIST ......................................................199
20.3 QOSEXAMPLE ................................................................................203
20.4 QOSTROUBLESHOOTING .................................................................206
21. FLOW-BASED REDIRECTION..........................................................207
21.1 INTRODUCTION TO FLOW-BASED REDIRECTION...................................207
21.2 FLOW-BASED REDIRECTION CONFIGURATION TASK SEQUENCE ...........207
21.3 FLOW-BASED REDIRECTION EXAMPLES .............................................208
21.4 FLOW-BASED REDIRECTION TROUBLESHOOTING HELP .......................208
22. FLEXIBLE QINQ CONFIGURATION..................................................209

Content
7
22.1 INTRODUCTION TO FLEXIBLE QINQ....................................................209
22.1.1 QinQ Technique....................................................................................209
22.1.2 Basic QinQ............................................................................................209
22.1.3 Flexible QinQ........................................................................................209
22.2 FLEXIBLE QINQCONFIGURATION TASK LIST ......................................209
22.3 FLEXIBLE QINQEXAMPLE.................................................................212
22.4 FLEXIBLE QINQTROUBLESHOOTING .................................................214
23. EGRESS QOS CONFIGURATION.....................................................215
23.1 INTRODUCTION TO EGRESS QOS.......................................................215
23.1.1 Egress QOS Terms...............................................................................215
23.1.2 Basic Egress QoS Model.....................................................................216
23.2 EGRESS QOSCONFIGURATION .........................................................217
23.3 EGRESS QOSEXAMPLES .................................................................221
23.4 EGRESS QOSTROUBLESHOOTING HELP ...........................................223
24. LAYER 3 FORWARD CONFIGURATION...........................................224
24.1 LAYER 3INTERFACE .........................................................................224
24.1.1 Introduction to Layer 3 Interface........................................................224
24.1.2 Layer 3 Interface Configuration Task List.........................................224
24.2 LAYER 3FUNCTION...........................................................................226
24.2.1 Layer 3 function introduction.............................................................226
24.2.2 Layer 3 function configuration...........................................................226
24.3 IP CONFIGURATION ..........................................................................227
24.3.1 Introduction to IPv4, IPv6....................................................................227
24.3.2 IP Configuration...................................................................................229
24.3.3 IP Configuration Examples.................................................................234
24.3.4 IPv6 Troubleshooting ..........................................................................237
24.4 IP FORWARDING...............................................................................237
24.4.1 Introduction to IP Forwarding.............................................................237
24.4.2 IP Route Aggregation Configuration Task.........................................237
24.5 ARP ...............................................................................................238
24.5.1 Introduction to ARP.............................................................................238

Content
8
24.5.2 ARP Configuration Task List...............................................................238
24.5.3 ARP Troubleshooting ..........................................................................239
24.6 L3STATION MOVEMENT .....................................................................239
24.6.1 Introduction to l3 station movement..................................................239
24.6.2 l3 station movement Configuration Task List...................................239
25. ARP SCANNING PREVENTION FUNCTION CONFIGURATION......241
25.1 INTRODUCTION TO ARP SCANNING PREVENTION FUNCTION ................241
25.2 ARP SCANNING PREVENTION CONFIGURATION TASK SEQUENCE.........241
25.3 ARP SCANNING PREVENTION TYPICAL EXAMPLES .............................244
25.4 ARP SCANNING PREVENTION TROUBLESHOOTING HELP.....................245
26. PREVENT ARP, ND SPOOFING CONFIGURATION .........................246
26.1 OVERVIEW.......................................................................................246
26.1.1 ARP (Address Resolution Protocol) ..................................................246
26.1.2 ARP Spoofing.......................................................................................246
26.1.3 How to prevent void ARP/ND Spoofing.............................................246
26.2 PREVENT ARP, ND SPOOFING CONFIGURATION..................................247
26.3 PREVENT ARP, ND SPOOFING EXAMPLE...........................................248
27. ARP GUARD CONFIGURATION .......................................................250
27.1 INTRODUCTION TO ARP GUARD......................................................250
27.2 ARP GUARD CONFIGURATION TASK LIST ........................................251
28. ARP LOCAL PROXY CONFIGURATION...........................................252
28.1 INTRODUCTION TO ARP LOCAL PROXY FUNCTION...............................252
28.2 ARP LOCAL PROXY FUNCTION CONFIGURATION TASK LIST ................253
28.3 TYPICAL EXAMPLES OF ARP LOCAL PROXY FUNCTION.......................253
28.4 ARP LOCAL PROXY FUNCTION TROUBLESHOOTING............................254
29. GRATUITOUS ARP CONFIGURATION .............................................255
29.1 INTRODUCTION TO GRATUITOUS ARP................................................255
29.2 GRATUITOUS ARP CONFIGURATION TASK LIST...................................255
29.3 GRATUITOUS ARP CONFIGURATION EXAMPLE....................................256
29.4 GRATUITOUS ARP TROUBLESHOOTING..............................................257

Content
9
30. KEEPALIVE GATEWAY CONFIGURATION.......................................258
30.1 INTRODUCTION TO KEEPALIVE GATEWAY............................................258
30.2 KEEPALIVE GATEWAY CONFIGURATION TASK LIST ..............................258
30.3 KEEPALIVE GATEWAY EXAMPLE ........................................................259
30.4 KEPALIVE GTEWAY TROUBLESHOOTING.............................................260
31. DHCP CONFIGURATION...................................................................261
31.1 INTRODUCTION TO DHCP .................................................................261
31.2 DHCP SERVER CONFIGURATION.......................................................262
31.3 DHCP RELAY CONFIGURATION .........................................................265
31.4 DHCP CONFIGURATION EXAMPLES...................................................266
31.5 DHCP TROUBLESHOOTING...............................................................269
32. DHCPV6 CONFIGURATION ..............................................................270
32.1 INTRODUCTION TO DHCPV6 .............................................................270
32.2 DHCPV6SERVER CONFIGURATION...................................................271
32.3 DHCPV6RELAY DELEGATION CONFIGURATION..................................273
32.4 DHCPV6PREFIX DELEGATION SERVER CONFIGURATION....................273
32.5 DHCPV6PREFIX DELEGATION CLIENT CONFIGURATION .....................275
32.6 DHCPV6CONFIGURATION EXAMPLES...............................................276
32.7 DHCPV6TROUBLESHOOTING...........................................................280
33. DHCP OPTION 82 CONFIGURATION ...............................................281
33.1 INTRODUCTION TO DHCP OPTION 82.................................................281
33.1.1 DHCP option 82 Message Structure ..................................................281
33.1.2 option 82 Working Mechanism...........................................................282
33.2 DHCP OPTION 82 CONFIGURATION TASK LIST ...................................283
33.3 DHCP OPTION 82APPLICATION EXAMPLES .......................................286
33.4 DHCP OPTION 82 TROUBLESHOOTING ..............................................288
34. DHCPV6 OPTION37, 38.....................................................................290
34.1 INTRODUCTION TO DHCPV6OPTION37, 38........................................290
34.2 DHCPV6OPTION37, 38 CONFIGURATION TASK LIST ..........................291

Content
10
34.3 DHCPV6OPTION37, 38 EXAMPLES...................................................296
34.3.1 DHCPv6 Snooping option37, 38 Example.........................................296
34.3.2 DHCPv6 Relay option37, 38 Example................................................299
34.4 DHCPV6OPTION37, 38 TROUBLESHOOTING .....................................300
35. DHCP SNOOPING CONFIGURATION...............................................301
35.1 INTRODUCTION TO DHCP SNOOPING.................................................301
35.2 DHCP SNOOPING CONFIGURATION TASK SEQUENCE .........................302
35.3 DHCP SNOOPING TYPICAL APPLICATION...........................................307
35.4 DHCP SNOOPING TROUBLESHOOTING HELP .....................................308
35.4.1 Monitor and Debug Information.........................................................308
35.4.2 DHCP Snooping Troubleshooting Help.............................................308
36. DHCP OPTION 60 AND OPTION 43..................................................309
36.1 INTRODUCTION TO DHCP OPTION 60 AND OPTION 43..........................309
36.2 DHCP OPTION 60AND OPTION 43 CONFIGURATION TASK LIST ............309
36.3 DHCPV6OPTION 60 AND OPTION 43 EXAMPLE ..................................310
36.4 DHCP OPTION 60AND OPTION 43 TROUBLESHOOTING .......................310
37. ROUTING PROTOCOL OVERVIEW..................................................312
37.1 ROUTING TABLE...............................................................................313
37.2 IP ROUTING POLICY .........................................................................314
37.2.1 Introduction to Routing Policy ...........................................................314
37.2.2 IP Routing Policy Configuration Task List........................................315
37.2.3 Configuration Examples......................................................................319
37.2.4 Troubleshooting...................................................................................320
38. STATIC ROUTE..................................................................................322
38.1 INTRODUCTION TO STATIC ROUTE......................................................322
38.2 INTRODUCTION TO DEFAULT ROUTE...................................................322
38.3 STATIC ROUTE CONFIGURATION TASK LIST ........................................322
38.4 STATIC ROUTE CONFIGURATION EXAMPLES .......................................323
39. RIP......................................................................................................325
39.1 INTRODUCTION TO RIP .....................................................................325

Content
11
39.2 RIP CONFIGURATION TASK LIST........................................................327
39.3 RIP EXAMPLES ................................................................................334
39.3.1 Typical RIP Examples..........................................................................334
39.3.2 Typical Examples of RIP aggregation function ................................335
39.4 RIP TROUBLESHOOTING...................................................................336
40. RIPNG ................................................................................................338
40.1 INTRODUCTION TO RIPNG .................................................................338
40.2 RIPNG CONFIGURATION TASK LIST....................................................340
40.3 RIPNG CONFIGURATION EXAMPLES...................................................344
40.3.1 Typical RIPng Examples......................................................................344
40.3.2 RIPng Aggregation Route Function Typical Examples....................346
40.4 RIPNG TROUBLESHOOTING...............................................................347
41. BLACK HOLE ROUTING MANUAL ..................................................348
41.1 INTRODUCTION TO BLACK HOLE ROUTING .........................................348
41.2 IPV4BLACK HOLE ROUTING CONFIGURATION TASK ...........................348
41.3 IPV6BLACK HOLE ROUTING CONFIGURATION TASK ...........................348
41.4 BLACK HOLE ROUTING CONFIGURATION EXMAPLES...........................349
41.5 BLACK HOLE ROUTING TROUBLESHOOTING.......................................350
42. BFD ....................................................................................................352
42.1 INTRODUCTION TO BFD....................................................................352
42.2 BFD CONFIGURATION TASK LIST ......................................................352
42.3 EXAMPLES OF BFD..........................................................................355
42.3.1 Example for Linkage of BFD and Static Route.................................355
42.3.2 Example for Linkage of BFD and RIP Route.....................................355
42.3.3 Example for Linkage of BFD and VRRP ............................................356
42.4 BFD TROUBLESHOOTING .................................................................358
43. IPV4 MULTICAST PROTOCOL..........................................................359
43.1 IPV4MULTICAST PROTOCOL OVERVIEW ............................................359
43.1.1 Introduction to Multicast.....................................................................359
43.1.2 Multicast Address................................................................................360

Content
12
43.1.3 IP Multicast Packet Transmission......................................................361
43.1.4 IP Multicast Application.......................................................................362
43.2 DCSCM..........................................................................................362
43.2.1 Introduction to DCSCM .......................................................................362
43.2.2 DCSCM Configuration Task List.........................................................363
43.2.3 DCSCM Configuration Examples.......................................................366
43.2.4 DCSCM Troubleshooting.....................................................................367
43.3 IGMP SNOOPING .............................................................................367
43.3.1 Introduction to IGMP Snooping..........................................................367
43.3.2 IGMP Snooping Configuration Task List...........................................368
43.3.3 IGMP Snooping Examples ..................................................................370
43.3.4 IGMP Snooping Troubleshooting.......................................................373
44. IPV6 MULTICAST PROTOCOL..........................................................374
44.1 IPV6DCSCM..................................................................................374
44.1.1 Introduction to IPv6 DCSCM...............................................................374
44.1.2 IPv6 DCSCM Configuration Task Sequence .....................................374
44.1.3 IPv6 DCSCM Typical Examples..........................................................377
44.1.4 IPv6 DCSCM Troubleshooting............................................................378
44.2 MLD SNOOPING ..............................................................................379
44.2.1 Introduction to MLD Snooping...........................................................379
44.2.2 MLD Snooping Configuration Task....................................................379
44.2.3 MLD Snooping Examples....................................................................381
44.2.4 MLD Snooping Troubleshooting........................................................384
45. MULTICAST VLAN.............................................................................385
45.1 INTRODUCTIONS TO MULTICAST VLAN ..............................................385
45.2 MULTICAST VLAN CONFIGURATION TASK LIST ..................................385
45.3 MULTICAST VLAN EXAMPLES...........................................................386
46. ACL CONFIGURATION......................................................................388
46.1 INTRODUCTION TO ACL ....................................................................388
46.1.1 Access-list ............................................................................................388
46.1.2 Access-group .......................................................................................388
46.1.3 Access-list Action and Global Default Action...................................389
46.2 ACL CONFIGURATION TASK LIST.......................................................389

Content
13
46.3 ACLEXAMPLE.................................................................................407
46.4 ACL TROUBLESHOOTING..................................................................411
47.802.1X CONFIGURATION..................................................................412
47.1 INTRODUCTION TO 802.1X.................................................................412
47.1.1 The Authentication Structure of 802.1x.............................................412
47.1.2 The Work Mechanism of 802.1x .........................................................414
47.1.3 The Encapsulation of EAPOL Messages...........................................415
47.1.4 The Encapsulation of EAP Attributes................................................417
47.1.5 The Authentication Methods of 802.1x..............................................418
47.1.6 The Extension and Optimization of 802.1x .......................................423
47.1.7 The Features of VLAN Allocation.......................................................424
47.2 802.1X CONFIGURATION TASK LIST...................................................425
47.3 802.1X APPLICATION EXAMPLE.........................................................429
47.3.1 Examples of Guest Vlan Applications...............................................429
47.3.2 Examples of IPv4 Radius Applications..............................................431
47.3.3 Examples of IPv6 Radius Application................................................432
47.4 802.1X TROUBLESHOOTING..............................................................433
48. THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT,
VLAN CONFIGURATION............................................................................435
48.1 INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN
PORT,VLAN...........................................................................................435
48.2 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT,VLAN
CONFIGURATION TASK SEQUENCE ............................................................436
48.3 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT,VLAN
TYPICAL EXAMPLES .................................................................................439
48.4 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT,VLAN
TROUBLESHOOTING HELP ........................................................................440
49. OPERATIONAL CONFIGURATION OF AM FUNCTION ...................441
49.1 INTRODUCTION TO AM FUNCTION ......................................................441
49.2 AM FUNCTION CONFIGURATION TASK LIST ........................................441
49.3 AM FUNCTION EXAMPLE ..................................................................443
49.4 AM FUNCTION TROUBLESHOOTING ...................................................443

Content
14
50. TACACS+ CONFIGURATION............................................................445
50.1 INTRODUCTION TO TACACS+...........................................................445
50.2 TACACS+ CONFIGURATION TASK LIST .............................................445
50.3 TACACS+ SCENARIOS TYPICAL EXAMPLES......................................446
50.4 TACACS+ TROUBLESHOOTING ........................................................447
51. RADIUS CONFIGURATION ...............................................................448
51.1 INTRODUCTION TO RADIUS..............................................................448
51.1.1 AAA and RADIUS Introduction...........................................................448
51.1.2 Message structure for RADIUS ..........................................................448
51.2 RADIUS CONFIGURATION TASK LIST................................................450
51.3 RADIUS TYPICAL EXAMPLES...........................................................452
51.3.1 IPv4 Radius Example...........................................................................452
51.3.2 IPv6 RadiusExample............................................................................453
51.4 RADIUS TROUBLESHOOTING ...........................................................454
52. SSL CONFIGURATION......................................................................455
52.1 INTRODUCTION TO SSL ....................................................................455
52.1.1 Basic Element of SSL..........................................................................455
52.2 SSL CONFIGURATION TASK LIST.......................................................457
52.3 SSL TYPICAL EXAMPLE....................................................................457
52.4 SSL TROUBLESHOOTING..................................................................458
53. IPV6 SECURITY RA CONFIGURATION ............................................459
53.1 INTRODUCTION TO IPV6SECURITY RA...............................................459
53.2 IPV6SECURITY RACONFIGURATION TASK SEQUENCE .......................459
53.3 IPV6SECURITY RATYPICAL EXAMPLES ............................................460
53.4 IPV6SECURITY RATROUBLESHOOTING HELP ...................................460
54. VLAN-ACL CONFIGURATION...........................................................462
54.1 INTRODUCTION TO VLAN-ACL.........................................................462
54.2 VLAN-ACL CONFIGURATION TASK LIST............................................462
54.3 VLAN-ACL CONFIGURATION EXAMPLE.............................................464

Content
15
54.4 VLAN-ACL TROUBLESHOOTING.......................................................465
55. MAB CONFIGURATION.....................................................................466
55.1 INTRODUCTION TO MAB ...................................................................466
55.2 MAB CONFIGURATION TASK LIST......................................................466
55.3 MAB EXAMPLE................................................................................468
55.4 MAB TROUBLESHOOTING.................................................................471
56.PPPOE INTERMEDIATE AGENT CONFIGURATION........................472
56.1 INTRODUCTION TO PPPOEINTERMEDIATE AGENT...............................472
56.1.1 Brief Introduction to PPPoE................................................................472
56.1.2 Introduction to PPPoE IA....................................................................472
56.2 PPPOEINTERMEDIATE AGENT CONFIGURATION TASK LIST.................477
56.3 PPPOEINTERMEDIATE AGENT TYPICAL APPLICATION ........................478
56.4 PPPOEINTERMEDIATE AGENT TROUBLESHOOTING............................480
57. SAVI CONFIGURATION.....................................................................481
57.1 INTRODUCTION TO SAVI ...................................................................481
57.2 SAVI CONFIGURATION......................................................................481
57.3 SAVI TYPICAL APPLICATION .............................................................485
57.4 SAVI TROUBLESHOOTING.................................................................486
58.WEB PORTAL CONFIGURATION .....................................................487
58.1 INTRODUCTION TO WEB PORTAL AUTHENTICATION .............................487
58.2 WEB PORTAL AUTHENTICATION CONFIGURATION TASK LIST................487
58.3 WEB PORTAL AUTHENTICATION TYPICAL EXAMPLE ............................489
58.4 WEB PORTAL AUTHENTICATION TROUBLESHOOTING...........................490
59. VRRP CONFIGURATION...................................................................491
59.1 INTRODUCTION TO VRRP .................................................................491
59.2 VRRP CONFIGURATION TASK LIST....................................................492
59.3 VRRP TYPICAL EXAMPLES...............................................................493
59.4 VRRP TROUBLESHOOTING...............................................................494
60. IPV6 VRRPV3 CONFIGURATION......................................................496

Content
16
60.1 INTRODUCTION TO VRRPV3..............................................................496
60.1.1 The Format of VRRPv3 Message........................................................497
60.1.2 VRRPv3 Working Mechanism.............................................................498
60.2 VRRPV3CONFIGURATION................................................................499
60.2.1 Configuration Task Sequence ............................................................499
60.3 VRRPV3TYPICAL EXAMPLES...........................................................501
60.4 VRRPV3TROUBLESHOOTING...........................................................502
61. MRPP CONFIGURATION...................................................................503
61.1 INTRODUCTION TO MRPP.................................................................503
61.1.1 Conception Introduction.....................................................................503
61.1.2 MRPP Protocol Packet Types.............................................................505
61.1.3 MRPP Protocol Operation System.....................................................505
61.2 MRPP CONFIGURATION TASK LIST ...................................................506
61.3 MRPP TYPICAL SCENARIO...............................................................508
61.4 MRPP TROUBLESHOOTING...............................................................510
62.ULPP CONFIGURATION ...................................................................511
62.1 INTRODUCTION TO ULPP..................................................................511
62.2 ULPP CONFIGURATION TASK LIST ....................................................513
62.3 ULPP TYPICAL EXAMPLES ...............................................................515
62.3.1 ULPP Typical Example1.......................................................................515
62.3.2 ULPP Typical Example2.......................................................................517
62.4 ULPP TROUBLESHOOTING ...............................................................518
63. ULSM CONFIGURATION...................................................................520
63.1 INTRODUCTION TO ULSM .................................................................520
63.2 ULSM CONFIGURATION TASK LIST....................................................521
63.3 ULSM TYPICAL EXAMPLE ................................................................522
63.4 ULSM TROUBLESHOOTING...............................................................523
64. MIRROR CONFIGURATION ..............................................................524
64.1 INTRODUCTION TO MIRROR ...............................................................524
64.2 MIRROR CONFIGURATION TASK LIST..................................................524

Content
17
64.3 MIRROR EXAMPLES..........................................................................525
64.4 DEVICE MIRROR TROUBLESHOOTING.................................................526
65. RSPAN CONFIGURATION.................................................................527
65.1 INTRODUCTION TO RSPAN...............................................................527
65.2 RSPAN CONFIGURATION TASK LIST .................................................529
65.3 TYPICAL EXAMPLES OF RSPAN........................................................530
65.4 RSPAN TROUBLESHOOTING.............................................................533
66. SFLOW CONFIGURATION................................................................535
66.1 INTRODUCTION TO SFLOW.................................................................535
66.2 SFLOW CONFIGURATION TASK LIST ...................................................535
66.3 SFLOW EXAMPLES ...........................................................................537
66.4 SFLOW TROUBLESHOOTING ..............................................................538
67. SNTP CONFIGURATION ...................................................................539
67.1 INTRODUCTION TO SNTP..................................................................539
67.2 TYPICAL EXAMPLES OF SNTP CONFIGURATION .................................540
68. NTP FUNCTION CONFIGURATION ..................................................541
68.1 INTRODUCTION TO NTP FUNCTION ....................................................541
68.2 NTP FUNCTION CONFIGURATION TASK LIST.......................................541
68.3 TYPICAL EXAMPLES OF NTP FUNCTION.............................................544
68.4 NTP FUNCTION TROUBLESHOOTING..................................................545
69. DNSV4/V6 CONFIGURATION............................................................546
69.1 INTRODUCTION TO DNS....................................................................546
69.2 DNSV4/V6CONFIGURATION TASK LIST .............................................547
69.3 TYPICAL EXAMPLES OF DNS ............................................................549
69.4 DNS TROUBLESHOOTING .................................................................551
70.SUMMER TIME CONFIGURATION....................................................552
70.1 INTRODUCTION TO SUMMER TIME ......................................................552
70.2 SUMMER TIME CONFIGURATION TASK SEQUENCE...............................552
70.3 EXAMPLES OF SUMMER TIME ............................................................553

Content
18
70.4 SUMMER TIME TROUBLESHOOTING....................................................553
71. MONITOR AND DEBUG.....................................................................554
71.1 PING ...............................................................................................554
71.2 PING6 .............................................................................................554
71.3 TRACEROUTE...................................................................................554
71.4 TRACEROUTE6.................................................................................555
71.5 SHOW .............................................................................................555
71.6 DEBUG............................................................................................556
71.7 SYSTEM LOG....................................................................................557
71.7.1 System Log Introduction.....................................................................557
71.7.2 System Log Configuration..................................................................559
71.7.3 System Log Configuration Example..................................................560
72. RELOAD SWITCH AFTER SPECIFIED TIME....................................562
72.1 INTRODUCE TO RELOAD SWITCH AFTER SPECIFID TIME.......................562
72.2 RELOAD SWITCH AFTER SPECIFID TIME TASK LIST .............................562
73. DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND
SENT BY CPU.............................................................................................563
73.1 INTRODUCTION TO DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED
AND SENT BY CPU...................................................................................563
73.2 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY CPU
TASK LIST ...............................................................................................563

Switch Management
19
1. Switch Management
1.1 Management Options
After purchasing the switch, the user needs to configure the switch for network
management. Switch provides two management options: in-band management and
out-of-band management.
1.1.1 Out-Of-Band Management
Out-of-band management is the management through Console interface. Generally,
the user will use out-of-band management for the initial switch configuration, or when
in-band management is not available. For instance, the user must assign an IP address to
the switch via the Console interface to be able to access the switch through Telnet.
The procedures for managing the switch via Console interface are listed below:
Step 1: setting up the environment:
Fig 1-1 Out-of-band Management Configuration Environment
As shown in above, the serial port (RS-232) is connected to the switch with the serial
cable provided. The table below lists all the devices used in the connection.
Device Name
Description
PC machine
Has functional keyboard and RS-232, with terminal
emulator installed, such as HyperTerminal included in
Windows 9x/NT/2000/XP.
Connect with serial port
This manual suits for next models
1
Table of contents
Other FoxGate Network Router manuals
Popular Network Router manuals by other brands

Grandstream Networks
Grandstream Networks GWN70 Series user manual

3Com
3Com 3C410012A - OfficeConnect Remote 531 Access... Getting started guide

Nortel
Nortel Passport 5430 Notice

NETGEAR
NETGEAR ProSAFE FS728TLP Hardware installation guide

Cabletron Systems
Cabletron Systems MMAC-Plus 9F106-02 reference guide

TP-Link
TP-Link Archer AC1200 quick start guide

3Jtech
3Jtech SM3G III user manual

H3C
H3C S3100-52P Command manual

TRENDnet
TRENDnet TW100-BRF114 Specifications

TRENDnet
TRENDnet TEW-637AP - 300Mbps Wireless Easy-N-Upgrader manual

Atlantis Land
Atlantis Land I-Fly Wireless Broadband Router A02-WR-54G Specifications

Telecom
Telecom T-Sinus 154 DSL quick start guide