q-Tech QSW-2900 User manual

1-1
QSW-2900EthernetSwitch
User’sManual

1-2
QSW-2900IntelligentL2+Switch
ConfigurationManual
1. AccessingSwitch
2. SwitchManagementand Maintenance
3. PortConfiguration
4. VLAN configuration
5. MulticastConfiguration
6. DHCPConfiguration
7. ARPconfiguration
8. ACLConfiguration
9. QOSConfiguration
10. STPConfiguration
11. 802.1XConfigurationCommand
12. SNTPClientConfiguration
13. Syslog Configuration
14. SSHConfiguration
15. LLDPConfiguration
16. ERRPConfiguration
17. PPPoEPlusConfiguration
18. CFMConfiguration

1-1
Content
Content1-1
Chapter1 AccessingSwitch.............................................................................................................1-11
1.1 Command Line Interface....................................................................................................1-11
1.1.1 Command Line Configuration Mode.................................................................1-11
1.1.2 Command SyntaxComprehension...................................................................1-12
1.1.3 SyntaxHelp.......................................................................................................1-13
1.1.4 Historycommand..............................................................................................1-14
1.1.5 Symbolsincommand........................................................................................1-14
1.2 Command SymbolsDescription.........................................................................................1-14
1.2.1 Command ParameterCategories.....................................................................1-15
1.3 Usermanagement.............................................................................................................1-15
1.3.1 Systemdefault username................................................................................1-16
1.3.2 Add user............................................................................................................1-16
1.3.3 Modifypassword...............................................................................................1-16
1.3.4 Modifyprivilege.................................................................................................1-17
1.3.5 Removeusername...........................................................................................1-17
1.3.6 Viewsystemuserinformation...........................................................................1-17
1.4 Remoteauthenticationofadministrator..............................................................................1-18
1.4.1 Start RADIUSremoteauthentication................................................................1-18
1.4.2 Displayauthentication configuration.................................................................1-18
1.5 Waysofmanaging switch...................................................................................................1-18
1.5.1 Manageswitchbyhyperterminal.....................................................................1-18
1.5.2 Manageswitchbytelnet...................................................................................1-19
Chapter2 SwitchManageand Maintenance...................................................................................2-21
2.1 Configuration FilesManagement........................................................................................2-21
2.1.1 Edit configuration files.......................................................................................2-21
2.1.2 Modifyand savecurrent configuration..............................................................2-21
2.1.3 Eraseconfiguration...........................................................................................2-21
2.1.4 Executesaved configuration.............................................................................2-21
2.1.5 Displaysaved configuration..............................................................................2-21
2.1.6 Displaycurrent configuration............................................................................2-22
2.1.7 Configurefileexecutingmode shift...................................................................2-22
2.2 Online Loading Upgrade Program......................................................................................2-22
2.2.1 Upload and download filesbyTFTP.................................................................2-23
2.2.2 Upload and download filesby FTP...................................................................2-23
2.2.3 Download filesbyXmodem..............................................................................2-24
2.3 MACaddress tablemanagement.......................................................................................2-25
2.3.1 Briefintroduction ofMACaddress tablemanagement.....................................2-25
2.3.2 MACaddress tablemanagement list................................................................2-25
2.3.3 ConfiguresystemMACaddress agingtime.....................................................2-25
2.3.4 ConfigureMACaddress item............................................................................2-26
2.3.5 Reboot...............................................................................................................2-28
2.4 SystemMaintenance..........................................................................................................2-28
2.4.1 Useshowcommand tocheck systeminformation...........................................2-28
2.4.2 BasicConfiguration andManagement.............................................................2-29

1-2
2.4.3 Networkconnectingtest command...................................................................2-29
2.4.4 Loopback test command...................................................................................2-30
2.4.5 Administration IPaddress restriction................................................................2-30
2.4.6 ThenumberofTelnet userrestriction...............................................................2-31
2.4.7 Routingtracert command..................................................................................2-31
2.4.8 cpu-carcommand.............................................................................................2-32
2.5 MonitorsystembySNMP...................................................................................................2-32
2.5.1 Briefintroduction ofSNMP................................................................................2-32
2.6 SNMPMechanism.............................................................................................................2-33
2.7 SNMPProtocolVersion......................................................................................................2-33
2.8 MIBOverview....................................................................................................................2-33
2.9 Configuration.....................................................................................................................2-34
2.9.1 Configurecommunitynameand accessingright.............................................2-34
2.9.2 ConfiguresysContact........................................................................................2-35
2.9.3 ConfigureTrapdestination host adress............................................................2-35
2.9.4 ConfiguresysLocation......................................................................................2-36
2.9.5 ConfiguresysName..........................................................................................2-36
2.9.6 Configurenotify.................................................................................................2-37
2.9.7 Configureengine id...........................................................................................2-37
2.9.8 Configureview..................................................................................................2-38
2.9.9 Configuregroup................................................................................................2-38
2.9.10 Configureuser...................................................................................................2-39
2.10 SystemIPconfiguration.....................................................................................................2-40
2.10.1 ConfiguremanageVLAN..................................................................................2-40
2.10.2 Configuration ipaddress bymanualoperation.................................................2-40
2.10.3 BOOTP..............................................................................................................2-41
2.10.4 DHCP................................................................................................................2-41
2.10.5 Displayipaddress.............................................................................................2-41
2.11 Enable/disabledlfforwordpacket.......................................................................................2-42
2.12 CPUAlarmConfiguration...................................................................................................2-42
2.12.1 Briefintroduction ofCPUalarm........................................................................2-42
2.12.2 CPUalarmconfiguration list.............................................................................2-42
2.12.3 Enable/disableCPUalarm................................................................................2-43
2.12.4 ConfigureCPUbusyorunbusythreshold........................................................2-43
2.12.5 DisplayCPUalarminformation.........................................................................2-43
2.13 Anti-DOSAttack.................................................................................................................2-44
2.13.1 IPsegment anti-attack......................................................................................2-44
Chapter3 Port Configuration............................................................................................................3-45
3.1 Port configuration introduction............................................................................................3-45
3.1.1 IntroductiontoBridging.....................................................................................3-45
3.1.2 MajorFunctionalitiesofBridges........................................................................3-45
3.2 Port Configuration..............................................................................................................3-49
3.2.1 Port related configuration..................................................................................3-49
3.2.2 Enterinterfaceconfiguration mode...................................................................3-50
3.2.3 Enable/disablespecified interface....................................................................3-50
3.2.4 Configureinterfaceduplexmode andspeed rate............................................3-50
3.2.5 InterfacePriorutyConfiguration........................................................................3-51
3.2.6 Interfacedescription configuration....................................................................3-51
3.2.7 Ingress/egress bandwidth-controlconfiguration...............................................3-51

1-3
3.2.8 Enable/disableVLANfiltration ofreceivingpacket ofinterface........................3-52
3.2.9 Interfaceingress acceptable-frameconfiguration............................................3-52
3.2.10 Enable/disableinterfaceflow-control................................................................3-52
3.2.11 Port mode configuration....................................................................................3-53
3.2.12 Trunkallowed VLANconfiguration...................................................................3-53
3.2.13 Thedefault vlan-idoftrunkport configuration..................................................3-53
3.2.14 Add access port tospecified VLAN..................................................................3-54
3.2.15 Displayinterfaceinformation............................................................................3-54
3.2.16 Display/ clearinterfacestatistics information....................................................3-54
3.3 Interfacemirror...................................................................................................................3-55
3.3.1 Briefintroduction ofinterfacemirror..................................................................3-55
3.3.2 Interfacemirrorconfiguration............................................................................3-55
3.4 Port LACPconvergentconfiguration...................................................................................3-56
3.4.1 Briefintroduction ofport convergence..............................................................3-56
3.4.2 LACP.................................................................................................................3-57
3.5 ApproachestoLinkAggregation.........................................................................................3-57
3.5.1 ManualLinkAggregation..................................................................................3-57
3.5.2 StaticLACPlinkaggregation............................................................................3-58
3.6 Load Sharing inaLinkAggregation Group.........................................................................3-59
3.7 Aggregation PortGroup.....................................................................................................3-59
3.8 Linkaggregation configuration............................................................................................3-59
3.9 InterfaceCARconfiguration...............................................................................................3-61
3.9.1 Briefintroduction ofinterfaceCAR...................................................................3-61
3.9.2 Port CARconfiguration command list...............................................................3-61
3.9.3 Enable/disableinterfaceglobally......................................................................3-61
3.9.4 Enable/disableinterfaceCARon interface.......................................................3-62
3.9.5 Configurethe reopen timeofthe port shutdownbyport-car............................3-62
3.9.6 Configurethe port-car-rate................................................................................3-62
3.9.7 Displayport-carinformation..............................................................................3-62
3.10 PortAlarmConfiguration....................................................................................................3-63
3.10.1 Briefintroduction ofport alarmconfiguration....................................................3-63
3.10.2 Port alarmconfiguration list..............................................................................3-63
3.10.3 Enable/disableport alarmglobally....................................................................3-63
3.10.4 Enable/disableport alarmon the port...............................................................3-63
3.10.5 Configurethe exceed thresholdand normalthresholdofport alarm...............3-64
3.10.6 Displayport alarm.............................................................................................3-64
3.11 Interfaceshutdown-controlConfiguration............................................................................3-65
3.11.1 Briefintroduction ofshutdown-control..............................................................3-65
3.11.2 Interfaceshutdown-controlConfiguration list...................................................3-65
3.11.3 shutdown-controlConfiguration........................................................................3-65
3.11.4 Configureshutdown-controlopen-time.............................................................3-65
3.11.5 Displayshutdown-control..................................................................................3-66
Chapter4 VLANConfiguration.........................................................................................................4-67
4.1 Introduction toVLAN..........................................................................................................4-67
4.1.1 VLANOverview.................................................................................................4-67
4.1.2 VLANFundamental...........................................................................................4-68
4.2 VLANClassification............................................................................................................4-68
4.3 VLANInterface..................................................................................................................4-69

1-4
4.4 Port-Based and 802.1Q VLAN............................................................................................4-69
4.4.1 Port linktype.....................................................................................................4-69
4.4.2 Default VLAN....................................................................................................4-69
4.5 Policy-Based VLAN............................................................................................................4-69
4.6 SuperVLAN.......................................................................................................................4-70
4.7 Isolate-User-VLAN.............................................................................................................4-70
4.8 VLANinterfacetype...........................................................................................................4-71
4.9 DefaultVLAN.....................................................................................................................4-71
4.10 VLANconfiguration............................................................................................................4-71
4.10.1 VLANconfiguration list......................................................................................4-71
4.10.2 Create/deleteVLAN..........................................................................................4-72
4.10.3 Add/deleteVLANinterface...............................................................................4-72
4.10.4 Specify/restoreVLANdescription.....................................................................4-73
4.10.5 Configureinterfacetype....................................................................................4-73
4.10.6 Configureinterfacedefault vlan ID...................................................................4-73
4.10.7 Configuretagvlan.............................................................................................4-73
4.10.8 DisplayVLANinformation.................................................................................4-74
4.11 PVLAN...............................................................................................................................4-74
4.12 GVRPconfiguration...........................................................................................................4-74
4.12.1 Briefintroduction ofGVRP................................................................................4-74
4.12.2 GARP................................................................................................................4-74
4.12.3 GVRP................................................................................................................4-77
4.12.4 GVRPConfiguration list....................................................................................4-77
4.12.5 Enable/disableglobalGVRP............................................................................4-77
4.12.6 Enable/disableGVRPon aport........................................................................4-77
4.12.7 DisplayGVRP...................................................................................................4-78
4.12.8 Add/deletevlan that canbedynamiclearnt byGVRP.....................................4-78
4.12.9 Displayvlan that canbelearnt byGVRP.........................................................4-78
4.12.10 ExamplesforGVRPconfiguration....................................................................4-79
4.13 QinQ configuration.............................................................................................................4-79
4.13.1 Briefintroduction ofQinQ..................................................................................4-79
4.13.2 IntroductiontoQinQ..........................................................................................4-79
4.13.3 ImplementationsofQinQ..................................................................................4-80
4.13.4 AdjustableTPIDValueofQinQ Frames...........................................................4-80
4.13.5 QinQ configuration list.......................................................................................4-81
4.13.6 ConfigureglobalQinQ......................................................................................4-81
4.13.7 ConfigureQinQ mode ofinterface....................................................................4-81
4.13.8 ConfigureinterfacedynamicQinQ....................................................................4-82
4.13.9 Enable/disablevlan-swap.................................................................................4-82
4.13.10 Configureglobalvlan-swap..............................................................................4-83
4.13.11 Configurerewrite-outer-vlan.............................................................................4-83
4.13.12 DisplaydynamicQinQ......................................................................................4-83
4.13.13 Displayvlan-swap.............................................................................................4-84
4.13.14 Displayrewrite-outer-vlan.................................................................................4-84
Chapter5 Multicast ProtocolConfiguration......................................................................................5-85
5.1 Multicast overview..............................................................................................................5-85
5.1.1 MulticastAddress..............................................................................................5-85
5.2 GMRPOverview................................................................................................................5-87

1-5
5.3 GMRPConfiguration..........................................................................................................5-88
5.3.1 GMRPConfiguration list...................................................................................5-88
5.3.2 Enable/disableglobalGMRP............................................................................5-88
5.3.3 Enable/disableGMRPon aport.......................................................................5-88
5.3.4 DisplayGMRP...................................................................................................5-89
5.3.5 Add/deletemulticast that canbedynamiclearnt byGMRP.............................5-89
5.3.6 Displaymulticast that can belearnt byGMRP.................................................5-89
5.4 IGMPSnooping Configuration............................................................................................5-90
5.4.1 IGMPSnoopingOverview.................................................................................5-90
5.4.2 BasicConceptsinIGMPSnooping...................................................................5-90
5.4.3 HowIGMPSnoopingWorks.............................................................................5-92
5.4.4 ProcessingofMulticast ProtocolMessages.....................................................5-93
5.4.5 ProtocolsandStandards...................................................................................5-96
5.4.6 IGMPSnoopingconfiguration...........................................................................5-96
5.4.7 IGMPSnoopingmulticast interfaceagingtimeconfiguration...........................5-96
5.4.8 IGMPSnoopingmax-response-timeconfiguration...........................................5-97
5.4.9 IGMPSnoopinginterfacefast-leaveconfiguration...........................................5-97
5.4.10 Configurethe numberofthe multicast groupallowed learning........................5-97
5.4.11 IGMPSnoopingpermit/denygroupconfiguration.............................................5-97
5.4.12 IGMPSnoopingroute-port forwardconfiguration.............................................5-98
5.4.13 Enable/disableIGMPSnoopingquerier............................................................5-98
5.4.14 ConfigureIGMPSnoopingquery-interval.........................................................5-98
5.4.15 ConfigureIGMPSnoopingqueriervlan............................................................5-99
5.4.16 ConfigureIGMPSnoopingquerymaxresponse..............................................5-99
5.4.17 ConfigureIGMPSnoopingquerysourceIP.....................................................5-99
5.4.18 ConfigureIGMPSnoopingrouteport aging.....................................................5-99
5.4.19 Add IGMPSnoopingrouteport.......................................................................5-100
5.5 StaticMulticast Configuration...........................................................................................5-100
5.5.1 Briefintroduction ofStaticMulticast................................................................5-100
5.5.2 StaticMulticast Configuration.........................................................................5-100
5.5.3 Createmulticast group....................................................................................5-101
5.5.4 Add interfacestomulticastgroup...................................................................5-101
5.5.5 Displaymulticast groupinformation................................................................5-101
5.5.6 Deleteinterfacemembersfrommulticast group.............................................5-102
5.5.7 Deletemulticast group....................................................................................5-102
5.6 Cross-VLANmulticast Configuration................................................................................5-102
5.6.1 BriefIntroduction ofCross-Vlan multicast......................................................5-102
5.6.2 Cross-VLANMulticast Configuration..............................................................5-102
5.6.3 Enable/disablecross-vlan multicast................................................................5-103
5.6.4 Configuretag/untagattribution ofmulticastpackettransmission and
vlan-idofthe tagged attribution.......................................................................................5-103
5.6.5 Displaycross-vlan multicast...........................................................................5-103
Chapter6 DHCPConfiguration......................................................................................................6-104
6.1 Briefintroduction ofDHCP...............................................................................................6-104
6.2 Introduction toDHCP.......................................................................................................6-104
6.3 DHCPIPAddress Assignment..........................................................................................6-105
6.3.1 IPAddress Assignment Policy........................................................................6-105
6.3.2 ObtainingIPAddressesDynamically..............................................................6-105
6.3.3 UpdatingIPAddress Lease............................................................................6-106
6.4 DHCPPacketFormat.......................................................................................................6-106

1-6
6.5 DHCPPacket Processing Modes.....................................................................................6-107
6.6 Protocolsand Standards..................................................................................................6-108
6.7 DHCPRelayAgent...........................................................................................................6-108
6.7.1 UsageofDHCPRelayAgent..........................................................................6-108
6.7.2 DHCPRelayAgent Fundamentals.................................................................6-108
6.7.3 Option 82 Supporting......................................................................................6-109
6.8 DHCPrelayConfiguration list...........................................................................................6-111
6.8.1 EnableDHCPrelay..........................................................................................6-111
6.8.2 Configurevlan interface...................................................................................6-111
6.9 DHCPsnooping...............................................................................................................6-112
6.9.1 IntroductiontoDHCPSnooping......................................................................6-112
6.10 Configuration DHCPsnooping..........................................................................................6-113
6.10.1 EnableDHCPsnooping..................................................................................6-113
6.10.2 Configuretrust ports.......................................................................................6-113
6.10.3 Configuremaxhost number...........................................................................6-113
6.10.4 ConfigureIPsourceguard..............................................................................6-114
6.10.5 ShowDHCPsnoopingofports.......................................................................6-114
6.10.6 ShowDHCPsnoopingconfiguration ofVLANs..............................................6-114
6.10.7 Showinformation ofclients.............................................................................6-114
Chapter7 ARPConfiguration (DynamicARPInspection).............................................................7-115
7.1 Brief Introduction ofARP..................................................................................................7-115
7.2 ARPconfiguration............................................................................................................7-115
7.2.1 DisplayARPtableitem....................................................................................7-115
7.2.2 Enable/disableARPanti-flood attack..............................................................7-116
7.2.3 ConfiguredenyactionandthresholdofARPanti-flood..................................7-116
7.2.4 ConfigureARPanti-flood recover-time.........................................................7-116
7.2.5 ARPanti-flood MACrecover...........................................................................7-117
7.2.6 DisplayARPanti-flood attack information....................................................7-117
7.2.7 Bind blackholemacgenerated byarpanti-flood tobegeneral......................7-117
7.2.8 Enable/disableARPanti-spoofing..................................................................7-118
7.2.9 ConfigureunknownARPpacket handlingstrategy........................................7-118
7.2.10 Enable/disableARPanti-spoofingvalid-check...............................................7-119
7.2.11 Enable/disableARPanti-spoofingdeny-disguiser..........................................7-119
7.2.12 DisplayARPanti-spoofing............................................................................7-119
7.2.13 Configuretrust port ofARPanti-attack...........................................................7-120
Chapter8 ACLConfiguration.........................................................................................................8-121
8.1 ACLOverview..................................................................................................................8-121
8.1.1 ACLMatchOrder............................................................................................8-121
8.1.2 WaystoApplyACLon aSwitch......................................................................8-122
8.1.3 ACLsBased on TimeRanges.........................................................................8-122
8.2 ConfiguringACL...............................................................................................................8-123
8.2.1 Matchingorderconfiguration..........................................................................8-123
8.2.2 ACLsupport....................................................................................................8-123
8.3 ACLconfiguration.............................................................................................................8-124
8.3.1 Configuration list.............................................................................................8-124
8.3.2 Configuretimerange......................................................................................8-124
8.3.3 StandardACL..................................................................................................8-125
8.3.4 Define extendedACL......................................................................................8-126

1-7
8.3.5 Define layer2ACL..........................................................................................8-127
8.3.6 User-defined ACL............................................................................................8-128
8.3.7 ActivateACL....................................................................................................8-129
8.4 Monitorand maintanenceofACL......................................................................................8-129
Chapter9 QOSConfiguration........................................................................................................9-131
9.1 Briefintroduction ofQOS.................................................................................................9-131
9.2 QOSConfiguration...........................................................................................................9-133
9.2.1 QoSConfiguration list.....................................................................................9-133
9.2.2 Packet redirection configuration.....................................................................9-133
9.2.3 Priorityconfiguration.......................................................................................9-133
9.2.4 Queue-schedulerconfiguration.......................................................................9-134
9.2.5 The cos-maprelationshipofhardwarepriorityqueue andpriorityof
IEEE802.1pprotocol........................................................................................................9-134
9.2.6 Flowmirrorconfiguration................................................................................9-135
9.2.7 Flowstatisticconfiguration..............................................................................9-135
9.2.8 Trafficrewritevlan configuration.....................................................................9-135
9.2.9 Traffic-insert-vlan configuration.......................................................................9-136
9.3 Monitorand maintenanceofQoS.....................................................................................9-136
9.4 Portisolation....................................................................................................................9-137
9.4.1 Briefintroduction ofport isolation...................................................................9-137
9.4.2 Port isolation configuration..............................................................................9-137
9.5 Stromcontrol....................................................................................................................9-138
9.5.1 Briefintroduction ofstromcontrol...................................................................9-138
9.5.2 Stromcontrolconfiguration.............................................................................9-138
Chapter10 STPConfiguration.......................................................................................................10-139
10.1 Briefintroduction ofSTPConfiguration...........................................................................10-139
10.1.1 IntroductiontoSTP.......................................................................................10-139
10.1.2 IntroductiontoMSTP....................................................................................10-146
10.1.3 ProtocolsandStandards...............................................................................10-151
10.2 STPConfiguration..........................................................................................................10-152
10.2.1 STPConfiguration list...................................................................................10-152
10.2.2 Enable/disableSTP......................................................................................10-152
10.2.3 Enable/disableinterfaceSTP.......................................................................10-152
10.2.4 ConfigureSTPpriority...................................................................................10-153
10.2.5 ConfigureswitchForwardDelay...................................................................10-153
10.2.6 ConfigureHelloTime....................................................................................10-154
10.2.7 ConfigureMaxAge.......................................................................................10-154
10.2.8 Configurepathcost ofspecified interfaces...................................................10-154
10.2.9 ConfigureSTPpriorityod specified port.......................................................10-155
10.2.10 Configurespanning-tree root-guard..............................................................10-155
10.2.11 Configureinterfacetoforcetosend rstppacket...........................................10-155
10.2.12 Configurelinktypeofspecified interface......................................................10-156
10.2.13 Configurethe current port asanedgeport...................................................10-156
10.2.14 Configurethe speed limit ofsendingBPDU ofspecified interface...............10-156
10.2.15 STPmonitorandmaintainenance................................................................10-157
10.2.16 Enable/disableSTPremote-loop-detect.......................................................10-158
10.3 Brief Introduction of MSTP.............................................................................................10-158
10.4 MSTPConfiguration.......................................................................................................10-158
10.4.1 MSTPconfiguration list.................................................................................10-158

1-8
10.4.2 ConfigureMSTPtimerparameter.................................................................10-159
10.4.3 ConfigureMSTPconfiguration mark.............................................................10-159
10.4.4 ConfigureMSTPnetbridgepriority...............................................................10-160
10.4.5 ConfigureMSTPinterfaceedgeinterfacestatus..........................................10-160
10.4.6 ConfigureMSTPinterfacelinktype..............................................................10-160
10.4.7 ConfigureMSTPinterfacepathcost.............................................................10-160
10.4.8 ConfigureMSTPinterfacepriority.................................................................10-161
10.4.9 Configurespanning-tree mst root-guard.......................................................10-161
10.4.10 DisplayMSTPconfiguration information.......................................................10-161
10.4.11 Enable/disabledigest snooping....................................................................10-162
10.4.12 ConfigureIgnoreofVLAN.............................................................................10-162
Chapter11 802.1XConfiguration Command.................................................................................11-163
11.1 Briefintroduction of802.1Xconfiguration.......................................................................11-163
11.2 802.1XConfiguration.....................................................................................................11-163
11.2.1 AAAconfiguration mode...............................................................................11-163
11.2.2 RADIUSServerConfiguration......................................................................11-163
11.2.3 DomainConfiguration...................................................................................11-165
11.2.4 802.1XConfiguration....................................................................................11-167
Chapter12 SNTPClient Configuration..........................................................................................12-169
12.1 Briefintroduction ofSNTPprotocol.................................................................................12-169
12.2 SNTPclient configuration...............................................................................................12-169
12.2.1 Enable/disableSNTPclient..........................................................................12-169
12.2.2 SNTPclient workingmode configuration......................................................12-170
12.2.3 SNTPclientunicast serverconfiguration......................................................12-170
12.2.4 SNTPclient broadcastdelayconfiguration...................................................12-170
12.2.5 SNTPclient multicastTTLconfiguration.......................................................12-170
12.2.6 SNTPclient poll intervalconfiguration..........................................................12-171
12.2.7 SNTPclient retransmit configuration............................................................12-171
12.2.8 SNTPclient validserverconfiguration..........................................................12-171
12.2.9 SNTPclient MD5authentication configuration.............................................12-172
Chapter13 SyslogConfigiration.....................................................................................................13-173
13.1 Briefintroduction ofSyslog.............................................................................................13-173
13.2 Syslog Configiration.......................................................................................................13-173
13.2.1 Enable/disableSyslog...................................................................................13-174
13.2.2 Syslogsequencenumberconfiguration.......................................................13-174
13.2.3 Syslogtimestampsconfiguration.................................................................13-174
13.2.4 Syslogterminaloutputtingconfiguration.......................................................13-174
13.2.5 Syslogloggingbuffered outputtingconfiguration..........................................13-175
13.2.6 SyslogFlashstorageoutputtingconfiguration..............................................13-176
13.2.7 Sysloglogginghost outputtingconfiguration................................................13-176
13.2.8 SyslogSNMPAgent outputtingconfiguration...............................................13-177
13.2.9 Moduledebugconfiguration.........................................................................13-178
Chapter14 SSHConfiguration.......................................................................................................14-179
14.1 Briefintroduction ofSSH................................................................................................14-179
14.2 SSHConfiguration.........................................................................................................14-179
14.2.1 Enable/disableSSHfunction ofthe device...................................................14-179
14.2.2 SSHkeyconfiguration..................................................................................14-179
14.2.3 Others............................................................................................................14-180

1-9
Chapter15 LLDPconfiguration......................................................................................................15-182
15.1 Briefintroduction ofLLDPprotocol.................................................................................15-182
15.2 Introduction toLLDP......................................................................................................15-182
15.2.1 LLDPOverview.............................................................................................15-182
15.3 LLDPconfiguration.........................................................................................................15-183
15.3.1 LLDPconfiguration list..................................................................................15-183
15.3.2 Enable/disableglobalLLDP..........................................................................15-183
15.3.3 ConfigureLLDPhello-time............................................................................15-183
15.3.4 ConfigureLLDPhold-time.............................................................................15-184
15.3.5 InterfaceLLDPpacketreceiving/sendingmode configuration.....................15-184
15.3.6 DisplayLLDPinformation.............................................................................15-184
Chapter16 ERRPCommand Configuration..................................................................................16-186
16.1 Briefintroduction ofERRP..............................................................................................16-186
16.2 ERRPOverview.............................................................................................................16-186
16.3 BasicConceptsinERRP................................................................................................16-186
16.3.1 ERRPdomain...............................................................................................16-186
16.3.2 ERRPring.....................................................................................................16-187
16.3.3 ControlVLANanddataVLAN......................................................................16-187
16.3.4 Node..............................................................................................................16-187
16.3.5 Primaryport and secondaryport..................................................................16-187
16.3.6 Common port and edgeport.........................................................................16-188
16.3.7 Multi-domainintersection common port........................................................16-188
16.3.8 Timers...........................................................................................................16-188
16.3.9 ERRPPackets..............................................................................................16-189
16.4 Typical ERRPNetworking..............................................................................................16-189
16.4.1 Singlering.....................................................................................................16-189
16.4.2 Multi-domaintangent rings............................................................................16-190
16.4.3 Single-domainintersectingrings...................................................................16-191
16.4.4 Dualhomed rings..........................................................................................16-191
16.4.5 Multi-domainintersectingrings.....................................................................16-192
16.5 HowERRPWorks..........................................................................................................16-192
16.5.1 Pollingmechanism........................................................................................16-192
16.5.2 Linkdownalarmmechanism........................................................................16-193
16.5.3 Ringrecovery................................................................................................16-193
16.5.4 Broadcaststormsuppression mechanisminamulti-homed subringin
caseofprimaryringlinkfailure......................................................................................16-193
16.5.5 ProtocolsandStandards...............................................................................16-193
16.6 ERRPConfiguration.......................................................................................................16-193
16.6.1 ERRPConfiguration list................................................................................16-193
16.6.2 ERRPconfiguration.......................................................................................16-194
16.6.3 ConfigureERRPtimer..................................................................................16-194
16.6.4 EnterERRPconfiguration mode...................................................................16-194
16.6.5 Configurecontrol-vlan ofERRPdomain.......................................................16-194
16.6.6 CreateERRPring.........................................................................................16-195
16.6.7 Enable/disableERRPring............................................................................16-196
16.6.8 DisplayERRPdomainand ringinformation.................................................16-196
Chapter17 PPPoEPlusConfiguration..........................................................................................17-197
17.1 Brief Introduction of PPPoEPlus....................................................................................17-197
17.2 PPPoEPlusConfiguration..............................................................................................17-197

1-10
17.2.1 PPPoEPlusConfiguration list......................................................................17-197
17.2.2 Enable/disablePPPoEPlus..........................................................................17-197
17.2.3 ConfigurePPPoEPlustype..........................................................................17-198
Chapter18 CFMConfiguration......................................................................................................18-199
18.1 Briefintroduction ofCFM................................................................................................18-199
18.2 Connectivityfaultmanagement overview........................................................................18-199
18.3 BasicConceptsinConnectivityFaultDetection..............................................................18-199
18.3.1 Maintenancedomain.....................................................................................18-199
18.3.2 Maintenanceassociation..............................................................................18-199
18.3.3 Maintenancepoint.........................................................................................18-199
18.3.4 BasicFunctionsofConnectivityFault Management....................................18-201
18.3.5 ProtocolsandStandards...............................................................................18-201
18.4 CFMConfiguration.........................................................................................................18-201
18.4.1 CFMConfiguration list..................................................................................18-201
18.4.2 Configurecfmdomain...................................................................................18-202
18.4.3 Configurecfmmeplevel...............................................................................18-202
18.4.4 Configurecfmmiplevel................................................................................18-203
18.4.5 Configureremotecfmrmeplevel..................................................................18-203
18.4.6 Configurecfmcc interval..............................................................................18-203
18.4.7 Enable/disableVLANsendingcfmcc enablelevel......................................18-204
18.4.8 cfmping.........................................................................................................18-204
18.4.9 cfmtraceroute...............................................................................................18-205
18.4.10 Displaycfmdomain.......................................................................................18-205
18.4.11 Displaycfmmaintenance-pointslocal..........................................................18-205
18.4.12 Displaycfmmaintenance-pointsremote......................................................18-206
18.4.13 Displaycfmcc database...............................................................................18-206
18.4.14 Displaycfmerrors.........................................................................................18-207

1-11
Chapter1Accessing Switch
Thischapteristhebasicknowledgeforsystemmanagement, including:
·Commandlineinterface
·Commandsyntax comprehension
·Syntax help
·Historycommand
·Symbolsincommand
·Parameterincommand
·Usermanagement
·Waysforswitchmanagement
1.1CommandLineInterface
Systemprovidesaseriesofconfigurationcommandandcommandlineinterface.Usercanconfigureand
manageswitchbycommandline. Commandlineinterfacehasthefeaturesasfollowing:
·LocalconfigurationbyConsoleinterface
·Localorremoteconfigurationby TelNet
·Configurecommandclassificationprotectiontoguarantee unauthorizeduserillegalaccessing.
·Input“?”atany momenttoobtainhelpinformation
·Providesuchnetworktestcommandaspingtodiagnosenetworkfault
·ProvideFTP,TFTP, Xmodemtodownloadanduploadfiles
·Keywordspartialmatchingsearchingisadoptedbycommandlineconvertorforusertoinput
non-conflictingkeywords, suchas:interface commandcanonlyinput“interf”
1.1.1Command Line ConfigurationMode
Systemcommandlineadoptsclassification protectiontopreventillegalaccessingofunauthorizeduser.Each
command modeisfordifferentconfigurationwiththeconnectionanddistinction.Forexample,aftersuccessful
accessing,userofall levelcanentercommon usermodewhichcanonlyseethesystemoperationinformation;
administratorcaninput“enable”toenterprivilegedmode;input“configureterminal”toenterglobalconfiguration
modefromprivilegedmodewhichcanenterrelatedconfigurationmodeaccordingtoinputtingdifferent
configurationcommand. Forexample:
Commandlineprovidescommandmodeasfollowing:
·Usermode
·Privilegedmode
·Globalconfigurationmode
·Interface configurationmode
·VLANconfigurationmode
·AAAconfigurationmode

1-12
·RADIUSconfiguration mode
·Domainconfigurationmode
Thefunctionanddetailsofeachcommandmodeareasfollowing:
Table1. CommandLineConfigurationMode
Commandline
mode
Function Prompt
character
Commandforentering Commandforexiting
Usermode Seeswitch
operation
information
QTECH> Connectwithswitchafter
inputtingusernameand
password
exit disconnectwithswitch
Privilegedmode Seeswitch
operation
information
and manage
system
QTECH# Inputenableinusermode exit returntousermode
quit disconnect withswitch
Global
configurationmode
Configure
global
parameter
QTECH(con
fig)#
Inputconfigureterminal in
privilegedmode
exit,endreturntoprivilegedmode
quit disconnect withswitch
Interface
configurationmode
Configure
interface
parameter
QTECH(con
fig-if-etherne
t-0/1)#
Input“interfaceEthernet0/1”
inglobalconfigurationmode,
interfaceconfigurationcan
enterotherinterfacemodeand
VLAN configurationmode
without inputting“exit”.
VLAN
configurationmode
Configure
VLAN
parameter
QTECH(con
fig-if-vlan)#
Input“vlan2”inglobal
configurationmode,VLAN
configurationmodecanenter
otherVLANmodeand
interfaceconfigurationmode
without inputting“exit”.
AAAconfiguration
mode
Create
domain
QTECH(con
fig-aaa)#
Input“aaa” inglobal
configurationmode
end returntoprivilegedmode
exit returntoglobalconfiguration
mode
quit disconnect withswitch
RADIUS
configurationmode
Configure
RADIUS
server
parameter
QTECH(con
fig-radius-de
fault)#
Input“radiushostdefault”in
globalconfigurationmode
Domain
configurationmode
Configure
domain
parameter
QTECH(con
fig-aaa-test.c
om)#
Input“domaintest.com”in
AAAconfigurationmode
end returntoprivilegedmode
exit returntoAAAconfiguration
mode
quit disconnect withswitch
1.1.2Command SyntaxComprehension
Thischapterdescribesthestepsneededforcommandconfiguration. Pleasereadthissectionandrelateddetail
informationofcommandlineinterface inthefollowingsectionscarefully.
Thelogginginidentityverificationofthesystemconsoleofthisswitchisusedtoverifytheidentityofthe
operatinguser. Itpermitsand refusesthelogginginbymatchingrecognizingusernameandpassword.
Step1. Followingareshowedwhenenteringcommandlineinterface,
Username(1-32 chars):
Pleaseinputusername,press Enterbutton, andthenthepromptisasfollowing:
Password(1-16 chars):
Inputpassword. Ifit iscorrect, entertheusermodewiththefollowingprompt:
QTECH>
&Note:Defaultedloginandpasswordisadmin/123456.

1-13
Inswitchsystem,thereare2differentprivileges.Oneisadministrator,andtheotheriscommonuser.
Commonuseronlycansee theconfiguration informationofswitchwithoutrighttomodifyit butadministratorcan
manageandconfiguretheswitchbyspecifiedcommand.
Logginginasadministratorcanenterprivilegedmodefromusermode.
QTECH>enable
Step2: Inputcommand
Skiptostep3, ifthecommandneedsinputtheparameter.Continuethisstepifthecommandneedinputthe
parameter.
If thecommandneedsaparameter,pleaseinputit.Wheninputtingaparameter,keywordisneeded.
Theparameterofthecommandisspecifiedwhichisthenumberorcharacterstring orIPaddress inacertain
range.Input“?”whenyouareuncomprehending, andinputthecorrectkeywordaccordingtotheprompt. Keywordis
whatistobeoperatedincommand.
If morethanoneparameterareneeded,pleaseinputkeywordsandeachparameterinturnaccordingtothe
promptuntil “<enter>”isshowedinprompttopress enterbutton.
Step3: Press enterbuttonafterinputtingcompletecommand.
Forexample:
!Userneednotinputparameter
QTECH#quit
“quit”isacommandwithoutparameter.Thenameofthecommandisquit.Press enterbutton afterinputting
it toexecutethiscommand.
!Userneedinputparameter
QTECH(config)#vlan3
“vlan3”isacommand withparameterandkeyword,vlanofwhichiscommandkeywordand3ofwhichis
parameter.
1.1.3SyntaxHelp
Thereisbuilt-insyntaxhelpincommandlineinterface.If youarenotsureaboutthesyntaxofsome
command,obtainall commandanditssimpledescriptionofthecurrentmodebyinputting“?”orhelpcommand;
listall keywordsbeginningwiththecurrentcharacterstring byinputting “?”closelyafterthecommandcharacter
string;input“?”afterspace,if“?”isinthesamelocationofthekeyword,all keywordsanditssimpledescription
will belisted,if“?”isinthesamelocationofparameter,all theparameterdescriptionwill belisted,andyou can
continuetoinputcommandaccordingtothepromptuntil thepromptcommandis “enter〉”topress enterbutton to
executecommand.
Forexample:
Directlyinput“?”inprivilegedmode
QTECH#?
Systemmodecommands:
clsclearscreen
helpdescriptionoftheinteractivehelp
pingpingcommand
quitdisconnectfromswitchandquit
……
Input“?”closelyafterkeyword

1-14
QTECH(config)#interf?
interface
Input“?”aftercommandcharacterstringandspace
QTECH(config)#spanning-tree ?
forward-timeconfigswitchdelaytime
hello-timeconfigswitchhellotime
max-ageconfigswitchmaxagingtime
priorityconfigswitchpriority
<enter>Thecommandend.
·Parameterrangeandform
QTECH(config)#spanning-tree forward-time?
INTEGER<4-30>switchdelaytime:<4-30>(second)
·Commandlineendprompt
QTECH(config)#spanning-tree ?
<enter>Thecommandend.
1.1.4Historycommand
Commandlineinterface willsavehistorycommandinputtedby userautomaticallysothatusercaninvoke
historycommandsavedbycommandlineinterface and re-executeit.Atmost100 historycommandscanbesavedby
command lineinterface foreachuser. Input“Ctrl+P”toaccess lastcommand, and“Ctrl+N”fornextcommand.
1.1.5Symbolsincommand
Thereareall kindsofsymbolsincommandsyntaxwhichisnotapartofcommandbutusedtodescribehow
toinputthiscommand.Table1-2makesabriefdescriptionofthesesymbols.
1.2CommandSymbolsDescription
Symbol Description
Verticalbars| Verticalbars(|)meanscoordinate,togetherusingwithbraces({})and
squarebrackets([ ]).
Squarebrackets[] Squarebrackets([ ]) meanoptionalelements.
Forexample:
showvlan[vlan-id]
Braces{}
Braces({})group requiredchoices,andverticalbars(|)separatethe
alternativeelements. Bracesandverticalbarswithinsquarebrackets([{|}])
meanarequiredchoicewithinanoptionalelement.

1-15
1.2.1Command ParameterCategories
Thereare5 categoriescommandparameterasfollowing:
·Scale
Twonumericalvaluelinkedbyhypheninanglebrackets(<>)meansthisparameterissomenumberinthe
rangeofthosetwonumbers.
Forexample:
INTEGER<1-10> meansusercaninputanyintegerbetween1and 10 (include1and 10),suchas8isa
validnumber.
·IPaddress
ThepromptwhichisintheformofA.B.C.D.meanstheparameterisanIPaddress.AvalidIPaddress is
neededtoinput.
Forexample:
192.168.0.100 isavalidIPaddress.
·MACaddress
ThepromptwhichisintheformofH:H:H:H:H:HmeanstheparameterisaMACaddress.AvalidMAC
address isneededtoinput. IfamulticastMACaddress isneeded, therewill berelatedprompt.
Forexample:
01:02:03:04:05:06 isavalidMACaddress.
·Interface list
ThepromptofinterfacelistisSTRING<3-4>.Interface parameterinterface-numisintheformof
interface-type+interface-number.Interface-typeisEthernetandinterface-numberisslot-num/port-num,inwhich
slot-numisintherangeof0 to2, andport-numisintherangeof1 to24. Seriateinterfaceswiththesametypecanbe
linkedbytokeyword,buttheportnumbertotherightofthetokeywordmustbelargerthantheonetotheleftofthe
keyword,andthisargumentonlycanberepeatedforup to3times.Thespecialdeclarationofinterface parameter
interface listwill bedisplayedinthecommand.
Forexample:
showspanning-tree interface ethernet0/1ethernet0/3toethernet0/5
meansdisplayingspanning-tree information ofinterfaceethernet0/1ethernet0/3 toethernet0/5
·Characterstring
ThepromptwhichisintheformofSTRING<3-4>meanstheparameterisacharacterstring whichisinthe
formof1 to19 characters.“?”canbeinputtedtodisplaytheconcretecommanddescription.
1.3Usermanagement
Thereare2 privilegesforuser:
·administrator
·normaluser
Normalusercanonlyenterusermodenotprivilegedmodeafterloggingin,sothathecanonlysee system
informationbutnottoconfigureit.Administratorhastherighttoenterall modes,andqueryandconfigureall
parameters.

1-16
1.3.1Systemdefaultuser name
Thereisasystemdefault built-inusernamecalled admin,and theinitialpasswordis 123456.Itis
suggestedmodifyingpasswordwhenlogginginswitchforthefirsttimetoavoidleaking it. Thisusernamecannotbe
deletedandtheprivilegecannotbemodifiedeither.Italsopossessestherighttomanageotherusers.Please
rememberyourmodifiedpassword.
1.3.2Add user
Loginwiththeidentityofsystemadministratoradmintoenterprivilegedmode,thenglobalconfiguration
modeby usingusernamecommand.Inputusername, user’sprivilege,passwordtoaddnewuseraccordingto system
promptorbyusingthefollowingcommand.
username username [ privilege level ]{ passwordencryption-typepassword }
username:Usernameofnewusersandexistedusersrangesfrom1to32 printablecharactersexcludingsuch
wildcardsas'/', ':', '*', '?', '\\', '<', '>', '|', '"' etc.
privilege:Privilegeofnewuserrangesfrom0 to15. 0 to1 meansuserwhile2 to15 meansadministrator.
encryption-type:thevalueofit is0or7.0meansnon-encryptionand 7meansencryption (Itisnotsupported
now).
password:Loginpasswordfornewuserandmodifiedpasswordoftheexisteduserrangesfrom1to16
charactersornumbers.
If theprivilegedoesn’tconfigure, thedefault privilegeisordinaryuser.Atmost8 usersaresupported.
Caution:Usernamesupportscaseinsensitivitywhilepassworddoesn’tsupportcasesensitivity.
!Addanewadministrator“red”, configureprivilegetobe3, and passwordtobe1234
QTECH(config)#usernameredprivilege3password01234
1.3.3Modifypassword
Inglobalconfigurationmode,systemadministratoradmincanusethefollowingcommandtomodify
passwordofhisorotheruser. Otherusercanonlymodifyhisownpassword.
usernamechange-password
Forexample:
!Modifythepasswordofuser“red”tobe123456
QTECH(config)#usernamechange-password
pleaseinputyouloginpassword:******
pleaseinputusername:red
Pleaseinputusernewpassword:******
Pleaseinputusercomfirmpassword:******
changeuserredpasswordsuccess.

1-17
1.3.4Modifyprivilege
Inglobalconfigurationmode,onlyadministratoradmincanusefollowingcommandtomodifytheprivilege
ofotheruser.
username username [ privilege level ]{ passwordencryption-typepassword }
username:Usernameofnewusersandexistedusersrangesfrom1to32 printablecharactersexcludingsuch
wildcardsas'/', ':', '*', '?', '\\', '<', '>', '|', '"' etc.
privilege:Privilegeofnewuserorthemodifiedprivilegeofexisteduserrangesfrom0 to15. 0 to1 meansuser
while2 to15 meansadministrator. Caution:theprivilegeofadministratorcannotbemodified.
encryption-type:thevalueofit is0or7.0meansnon-encryptionand 7meansencryption (Itisnotsupported
now).
password:Loginpasswordfornewuserandmodifiedpasswordoftheexisteduserrangesfrom1to16
charactersornumbers.
If inputtingnothingtomodifytheprivilegeofexisteduser, theprivilegedoesn’tmodify.
&Caution:Usernamesupportscaseinsensitivitywhilepassworddoesn’tsupportcase
sensitivity.
Forexample:
!Modifytheprivilegeofadministrator“red”tobe1, andpasswordtobe1234
QTECH(config)#usernameredprivilege1password01234
1.3.5Remove username
Systemadministratoradmincanusefollowingcommandtoremoveusernameinglobalconfigurationmode
nousername username
Usernameistheusernametobedeleted.
Forexample:
!Removeuserred
QTECH(config)#nousernamered
1.3.6Viewsystemuserinformation
Viewuserlist, and input
showusername
command or
showusername[username]
command inanyconfigurationmodetodisplayinformationofall users.
Forexample:
!Displayinformationofuserred
QTECH(config)#showusernamered
displayuserinformation
usernamerole

1-18
____________________________________________________________
redADMIN
1.4Remote authenticationofadministrator
Afterauthentication,user’sdefaultprivilegeisnormaluser.OnlywhenthereisService-Typefieldin
authenticationacceptingpacketthevalueofwhichisAdministrative,user’sprivilegeisadministrator.
Caution:Adminuseronlysupportslocaldatabaseauthentication.
1.4.1StartRADIUSremote authentication
Usefollowingcommand inglobaconfigurationmode:
muser { local |{ radius radiusname { pap|chap }[ local ]}}
ItcanbeconfiguredtoauthenticateonlybyRADIUSremoteauthenticationorbylocaldatabase
authenticationafternoresponseofRADIUSservercausedbyfailingconnection.
1.4.2Displayauthenticationconfiguration
Usefollowingcommand todisplayauthentication configuration.
showmuser
1.5Waysofmanagingswitch
Systemprovidesfollowing waysofmanagement:
·Byhyperterminalaccessingcommand-lineinterface(CLI)
·Bytelnetmanagingsystem
·BySNMPmanagingsoftwaremanagementsystem
·ByWeb browsersuchasInternetExplorermanagingsystem
1.5.1Manageswitchbyhyperterminal
Usehyperterminal(orsimulationterminalsoftware)connecttoConsoletoaccess systemcommandline
interface (CLI)byhyperterminal.
Configuration:Open“file”->“attribute”menu,poppingupawindow.Enterconfigurationtorestoreitto
defaultvalue,andclick“setting”andthenchoose“auto-detect”inthepulldownlistof“terminalsimulation”and
click[ok].Afterthesuccessfulconnectionandseeingloggingininterface ofoperationsysteminterminal,configure
switchbycommandlineinterface. Thestepsareasfollowing:
Step1:ConnectswitchConsolewithcomputerserialport;
Step2:Aftertheswitchpoweronandsystemsuccessfulbooting, logginginpromptcanbeseen:
Username(1-32 chars):
Other manuals for QSW-2900
1
Table of contents
Other q-Tech Network Router manuals

q-Tech
q-Tech QSR-3920 Series User manual

q-Tech
q-Tech QSW-9010 User manual

q-Tech
q-Tech QSR-2920 Series User manual

q-Tech
q-Tech QSR-2920 Series Instruction sheet

q-Tech
q-Tech QSW-3900 User manual

q-Tech
q-Tech SMS Lite 4G User manual

q-Tech
q-Tech QSR-3920 Series Instruction sheet

q-Tech
q-Tech QSR-2830 User manual