Quanta Cloud Technology QuantaMesh QNOS5 User manual

QuantaMesh
Ethernet Switch
Configuration Guide
QNOS5 NOS Platform

2
REVISIONS
Version
Date
Description
Authors
1.0
15-Nov-2016
1. 1st release
Oliver Wu, James Chu,
WT Chou, and Thomas Lin
1.1
28-Mar-2017
1. New features added including BFD,
VRF Lite, LACP Fallback, and service
prohibit access
James Chu, Oliver and WT
Chou

3
Contents
QuantaMesh Ethernet Switch Configuration Guide.............................................1
1.QuantaMesh QNOS5 Features .......................................................................19
1.1. Switching Features Introduction............................................................................................ 19
1.1.1. VLAN Support ...................................................................................................................................................19
1.1.2. Double VLANs ...................................................................................................................................................19
1.1.3. Switching Modes ..............................................................................................................................................19
1.1.4. Spanning Tree Protocols (STP) ..........................................................................................................................19
1.1.5. Rapid Spanning Tree.........................................................................................................................................19
1.1.6. Multiple Spanning Tree.....................................................................................................................................19
1.1.7. Bridge Protocol Data Unit (BPDU) Guard .........................................................................................................20
1.1.8. BPDU Filtering ..................................................................................................................................................20
1.1.9. Port-channel .....................................................................................................................................................20
1.1.10.Link Aggregate Control Protocol (LACP) ...........................................................................................................20
1.1.11.Multi Chass Link Aggregation Group (MLAG) ...................................................................................................20
1.1.12.Flow Control Support (IEEE 802.3x) ..................................................................................................................20
1.1.13.Asymmetric Flow Control..................................................................................................................................21
1.1.14.Alternate Store and Forward (ASF)...................................................................................................................21
1.1.15.Jumbo Frames Support .....................................................................................................................................21
1.1.16.Auto-MDI/MDIX Support ..................................................................................................................................21
1.1.17.Unidirectional Link Detection (UDLD) ...............................................................................................................21
1.1.18.Expandable Port Configuration ........................................................................................................................21
1.1.19.VLAN-aware MAC-based Switching..................................................................................................................22
1.1.20.Back Pressure Support ......................................................................................................................................22
1.1.21.Auto Negotiation ..............................................................................................................................................22
1.1.22.Storm Control ...................................................................................................................................................22
1.1.23.Port Mirroring...................................................................................................................................................22
1.1.24.sFlow.................................................................................................................................................................23
1.1.25.Static and Dynamic MAC Address Tables .........................................................................................................23
1.1.26.Link Layer Discovery Protocol (LLDP) ................................................................................................................23
1.1.27.Link Layer Discovery Protocol (LLDP) for Media Endpoint Device.....................................................................23
1.1.28.DHCP Layer 2 Relay...........................................................................................................................................23
1.1.29.MAC Multicast Support ....................................................................................................................................24
1.1.30.IGMP Snooping .................................................................................................................................................24
1.1.31.Source Specific Multicasting (SSM)...................................................................................................................24
1.1.32.Control Packet Flooding....................................................................................................................................24

4
1.1.33.Flooding to mRouter Ports................................................................................................................................24
1.1.34.IGMP Snooping Querier ....................................................................................................................................24
1.1.35.Management and Control Plane ACLs ..............................................................................................................25
1.1.36.Remote Switched Port Analyzer (RSPAN) .........................................................................................................25
1.1.37.Link Dependency...............................................................................................................................................25
1.1.38.IPv6 Router Advertisement Guard ....................................................................................................................25
1.1.39.FIP Snooping .....................................................................................................................................................26
1.1.40.ECN Support......................................................................................................................................................26
1.2. Security Features ................................................................................................................... 26
1.2.1. Configurable Access and Authentication Profiles .............................................................................................26
1.2.2. AAA Command Authorization...........................................................................................................................27
1.2.3. Password-protected Management Access .......................................................................................................27
1.2.4. Strong Password Enforcement .........................................................................................................................27
1.2.5. MAC-based Port Security ..................................................................................................................................27
1.2.6. RADIUS Client....................................................................................................................................................27
1.2.7. TACACS+ Client .................................................................................................................................................27
1.2.8. Dot1x Authentication (IEEE 802.1X) .................................................................................................................27
1.2.9. MAC Authentication Bypass .............................................................................................................................28
1.2.10.DHCP Snooping .................................................................................................................................................28
1.2.11.Dynamic ARP Inspection ...................................................................................................................................28
1.2.12.IP Source Address Guard...................................................................................................................................28
1.2.13.Service Prohibit Access .....................................................................................................................................28
1.3. Quality of Service Features .................................................................................................... 28
1.3.1. Access Control Lists (ACL) .................................................................................................................................29
1.3.2. ACL Remarks .....................................................................................................................................................29
1.3.3. ACL Rule Priority ...............................................................................................................................................29
1.3.4. Differentiated Service (DIffServ) .......................................................................................................................29
1.3.5. Class of Service (CoS) ........................................................................................................................................29
1.4. Management Features........................................................................................................... 29
1.4.1. Management Options.......................................................................................................................................29
1.4.2. Management of Basic Network Information....................................................................................................30
1.4.3. Dual Software Images ......................................................................................................................................30
1.4.4. File Management..............................................................................................................................................30
1.4.5. FTP File Management.......................................................................................................................................30
1.4.6. Malicious Code Detection .................................................................................................................................30
1.4.7. Automatic Installation of Firmware and Configuration....................................................................................30
1.4.8. Warm Reboot ...................................................................................................................................................31

5
1.4.9. SNMP Alarms and Trap Logs ............................................................................................................................31
1.4.10.Remote Monitoring (RMON) ............................................................................................................................31
1.4.11.Statistics Application ........................................................................................................................................31
1.4.12.Log Messages ...................................................................................................................................................31
1.4.13.System Time Management...............................................................................................................................32
1.4.14.Source IP Address Configuration ......................................................................................................................32
1.4.15.Multiple Linux Routing Tables ..........................................................................................................................32
1.4.16.Core Dump ........................................................................................................................................................32
1.4.16.1. Core Dump File Handling ..............................................................................................................................32
1.4.17.Open Network Install Environment Support .....................................................................................................32
1.4.18.Interface Error Disable and Auto Recovery.......................................................................................................33
1.5. Routing Features.................................................................................................................... 33
1.5.1. IP Unnumbered.................................................................................................................................................33
1.5.2. Open Shortest Path First (OSPF) .......................................................................................................................33
1.5.3. Border Gateway Partol (BGP) ...........................................................................................................................33
1.5.4. VLAN Routing....................................................................................................................................................34
1.5.5. IP Configuration................................................................................................................................................34
1.5.6. Address Resolution Protocol (ARP) Table Management...................................................................................34
1.5.7. BOOTP/DHCP Relay Agent................................................................................................................................35
1.5.8. IP Helper and UDP Relay...................................................................................................................................35
1.5.9. Routing Table....................................................................................................................................................35
1.5.10.Virtual Router Redundancy Protocol (VRRP) ....................................................................................................35
1.5.11.Algorithmic Longest Prefex Match (ALPM).......................................................................................................35
1.5.12.Bidirectional Forwarding Detection..................................................................................................................35
1.5.13.VRF Lite Operation and Configuration..............................................................................................................36
1.6. Layer 3 Multicast Features..................................................................................................... 36
1.6.1. Internet Group Management Protocol .............................................................................................................36
1.6.2. Protocol Independent Multicast .......................................................................................................................36
1.6.2.1. Dense Mode ((PIM-DM)................................................................................................................................36
1.6.2.2. Spare Mode (PIM-SM) ..................................................................................................................................36
1.6.2.3. Source Specific Multicast (PIM-SSM) ............................................................................................................36
1.6.2.4. PIM IPv6 Support ..........................................................................................................................................37
1.6.3. MLD/MLDv2 (RFC2710/RFC3810) ....................................................................................................................37
1.7. Data Center Features ............................................................................................................. 37
1.7.1. Priority-based Flow Control ..............................................................................................................................37
1.7.2. Data Center Bridging Exchange Protocol..........................................................................................................37
1.7.3. CoS Queuing and Enhanced Transmission Selection.........................................................................................37

6
1.7.4. VXLAN Gateway................................................................................................................................................38
2.Getting Started ..............................................................................................39
2.1. Accessing the switch Command-Line Interface..................................................................... 39
2.1.1. Connecting to the Switch Console ....................................................................................................................39
2.2. Accessing the Switch CLI Through the Network .................................................................... 40
2.2.1. Using the Service Port or Management VLAN Interface for Remote Management .........................................40
2.2.1.1. Configuring Service Port Information ...........................................................................................................41
2.2.1.2. Configuring the In-Band Management Interface .........................................................................................41
2.2.2. DHCP Option 61 ................................................................................................................................................42
2.2.2.1. Configuring DHCP Option 61 ........................................................................................................................42
2.3. Booting the Switch................................................................................................................. 43
2.3.1. Utility Menu Functions......................................................................................................................................44
2.3.1.1. Start QNOS5 Application ..............................................................................................................................45
2.3.1.2. Update Image...............................................................................................................................................45
2.3.1.3. Load Configuration .......................................................................................................................................47
2.3.1.4. Select Serial Speed ........................................................................................................................................48
2.3.1.5. Retrieve Error Log .........................................................................................................................................48
2.3.1.6. Erase Current Configuration .........................................................................................................................49
2.3.1.7. Erase Permanent Storage .............................................................................................................................49
2.3.1.8. Select Boot Method ......................................................................................................................................49
2.3.1.9. Activate Backup Image.................................................................................................................................50
2.3.1.10. Start Diagnostic Application .........................................................................................................................50
2.3.1.11. Reboot ..........................................................................................................................................................50
2.3.1.12. Erase All Configuration Files .........................................................................................................................50
2.4. Understanding the User Interfaces........................................................................................ 50
2.4.1. Using the Command-Line Interface ..................................................................................................................51
2.4.2. Using SNMP ......................................................................................................................................................51
2.4.2.1. SNMPv3 ........................................................................................................................................................52
2.4.2.2. SNMP Configuration example.......................................................................................................................52
3.Configuring L2 Switching Features .................................................................57
3.1. VLANs 57
3.1.1. VLAN Tagging ...................................................................................................................................................58
3.1.2. Double-VLAN Tagging.......................................................................................................................................58
3.1.3. Default VLAN Behavior .....................................................................................................................................59
3.1.4. VLAN Configuration Example ...........................................................................................................................60
3.1.4.1. Configuring the VLANs and Ports on Switch 1 ..............................................................................................62

7
3.1.4.2. Configuring the VLANs and Ports on Switch 2 ..............................................................................................64
3.2. Switchport Modes.................................................................................................................. 64
3.3. Port-channels –Operation and Configuration ...................................................................... 66
3.3.1. Static and Dynamic Port-channel .....................................................................................................................66
3.3.2. Port-channel Hashing .......................................................................................................................................66
3.3.2.1. Resilient Hasing ............................................................................................................................................67
3.3.2.2. Hash Prediction with ECMP and Port-channel..............................................................................................67
3.3.3. Port-channel Interface Overview ......................................................................................................................68
3.3.4. Port-channel Interaction with Other Features..................................................................................................68
3.3.4.1. VLAN .............................................................................................................................................................68
3.3.4.2. STP ................................................................................................................................................................69
3.3.4.3. Statistics .......................................................................................................................................................69
3.3.5. Port-channel Configuration Guidelines.............................................................................................................69
3.3.5.1. Port-channel Configuration Examples ..........................................................................................................69
3.3.5.2. Configuration Dynamic Port-channels..........................................................................................................70
3.3.5.3. Configuration Static Port-channels...............................................................................................................71
3.4. LACP Fallback Configuration .................................................................................................. 72
3.4.1. Configuring Dynamic Port-channels .................................................................................................................72
3.4.2. Configuring Static Port-channels ......................................................................................................................73
3.5. MLAG –Operation and Configuration ................................................................................... 74
3.5.1. Overview...........................................................................................................................................................75
3.5.2. Deployment Scenarios ......................................................................................................................................75
3.5.2.1. Definitions.....................................................................................................................................................76
3.5.2.2. Configuration Consistency ............................................................................................................................77
3.5.3. MLAG Fast Failover...........................................................................................................................................79
3.5.4. MLAG Configuration .........................................................................................................................................79
3.6. Unidirectional Link Detection (UDLD).................................................................................... 82
3.6.1. UDLD Modes .....................................................................................................................................................82
3.6.2. UDLD and Port-channel Interfaces ...................................................................................................................82
3.6.3. Configuring UDLD .............................................................................................................................................82
3.7. Port Mirroring ........................................................................................................................ 84
3.7.1. Configuring Port Mirroring ...............................................................................................................................84
3.7.2. Configuring RSPAN ...........................................................................................................................................85
3.7.2.1. Configuration on the Source Switch (SW1)...................................................................................................85
3.7.2.2. Configuration on the Intermediate Switch (SW2).........................................................................................86
3.7.2.3. Configuration on the Destination Switch (SW3) ...........................................................................................87

8
3.7.3. VLAN-based Mirroring ......................................................................................................................................87
3.7.4. Flow-based Mirroring .......................................................................................................................................87
3.8. Spanning Tree Protocol.......................................................................................................... 88
3.8.1. Classic STP, Multiple STP, and Rapdi STP..........................................................................................................88
3.8.2. STP Operation...................................................................................................................................................88
3.8.3. MSTP in the Network ........................................................................................................................................89
3.8.4. Optional STP Features ......................................................................................................................................92
3.8.4.1. BPDU Flooding ..............................................................................................................................................92
3.8.4.2. Edge Port ......................................................................................................................................................92
3.8.4.3. PDU Filtering.................................................................................................................................................92
3.8.4.4. Root Guard ...................................................................................................................................................93
3.8.4.5. Loop Guard ...................................................................................................................................................93
3.8.4.6. BPDU Protection ...........................................................................................................................................93
3.8.5. STP Configuring Examples ................................................................................................................................94
3.8.5.1. Configuring STP ............................................................................................................................................94
3.8.5.2. Configuring MSTP .........................................................................................................................................95
3.9. IGMP Snooping ...................................................................................................................... 97
3.9.1. IGMP Snooping Querier ....................................................................................................................................97
3.9.2. Configuring IGMP Snooping .............................................................................................................................97
3.9.3. IGMPv3/SSM Snooping...................................................................................................................................100
3.10. MLD Snooping .................................................................................................. 101
3.10.1.MLD Snooping Configuration Example ...........................................................................................................101
3.10.1.1. MLD Snooping Configuration Example .......................................................................................................102
3.10.1.2. MLD Snooping Verification Example ..........................................................................................................103
3.10.2.MLD Snooping First Leave Configuration Example .........................................................................................103
3.10.2.1. MLD Snooping Configuration......................................................................................................................104
3.10.3.MLD Snooping Querier Configuration Example ..............................................................................................104
3.11. LLDP and LLDP-MED ......................................................................................... 106
3.11.1.LLDP and Data Center Application..................................................................................................................106
3.11.2.Configuring LLDP ............................................................................................................................................106
3.12. sFlow................................................................................................................. 108
3.12.1.sFlow Sampling...............................................................................................................................................109
3.12.1.1. Packet Flow Sampling.................................................................................................................................110
3.12.1.2. Counter Sampling .......................................................................................................................................110
3.12.2.Configuring sFlow ...........................................................................................................................................110
3.13. Link Dependency .............................................................................................. 112

9
3.14. AR Guard........................................................................................................... 113
3.15. FIP Snooping ..................................................................................................... 113
3.16. ECN ................................................................................................................... 117
3.16.1.Enabling ECN in Microsoft Windows ..............................................................................................................118
3.16.2.Example 1: SLA Example.................................................................................................................................118
3.16.3.Example 2: Data Cetner TCP (DCTCP) Configuration ......................................................................................121
4.Configuring Security Features ......................................................................123
4.1. Controlling Management Access ......................................................................................... 123
4.1.1. Using RADIUS Servers for Management Security ...........................................................................................123
4.1.1.1. RADIUS Dynamic Authorization ..................................................................................................................124
4.1.2. Using TACACS+ to Control Management Access ............................................................................................126
4.1.3. Configuring and Applying Authentication Profiles..........................................................................................126
4.1.3.1. Configuring Authentication Profiles for Post-based Authentication...........................................................128
4.1.4. Configuring the Primary and Secondary RADIUS Servers ...............................................................................128
4.1.5. Configuring an Authentication Profile ............................................................................................................129
4.2. Configuring DHCP Snooping, DAI, and IPSG......................................................................... 130
4.2.1. DHCP Snooping Overview ...............................................................................................................................130
4.2.1.1. Populating the DHCP Snooping Bindings Database....................................................................................131
4.2.1.2. DHCP Snooping and VLANs.........................................................................................................................131
4.2.1.3. DHCP Snooping Logging and Rate Limits....................................................................................................132
4.2.2. IP Source Guard Overview ..............................................................................................................................132
4.2.2.1. IPSG and Port Security ................................................................................................................................132
4.2.3. Dynamic ARP Inspection Overview .................................................................................................................133
4.2.3.1. Optional DAI Features ................................................................................................................................133
4.2.4. Increasing Security with DHCP Snooping, DAI, and IPSG ................................................................................133
4.2.5. Configuring DHCP Snooping ...........................................................................................................................134
4.2.6. Configuring IPSG.............................................................................................................................................135
4.3. ACLs 136
4.3.1. MAC ACLs........................................................................................................................................................136
4.3.2. IP ACLs ............................................................................................................................................................137
4.3.3. ACL Redirect Function .....................................................................................................................................137
4.3.4. ACL Mirror Function........................................................................................................................................138
4.3.5. ACL Logging ....................................................................................................................................................138
4.3.6. Time-based ACLs.............................................................................................................................................138
4.3.7. ACL Rule Remarks ...........................................................................................................................................139
4.3.8. ACL Rule Priority .............................................................................................................................................139

10
4.3.9. ACL Limitations ...............................................................................................................................................139
4.3.10.ACL Configuration Process..............................................................................................................................140
4.3.11.Preventing False ACL Matches........................................................................................................................140
4.3.12.IPv6 ACL Qualifies ...........................................................................................................................................141
4.3.13.ACL Configuration Examples...........................................................................................................................141
4.3.13.1. Configuring an IP ACL .................................................................................................................................141
4.3.13.2. Configuring a MAC ACL...............................................................................................................................143
4.3.13.3. Configuring a Time-based ACL....................................................................................................................144
4.4. Control Plane Policing (CoPP) .............................................................................................. 145
4.4.1. CoPP Configuration Examples.........................................................................................................................146
4.5. Service Prohibit Access ........................................................................................................ 148
4.5.1. Configuring Service Prohibit ...........................................................................................................................148
5.Configuring Quality of Service......................................................................149
5.1. CoS 149
5.1.1. Trusted and Untrusted Port Modes ................................................................................................................149
5.1.2. Traffic Shaping on Egress Traffic ....................................................................................................................149
5.1.3. Defining Traffic Queues ..................................................................................................................................149
5.1.3.1. Supported Queue Management Methods ..................................................................................................150
5.1.3.2. CoS Configuration Example ........................................................................................................................150
5.2. DiffServ 152
5.2.1. DiffServ Functionality and Switch Roles..........................................................................................................153
5.2.2. Elements of DiffServ Configuration ................................................................................................................153
5.2.3. Configuration DiffServ to Provide Subnets Equal Access to External Network ...............................................153
6.Configuring Switch Management Features...................................................156
6.1. Managing Images and Files.................................................................................................. 156
6.1.1. Supported File Management Methods ...........................................................................................................156
6.1.2. Uploading and Downloading Files ..................................................................................................................157
6.1.3. Managing Switch Software (Images) .............................................................................................................157
6.1.4. Managing Configuration Files ........................................................................................................................157
6.1.4.1. Editing and Downloading Configuration Files ............................................................................................158
6.1.4.2. Creating and Applying Configuration Scripts..............................................................................................158
6.1.4.3. Non-Disruptive Configuration Management ..............................................................................................159
6.1.5. Saving the Running Configuration ..................................................................................................................159
6.1.6. File and Image Management Configuration Examples ..................................................................................159
6.1.7. Upgrading the Firmware ................................................................................................................................159
6.1.7.1. Managing Configuration Scripts.................................................................................................................162

11
6.2. Enabling Automatic Image Installation and System Configuration ..................................... 163
6.2.1. DHCP Auto Install Process...............................................................................................................................164
6.2.1.1. Obtaining IP address Information ..............................................................................................................164
6.2.1.2. Obtaining Other Dynamic Information.......................................................................................................164
6.2.1.3. Obtaining the Image...................................................................................................................................165
6.2.1.4. Obtaining the Configuration File ................................................................................................................165
6.2.2. Monitoring and Completing the DHCP Auto Install Process ...........................................................................166
6.2.2.1. Saving a Configuration ...............................................................................................................................167
6.2.2.2. Stopping and Restarting the Auto Install Process.......................................................................................167
6.2.2.3. Managing Downloaded Configuration Files ...............................................................................................167
6.2.3. DHCP Auto Install Dependencies ....................................................................................................................167
6.2.4. Default Auto Install Values .............................................................................................................................168
6.2.5. Enabling DHCP Auto Install and Auto Image Download.................................................................................168
6.3. Downloading a Core Dump .................................................................................................. 169
6.3.1. Using NFS to Download a Core Dump ............................................................................................................169
6.3.2. Using TFTP or FTP to Download a Core Dump................................................................................................170
6.4. Setting the System Time ...................................................................................................... 170
6.4.1. Manual Time Configuration............................................................................................................................171
6.4.2. Configuring SNTP............................................................................................................................................172
6.5. Configuring System Log Example......................................................................................... 172
6.5.1. Example 1 to Add Syslog Host ........................................................................................................................172
6.5.2. Example 2 to Verify Syslog Host Configuration ..............................................................................................173
7.Configuring Routing .....................................................................................177
7.1. Basic Routing and Features.................................................................................................. 177
7.1.1. VLAN Routing..................................................................................................................................................177
7.1.1.1. When to Configure VLAN Routing ..............................................................................................................178
7.1.2. IP Routing Configuration Example..................................................................................................................178
7.1.2.1. Configuring Switch A ..................................................................................................................................179
7.1.2.2. Configuring Switch B...................................................................................................................................180
7.1.3. IP Unnumbered Configuration Example .........................................................................................................181
7.2. OSPF 183
7.2.1. Configuring an OSPF Border Router and Setting Interface Costs ...................................................................184
7.3. VRRP 186
7.3.1. VRRP Operation in the Network .....................................................................................................................186
7.3.1.1. VRRP Router Priority...................................................................................................................................186
7.3.1.2. VRRP Preemption........................................................................................................................................186

12
7.3.1.3. VRRP Accept Mode .....................................................................................................................................187
7.3.1.4. VRRP Route and Interface Tracking............................................................................................................187
7.3.2. VRRP Configuration Example..........................................................................................................................187
7.3.2.1. VRRP with Load Sharing .............................................................................................................................188
7.3.2.2. VRRP with Route and Interface Tracking....................................................................................................190
7.4. IP Helper 193
7.4.1. Relay Agent Configuration Example ...............................................................................................................195
7.5. Border Gateway Patrol (BGP) .............................................................................................. 197
7.5.1. BGP Topology .................................................................................................................................................197
7.5.1.1. External BGP Peering ..................................................................................................................................198
7.5.1.2. Internal BGP Peering ..................................................................................................................................198
7.5.1.3. Advertising Network Layer Reachability Information.................................................................................198
7.5.2. BGP Behavior ..................................................................................................................................................199
7.5.2.1. BGP Route Selection ...................................................................................................................................199
7.5.3. BGP Configuration Example............................................................................................................................200
7.5.3.1. Configuring BGP on Router 9......................................................................................................................200
7.5.3.2. Configuring BGP on Router 3......................................................................................................................203
7.6. IPv6 Routing ......................................................................................................................... 204
7.6.1. How Does IPv6 Compare with IPv6.................................................................................................................205
7.6.2. How are IPv6 Interface Configured.................................................................................................................205
7.6.3. Default IPv6 Routing Values ...........................................................................................................................206
7.6.4. Configuring IPv6 Routing Features .................................................................................................................206
7.6.4.1. Configuring Global IP Routing Settings.......................................................................................................207
7.6.4.2. Configuring IPv6 Interface Settings ............................................................................................................207
7.6.4.3. Configuring IPv6 Neighbor Discovery .........................................................................................................208
7.6.4.4. Configuring IPv6 Route Table Entries and Route Preferences ....................................................................210
7.6.4.5. IPv6 Show Commands ................................................................................................................................210
7.7. ECMP Hash Selection ........................................................................................................... 211
7.8. Bidirectional Forwarding Detection..................................................................................... 211
7.8.1. Configuring BFD..............................................................................................................................................212
7.9. VRF Lite Operation and Configuration................................................................................. 213
7.9.1. Route Leaking .................................................................................................................................................213
7.9.2. Adding Leaked Routes ....................................................................................................................................214
7.9.3. Using Leaked Routes.......................................................................................................................................214
7.9.4. CPU-Originated Traffic....................................................................................................................................214
7.9.5. VRF Features Support .....................................................................................................................................214

13
7.9.6. VRF Lite Development Scenarios ....................................................................................................................216
7.9.7. VRF Configuration Example ............................................................................................................................219
8.Configuring Multicast Routing .....................................................................221
8.1. L3 Multicast Overview ......................................................................................................... 221
8.1.1. IP Multicast Traffic .........................................................................................................................................221
8.1.2. Multicast Protocol Switch Support .................................................................................................................221
8.1.3. Multicast Protocol Roles.................................................................................................................................222
8.1.4. Multicast Switch Requirements ......................................................................................................................222
8.1.5. Determining which Multicast Protocols to Enable .........................................................................................222
8.1.6. Multicast Routing Tables ................................................................................................................................222
8.1.7. Multicast Tunneling ........................................................................................................................................222
8.1.8. IGMP...............................................................................................................................................................223
8.1.8.1. IGMP Proxy .................................................................................................................................................223
8.1.9. MLD Protocol ..................................................................................................................................................223
8.1.9.1. Join Mechanism ..........................................................................................................................................224
8.1.9.2. Leave Mechanism .......................................................................................................................................224
8.1.10.PIM Protocol ...................................................................................................................................................224
8.1.10.1. Using PIM-SM as the Multicast Routing Protocol.......................................................................................224
8.1.10.2. Using PIM-DM as the Multicast Routing Protocol......................................................................................225
8.2. Default L3 Multicast Values ................................................................................................. 225
8.3. L3 Multicast Configuration Examples .................................................................................. 227
8.3.1. Configuring Multicast VLAN Routing with IGMP and PIM-SM .......................................................................227
8.3.2. Example 1: MLDv1 Configuration ...................................................................................................................229
8.3.3. Example 2: MLDv2 Configuration ...................................................................................................................230
8.3.4. Example 3: MLD Configuration Verification ..................................................................................................230
9.Configuring Data Center Features ................................................................232
9.1. Data Center Technology Overview ...................................................................................... 232
9.2. Priority-based Flow Control ................................................................................................. 232
9.2.1. PFC Operation and Behavior...........................................................................................................................233
9.2.2. Configuring PFC ..............................................................................................................................................233
9.3. Data Center Bridging Exchange Protocol............................................................................. 234
9.3.1. Interoperability with IEEE DCBX......................................................................................................................234
9.3.2. DCBX and Port Roles .......................................................................................................................................235
9.3.3. Configuration Source Port Selection Process ..................................................................................................236
9.3.4. Configuring DCBX ...........................................................................................................................................237
9.4. CoS Queuing......................................................................................................................... 238

14
9.4.1. CoS Queuing Function and Behavior...............................................................................................................239
9.4.1.1. Trusted Port Queue Mappings....................................................................................................................239
9.4.1.2. Un-trusted Port Default Priority .................................................................................................................239
9.4.1.3. Queue Configuration ..................................................................................................................................239
9.4.1.4. Traffic Class Groups ....................................................................................................................................240
9.4.2. Configuring CoS Queuing and ETS ..................................................................................................................240
9.5. Enhanced Transmission Selection........................................................................................ 243
9.5.1. ETS Operation and Dependencies...................................................................................................................243
9.6. VXLAN Gateway Operation and Configuration.................................................................... 243
9.6.1. Overview.........................................................................................................................................................243
9.6.1.1. VXLAN .........................................................................................................................................................244
9.6.2. Functional Description ....................................................................................................................................244
9.6.2.1. VTEP to VN Association ..............................................................................................................................244
9.6.2.2. Configuration of Remote VTEPs..................................................................................................................245
9.6.2.3. VTEP Nex-hop Resolution ...........................................................................................................................246
9.6.2.4. VXLAN UDP Destination Port ......................................................................................................................246
9.6.2.5. Tunnels .......................................................................................................................................................246
9.6.2.6. MAC Learning and Aging ............................................................................................................................247
9.6.2.7. Host Configuration .....................................................................................................................................247
9.6.2.8. ECMP ..........................................................................................................................................................248
9.6.2.9. MTU ............................................................................................................................................................248
9.6.2.10. TTL and DSCP/TOS ......................................................................................................................................248
9.6.2.11. Packet Forwarding......................................................................................................................................249
9.6.3. VXLAN Configuration Examples......................................................................................................................249
9.6.3.1. Unicast VXLAN Configuration .....................................................................................................................250
Appendix A: Term and Acronyms ....................................................................254

15
LIST of FIGURES
Figure 2-1: SNMP Configuration Topology............................................................................................. 52
Figure 3-1: Simple VLAN Topology ........................................................................................................ 58
Figure 3-2: Double VLAN Tagging Network Example .............................................................................. 59
Figure 3-3: Network Topology for VLAN Configuration .......................................................................... 61
Figure 3-4: Port-channel Configuration ................................................................................................. 66
Figure 3-5: STP Blocking........................................................................................................................ 75
Figure 3-6: MLAG in a Layer-2 Network................................................................................................. 76
Figure 3-7: MLAG Components ............................................................................................................. 76
Figure 3-8: MLAG Configuration Diagram .............................................................................................. 79
Figure 3-9: UDLD Configuration Example............................................................................................... 83
Figure 3-10: RSPAN Configuration Example........................................................................................... 85
Figure 3-11: STP in a Small Bridged Network ......................................................................................... 89
Figure 3-12: Single STP Topology........................................................................................................... 90
Figure 3-13: Logical MSTP Environment ................................................................................................ 91
Figure 3-14: STP Example Network Diagram.......................................................................................... 94
Figure 3-15: MSTP Configuration Example............................................................................................. 96
Figure 3-16: Switch with IGMP Snooping............................................................................................... 98
Figure 3-17: MLD Snooping Topology.................................................................................................. 102
Figure 3-18: MLD Snooping Leave Configuration Topology................................................................... 104
Figure 3-19: MLD Snooping Querier Configuration Example................................................................. 105
Figure 3-20: sFlow Architecture .......................................................................................................... 109
Figure 4-1: RADIUS Topology .............................................................................................................. 124
Figure 4-2: DHCP Binding.................................................................................................................... 131
Figure 4-3: DHCP Snooping Configuration Topology............................................................................. 134
Figure 4-4: IP ACL Example Network Diagram...................................................................................... 142

16
Figure 4-5:CoPP Configuration Topology ............................................................................................. 146
Figure 5-1: CoS Mapping and Queue Configuration ............................................................................. 151
Figure 5-2: DiffServ Internet Access Example Network Diagram........................................................... 154
Figure 6-1: System Log Topology......................................................................................................... 173
Figure 6-2: Syslog Server Screen.......................................................................................................... 175
Figure 6-3: Syslog packet capture........................................................................................................ 175
Figure 7-1: Inter-VLAN Routing ........................................................................................................... 178
Figure 7-2: IP Routing Example Topology ............................................................................................ 179
Figure 7-3: IP Unnumbered Configuration Example ............................................................................. 181
Figure 7-4: OSPF Area Border Router .................................................................................................. 184
Figure 7-5: VRRP with Load Sharing Network Diagram......................................................................... 188
Figure 7-6: VRRP with Tracking Network Diagram ............................................................................... 190
Figure 7-7: L3 Relay Network Diagram ................................................................................................ 196
Figure 7-8: Example BGP Network ...................................................................................................... 198
Figure 7-9: BGP Configuration Example............................................................................................... 200
Figure 7-10: VRF Scenarios................................................................................................................. 217
Figure 7-11: VRF routing with shared services ..................................................................................... 217
Figure 8-1: Multicast VLAN Routing with IGMP and PIM-SM Example .................................................. 227
Figure 8-2: MLD Topology.................................................................................................................. 229
Figure 9-1: DCBX Configuration........................................................................................................... 237
Figure 9-2: Unicast VXLAN Topology ................................................................................................... 250

17
LIST of TABLES
Table 3-1: VLAN default and maximum values ...................................................................................... 60
Table 3-2: Example VLAN...................................................................................................................... 60
Table 3-3: Switch Port Configuration..................................................................................................... 61
Table 3-4: Switchport Mode Behavior................................................................................................... 65
Table 4-1: Authentication Method Summary....................................................................................... 127
Table 4-2: Common EtherType Numbers............................................................................................. 140
Table 4-3: Common IP Protocol Numbers............................................................................................ 141
Table 6-1: Files to Manage.................................................................................................................. 156
Table 6-2: Configuration File Possibilities ............................................................................................ 166
Table 6-3: TFTP Request Types............................................................................................................ 166
Table 6-4: Auto Install Defaults........................................................................................................... 168
Table 7-1: IP Routing Features ............................................................................................................ 177
Table 7-2: Default Ports –UDP Port Numbers Implied by Wildcard ...................................................... 193
Table 7-3: UDP Port Allocation............................................................................................................ 195
Table 7-4: IPv6 Routing Defaults......................................................................................................... 206
Table 7-5: IPv6 Interface Defaults ....................................................................................................... 206
Table 7-6: Global IP Routing Settings .................................................................................................. 207
Table 7-7: IPv6 Interface Settings........................................................................................................ 208
Table 7-8: IPv6 Neighbor Discovery Settings........................................................................................ 209
Table 7-9: IPv6 Static Routes .............................................................................................................. 210
Table 7-10: IPv6 Configuration Status ................................................................................................. 211
Table 7-11: VRF features list .............................................................................................................. 216
Table 8-1: Multicast Protocol Support Summary ................................................................................. 221
Table 8-2: L3 Multicast Defaults.......................................................................................................... 226
Table 9-1: DCB Features ..................................................................................................................... 232

18
Table 9-2: 802.1p-to-TCG Mapping ..................................................................................................... 242
Table 9-3: TCG Bandwidth and Scheduling .......................................................................................... 242
Table 9-4: VLAN and VXLAN Comparison............................................................................................. 250
Table 9-5: Terms and Acronyms.......................................................................................................... 254
Table 9-6: Terms and Acronyms (Cont.)............................................................................................... 255
Table 9-7: Terms and Acronyms (Cont.)............................................................................................... 256

19
1. QuantaMesh QNOS5 Features
This section provides a brief overview of the supported QNOS features. The features are categorized as
follows:
1.1. Switching Features Introduction
1.1.1. VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified as
belonging to a VLAN based on either the VLAN tag or a combination of the ingress port and packet contents.
Packets sharing common attributes can be groups in the same VLAN. QNOS software is in full compliance
with IEEE 802.1Q VLAN tagging.
1.1.2. Double VLANs
The Double VLAN feature (IEEE 802.1QinQ) allows the use of a second tag on network traffic. The additional
tag helps differentiate between customers in the Metropolitan Area Networks (MAN) while preserving
individual customer’s VLAN identification when they enter their own 802.1Q domain.
1.1.3. Switching Modes
The switchport mode feature helps to minimize the potential for configuration errors. The feature also
makes VLAN configuration easier by reducing the amount of commands needed for port configuration. For
example, to configure a port connected to an end user, the administrator can configure the port in Access
mode. Ports connected to other switches can be configured in Trunk mode. VLAN assignments and tagging
behavior are automatically configured as appropriate for the connection type.
1.1.4. Spanning Tree Protocols (STP)
Spanning Tree Protocol (IEEE 802.1D) is a standard requirement of Layer 2 switches that allows bridges to
automatically prevent and resolve L2 forwarding loops. The STP feature supports a variety of per-port
settings including path cost, priority settings, Port Fast mode, STP Root Guard, Loop Guard, TCN Guard, and
Auto Edge. These settings are also configurable per-Port-channel.
1.1.5. Rapid Spanning Tree
Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies to enable faster spanning tree
convergence after a topology change, without creating forwarding loops. The port settings supported by
STP are also supported by RSTP.
1.1.6. Multiple Spanning Tree

20
Multiple Spanning Tree (MSTP) operation maps VLANs to spanning tree instances. Packets assigned to
various VLANs are transmitted along different paths within MSTP Regions (MST Regions). Regions are one
or more interconnected MSTP bridges with identical MSTP settings. The MSTP standard lets administrators
assign VLAN traffic to unique paths.
The switch supports IEEE 802.1Q-2005, which is a version of corrects problems associated with the previous
version, provides for faster transition-to-forwarding, and incorporates new features for a port (restricted
role and restricted TCN).
1.1.7. Bridge Protocol Data Unit (BPDU) Guard
Spanning Tree BPDU Guard is used to disable the port in case a new device tries to enter the already
existing topology of STP. Thus devices, which were originally not a part of STP, are not allowed to influence
the STP topology.
1.1.8. BPDU Filtering
When spanning tree is disabled on a port, the BPDU Filtering feature allows BPDU packets received on that
port to be dropped. Additionally, the BPDU Filtering feature prevents a port in Port Fast mode from sending
and receiving BPDUs. A port in Port Fast mode is automatically placed in the forwarding state when the link
is up to increase convergence time.
1.1.9. Port-channel
Up to 32 ports can combine to form a single Port-Channel. This enables fault tolerance protection from
physical link disruption, higher bandwidth connections and improved bandwidth granularity.
A Port-channel is composed of ports of the same speed, set to full-duplex operation.
1.1.10. Link Aggregate Control Protocol (LACP)
Link Aggregate Control Protocol (LACP) uses peer exchanges across links to determine, on an ongoing basis,
the aggregation capability of various links, and continuously provides the maximum level of aggregation
capability achievable between a given pair of systems. LACP automatically determines, configures, binds,
and monitors the binding of ports to aggregators within the system.
1.1.11. Multi Chass Link Aggregation Group (MLAG)
This feature enables a Port-channel to be created across two independent units, which creates a scenario
where some member ports of the MLAG can reside on one unit and the other members of the MLAG can
reside on the other unit. The partner device on the remote side can be a MLAG unaware unit. For the MLAG
unaware unit, the MLAG appears to be a single Port-channel connected to a single unit.
1.1.12. Flow Control Support (IEEE 802.3x)
Table of contents
Popular Network Router manuals by other brands

Init7
Init7 FRITZ!Box 5490 instructions

Tangerine
Tangerine NetComm CF40 Wi-Fi 6 quick start guide

ZyXEL Communications
ZyXEL Communications Prestige 100L Quick start manual

DeWalt
DeWalt DWP7518 instruction manual

NETGEAR
NETGEAR ME101 - Wireless EN Bridge Network Converter Specifications

D-Link
D-Link Whole Home Cloud Router 2000 user manual