Raisecom ROS Switch Configuration Guide Version 4.0.pdf

(1376 KB) Pobierz
www.raisecom.com
ROS Switch Configuration Guide
Raisecom ROS 4 Series
200707
Legal Notices
Raisecom Technology Co., Ltd
makes no warranty of any kind with regard to this manual, including, but not limited to, the implied
warranties of merchantability and fitness for a particular purpose.
Raisecom Technology Co., Ltd
shall not be held liable for errors
contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or
use of this material.
Warranty.
A copy of the specific warranty terms applicable to your Raisecom product and replacement parts can be obtained from Service Office.
Restricted Rights Legend.
All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior
written consent of
Raisecom Technology Co., Ltd.
The information contained in this document is subject to change without notice.
Copyright Notices.
Copyright ©2006 Raisecom. All rights reserved.
No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means, electronic or mechanical,
including photocopying and microfilm, without permission in Writing from
Raisecom Technology Co., Ltd.
Trademark Notices
is the trademark of Raisecom Technology Co., Ltd.
Java™ is a U.S. trademark of Sun Microsystems, Inc.
Microsoft® is a U.S. registered trademark of Microsoft Corporation.
Windows NT® is a U.S. registered trademark of Microsoft Corporation.
Windows® 2000 is a U.S. registered trademark of Microsoft Corporation.
Windows® XP is a U.S. registered trademark of Microsoft Corporation.
Windows® and MS Windows® are U.S. registered trademarks of
Microsoft Corporation.
Contact Information
Technical Assistance Center
The Raisecom TAC is available to all customers who need technical assistance with a Raisecom
product, technology, or, solution. You can communicate with us through the following methods:
Address:
Building 2, No. 28 of the Shangdi 6th Street, Haidian District, Beijing 100085
Tel:
Fax:
+86-10-82883305
+86-10-82883056
World Wide Web
You can access the most current Raisecom product information on the World Wide Web at the following
URL:
http://www.raisecom.com
Feedback
Comments and questions about how the Raisecom Operation System (ROS) works are welcomed. Please
review the FAQ in the related manual, and if your question is not covered, send email by using the following
web page:
http://www.raisecom.com/en/xcontactus/contactus.htm.
If you have comments on the ROS specification, instead of the web page above, please send comments to:
export@raisecom.com
We hope to hear from you!
CONTENTS
ROS SWITCH CONFIGURATION GUIDE...............................................................................................................
1
CONTENTS
.................................................................................................................................................................. 4
PREFACE
................................................................................................................................................................... 11
ABOUT THIS MANUAL
........................................................................................................................................... 11
COMPLIANCE
........................................................................................................................................................... 11
CHAPTER 1
OVERVIEW
................................................................................................................................... 13
1.1 L
AYER
-2
MANAGEMENT AND HARDWARE FUNCTIONS
........................................................................................ 13
1.2 S
TANDARD LAYER
-2
PROTOCOLS
...................................................................................................................... 13
1.3 M
ANAGEMENT
C
APABILITY
................................................................................................................................ 13
1.4 DHCP
................................................................................................................................................................ 13
1.5 R
ATE LIMITING
.................................................................................................................................................... 13
1.6 L
AYER
-3
FUNCTIONS
.......................................................................................................................................... 13
CHAPTER 2
HOW TO USE COMMAND-LINE...............................................................................................
14
2.1 E
NVIRONMENT
................................................................................................................................................... 14
2.2 C
OMMAND LINE MODE
........................................................................................................................................ 14
2.3 G
ETTING HELP
................................................................................................................................................... 16
2.4 U
SE
C
OMMANDS
H
ISTORY
................................................................................................................................ 16
2.5 U
SING
E
DITING
F
EATURES
................................................................................................................................ 17
CHAPTER 3
SYSTEM COMMAND CONFIGURATION................................................................................
18
3.1 B
ASIC SYSTEM COMMAND AND CONFIGURATION
............................................................................................... 18
3.2 C
ONFIGURATION FILES AND BOOT FILES MANAGEMENT
.................................................................................... 18
3.2.1 Configuration files....................................................................................................................................
18
3.2.2 Startup files...............................................................................................................................................
18
3.3 U
SER MANAGEMENT
.......................................................................................................................................... 18
CHAPTER 4
MIRROR FUNCTION CONFIGURATION.................................................................................
20
4.1 E
NABLE OR DISABLE MIRROR FUNCTION
........................................................................................................... 20
4.2 C
ONFIGURE THE MONITOR PORT
....................................................................................................................... 21
4.3 C
ONFIGURE THE SOURCE PORT
.........................................................................................................................
21
4.4 E
XAMPLE
............................................................................................................................................................ 23
CHAPTER 5
PORT RATE LIMITING CONFIGURATION
............................................................................. 24
5.1 C
ONFIGURE PORT RATE LIMING OF INGRESS TRAFFIC
....................................................................................... 24
5.2 E
XAMPLE
............................................................................................................................................................ 26
CHAPTER 6
MANAGING THE MAC ADDRESS TABLE
............................................................................. 27
6.1 C
ONFIGURE THE AGING TIME OF
MAC
ADDRESS
.............................................................................................. 27
6.2 C
ONFIGURE STATIC
MAC
ADDRESS
.................................................................................................................. 28
6.3 E
NABLE
/
DISABLE DYNAMIC
MAC
ADDRESS LEARNING FUNCTION
.................................................................... 29
6.4 C
LEAR
MAC
ADDRESS TABLE
............................................................................................................................ 30
6.5 S
HOW
MAC
ADDRESS TABLE
.
........................................................................................................................... 30
6.6 S
EARCH PARTICULAR
MAC
ADDRESS
.
.............................................................................................................. 31
CHAPTER 7
CONFIGURING THE SWITCH INTERFACES.........................................................................
33
7.1 C
ONFIGURE THE SPEED AND DUPLEX MODE OF THE PORT
................................................................................
33
7.2 C
ONFIGURE
802.3
X FLOW CONTROL FUNCTION OF THE PORT
......................................................................... 34
7.3 O
PEN UP OR SHUT DOWN THE PHYSICAL PORT
................................................................................................. 36
CHAPTER 8
STROM CONTROL......................................................................................................................
38
8.1 E
NABLE THE CONTROL FUNCTION
...................................................................................................................... 38
8.2 T
HRESHOLD OF STORM CONTROL
..................................................................................................................... 39
CHAPTER 9
SHARED VLAN
............................................................................................................................ 40
9.1 E
NABLE
SVL
...................................................................................................................................................... 40
9.2 C
ONFIGURE
SVL
OF PORT
................................................................................................................................. 40
9.3 C
ONFIGURE
SVL
DEFAULT
VLAN
..................................................................................................................... 41
9.4 SVL
TYPICAL APPLICATION
................................................................................................................................. 41
CHAPTER 10
PACKETS TRANSPARENT TRANSMISSION........................................................................
44
10.1 O
VERVIEW
....................................................................................................................................................... 44
10.2 C
ONFIGURE THE PORT TO TRANSPARENTLY TRANSMIT SOME CONTROL PACKETS
......................................... 44
10.3 F
ORWARD
DLF (D
ESTINATION
L
OOKUP
F
AILURE
)
PACKETS
.......................................................................... 45
CHAPTER 11
CHAPTER 12
MANAGEMENT PORT CONFIGURATION
............................................................................. 46
LINK AGGREGATION CONTROL PROTOCOL.....................................................................
47
12.1 A
BOUT LINK AGGREGATION CONTROL PROTOCOL
(LACP)
............................................................................. 47
12.2 E
NABLE OR DISABLE TRUNKING FUNCTION
..................................................................................................... 47
12.3 A
DD OR DELETE TRUNK GROUP
....................................................................................................................... 47
12.4 S
ET LOAD SHARING MODE
............................................................................................................................... 48
12.5 M
AINTENANCE
................................................................................................................................................. 48
CHAPTER 13
MSTP CONFIGURATION
........................................................................................................... 50
13.1 MSTP overview
......................................................................................................................................... 50
13.2 MSTP default configuration list
............................................................................................................... 50
13.3 MSTP configuration guide and limit
....................................................................................................... 51
13.4 MSTP configuration list and explaination
.............................................................................................. 51
13.4.1Enabling/Disabling MSTP in EXEC mode...........................................................................................
51
13.4.2 Enabling/Disabling MSTP in port mode
............................................................................................. 52
13.4.3 Configuration MSTP mode...................................................................................................................
52
13.4.4 Configuring the MST Region for a Switch..........................................................................................
53
13.4.5 Configuring the Max Hops in an MST Region...................................................................................
54
13.4.6 Configuring the Switching Network Diameter....................................................................................
54
13.4.7 Configuring the Max Transmission Speed on a Port........................................................................
55
13.4.8 Specifying the Switch as a Primary or a Secondary Root bridge...................................................
55
13.4.9 Configuring the Bridge Priority for a Switch.......................................................................................
56
13.4.10 Configuring the Bridge Priority for a Switch
.................................................................................... 57
13.4.11 Configuring the Path Cost of a Port
.................................................................................................. 58
13.4.12 configuring attribute of edge port
...................................................................................................... 58
13.4.13 Configuring link type
........................................................................................................................... 59
13.4.14 configuring mcheck
............................................................................................................................. 60
13.4.15 Clearing information of port
............................................................................................................... 61
13.5 Monitor and maintainece
......................................................................................................................... 61
13.5.1 Show Example
....................................................................................................................................... 61
13.5.2 Show basal MSTP information
............................................................................................................ 62
13.5.3 Show basal MSTP information
............................................................................................................ 63
13.5.4 Show detail MSTP information
............................................................................................................ 64
13.5.5 Show basal information of the portlist MSTP
.................................................................................... 67
13.5.6 Show detail information of the portlist MSTP
.................................................................................... 67
CHAPTER 14
RSTP CONFIGURATION
............................................................................................................ 68
14.1 A
BOUT
RSTP
.................................................................................................................................................. 68
14.2 RSTP
CONFIGURATION LIST
............................................................................................................................ 68
14.3 E
NABLE AND DISABLE
RSTP
GLOBALLY
.......................................................................................................... 68
14.4 S
WITCH SYSTEM PRIORITY SETTING
................................................................................................................ 69
14.5 RSTP H
ELLO
T
IME CONFIGURATION
............................................................................................................... 69
14.6 RSTP M
AXIMUM AGING TIME SETTING
............................................................................................................ 70
5
Zgłoś jeśli naruszono regulamin