+ All Categories
Home > Documents > ES4700 Series Chassis Core Routing Switch · 2 Preface ES4700 Series Chassis Core Routing Switch is...

ES4700 Series Chassis Core Routing Switch · 2 Preface ES4700 Series Chassis Core Routing Switch is...

Date post: 07-Aug-2020
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
859
1 www.smc.com ES4700 Series Chassis Core Routing Switch
Transcript
  • 1

    www.smc.com

    ES4700 Series Chassis Core Routing Switch

  • 2

    Preface

    ES4700 Series Chassis Core Routing Switch is a high performance routing switch

    released by SMC Networks that can be deployed as the core layer device for campus and

    enterprise networks, or as an aggregation device for IP metropolitan area networks

    (MAN). ES4700 Series Chassis Core Routing Switch provides 4 and 10 slots, with

    support for various types of line cards and can seamlessly support a variety of network

    interfaces from 100Mb, 1000Mb to 10 GB Ethernet.

    We are providing this manual for your better understanding, use and maintenance of

    the ES4700 Series Chassis Core Routing Switch. We strongly recommend you to read

    through this manual carefully before installation and configuration to avoid possible

    malfunction or damage to the switch. Furthermore, we sincerely hope our products and

    services satisfy you.

  • 3

    Content

    CHAPTER 1 SWITCH MANAGEMENT.......................................................................... 18 1.1 MANAGEMENT OPTIONS ....................................................................................... 18

    1.1.1 Out-of-band Management .............................................................................. 18

    1.1.2 In-band Management ..................................................................................... 21

    1.1.3 Management via Telnet................................................................................... 21

    1.1.4 Management via HTTP................................................................................... 24

    1.2 MANAGEMENT INTERFACE..................................................................................... 27

    1.2.1 CLI Interface................................................................................................... 27

    1.2.2 Configuration Modes ...................................................................................... 27

    1.2.3 Configuration Syntax ...................................................................................... 30

    1.2.4 Shortcut Key Support ..................................................................................... 31

    1.2.5 Help function................................................................................................... 32

    1.2.6 Input verification ............................................................................................. 32

    1.2.7 Fuzzy match support ...................................................................................... 33

    1.3 WEB MANAGEMENT.............................................................................................. 33

    1.3.1 Main Page ...................................................................................................... 33

    1.3.2 Module Front Panel ........................................................................................ 33

    CHAPTER 2 BASIC SWITCH CONFIGURATION.......................................................... 35 2.1 COMMANDS FOR BASIC SWITCH CONFIGURATION .................................................. 35

    2.1.1 Command For Basic Configuration................................................................. 35

    2.2 COMMANDS FOR MAINTENANCE AND DEBUG.......................................................... 49

    2.2.1 Ping ................................................................................................................ 49

    2.2.2 Ping6 .............................................................................................................. 50

    2.2.3 Telnet .............................................................................................................. 50

    2.2.4 SSH ................................................................................................................ 53

    2.2.5 Traceroute ...................................................................................................... 56

    2.2.6 Traceroute6 .................................................................................................... 56

    2.2.7 Show .............................................................................................................. 57

    2.2.8 Debug............................................................................................................. 62

    2.2.9 System log...................................................................................................... 63

    2.3 CONFIGURATE SWITCH IP ADDRESSES.................................................................. 68

    2.3.1 Switch IP Addresses Configuration Task List.................................................. 69

    2.3.2 Commands For Configuring Switch IP............................................................ 69

    2.4 SNMP CONFIGURATION ....................................................................................... 71

    2.4.1 Introduce to SNMP ......................................................................................... 71

    2.4.2 SNMP Configuration Task List ........................................................................ 74

  • 4

    2.4.3 Command For SNMP ..................................................................................... 76

    2.4.4 Typical SNMP Configuration Examples .......................................................... 85

    2.4.5 SNMP Troubleshooting Help .......................................................................... 87

    2.5 SWITCH UPGRADE................................................................................................ 87

    2.5.1 Switch System Files ....................................................................................... 87

    2.5.2 BootROM Upgrade ......................................................................................... 88

    2.5.3 FTP/TFTP Upgrade ........................................................................................ 90

    2.5.4 FTP/TFTP Configuration Examples................................................................ 98

    2.5.5 FTP/TFTP Troubleshooting Help .................................................................. 102

    2.6 SECURITY FEATURE CONFIGURATION .................................................................. 104

    2.6.1 Security Feature Introduction........................................................................ 104

    2.6.2 Security Feature Configuration ..................................................................... 104

    2.6.3 Commands for Security Feature................................................................... 106

    2.6.4 Security Feature Example .............................................................................110

    2.7 JUMBO CONFIGURATION ......................................................................................110

    2.7.1 Jumbo Introduction ........................................................................................110

    2.7.2 Jumbo Configuration Task Sequence ............................................................110

    2.7.3 Jumbo Command ..........................................................................................111

    2.8 SFLOW CONFIGURATION ......................................................................................111

    2.8.1 sFlow introduction..........................................................................................111

    2.8.2 sFlow Configuration Task...............................................................................112

    2.8.3 Commands For sFlow ...................................................................................113

    2.8.4 sFlow Examples ............................................................................................118

    2.8.5 sFlow Troubleshooting...................................................................................118

    2.9 TACACS+ CONFIGURATION ................................................................................119

    2.9.1 TACACS+ Introduction ..................................................................................119

    2.9.2 TACACS+ Configurations ..............................................................................119

    2.9.3 Commands for TACACS+............................................................................. 120

    2.9.4 Typical TACACS+ Scenarios ........................................................................ 122

    2.9.5 TACACS+ Troubleshooting........................................................................... 122

    2.10 WEB MANAGEMENT.......................................................................................... 123

    2.10.1 Switch basic configuration .......................................................................... 123

    2.10.2 SNMP configuration.................................................................................... 124

    2.10.3 Switch upgrade........................................................................................... 126

    2.10.4 Maintenance and debug command ............................................................ 129

    2.10.5 Basic introduction to switch ........................................................................ 130

    2.10.6 Switch Maintenance ................................................................................... 131

    2.10.7 Telnet server configuration.......................................................................... 131

  • 5

    2.10.8 Telnet server user configuration.................................................................. 132

    2.10.9 Telnet security IP ........................................................................................ 132

    CHAPTER 3 DEVICE MANAGEMENT ........................................................................ 133 3.1 DEVICE MANAGEMENT BRIEF .............................................................................. 133

    3.2 DEVICE MANAGEMENT CONFIGURATION .............................................................. 133

    3.2.1 Switch Basic Configuration........................................................................... 133

    3.3 DEVICE MANAGEMENT TROUBLESHOOTING HELP................................................. 133

    3.3.1 Monitor and Debug Command...................................................................... 133

    3.4 CARD HOT-SWAP OPERATION............................................................................. 135

    3.4.1 Card Hot-Insertion ........................................................................................ 135

    3.4.2 Card Hot-Remove......................................................................................... 135

    3.5 CONFIGURATION RESTORATION RULES................................................................ 136

    3.6 ACTIVE-STANDBY ALTERNATION .......................................................................... 136

    3.7 COMMAND FOR DEVICE MANAGEMENT ................................................................. 137

    3.7.1 debug devsm................................................................................................ 137

    3.7.2 force runcfg-sync .......................................................................................... 137

    3.7.3 force switchover............................................................................................ 137

    3.7.4 reset slot ....................................................................................................... 137

    3.7.5 runcfg-sync................................................................................................... 138

    3.7.6 show fan ....................................................................................................... 138

    3.7.7 show power .................................................................................................. 139

    3.7.8 show slot ...................................................................................................... 139

    CHAPTER 4 PORT CONFIGURATION........................................................................ 140 4.1 INTRODUCTION TO PORT..................................................................................... 140

    4.2 PORT CONFIGURATION ....................................................................................... 141

    4.2.1 Network Port Configuration........................................................................... 141

    4.2.2 VLAN Interface Configuration ....................................................................... 150

    4.2.3 Network Management Port Configuration..................................................... 151

    4.3 PORT MIRRORING CONFIGURATION ..................................................................... 155

    4.3.1 Introduction to Port Mirroring ........................................................................ 155

    4.3.2 Port Mirroring Configuration Task List........................................................... 155

    4.3.3 Command For Mirroring Configuration ......................................................... 155

    4.3.4 Device Mirroring Troubleshooting Help......................................................... 156

    4.4 PORT CONFIGURATION EXAMPLE ........................................................................ 157

    4.5 PORT TROUBLESHOOTING HELP.......................................................................... 158

    4.6 WEB MANAGEMENT............................................................................................ 158

    4.6.1 Ethernet port configuration ........................................................................... 158

    4.6.2 Physical port configuration ........................................................................... 158

  • 6

    4.6.3 Bandwidth control ......................................................................................... 159

    4.6.4 Vlan interface configuration .......................................................................... 160

    4.6.5 Allocate IP address for L3 port...................................................................... 160

    4.6.6 L3 port IP addr mode configuration .............................................................. 160

    4.6.7 Port mirroring configuration .......................................................................... 161

    4.6.8 Mirror configuration....................................................................................... 161

    4.6.9 Port debug and maintenance........................................................................ 161

    4.6.10 Show port information................................................................................. 161

    CHAPTER 5 PORT CHANNEL CONFIGURATION ..................................................... 163 5.1 INTRODUCTION TO PORT CHANNEL...................................................................... 163

    5.2 PORT CHANNEL CONFIGURATION ........................................................................ 164

    5.2.1 Port Channel Configuration Task List ........................................................... 164

    5.2.2 Command for port channel ........................................................................... 165

    5.3 PORT CHANNEL EXAMPLE................................................................................... 171

    5.4 PORT CHANNEL TROUBLESHOOTING HELP........................................................... 173

    5.5 WEB MANAGEMENT............................................................................................ 174

    5.5.1 LACP port group configuration ..................................................................... 174

    5.5.2 LACP port configuration................................................................................ 175

    CHAPTER 6 VLAN CONFIGURATION ........................................................................ 176 6.1 VLAN CONFIGURATION ...................................................................................... 176

    6.1.1 Introduction to VLAN .................................................................................... 176

    6.1.2 VLAN Configuration Task List ....................................................................... 177

    6.1.3 Command for vlan Configuration .................................................................. 178

    6.1.4 Typical VLAN Application.............................................................................. 184

    6.2 GVRP CONFIGURATION...................................................................................... 186

    6.2.1 Introduction to GVRP.................................................................................... 186

    6.2.2 GVRP Configuration Task List ...................................................................... 186

    6.2.3 Command For GVRP ................................................................................... 187

    6.2.4 Typical GVRP Application ............................................................................. 190

    6.2.5 GVRP Troubleshooting Help......................................................................... 192

    6.3 DOT1Q-TUNNEL CONFIGURATION ........................................................................ 193

    6.3.1 Dot1q-tunnel Introduction ............................................................................. 193

    6.3.2 Dot1q-tunnel Configuration........................................................................... 194

    6.3.3 Dot1q-Tunnel Configuration Command ........................................................ 194

    6.3.4 Typical Applications Of The Dot1q-tunnel ..................................................... 196

    6.3.5 Dot1q-tunnel Troubleshooting....................................................................... 197

    6.4 VLAN-TRANSLATION CONFIGURATION ................................................................. 198

    6.4.1 VLAN-translation Introduction....................................................................... 198

  • 7

    6.4.2 Configuration Task Sequence Of VLAN-translation ...................................... 198

    6.4.3 VLAN-translation Configuration Command................................................... 199

    6.4.4 Typical Application Of VLAN-translation ....................................................... 201

    6.4.5 VLAN-translation Troubleshooting ................................................................ 202

    6.5 DYNAMIC VLAN CONFIGURATION........................................................................ 202

    6.5.1 Dynamic VLAN Introduction.......................................................................... 202

    6.5.2 Dynamic VLAN Configuration ....................................................................... 203

    6.5.3 Typical Application Of The Dynamic VLAN................................................... 209

    6.5.4 Dynamic VLAN Troubleshooting................................................................... 210

    6.6 VOICE VLAN CONFIGURATION .............................................................................211

    6.6.1 Voice VLAN Introduction................................................................................211

    6.6.2 Voice VLAN Configuration .............................................................................211

    6.6.3 Typical Applications Of The Voice VLAN ...................................................... 214

    6.6.4 Voice VLAN Troubleshooting ........................................................................ 215

    CHAPTER 7 MAC TABLE CONFIGURATION ............................................................. 216 7.1 INTRODUCTION TO MAC TABLE ........................................................................... 216

    7.1.1 Obtaining MAC Table.................................................................................... 216

    7.1.2 Forward or Filter ........................................................................................... 218

    7.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST................................................ 219

    7.3 COMMANDS FOR MAC ADDRESS TABLE CONFIGURATION ...................................... 219

    7.3.1 mac-address-table........................................................................................ 219

    7.3.2 show mac-address-table............................................................................... 220

    7.4 TYPICAL CONFIGURATION EXAMPLES................................................................... 221

    7.5 TROUBLESHOOTING HELP................................................................................... 221

    7.6 MAC ADDRESS FUNCTION EXTENSION................................................................ 222

    7.6.1 MAC Address Binding................................................................................... 222

    CHAPTER 8 MSTP CONFIGURATION........................................................................ 230 8.1 MSTP INTRODUCTION ........................................................................................ 230

    8.1.1 MSTP Region ............................................................................................... 230

    8.1.2 Port Roles..................................................................................................... 232

    8.1.3 MSTP Load Balance..................................................................................... 232

    8.2 MSTP CONFIGURATION TASK LIST ...................................................................... 232

    8.3 COMMAND FOR MSTP........................................................................................ 236

    8.3.1 abort ............................................................................................................. 236

    8.3.2 exit................................................................................................................ 236

    8.3.3 instance vlan................................................................................................. 237

    8.3.4 name ............................................................................................................ 237

    8.3.5 revision-level................................................................................................. 238

  • 8

    8.3.6 spanning-tree................................................................................................ 238

    8.3.7 spanning-tree format .................................................................................... 239

    8.3.8 spanning-tree forward-time........................................................................... 239

    8.3.9 spanning-tree hello-time ............................................................................... 240

    8.3.10 spanning-tree link-type p2p ........................................................................ 240

    8.3.11 spanning-tree maxage ................................................................................ 241

    8.3.12 spanning-tree max-hop............................................................................... 241

    8.3.13 spanning-tree mcheck ................................................................................ 242

    8.3.14 spanning-tree mode.................................................................................... 242

    8.3.15 spanning-tree mst configuration ................................................................. 242

    8.3.16 spanning-tree mst cost ............................................................................... 243

    8.3.17 spanning-tree mst port-priority.................................................................... 244

    8.3.18 spanning-tree mst priority ........................................................................... 244

    8.3.19 spanning-tree portfast................................................................................. 245

    8.3.20 spanning-tree digest-snooping ................................................................... 245

    8.3.21 spanning-tree tcflush (global mode) ........................................................... 246

    8.3.22 spanning-tree tcflush (port mode)............................................................... 246

    8.4 MSTP EXAMPLE ................................................................................................ 247

    8.5 MSTP TROUBLESHOOTING HELP ........................................................................ 252

    8.5.1 Monitor And Debug Command ..................................................................... 252

    8.6 WEB MANAGEMENT............................................................................................ 256

    8.6.1 MSTP field operation .................................................................................... 256

    8.6.2 MSTP port operation..................................................................................... 257

    8.6.3 MSTP global control ..................................................................................... 258

    8.6.4 Show MSTP setting ...................................................................................... 259

    CHAPTER 9 QOS AND PBR CONFIGURATION......................................................... 261 9.1 QOS CONFIGURATION ........................................................................................ 261

    9.1.1 Introduction to QoS....................................................................................... 261

    9.1.2 QoS Configuration Task List ......................................................................... 266

    9.1.3 Command for QoS........................................................................................ 270

    9.1.4 QoS Example ............................................................................................... 280

    9.1.5 QoS Troubleshooting Help ........................................................................... 282

    9.2 PBR CONFIGURATION ........................................................................................ 287

    9.2.1 Introduction to PBR ...................................................................................... 287

    9.2.2 PBR configuration......................................................................................... 287

    9.2.3 PBR examples.............................................................................................. 288

    CHAPTER 10 L3 FORWARD CONFIGURATION ........................................................ 290 10.1 LAYER 3 INTERFACE ......................................................................................... 290

  • 9

    10.1.1 Introduction to Layer 3 Interface ................................................................. 290

    10.1.2 Layer 3 Interface Configuration Task List.................................................... 290

    10.1.3 Command for Layer 3 Interface .................................................................. 291

    10.2 IP CONFIGURATION .......................................................................................... 291

    10.2.1 Introduction to IPv4, IPv6 ........................................................................... 291

    10.2.2 IPv4 Configuration ...................................................................................... 293

    10.2.3 IPv6 Configuration ...................................................................................... 294

    10.2.4 IP Configuration Examples ......................................................................... 308

    10.2.5 IP Troubleshooting Help ............................................................................. 313

    10.3 IP FORWARDING............................................................................................... 323

    10.3.1 Introduction to IP Forwarding...................................................................... 323

    10.3.2 IP Route Aggregation Configuration Task ................................................... 323

    10.3.3 Command for IP Route Aggregation........................................................... 324

    10.4 URPF ............................................................................................................. 324

    10.4.1 URPF Introduction ...................................................................................... 324

    10.4.2 URPF Operation Mechanism...................................................................... 325

    10.4.3 URPF Configuration Task Sequence .......................................................... 325

    10.4.4 Commands For URPF ................................................................................ 326

    10.4.5 URPF Troubleshooting ............................................................................... 327

    10.5 ARP................................................................................................................ 327

    10.5.1 Introduction to ARP..................................................................................... 327

    10.5.2 ARP Configuration Task List ....................................................................... 328

    10.5.3 Command for ARP Configuration ............................................................... 328

    CHAPTER 11 DHCP CONFIGURATION...................................................................... 332 11.1 INTRODUCTION TO DHCP ................................................................................. 332

    11.2 DHCP SERVER CONFIGURATION....................................................................... 333

    11.2.1 DHCP Sever Configuration Task List .......................................................... 333

    11.2.2 Commands for DHCP Server Configuration ............................................... 335

    11.3 DHCP RELAY CONFIGURATION ......................................................................... 343

    11.3.1 DHCP Relay Configuration Task List .......................................................... 344

    11.3.2 Commands for DHCP Relay Configuration................................................. 345

    11.4 DHCP CONFIGURATION EXAMPLE ..................................................................... 347

    11.5 DHCP TROUBLESHOOTING HELP ...................................................................... 350

    11.5.1 Commands for Monitor and Debug............................................................. 350

    11.6 WEB MANAGEMENT.......................................................................................... 353

    11.6.1 DHCP server configuration ......................................................................... 353

    11.6.2 DHCP debugging........................................................................................ 358

    CHAPTER 12 SNTP CONFIGURATION ...................................................................... 360

  • 10

    12.1 INTRODUCTION TO SNTP.................................................................................. 360

    12.2 COMMAND FOR SNTP ...................................................................................... 361

    12.2.1 clock timezone............................................................................................ 361

    12.2.2 sntp server.................................................................................................. 361

    12.2.3 sntp poll ...................................................................................................... 362

    12.2.4 debug sntp.................................................................................................. 362

    12.2.5 show sntp ................................................................................................... 362

    12.3 TYPICAL SNTP CONFIGURATION EXAMPLES ...................................................... 363

    12.4 WEB MANAGEMENT.......................................................................................... 363

    12.4.1 SNMP/NTP server configuration................................................................. 363

    12.4.2 Request interval configuration .................................................................... 364

    12.4.3 Time difference ........................................................................................... 364

    12.4.4 Show SNTP................................................................................................ 364

    CHAPTER 13 PREVENT ARP, ND SPOOFING CONFIGURATION............................ 365 13.1 OVERVIEW....................................................................................................... 365

    13.1.1 ARP ( Address Resolution Protocol) ........................................................... 365

    13.1.2 ARP Spoofing ............................................................................................. 365

    13.1.3 How to prevent void ARP/ND Spoofing for our Layer 3 Switch................... 366

    13.2 PREVENT ARP, ND SPOOFING CONFIGURATION ................................................. 366

    13.2.1 Prevent ARP, ND Spoofing Configuration Task List .................................... 366

    13.3 COMMANDS FOR PREVENTING ARP, ND SPOOFING........................................... 367

    13.3.1 ip arp-security updateprotect ...................................................................... 367

    13.3.2 ipv6 nd-security updateprotect.................................................................... 368

    13.3.3 ip arp-security learnprotect ......................................................................... 368

    13.3.4 ipv6 nd learnprotect .................................................................................... 368

    13.3.5 ip arp-security convert ................................................................................ 369

    13.3.6 ipv6 nd-security convert.............................................................................. 369

    13.3.7 clear ip arp dynamic ................................................................................... 369

    13.3.8 clear ipv6 nd dynamic................................................................................. 369

    13.4 PREVENT ARP, ND SPOOFING EXAMPLE ........................................................... 370

    CHAPTER 14 ROUTING PROTOCOL ......................................................................... 372 14.1 ROUTING PROTOCOL OVERVIEW ....................................................................... 372

    14.1.1 Routing Table.............................................................................................. 373

    14.2 IP ROUTING POLICY ......................................................................................... 374

    14.2.1 Introduction To Routing Policy .................................................................... 374

    14.2.2 IP Routing Policy Configuration Task List ................................................... 376

    14.2.3 Command For Routing Policy..................................................................... 380

    14.2.4 Configuration Examples ............................................................................. 392

  • 11

    14.2.5 Troubleshooting Help.................................................................................. 393

    14.3 STATIC ROUTE ................................................................................................. 396

    14.3.1 Introduction to Static Route......................................................................... 396

    14.3.2 Introduction to Default Route ...................................................................... 396

    14.3.3 Static Route Configuration Task List ........................................................... 397

    14.3.4 Command For Static Route ........................................................................ 397

    14.3.5 Configuration Examples ............................................................................. 401

    14.4 RIP ................................................................................................................. 402

    14.4.1 Introduction to RIP...................................................................................... 402

    14.4.2 RIP Configuration Task List ........................................................................ 404

    14.4.3 Command For RIP...................................................................................... 410

    14.4.4 RIP Examples............................................................................................. 425

    14.4.5 Troubleshooting Help Of RIP...................................................................... 428

    14.5 RIPNG............................................................................................................. 435

    14.5.1 Introduction to RIPng.................................................................................. 435

    14.5.2 RIPng Configuration Task List .................................................................... 437

    14.5.3 Commands For RIPng................................................................................ 440

    14.5.4 RIPng Configuration Examples................................................................... 445

    14.5.5 RIPng Troubleshooting Help....................................................................... 447

    14.6 OSPF ............................................................................................................. 451

    14.6.1 Introduction to OSPF .................................................................................. 451

    14.6.2 OSPF Configuration Task List..................................................................... 454

    14.6.3 Command For OSPF.................................................................................. 459

    14.6.4 OSPF Example........................................................................................... 479

    14.6.5 OSPF Troubleshooting Help....................................................................... 488

    14.7 OSPFV3 ......................................................................................................... 496

    14.7.1 Introduction to OSPFv3 .............................................................................. 496

    14.7.2 OSPFv3 Configuration Task List................................................................. 500

    14.7.3 Command For OSPFV3 ............................................................................. 503

    14.7.4 OSPFv3 Examples ..................................................................................... 513

    14.7.5 OSPFv3 Troubleshooting Help ................................................................... 516

    14.8 BGP ............................................................................................................... 523

    14.8.1 BGP Introduction ........................................................................................ 523

    14.8.2 BGP Configuration Task List....................................................................... 527

    14.8.3 Command For BGP .................................................................................... 540

    14.8.4 Configuration Examples of BGP................................................................. 579

    14.8.5 BGP Troubleshooting Help ......................................................................... 587

    14.9 MBGP4+ ........................................................................................................ 597

  • 12

    14.9.1 MBGP4+ Introduction ................................................................................. 597

    14.9.2 MBGP4+ Configures Mission List ............................................................... 598

    14.9.3 MBGP4+ Examples .................................................................................... 598

    14.9.4 MBGP4+ Troubleshooting Help .................................................................. 600

    CHAPTER 15 IGMP SNOOPING ................................................................................. 601 15.1 INTRODUCTION TO IGMP SNOOPING ................................................................. 601

    15.2 IGMP SNOOPING CONFIGURATION TASK ........................................................... 601

    15.3 COMMAND FOR IGMP SNOOPING ..................................................................... 603

    15.3.1 ip igmp snooping vlan................................................................................. 603

    15.3.2 ip igmp snooping vlan immediate-leave...................................................... 603

    15.3.3 ip igmp snooping vlan l2-general-querier.................................................... 603

    15.3.4 ip igmp snooping vlan limit.......................................................................... 604

    15.3.5 ip igmp snooping vlan mrouter-port interface.............................................. 604

    15.3.6 ip igmp snooping vlan mrpt......................................................................... 605

    15.3.7 ip igmp snooping vlan query-interval .......................................................... 605

    15.3.8 ip igmp snooping vlan query-mrsp.............................................................. 606

    15.3.9 ip igmp snooping vlan query-robustness .................................................... 606

    15.3.10 ip igmp snooping vlan suppression-query-time......................................... 606

    15.4 IGMP SNOOPING EXAMPLE .............................................................................. 607

    15.5 IGMP SNOOPING TROUBLESHOOTING HELP ...................................................... 609

    15.5.1 Monitor And Debug Command ................................................................... 609

    CHAPTER 16 MULTICAST VLAN................................................................................ 613 16.1 INTRODUCTION TO MULTICAST VLAN................................................................ 613

    16.2 MULTICAST VLAN CONFIGURATION TASK .......................................................... 613

    16.3 COMMANDS FOR MULTICAST VLAN .................................................................. 614

    16.3.1 multicast-vlan.............................................................................................. 614

    16.3.2 multicast-vlan association........................................................................... 614

    16.4 EXAMPLES OF MULTICAST VLAN...................................................................... 615

    CHAPTER 17 IPV4 MULTICAST PROTOCOL ............................................................ 617 17.1 IPV4 MULTICAST PROTOCOL OVERVIEW ............................................................ 617

    17.1.1 Introduction to Multicast.............................................................................. 617

    17.1.2 Multicast Address ....................................................................................... 618

    17.1.3 IP Multicast Packet Transmission ............................................................... 619

    17.1.4 IP Multicast Application............................................................................... 620

    17.2 PIM-DM.......................................................................................................... 620

    17.2.1 Introduction to PIM-DM............................................................................... 620

    17.2.2 PIM-DM Configuration Task List ................................................................. 622

    17.2.3 Command for PIM-DM................................................................................ 623

  • 13

    17.2.4 PIM-DM Configuration Examples ............................................................... 624

    17.2.5 PIM-DM Troubleshooting............................................................................ 625

    17.3 PIM-SM .......................................................................................................... 628

    17.3.1 Introduction to PIM-SM............................................................................... 628

    17.3.2 PIM-SM Configuration Task List ................................................................. 630

    17.3.3 Command For PIM-SM............................................................................... 632

    17.3.4 PIM-SM Configuration Examples................................................................ 641

    17.3.5 PIM-SM Troubleshooting ............................................................................ 643

    17.4 DVMRP .......................................................................................................... 652

    17.4.1 Introduction to DVMRP............................................................................... 652

    17.4.2 Configuration Task List ............................................................................... 654

    17.4.3 Command For DVMRP............................................................................... 655

    17.4.4 DVMRP Configuration Examples................................................................ 658

    17.4.5 DVMRP TroubleShooting............................................................................ 659

    17.5 ECSCM .......................................................................................................... 663

    17.5.1 Introduction to ECSCM............................................................................... 663

    17.5.2 ECSCM Configuration Task List ................................................................. 664

    17.5.3 Command For ECSCM............................................................................... 667

    17.5.4 ECSCM Configuration Examples................................................................ 672

    17.5.5 ECSCM Troubleshooting ............................................................................ 673

    17.6 IGMP.............................................................................................................. 675

    17.6.1 Introduction to IGMP................................................................................... 675

    17.6.2 Configuration Task List ............................................................................... 677

    17.6.3 Command For IGMP .................................................................................. 679

    17.6.4 IGMP Configuration Example ..................................................................... 684

    17.6.5 IGMP Troubleshooting................................................................................ 685

    CHAPTER 18 IPV6 MULTICAST PROTOCOL ............................................................ 689 18.1 PIM-DM6........................................................................................................ 689

    18.1.1 Introduction to PIM-DM6............................................................................. 689

    18.1.2 PIM-DM Configuration Task List ................................................................. 690

    18.1.3 Command for PIM-DM6.............................................................................. 691

    18.1.4 PIM-DM Typical Application ........................................................................ 695

    18.1.5 PIM-DM Troubleshooting Help.................................................................... 696

    18.2 PIM-SM6 ........................................................................................................ 699

    18.2.1 Introduction to PIM-SM6............................................................................. 699

    18.2.2 PIM-SM Configuration Task List ................................................................. 700

    18.2.3 Command for PIM-SM................................................................................ 703

    18.2.4 PIM-SM Typical Application .........................................................................711

  • 14

    18.2.5 PIM-SM Troubleshooting Help.................................................................... 713

    18.3 MLD ............................................................................................................... 722

    18.3.1 Introduction to MLD .................................................................................... 722

    18.3.2 MLD Configuration Task List....................................................................... 723

    18.3.3 Command for MLD ..................................................................................... 725

    18.3.4 MLD Typical Application.............................................................................. 730

    18.3.5 MLD Troubleshooting Help ......................................................................... 731

    18.4 MLD SNOOPING............................................................................................... 734

    18.4.1 MLD Snooping Introduction ........................................................................ 734

    18.4.2 MLD Snooping Configuration Task ............................................................. 734

    18.4.3 Commands For MLD Snooping Configuration............................................ 736

    18.4.4 MLD Snooping Examples ........................................................................... 742

    18.4.5 MLD Snooping Troubleshooting ................................................................. 745

    CHAPTER 19 ACL CONFIGURATION......................................................................... 746 19.1 INTRODUCTION TO ACL .................................................................................... 746

    19.1.1 Access-list................................................................................................... 746

    19.1.2 Access-group.............................................................................................. 746

    19.1.3 Access-list Action and Global Default Action............................................... 747

    19.2 ACL CONFIGURATION ....................................................................................... 747

    19.2.1 ACL Configuration Task Sequence ............................................................. 747

    19.2.2 Commands for ACL .................................................................................... 760

    19.3 ACL EXAMPLE ................................................................................................. 779

    19.4 ACL TROUBLESHOOTING .................................................................................. 780

    19.4.1 Monitor And Debug Command ................................................................... 780

    19.5 WEB MANAGEMENT.......................................................................................... 783

    19.5.1 Numeric standard ACL configuration .......................................................... 784

    19.5.2 Delete numeric IP ACL ............................................................................... 784

    19.5.3 Configure the numeric extended ACL......................................................... 784

    19.5.4 Configure and delete the standard ACL name............................................ 786

    19.5.5 Configure extended ACL name configuration ............................................. 787

    19.5.6 Firewall configuration.................................................................................. 787

    19.5.7 ACL port binding ......................................................................................... 787

    CHAPTER 20 802.1X CONFIGURATION .................................................................... 789 20.1 INTRODUCTION TO 802.1X ................................................................................ 789

    20.2 802.1X CONFIGURATION................................................................................... 790

    20.2.1 802.1x Configuration Task Sequence ......................................................... 790

    20.2.2 Command for 802.1x .................................................................................. 794

    20.3 802.1X APPLICATION EXAMPLE ......................................................................... 803

  • 15

    20.3.1 802.1x Troubleshooting .............................................................................. 804

    20.4 WEB MANAGEMENT.......................................................................................... 810

    20.4.1 RADIUS client configuration ....................................................................... 810

    20.4.2 802.1X configuration................................................................................... 812

    CHAPTER 21 VRRP CONFIGURATION...................................................................... 816 21.1 INTRODUCTION TO VRRP................................................................................. 816

    21.2 VRRP CONFIGURATION TASK LIST .................................................................... 817

    21.3 COMMANDS FOR VRRP ................................................................................... 819

    21.3.1 advertisement-interval ................................................................................ 819

    21.3.2 circuit-failover ............................................................................................. 819

    21.3.3 debug vrrp .................................................................................................. 820

    21.3.4 disable ........................................................................................................ 820

    21.3.5 enable......................................................................................................... 821

    21.3.6 interface...................................................................................................... 821

    21.3.7 preempt-mode ............................................................................................ 821

    21.3.8 priority......................................................................................................... 822

    21.3.9 router vrrp ................................................................................................... 822

    21.3.10 show vrrp .................................................................................................. 823

    21.3.11 virtual-ip .................................................................................................... 823

    21.4 EXAMPLE OF VRRP......................................................................................... 824

    21.5 VRRP TROUBLESHOOTING............................................................................... 825

    21.6 WEB MANAGEMENT.......................................................................................... 825

    21.6.1 Create VRRP Number ................................................................................ 825

    21.6.2 configure VRRP Dummy IP ........................................................................ 826

    21.6.3 configure VRRP Port .................................................................................. 826

    21.6.4 Activate Virtual Router ................................................................................ 826

    21.6.5 Configure Preemptive Mode For VRRP...................................................... 826

    21.6.6 Configure VRRP Priority ............................................................................. 827

    21.6.7 Configure VRRP Interval ............................................................................ 827

    21.6.8 Configure VRRP Circuit .............................................................................. 827

    21.6.9 Configure VRRP Authentication Mode........................................................ 827

    CHAPTER 22 MRPP CONFIGURATION...................................................................... 829 22.1 MRPP INTRODUCTION...................................................................................... 829

    22.1.1 Conception Introduction.............................................................................. 829

    22.1.2 MRPP Protocol Packet Types..................................................................... 830

    22.1.3 MRPP Protocol Operation System ............................................................. 831

    22.2 MRPP CONFIGURATION TASK SEQUENCE ......................................................... 832

    22.3 COMMANDS FOR MRPP................................................................................... 833

  • 16

    22.3.1 clear mrpp statistics.................................................................................... 833

    22.3.2 control-vlan ................................................................................................. 833

    22.3.3 debug mrpp ................................................................................................ 834

    22.3.4 enable......................................................................................................... 834

    22.3.5 fail-timer...................................................................................................... 835

    22.3.6 hello-timer................................................................................................... 835

    22.3.7 mrpp enable................................................................................................ 836

    22.3.8 mrpp ring .................................................................................................... 836

    22.3.9 node-mode ................................................................................................. 837

    22.3.10 primary-port .............................................................................................. 837

    22.3.11 secondary-port .......................................................................................... 837

    22.3.12 show mrpp ................................................................................................ 838

    22.3.13 show mrpp statistics ................................................................................. 838

    22.4 MRPP TYPICAL SCENARIO ................................................................................ 838

    22.4.1 MRPP typical scenario 1............................................................................. 838

    22.4.2 MRPP typical scenario 2............................................................................. 840

    22.4.3 MRPP typical scenario 3............................................................................. 843

    22.5 MRPP TROUBLESHOOTING............................................................................... 847

    CHAPTER 23 CLUSTER CONFIGURATION............................................................... 848 23.1 INTRODUCTION TO CLUSTER............................................................................. 848

    23.2 CLUSTER MANAGEMENT CONFIGURATION SEQUENCE ........................................ 848

    23.3 COMMANDS FOR CLUSTER ............................................................................... 851

    23.3.1 cluster run................................................................................................... 851

    23.3.2 cluster register timer ................................................................................... 851

    23.3.3 cluster ip-pool ............................................................................................. 851

    23.3.4 cluster commander ..................................................................................... 852

    23.3.5 cluster member........................................................................................... 852

    23.3.6 cluster auto-add enable .............................................................................. 853

    23.3.7 rcommand member .................................................................................... 853

    23.3.8 rcommand commander............................................................................... 854

    23.3.9 cluster reset member.................................................................................. 854

    23.3.10 cluster update member............................................................................. 854

    23.3.11 cluster holdtime......................................................................................... 855

    23.3.12 cluster heartbeat....................................................................................... 856

    23.3.13 clear cluster candidate-table..................................................................... 856

    23.4 EXAMPLES OF CLUSTER ADMINISTRATION ......................................................... 857

    23.5 CLUSTER ADMINISTRATION TROUBLESHOOTING ................................................. 857

    23.5.1 Cluster Debugging and Monitoring Command............................................ 857

  • 17

    23.5.2 Cluster Administration Troubleshooting ...................................................... 859

  • 18

    Chapter 1 Switch Management

    1.1 Management Options

    After purchasing the switch, the user needs to configure the switch for network

    management. ES4700 series provides two management options: in-band management

    and out-of-band management.

    1.1.1 Out-of-band Management

    Out-of-band management is the management through Console interface. Generally,

    the user will use out-of-band management for the initial switch configuration, or when

    in-band management is not available. For instance, the user must assign an IP address

    to the switch via the Console interface to be able to access the switch through Telnet.

    The procedures for managing the switch via Console interface are listed below:

    Step 1: setting up the environment:

    Fig 1-1 Out-of-band Management Configuration Environment

    As shown in Fig 1-1, the serial port (RS-232) is connected to the switch with the

    serial cable provided. The table below lists all the devices used in the connection.

    Device Name Description

    PC machine Has functional keyboard and RS-232, with terminal

    emulator installed, such as HyperTerminal included in

    Windows 9x/NT/2000/XP.

    Serial port cable One end attach to the RS-232 serial port, the other end to

    the Console port.

    Connect with serial port

  • 19

    ES4700 series Functional Console port required.

    Step 2 Entering the HyperTerminal

    Open the HyperTerminal included in Windows after the connection established. The

    example below is based on the HyperTerminal included in Windows XP.

    1) Click Start menu - All Programs -Accessories -Communication - HyperTerminal.

    Fig 1-2 Opening HyperTerminal

    2) Type a name for opening HyperTerminal, such as “Switch”.

    Fig 1-3 Opening HyperTerminal

    3) In the “Connecting with” drop-list, select the RS-232 serial port used by the PC, e.g.

    COM1, and click “OK”.

  • 20

    Fig 1-4 Opening HyperTerminal

    4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for

    “Parity checksum”, “1” for stop bit and “none” for traffic control; or, you can also click

    “Revert to default” and click “OK”.

    Fig 1-5 Opening HyperTerminal

    Step 3 Entering switch CLI interface:

    Power on the switch. The following appears in the HyperTerminal windows, that is

    the CLI configuration mode for ES4700 series.

    ES4700 series Management Switch

  • 21

    Copyright (c) 2001-2006 by Accton Technology Corporation.

    All rights reserved.

    Reset chassis ... done.

    Testing RAM...

    134,217,728 RAM OK.

    Initializing...

    Attaching to file system ... done.

    Loading nos.img ... done.

    Starting at 0x10000...

    Current time is WED APR 20 09: 37: 52 2005

    ES4700 series Switch Operating System, Software Version ES4700 series 1.1.0.0,

    Copyright (C) 2001-2006 by Accton Technology Corporation

    http: //www.smc. com.

    ES4700 series Switch

    26 Ethernet/IEEE 802.3 interface(s)

    Press ENTER to start session

    The user can now enter commands to manage the switch. For a detailed description

    for the commands, please refer to the following chapters.

    1.1.2 In-band Management

    In-band management refers to the management by login to the switch using

    Telnet. In-band management enables management of the switch for some devices

    attached to the switch. In the case when in-band management fails due to switch

    configuration changes, out-of-band management can be used for configuring and

    managing the switch.

    1.1.3 Management via Telnet

    To manage the switch with Telnet, the following conditions should be met:

    1) Switch has an IP address configured

    2) The host IP address (Telnet client) and the switch’s VLAN interface IP address is

    in the same network segment.

    3) If not 2), Telnet client can connect to an IP address of the switch via other

    devices, such as a router.

    ES4700 seriesis a Layer 3 switch that can be configured with several IP addresses.

    The following example assumes the shipment status of the switch where only VLAN1

    exists in the system.

  • 22

    The following describes the steps for a Telnet client to connect to the switch’s VLAN1

    interface by Telnet.

    Fig 1-6 Manage the switch by Telnet

    Step 1: Configure the IP addresses for the switch

    First is the configuration of host IP address. This should be within the same network

    segment as the switch VLAN1 interface IP address. Suppose the switch VLAN interface

    IP address 10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run

    “ping 10.1.128.251” from the host and verify the result, check for reasons if ping failed.

    The IP address configuration commands for VLAN1 interface are listed below.

    Before in-band management, the switch must be configured with an IP address by

    out-of-band management (i.e. Console mode), The configuration commands are as

    follows (All switch configuration prompts are assumed to be “switch” hereafter if not

    otherwise specified):

    Switch>

    Switch>en

    Switch#config

    Switch(Config)#interface vlan 1

    Switch(Config-If-Vlan1)#ip address 10.1.128.251 255.255.255.0

    Switch(Config-If-Vlan1)#no shutdown

    Step 2: Run Telnet Client program.

    Run Telnet client program included in Windows with the specified Telnet target.

  • 23

    Fig 1-7 Run telnet client program included in Windows

    Step 3: Login to the switch

    Login to the Telnet configuration interface. Valid login name and password are

    required, otherwise the switch will reject Telnet access. This is a method to protect the

    switch from unauthorized access. As a result, when Telnet is enabled for configuring and

    managing the switch, username and password for authorized Telnet users must be

    configured with the following command:

    username password {0|7} . Assume an authorized user in the switch has a username of “test”, and password of

    “test”, the configuration procedure should like the following:

    Switch>en Switch#config Switch(Config)#username test password 0 test

    Enter valid login name and password in the Telnet configuration interface, Telnet

    user will be able to enter the switch’s CLI configuration interface. The commands used in

    the Telnet CLI interface after login is the same as in that in the Console interface.

  • 24

    Fig 1-8 Telnet Configuration Interface

    1.1.4 Management via HTTP

    To manage the switch via HTTP, the following conditions should be met:

    1) Switch has an IP address configured

    2) The host IP address (HTTP client) and the switch’s VLAN interface IP address

    are in the same network segment;

    3) If 2) is not met, HTTP client should connect to an IP address of the switch via

    other devices, such as a router.

    Similar to management via Telnet, as soon as the host succeeds to ping an IP

    address of the switch and to type the right login password, it can access the switch via

    HTTP. The configuration list is as below:

    Step 1: Configure the IP addresses for the switch and start the HTTP function on the switch.

    For configuring the IP address on the switch through out-of-band management, see the relevant chapter.

    To enable the WEB configuration, users should type the CLI command ip http server in the global mode as below: Switch>en Switch#config Switch(Config)#ip http server

  • 25

    Step 2: Run HTTP protocol on the host.

    Open the Web browser on the host and type the IP address of the switch. Or run

    directly the HTTP protocol on the Windows. For example, the IP address of the switch is

    “10.1.128.251”.

    Fig 1-9 Run HTTP Protocol

    When accessing a switch with IPv6 address, it is recommended to use the Firefox

    browser with 1.5 or later version. For example, if the IPv6 address of the switch is

    “3ffe:506:1:2::3”, enter the switch address at the address bar: http://[3ffe:506:1:2::3],

    where the address should be in the square brackets.

    Step 3: Logon to the switch To logon to the HTTP configuration interface, valid login user name and password

    are required; otherwise the switch will reject HTTP access. This is a method to protect

    the switch from the unauthorized access. Consequently, in order to configure the switch

    via HTTP, username and password for authorized HTTP users must be configured with

    the following command in the global mode:

    username password . Suppose an authorized user in the switch has a username as “test”, and password

    as “test”. The configuration procedure is as below:

    Switch>en Switch#config Switch(Config)# username test password 0 test

    The Web login interface is as below:

  • 26

    Fig 1-10 Web Login Interface

    Input the right username and password, and then the main Web configuration

    interface is shown as below.

    Fig 1-11 Main Web Configuration Interface

  • 27

    1.2 Management Interface

    1.2.1 CLI Interface

    CLI interface is familiar to most users. As aforementioned, out-of-band management

    and Telnet login are all performed through CLI interface to manage the switch.

    CLI Interface is supported by Shell program, which consists of a set of configuration

    commands.Those commands are categorized according to their functions in switch

    configuration and management. Each category represents a different configuration mode.

    The Shell for the switch is described below:

    Configuration Modes

    Configuration Syntax

    Shortcut keys

    Help function

    Input verification

    Fuzzy match support

    1.2.2 Configuration Modes

    Fig 1-12 Shell Configuration Modes

    User Mode

    Admin Mode

    Global Mode

    Inte

    rface

    Mod

    e

    Vla

    n M

    ode

    DH

    CP

    addr

    ess

    pool

    co

    nfig

    urat

    ion

    mod

    e

    Rou

    te c

    onfig

    urat

    ion

    mod

    e

    AC

    L co

    nfig

    urat

    ion

    mod

    e

  • 28

    1.2.2.1 User Mode

    On entering the CLI interface, entering user entry system first. If as common user, it

    is defaulted to User Mode. The prompt shown is “Switch>“, the symbol “>“ is the prompt

    for User Mode. When disable command is run under Admin Mode, it will also return to the User Mode.

    Under User Mode, no configuration to the switch is allowed, only clock time and

    version information of the switch can be queries.

    1.2.2.2 Admin Mode

    To enter Admin Mode sees the following: In user entry system, if as Admin user, it is

    defaulted to Admin Mode. Admin Mode prompt “Switch#” can be entered under the User

    Mode by running the enable command and entering corresponding access levels admin

    user password, if a password has been set. Or, when exit command is run under Global

    Mode, it will also return to the Admin Mode. ES4700 series also provides a shortcut key

    sequence "Ctrl+z”, this allows an easy way to exit to Admin Mode from any configuration

    mode (except User Mode).

    Under Admin Mode, when disable command is run, it will return to User Mode. When

    exit command is run, it will exit the entry and enter user entry system direct. Next users

    can reenter the system on entering corresponding user name and password.

    Under Admin Mode, the user can query the switch configuration information,

    connection status and traffic statistics of all ports; and the user can further enter the

    Global Mode from Admin Mode to modify all configurations of the switch. For this reason,

    a password must be set for entering Admin mode to prevent unauthorized access and

    malicious modification to the switch.

    1.2.2.3 Global Mode

    Type the config command under Admin Mode will enter the Global Mode prompt

    “Switch(Config)#”. Use the exit command under other configuration modes such as

    Interface Mode, VLAN mode will return to Global Mode.

    The user can perform global configuration settings under Global Mode, such as MAC

    Table, Port Mirroring, VLAN creation, IGMP Snooping start, GVRP and STP, etc. And the

    user can go further to Interface Mode for configuration of all the interfaces.

    1.2.2.4 Interface Mode

    Use the interface command under Global Mode can enter the interface mode

    specified. ES4700 series provides three interface type: VLAN interface, Ethernet port and

  • 29

    port-channel, and accordingly the three interface configuration modes.

    Interface Type Entry Prompt Operates Exit

    VLAN

    Interface

    Type interface vlan command under

    Global Mode.

    Switch(Config-If-Vlanx)#

    Configure

    switch IPs, etc

    Use the exit

    command to

    return to

    Global Mode.

    Ethernet Port Type interface ethernet command under

    Global Mode.

    Switch(Config- ethernetxx)#

    Configure

    supported

    duplex mode,

    speed, etc.

    of Ethernet

    Port.

    Use the exit

    command to

    return to

    Global Mode.

    port-channel Type interface port-channel command under Global

    Mode.

    Switch(Config-if- port-channelx)#

    Configure

    port-channel

    related

    settings such

    as duplex

    mode, speed,

    etc.

    Use the exit

    command to

    return to

    Global Mode.

    1.2.2.5 VLAN Mode

    Using the vlan command under Global Mode can enter the corresponding

    VLAN Mode. Under VLAN Mode the user can configure all member ports of the

    corresponding VLAN. Run the exit command to exit the VLAN Mode to Global Mode.

    1.2.2.6 DHCP Address Pool Mode

    Type the ip dhcp pool command under Global Mode will enter the DHCP Address Pool Mode prompt “Switch(Config--dhcp)#”. DHCP address pool properties can be configured under DHCP Address Pool Mode. Run the exit command to

    exit the DHCP Address Pool Mode to Global Mode.

    1.2.2.7 Route Mode

    Routing

    Protocol

    Entry Prompt Operates Exit

    RIP

    Routing

    Type router rip

    Switch(Config-Router-Rip)# Configure RIP protocol

    Use the

    “exit”

  • 30

    Protocol command

    under

    Global

    Mode.

    parameters. command to

    return to

    Global

    Mode.

    OSPF

    Routing

    Protocol

    Type router ospf command

    under

    Global

    Mode.

    Switch(Config-Router-Ospf)# Configure OSPF

    protocol

    parameters.

    Use the

    “exit”

    command to

    return to

    Global

    Mode.

    1.2.2.8 ACL Mode

    ACL type Entry Prompt Operates Exit

    Standard IP

    ACL Mode

    Type access-list ip command

    under Global

    Mode.

    Switch(Config-Std-Nacl-a)#

    Configure

    parameters

    for

    Standard

    IP ACL

    Mode

    Use the “exit”

    command to

    return to

    Global Mode.

    Extended IP

    ACL Mode

    Type access-list ip command

    under Global

    Mode.

    Switch(Config-Ext-Nacl-b)#

    Configure

    parameters

    for

    Extended

    IP ACL

    Mode

    Use the “exit”

    command to

    return to

    Global Mode.

    1.2.3 Configuration Syntax

    ES4700 series provides various configuration commands. Although all the

    commands are different, they all abide by the syntax for ES4700 series configuration

    commands. The general command format of ES4700 series is shown below:

    cmdtxt { enum1 | … | enumN } [option] Conventions: cmdtxt in bold font indicates a command keyword; indicates a variable parameter; {enum1 | … | enumN } indicates a mandatory parameter that should be selected from the parameter set enum1~enumN; and the square bracket ([ ]) in [option] indicate an optional parameter. There may be combinations of “< >“, “{ }” and

  • 31

    “[ ]” in the command line, such as [],{enum1 | enum2}, [option1 [option2]], etc.

    Here are examples for some actual configuration commands:

    show calendar, no parameters required. This is a command with only a keyword and no parameter, just type in the command to run.

    vlan , parameter values are required after the keyword. duplex {auto|full|half}, user can enter duplex half, duplex full or duplex

    auto for this command. snmp-server community {ro|rw}, the followings are possible:

    snmp-server community ro

    snmp-server community rw

    1.2.4 Shortcut Key Support

    ES4700 series provides several shortcut keys to facilitate user configuration, such as

    up, down, left, right and Blank Space. If the terminal does not recognize Up and Down

    keys, ctrl +p and ctrl +n can be used instead.

    Key(s) Function

    Back Space Delete a character before the cursor, and the cursor moves back.

    Up “↑” Show previous command entered. Up to ten recently entered

    commands can be shown.

    Down “↓” Show next command entered. When use the Up key to get

    previously entered commands, you can use the Down key to

    return to the next command

    Left “←” The cursor moves one character to

    the left.

    Right “→” The cursor moves one character to

    the right.

    You can use the Left and

    Right key to modify an

    entered command.

    Ctrl +p The same as Up key “↑”.

    Ctrl +n The same as Down key “↓”.

    Ctrl +b The same as Left key “←”.

    Ctrl +f The same as Right key “→”.

    Ctrl +z Return to the Admin Mode directly from the other configuration

    modes ( except User Mode).

    Ctrl +c Break the ongoing command process, such as ping or other

    command execution.

  • 32

    Tab When a string for a command or keyword is entered, the Tab can

    be used to complete the command or keyword if there is no

    conflict.

    1.2.5 Help function

    There are two ways in ES4700 series for the user to access help information: the

    “help” command and the “?”.

    Access to Help Usage and function

    Help Under any command line prompt, type in “help” and press Enter will

    get a brief description of the associated help system.

    “?” 1. Under any command line prompt, enter “?” to get a command

    list of the current mode and related brief description.

    2. Enter a “?” after the command keyword with a embedded

    space. If the position should be a parameter, a description of

    that parameter type, scope, etc, will be returned; if the position

    should be a keyword, then a set of keywords with brief

    description will be returned; if the output is ““, then the

    command is complete, press Enter to run the command.

    3. A “?” immediately following a string. This will display all the

    commands that begin with that string.

    1.2.6 Input verification

    Returned Information: success All commands entered through keyboards undergo syntax check by the Shell.

    Nothing will be returned if the user entered a correct command under corresponding

    modes and the execution is successful.

    Returned Information: error

    Output error message Explanation

    Unrecognized command or illegal

    parameter!

    The entered command does not exist, or there

    is error in parameter scope, type or format.

    Ambiguous command At least two interpretations is possible basing on

    the current input.

    Invalid command or parameter The command is recognized, but no valid

  • 33

    parameter record is found.

    This command is not exist in current

    mode

    The command is recognized, but this command

    can not be used under current mode.

    Please configure precursor

    command "*" at first !

    The command is recognized, but the

    prerequisite command has not been configured. syntax error : missing '"' before the end of command line! Quotation marks are not used in pairs.

    1.2.7 Fuzzy match support

    ES4700 series Shell support fuzzy match in searching command and keyword. Shell

    will recognize commands or keywords correctly if the entered string causes no conflict.

    For example:

    1. For command “show interfaces status ethernet 1/1”, typing “sh in status e 1/1” will

    work

    2. However, for command “show running-config”, the system will report a “> Ambiguous

    command!” error if only “show r” is entered, as Shell is unable to tell whether it is

    “show rom” or “show running-config”. Therefore, Shell will only recognize the

    command if “sh ru” is entered.

    1.3 Web Management

    1.3.1 Main Page

    ES4700 series routing switch provides HTTP web management function and users

    can configure and monitor the status of the switch through the web interface.

    To manage the switch through web browser use the following steps:

    Configure valid IP address, mask and confirm gateway for the switch.

    1. Configure web user management and its password

    2. Connect to the switch using the web browser. Enter the username and password to

    proceed to web management.

    1.3.2 Module Front Panel

    When entering username, password and passing authentication, you will see the

    following web management main page. On the left of the management page is the main

  • 34

    management menu and on the right of the page system information and command

    parameter are displayed. Click the main menu link to browse other management links

    and to display configuration and statistic information.

    Fig 1-13 Module Front Panel

  • 35

    Chapter 2 Basic Switch Configuration

    2.1 Commands for Basic Switch Configuration

    Basic switch configuration includes commands for entering and exiting the admin

    mode, commands for entering and exiting interface mode, for configuring and displaying

    the switch clock, for displaying the version information of the switch system, etc.

    Command Explanation

    Normal User Mode/ Admin Mode

    enable disable

    The User uses enable command to step into admin mode from normal user mode. The

    disable command is for exiting admin mode.

    Admin Mode

    config [terminal] Enter global mode from admin mode

    Various Modes

    exit

    Exit current mode and enter previous mode,

    such as using this command in global mode

    to go back to admin mode, and back to

    normal user mode from admin mode

    Admin Mode

    calendar set

    Set system date and time

    Show version Display version information of the switch

    set default Restore to the factory default

    Write Flash Memory

    Save current configuration parameters to

    Flash Memory

    Reload Hot reset the switch

    2.1.1 Command For Basic Configuration

    2.1.1.1 authentication login

    Command: authentication login {local | radius | local radius | radius local} no authentication login

  • 36

    Function: Configure the authentication mode and priority on Telnet Server for remote login users; the “no authentication login” command restores to the default login authentication mode.

    Default: Default login authentication mode is local. Command mode: Global mode Usage guide: When using authentication modes combinations, the mode at the first of the queue is with the highest priority which receding ascendingly. When a user passes

    authentic


Recommended