background image

igmp snooping immediate-leave 

 

To disable “immediate leave” under overall mode: 

no igmp snooping immediate-leave 

 

4. To configure the aging time for multicast 

 

To set multicast aging time under overall mode (unit: second) : 

igmp snooping age <age-interval> 

5. To show multicast information 

 

To show IGMP SNOOPING information under overall mode: 

show igmp snooping 

 

To show Layer 2 multicast entries under overall mode, including those learned by 

IGMP SNOOPING and those added by hand: 

show multicast 

Summary of Contents for iSpirit 3026

Page 1: ...e 31 1 1 Basic configuration of the system 32 1 2 File management configuration 34 1 3 Software upgrading 37 Chapter 2 Port Configuration 40 2 1 Common configuration for ports 41 2 2 MIRROR configurat...

Page 2: ...ction to MAC binding 108 9 2 MAC binding configuration 109 9 3 MAC Binding Configuration Showing 111 Chapter 10 Configuration IP Binding 112 10 1 Introduction to IP Binding 113 10 2 Configuration of I...

Page 3: ...on to SNMP 166 16 2 Introduction to RMON 167 16 3 SNMP Configuration 168 16 4 RMON Configuration 170 Chapter 17 Configure debugging instrument 173 17 1 The Introduction to Debugging Instruments 174 17...

Page 4: ...Part 1 Hardware Operation...

Page 5: ...nd back panel of the iSpirit 3026 switch its functionality characteristics and the standards that it supports There are also some application examples in this chapter Chapter Index 1 Product Overview...

Page 6: ...ensible ports each of which can have a 1000M fiber module or a 10 100Base T self negotiable RJ45 module All ports support non blockable full speed layer 2 switching The backplane bandwidth is 16Gbps a...

Page 7: ...priority match thus providing flexible priority control at port level for multimedia and other kinds of data transmission Supporting port binding with network adaptors thus providing safe access Suppo...

Page 8: ...ands 2 can use a network management software based on SNMP 3 can configure through web with a graphics interface which is convenient powerful and easy 4 it has been embedded with multiple network mana...

Page 9: ...hus provides a communication channel of high bandwidth with error free between switches Network flows can be distributed evenly between channels and thus provides load balance Port trunking is support...

Page 10: ...nal safety Communication between different VLANs can only be achieved through layer 3 transmission instead of direct communication 3 Make it easy to move and manage devices in the network In a word VL...

Page 11: ...belong to a default VLAN but they don t use the VLAN ID of this default VLAN it s not necessary for all ports to use a VLAN tag When data packets are transmitted out of a port the switch will determin...

Page 12: ...data packet and then outputs the packet to the port identified by the entry Table entries can be learned by the switch automatically through data transmission through input ports or can be added by n...

Page 13: ...mum both devices can support and if the connected device supports full duplex it will also use full duplex More Info According to IEEE802 3u standard the auto negotiation process needs to create conne...

Page 14: ...panel 2 grasp tightly the screws on the left and the right pull the module out in equilibrium and make it separate from the box Notes Extendible modules don t support hot plug so you must turn the po...

Page 15: ...pair of lights for its link status and one mode light Link LED mode LED and mode switches are shown in Figure1 4 Figure1 4 LED status indicator lights 1 Mode LED and mode switching User can use the mo...

Page 16: ...es Mode color status none no data ACT blinking green in transmission 10 100Base T ports None 10Mbps green 100Mbps 1000Base X GBIC module green 1000Mbps 10 100 1000Base T ports none 10M or 100Mpbs SPD...

Page 17: ...C power An alternating current cable is needed to connect with the power outlet 1 6 2 COM Users can use the UART port and the supplied console cord specifically for this purpose to connect the switch...

Page 18: ...and start the iSpirit 3026 switch correctly and how to use POST Power On Self Test to make sure the switch operates normally Chapter Index 1 Help info before installation 2 Installation steps 3 Power...

Page 19: ...sted 45 centigrade degree 113 degree for Fahrenheit To avoid limiting ventilation don t put anything else in the range of 7 6cm 3 inches at the ventilation intake 7 The iSpirit 3026 switch will work n...

Page 20: ...ers for connecting from a 10 100Base T port or a 10 100 1000Base T port 2 The longest cable length is 10 000 meters for connecting from a 1000Base X port 3 The cable should be far from any electromagn...

Page 21: ...Warning To avoid hurt themselves during installation or operation users should use effective method to stabilize the switch Please refer the following guidelines for safety 1 If there is only one devi...

Page 22: ...owing guideline to install two screws on each flange 1 e 19 inches cabinet put the longer edge of the flange on the switch using supplied screws 2 4 inches cabinet put the shorter edge of the flange o...

Page 23: ...ter installing the flanges on the switch fix the flanges into the cabinet using supplied 4 screws as shown in Figure2 5 then plug the power cord into the switch After turned on the system will first r...

Page 24: ...on their own choice Horizontal vertical installation install the longer edge of the flanges onto the switch using supplied screws and install the shorter on to the wall as shown in Figure2 6 Figure2 6...

Page 25: ...pirit 3026 switch as an example 2 4 1 Connecting using the 10 100Mbps ports 10 100Mbps ports can be configured to use the same speed of the connected device If the connected device doesn t support aut...

Page 26: ...outers with RJ 45 ports at the front panel as shown in Figure2 9 and use crossover cable to connect with switches or concentrators Pin description is shown in the appendixes 2 Connect the other end of...

Page 27: ...ed console cord into the UART console port on the switch as shown in Figure2 10 Pin description is in Appendix B 2 Plug the other end of the cord to an UART COM port on the PC 3 Start the terminal pro...

Page 28: ...Figure2 11 Automatic startup 2 5 2 Startup by users At the interface of waiting to enter startup mode users can type any key except to let the system to step into Bootrom menu which has a prompt of S...

Page 29: ...how all PCI devices 2 5 3 Upgrading Hyper OS using console port At the prompt Switch Boot type a capital after a series of signs are shown choose the transfer option from the terminal menu set the pro...

Page 30: ...Part 2 Software configuration manual...

Page 31: ...ge In the iSpirit 3026 switch some functionalities are simpler than others but they are used often They are going to be introduced in this chapter Chapter Index 1 Basic configuration of the system 2 F...

Page 32: ...et mask Example Switch ip address 192 168 2 3 255 255 255 0 to set the default gateway ip gateway gateway address Example Switch ip gateway 192 168 2 1 to restart the switch Switch reset to restart th...

Page 33: ..._seq 4 time 0 ms 198 168 80 72 PING statistics 5 packets transmitted 5 packets received 0 packet loss round trip ms min avg max 0 3 16 If not connected it will show as follows PING 198 168 80 72 56 da...

Page 34: ...configuration file using TFTP 1 Commands Users can save configuration under any CLI mode by just type the command save Under the overall configuration mode you can backup the configuration file by upl...

Page 35: ...backup the configuration file Step 1 set up a network environment as shown in Figure1 1 Figure1 1 Set up a networks environment Use a console cord to connect the console port of the switch with a COM...

Page 36: ...ure1 3 Figure1 3 TFTP Server program configuration In the Base Directory bar type the path then click on OK button to confirm Step 2 save the configuration to file at the switch Under any CLI mode jus...

Page 37: ...tion mode you can upgrade the image file of the switch Switch Download image ip address name ip address the IP address of the PC where the image file is stored name the image file name During the down...

Page 38: ...new image file to a directory on the PC here suppose it s C t Step 5 Configure an IP address of the PC suppose it s 192 168 0 2 Step 6 Configure an IP address of the switch suppose it s 92 68 0 Notes...

Page 39: ...onnect the switch Choose a vlan interface and connect it with the PC on which TFTP server program is running using a network cable and use the ping command to test the connection Step 2 Type the follo...

Page 40: ...Port Configuration This chapter introduce port configuration Chapter Index 1 Common configuration for ports 2 MIRROR configuration 3 TRUCK configuration 4 STORM CONTROL configuration 5 Configuration...

Page 41: ...example to enable port 1 and port2 Switch port1 2 enable To disable one or multiple contiguous ports under PORT RANGE configuration mode disable For example to disable port 1 and port2 Switch port1 2...

Page 42: ...ose receiving packets will be monitored 3 Mirror Port Mirror port configuration is to set the port that s used to monitor packets The CLI command is interactive users just need to type the port number...

Page 43: ...section will introduce the following information Trunk configuration Trunk mcast configuration Trunk no ports configuration Trunk ports configuration Trunk Rtag configuration To show trunk informatio...

Page 44: ...guration information using command show trunk Switch show trunk 2 4 STORM CONTROL configuration In real networks DLF Destination Lookup Failure when packets will be handled like broadcast packets mult...

Page 45: ...de to show configuration information show storm control 2 5 Separated port configuration In real network users usually need network separation for data safety The iSpirit 3026 switch provides several...

Page 46: ...mbo frame configuration for all ports show jumbo 2 7 Configuration examples 1 Mirror Figure2 1 Configuration examples As shown in Figure2 1 user 1 and user2 are communicating through a switch usually...

Page 47: ...n t mess up mirror port and mirrored ports Mirror port is the port that s used to monitor data packets Mirrored ports are the ports that are being monitored and whose packets are going to be captured...

Page 48: ...ete a trunk group Switch no trunk A A trunk id range 0 5 To check any error 1 If the trunk doesn t work check the status switch show trunk TGID RTAG status Ports 0 0 not ready 0x00000000 none 1 1 Acti...

Page 49: ...an has the same functionality and characteristics of traditional physical networks Each vlan represents a broadcast domain broadcast packets can only transmit inside the vlan not allowed to span multi...

Page 50: ...One VLAN represents one broadcast domain broadcast packets can only transmit inside a VLAN not across multiple VLANs So VLAN partition can control effectively data flow in a network VLAN can improve n...

Page 51: ...ese 3 frames are shown in Figure3 1 Figure3 1 3 Data packets for these 3 frames All frames are tagged inside a switch If a non tagged frame is transferred to the switch it will tag the frame by choosi...

Page 52: ...e is shown in Figure3 2 Two switches connect through a replay port which belongs to VLAN 2 and VLAN 3 Each switch has two VLANs VLAN 2 and VLAN 3 and each VLAN has a user Thus user 1 can communicate w...

Page 53: ...he packet If no common port the packet will be discarded If no multicast entry is found the output ports will be determined based on the transmission mode of Layer2 hardware multicast transmission tab...

Page 54: ...When adding a port to a private VLAN it can be a promiscuous port a shared port or a separated port No matter what kind of port it is if it s an untagged member of a normal VLAN it should be removed f...

Page 55: ...guous VLANs will be created but it won t go to the VLAN mode in case VLANs in the range are already existent then no creation The command vlan vlanid minvlanid maxvlanid Users can delete one or more c...

Page 56: ...for one or multiple contiguous VLANs either under the VLAN configuration mode or under the PORT RANGE mode To add tagged ports under VLAN mode tagged port port1 port2 port port1 port2 To delete tagge...

Page 57: ...connecting port 2 of a iSpirit 3026 switch while user 2 is in VLAN 3 with port 3 Configuration Switch vlan 2 Vlan 2 added Switch vlan 2 exit Switch vlan 3 Vlan 3 added Switch vlan 3 vlan 2 Switch vlan...

Page 58: ...VLAN can t communication with each other you should check 1 VLANs already existent Switch show vlan member port information for related VLANs switch show vlan 2 vlan 2 port map None M Tagged U Untagge...

Page 59: ...for users to use and configure port isolation technology more conveniently A private VLAN is composed of multiple contiguous VLAN VLAN IDs are contiguous it uses port partition to provide Layer 2 por...

Page 60: ...scuous ports shared ports and separated ports In real networks they usually connect with shared data servers and up links to INTERNET Shared ports belong to isolated ports in a group They have the con...

Page 61: ...in a shared port group port 5 and port 6 in a group port 7 9 as promiscuous According to functionality for different types of ports here is the communication style for this VLAN group Separated ports...

Page 62: ...r the two VLAN groups Separated port group 1 user 1 can only communicate with server 1 not with user 2 3 Shared ports group 1 user 2 3 can communicate with server 1 and they can also communicate with...

Page 63: ...one for the primary VLAN For example in Figure4 1 there are 2 separated ports 2 shared port groups so the total number of VLANs in this group should be at least 5 The upper limit for VLAN range i e t...

Page 64: ...arated ports and shared ports in stead they should connect with promiscuous ports 4 2 Private VLAN configuration For the convenience of users the iSpirit 3026 switch provides a PRIVATE VLAN configurat...

Page 65: ...the range between min vlanid max vlanid 3 The number in the range max vlanid minus min vlanid is bigger than 26 4 Some VLAN in the range is already a normal VLAN 5 There is overlapping in the VLAN ran...

Page 66: ...enable or disable a group The VLAN group won t be active right after VLAN and ports configuration it needs to be activated by specific commands To enable a private VLAN group enable Notes There can be...

Page 67: ...disable a VLAN group first and then enable it again 7 To show group information To show VLAN groups information either under overall configuration mode or PRIVATE VLAN mode group id 1 12 Without group...

Page 68: ...munity 1 port 3 4 Community 2 port 5 6 Possible reasons if not working 1 Min vlanid is bigger than max vlanid 2 Primary vlanid is not in the range of min vlanid max vlanid 3 The value VLAN range of ma...

Page 69: ...isolate 1 Switch privatevlan 1 community 1 2 3 Switch privatevlan 1 promiscuous 7 Switch privatevlan 1 enable Switch show privatevlan 1 Private vlan group 1 status active max vlan number 1002 min vlan...

Page 70: ...privatevlan 1 community 1 5 6 Switch privatevlan 1 promiscuous 8 Switch privatevlan 1 enable Switch show privatevlan 2 Private vlan group 2 status active max vlan number 2002 min vlan number 2000 prim...

Page 71: ...Chapter 5 STP Configuration This chapter describes STP Spanning Tree Protocol and its configuration Chapter index 1 Introduction to STP 2 STP configuration 3 STP examples...

Page 72: ...STP can solve this paradox Users can have this functionality through commands we provided 5 2 STP configuration Please refer to the following steps to configure STP 1 To enable STP 2 To configure STP...

Page 73: ...stp bridge max age time To show STP information of the bridge show stp bridge To show STP information for a port overall mode or PORT RANGE mode show stp port port 5 3 STP examples Figure5 1 example A...

Page 74: ...isable stp ports port port 1 26 To check possible errors 1 You may need to see which switch is the bridge root Switch show stp bridge Designated Root Information Priority 32768 MAC Address 00 09 ca 01...

Page 75: ...led Path Cost 19 Designated Cost 0 Designated Root Information Priority 32768 MAC Address 00 09 ca 90 97 01 Designated Port Information Port ID 3 Priority 128 Designated Bridge Information Priority 32...

Page 76: ...nfiguration This chapter introduces what s Layer 2 static multicast and how to configure Chapter index 1 Introduction to Layer 2 static multicast 2 Layer 2 static multicast configuration 3 Layer 2 sta...

Page 77: ...ncing VOD Video On Demand etc are becoming popular An unicast example is shown in Figure6 1 which uses point to point communication A multicast example is shown if Figure6 2 which uses point to multip...

Page 78: ...t 1 Layer 2 hardware multicast transmission table The Layer 2 hardware multicast transmission table is used for layer 2 multicast transmission in line speed It has 255 entries i e 255 multicast MAC ad...

Page 79: ...for using Layer 2 hardware multicast transmission table unregistered or registered For unregistered mode if a matching entry is found in the table for a Layer 2 multicast flow it s transmitted accord...

Page 80: ...ntries only static configured ports are removed while dynamic ones are kept and so is deleting dynamic entries i e when dynamic entries become invalid only dynamic ports are deleted while static ones...

Page 81: ...nfiguration under overall mode show multicast static To show both of them under overall mode show multicast 6 3 Layer 2 static multicast configuration examples An example is shown in Figure6 5 Figure6...

Page 82: ...multicast address 01 00 5e 64 64 f0 vlan id 2 port list 1 2...

Page 83: ...Chapter 7 IGMP SNOOPING configuration This chapter introduces IGMP SNOOPING and it s configuration Chapter index 1 Introduction to IGMP SNOOPING 2 IGMP SNOOPING configuration...

Page 84: ...kets in a subnet is handled as broadcast which may increase the network flow dramatically and thus block the network With IGMP SNOOPING on the switch it can dynamically learn IP multicast addresses an...

Page 85: ...configuration IGMP SNOOPING will only include IP address while static configuration may have non IP address As said before unregistered mode will be used for the hardware transmission table if IGMP SN...

Page 86: ...running on the router which sends out IGMP QUERY packets periodically Host 1 wants to join the group 224 1 1 1 When the switch receives an IGMP QUERY packet from port 3 1 it will record the ingress p...

Page 87: ...as shown in Table7 2 Table7 2 Layer 2 multicast ddress Vlan ID Output port list 01 00 5e 01 01 01 2 1 1 1 2 3 1 4 To delete a group To set up a steady multicasting environment devices with IGMP such a...

Page 88: ...n one port has only one connected host 7 2 IGMP SNOOPING configuration This section describes how to configure IGMP SNOOPING Section index Default configuration for IGMP SNOOPING To enable and disable...

Page 89: ...or multicast To set multicast aging time under overall mode unit second igmp snooping age age interval 5 To show multicast information To show IGMP SNOOPING information under overall mode show igmp sn...

Page 90: ...f iSpirit 3026 switch to prevent unauthorized users to connect to Internet For 802 1x supplicant system and HyperBoss please refer to individual operation manual This Chapter mainly includes 1 Introdu...

Page 91: ...ation which accepts authentication request by supplicant system and forward user s name and password to the HyperBoss in fact the switch itself does not carry out authentication HyperBoss receives the...

Page 92: ...d in user end system that complete the part of supplicant system in 802 1x protocol If 802 1x authentication requested from supplicant system authentication server system will check user s name and pa...

Page 93: ...en authentication server system and authenticator system are completed through RADIUS protocol extended by EAP UTStarcom provides authenticator accounting system HyperBoss to make authentication and a...

Page 94: ...ifier is for indentifying purpose used for match Response and Request Length means the total length of EAP packet including packet head Data means EAP packet data EAP packet includes following four ty...

Page 95: ...ntication server system that will check the user based on whose name and password If it successful authentication server system will inform switch that will send EAP Success to supplicant system and a...

Page 96: ...port All users can visit Internet without authentification if switch s port is in Force authorized status Switch will send back EAP Success packet if it receive EAPOL Start packet from this port Plea...

Page 97: ...uccessful it is legal RADIUS protocol packet instead it is illegal RADIUS protocol packet that will be thrown away In this Section following contents included Introduction to protocol packet Internati...

Page 98: ...cc ess Reject Code value is 3 response packet from authentication server system to authenticator system indicates that user was not authenticated Access Challenge Code value is 11 response packet from...

Page 99: ...col Flow iSpirit 3026 authentication server system Figure 8 7 Internation of Protocol Flow Switch packs user s name into Access Reques packet and send to authentication server system when user is bein...

Page 100: ...s name response and original 16 byte random code to RADIUS server RADIU according to user s name will search for data bank and obtain the same password with that of supplicant system and then accordi...

Page 101: ...t computers Overtime interval to re send EAP Request is 30 seconds 3 times to re send EAP Request Stand by time of failed authentication is 60 seconds Overtime interval to re send by server is 10 seco...

Page 102: ...ode sets the port into Force unauthorized status dot1x control force unauthorized The following command under global CONFIG mode sets the port into N A status no dot1x control port port1 port2 port po...

Page 103: ...igure intervals and re sent times In 802 1x protocol standard interval and re send times of protocol Internation and protocol status are regulated iSpirit 3026 switch uses of standard intervals and re...

Page 104: ...ing commands under global CONFIG mode or PORT RANGE mode shows 802 1x info all 802 1x configuration info including that of all ports if port parameter is not input but instead it shows all connected u...

Page 105: ...value of NASPortServer is 0x02 2 Configure IP Add of authentication server system In order to ensure RADIUS communications between switch and authentication server system IP Add of authentication ser...

Page 106: ...ation accounting system is opened Following command under global CONFIG mode start accounting system radius server accounting Following command under global CONFIG mode close accounting system no radi...

Page 107: ...administrator iSpirit 3026 switch provides kinds of methods to ensure users safe connection including MAC binding method This Chapter introduces how to configure MAC binding function including 1 Intr...

Page 108: ...C Add of data flow is bound with legal MAC Add but the data flow will be thrown away if illegal MAC Add is bound with To prevent illegal users connect to the Internet via throw away data IEEE802 1Q st...

Page 109: ...the same VLAN user 1 cannot visit the Internet through Port 2 but only through Port 1 One Port bound with one or more MAC Add does not influence the forwarding efficiency of data flow input from this...

Page 110: ...ble For manual binding with MAC Add invalid or failed binding with MAC maybe caused by follows 802 1x has been set into Auto Force authorized or Force unauthorized This port has been bound with items...

Page 111: ...and mac address parameter has not been input when to carry out auto binding MAC Add to bind relative items in ARL Table For auto binding MAC Add invalid or failed MAC Add binding maybe caused by follo...

Page 112: ...tioned by the administrator iSpirit 3026 switch provide kinds of ways to ensure user s safety including IP binding ways In this Chapter how to configure IP binding function is introduced including 1 I...

Page 113: ...will be thrown away which has protected that illegal users to connect to the Internet Figure 10 1 is an example for IP binding port 1 of iSpirit 3026 switch is bound with IP Add of 192 168 0 100 unde...

Page 114: ...P resource is applied by others which maybe trust port of QoS IGMP SNOOPING protocol and 802 1x protocol 10 2 Configuration of IP Binding iSpirit 3026 switch only supports manual binding with IP Add i...

Page 115: ...if Port paramter was not input show ip bind port as that of the specific port will be shown if Port parameter was input 10 3 Sample of IP Binding Configuration Figure 10 2 Sample of IP Binding One use...

Page 116: ...filtration to ensure that safe visit Switch based on configuration ACL regulation filtrates the data flow to ensure safe visit In this Chapter how to configure ACL is introduced including 1 Introducti...

Page 117: ...ded to be denied or permitted only this regulation of ACL will be totally matched For iSpirit 3026 regulations in the same group are automatically arranged which is much complex Regulation with large...

Page 118: ...and then configure regulation 1 so regulation 1 will be arranged in the last but regulation 1 will be in the front access list 1 permit 192 168 1 0 0 0 0 255 regulation 2 access list 1 deny 192 168 0...

Page 119: ...is processed by the hardware of the switch which will not influence the tranference efficiency of data flow All data flow input from this port will not be matched in regulation if the port of the swi...

Page 120: ...s list 1 permit 192 168 0 100 Under port 1 of switch there are two users want to connect to the Internet through this port IP address of user 1 is 192 168 0 100 and the IP address of user 2 is 192 168...

Page 121: ...r standard IP ACL support groups from 1 199 Regulation number is increased one by one which generated by the system automatically deny permit the data packet can be denied or permitted to be forwarded...

Page 122: ...em automatically deny permit the data packet can be denied or permitted to be forwarded if they are well matched vlanId you can input the 0 if it needs not to be matched Type it means he protocol type...

Page 123: ...his port has been carried out with IP binding This port has been the QoS Untrust port Many regulations are in ACL group or FFP has been used by QoS and other applications 2 Show acl filter port Mode P...

Page 124: ...Chapter 12 Configuration of QoS In this Chapter following contents are introduced 1 Introduction to QoS 2 Configuration of QoS 3 Sample of QoS configuration...

Page 125: ...data forwarded by the switch be processed and make bandwidth limitation for some data which make your bandwidth of network is more reasonable for using and network performance can be forecasted iSpiri...

Page 126: ...erline of QoS field to sign different PRI signs in different data flow based on QoS configuration policy of the switch i e the operation sign in QoS field all devices according to operation signs tran...

Page 127: ...formation of 802 1p the value is from 0 to 7 every value indicates one class type IP Precedence class information used by early IP network and the value is from 0 to 7 every value indicates one class...

Page 128: ...queue to generate class information Mark throw away the data of Out of Profile to determine that if the class information of data flow of In Profile should be modified or not At output port realize th...

Page 129: ...all data flow can be classified into 8 kinds max according to 3 digit IP_Precedence value For Trust DSCP port to make classification according to the highest 6 digit of TOS field in IP data packet ge...

Page 130: ...lations in one ACL group but only the regulation whose movement is Permit in QoS is valid but whose movement is Deny in QoS is invalid ACL group can be standard IP group extended IP group and extended...

Page 131: ...ithm please refer to Figure 12 5 Bucketsize indicates that the max burst data flow size supported If there are matched data flow release from output port it is equal to that release from bucket Bucket...

Page 132: ...pirit 3026 switch support 4 PRI queues PRI of queue 1 is the lowest and that of queue 4 is the highest After the data flow is briefly kept in output queue output port should according to QoS schedulin...

Page 133: ...If the port is bound with IP address items bound with IP address are the covered ones in RULE 12 2 QoS Configuration Before QoS configuration please pat attention to that Administrator firstly should...

Page 134: ...12 8 for DSCP DSCP Mapping Table Default Value and Figure 12 9 for DSCP QUEUE Mapping Table Default Value QoS scheduling default of output port is SPQ Figure 12 6 COS DSCP Mapping Table Default Value...

Page 135: ...r example map IP Precedence value of 0 into internal DSCP value of 40 Switch qos prec dscp 0 40 Switch show qos prec dscp Following two commands are used for configuring and showing DSCP DSCP Mapping...

Page 136: ...rust ip_precedence Switch port 2 3 show qos Following command is used for configuring Trust DSCP port qos trust dscp For example port 2 and 3 are configured into Trust DSCP port Switch port 2 3 qos tr...

Page 137: ...ass flow for QoS Following command chooses COS class flow for QoS to form COS class at most only 8 COS values can be input For the condition the same value you input match cos cos value cos value Foll...

Page 138: ...s to enter POLICY CLASS mode the class chosen must be existed and the mode should be active class class id Under POLICY CLASS mode configure policy for class chosen including configure class informati...

Page 139: ...e ACL group 3 suppose ACL group 3 has been existed Switch class 3 qos class 4 Create class 4 Switch class 4 match acl 203 class 4 is ACL class choose ACL group 203 suppose that ACL group 203 has been...

Page 140: ...ACL filtration or excess data flow classified by QoS There are 128 items in RULE of each FFP Insufficient METER of the FFP maybe caused by excess classes with bandwidth limitations in QoS policy and...

Page 141: ...l be failed if QoS untrust port has been configured so QoS configuration should be deleted firstly and then configure with ACL filtration ACL regulation of permit action will be written into FFP if on...

Page 142: ...ou has input it you should input all from queue 1 to queue4 qos schedule wrr queue1 weight queue2 weight queue4 weight for example configure the port in the way of WRR scheduling the weight from queue...

Page 143: ...e passed Set extended visit control list 202 allow IP data packet of resource 192 168 1 3 to 192 168 2 3 can be passed And then according to these three visit control list to classify the data flow Sw...

Page 144: ...icy id 1 Status active port 3 flag Policy Flag policy id 1 Status active Output port of switch is 4 and set scheduling default of output is S P Q i e data flow with high PRI has the priority to pass t...

Page 145: ...c 2 Set the 4th port of switch is QoS trust port Set scheduling of port 1 of switch is W RR Set the 4th port of switch is QoS trust port Switch port 4 qos trust dscp Set scheduling of port 1 of switch...

Page 146: ...Chapter 13 Configure IP Route In this Chapter how to configure IP Route in iSpirit 3026 switch is introduced including 1 Introduction to IP Route 2 Introduction to ARP 3 Configure static route...

Page 147: ...make account for the best route through dynamic route protocol and tranfer the data flow 1 Interface Configuration For configuring IP route there must be three interface to distribute IP address after...

Page 148: ...ch interface vlan 3 no interface vlan 3 13 2 ARP Configuration 1 ARP Summary ARP Address Resolution Protocol is a kind of protocol to provide mapping from IP address to relative hardware address It de...

Page 149: ...0 10 5f 01 02 03 Delete static ARP Switch no arp 200 1 1 2 13 3 Configure Static Route 1 Summary Users under route mode configure the static route information of switch Static route is defined by user...

Page 150: ...useful in network In the network including hundred switches dynamic route selection protocol maybe consume great bandwidth resource but with default route bandwidth resource used by route election an...

Page 151: ...s to enter into or exit some group and the multicast router through IGMP protocol can decide that if there is multicast members in the relative sub net In this Chapter the main definitions of IGMP IGM...

Page 152: ...t has been the transmission method in multipoint communications more and more Under the condition that need send multimedia information such as living audio and video for several host machines it is n...

Page 153: ...sole address of host machine in sub net e g IP address 10 10 1 9 or MA C address 01 00 5C A0 4A B 1 Broadcast address it is used for sending data to all host machines in sub net e g broadcast IP addre...

Page 154: ...In the most Ethernet address the conversion is like this determine the first 24 digit of physic address of Ethernet MAC address as 01 00 5E which is the important information digit The very next is d...

Page 155: ...ponse time to send a response packet Unit 1 10 second In all other messages sender set it into but receiver ignores the field Checksum It is the message length of IGMP the whole effect load of IP pack...

Page 156: ...ef Host1 Sending Report in Figure 14 5 The host machine will stop timming of its special group and not send report if it has received a report from another host machine but its own timer has not come...

Page 157: ...ax response time set into the Last Member Query Interval Router will suppose that there are not local members in this group if no report messeages are received after the last query response time One h...

Page 158: ...sted Command s Format Switch show igmp g IGMP Connected Group Membership Group Address Interface Last Reporter Uptime Expires 238 1 2 9 200 1 1 1 200 1 1 20 7 350 224 0 0 9 200 1 1 1 200 1 1 1 35 350...

Page 159: ...Interface Interface IP Address Byte_In Size of Packet Entered Into unit Byte Byte_Out Size of Packet Sent Out unit Byte Pkt_In Numbes of Packet Entered Into Pkt_Out Numbes of Packet Sent Out...

Page 160: ...Chapter 15 Configure Management Service In this Chapter how to configure the management service is introduced including 1 Introduction to management service 2 Configure management service...

Page 161: ...ose TELNET WEB or and SNMP services administrator or users cannot through these closed service visit the switch For example switch close TELNET service so all users cannot through TELNET to enter into...

Page 162: ...regulation in ACL resource bank should be configured management service choose ACL regulation in ACL resource bank and one management service can only choose one standard IP regulation group Please r...

Page 163: ...ort Switch set telnet port port num Following command under global CONFIG mode configure with TELNET entry password Switch set telnet password password Following command under global CONFIG mode start...

Page 164: ...ddress end permitted by ACL can manage the switch through SNMP service group id is from 1 to 199 enable snmp group id Following command under global CONFIG mode close SNMP service when the user cannot...

Page 165: ...iSpirit 3026 switch provides SNMP and RMON to control the switch in remote In this Chapter how to configure SNMP and RMON is introduced including 1 Introduction to SNMP 2 Introduction to RMON 3 SNMP...

Page 166: ...are three editions for SNMP SNMPV1 SNMPV2 and SNMPV3 the latter edition is the upgrading edition for the front edition functions are increased and the safety performance is improved iSpirit 3026 swit...

Page 167: ...the switch Figure 16 1 SNMP protocol Internation between management workstation and agent 16 2 Introduction to RMON RMON Remote Network Monitoring remote network monitor applied defined standard netw...

Page 168: ...IB of 1 2 3 9 groups seperately is statistics group history group alarm group and event group 16 3 SNMP Configuration SNMP configuration includes community configuration and TRAP workstation configura...

Page 169: ...ap name port Mode CONFIGURATION Parameter trap name Trap name port purpose port Function modify the purpose port of appointed trap name snmp trap retries trap name retries Mode CONFIGURATION Parameter...

Page 170: ...nd is an Internation command if index is input the appointed group should be added or modified Alarm Internation input field is introduced Interval interval sampling time the unit is second suppoes th...

Page 171: ...rnation command if the index is input appointed group is added or modified EventType in event Internation input field is introduced as follows event type none 1 log 2 snmp trap 3 and log and trap 4 no...

Page 172: ...IGURATION parameter index Function show the data table of event appointed index configuration will be shown if index is input otherwise all configurations will be shown show rmon table statistics inde...

Page 173: ...o trace and orientate iSpirit 3026 switch supply with several debugging instruments to trace and orientate some problems of the switch and internet And in this chapter we will describe the using and c...

Page 174: ...and problems of the switch and internet Through these IP DEBUG command the manager can affirm whether the switch has received or sent the protocol packet It will display some relevant information suc...

Page 175: ...he connection between the switch and the destination equipment but also has functions as follows Can set the number of ICMP echoplex requesting packet sent Can set the over time interval of waiting fo...

Page 176: ...en the switch and the destination equipment can set that there is no regular route in ICMP echoples requesting packet sent and can set the connection of the route between the switch and the destinatio...

Page 177: ...n open the ARP DEBUG configure debug ip arp under global CONFIG mode the following command can close the ARP DEBUG configure no debug ip arp under global CONFIG mode the following command can open the...

Page 178: ...gure debug ip igmpsnooping under global CONFIG mode the following command can close the IGMP SNOOPING DEBUG configure no debug ip igmpsnooping under global CONFIG mode the following command can open a...

Page 179: ...hese are simple TRACEROUTE commands and can be used to test the state of the intermediate equipment between the switch and the destination equipment traceroute ip address following command will be car...

Page 180: ...Chapter 18 WEB page configuration The followings are described in the chapter 1 WEB page summarization 2 Detailed introduction of each page...

Page 181: ...h provide rich WEB page by which user can configure and administrate most function of switch For the WEB page supporting Chinese English user can select Chinese or English version WEB to control the s...

Page 182: ...connected the mainframe equipped with Web browser and the mainframe can PING switch After that user input switch address on browser address column and press Enter then you can enter into switch Web en...

Page 183: ...on tree It lies in low left of page and is displayed in the form of tree user can find the WEB to be administrated easily It can be divided into different group according to function of page and each...

Page 184: ...e detailed function introduction is described in sheet 18 2 Button Function Refresh Update all field on the page Apply Save the updated value in the memory Save Apply and Save current record Delete De...

Page 185: ...first time new is displayed on entry and active line is empty If new line is to be added new should be selected from under menu of entry and input new message then press SAVE or APPLY key If you comp...

Page 186: ...ry right of form of some page see Figure 18 6 and the Status display the status of the line The amendment of status of all line is performed interiorly so the Status is read only Once all messages in...

Page 187: ...Entry dialog box Figure18 7 shows the entry dialog box which will be displayed when user for enter into the page the first User input user name and password in relevant field and press OK key then can...

Page 188: ...18 7 Entry Dialog Box 2 Homepage Figure18 8 shows WEB homepage of iSpirit 3026 switch which will be displayed after user enter into the page or click iSpirit3026 crunode of guidance tree Figure 18 8 H...

Page 189: ...n press APLLY or Save key Before startup of switch user will be reminded to confirm selection If user select reset it means restart switch only if user select reset factory defaults it means restart s...

Page 190: ...configuration page which displays the baud rate of serial port and information relevant to other serial port When mainframe administrate switch through terminal of serial port such as Windows super te...

Page 191: ...password Capital lowercase are to be differentiated and at most 16 characters can be set up If user wants to change the password you should input the new password twice and the inputted password for...

Page 192: ...message of port and Stat message page To configure or check a special port user should select relevant port NO from under menu of Port Default status of port is enable so you can select disable in und...

Page 193: ...log box with port aggregation message displaying in the active line on which user can select port aggregation manner and aggregate port list After configuration user should press Apply or SAVE key The...

Page 194: ...onfiguration consists of three parts enantiomorph port outputted port list by enantiomorph and inputted port list by enantiomorph Port enantiomorph is the data package outputted by enantiomorph port t...

Page 195: ...ion configuration page which allow user to perform configuration of port isolation When configuration is to succeed it will be displayed in the following configuration form If you want to delete a pag...

Page 196: ...ly and display all current VLAN configuration message including VID and port list A port may not be a member of VLAN but it may be VLAN tagged member or untagged member Character meaning on port of pa...

Page 197: ...AN set up by user can be displayed in the list box If you want to amend an exist VLAN you should click relevant VLAN in the list box which will be displayed in the active line after that you should pr...

Page 198: ...supports 12 private VLAN group when you configure private VLAN you should select VLAN group number first then perform configuration of private VLAN group VLSN and port A private VLAN group VLAN conta...

Page 199: ...group if so configuration of private VLAN can not be succeeded After achievement of configuration of private VLAN group VLAN and port message you should press APPLY or SAVE key if configuration of pri...

Page 200: ...2 Static multi broadcast group configuration page Fig 18 21 display the static multi broadcast group configuration page which allows the user to set up one multi broadcast group configuration page an...

Page 201: ...roadcast group user should click relevant multi broadcast group in the list box which is displayed in the active line then press Delete key to delete the multi broadcast group and the data in the box...

Page 202: ...ns they can not be used 2 entries out of the 3 can be deleted instead of all which means at least 1 item should be saved When set up the entries and the number of purposed port of default parameter of...

Page 203: ...twork system through SNMP user should set up a sharing with read write able purview Figure 18 24 SNMP Sharing Configuration Page 8 Configuration of STP 1 Parameter configuration page of Bridge Paramet...

Page 204: ...of STP status on the port and priority The page covers many examples and 255 samples can be set up at most all the defaulted ports is a member of sample 1 which can be deleted but can not be amended U...

Page 205: ...Parameter Configuration Page Of Port 3 Multi sample configuration page Multi sample configuration page Figure 18 27 allow user to check all the configuration of samples Figure 18 27 Multi sample confi...

Page 206: ...be set up 128 protocols are supported in one group at most The matched field contains Original MAC address with hidden code Purposed MAC address with hidden code Ethernet network frame type such as I...

Page 207: ...ield is 0 which indicate no application adopted in the protocol the protocol can be configured such as adding some protocol deleting some protocol or amending some protocol When the referenced field i...

Page 208: ...the hidden code 0 0 0 255 When user perform protocol of configuration a filter mode must be set up for each protocol which contains four types permission rejection permit all and reject all If user se...

Page 209: ...e IP address is 00 11 22 33 44 55 with the hidden code 00 00 00 00 00 FF When user perform protocol of configuration a filter mode must be set up for each protocol which contains four types permission...

Page 210: ...ation Page of pile parameters Figure18 23 allows user set up switch such as alternate switch main switch and excluded pile group Intervals of hello packet name of pile switch and confirmation of affil...

Page 211: ...ge 2 Member management configuration page Pile member management configuration page is shown in Figure18 34 when the switch works as the member switch it is the read only page which display the data o...

Page 212: ...Member Management Configuration Page Figure18 25 shows the configuration page when the switch works as the main switch from which you can see an alternated switch can be set up or deleted on the main...

Page 213: ...eans that no IP address is bound on the port when there are many entries in the list it means that IP address is bound When user unbinds the port you can mark on small frame in front of IP address nee...

Page 214: ...essage 2 MAC address manual binding configuration page MAC address manual binding configuration page Fig 18 39 allow user to bind one or more MAC address on one port at most 128 MAC address can be bou...

Page 215: ...ion page MAC address Figure 18 40 automatic binding configuration page allow user to bind the MAC address learn from a port to the port automatically when binding MAC address to a port is finished Onl...

Page 216: ...the three services of switch If administrator does not provide one or several service for other users for the sake of security you can close one or several services If only special mainframe can acces...

Page 217: ...n page by which user can select an ACL group for a port and write the protocol of ACL group into the port hardware FFP logic which enable the port to perform ACL flirtation on received data package Wh...

Page 218: ...d inner DSCP value and amend the mapping form When user set up COS value of data package adopted by some port which is used to divide the data flow the COS DSCP mapping form should be adopted accordin...

Page 219: ...orm When user set up ip precedence value of data package adopted by some port which is used to divide the data flow the PREC DSCP mapping form should be adopted according to ip precedence value on the...

Page 220: ...form When user set up DSCP value of data package adopted by some port which is used to divide the data flow the DSCP DSCP mapping form should be adopted according to DSCP value on the data package the...

Page 221: ...ping form After data flow is divided and performance of QoS strategy DSCP QUEUE mapping form is adopted calculate the PRI queue value according to inner DSCP value of data package and put the data pac...

Page 222: ...eration which configuration of operation match is different One or more value can be selected from 0 to 7 for COS operation at least 8 value should be selected and should be divided by blank One or mo...

Page 223: ...dence and DSCP value of COS and ip precedence is from 0 to 7 and value of DSCP is from 0 to 63 PRI queue of data flow can be got from operation sign type value through mapping form and head of data fl...

Page 224: ...strategy has a referenced accounting field in form of the page which is read only and can not be configured The field inform user how many applications is now using the QoS strategy application of usi...

Page 225: ...divided into two one is QoS trust port the other is QoS un trust port QoS trust port can be divided into three types TRUST COS TRUST ip_precedence and TRUST DSCP When user perform QoS configuration fo...

Page 226: ...on which all information in ARP form of switch can be displayed and by which user can perform configuration of static ARP entry or perform deletion of ARP entries When user performs configuration of a...

Page 227: ...figuration 1 IP sub internet configuration page Figure 18 53 shows IP sub internet configuration page by which user can perform configuration of VLAN sub internet interface deletion of VLAN sub intern...

Page 228: ...interface shows active it means the sub internet interface is available When IP address or hidden code is wrong alarm indication of error happen Figure 18 54 Alarm Indication Of Error 2 Static route c...

Page 229: ...dress is wrong error indication will be shown See Figure12 2a inputted purpose address is internet address Next one and interface should be at the same field Figure 18 55 Static Route Configuration Pa...

Page 230: ...th Windows default of 1812 does not need to be amended generally Whether accounting should be startup or not it is startup in default accounting should be start up when authentication accounting is pe...

Page 231: ...18 59 Alarm Indication Errors 2 802 1X configuration page Figure 18 60 shows 802 1x configuration page on which user can set up information about 802 1x it contains Whether startup 802 1x protocol or...

Page 232: ...out timer should not be amended generally Quantity of Max Request should not be amended generally 3 802 1x Port configuration page Figure 18 61 shows 802 1x port configuration page by which user can p...

Page 233: ...Figure 18 60 802 1 X Configuration Page Figure 18 61 802 1 X Port Configuration Page 4 802 1 x user display page...

Page 234: ...1 x user displays page through which user can read status of all the users connected from certain port in this way information of users with authentication can be read all the time Figure 18 62 802 1...

Page 235: ...Appendix A Parameters Of Product Character This part gives a detailed explanation of detailed explanation of working condition for iSpirit 3026 switch...

Page 236: ...1580F Humidity Operation 10 to 90RH Save 5 to 90 RH Altitude Operation maximum height is 3000 meters 10 000 inches Save maximum 4570 meters 15 000 inches Internet media 10Base T UTP Category 3 Catego...

Page 237: ...Appendix B Interface And Reticle Technical Instructions This part gives a detailed explanation of internet port and reticle technical instruction for iSpirit 3026 switch I...

Page 238: ...d on 10 100 1000 Base T port Inside of TD and RD of the port is to be intercrossed The self arrangement between direct reticle and intercrossed reticle can be realized by inner hardware so both connec...

Page 239: ...direct twisted pair pin instruction is shown in FigureB 3 Figure B 3 RJ 45 Twisted Pair Pin Sketch Map 2 International standard of direct twisted pair Connecting manner of direct twisted pair is desc...

Page 240: ...International standard of connecting manner of cross link twisted pair main character of the connecting manner lies in that sequence of connecting lines between SIDE1 and SIDE2 of twisted pair are no...

Reviews: