background image

                                                                                                                       

                  10G Core Routing Switch User Manual 

陈泽科技有限公司

                                                                                                                                                            www.stephen-tele.com

 

 
 

 
 
 
 
 
 
 

 

 

 
 
 

 

STCS6010   

10GE Core Routing Switch Configuration Manual 

VER:1.0.0 

 

 
 
 
 
 
 
 

STEPHEN TECHNOLOGIES CO.,LIMITED 
ALL RIGHTS RESERVED 

Содержание STCS6010

Страница 1: ...10G Core Routing Switch User Manual 陈泽科技有限公司 www stephen tele com STCS6010 10GE Core Routing Switch Configuration Manual VER 1 0 0 STEPHEN TECHNOLOGIES CO LIMITED ALL RIGHTS RESERVED ...

Страница 2: ...ns I General conventions Convention Description Arial Normal paragraphs are in Cailbri Arial Narrow Warnings Cautions Notes and Tips are in Calibri Narrow Boldface Headings are in Boldface Courier New Terminal Display is in Courier New II Command conventions Conventio Description Boldface The keywords of a command line are in Boldface italic Command arguments are in italic Items keywords or argume...

Страница 3: ... A means the three keys should be pressed concurrently Key1 Key2 Press the keys in turn For example Alt A means the two keys should be pressed in turn V Mouse operation Action Description Click Press the left button or right button quickly left button bydefault Double Click Press the left button twice continuously and quickly Drag Press and hold the left button and drag it to a certain position VI...

Страница 4: ... 4 1 Console Connection 12 4 1 Creating user and setting password 12 4 1 Saving configuration file 13 4 1 Restore system to default configuration 13 4 1 Reboot system 13 4 1 Configuring a System Name 13 4 1 System service configuration 14 5 Port Configuration 15 5 1 Ethernet Port Overview 15 5 1 Ethernet Port Configuration 15 5 3 1 Entering interface configuration mode 16 5 3 2 Enabling Disabling ...

Страница 5: ...bleshooting 35 7 1 RIP Configuration 35 7 5 1 Brief Introduction to RIP 35 7 5 2 RIP Configuration 36 7 5 3 Typical RIP Configuration Example 39 7 1 OSPF Configuration 40 7 6 1 OSPF Overview 40 7 6 2 OSPF Configuration 42 7 6 3 Displaying and Debugging OSPF 52 7 6 4 Typical OSPF Configuration Example 53 7 6 5 OSPF Fault Diagnosis and Troubleshooting 53 8 IP Multicast Protocol 54 8 1 IP Multicast O...

Страница 6: ...Interface 81 10 SNMP Configuration 82 10 1 SNMP Overview 82 10 1 SNMP Versions and Supported MIB 82 10 1 Configure SNMP 84 10 4 1 Setting Community Name 84 10 4 2 Setting the Destination Address of Trap and Trap Parameters 84 10 1 SNMP Configuration Example 85 11 File System Management 85 11 1 Update the software image of MCU board 85 11 1 Update the software image of LPU board 86 ...

Страница 7: ... redundancy the remaining eight accommodate LPU boards which can be hybrid STCS6010 10GE Core Routing Switch supports the following services Internet broadband access MAN enterprise campus networking Providing multicast service and multicast routing and supporting multicast audio and video services 1 2 Function Features Specification STCS6010 Protocol IEEE 802 1D IEEE 802 3 IEEE 802 3u IEEE 802 3x...

Страница 8: ...eb Portal Support VRRP Support Defeat DoS Attack Support Management protocol SNMPv1 v2c v3 Web JAVA CLI Telnet Console RMON 1 2 3 9 cluster management SSH SNTP Syslog Working Environment Operation temperature 20 50 C Storage temperature 40 70 C Humidity 10 90 RH Power supply AC 100V 240V 47 63Hz DC 60V 48V Dimension mm L W H 436 438 906 Weight Kg 40Kg Power 240W ...

Страница 9: ...inal to the Console port of the switch with the Console cable Figure 2 1 Setting up the local configuration environment via the Console port Step 2 Run terminal emulator such as Terminal on Windows 3X or the Hyper Terminal on Windows 9X on the Computer Set the terminal communication parameters as follows Set the baud rate to 19200 databit to 8 parity check to none stopbit to 1 flow control to none...

Страница 10: ...10G Core Routing Switch User Manual 陈泽科技有限公司 4 www stephen tele com Figure 2 3 Configuring the port for connection Figure 2 4 Setting communication parameters ...

Страница 11: ... of a VLAN interface for an switch via Console port and added the port to this VLAN using port command in VLAN view you can telnet this switch and configure it Step 1 Authenticate the Telnet user via the Console port before the user logs in by Telnet Step 2 To set up the configuration environment connect the Ethernet port of the PC to that of the switch via the LAN Figure 2 5 Setting up configurat...

Страница 12: ...onnecting a PC to the Switch through Telnet Step 3 Perform the following operations on the Telnet Client Step 4 Enter the preset login password and you will see the prompt such switch Step 5 Use the corresponding commands to configure the switch or view it running state Enter to get the immediate help For details of specific commands refer to the following chapters 3 Command Line Interface 3 1 Com...

Страница 13: ...me and password exit privileged EXEC mode Show the basic information about operation and statistics Switch Enter enable and right password Exit returns to normal EXEC mode Global configuration mode Configure system parameters Switch config Key in config in user user configure mode Exit returns to user configure mode interface configure mode Configure interface parameters Switch config if Key in In...

Страница 14: ...things logout Disconnect from switch and quit no Negate a command or set its defaults ping Ping command to test if the net is correct quit Disconnect from switch and quit reboot Reboot the switch remove Remove system configuration sendmsg Send message to online user show Show running system information telnet Telnet to other host or switch terminal Set terminal line parameters upload Upload file f...

Страница 15: ...nitials in the command will be listed switch show ve version Display SPROS version 6 Input the first letters of a keyword of a command and press Tab key If no other keywords are headed by this letters then this unique keyword will be displayed automatically 3 3 2 Displaying Characteristics of Command Line Command line interface provides the following display characteristics For users convenience t...

Страница 16: ...mmand Down Down cursor key or Ctrl N Retrieve the next history command if there is any 3 3 4 Common Command Line Error Messages All the input commands by users can be correctly executed if they have passed the grammar check Otherwise error messages will be reported to users The common error messages are listed in the following table Table 3 4 Common command line error messages Error messages Cause...

Страница 17: ...rsor key or Ctrl F Move the cursor a character forward Up cursor key or Ctrl P Down cursor key or Ctrl N Retrieve the history command Tab Press Tab after typing the incomplete key word and the system will execute the partial help If the key word matching the typed one is unique the system will replace the typed one with the complete key word and display it in a new line if there is not a matched k...

Страница 18: ...mpt direct press enter The default password not set 4 The session is opened and the CLI displays the switch prompt indicating you have access at the Normal Exec level 5 At the switch prompt enter enable 6 At the Password prompt direct press enter The default password not set 7 The session is opened and the CLI displays the switch prompt indicating you have access at the Privileged Exec level 4 2 C...

Страница 19: ...mmand Purpose Step 1 Copy running configuration startup configuration Save your entries in the configuration file 4 4 Restore system to default configuration You can use earse command to resume the startup configuration to default configuration after that you must reboot the system Beginning in privileged EXEC mode follow these steps to restore system to default configuration Command Purpose Step ...

Страница 20: ...ation mode Step 2 service telnet enable disable Enabling disabling telnet service Step 3 show services Verify your entries Step 4 Copy running config startup config Optional Save your entries in the configuration file 4 8 Setting system Clock manually If you have an outside source on the network that provides time services such as an NTP server you do not need to manually set the system clock Begi...

Страница 21: ...s to disable screen display separation function Value range is 0 to 512 Step 3 Copy running config startup config Optional Save your entries in the configuration file 5 Port Configuration 5 1 Ethernet Port Overview STCS6010 Series Core Routing Switches support these LPU boards 24GTX 24GFX 2XP The Ethernet ports of STCS6010series switches have the following features 2XP provides two 10GE optical po...

Страница 22: ...he switch for example gigaethernet 1 1 Procedures for Configuring Interfaces These general instructions apply to all interface configuration processes Step 1 Enter the configure terminal command at the privileged EXEC prompt Switch configure terminal Enter configuration commands one per line End with CNTL Z Switch config Step 2 Enter the interface global configuration command Identify the interfac...

Страница 23: ...FP module slots supporting Gigabit SFP modules You cannot configure speed or duplex mode on 10 Gigabit module ports these ports operate only at 10 000 Mbps and in full duplex mode You can configure interface speed on Gigabit Ethernet 10 100 1000 Mbps ports You can configure Gigabit Ethernet ports to full duplex mode or to autonegotiate you cannot configure half duplex mode on Gigabit Ethernet port...

Страница 24: ...ports with these exceptions If a 1000BASE T SFP module is inserted you can configure duplex to auto or full Step 5 exit Return to global configuration mode Step 6 exit Return to privileged EXEC mode Step 7 show Interface interface_id Verify your entries Step 8 Copy running config startup config Optional Save your entries in the configuration file Use the no speed and no duplex interface configurat...

Страница 25: ...rify the description Switch config terminal Switch config interface gigabitethernet1 1 Switch config if description Connects to Marketing 5 2 5 Enabling Disabling Flow Control for the Ethernet Port Flow control enables connected Ethernet ports to control traffic rates during congestion by allowing congested nodes to pause link operation at the other end If one port experiences congestion and canno...

Страница 26: ...interface configuration mode for the physical interface to be configured Step 3 storm control broadcast value value Enable broadcast Suppression Packets indicate packet number per second Step 4 exit Return to global configuration mode Step 5 exit Return to privileged EXEC mode Step 6 show Interface interface_id Verify your entries Step 7 Copy running config startup config Optional Save your entrie...

Страница 27: ...d on the port The smaller the packet number is the smaller the dlf traffic is allowed Beginning in privileged EXEC mode follow these steps to Set the Ethernet Port dlf Suppression Command Purpose Step 1 config terminal Enter global configuration mode Step 2 Interface interface_id Enter interface configuration mode for the physical interface to be configured Step 3 storm control dlf multicast value...

Страница 28: ...entered in step 2 Step 5 exit Return to privileged EXEC mode Step 6 show mirror all Verify your entries Step 7 Copy running config startup config Optional Save your entries in the configuration file To delete a MIRROR SPAN session use the no monitor session session_number global configuration command To remove a source or destination port from the MIRROR session use the no monitor session session_...

Страница 29: ... to belong to a VLAN by assigning a membership mode that specifies the kind of traffic the port carries and the number of VLANs to which it can belong Static access A static access port can belong to one VLAN and is manually assigned to that VLAN Trunk IEEE 802 1Q A trunk port is a member of all VLANs by default but membership can be limited by configuring the allowed VLAN list 6 2 Configuring VLA...

Страница 30: ...e access Switch config if switchport access vlan 2 6 2 3 Configuring VLAN Trunks These sections describe how VLAN trunks function on the switch Trunking Overview A trunk is a point to point link between one or more Ethernet switch interfaces and another networking device such as a router or a switch Ethernet trunks carry the traffic of multiple VLANs over a single link and you can extend the VLANs...

Страница 31: ...hport trunk interface configuration command To disable trunking use the switchport mode access interface configuration command to configure the port as a static access port This example shows how to configure a port as an 802 1Q trunk The example assumes that the neighbor interface is configured to support 802 1Q trunking Switch configure terminal Switch config interface gigabitethernet 1 2 Switch...

Страница 32: ...that is not put into use after starting up The IP address with network number as 0 indicates the current network and its network can be cited by the router without knowing its network number Network ID with the format of 127 X Y Z is reserved for self loop test and the packets sent to this address will not be output to the line The packets are processed internally and regarded as input packets B 1...

Страница 33: ...0 0 and 255 255 255 0 respectively The mask can be used to divide a Class A network containing more than 16 000 000 hosts or a Class B network containing more than 60 000 hosts into multiple small networks Each small network is called a subnet For example for the Class B network address 138 38 0 0 the mask 255 255 224 0 can be used to divide the network into 8 subnets 138 38 0 0 138 38 32 0 138 38...

Страница 34: ...pen Shortest Path First protocol OSPF 7 1 Introduction to IP Route and Routing Table 7 1 1 IP Route and Route Segment Routers are implemented for route selection in the Internet A router works in the following way It selects an appropriate path through a network according to the destination address of its received packet and forwards the packet to the next router It works in this way hop by hop an...

Страница 35: ... the following key entries Destination address It is used to identify the destination IP address or thedestination network of IP packet which is 32 bits in length Network mask It is made up of several consecutive 1 s which can be expressed either in the dotted decimal format or by the number of the consecutive 1 s in the mask Combining with the destination address it is used to identify the networ...

Страница 36: ...port the configuration of a series of dynamic routing protocols such as RIP OSPF as well as the static routes The static routes configured by the user are managed together with the dynamic routes as detected by the routing protocol The static routes and the routes learned or configured by different routing protocols can also be shared with each other 7 2 1 Routing protocols and the preferences of ...

Страница 37: ... is ensured in terms of routing protocols II Route backup Route backup Support route backup When main route is in failure the system will automatically switch to a backup route to improve the network reliability In order to achieve route backup the user can configure multiple routes to the same destination according to actual situation One of the routes has the highest precedence and is called as ...

Страница 38: ...ting table the router will select the default route to forward this packet If there is no default route and the destination address of the packet fails in matching any entry in the routing table this packet will be discarded and an Internet Control Message Protocol ICMP packet will be sent to the originating host to inform that the destination host or network is unreachable Default route is very u...

Страница 39: ... the link layer find the corresponding link layer address and then forward the packet according to this address Configuring a default route Perform the following configurations in global configuration mode Beginning in privileged EXEC mode follow these steps to configure a default route Command Purpose Step 1 config terminal Enter global configuration mode Step 2 ip route 0 0 0 0 0 0 0 0 nexthopad...

Страница 40: ...0 0 1 1 2 2 Setting switch B VLAN and specifying IP address for VLAN switchB config interface vlan 2 switchB config if ipaddress 1 1 3 2 255 255 255 0 switchB config exit switchB config interface vlan 3 switchB config if ipaddress 1 1 4 1 255 255 255 0 Setting default route for switch B switchB config ip route 0 0 0 0 0 0 0 0 1 1 3 1 Setting switch C VLAN and specifying IP address for VLAN switchC...

Страница 41: ...ng refreshing message is received from one network neighbor in 300 seconds RIP will finally remove the routes of the network neighbor from the routing table To improve the performances and avoid route loop RIP supports Split Horizon Poison Reverse and allows importing the routes discovered by other routing protocols Each router running RIP manages a route database which contains routing entries to...

Страница 42: ...s To configure RIP you enable RIP routing for a network and optionally configure other parameters Beginning in privileged EXEC mode follow these steps to enable and configure RIP Command Purpose Step 1 config terminal Enter global configuration mode Step 2 router rip Enable a RIP routing process and enter router configuration mode Step 3 network A B C D M Associate a network with a RIP routing pro...

Страница 43: ...ast is adopted for transmitting packets In RIP 2 the multicast address is 224 0 0 9 The advantage of transmitting packets in the multicast mode is that the hosts not operating RIP in the same network can avoid receiving RIP broadcast packets In addition this mode can also make the hosts running RIP 1 avoid incorrectly receiving and processing the routes with subnet mask in RIP 2 When an interface ...

Страница 44: ...Copy running config startup config Optional Save your entries in the configuration file To restore clear text authentication use the no ip rip authentication mode interface configuration command To prevent authentication use the no ip rip authentication string interface configuration command Setting Additional Routing Metric Additional routing metric is the input or output routing metric added to ...

Страница 45: ...witch A and Switch B are connected via Ethernet 110 11 2 0 Correctly configure RIP to ensure that Switch C Switch A and Switch B can interconnect Networking diagram Figure 12 4 RIP configuration networking Configuration procedure Note The following configuration only shows the operations related to RIP Before performing the following configuration please make sure the Ethernet link layer can work ...

Страница 46: ... four level routing hierarchy It prioritizes the routes to be intra area inter area external type 1 and external type 2 routes Authentication It supports the interface based packet authentication so as to guarantee the security of the route calculation Multicast transmission Support multicast address to receive and send packets Process of OSPF Route Calculation The routing calculation process of t...

Страница 47: ...s to the HEAD of an LSA which can be used to uniquely identify the LSA Such reduces the traffic size transmitted between the routers since the HEAD of a LSA only occupies a small portion of the overall LSA traffic With the HEAD the peer router can judge whether it already has had the LSA Link State Request LSR Packet After exchanging the DD packets the two routers know which LSAs of the peer route...

Страница 48: ...mitted in the network This will lower the network bandwidth utility In addition each change will cause all the routes on the network to recompute the route OSPF solves the above problem by partition an AS into different areas Areas logically group the routers The borders of areas are formed by routers Thus some routers may belong to different areas A router connects the backbone area and a non bac...

Страница 49: ...2 router ospf Enable OSPF routing and enter router configuration mode To terminate an OSPF routing process use the no router ospf global configuration command Specifying interface OSPF further divides the AS into different areas An area logically groups the routers Some routers belong to different areas such routers are called ABRs but one segment can only belong to an area In other words you must...

Страница 50: ...ate the cost according to the baud rate on the current interface Beginning in privileged EXEC mode follow these steps to configure the cost for sending packets on an interface Command Purpose Step 1 config terminal Enter global configuration mode Step 2 Interface ifName Enter interface configuration mode Step3 ip ospf cost value Configure the cost for sending packets on Interface Step 4 exit Retur...

Страница 51: ...iod of time it will not exert any influence upon the route calculation But please note The DR on the network is not necessarily the router with the highest priority Likewise the BDR is not necessarily the router with the second highest priority If a new router is added after DR and BDR election it is impossible for the router to become the DR even if it has the highest priority DR is based on the ...

Страница 52: ... set a dead timer for the neighboring routers Beginning in privileged EXEC mode follow these steps to set a dead timer for the neighboring routers Command Purpose Step 1 config terminal Enter global configuration mode Step 2 Interface ifName Enter interface configuration mode Step 3 ip ospf dead interval seconds Configure a dead timer for the neighboring routers By default the dead interval for th...

Страница 53: ...e acknowledgement packet within the retransmit it will retransmit this LSA to the neighbor The value of retransmit is user configurable Beginning in privileged EXEC mode follow these steps to set an Interval for LSA Retransmission between Neighboring Routers Command Purpose Step 1 config terminal Enter global configuration mode Step 2 Interface ifName Enter interface configuration mode Step 3 ip o...

Страница 54: ...me special LSA areas in which the ABRs do not propagate the learned external routes of the AS In these areas the routing table sizes of routers and the routing traffic are significantly reduced The STUB area is an optional configuration attribute but not every area conforms to the configuration condition Generally STUB areas located at the AS boundaries are those non backbone areas with only one A...

Страница 55: ...y command to summarize these segments into one segment Thus the ABR only needs to send an aggregate LSA and all the LSAs in the range of the aggregate segment specified by the command will not be transmitted separately Once the aggregate segment of a certain network is added to the area all the internal routes of the IP addresses in the range of the aggregate segment will no longer be separately a...

Страница 56: ... ends Therefore similar to the physical interfaces you can also configure various interface parameters on this link such as hello timer The logic channel means that the multiple routers running OSPF between two ABRs only take the role of packet forwarding the destination addresses of the protocol packets are not these routers so these packets are transparent for them and the routers forward them a...

Страница 57: ...Activating simple text authentication Step 5 ip ospf message digest key key_id md5 key Optional Specify the key id and key for OSPF MD5 authentication Step 6 Ip ospf authentication message digest Activating simple text authentication Step 7 exit Return to global configuration mode Step 8 exit Return to privileged EXEC mode Step 9 show ip ospf interface vlan id Verify your entries Step 10 Copy runn...

Страница 58: ... packets of the interface will be blocked and no neighboring relationship can be established on the interface Thereby the capability for OSPF to adapt to the networking can be enhanced which will hence reduce the consumption of system resources On a switch this command can disable enable the specified VLAN interface to send OSPF packets Displaying and Debugging OSPF After the above configuration e...

Страница 59: ... the following procedure Troubleshooting locally Check whether the protocol between two directly connected routers is in normal operation The normal sign is the peer state machine between the two routers reaches the FULL state Note On a broadcast or NBMA network if the interfaces for two routers are in DROther state the peer state machine for the two routers are in 2 way state instead of FULL stat...

Страница 60: ... to check the following configurations If more than two areas are configured on a router at least one area should be configured as the backbone area As shown in the following figure RTA and RTD are configured to belong to only one area whereas RTB area0 and area1 and RTC area1 and area 2 are configured to belong to two areas In which RTB also belongs to area0 which is compliant with the requiremen...

Страница 61: ...st mode is incapable of massive transmission II Broadcast In broadcast mode every user on the network receives the information regardless of their needs See Figure 13 2 Data transmission in broadcast mode Figure Data transmission in broadcast mode Suppose the Users B D and E need the information the information source Server broadcasts the information through the router User A and User C can also ...

Страница 62: ...nformation transmission are called multicast routers Members of a multicast group can scatter around the network the multicast group therefore has no geographical limitation It should be noted that a multicast source does not necessarily belong to a multicast group It sends data to multicast groups but is not necessarily a receiver Multiple sources can send packets to a multicast group simultaneou...

Страница 63: ...ission a packet is transmitted hop by hop from the source address to the destination address However in IP multicast environment a packet has more than one destination address or a group of addresses All the information receivers are added to a group Once a receiver joins the group the data for this group of addresses start flowing to this receiver All members in the group can receive the packets ...

Страница 64: ... 6 OSPF DR 224 0 0 7 ST routers 224 0 0 8 ST hosts 224 0 0 9 RIP 2 routers 224 0 0 10 IGRP routers 224 0 0 11 Active agents 224 0 0 12 DHCP server Relay agent 224 0 0 13 All PIM routers 224 0 0 14 RSVP encapsulation 224 0 0 15 All CBT routers 224 0 0 16 Specified SBM 224 0 0 17 All SBMS 224 0 0 18 VRRP II Ethernet Multicast MAC Addresses When a unicast IP packet is transmitted on the Ethernet the ...

Страница 65: ...AC address and the other five bits are lost This may results in that 32 IP addresses are mapped to the same MAC address IP Multicast Protocols Multicast involves multicast group management protocols and multicast routing protocols Their application positions are shown in follow Figure Application positions of multicast related protocols Figure Application positions of multicast related protocols I...

Страница 66: ...to perform multicast forwarding and is known as Reverse Path Forwarding RPF check A multicast router uses the source address of a received multicast packet to query the unicast routing table or the independent multicast routing table to determine that the receiving interface is on the shortest path from the receiving station to the source If a source tree is used the source address is the address ...

Страница 67: ...ets are not broadcast on Layer 2 See the following figure Figure Multicast packet transmission when IGMP Snooping runs Implement IGMP Snooping I Related concepts of IGMP Snooping To facilitate the description this section first introduces some related switch concepts of IGMP Snooping Router Port The port of the switch directly connected to the multicast router ...

Страница 68: ... has not received any IGMP report message before the timer times out it will remove the port from the multicast member ports II Implement Layer 2 multicast with IGMP Snooping The Ethernet switch runs IGMP Snooping to listen to the IGMP messages and map the host and its ports to the corresponding multicast group address To implement IGMP Snooping the Layer 2 Ethernet switch processes different IGMP...

Страница 69: ...tch will only reset the aging timer of the port 4 IGMP leave message Transmitted from the multicast group member to the multicast router to notify that a router host left the multicast group When received a leave message of an IP multicast group the Ethernet switch transmits the specific query message concerning that group to the port received the message in order to check if the host still has so...

Страница 70: ...fig Optional Save your entries in the configuration file By default the aging time of the multicast member is 300 seconds Configuring a Multicast Router Port To add a multicast router port add a static connection to a multicast router use the igmp snooping mrouter vlan global configuration command on the switch Beginning in privileged EXEC mode follow these steps to configure a multicast router po...

Страница 71: ...ries in the configuration file To remove the Layer 2 port from the multicast group use the no igmp snooping static vlan vlan id ip address interface interface id global configuration command Enabling IGMP Immediate Leave When you enable IGMP Immediate Leave the switch immediately removes a port when it detects an IGMP Version 2 leave message on that port You should only use the Immediate Leave fea...

Страница 72: ...t be implemented on the switch Troubleshooting 1 IGMP Snooping is disabled Input the display current configuration command to display the status of IGMP Snooping If the switch disabled IGMP Snooping check whether the IGMP Snooping is not nabled globally or it is not enabled in the VLAN If it is not enabled globally first nput the igmp snooping enable command in system view and then in VLAN iew If ...

Страница 73: ...arn whether receivers i e group members of a multicast group are present on the subnet connected to each interface A host only needs to keep which multicast groups it has joined IGMP is not symmetric on hosts and routers Hosts need to respond to IGMP query messages from the multicast router i e report the group membership to the router The router needs to send membership query messages periodicall...

Страница 74: ...nts the hosts of members of other multicast groups from sending response messages IV Max response time The Max Response Time is added in IGMP Version 2 It is used to dynamically adjust the allowed maximum time for a host to response to the membership query message IGMP Configuration 1 IGMP basic configuration includes Enabling multicast routing Enabling IGMP on an interface 2 IGMP advanced configu...

Страница 75: ...nterface Command Purpose Step 1 config terminal Enter global configuration mode Step 2 ip pim interface interface id sparse mode enable Enable IP multicast routing Step 3 exit Return to privileged EXEC mode Step 4 show ip igmp interface interface id Verify your entries Step 5 write Optional Save your entries in the configuration file By default multicast is disabled To disable multicast routing us...

Страница 76: ...0 seconds Seconds is range from 1 to 65535 Step 3 exit Return to privileged EXEC mode Step 4 write Optional Save your entries in the configuration file When there are multiple multicast routers on a network segment the querier is responsible for sending IGMP query messages to all hosts on the LAN Configuring the Interval of Querying IGMP Packets On the shared network it is the query router querier...

Страница 77: ...y default the switch waits twice the query interval controlled by the ip igmp query interval interface configuration command After that time if the switch has received no queries it becomes the querier You can configure the query interval by entering the show ip igmp interface interface id privileged EXEC command Beginning in privileged EXEC mode follow these steps to change the IGMP query timeout...

Страница 78: ...iguration mode Step 2 ip igmp interface interface id join group group address Configure a router to join specified multicast group By default a router joins no multicast group Step 3 exit Return to privileged EXEC mode Step 4 write Optional Save your entries in the configuration file To leave a group use ip igmp interface interface id leave group group address global configuration command Configur...

Страница 79: ...idth occupied by data packets and control packets and reducing the process overhead of the router Multicast data flows along the shared tree to the network segments the multicast group members are on When the data traffic is sufficient the multicast data flow can switch over to the SPT Shortest Path Tree rooted on the source to reduce network delay PIM SM does not depend on the specified unicast r...

Страница 80: ...al All multicast routers calculate the RPs corresponding to multicast groups according to the same algorithm after receiving the C RP messages that the BSR advertises It should be noted that one RP can serve multiple multicast groups or all multicast groups Each multicast group can only be uniquely correspondent to one RP at a time rather than multiple RPs II Configuring BSRs The BSR is the manage...

Страница 81: ...ute entries from PIM routing table Clearing PIM neighbor It should be noted that at least one router in an entire PIM SM domain should be configured with Candidate RPs and Candidate BSRs Enabling Multicast Enabling PIM SM This configuration can be effective only after multicast is enabled Beginning in privileged EXEC mode follow these steps to enable PIM SM Command Purpose Step 1 config terminal E...

Страница 82: ...ollow these steps to configure Candidate BSRs Command Purpose Step 1 config terminal Enter global configuration mode Step 2 ip pim bsr candidate interface id priority priority Configure a candidate BSR By default no BSR is set The default priority is 0 Priority range is 0 to 255 Step 3 exit Return to privileged EXEC mode Step 4 show ip pim bsr router Verify your entries Step 5 write Optional Save ...

Страница 83: ...t is unnecessary to enable PIM on the interface that functions as static RP When the RP elected from BSR mechanism is valid static RP does not work Modifying the PIM Router Query Message Interval PIM routers and multilayer switches send PIM router query messages to find which device will be the DR for each LAN segment subnet The DR is responsible for sending IGMP host query messages to all hosts o...

Страница 84: ...for packets of different size Matching order involves in matching an ACL configuring ACL The ACL configuration tasks include Define ACL Applying an ACL to an Interface You are recommended to run the configuration tasks in order that is first define ACL and last Applying an ACL to an Interface Defining ACL The switch supports several types of ACLs which are described in this section Follow these st...

Страница 85: ...address and net mask of 0 0 0 0 255 255 255 255 You do not need to enter a net mask Step 4 show access list access list number Verify your entries Step 5 Copy running config startup config Optional Save your entries in the configuration file To delete a ACL use no access list access list number global configuration command To delete a standard ACL rule use no rule rule_id standard ACL configuratio...

Страница 86: ...s the number of the network or host from which the packet is sent The dip is the network or host number to which the packet is sent Sip and dip can be specified as The 32 bit quantity in dotted decimal format The keyword any for 0 0 0 0 255 255 255 255 any host The other keywords are optional and have these meanings precedence Enter to match packets with a precedence level specified as a number fr...

Страница 87: ...st reset syn synchronize or urg urgent Step 2c rule rule_id deny permit udp sip ip address net mask dip ip address net mask sport port dsport port match dscp priority precedence priority tos priority set dscp priority precedence priority tos priority Optional Define an extended UDP access list rule and the access conditions Enter udp for the User Datagram Protocol The UDP parameters are the same a...

Страница 88: ...ling mechanism and provides the most basic function set It is most applicable to the small sized fast speed and low cost environment It only requires the unverified transport layer protocol UDP and is thus widely supported by many other products In terms of structure SNMP can be divided into two parts namely Network Management Station and Agent Network Management Station is the workstation for run...

Страница 89: ...e uniquely specified by a string of numbers 1 2 1 1 The number string is the Object Identifier of the managed object The current SNMP Agent of Ethernet switch supports SNMP V1 V2C and V3 The MIBs supported are listed in the following table Table 19 1 MIBs supported by the Ethernet Switch MIB attribute MIB content References Public MIB MIB II based on TCP IP network device RFC1213 BRIDGE MIB RFC149...

Страница 90: ...mand Purpose Step 1 config terminal Enter global configuration mode Step 2 snmp community readonly readwrite string Set community string Step 3 exit Return to privileged EXEC mode Step 4 show snmp community string Verify your entries Step 5 Copy running config startup config Optional Save your entries in the configuration file Setting the Destination Address of Trap and Trap Parameters You can use...

Страница 91: ...e images include the software image of MCU board and LPU board This system support FTP client so you must prepare a FTP server for update the software image Update the software image of MCU board Updating the software image of MCU board please refer to follow steps Step 1 Please prepare FTP server and connect the FTP srever s Ethernet port to the MCU board s aux port Setting the ftp username passw...

Страница 92: ...th the Console cable And run terminal emulator such as Terminal on Windows 3X or the Hyper Terminal on Windows 9X on the Computer Set the terminal communication parameters as follows Set the baud rate to 19200 databit to 8 parity check to none stopbit to 1 flow control to none and select the terminal type as VT100 Step 3 Setting aux port ip address After you login the system by default the login u...

Страница 93: ...the products described in this document The information provided by this document is believed to be accurate and reliable to the publication date of this document However Stephen Technologies Co Limited assumes no responsibility for any errors in this document Furthermore Stephen Technologies Co Limited assumes no responsibility for the use or misuse of the information in this document and for any...

Отзывы: