Manual 4000 Series Command Line
Manual 4000 Series Command Line
Tel: 0086-10-82894971/2/3/4
Fax: 0086-10-82894971-8008
Email: [email protected]
Website: www.huafeitech.com
www.huafeitech.com
Contents
CHAPTER 1 MANAGEMENT .......................................................................................................... 5
1.1. MANAGEMENT METHOD ..................................................................................................... 5
1.1.1. Out of Band Management .............................................................................................. 5
1.1.2. In-band Management ..................................................................................................... 8
1.2. MANAGEMENT INTERFACE ............................................................................................... 11
1.2.1. CLI Interface ................................................................................................................ 11
1.2.2. WEB Interface ............................................................................................................. 15
CHAPTER 2 BASIC CONFIGURATION........................................................................................ 16
2.1. BASIC CONFIGURATION COMMAND ................................................................................... 16
2.1.1. config ........................................................................................................................... 16
2.1.2. add user ........................................................................................................................ 16
2.1.3. exit ............................................................................................................................... 17
2.1.4. help .............................................................................................................................. 17
2.1.5. hostname ...................................................................................................................... 17
2.1.6. Reload cold .................................................................................................................. 18
2.1.7. reload default ............................................................................................................... 18
2.1.8. copy.............................................................................................................................. 18
2.2. MAINTENANCE AND COMMISSIONING COMMANDS ........................................................... 19
2.2.1. ping .............................................................................................................................. 19
2.2.2. show ............................................................................................................................. 19
2.3. TELNET ............................................................................................................................. 20
2.3.1. Telnet Introduction ....................................................................................................... 20
2.3.2. Telnet Task sequence .................................................................................................... 21
2.4. CONFIGURE THE IP ADDRESS OF THE SWITCH ................................................................... 21
2.4.1. Configure the IP address task sequence of the switch .................................................. 22
2.4.2. Configuring the IP Address of the Switch .................................................................... 22
2.5. SNMP CONFIGURATION .................................................................................................... 23
2.5.1. SNMP Introduction ...................................................................................................... 23
2.5.2. MIB Introduction ......................................................................................................... 25
2.5.3. RMON Introduction ..................................................................................................... 26
2.5.4. SNMP configuration .................................................................................................... 26
2.5.5. SNMP Typical configuration example ......................................................................... 29
2.6. ALARM .............................................................................................................................. 30
2.6.1. Introduction .................................................................................................................. 30
2.6.2. Alarm task sequence .................................................................................................... 31
2.7. LOG MANAGEMENT ........................................................................................................... 31
2.7.1. Introduction .................................................................................................................. 31
2.7.2. Log management task sequence ................................................................................... 31
CHAPTER 3 PORT CONFIGURATION ......................................................................................... 32
3.1. PORT INTRODUCTION ........................................................................................................ 32
ii
www.huafeitech.com
3.2. PORT CONFIGURATION ...................................................................................................... 33
3.2.1. Ethernet port configuration .......................................................................................... 33
3.2.2. Mirror configuration .................................................................................................... 35
3.3. PORT TROUBLESHOOTING HELP ........................................................................................ 38
3.3.1. Monitoring and debugging commands......................................................................... 38
3.3.2. Port troubleshooting help ............................................................................................. 39
CHAPTER 4 MAC ADDRESS TABLE CONFIGURATION .......................................................... 40
4.1. MAC ADDRESS TABLE INTRODUCTION ............................................................................ 40
4.1.1. MAC address table to obtain ........................................................................................ 40
4.1.2. Forward or filter ........................................................................................................... 41
4.2. MAC ADDRESS TABLE CONFIGURATION ........................................................................... 42
4.2.1. mac address-table aging-time....................................................................................... 42
4.2.2. mac address-table ......................................................................................................... 43
4.3. MAC ADDRESS LEARNING CONFIGURATION ..................................................................... 43
4.3.1. mac address-table learning ........................................................................................... 43
4.3.2. mac address-table learning vlan ................................................................................... 44
4.4. TROUBLESHOOTING HELP ................................................................................................. 44
4.4.1. Monitoring and debugging commands......................................................................... 44
4.4.2. Troubleshooting help ................................................................................................... 44
CHAPTER 5 VLAN CONFIGURATION ........................................................................................ 47
5.1. VLAN INTRODUCTION ..................................................................................................... 47
5.2. VLAN CONFIGURATION ................................................................................................... 48
5.2.1. VLAN configuration task sequence ............................................................................. 48
5.2.2. VLAN configuration command ................................................................................... 49
5.2.3. VLAN typical application ............................................................................................ 52
5.3. VLAN TROUBLESHOOTING HELP ..................................................................................... 53
5.3.1. Monitoring and debugging information ....................................................................... 53
CHAPTER 6 IGMP SNOOPING CONFIGURATION .................................................................... 55
6.1. IGMP SNOOPING INTRODUCTION ..................................................................................... 55
6.2. IGMP SNOOPING CONFIGURATION ................................................................................... 55
6.2.1. IGMP Snooping Configuration tasks ........................................................................... 55
6.2.2. IGMP Snooping configuration command .................................................................... 56
6.3. IGMP SNOOPING EXAMPLE .............................................................................................. 56
6.4. IGMP SNOOPING TROUBLESHOOTING HELP...................................................................... 58
6.4.1. Monitoring and debugging commands......................................................................... 58
CHAPTER 7 ACL CONFIGURATION............................................................................................ 59
7.1. ACL OVERVIEW ................................................................................................................ 59
7.1.1. Access-list .................................................................................................................... 59
7.1.2. Access-list Action......................................................................................................... 59
7.2. ACL CONFIGURATION ....................................................................................................... 59
7.2.1. ACL Configuring task sequences ................................................................................. 59
7.2.2. ACL Setting Demand ................................................................................................... 62
iii
www.huafeitech.com
CHAPTER 8 QOS CONFIGURATION ........................................................................................... 67
8.1. QOS OVERVIEW ................................................................................................................ 67
8.1.1. QoS term ...................................................................................................................... 67
8.2. QOS CONFIGURATION ....................................................................................................... 68
8.2.1. QoS Configure the task sequence ................................................................................ 68
8.2.2. QoS Configuration command ...................................................................................... 70
8.3. QOS EXAMPLE .................................................................................................................. 75
CHAPTER 9 RSTP CONFIGURATION .......................................................................................... 76
9.1. INTRODUCTION ................................................................................................................. 76
9.2. BASIC CONCEPT ................................................................................................................ 76
9.3. BPDU CONFIGURATION MESSAGE .................................................................................... 77
9.4. IMPLEMENTATION PROCESS............................................................................................... 77
9.5. RSTP CONFIGURATION ..................................................................................................... 78
9.5.1. RSTP configuration task .............................................................................................. 78
9.6. CONFIGURATION EXAMPLE ............................................................................................... 81
CHAPTER 10 HF-RING CONFIGURATION ................................................................................. 83
10.1. INTRODUCTION ............................................................................................................... 83
10.2. CONCEPT......................................................................................................................... 83
10.3. IMPLEMENTATION ........................................................................................................... 83
10.4. HF-RING CONFIGURATION .............................................................................................. 85
10.4.1. HF-Ring configuration task ....................................................................................... 85
10.4.2. Precautions ................................................................................................................. 86
Chapter 11 ERPS( Ethernet Ring Protection Switching) ...................................................... 87
11.1. ERPS FUNCTION CONFIGURATION .................................................................................. 87
11.2. ERPS CONFIGURATION COMMAND ................................................................................. 89
CHAPTER 12 POE(Power Over Ethernet) .............................................................................. 91
12.1. POE FUNCTION CONFIGURATION .................................................................................... 91
12.2. POE CONFIGURATION COMMAND ................................................................................... 92
iv
www.huafeitech.com
Chapter 1 Management
After the user purchases the switch, the switch needs to be configured to manage the network.
To provide users with two management methods: out of band management and in-band
management.
As shown in Figure 1-1, connect the PC's serial port (RS-232 interface) and the switch
through serial cable. The following is a description of the device used in the connection:
Name Specification
PC There are intact keyboard and RS-232 serial port, and install the
terminal emulation program
Serial line One end connected with the PC's RS-232 serial port; the other end
is connected with the console port of the switch.
www.huafeitech.com
Ethernet Switch There is a good console port.
Open the Windows system comes with HyperTerminal. The following is an example of
opening Windows XP with HyperTerminal.
1. Click on the HyperTerminal:
3. In the "connect using", select the PC using the RS-232 serial port, such as the connection is
the COM 4, then select the COM 4, click “ OK” .
www.huafeitech.com
Figure 1-2 Open the HyperTerminal 3
4. The COM4 attribute, the baud rate selects "115200", the data bit selects "8", the parity selects
"no", the stop bit selects "1", the flow control selects "no", click “OK”.
5. Appears super terminal configuration interface, enter the default user name: admin,
www.huafeitech.com
password:123
In-band management (In-band management), that is, through the Telnet program to log on to the
switch, or SSH configuration management of the switch. The switch provides in-band
management that allows some devices connected to the switch to have the capability to manage
the switch. When the switch configuration changes, resulting in in-band management failure, you
can use out-of-band management of the switch configuration management
www.huafeitech.com
First: Configure the IP address.
First configure the IP address of the host to be in the same network segment as the VLAN 1
interface IP address of the switch. If the IP address of VLAN1 interface on the switch is
192.168.1.5, you can set the IP address of the host to 192.168.1.100. On the host, execute the
"ping 192.168.1.5" command to show whether the ping succeeds; if the ping fails, check the
cause.
The following describes the IP address configuration commands of the VLAN 1 interface on
the switch. Before configuring in-band management, you must configure the IP address of the
switch through outbound management or console port. The configuration commands are as
follows:
# configure terminal
(config)# interface vlan 1
(config-if-vlan)# ip address 192.168.1.5 255.255.255.0
(config-if-vlan)# exit
(config)# exit
# copy running-config startup-config
Building configuration...
% Saving 2239 bytes to flash:startup-config
Second: Run the Telnet client program.
Run the Telnet client program that comes with Windows and specify the destination address for Telnet.
www.huafeitech.com
Third: Log on the switch.
To log in to the Telnet configuration interface, you need to enter the correct login name and
password, otherwise the switch will deny access to the Telnet user. This is to protect the switch
from unauthorized operation by unauthorized users. If the switch does not have an authorized
Telnet user, no user can access the CLI configuration interface of the switch. So the Telnet
configuration interface, enter the correct login name and password, the default user: admin,
password: 123; Telnet users can successfully enter the CLI configuration interface to the switch.
After Telnet is logged in, the commands used to log in through the console port are exactly the
same.
10
www.huafeitech.com
manage the switch device. For details, how to manage the switch through SSH. Refer to the SSH
Configuration section.
4000 series Switch provide users with two management interface: CLI (Command Line
Interfac) command line interface, web management interface. We will make a detailed
introduction to the CLI interface,
Users are familiar with the CLI interface, we mentioned in front of the band management,
Telnet login to the switch through the CLI interface configuration management of the switch.
User enter the corresponding privileged user password to enter the privileged user
configuration mode “ #”. When the user exits from the global configuration mode by exit, you can
also return to the privileged user configuration mode. In addition to provide "Ctrl + z" shortcut
keys, so that the switch in any configuration mode (except for the general user configuration
11
www.huafeitech.com
mode), can be returned to the privileged user configuration mode.
In the privileged user configuration mode, the user can query the switch configuration
information, the connection of each port, send and receive data statistics. And enter the privileged
user configuration mode, you can enter the global mode to modify the configuration of the
switch......
Global configuration mode
After entering the privileged user configuration mode, simply use the command config
termial to enter the global configuration mode "(Config) #". You can use the command exit to
return to the global configuration mode when the user is configured in other configuration modes,
such as interface configuration mode and VLAN configuration mode.
In the global configuration mode, you can configure the switch globally, such as MAC
address table, port mirroring, VLAN creation, and IGMP Snooping, GVMP, and STP. Users in the
global mode can also enter the port through the command to configure the port.
In the global configuration mode, you can use the command interface to enter the
corresponding interface configuration mode. There are two types of ports: 1.VLAN interface; 2.
Ethernet port; so there are two interface configuration mode.
Type of Way of entry Prompt Executable operations
Interface
VLAN In the global configuration (config-if-vlan) Configure the IP of the
interface mode, enter the command: # switch
interface vlan <Vlan-id>。
Ehthernet In the global configuration (config-if)# Configure the duplex
interface mode, enter the command: mode, rate, and so on of
Interface GigabitEthernet the Ethernet interface
<port_type_list> provided by the switch.
interface FastEthernet
<port_type_list>
interface 2.5GigabitEthernet
<port_type_list>
In the global configuration mode, you can use the command vlan <vlan-id> to enter the
12
www.huafeitech.com
corresponding VLAN configuration mode. In VLAN configuration mode, you can configure a
member port that belongs to this VLAN. Execute the exit command to return from the VLAN
configuration mode to the global configuration mode.
In the global configuration mode, use the ip dhcp pool <name> command to enter the
DHCP address pool configuration mode "(Config-<name>-dhcp)#". You can configure the
attributes of the DHCP address pool in the DHCP address pool configuration mode. Execute the
"exit" command to return to the global configuration mode from the DHCP address pool
configuration mode.
In order to facilitate the user's configuration, in particular, provides a number of shortcut keys,
such as above, under, left, right key and delete key BackSpace and so on. If the HyperTerminal
does not support the cursor keys up and down, you can use ctrl + p and ctrl + n to replace.
Button Function
BackSpace Delete the previous character of the cursor position, move the cursor
13
www.huafeitech.com
forward
“↑” Displays the previous input command. You can display up to ten
commands that have been entered recently
“↓” The next input command is displayed. When you use the cursor keys
to go back to previously entered commands, you can also use the lower
cursor keys to return to the next command relative to the previous
command
“←” The cursor moves one position to the Use the left and right keys
left to make changes to the
“→” The cursor moves one position to the commands that have been
right entered
Ctr+p Relative to the cursor on the "↑" role
Ctr+b Relative to the cursor key "←" role
Ctr+f Relative to the cursor key "→" role
Ctr+z From other configuration modes (except for general user configuration
mode) to the privileged user mode
Tab button When the input string can be a conflict without a command or
keyword, you can use the Tab key to add it as a complete command or
keyword
The 4000 series switches provide users with a way to get help information, that is to use "?""
Command.
14
www.huafeitech.com
string are listed.
CLI supports not exactly match the search commands and keywords, and when you enter a
conflicting command or keyword, the CLI is parsed correctly.
Example:
1. For the privileged user configuration command "show interface 2.5GigabitEthernet 1/1
description", h in 2 1/1 d".
2. For the privileged user configuration command "show running-config", if only "sh r" is
entered, the system will report "% Ambiguous word detected at '^' marker.”" Because the shell can
not distinguish "show r" from "show rom" or "show running -config "command, so you must
enter" sh ru ", Shell will be the correct analysis.
The switch provides HTTP or HTTPS web management, the default is HTTP. Through the
web browser, the user can configure the switch and detect the behavior of the switch.
You can through the following operations, to achieve through the web browser to manage
the switch:
1. Configure a valid IP address and address mask for the switch.
2. Configure the management user, user password.
3. Through the Web browser on the switch connection, enter the user name, password, then
you can through the Web on the switch
To manage.
When you enter the user name, password, verification code, after verification,
you can see the following web management home page. Click the main menu link to browse
other management links and display the configuration and statistics.
15
www.huafeitech.com
Figure 1-10 web home management
The basic configuration of the switch includes commands such as entering and exiting the
privileged user mode, entering and exiting the interface configuration mode, setting and displaying
the clock of the switch, displaying the system version information of the switch, and so on.
2.1.1. config
Conmmand:config [terminal]
Function:From the privileged user configuration mode to the global configuration mode.
Parameter:[terminal] Indicates that the terminal is configured.
Command mode:Privileged user configuration mode
Example:
#con t
Command:
1、username <username> privilege <priv> password none
2、username <username> privilege <priv> password unencrypted <password>
Function: Add or modify the user and password of the privileged user configuration mode. There
is no password in command 1, and password is not encrypted in command 2
Command mode: global configuration mode
Default: The system defaults to admin and the password is empty.
16
www.huafeitech.com
Usage Guide: Configure a privileged user password to prevent unauthorized intrusion by
nonprivileged users. It is recommended that the network administrator modify the privileged user
password when configuring the switch for the first time. Also, when the administrator needs to
leave the terminal for a long time, it is best to execute the exit command to exit the privileged user
configuration mode.
Example: Set the password for the privileged user admin to admin.
(config)# username admin privilege 15 password unencrypted admin
2.1.3. exit
Command:exit
Function:From the current mode, enter the previous mode, such as in the global configuration
mode using this command to return to the privileged user configuration mode, in the privileged
user configuration mode using this command to return to the general user configuration mode.
Command mode:Various configuration modes
Example:
(config)#exit
#
2.1.4. help
Command:help
Function: Outputs a brief description of the command interpreter help system.
Command mode: Various configuration modes
Usage Guide: The switch provides online help anytime, anywhere. The help command displays
information about the entire help system, including full help and some help, where users can type ?
anytime, anywhere. Get online help.
For example:
2.1.5. hostname
Command:hostname <hostname>
Function: Sets the prompt for the switch's command line interface.
Parameters: <hostname> is a string of prompts, up to 30 characters long.
Command mode: global configuration mode
Default: The system default is "".
Usage Guide: This command allows the user to set the prompt for the switch command line
according to the actual situation.
Example: Set the prompt to Test.
(Config)#hostname Test
17
www.huafeitech.com
Test(Config)#
Command:reload cold
Function: Reboot the switch.
Command mode: Privileged user configuration mode
Usage Guide: The user can use this command to restart the switch without shutting down the
power supply.
Command:1、reload default
2、reload defaults keep-ip
Function: Restore the factory settings of the switch.
Command mode: privileged user configuration mode, command 1 device restore factory
configuration, including device management IP, command 2 device restore factory settings, but
device management IP does not change
Usage Guide: Restore the factory settings of the switch, that is, the user to do all the configuration
of the switch are gone, the user restart the switch, the prompt appears the same as the switch for
the first time.
For example:
# reload defaults keep-ip
% Reloading defaults, attempting to keep VLAN 1 IP address. Please stand by.
After this command is executed, the device restores the factory settings, but VLAN
1 IP remains the original IP.
2.1.8. copy
18
www.huafeitech.com
2.2. Maintenance and commissioning commands
When the user configures the switch, it is necessary to check whether the configuration is
correct and whether the switch is working properly. If the network fails, the user needs to diagnose
the fault. This provides ping, telnet, show ect debugging commands, To help users view the
system configuration, running status, find the cause of the malfunction.
2.2.1. ping
2.2.2. show
The show command is used to display the system information, port information, protocol
operation, and so on. This section describes the show command for the display system information
of the switch. Other show commands are described in the relevant sections.
-
Command:show running-config
Function: Displays the switch parameter configuration that takes effect in the current running
state.
Default: The configuration parameters that are in effect are not displayed if they are the same as
the default operating parameters.
Command mode: Privileged user configuration mode
Usage Guide: When the user completes a set of configurations and needs to verify that the
19
www.huafeitech.com
configuration is correct, you can run the show running-config command to view the currently
valid parameters
.For example:
#show running-config
Command:show users
Function: Displays information about the current user with the switch.
Usage Guide: This command is used to view the information of the user who is currently logged
in to the system.
For example:
#show user
2.2.2.3.show version
Command:show version
Function: Displays the switch version information.
Command mode: Privileged user configuration mode
Usage Guide: Use this command to view the version information of the switch, including the
hardware version and software version information.
2.3. Telnet
Telnet remote login is a simple remote terminal protocol. The user can register with Telnet (ie,
log on) to another remote host (using an IP address or host name) at their location. Telnet can pass
the user's keystrokes to the remote host, but also can return the remote host's output through the
TCP connection to the user screen. This service is transparent because the user feels that the
keyboard and the monitor are directly connected to the remote host.
Telnet uses the client-server mode, the local system is the Telnet client, and the remote host is
the Telnet server. Either as a Telnet server or as a Telnet client.
When the switch serves as a Telnet server, the user can log in to the switch through the Telnet
client software that comes with Windows or other operating system, as described in the Inline
Management section earlier. When the switch serves as a Telnet server, you can establish a TCP
connection with up to five Telnet clients at the same time.
When used as a Telnet client, you can use the telnet command to log in to other remote hosts
20
www.huafeitech.com
in the privileged user configuration mode of the switch. When the switch as a Telnet client can
only establish a TCP connection with a remote host, if you want to establish a connection with
another remote host, you must first disconnect the TCP connection from the previous remote host.
All Ethernet interfaces on the switch default to Layer 2 (DataLink Layer) ports for Layer 2
forwarding. The IP address is also the IP address of the switch. VLAN-related configuration
commands can be configured in VLAN interface mode. Provide users with three ways to
configure IP addresses:
manual configuration
21
www.huafeitech.com
DHCP way
Manually configure the IP address, that is, the user assigns an IP address to the switch.
DHCP is the DHCP client as the DHCP client, and sends the request packet to the DHCP
server. The DHCP server sends the address to the switch after receiving the request. In addition, it
also has the function of DHCP server, which can dynamically allocate network parameters such as
IP address, gateway address and DNS server address for the DHCP client. The configuration of the
specific DHCP server is described in the following sections.
1. Manual configuration
2. DHCP
1. Manual configuration
Command Explanation
ip address <ip_address> <mask> Configure the IP address of the VLAN
no ip address interface of the switch. The no operation of
this command is to remove the IP address of
the VLAN interface of the switch.
2. DHCP
Command Explanation
ip address dhcp fallback <fallback_address> Enable the DHCP client to obtain the IP
<fallback_netmask>timeout<fallback_timeout> address and gateway address through DHCP
no ip address dhcp negotiation. When the IP timeout is
dynamically acquired, the device IP can
become a pre-preset IP. The no operation of
this command is to disable the DHCP client
function.
2.4.2.1. ip address
22
www.huafeitech.com
Parameters: <ip-address> is the IP address, dotted in decimal format; <mask> is the subnet mask,
dotted in decimal format;
Default: The switch has a default IP address at the factory.
Command mode: VLAN interface configuration mode
Usage Guide: To configure an IP address for a switch, you must first create a VLAN interface.
Example: Set the IP address of VLAN1 interface to 10.1.128.1/24.
(Config)#interface vlan 1
(Config-If-Vlan1)#ip address 10.1.128.1 255.255.255.0
(Config-If-Vlan1)#exit
(Config)#
23
www.huafeitech.com
SNMP protocol uses management station / proxy mode, so SNMP network elements
are divided into NMS and Agent two parts.
NMS(Network Management Station) is a workstation that runs a network
management software client program that supports the SNMP protocol and plays
a central role in SNMP network management.
Agent is a process that resides on a managed network device and is
responsible for receiving and processing requests from NMS. When an alarm
occurs, Agent also actively informs the NMS.
NMS is the manager of the SNMP network. The agent is the manager of the SNMP
network. NMS and Agent through the SNMP protocol to interactively manage information.
SNMP provides five basic operations:
Get-Request
Get-Response
Get-Next-Request
Set-Request
Trap
NMS through the Get-Request, Get-Next-Request and Set-Request message to the
Agent issued a query and configuration management variable request, Agent received the
request, with the Get-Response message to respond to the request. When an alarm
occurs, the Agent initiates a trap message to the NMS to notify the NMS that an abnormal
event has occurred.
This series of devices SNMP Agent supports SNMP v2 version, SNMP v2 compatible
SNMP v1 version.
SNMP v1 uses community name authentication, and community name acts like a
password to restrict SNMP NMS access to the SNMP agent. If the community name of the
SNMP packet is not acknowledged by the device, the packet will be discarded.
SNMP v2 also uses community name authentication. It is compatible with SNMP v1
while also expanding the SNMP v1 function.
SNMP v3 provides a user-based security model (USM, User-Based Security Model)
authentication mechanism. The user can configure the authentication and encryption
functions. The authentication is used to verify the legitimacy of the sender of the packet
and avoid the access of the illegal user. The encryption encrypts the transmission packets
between the NMS and the agent so as to avoid eavesdropping. It provides higher security
for communication between SNMP NMS and SNMP agents through a combination of
authentication and encryption.
NMS and Agent SNMP version matching is a prerequisite for successful visits
between them. Agent can configure multiple versions at the same time, with different
24
www.huafeitech.com
versions of NMS communication.
In this figure, the OID of object A is 1.2.1.1, and the NMS can access the object
without ambiguity through this unique OID to obtain the standard variable contained in the
object. The MIB defines a set of standard variables for the monitored network device
25
www.huafeitech.com
according to this structure.
Can be used as SNMP agent, support SNMPv1 / v2c / v3, support basic MIB-II,
RMON public MIB, also supports BRIDGE MIB and other related public MIB.
RMON is the most important extension to the basic SNMP system. RMON is a set of
MIB definitions that define standard network monitoring functions and interfaces that
enable communication between SNMP-based management terminals and remote
monitors. RMON provides an effective and efficient way to monitor subnet-wide behavior.
RMON MIB is divided into 10 groups, switches support one of the most commonly used
1,2,3,9 group, namely:
Statistics: The basic usage and error statistics of each subnet that the maintenance agent
monitors.
History: A periodic statistical sample of the information available from the statistical group.
Alarm group: Allows the management console personnel to set the sampling interval and
alarm threshold for any count or integer recorded by the RMON agent.
Event: A table of all events generated by the RMON agent.
Where the alert group relies on the implementation of the event group. The statistics
group and the history group are some of the subnet statistics that show now or before.
Alert groups and event groups provide a way to monitor any integer data changes on the
network and provide some warning actions (send traps or record logs) when the data is
abnormal.
26
www.huafeitech.com
command is to turn off the SNMP proxy
server function.
4. TRAP Configuration
Command Explanation
snmp-server trap Enable the device to send trap
no snmp-server trap messages. The no operation of this
command prevents the sending of
Trap messages.
host <ipv4_ucast> <udp_port> traps Add the IP address of the network
version { v1 [ <v1_comm> ] | v2 [ <v2_comm> ] | management station that receives
v3 [ probe | engineID <word10_to_64> ] SNMP Trap messages, UDP port;
[ <securtyname> ] } Trap version, user name;
traps [ authentication snmp-auth-fail ] [ system Configure the contents of the trap
[ coldstart ] [ warmstart ] ] [ switch [ stp ]
[ rmon ] ]
5. Add or remove SNMP V3 users, user groups, access tables, contexts, views
Command Explanation
snmp-server user <username> engine-id <engineID> Add or remove
[ { md5 <md5_passwd> | sha <sha_passwd> } [ priv { des | SNMP V3 users, ID,
27
www.huafeitech.com
aes } <pripasswd> ] ] encryption,
snmp-server view <view_name> <oid_subtree> { include | password, security
exclude } level
Add view
Command:snmp-server
no snmp-server
Function: Turns on the switch as the SNMP proxy server function. The no operation of
this command is to disable the SNMP proxy server function.
Command mode: global configuration mode
Default: The system automatically shuts down the SNMP proxy server function.
Usage Guide: To configure the management through the NMS, you must first use this
command to enable the SNMP agent server function of the switch.
Example: Open the SNMP agent server function of the switch.
(Config)#snmp-server
28
www.huafeitech.com
2.5.4.2.3. snmp-server trap enable
Command:snmp-server trap
no snmp-server trap
Function: This command allows the device to send trap messages. The no operation of
this command prevents the sending of Trap messages.
Command mode: global configuration mode
Default: The system prevents the sending of Trap messages by default.
Usage Guide: When a device sends a Trap message, the device sends a Trap message
to the management station that receives the Trap message if the port of the device is
Down / Up or the system has a Down / Up function.
For example:
Allows to send trap messages.
(Config)#snmp-server trap
Do not send trap messages.
(Config)#no snmp-server trap
29
www.huafeitech.com
1.1.1.9
1.1.1.5
The IP address of the management station (NMS) is 1.1.1.5; the IP address of the switch
is 1.1.1.9.
Case 1: The network management software of the management station uses the SNMP
protocol to obtain data from the switch.
The configuration of the switch is as follows:
(Config)#snmp-server
(Config)#snmp-server version v2c
(Config)#snmp-server community v2c private rw
(config)# snmp-server community v2c public ro
In this way, the management station can use private as a community string to read and
write access to the switch, you can also use public as a community string to read-only
access to the switch.
Case 2: The management station is receiving Trap messages from the switch.
The configuration of the switch is as follows:
(Config)#snmp-server trap
(config)# snmp-server host 123
(config-snmps-host)# host 1.1.1.5 162 traps
(config-snmps-host)# version v2
2.6. Alarm
2.6.1. Introduction
30
www.huafeitech.com
This series of devices supports the following two types of alarms:
Power alarm: dual power supply module equipment in the case of power supply
alarm is enabled, the power module power failure or abnormal alarm.
Port Alert: Includes port down alarm and port traffic aliasing
Port alarm: When enabled, the port will cause an alarm when it is down.
When the alarm is enabled, the alarm mode is logged, the front panel alarm
indicator flashes, the alarm terminal is triggered, and the SNMP trap message is
sent.
1. Configuration alarm
2. View alarm
1. Configuration alarm
Command Explanation
Global configuration mode
power alarm | no power alarm Port configuration mode
Port configuration mode
alarm | no alarm Set or cancel port down alarm
2. View alarm
Command Explanation
Privilege mode
show alarm Check the port alarm status.
show alarm power Check the power alarm status
2.7.1. Introduction
The log function of the switch mainly records the status of the switch system, fault,
debugging, abnormal and other information. Through the configuration can be real-time
upload log information to support the Syslog protocol server.
Log information is divided into four levels by importance, from high to low as follows:
Error、Warning、Notice、Information
31
www.huafeitech.com
1. Configure log management
2. View the log management
Command Explanation
Privilege mode
show logging [ informational ] [ notice ] Displays the corresponding level or all
[ warning ] [error ] [ switch <switch_list> ] log information.
The port number of each port is marked on the panel of the switch. In order to distinguish the
port on the panel, the port number (software port number) provided by the switch operating
system is Fastethernet 1 / X, GigabitEthernet1 / X.
If you want to configure some ports, you can use the command interface to enter the
corresponding Ethernet interface configuration mode.
32
www.huafeitech.com
3.2. Port Configuration
Command Explanation
Configuration mode
interface GigabitEthernet <port_type_list> Enter the Ethernet interface
interface FasteEhernet <port_type_list> configuration mode
Command:flow control
no flow control
Function: Enable the flow control function of the specified port. The no operation of this
33
www.huafeitech.com
command is to disable the flow control function of the port.
Command mode: Interface configuration mode
By default, the flow control function of a port is disabled by default.
Usage Guide: When the traffic of the port is enabled, when the traffic received by the port is larger
than the size that the port cache can hold, the port will notify the device that sends traffic to it by
slowing down the sending speed to prevent packet loss. The switch's port supports 802.3X traffic
control based on back pressure; the port operates in half-duplex mode and supports back pressure
flow control. When the backpressure control reaches a critical head clogging (HOL), the switch
will automatically perform header blocking control (discarding some packets in the COS queue
that may have header blocking) to avoid a significant drop in network performance.
Note: Unless the user needs a slow, low performance, but the packet loss of smaller networks, or
do not recommend users to open the port flow control function. When opening the port's flow
control function, make sure that both ends are the same in duplex and duplex mode.
Example: Turn on the flow control function of port 1/2.
(config)# interface GigabitEthernet 1/2
(config-if)# flowcontrol on interface ethernet
Command:interface interface GigabitEthernet <port_type_list>
Function: Enter from the global configuration mode to the Ethernet interface configuration mode.
Parameters: <interface-list> is the port number, and the format and range of the port number are
described in the chapter description of the port.
Command mode: global configuration mode
Usage Guide: Use the command exit to return to the global configuration from the Ethernet
interface configuration mode.
Example: Enter Ethernet port 1/2
(config)# interface GigabitEthernet 1/2
(Config-if)#
3.2.1.2.2. shutdown
Command:shutdown
no shutdown
Function: Turn off the specified Ethernet port. The no operation of this command is to open the
port.
Command mode: Interface configuration mode
By default, the Ethernet port is enabled by default.
Usage Guide: When the Ethernet port is shut down, the Ethernet port will not send the data frame,
and the port status is down when the user enters the show interface command.
34
www.huafeitech.com
Example: Open port 1/2.
(Config)#interface GigabitEthernet 1/2
(Config-if)#no shutdown
3.2.1.2.3. speed
3.2.1.2.4. duplex
Mirror function refers to the switch to a port or VLAN to receive or send the same data frame
to another port; which is copied port / VLAN called the mirror source port / VALN, copy the port
is called the mirror destination port. A protocol analyzer (such as Sniffer) or RMON monitor is
35
www.huafeitech.com
usually connected at the destination port of the mirror to monitor and manage the network and to
diagnose network failures. Mirroring is divided into remote mirroring and local mirroring. This
section focuses on native mirroring.
Command Explanation
Global configuration mode
monitor session <1> source interface <interface-list> Specify the mirror source port.
{rx| tx| both} The no operation of this
no monitor session <1> source interface <interface-list> command is to remove the
{rx| tx| both} mirroring source port.
36
www.huafeitech.com
the mirror source port list, support "-" ";" and other special characters; rx for the mirror source
port to receive traffic; Tx is the traffic that mirrors the source port; both for mirroring source port
incoming and outgoing traffic.
Command mode: global configuration mode
Usage Guide: This command sets the source port of the mirror. There is no restriction on the port
of the mirror source. It can be a port or multiple ports. It can not only emit the source port and
send the bidirectional traffic, but also the source port Send traffic and receive traffic. If you do not
specify the [rx | tx | both] keyword, the default is both. When mirroring multiple ports, the
direction of multiple source ports can be inconsistent, but to be configured several times.
Example: Set the source port for 1 / 1-4 outgoing traffic and 3/5 receive traffic.
(Config)#monitor session 1 source interface ethernet 1/1-4 tx
(Config)#monitor session 1 source interface ethernet 3/5 rx
37
www.huafeitech.com
3.2.2.4.2. Port mirroring troubleshooting help
When configuring port mirroring problems, check for the following reasons:
Mirror destination port is a member of a port aggregation group; if yes, modify the port
aggregation group;
The destination port of the mirroring port is less than the sum of the mirroring source port
throughput. The destination port can not completely copy the source port traffic; reduce the
number of source ports or copy the unidirectional traffic, or select the port with the higher
throughput as the destination port.
38
www.huafeitech.com
3.3.2. Port troubleshooting help
The usual situation that users encounter when configuring a port is as follows:
When the two optical interfaces are connected to each other, if the one end is set to
auto-negotiation and the other end sets the forced rate / duplex, the optical interface will not
be linked up. This is determined by the IEEE 802.3 protocol.
Some settings that are not recommended by the user. Please try to avoid the following
settings:
Open a port flow control, and set the port multicast suppression
Set a port broadcast, multicast or unknown address unicast suppression, and set the port
bandwidth limit.
In the case of the above settings, the port traffic may be lower than expected.
39
www.huafeitech.com
Chapter 4 MAC Address Table Configuration
MAC address table can be divided into static configuration and dynamic learning. Static
configuration that is created by the user MAC address and port mapping; dynamic learning that is
dynamically discovered by the MAC MAC address and port mapping, and regularly update the
MAC address table. Below we will focus on MAC address table dynamic learning process.
40
www.huafeitech.com
The topological environment of the above figure is: 2 hosts connected to the switch. Host 1 is
connected to port 1/5 of the switch. Host 3 is connected to port 1/6 of the switch.
In the initial state, there is no learned address mapping entry in the MAC address table. Taking the
mutual communication between host 1 and host 3 as an example, the MAC address table learning
process is as follows:
1. When the host 1 transmits information to the host 3, the switch receives the source MAC
address 00-01-11-11-11-11 of the message at the port 1/5. The MAC address table of the
switch increases the MAC address 00-01-11-11-11-11 and port 1/5 mapping entries;
2. At the same time, the switch will check the target MAC address 00-01-33-33-33-33 of the
information. At this time, only the MAC address 00-01-11-11-11-11 and port 1/5 mapping
Table entries, there is no port mapping corresponding to 00-01-33-33-33-33, so the switch can
only broadcast the information to each port of the switch (assuming all ports of the switch
belong to the default VLAN);
3. Host 3 located at port 1/6 will respond to host 1. At that time, the 1/6 port of the switch
receives the information from the host 3, and the MAC address table 00-01-33-33-33-33 and
the port 1/6 mapping table are added to the MAC address table of the switch.
4. The contents of the current MAC address table are MAC address 00-01-11-11-11-11 Dynamic
corresponds to port 1/5, MAC address 00-01-33-33-33-33 Dynamic corresponds to port 1/6
The after a period of communication between host 1 and host 3, the switch never receives the
information sent from host 1 and host 3, and after 300 seconds the MAC address table of the
switch will delete the above saved MAC address mapping entry. Where 300 seconds is the
aging time of the switch's default MAC address, and the switch provides modification of the
aging time.
The switch will make a decision to forward or filter the received data frame according to the
MAC address table. The above figure shows, for example, that the MAC address table of the
current switch dynamically learns the MAC addresses of Host 1 and Host 3. The MAC address
table of the switch is:
MAC Address Port no. method of obtaining
00-01-11-11-11-11 1/5 Dynamic
00-01-33-33-33-33 1/6 Dynamic
1. According to the MAC address table forwarding situation
If the host 1 sends a message to the host 3, the switch sends the data received from port 1/5 from
port 1/6 according to the MAC address table.
In addition, the switch can forward three types of frames:
Broadcast frame;
Multicast frame;
Unicast frame.
41
www.huafeitech.com
The following briefly describes the switch on the three types of frame processing
1. Broadcast frame: The switch can block the collision domain, but can not block the broadcast
domain. In the case where no VLAN is set, all the devices connected to the switch are in the
same broadcast domain. When the switch receives the broadcast frame, it will The broadcast
frame is forwarded to all ports. When the switch sets the VLAN, the MAC address table will
also adjust accordingly, will increase the VLAN information, then the switch receives the
broadcast frame, the broadcast frame will not be forwarded to all ports within the switch, and
changed to only To all ports belonging to the same VLAN.
2. Multicast frame: When the switch does not set the function of IGMP snooping, the switch
performs the same process as the multicast. When the switch sets up IGMP snooping, the
switch forwards the multicast only to the port that belongs to the multicast group. frame.
3. 3Unicast frame: When the VLAN MAC address of the unicast frame received by the switch
is present in the MAC table, the switch will forward the unicast frame directly to the
corresponding port when the VLAN is not set. When receiving the single When the
destination MAC address of the broadcast frame does not exist in the MAC address table, the
switch broadcasts the unicast frame. When the switch sets the VLAN, the switch will only
forward the unicast frame in the same VLAN. When the destination MAC address of the
unicast frame is in the MAC address table but does not belong to the same VLAN, the switch
can only transmit the unicast frame Broadcast in the VLAN to which it belongs.
42
www.huafeitech.com
4.2.2. mac address-table
43
www.huafeitech.com
4.3.2. mac address-table learning vlan
Function: Displays the contents of the current MAC address table of the switch.
Parameter: conf user configuration’s static table. static all static table, Aging-time address aging
time, Learning mac address learning mode. count address amount. Interface<port_type>
corresponds to the port MAC address entry. <Vlan-id> corresponds to the address entry of the
VLAN.
Command mode: Privileged user configuration mode
By default:
Usage Guide: This command can be used to display various MAC address entries.
Example: Display the MAC address entries of VLAN 1.
#show mac address-table vlan 1
When you enter show mac address-table command, you find that the port does not learn the
MAC of the device to which the port is connected. possible reason:
The Ethernet cable used to connect is damaged and the Ethernet cable is replaced.
The switch starts SpanningTree and the port is discarding; or the port is connected to the
44
www.huafeitech.com
device. Spanning Tree is still in the calculation. If the Spanning Tree is calculated, the port
can learn the MAC address.
If above is not the problem, please see if port is damaged, or find technical support to solve.
45
www.huafeitech.com
Chapter 5 VLAN Configuration
VLAN(Virtual Local Area Network) This technology can be based on the function,
application or management needs of the LAN internal equipment is logically divided into a
network segment, thus forming a virtual workgroup, and do not need to consider the actual
physical location of the device. IEEE promulgated the IEEE802.1Q protocol to specify the
implementation of standardized VLAN program, the switch's VLAN function that is in accordance
with the 802.1Q standard implementation.
VLAN technology is characterized by the need to dynamically according to the needs of a
large local area network is divided into many different broadcast domain:
Each broadcast domain is a VLAN, VLAN and physical LAN have the same attributes, the
only difference is that the VLAN is logical rather than physical division, so VLAN division does
not have to be based on the actual physical location, and each VLAN internal Broadcast, multicast,
and unicast traffic are isolated from other VLANs.
VLAN-based features, VLAN technology to bring us the following convenience:
Improve network performance
Save network resources
Simplify network management
Reduce network costs
47
www.huafeitech.com
Improve network security
In the switch, the 802.1Q VLAN is defined. In this chapter, the usage and configuration of
VLANs in the switch are described in detail.
Command Explanation
Global configuration mode
vlan <vlan-id>
Create/delete VLAN or enter VLAN mode
no vlan <vlan-id>
Command Explanation
VLAN configuration mode
name <vlan-name>
Set / delete the VLAN name.
no name
Command Explanation
Interface configuration mode
switchport mode { access | trunk |
Set the current port mode.
hybrid }
48
www.huafeitech.com
Command Explanation
Interface configuration mode
switchport trunk allowed vlan { all | none | [ add |
Set / delete the VLANs allowed by
remove | except ] <vlan_list> }
the trunk port.
no switchport trunk allowed vlan
switchport trunk native vlan <vlan-id> Set / delete the PVID of the trunk
no switchport trunk native vlan port.
Command Explanation
Interface configuration mode
switchport access vlan <vlan-id> Add / exits the current port to the
no switchport access vlan specified VLAN.
5.2.2.1. vlan
5.2.2.2. name
49
www.huafeitech.com
no name
Function: Specify the name for the VLAN. The name of the VLAN is a descriptive string for the
VLAN. The no operation of this command is to delete the name of the VLAN.
Parameters: <vlan-name> is the specified vlan name string.
Command mode: VLAN configuration mode
Default: VLAN default name is vlanXXX, where XXX is VID.
Usage Guide: The switch provides the function of specifying the name for different VLANs,
which helps the user to remember the VLAN and facilitate the management.
Example: Specify the name named test for VLAN 100.
(config-vlan)# name test
50
www.huafeitech.com
and an Access port can be assigned to a VLAN and can only be assigned to a VLAN. A hybrid
port can allow multiple VLANs to pass through, and can receive and send packets of multiple
VLANs. It can be used for connection between switches and can be used to connect to a user's
computer.
Example: Set port 5 to trunk mode and port 8 to access mode.
(config)# interface GigabitEthernet 1/5
(config-if)# switchport mode trunk
(config-if)# exit
(config)# interface GigabitEthernet 1/8
(config-if)# switchport mode access
Command: switchport trunk allowed vlan { all | none | [ add | remove | except ] <vlan_list> }
no switchport trunk allowed vlan
Function: Set or modify the trunk port to allow VLANs. The no operation of this command is to
restore the default.
Parameter: all Allowed through all vlan; none Not allowed through all vlan; add add passable
vlan; remove, Remove the original passable vlan; except, Remove the <vlan-list> vlan, the
other are allowed to pass.
Command mode: Interface configuration mode
By default, the trunk port is allowed to pass through all VLANs by default.
Usage Guide: You can use this command to set which VLAN traffic through the trunk port, and
the VLAN traffic that is not included is disabled.
Example: Set the traffic of the trunk port to pass through VLAN 1, 3, 5-20.
(config)# interface GigabitEthernet 1/5
(config-if)# switchport mode trunk
(config-if)# switchport trunk allowed vlan 1,3,5-20
51
www.huafeitech.com
Usage Guide: Define the concept of PVID in 802.1Q. The role of the PVID of the trunk port is
that when an untagged frame enters the trunk port, the port will tag the untagged frame with the
native PVID set with this command.
Example: Set the native vlan of a trunk port to 100.
(config)# interface GigabitEthernet 1/5
(config-if)# switchport mode trunk
(config-if)# switchport trunk native vlan 100
Application
Due to the need of LAN security and application, the existing LAN is divided into three
VLANs: VLAN2, VLAN100 and VLAN200, and the three VLANs are required to span two areas
A and B, and two switches are placed separately. So VLAN traffic as long as you can transfer
between the switch, you can meet the requirements of cross-regional.
Configurati Configuration instructions
on item
VLAN2 1 to 2 ports of switches of A , B points
52
www.huafeitech.com
VLAN100 3 to 4 ports of switches of A , B points
VLAN200 5 to 6 ports of switches of A , B points
Trunk port 7 port of switches of A , B points
Connect the Trunk ports of the two switches to the Trunk link to carry the vlan traffic across the
switch. To connect the various network devices to the ports of the VLANs of the switch, they are
assigned to the corresponding VLANs.
53
www.huafeitech.com
5.3.1.1. show vlan
54
www.huafeitech.com
Chapter 6 IGMP Snooping Configuration
55
www.huafeitech.com
no ip igmp snooping vlan <vlan-id> function
56
www.huafeitech.com
Multicast Router
Mrouter Port
IGMP Snooping
Switch
As shown in the figure, the vlan 100 on the Switch contains ports 1, 2, 6, 10, and 12. Four hosts
are connected to ports 2, 6, 10, and 12 respectively, and the multicast router is connected to port 1.
Suppose we need to do igmp snooping on vlan 100. By default, the global igmp snooping function
and the igmp snooping function on each VLAN are not enabled. Therefore, you need to open the
global igmp snooping function, while the vlan 100 open igmp snooping.
Multicast configuration:
Assuming that the multicast server provides two programs, the group addresses Group1 and
Group2 are used, and the multicast application software is running on the four hosts. The three
hosts on the ports 2, 2,6, and 10 play the program 1 on the port 12 The host broadcasts the
program 2.
57
www.huafeitech.com
Vlan 100 The multicast table created by igmp snooping shows: Ports 1, 2, 6, 10 In group Group1,
port 1, 12 is in group Group2.
Four hosts can normally receive their own programs of interest, ports 2,6,10 will not receive the
flow of program 2, port 12 will not receive the flow of program 1.
58
www.huafeitech.com
Chapter 7 ACL Configuration
7.1.1. Access-list
Access-list actions are divided into three types: allowing filtering through (permit) or rejection
through (deny) or port selection (filter). Details are as follows:
permit indicates permission to pass, under this command, effective port range for all ports.
Deny indicates rejection, and under this command, the port is valid for all ports.
Filter means port selection filtering, followed by port selection, rejection of selected ports,
and instruction
59
www.huafeitech.com
1. Set access-list ace
Global configuration mode
Command:
access-list ace [ update ] <ace_id> [ next { <ace_id_next> | last } ] [ ingress { switch
<ingress_switch_id> | switchport { <ingress_switch_port_id> | <ingress_switch_port_list> } |
interface { <port_type> <ingress_port_id> | ( <port_type> [ <ingress_port_list> ] ) } | any } ]
[ policy <policy> [ policy-bitmask <policy_bitmask> ] ] [ tag { tagged | untagged | any } ] [ vid
{ <vid> | any } ] [ tag-priority { <tag_priority> | 0-1 | 2-3 | 4-5 | 6-7 | 0-3 | 4-7 | any } ]
[ dmac-type { unicast | multicast | broadcast | any } ] [ frame-type { any | etype [ etype-value
{ <etype_value> | any } ] [ smac { <etype_smac> | any } ] [ dmac { <etype_dmac> | any } ] |
arp [ sip { <arp_sip> | any } ] [ dip { <arp_dip> | any } ] [ smac { <arp_smac> | any } ]
[ arp-opcode { arp | rarp | other | any } ] [ arp-flag [ arp-request { <arp_flag_request> | any } ]
[ arp-smac { <arp_flag_smac> | any } ] [ arp-tmac { <arp_flag_tmac> | any } ] [ arp-len
{ <arp_flag_len> | any } ] [ arp-ip { <arp_flag_ip> | any } ] [ arp-ether { <arp_flag_ether> |
any } ] ] | ipv4 [ sip { <sipv4> | any } ] [ dip { <dipv4> | any } ] [ ip-protocol { <ipv4_protocol>
| any } ] [ ip-flag [ ip-ttl { <ip_flag_ttl> | any } ] [ ip-options { <ip_flag_options> | any } ]
[ ip-fragment { <ip_flag_fragment> | any } ] ] | ipv4-icmp [ sip { <sipv4_icmp> | any } ] [ dip
{ <dipv4_icmp> | any } ] [ icmp-type { <icmpv4_type> | any } ] [ icmp-code { <icmpv4_code>
| any } ] [ ip-flag [ ip-ttl { <ip_flag_icmp_ttl> | any } ] [ ip-options { <ip_flag_icmp_options> |
any } ] [ ip-fragment { <ip_flag_icmp_fragment> | any } ] ] | ipv4-udp [ sip { <sipv4_udp> |
any } ] [ dip { <dipv4_udp> | any } ] [ sport { <sportv4_udp_start> [ to <sportv4_udp_end> ] |
any } ] [ dport { <dportv4_udp_start> [ to <dportv4_udp_end> ] | any } ] [ ip-flag [ ip-ttl
{ <ip_flag_udp_ttl> | any } ] [ ip-options { <ip_flag_udp_options> | any } ] [ ip-fragment
{ <ip_flag_udp_fragment> | any } ] ] | ipv4-tcp [ sip { <sipv4_tcp> | any } ] [ dip
{ <dipv4_tcp> | any } ] [ sport { <sportv4_tcp_start> [ to <sportv4_tcp_end> ] | any } ] [ dport
{ <dportv4_tcp_start> [ to <dportv4_tcp_end> ] | any } ] [ ip-flag [ ip-ttl { <ip_flag_tcp_ttl> |
any } ] [ ip-options { <ip_flag_tcp_options> | any } ] [ ip-fragment { <ip_flag_tcp_fragment> |
any } ] ] [ tcp-flag [ tcp-fin { <tcpv4_flag_fin> | any } ] [ tcp-syn { <tcpv4_flag_syn> | any } ]
[ tcp-rst { <tcpv4_flag_rst> | any } ] [ tcp-psh { <tcpv4_flag_psh> | any } ] [ tcp-ack
{ <tcpv4_flag_ack> | any } ] [ tcp-urg { <tcpv4_flag_urg> | any } ] ] | ipv6 [ next-header
{ <next_header> | any } ] [ sip { <sipv6> [ sip-bitmask <sipv6_bitmask> ] | any } ] [ hop-limit
{ <hop_limit> | any } ] | ipv6-icmp [ sip { <sipv6_icmp> [ sip-bitmask <sipv6_bitmask_icmp> ]
| any } ] [ icmp-type { <icmpv6_type> | any } ] [ icmp-code { <icmpv6_code> | any } ]
[ hop-limit { <hop_limit_icmp> | any } ] | ipv6-udp [ sip { <sipv6_udp> [ sip-bitmask
<sipv6_bitmask_udp> ] | any } ] [ sport { <sportv6_udp_start> [ to <sportv6_udp_end> ] |
any } ] [ dport { <dportv6_udp_start> [ to <dportv6_udp_end> ] | any } ] [ hop-limit
{ <hop_limit_udp> | any } ] | ipv6-tcp [ sip { <sipv6_tcp> [ sip-bitmask <sipv6_bitmask_tcp> ]
| any } ] [ sport { <sportv6_tcp_start> [ to <sportv6_tcp_end> ] | any } ] [ dport
{ <dportv6_tcp_start> [ to <dportv6_tcp_end> ] | any } ] [ hop-limit { <hop_limit_tcp> | any } ]
[ tcp-flag [ tcp-fin { <tcpv6_flag_fin> | any } ] [ tcp-syn { <tcpv6_flag_syn> | any } ] [ tcp-rst
{ <tcpv6_flag_rst> | any } ] [ tcp-psh { <tcpv6_flag_psh> | any } ] [ tcp-ack
60
www.huafeitech.com
{ <tcpv6_flag_ack> | any } ] [ tcp-urg { <tcpv6_flag_urg> | any } ] ] } ] [ action { permit | deny
| filter { switchport <filter_switch_port_list> | interface ( <port_type> [ <fliter_port_list> ] ) } } ]
[ rate-limiter { <rate_limiter_id> | disable } ] [ evc-policer { <evc_policer_id> | disable } ]
[ mirror [ disable ] ] [ logging [ disable ] ] [ shutdown [ disable ] ] [ lookup-second [ disable ] ]
[ redirect { switchport { <redirect_switch_port_id> | <redirect_switch_port_list> } | interface
{ <port_type> <redirect_port_id> | ( <port_type> [ <redirect_port_list> ] ) } | disable } ]
Explanation:
Global configuration mode, configuration access-list ace
access-list rate-limiter
[ <rate_limiter_list> ] { pps
<pps_rate> | 10pps <pps10_rate> |
Set access-list classification of speed limits.
100pps <pps100_rate> | 25kbps
<kpbs25_rate> | 100kbps
<kpbs100_rate> }
61
www.huafeitech.com
Demand Explanation
Global configuration mode
no access-list rate-limiter
Delect access-list rate-limiter
[ <rate_limiter_list> ]
62
www.huafeitech.com
[ arp-request { <arp_flag_request> | any } ] [ arp-smac { <arp_flag_smac> | any } ] [ arp-tmac
{ <arp_flag_tmac> | any } ] [ arp-len { <arp_flag_len> | any } ] [ arp-ip { <arp_flag_ip> | any } ]
[ arp-ether { <arp_flag_ether> | any } ] ] | ipv4 [ sip { <sipv4> | any } ] [ dip { <dipv4> | any } ]
[ ip-protocol { <ipv4_protocol> | any } ] [ ip-flag [ ip-ttl { <ip_flag_ttl> | any } ] [ ip-options
{ <ip_flag_options> | any } ] [ ip-fragment { <ip_flag_fragment> | any } ] ] | ipv4-icmp [ sip
{ <sipv4_icmp> | any } ] [ dip { <dipv4_icmp> | any } ] [ icmp-type { <icmpv4_type> | any } ]
[ icmp-code { <icmpv4_code> | any } ] [ ip-flag [ ip-ttl { <ip_flag_icmp_ttl> | any } ]
[ ip-options { <ip_flag_icmp_options> | any } ] [ ip-fragment { <ip_flag_icmp_fragment> |
any } ] ] | ipv4-udp [ sip { <sipv4_udp> | any } ] [ dip { <dipv4_udp> | any } ] [ sport
{ <sportv4_udp_start> [ to <sportv4_udp_end> ] | any } ] [ dport { <dportv4_udp_start> [ to
<dportv4_udp_end> ] | any } ] [ ip-flag [ ip-ttl { <ip_flag_udp_ttl> | any } ] [ ip-options
{ <ip_flag_udp_options> | any } ] [ ip-fragment { <ip_flag_udp_fragment> | any } ] ] | ipv4-tcp
[ sip { <sipv4_tcp> | any } ] [ dip { <dipv4_tcp> | any } ] [ sport { <sportv4_tcp_start> [ to
<sportv4_tcp_end> ] | any } ] [ dport { <dportv4_tcp_start> [ to <dportv4_tcp_end> ] | any } ]
[ ip-flag [ ip-ttl { <ip_flag_tcp_ttl> | any } ] [ ip-options { <ip_flag_tcp_options> | any } ]
[ ip-fragment { <ip_flag_tcp_fragment> | any } ] ] [ tcp-flag [ tcp-fin { <tcpv4_flag_fin> |
any } ] [ tcp-syn { <tcpv4_flag_syn> | any } ] [ tcp-rst { <tcpv4_flag_rst> | any } ] [ tcp-psh
{ <tcpv4_flag_psh> | any } ] [ tcp-ack { <tcpv4_flag_ack> | any } ] [ tcp-urg
{ <tcpv4_flag_urg> | any } ] ] | ipv6 [ next-header { <next_header> | any } ] [ sip { <sipv6>
[ sip-bitmask <sipv6_bitmask> ] | any } ] [ hop-limit { <hop_limit> | any } ] | ipv6-icmp [ sip
{ <sipv6_icmp> [ sip-bitmask <sipv6_bitmask_icmp> ] | any } ] [ icmp-type { <icmpv6_type> |
any } ] [ icmp-code { <icmpv6_code> | any } ] [ hop-limit { <hop_limit_icmp> | any } ] |
ipv6-udp [ sip { <sipv6_udp> [ sip-bitmask <sipv6_bitmask_udp> ] | any } ] [ sport
{ <sportv6_udp_start> [ to <sportv6_udp_end> ] | any } ] [ dport { <dportv6_udp_start> [ to
<dportv6_udp_end> ] | any } ] [ hop-limit { <hop_limit_udp> | any } ] | ipv6-tcp [ sip
{ <sipv6_tcp> [ sip-bitmask <sipv6_bitmask_tcp> ] | any } ] [ sport { <sportv6_tcp_start> [ to
<sportv6_tcp_end> ] | any } ] [ dport { <dportv6_tcp_start> [ to <dportv6_tcp_end> ] | any } ]
[ hop-limit { <hop_limit_tcp> | any } ] [ tcp-flag [ tcp-fin { <tcpv6_flag_fin> | any } ] [ tcp-syn
{ <tcpv6_flag_syn> | any } ] [ tcp-rst { <tcpv6_flag_rst> | any } ] [ tcp-psh { <tcpv6_flag_psh>
| any } ] [ tcp-ack { <tcpv6_flag_ack> | any } ] [ tcp-urg { <tcpv6_flag_urg> | any } ] ] } ]
[ action { permit | deny | filter { switchport <filter_switch_port_list> | interface ( <port_type>
[ <fliter_port_list> ] ) } } ] [ rate-limiter { <rate_limiter_id> | disable } ] [ evc-policer
{ <evc_policer_id> | disable } ] [ mirror [ disable ] ] [ logging [ disable ] ] [ shutdown
[ disable ] ] [ lookup-second [ disable ] ] [ redirect { switchport { <redirect_switch_port_id> |
<redirect_switch_port_list> } | interface { <port_type> <redirect_port_id> | ( <port_type>
[ <redirect_port_list> ] ) } | disable } ]
Functions:Use the access-list ace global configuration mode command to set up access-list ace.
Any parameter that is not described will be set to the default value.
Parameters:
Policy ID:The allowed value is 0-255, the default value is 0; Action: configurable to allow
63
www.huafeitech.com
forwarding or deny forwarding, and the default configuration is to allow forwarding. Rate Limiter
ID: configurable value to be closed or configuration value 1-16, default configuration is closed.
EVC Policer: set the EVC speed limiter to enable or close. The default value is off. Note: the ACL
speed limiter and the EVC speed limiter do not work at the same time. EVC Policer ID:
configurable values are closed or 1-256. The default value is off.
Demand Mode:Global configuration mode
Default:No access lists are configured.
Usering Guide:When a user first configures a specific ACE ID, creates the ACE of this number,
and then adds the table entry in this ACE.
Example:Create a ACE ID 110 access control list, allowing the frame format of ipv4-icmp
message from 1/4 through ACE port; create ID 111 access control list, prohibit the format for the
frame type ARP from the port by radio.
(config)# access-list ace 110 action permit frame-type ipv4-icmp ingress interface GigabitEthernet
1/4
(config)# access-list ace 111 dmac-type broadcast frame-type arp action deny
64
www.huafeitech.com
7.2.2.4. default access-list rate-limiter
65
www.huafeitech.com
# show access-list rate-limiter 2 。
66
www.huafeitech.com
Chapter 8 Qos Configuration
QoS (Quality, of, Service) is the ability of a network to provide better services to selected
network communications using a wide variety of technologies. QoS is the quality of service, to
provide a stable and predictable data transfer services, to meet the application requirements, QoS
can not generate new bandwidth, but according to the needs of the application of network
bandwidth management and network management to effectively set.
ToS:Type of Service,L3 IPv4 carries a byte field, the service type that marks the IP package, and
the ToS field can be a DSCP value.
67
www.huafeitech.com
Supervise: QoS entry actions, develop regulatory policies, and monitor the rate of queues.
Rewriting: The export action of QoS, overriding the priority of the packet in the outbound
direction.
Shaping: QoS export action, configure the rate of each queue.
Schedule: QoS export action, configure the export queue work.
68
www.huafeitech.com
qos dpl <dpl> Configure the port default
no qos dpl DPL value. The no operation
of this command is to restore
the default.
qos pcp <pcp> Configure the port default
no qos pcp PCP value. The no operation
of this command is to restore
the default.
qos map tag-cos pcp <pcp> dei <dei> cos <cos> dpl <dpl> Configure the port PCP-CoS
no qos map tag-cos pcp <pcp> dei <dei> mapping. The no operation of
this command is to restore
the default.
Command Explanation
qos map dscp-cos <dscp_num>cos <cos> dpl <dpl> Configure the port
no qos map dscp-cos <dscp_num> DSCP-CoS mapping. The no
operation of this command is
to restore the default.
69
www.huafeitech.com
qos tag-remark { pcp <pcp> dei <dei> | mapped } Rewrite the port outbound
no qos tag-remark priority; the no operation of
this command is to restore the
default configuration.
4. Configure the QoS exit queue rate
Command Explanation
Global configuration mode
qos queue-shaper queue <queue> <rate> [ kbps | mbps ] Configure the direction of the
[ excess ] queue rate; the command no
no qos queue-shaper queue <queue> operation to restore the
default configuration.
70
www.huafeitech.com
Command: qos cos {<default-cos> }
no qos cos
Function: Configure the default CoS value of the switch port. The no operation of this command is
to restore the default.
Parameters: <default-cos> The default CoS value for the switch port, in the range of 0 to 7.
Default: The default CoS value is 0.
Command mode: Interface configuration mode
user's guidance:
Example This example describes how to configure the default cos value to 5 on port
GigabitEthernet 1/1. That is, if the packets coming from this port do not have a cos value, assign
the default cos value to 5.
(config)#interface GigabitEthernet 1/1
(Config-if)# qos cos 5
71
www.huafeitech.com
8.2.2.5.qos pcp
Command: qos map tag-cos pcp <pcp> dei <dei> cos <cos> dpl <dpl>
no qos map tag-cos pcp <pcp> dei <dei>
Function: Configure the port PCP-CoS mapping. The no operation of this command is to restore
the default. The
Parameters: <pcp>: pcp value, range 0 to 7, <dei>: dei value, range 0 to 1, <cos>: cos value, range
1 to 7, <dpl>: dpl value, range 0 to 1 The
By default:
Command mode: Interface configuration mode
user's guidance:
Example: On port GigabitEthernet 1/1, map pcp 7 dei 1 to cos 7 dpl 0.
# con t
(config)# interface GigabitEthernet 1/1
(config-if)# qos map tag-cos pcp 7 dei 1 cos 7 dpl 0
(config-if)#
Function: Configure the port DSCP-CoS mapping. The no operation of this command is to restore
the default. The
72
www.huafeitech.com
Parameters: <dscp_num>: dscp value, range 0 to 63, <cos>: cos, range 1 to 7, <dpl>: dpl value,
range 0 to 1.
By default:
Command mode: global configuration mode
user's guidance:
Example: Mapping DSCP 7 to cos 0 dpl 1.
(config)# qos map dscp-cos 7 cos 0 dpl 0
www.huafeitech.com
Command: qos tag-remark { pcp <pcp> dei <dei> | mapped }
no qos tag-remark
Function: Rewrite the outbound direction of the port. The no operation of this command restores
the default configuration.
Parameters: <pcp>: pcp value, <dei>: dei value, mapped: mapping
By default:
Command mode: Interface configuration mode
Usage Guidelines: This command configures the policy in interface mode.
Example: GigabitEthernet 1/1 outbound priority rewriting: pcp 7, dei 0.
(config)# interface GigabitEthernet 1/1
(config-if)# qos tag-remark pcp 7 dei 0
Command: qos wrr <weight0 weight1 weight2 weight3 weight4 weight5 >
no qos wrr
Function: Set the WRR weight of the queue of the switch port. The no operation of this command
is to restore the default value.
Parameters: <weight0 weight1 weight2 weight3 weight4 weight5> WRR weight value
By default:
Command mode: Interface configuration mode
74
www.huafeitech.com
user's guidance:
Example: Set the bandwidth ratio of the 6 outgoing queues of port 1 to 1: 2: 4: 4: 8: 8.
(config)# interface GigabitEthernet 1/1
(config-if)# qos wrr 1 2 4 4 8 8
Case 1:
Change the weight of the port GigabitEthernet 1/1 export queue to 1: 2: 4: 4: 8: 8, configure
the trusted dscp mode, and set the default cos value of this port to 5.
Configuration results:
The QoS of the interface GigabitEthernet 1/1 is 1: 2: 4: 4: 8: 8. When the packets coming
from GigabitEthernet 1/1 are sampled with cos values, they are placed in different priority queues
according to the mapping of cos values to exit queues. If the incoming packets do not have cos
values, set their cos values to 5 , According to the corresponding relationship, into the priority
queue.
75
www.huafeitech.com
Chapter 9 RSTP Configuration
9.1. Introduction
Root bridge: In the tree network structure similar to the role of the root, the root
bridge in the whole network only one, and the root bridge will change according
to the network topology changes, not fixed. The root bridge periodically sends
BPDU configuration messages, and other devices forward the configuration
messages to ensure topology stability.
Root port: the best port from the non-root bridge to the root bridge, that is, the
port with the lowest cost of the root bridge. The root port is responsible for
communicating with the root bridge. The root bridge device has only one root
port and the root bridge device has no root port.
Specify port: Forward the configuration message to other devices or LANs;
Replace the port: the root port of the backup port, the root port fails, replace the
port will become the new root port;
Backup port: Specifies the backup port of the specified port. After the specified
port fails, the backup port will be forwarded to the new designated port
forwarding data.
76
www.huafeitech.com
9.3. BPDU Configuration message
In order to make the communication link is not ring, all the bridges in the LAN together
to calculate a spanning tree. This process determines the topology of the network by
passing BPDUs between the devices. The data structure of BPDUs is shown in the
following table:
… Root Root Specify Specif Message Max Hello Forward …
bridge path bridge y port age age time delay
ID cost ID ID
… 8 byte 4 byte 8 byte 2 byte 2 byte 2 byte 2 byte 2 byte …
Root bridge ID: 2 bytes Root bridge priority +6 bytes Root bridge MAC address;
Root path cost: the sum of all port costs in the root bridge path;
Specify bridge ID: 2 bytes Specify bridge priority +6 bytes Specify bridge MAC
address;
Specify port ID: port priority + port number;
Message age: BPDU configuration message in the network to spread the
survival period;
Max age: Maximum lifetime that BPDU configuration messages can be saved in
the device. When Message age> Max age, the BPDU message is discarded.
Hello time: The interval at which BPDU configuration messages are sent;
Forward delay: discarding - learning - forwarding state transition delay.
77
www.huafeitech.com
The device compares the configuration BPDUs of all ports to select the best
configuration BPDU. Configure Message Comparison Principle:
The configuration error of the smaller root bridge ID is higher;
If the root bridge ID is the same, compare the root path cost. Compare the
method: use the root path cost in the configuration message and add the path
cost corresponding to the port. The smaller priority of the configuration message
is higher.
If the path cost is the same, the port ID is specified, the port ID is specified, the
port ID of the configuration BPDU is received, and the configuration BPDU with
the smaller value is higher.
3. The choice of the root bridge, the root bridge of the spanning tree is the bridge with
the smallest bridge ID.
4, the root port of choice, non-root bridge equipment will receive the optimal
configuration of the port as the root port.
5. Specify the specified port configuration BPDU for each port according to the
configuration BPDU of the root port and the path cost of the root port.
Root bridge ID is replaced with the root bridge ID of the configuration BPDU of
the root port;
Root path cost is replaced by the root path cost of the root port configuration
message plus the path cost corresponding to the root port;
The specify the bridge ID to replace the ID of its own device;
The specified port ID is replaced with its own port ID.
6. the specified port selection, if the above calculation of the configuration message is
excellent, then the device will be designated as the port port, the port configuration
message is calculated to replace the configuration message and forward; if the port
configuration message is excellent, then The device does not update the configuration
BPDU of the port and blocks the port. The blocked port can only receive RSTP packets. It
can not receive and forward other data packets.
78
www.huafeitech.com
5. Set the maximum lifetime of RSTP.
6. Set the RSTP version.
7. Enable the RSTP port.
8. Set the port priority.
9. Set the port path cost.
10. View RSTP information
79
www.huafeitech.com
spanning-tree rst max-age <maxage> Set RSTP maximum lifetime.
<Maxage> is the maximum lifetime value
in seconds. The default value is 20, in the
range of 6 to 40.
6. Set the STP version
Command Explanation
Global configuration mode
spanning-tree mode { stp | rstp | mstp } Set the STP version.
<Stp | rstp | mstp> for the STP version
number, select rstp mode, in the mode
behind the input rstp
80
www.huafeitech.com
9.6. Configuration example
SwitchA SwitchB
F0/2 F0/2
SwitchC
F0/1 F0/2
F0/3
81
www.huafeitech.com
(config)# spanning-tree mode rstp
(config)# interface GigabitEthernet 1/1
(config-if)#spanning-tree
(config-if)#exit
(config)# interface GigabitEthernet 1/2
(config-if)#spanning-tree
Switch C configuration spanning tree and A, B the same
82
www.huafeitech.com
Chapter 10 HF-Ring Configuration
10.1. Introduction
10.2. Concept
10.3. Implementation
The HF-Ring protocol determines the role of the switch by forwarding Announce data
packets to ensure that the redundant network is not ringing.
HF-Ring configuration meets the following conditions:
All switches in the same ring must be configured with the same domain number;
There is only one root in a ring, which can have multiple B-roots or Normal;
83
www.huafeitech.com
Only one ring is allowed for each switch in a ring;
For the two rings connected, the backup port can only be configured in one of the
rings;
Allow multiple backup ports to be configured in a ring;
A switch can only be configured with one backup port in a ring
As shown in the following figure, the A, B, C, D switches work:
The HF-Ring protocol can also provide backup between two ring rings. As shown
in the following figure, each switch can be configured with a backup port. The primary
backup port is in Forward and the remaining backup ports are in the block state. If the
primary backup port or link fails, it will re-select a data from the backup port to ensure
84
www.huafeitech.com
that the redundant ring can not ring the normal communication.
85
www.huafeitech.com
show ring <id> View the ring information, <id> is in the
range of 1 to 32
3. Remove the HF-Ring configuration
Command Explanation
Global configuration mode
no ring <id> Delete the ring configuration, <id> is in the
range of 1 to 32
10.4.2. Precautions
The aggregation port and the ring port are mutually exclusive. The aggregation
port can not be configured as a ring port. The ring port can not join the
aggregation group.
Mirroring destination port and ring port configuration are mutually exclusive. The
mirroring destination port can not be configured as a ring port. The ring port can
not be configured as a mirroring destination port.
Backup port select the port other than the port;
The aggregation port and the backup port are mutually exclusive. The
aggregation port can not be configured as a backup port. The backup port can
not join the aggregation group.
Mirroring destination port and backup port configuration are mutually exclusive.
The mirroring destination port can not be configured as a backup port. The
backup port can not be configured as a mirroring destination port.
86
www.huafeitech.com
Chapter 11 ERPS( Ethernet Ring Protection Switching)
87
www.huafeitech.com
3、Set the ERPS port role
Command Explanation
Global configuration mode
erps <group> rpl { owner | neighbor } { port0 | Set / remove port roles
port1 }
no erps <group> rpl
88
www.huafeitech.com
no erps <group> revertive reversible and timeout
89
www.huafeitech.com
4、version
Command:erps <group> version { 1 | 2 }
no erps <group> version
Function: Set / delete ERPS version
Parameters: <group>: ERPS protection group ID; {1 | 2}: ERPS version
Command mode: global configuration mode
User Guide: Users need to configure according to the scene
Example: Set the ERPS version to 1
# con t
(config)#erps 1 version 1
5、vlan
Command:erps <group> vlan { none | [ add | remove ] <vlans> }
no erps <group> vlan
Function: set / delete ERPS protection vlan
Parameters: <group>: ERPS protection group ID; {none | [add | remove] <vlans>}: add or remove
vlan
Command mode: global configuration mode
User Guide: Users need to configure according to the scene
Example: Add VLAN1
# con t
(config)# erps 1 vlan add 1
6、guard
Command:erps <group> guard <guard_time_ms>
no erps <group> guard
Function: Set / delete ERPS protection time
Parameters: <guard_time_ms>: ERPS protection time, default 500ms
Command mode: global configuration mode
User Guide: Users need to configure according to the scene
Example: Set the protection time to 400ms
# con t
(config)# erps 1 guard 400
7、holdoff
Command:erps <group> holdoff <holdoff_time_ms>
no erps <group> holdoff
www.huafeitech.com
Command mode: global configuration mode
User Guide: Users need to configure according to the scene
Example: Set the hysteresis time to 100ms
# con t
(config)# erps 1 holdoff 100
8、revertive wtr
Command:erps <group> revertive <wtr_time_minutes>
no erps <group> revertive
Function: Set / delete ERPS to protect the link from reversible and time-out
Parameters: <wtr_time_minutes>: ERPS timeout time, default 1min
Command mode: global configuration mode
User Guide: Users need to configure according to the scene
Example: Set the timeout time to 2s
# con t
(config)# erps 1 revertive 2
POE (Power Over Ethernet) refers to the existing Ethernet Cat.5 cabling
infrastructure without any changes in the case, for some IP-based terminals to transmit
data signals at the same time, but also for such equipment to provide DC power supply
Technology. The POE power supply system consists of two devices, PSE and PD. The
PSE is a device for powering other devices, and the PD is a powered device. There are
currently two international standards: 802.3af-2003 and IEEE 802.3at-2009.
91
www.huafeitech.com
Command Explanation
Global configuration mode
poe management mode
{allocation-consumption |
allocation-reserved-power |
class-consumption |
Configure / disable port poe administration mode.
class-reserved-power |
lldp-consumption |
lldp-reserved-power}
no poe management mode
Command Explanation
Interface configuration mode
Enable / disable port poe function, standard mode
poe mode {standard | plus} that IEEE 802.3af, the maximum output 15.4W;
no poe mode plus mode that IEEE 802.3at, the maximum output
of 30W.
Command Explanation
Interface configuration mode
poe priority {critical | high | low} Configure / disable port poe priority, priority
no poe priority critical> high> low
Command Explanation
Interface configuration mode
poe power limit <fword2.1> Configure / shut down the port maximum output
no poe power limit power.
92
www.huafeitech.com
class-consumption | class-reserved-power | lldp-consumption | lldp-reserved-power}
no poe management mode
Function: POE management mode configuration; the no operation of this command is to
cancel the POE management mode.
Parameter: allocation-consumption mode,The maximum output power of each port can be
allocated by the user. When the total output power of all ports is greater than the maximum power
that the port can provide, the port POE power supply is low, and the port output power is greater
than the assigned maximum power , The port POE power supply will be shut down.
Allocation-reserved-power: allocation - reserve mode, the user can allocate the maximum
output power per port, when the port output power is greater than the maximum power allocated,
the port poe power supply will be shut down.
Class-consumption: The maximum output power of the port is automatically assigned to the
port-consumption mode. When the total output power of all ports is greater than the maximum
power that the device can provide, the port POE power supply is low, and the POE power is turned
off, or the port output power Greater than the maximum power allocated, the port POE power
supply will be turned off.
Class-reserved-power: Specifies the maximum output power of the port. When all the ports are
reserved for power greater than the maximum power that the device can provide, the port POE
power supply is low and the POE power is turned off. When the port outputs Power is greater than
the maximum power allocated, the port poe power supply will be turned off.
Lldp-consumption: lldp-consumption mode, the device automatically allocates the maximum
output power according to the LLDP packets. When the total output power of all ports is greater
than the maximum power that the device can provide, the port POE power supply will be powered
down low, or The port output power is greater than the assigned maximum power, and the port
POE power is turned off.
Lldp-reserved-power: lldp-reserved mode. The device automatically allocates the maximum
output power according to LLDP packets. When all the ports are reserved for power greater than
the maximum power that the device can provide, the port POE power supply will be shut down.
When the port output power is greater than the assigned maximum power, the port poe power is
turned off.
Command mode: global configuration mode
Usage Guide: Device default class-reserved-power mode
Example: Configure the device poe administration mode as allocation-consumption
# con t
(config)# poe management mode allocation-consumption
2、poe mode
Command:poe mode {standard | plus}
93
www.huafeitech.com
no poe mode
Parameters: tandard mode that is IEEE 802.3af, the maximum output 15.4W; plus mode that
IEEE 802.3at, the maximum output of 30W.
Command mode: Interface configuration mode
Usage Guide: Select the corresponding mode according to the PD power consumption
Example: Set port 1/1 to plus mode
# con t
(config)# interface GigabitEthernet 1/1
(config-if)# poe mode plus
3、poe priority
Command:poe priority {critical | high | low}
no poe priority
Parameters: Configure/disable port poe priority, precedence critical> high> low,
allocation-reserved-power mode, and do not need to configure the priority. Depending on the POE
management mode selected, when the total output power of all ports is greater than the maximum
power that the device can provide or when all ports have reserved power greater than the
maximum power that the device can provide, the port POE power supply will be powered down.
Command mode: Interface configuration mode
Usage Guide: The user can configure the priority according to the situation. The default priority is
low.
Example: Set port 1/1 priority to high
# con t
(config)# interface GigabitEthernet 1/1
(config-if)# poe priority high
4、poe power limit
Command:poe power limit <fword2.1>
no poe power limit
Parameters:<fword2.1> The maximum output power of the port
Command mode: Interface configuration mode
Usage Guide: Users can configure the maximum output power of the port according to the
situation. Only allocation-consumption and allocation-reserved-power need to configure the
maximum output power
Example: Set the maximum output power of port 1/1 to 25W
# con t
(config)# interface GigabitEthernet 1/1
(config-if)# poe power limit 25
94
www.huafeitech.com