Qtech QSW-2100-12T [275/348] Configuring remote id
![Qtech QSW-2100-12T [275/348] Configuring remote id](/views2/1596828/page275/bg113.png)
QTECH QSW-2100-12T Configuration Guide (CLI)
9 Security
259
Configure Circuit ID for the QSW-2100-12T as below.
Step
Command
Description
1
QTECH#config
Enter global configuration mode.
2
QTECH(config)#pppoeagent
circuit-id mode { onu |
switch }
Configure the padding mode of the Circuit
ID.
3
QTECH(config)#interface
port
port-id
Enter physical layer interface configuration
mode.
4
QTECH(config-
port)#pppoeagent circuit-
id
string
(Optional) set the Circuit ID to the
customized string.
In default mode, the Circuit ID contains an attached string. By default, the attached string is
set to the hostname of the switch. You can set it to a customized string.
Configure the attached string of the Circuit ID for the QSW-2100-12T as below.
Step
Command
Description
1
QTECH#config
Enter global configuration mode.
2
QTECH(config)#p
ppoeagent
circuit-id
attach-string
string
(Optional) configure the attached string of the Circuit ID.
If the Circuit ID is in default mode, attached string
configured by this command will be added to the Circuit
ID.
Configuring Remote ID
The Remote ID is padded with a MAC address of the switch or a client. In addition, you can
specify the form (binary/ASCII) of the MAC address.
Configure the Remote ID for the QSW-2100-12T as below.
Step
Command
Description
1
QTECH#config
Enter global configuration mode.
2
QTECH(config)#interface
port
port-id
Enter physical layer interface configuration
mode.
3
QTECH(config-
port)#pppoeagent remote-
id { client-mac | switch-
mac }
(Optional) configure PPPoE+ Remote ID to
be padded with the MAC address.
4
QTECH(config-
port)#pppoeagent remote-
id format { ascii |
binary }
(Optional) configure the padding modes of the
PPPoE+ Remote ID.
Содержание
- Configuration guide cli 1
- Qsw 2100 12t 1
- Basic configurations 3 2
- Contents 2
- Overview of features 1 2
- Ethernet 41 3
- Poe 122 6
- Ip services 130 7
- Ip routing 162 8
- Qos 167 9
- Multicast 201 10
- Security 217 10
- Reliability 263 12
- System management 287 13
- Accessing the device rj45 console telnet ssh 17
- Basic configurations 17
- Basic information about the device device name language mode 17
- Basic qinq 17
- Dhcp client dhcp server dhcp relay dhcp 17
- Erps itu t g 032 17
- Ethernet 17
- Feature description 17
- Ftp sftp tftp upgrade 17
- Garp gvrp and gmrp 17
- Ieee 802 af standard poe 17
- Ieee 802 at standard poe 17
- Interface management 17
- Interface protection 17
- Ip services 17
- Layer 2 protocol transparent transmission dot1x packets bpdu 17
- Layer 3 interface 17
- Line detection 17
- Load and upgrade tftp auto loading bootrom upgrade 17
- Loopback detection 17
- Mac address 16 1024 17
- Managing files bootrom system files configuration files 17
- Overview of features 17
- Packets lacp packets cdp packets pvst packets and vtp packets 17
- Port mirroring 17
- Qtech qsw 2100 12t configuration guide cli 1 overview of features 17
- Ring protection switching 17
- Saving deleting configurations and reboot 17
- Selective qinq 1000 17
- Snooping dhcp option 17
- Stp rstp mstp 17
- Table 1 1 features standards and specifications 17
- Task scheduling 17
- The network manageable guide rail layer 2 industrial ethernet switch qsw 2100 12t hereinafter referred to as the qsw 2100 12t supports features standards and specifications as listed in table 1 1 17
- Time management 17
- Vlan 4094 vlans 17
- Vlan mapping 680 in ingress 17
- Web network management 17
- Acl 1000 18
- Alarm management 18
- And traffic policy rate limiting redirection re marking based on traffic policy 18
- Cluster management 18
- Cpu monitoring 18
- Cpu protection 18
- Dynamic arp detection 18
- Failover 18
- Feature description 18
- Hardware environment monitoring 18
- Igmp snooping v1 and v2 18
- Interface backup 18
- Interface backup stp loopback detection g 032 and rrps may interfere with interface backup stp loopback detection g 032 and rrps may interfere with each other we recommend not configuring two or more of them concurrently 18
- Interface based and vlan based rate limiting 18
- Ip route 18
- Ip source guard 18
- Keepalive 18
- Link aggregation 14 lags 18
- Local priority mapping and queue scheduling sp drr and 18
- Multicast 18
- Multicast forwarding entries 1024 entries 18
- Optical module ddm 18
- Ping and traceroute 18
- Port security mac 18
- Priority trust 18
- Qtech qsw 2100 12t configuration guide cli 1 overview of features 18
- Radius authentication 18
- Reliability 18
- Route management 18
- Security 18
- Sp drr 18
- Static routing 18
- Storm control 18
- System log 18
- System management 18
- Tacacs 18
- Traffic classification ip priority dscp priority cos priority 18
- Accessing device 19
- Basic configurations 19
- Introduction 19
- Accessing device through rj45 console interface 20
- Accessing through console interface 20
- Introduction 20
- Accessing through telnet 21
- Accessing through ssh 23
- Checking configurations 24
- Introduction 25
- Levels 25
- Shortcut keys 27
- Acquiring help 29
- Complete help 29
- Incomplete help 30
- Display features 31
- Display information 31
- Error message 31
- Filtering display information 31
- Command history 32
- Page break 32
- Restoring default value of command line 32
- Authenticating user login 33
- Introduction 33
- Logging command lines 33
- Managing users 33
- Classifying user privileges 34
- Default configurations of user management 34
- Managing user commands 34
- Preparing for configurations 34
- Prerequisite 34
- Scenario 34
- Creating user basic information 35
- Managing user commands 35
- Managing user login 35
- Checking configurations 36
- Configuration steps 36
- Example for configuring user management 36
- Networking requirements 36
- Checking results 37
- Default configurations of web network management 38
- Introduction 38
- Preparing for configuraitons 38
- Prerequisite 38
- Scenario 38
- Web network management 38
- Checking configurations 39
- Configuring web network management 39
- Managing bootrom files 39
- Managing files 39
- Managing system files 40
- Managing configuration files 41
- Checking configurations 42
- System upgrade 42
- Upgrading system software through bootrom 43
- Checking configurations 44
- Upgrading system software through cli 44
- Configuring dst 45
- Configuring time and time zone 45
- Configuring time management 45
- Configuring ntp 46
- Configuring sntp 47
- Configuring broadcast feature of sntp client 48
- Configuring multicast feature of sntp client 48
- Configuring unicast feature of sntp client 48
- Auto negotiation 49
- Checking configurations 49
- Configuring interface management 49
- Introduction 49
- Cable connection 50
- Configuring basic attributes of interfaces 50
- Default configurations of interface management 50
- Configuring dynamic interface statistics 51
- Configuring interface rate statistics 51
- Enabling interface rate statistics 51
- Configuring flow control on interfaces 52
- Configuring interface rate threshold 52
- Configuring interval for interface rate statistics 52
- Enabling disabling interfaces 52
- Checking configurations 53
- Configuring l2protocol peer stp 53
- Configuring basic information 54
- Task scheduling 54
- Introduction 55
- Watchdog 55
- Configuring watchdog 56
- Default configurations of watchdog 56
- Preparing for configurations 56
- Prerequisite 56
- Scenario 56
- Ethernet 57
- Introduction 57
- Mac address table 57
- Aging time of mac addresses 58
- Classification of mac addresses 58
- Mac address forwarding modes 58
- Mac address limit 58
- Configuring static mac address 59
- Default configurations of mac address table 59
- Preparing for configurations 59
- Prerequisite 59
- Scenario 59
- Configuring blackhole mac address 60
- Configuring mac address learning 60
- Configuring mac address limit 60
- Filtering unknown multicast packets 60
- Checking configurations 61
- Configuring aging time of mac addresses 61
- Maintenance 61
- Configuration steps 62
- Example for configuring mac address table 62
- Networking requirements 62
- Checking results 63
- Introduction 63
- Overview 63
- Interface forwarding mode 64
- Preparing for configurations 64
- Scenario 64
- Configuring vlan attributes 65
- Default configurations of vlan 65
- Prerequisite 65
- Configuring interface mode 66
- Configuring vlan on access interface 66
- Configuring vlan on trunk interface 67
- Basic qinq 68
- Checking configurations 68
- Introduction 68
- Preparing for configurations 69
- Prerequisite 69
- Scenario 69
- Selective qinq 69
- Configuring basic qinq 70
- Configuring selective qinq 70
- Default configurations of qinq 70
- Checking configurations 71
- Configuring egress interface totrunk mode 71
- Example for configuring basic qinq 71
- Networking requirements 71
- Configuration steps 72
- Checking results 73
- Configure switch a 73
- Configure switch b 73
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 73
- Step 3 set port 1 to allow double tag packets to pass 73
- Take switch a for example 73
- Use the show switchport qinq command to show qinq configurations 73
- Example for configuring selective qinq 74
- Networking requirements 74
- Configuration steps 75
- Configure switch a 75
- Configure switch b 75
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 75
- Step 1 create and activate vlan 100 vlan 200 and vlan 1000 the tpid is 9100 75
- Step 2 set parameters of port 2 and port 3 and configure selective qinq 75
- Checking results 76
- Introduction 76
- Vlan mapping 76
- Default configurations of vlan mapping 77
- Preparing for configurations 77
- Prerequisite 77
- Scenario 77
- Checking configurations 78
- Configuring 1 1 vlan mapping 78
- Introduction 78
- Stp rtstp 78
- Default configurations of stp 81
- Preparing for configurations 81
- Prerequisite 81
- Scenario 81
- Configuring stp parameters 82
- Enabling stp 82
- Checking configurations 83
- Configuration steps 83
- Example for configuring stp 83
- Networking requirements 83
- Configure switch a 84
- Configure switch b 84
- Configure switch c 84
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 84
- Step 2 configure interface modes on three switches 84
- Checking results 85
- Configure switch a 85
- Configure switch b 85
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 85
- Step 3 configure priority of spanning tree and interface path cost 85
- Take switch a for example 85
- Use the show spanning tree command to show bridge status 85
- Use the show spanning tree port list port list command to show interface status 85
- Introduction 86
- Default configurations of mstp 89
- Preparing for configurations 89
- Prerequisite 89
- Scenario 89
- Configuring mst domain and its maximum number of hops 90
- Enabling mstp 90
- Configuring root bridge backup bridge 91
- Configuring interface priority and system priority 92
- Configuring inner path cost for interface 93
- Configuring network diameter for switching network 93
- Configuring external path cost on interface 94
- Configuring maximum transmission rate on interface 94
- Configuring mstp timer 94
- Configuring bpdu filtering 95
- Configuring edge interface 95
- Configuring bpdu guard 96
- Configuring stp rstp mstp mode switching 96
- Configuring link type 97
- Configuring root interface protection 97
- Checking configurations 98
- Configuring interface loopguard 98
- Maintenance 98
- Configuration steps 99
- Example for configuring mstp 99
- Networking requirements 99
- Configure port 1 and port 2 on switch b to allow all vlan packets to pass in trunk mode configure port 1 and port 2 on switch c to allow all vlan packets to pass in trunk mode configure port 3 and ggaethernet 1 3 4 on switch b and switch c to allow packets of vlan 3 and vlan 4 to pass in access mode 100
- Configure switch a 100
- Configure switch b 100
- Configure switch c 100
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 100
- Step 2 configure port 1 and port 2 on switch a to allow all vlan packets to pass in trunk mode 100
- Configure switch a 101
- Configure switch b 101
- Configure switch c 101
- Enter mstp configuration mode and set the domain name to aaa revised version to 0 map instance 3 to vlan 3 and instance 4 to vlan 4 exist from mst configuration mode 101
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 101
- Step 3 set spanning tree mode of switch a switch b and switch c to mstp and enable stp 101
- Checking results 102
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 102
- Step 4 set the inner path coast of port 1 of spanning tree instance 3 to 500000 on switch b 102
- Switch a 102
- Take switch a for example 102
- Use the show spanning tree instance 3 command to show basic information about spanning tree instance 3 102
- Use the show spanning tree region operation command to show configurations of the mst domain 102
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 103
- Switch b 103
- Switch c 103
- Take switch a for example 103
- Use the show spanning tree instance 4 command to show basic information about spanning tree instance 4 103
- Garp messages 104
- Garp timer 104
- Introduction 104
- Default configurations of garp 106
- Preparing for configurations 106
- Prerequisite 106
- Scenario 106
- Configuring basic functions of garp 107
- Configuring gvrp 107
- Checking configurations 108
- Configuring gmrp 108
- Example for configuring gvrp 109
- Maintenance 109
- Networking requirements 109
- Configuration steps 110
- Configure switch a 111
- Configure switch b 111
- Configure switch c 111
- Configure switch d 111
- Configure switch e 111
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 111
- Step 2 set interfaces to trunk mode and enable gvrp on them 111
- Configure switch a 112
- Configure switch b 112
- Configure switch c 112
- Configure switch d 112
- Configure switch e 112
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 112
- Step 3 configure the garp timers on each interface 112
- Checking results 113
- Configuration steps 113
- Example for configuring gmrp 113
- Networking requirements 113
- Checking results 115
- Introduction 116
- Loop types 116
- Loopback detection 116
- Principle for processing loops 116
- Action for processing loops 117
- Loop restoration 117
- Loopback detection modes 117
- Configuring loopback detection 118
- Default configurations of loopback detection 118
- Preparing for configurations 118
- Prerequisite 118
- Scenario 118
- Checking configurations 119
- Configuring uplink interface for loopback detection 119
- Configuration steps 120
- Example for configuring internal loopback detection 120
- Maintenance 120
- Networking requirements 120
- Checking results 121
- Configuration steps 122
- Example for configuring external loop for loopback detection 122
- Networking requirements 122
- Configure switch a 123
- Configure switch b 123
- Configure switch c 123
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 123
- Step 2 enable loopback detection 123
- Checking results 124
- Configure line detection for the qsw 2100 12t as below 124
- Configuring line detection 124
- Introduction 124
- Line detection 124
- Line detection is a module to detect physical lines and provides you with status query function so it can help you analyze fault source and maintain the network 124
- Preparing for configurations 124
- Prerequisite 124
- Scenario 124
- Use the show loopback detection command on switch a and switch b to show loopback detection status port 1 on switch b will be shut down to eliminate the loop because the mac address of switch b is larger than that of switch a 124
- With this function you can query status of physical lines between devices analyze faults and thus maintain the network 124
- Checking configurations 125
- Configuration steps 125
- Example for configuring line detection 125
- Networking requirements 125
- Checking results 126
- Default configurations of interface protection 126
- Interface protection 126
- Introduction 126
- Preparing for configurations 126
- Prerequisite 126
- Scenario 126
- Checking configurations 127
- Configuring interface protection 127
- Example for configuring interface protection 127
- Networking requirements 127
- Checking results 128
- Configuration steps 128
- Introduction 129
- Port mirroring 129
- Configuring port mirroring on local port 130
- Default configurations of port mirroring 130
- Preparing for configurations 130
- Prerequisite 130
- Scenario 130
- Checking configurations 131
- Configuration steps 131
- Example for configuring port mirroring 131
- Networking requirements 131
- Checking results 132
- Introduction 132
- Layer 2 protocol transparent transmission 132
- Configuring transparent transmission parameters 133
- Default configurations of layer 2 protocol transparent transmission 133
- Preparing for configurations 133
- Prerequisite 133
- Scenario 133
- Checking configurations 134
- Example for configuring layer 2 protocol transparent transmission 134
- Maintenance 134
- Networking requirements 134
- Configuration steps 135
- Checking results 136
- Qtech qsw 2100 12t configuration guide cli 3 ethernet 137
- Take switch a for example 137
- Introduction 138
- Poe advantages 138
- Poe modules 138
- Poe principle 138
- Configuring poe 139
- Poe concepts 139
- Preparing for configurations 139
- Scenario 139
- Configuring maximum output power of poe 140
- Configuring power supply modes 140
- Default configurations of poe 140
- Enabling interface poe 140
- Prerequisite 140
- Configuring identifying non standard pds 141
- Configuring priority of poe 141
- Configuring pse power utilization ratio threshold 141
- Enabling forcible power supply on interface 142
- Enabling non standard pd identification 142
- Enabling overtemperature protection 142
- Checking configurations 143
- Enabling global trap 143
- Example for configuring poe power supply 143
- Networking requirements 143
- Configuration steps 144
- Checking results 145
- Qtech qsw 2100 12t configuration guide cli 4 poe 145
- Step 4 enable global trap 145
- Step 5 set priorities of port 2 and port 1 to high and low respectively 145
- Use the show poe port list 1 2 detail command to show poe configurations on port 1 and port 2 145
- Introduction 146
- Ip services 146
- Layer 3 interface 146
- Preparing for configurations 146
- Configuring layer 3 interface 147
- Configuring mapping between layer 3 interface and vlan 147
- Default configurations of layer 3 interface 147
- Prerequisite 147
- Configuring management vlan attributes 148
- Configuring mapping between layer 3 interface and physical interface 148
- Checking configurations 149
- Configuration steps 149
- Example for configuring layer 3 interface to interconnect with host 149
- Networking requirements 149
- Checking results 150
- Configuring ip address of loopback interface 151
- Default configurations of loopback interface 151
- Introduction 151
- Loopback interface 151
- Preparing for configurations 151
- Prerequisite 151
- Scenario 151
- Checking configurations 152
- Introduction 152
- Configuring dynamic arp entries 153
- Configuring static arp entries 153
- Default configurations of arp 153
- Preparing for configurations 153
- Prerequisite 153
- Scenario 153
- Checking configurations 154
- Configuring arp 154
- Maintenance 154
- Networking requirements 154
- Checking results 155
- Configuration steps 155
- Dhcp client 156
- Introduction 156
- Preparing for configurations 158
- Scenario 158
- Configuring dhcp client 159
- Default configurations of dhcp client 159
- Prerequisite 159
- Checking configurations 160
- Configuration steps 160
- Example for configuring dhcp client 160
- Networking requirements 160
- Checking results 161
- Dhcp server 161
- Introduction 161
- Default configurations of dhcp server 162
- Preparing for configurations 162
- Prerequisite 162
- Scenario 162
- Configuring address pool 163
- Configuring dhcp server 163
- Configuring dhcp server on ip interface 164
- Checking configurations 165
- Example for configuring dhcp server 165
- Networking requirements 165
- Optional configuring trusted dhcp relay device 165
- Configuration steps 166
- At the beginning dhcp requires the dhcp server and clients to be in the same network segment instead of different network segments as a result a dhcp server is configured for all network segments for dynamic host configuration which is not economic 167
- Checking results 167
- Dhcp relay 167
- Dhcp relay is introduced to solve this problem it can provide relay service between dhcp clients and dhcp server that are in different network segments it relays packets across network segments to the dhcp server or clients 167
- Figure 5 9 shows the principle of dhcp relay 167
- Introduction 167
- Use the show ip dhcp server command to show configurations of dhcp server 167
- Use the show ip dhcp server pool pool name command to show configurations of the address pool of dhcp server 167
- Default configurations of dhcp relay 168
- Preparing for configurations 168
- Prerequisite 168
- Scenario 168
- Configuring destination ip address for forwarding packets 169
- Configuring dhcp relay on interface 169
- Configuring global dhcp relay 169
- Optional configuring dhcp relay to support option 82 169
- Checking configurations 170
- Dhcp snooping 170
- Introduction 170
- Preparing for configurations 171
- Scenario 171
- Configuring dhcp snooping 172
- Default configurations of dhcp snooping 172
- Prerequisite 172
- Checking configurations 173
- Example for configuring dhcp snooping 173
- Networking requirements 173
- Checking results 174
- Configuration steps 174
- Dhcp options 175
- Introduction 175
- Configuring dhcp option fields 176
- Default configurations of dhcp option 176
- Preparing for configurations 176
- Prerequisite 176
- Scenario 176
- Checking configurations 177
- Configuring routing management 178
- Default configurations 178
- Introduction 178
- Ip routing 178
- Preparing for configurations 178
- Routing management 178
- Default routing 179
- Introduction 179
- Showing routing table 179
- Static routing 179
- Checking configurations 180
- Configuring static routing 180
- Default configurations of static routing 180
- Preparing for configurations 180
- Prerequisite 180
- Scenario 180
- Static routing 180
- Configuration steps 181
- Examples for configuring static routing 181
- Networking requirements 181
- Checking results 182
- Introduction 183
- Best effort 184
- Diffserv 184
- Priority trust 184
- Service model 184
- Ip priority and dscp priority 185
- Traffic classification 185
- Cos priority 186
- Rate limiting 186
- Redirection 186
- Remark 186
- Traffic policy 186
- Congestion management 187
- Priority mapping 187
- Traffic statistics 187
- Preparing for configurations 189
- Rate limiting based on interface and vlan 189
- Scenario 189
- Configuring ip acl 190
- Default configurations of acl 190
- Prerequisite 190
- Configuring mac acl 191
- Configuring map acl 191
- Optional define matching rule for dscp value of ip packets 192
- Optional define matching rule for ip packet priority 192
- Optional define matching rule for port id of tcp packet 192
- Optional define matching rule for port id of udp packets 192
- Optional define matching rule for protocol value of ip packets 192
- Optional define matching rule for source or destination ip address 192
- Optional define matching rule for tcp tag bit 192
- Optional define matching rule for tos value of ip packet priority 192
- Qtech qsw 2100 12t configuration guide cli 7 qos 192
- Step command description 192
- Applying acl 193
- Applying acl based on device 194
- Applying acl based on interface 194
- Applying acl based on vlan 194
- Checking configurations 195
- Maintenance 195
- Configuring basic qos 196
- Default configurations of basic qos 196
- Preparing for configurations 196
- Prerequisite 196
- Scenario 196
- Configuring mapping from cos to local priority 197
- Configuring priority type of interface trust 197
- Enabling global qos 197
- Checking configurations 198
- Configuring mapping from dscp to local priority 198
- Configuring congestion management 199
- Configuring sp queue scheduling 199
- Configuring wrr or sp wrr queue scheduling 199
- Default configurations of congestion management 199
- Preparing for configurations 199
- Prerequisite 199
- Scenario 199
- Checking configurations 200
- Configuring drr or sp drr queue scheduling 200
- Configuring queue bandwidth guarantee 200
- Configuring traffic classification and traffic policy 201
- Creating traffic classification 201
- Default configurations of traffic classification and traffic policy 201
- Preparing for configurations 201
- Prerequisite 201
- Scenario 201
- Configuring traffic classification rules 202
- Creating rate limit rule and shapping rule 202
- Creating traffic policy 203
- Defining traffic policy mapping 203
- Defining traffic policy operation 204
- Applying traffic policy to interfaces 205
- Checking configurations 205
- Configuring rate limiting based on interface 206
- Configuring rate limiting based on interface and vlan 206
- Default configurations of rate limiting based on interface and vlan 206
- Maintenance 206
- Preparing for configurations 206
- Prerequisite 206
- Scenario 206
- Checking configurations 207
- Configuring rate limiting based on qinq 207
- Configuring rate limiting based on vlan 207
- Configuration steps 208
- Configuring examples 208
- Example for configuring acl 208
- Maintenance 208
- Networking requirements 208
- Checking results 209
- Example for configuring congestion management 209
- Networking requirements 209
- Checking results 210
- Configuration steps 210
- As show in figure 7 11 user a user b user c are respectively belonged to vlan 1 vlan 2 vlan 3 and they are connected to the switch d through switch a switch b switch c respectively 211
- Example for configuring rate limiting based on traffic policy 211
- Networking requirements 211
- Qtech qsw 2100 12t configuration guide cli 7 qos 211
- Use the following command to show configurations of queue scheduling on the interface 211
- Use the following command to show mapping relationship between cos priority and local priority 211
- Configuration steps 212
- Checking results 213
- Qtech qsw 2100 12t configuration guide cli 7 qos 213
- Step 3 create and configure traffic policy 213
- Use the show class map command to show configurations of traffic classification 213
- Use the show mls qos policer command to show configurations of rate limiting rules 213
- As shown in figure 7 12 user a user b user c are respectively connected to switch a switch b switch c and switch d 214
- Example for configuring rate limiting based on interface 214
- Networking requirements 214
- Qtech qsw 2100 12t configuration guide cli 7 qos 214
- Use the show policy map command to show configurations of traffic policy 214
- Use the show service policy statistics command to show traffic policy status 214
- User a provides voice and video services user b provides voice video and data services and user c provides video and data services 214
- Checking results 215
- Configuration steps 215
- Multicast 217
- Multicast overview 217
- Overview 217
- Advantages and application of multicast 218
- Basic concept in multicast 219
- Multicast address 220
- Basis of multicast protocol 221
- Aging time 222
- Basic functions of layer 2 multicast 222
- Multicast router interface 222
- Supported multicast features 222
- Igmp ring network forwarding 223
- Igmp snooping 223
- Immediate leaving 223
- Configuring basic functions of layer 2 multicast 224
- Configuring igmp basis 224
- Default configurations of layer 2 multicast basic functions 224
- Preparing for configurations 224
- Prerequisite 224
- Scenario 224
- Checking configurations 225
- Configuring igmp snooping 225
- Preparing for configurations 225
- Scenario 225
- Configuring igmp snooping 226
- Default configurations of igmp snooping 226
- Prerequisite 226
- Checking configurations 227
- Configuration examples 227
- Example for configuring igmp snooping 227
- Networking requirements 227
- Checking results 228
- Configuration steps 228
- Example for configuring ring network multicast 229
- Networking requirements 229
- Configuration steps 230
- Configure switch a 231
- Configure switch b 231
- Configure switch c 231
- Qtech qsw 2100 12t configuration guide cli 8 multicast 231
- Step 2 enable igmp snooping and igmp ring network forwarding 231
- Checking results 232
- Disconnect any link in the ring and check whether the multicast flow can be received normally 232
- Introduction 233
- Secure mac address 233
- Security 233
- Preparing for configurations 234
- Processing mode for violating secure mac address 234
- Scenario 234
- Configuring basic functions of secure mac address 235
- Default configurations of secure mac address 235
- Prerequisite 235
- Configuring dynamic secure mac address 236
- Configuring static secure mac address 236
- Configuring sticky secure mac address 237
- Checking configurations 238
- Example for configuring secure mac address 238
- Maintenance 238
- Networking requirements 238
- Configuration steps 239
- Figure 9 1 configuring secure mac address 239
- Qtech qsw 2100 12t configuration guide cli 9 security 239
- Step 1 configure the secure mac address of port 1 239
- Step 2 configure the secure mac address of port 2 239
- Step 3 configure the secure mac address of port 3 239
- Checking results 240
- Dynamic arp inspection 240
- Introduction 240
- Configuring trusted interfaces of dynamic arp inspection 242
- Default configurations of dynamic arp inspection 242
- Preparing for configurations 242
- Prerequisite 242
- Scenario 242
- Configuring dynamic binding of dynamic arp inspection 243
- Configuring protection vlan of dynamic arp inspection 243
- Configuring rate limiting on arp packets on interface 243
- Configuring static binding of dynamic arp inspection 243
- Checking configurations 244
- Configuring auto recovery time for rate limiting on arp packets 244
- Example for configuring dynamic arp inspection 244
- Networking requirements 244
- Configuration steps 245
- Checking results 246
- Qtech qsw 2100 12t configuration guide cli 9 security 246
- Step 5 configure auto recovery for rate limiting on arp packets 246
- Use the show ip arp inspection binding command to show information about the dynamic arp binding table 246
- Use the show ip arp inspection command to show configurations of interface trust status static dynamic arp binding 246
- Use the show ip arp rate limit command to show configurations of rate limiting on the interface and auto recovery time for rate limiting 246
- Introduction 247
- Preparing for configurations 247
- Radius 247
- Radius accounting 247
- Radius authentication 247
- Scenario 247
- Configuring radius authentication 248
- Default configurations of radius 248
- Prerequisite 248
- Configuring radius accounting 249
- Checking configurations 250
- Configuration steps 250
- Example for configuring radius 250
- Networking requirements 250
- Checking results 251
- Introduction 251
- Tacacs 251
- Configuring tacacs authentication 252
- Default configurations of tacacs 252
- Preparing for configurations 252
- Prerequisite 252
- Scenario 252
- Checking configurations 253
- Configuring tacacs accounting 253
- Maintenance 253
- Checking results 254
- Configuration steps 254
- Example for configuring tacacs 254
- Networking requirements 254
- Occurrence of broadcast storm 255
- Principle of storm control 255
- Storm control 255
- Types of storm control 255
- Configuring dlf packet forwarding 256
- Configuring storm control 256
- Default configurations of storm control 256
- Preparing for configurations 256
- Prerequisite 256
- Scenario 256
- Checking configurations 257
- Configuration steps 257
- Example for configuring storm control 257
- Networking requirements 257
- Checking results 258
- Introduction 258
- X structure 258
- Interface access control modes 259
- X authentication procedure 259
- X timers 260
- Configuring basic functions of 802 x 261
- Default configurations of 802 x 261
- Preparing for configruations 261
- Prerequisite 261
- Scenario 261
- Configuring 802 x re authentication 262
- Configuring 802 x timers 262
- Checking configurations 263
- Maintenance 263
- Configuration steps 264
- Example for configuring 802 x 264
- Networking requirements 264
- Checking results 265
- Introduction 265
- Ip source guard 265
- Ip source guard binding entry 266
- Principle of ip source guard 266
- Configuring interface trust status of ip source guard 267
- Default configurations of ip source guard 267
- Preparing for configurations 267
- Prerequisite 267
- Scenario 267
- Configuring binding translation 268
- Configuring ip source guide binding 268
- Configuring ip source guide dynamic binding 268
- Configuring ip source guide static binding 268
- Checking configurations 269
- Example for configuring ip source guard 269
- Networking requirements 269
- Checking results 270
- Configuration steps 270
- Introduction 271
- Default configurations of pppoe 272
- Preparing for configurations 272
- Prerequisite 272
- Scenario 272
- Configuring basic functions of pppoe 273
- Enabling pppoe 273
- Configuring circuit id 274
- Configuring pppoe packet information 274
- Configuring pppoe trusted interface 274
- Configuring remote id 275
- Checking configurations 276
- Configuring tag overriding 276
- Example for configuring pppoe 276
- Maintenance 276
- Networking requirements 276
- Configuration steps 277
- Checking results 278
- Qtech qsw 2100 12t configuration guide cli 9 security 278
- Step 4 enable global pppoe and enable pppoe on port 1 and port 2 278
- Use the show pppoeagent command to show pppoe configurations 278
- Introduction 279
- Link aggregation 279
- Reliability 279
- Interface status 280
- Lacp protocol 280
- Link aggregation method 280
- Load sharing 281
- Preparing for configurations 281
- Scenario 281
- Configuring manual link aggregation 282
- Default configurations of link aggregation 282
- Prerequisite 282
- Configuring static lacp link aggregation 283
- Configuring dynamic lacp link aggregation 284
- Checking configurations 285
- Example for configuring manual link aggregation 286
- Maintenance 286
- Networking requirements 286
- Checking results 287
- Configuration steps 287
- 0 example for configuring static lacp link aggregation 288
- Configuration steps 288
- Networking requirements 288
- 1 example for configuring dynamic lacp link aggregation 290
- Checking results 290
- Networking requirements 290
- Checking results 291
- Configuration steps 291
- Interface backup 292
- Introduction 292
- Principle 292
- Application of interface backup in different vlans 293
- Preparing for configurations 293
- Scenario 293
- Configuring basic functions of interface backup 294
- Default configurations of interface backup 294
- Prerequisite 294
- Checking configurations 295
- Optional configuring fs on interfaces 295
- Configuration steps 296
- Example for configuring interface backup 296
- Networking requirements 296
- Checking results 297
- Configuring failover 298
- Default configurations of failover 298
- Failover 298
- Introduction 298
- Preparing for configurations 298
- Prerequisite 298
- Scenario 298
- Checking configurations 299
- Configuration steps 300
- Example for configuring failover 300
- Networking requirements 300
- Add downlink interfaces to the failover group 301
- After all uplinks of switch a fails use the show link state tracking group command again and you can find that downlink port 3 is disabled 301
- Checking results 301
- Configurations are identical to the ones on switch a 301
- Create failover group 1 add lag interfaces to the failover group 301
- Qtech qsw 2100 12t configuration guide cli 10 reliability 301
- Step 2 configure failover on switch c 301
- Take configurations on switch a for example 301
- Use the show link state tracking group command to show configurations of the failover group 301
- Introduction 303
- System management 303
- Preparing for configurations 304
- Protocol versions 304
- Scenario 304
- Configuring basic functions of snmp v1 v2c 305
- Default configurations of snmp 305
- Prerequisite 305
- Configuring basic functions of snmp v3 306
- Configuring ip authentication by snmp server 308
- Configuring other information of snmp 308
- Configuring trap 308
- Checking configurations 309
- 0 example for configuring snmp v1 v2c and trap 310
- Checking results 310
- Configuration steps 310
- Networking requirements 310
- 1 example for configuring snmp v3 and trap 311
- Networking requirements 311
- Checking results 312
- Configuration steps 312
- Introduction 313
- Layer and cannot ensure that the interfaces connect to other devices 313
- Qtech qsw 2100 12t configuration guide cli 11 system management 313
- Use the show snmp group command to show the mapping between users and the access group 313
- Use the show snmp host command to show configurations of the trap target host 313
- With the enlargement of network scale and increase of network devices the network topology becomes more and more complex and network management becomes very important a lot of network management software adopts auto detection function to trace changes of network topology but most of the software can only analyze to the 313
- Basic concepts 314
- Default configurations of lldp 315
- Preparing for configurations 315
- Prerequisite 315
- Principle of lldp 315
- Scenario 315
- Enabling global lldp 316
- Enabling interface lldp 316
- Configuring basic functions of lldp 317
- Configuring lldp alarm 317
- 0 maintenance 318
- Checking configurations 318
- Configuring destination mac address of lldp packets 318
- 1 example for configuring basic functions of lldp 319
- Configuration steps 319
- Networking requirements 319
- Checking results 320
- Configure switch a 320
- Configure switch b 320
- Qtech qsw 2100 12t configuration guide cli 11 system management 320
- Step 3 configure lldp properties 320
- Use the show lldp local config command to show local lldp configurations 320
- Introduction 321
- Optical module ddm 321
- Preparing for configurations 321
- Scenario 321
- Default configurations of optical module ddm 322
- Enabling optical module ddm 322
- Enabling optical module ddm trap 322
- Prerequisite 322
- Checking configurations 323
- Enabling optical ddm module password check 323
- Introduction 324
- System log 324
- Configuring basic information of system log 325
- Default configurations of system log 325
- Preparing for configurations 325
- Prerequisite 325
- Scenario 325
- Configuring system log output 326
- Checking configurations 327
- Configuration steps 328
- Example for outputting system logs to log host 328
- Maintenance 328
- Networking requirements 328
- Alarm information is used to report some urgent and important events and notify them to the network administrator promptly which provides strong support for monitoring device operation and diagnosing faults 329
- Alarm management 329
- Alarm means when a fault is generated on the qsw 2100 12t or some working condition changes the system will generate alarm information according to different faults 329
- Checking results 329
- Introduction 329
- Step 2 output system logs to the log host 329
- Use the show logging command to show configurations of system log 329
- Alarm classification 330
- Alarm output 330
- Alarm levels 331
- Related concepts 332
- Preparing for configurations 333
- Scenario 333
- Configuring basic functions of alarm management 334
- Default configurations of alarm management 334
- Prerequisite 334
- Checking configurations 335
- Hardware environment monitoring 335
- Introduction 335
- Alarm events 336
- Alarm output modes 337
- Default configurations of hardware environment monitoring 338
- Preparing for configurations 338
- Prerequisite 338
- Scenario 338
- Configuring power supply monitoring alarm 339
- Enabling global hardware environment monitoring 339
- Clearing all hardware environment monitoring alarms manually 340
- Configuring interface status monitoring alarm 340
- Configuring temperature monitoring alarm 340
- Checking configurations 341
- Cpu monitoring 341
- Introduction 341
- Default configurations of cpu monitoring 342
- Preparing for configurations 342
- Prerequisite 342
- Scenario 342
- Showing cpu monitoring information 342
- Checking configurations 343
- Configuring cpu monitoring alarm 343
- Cpu protection 343
- Introduction 343
- Configuring cpu protection on intefaces 344
- Default configurations of cpu protection 344
- Preparing for configurations 344
- Prerequisite 344
- Scenario 344
- Checking configurations 345
- Example for configuring cpu protection 345
- Networking requirements 345
- Checking results 346
- Configuration steps 346
- Introduction 346
- Configuring ping 347
- Introduction 347
- Traceroute 347
- Configuring traceroute 348
Похожие устройства
- Qtech QSW-2100-AC-AC Конфигурация dhcp
- Qtech QSW-2100-AC-AC Конфигурация flow monitor v1
- Qtech QSW-2100-AC-AC Конфигурация l3, arp и nd v1
- Qtech QSW-2100-AC-AC Конфигурация mrpp, ulpp, и ulsm
- Qtech QSW-2100-AC-AC Конфигурация mstp v1.1
- Qtech QSW-2100-AC-AC Конфигурация mstp
- Qtech QSW-2100-AC-AC Конфигурация multicast
- Qtech QSW-2100-AC-AC Конфигурация ptp
- Qtech QSW-2100-AC-AC Конфигурация qos
- Qtech QSW-2100-AC-AC Конфигурация sntp и ntp
- Qtech QSW-2100-AC-AC Конфигурация vlan
- Qtech QSW-2100-AC-AC Конфигурация портов v1
- Qtech QSW-2100-AC-AC Конфигурация функций безопасности
- Qtech QSW-2100-AC-AC Основная конфигурация
- Qtech QSW-2100-AC-AC Отладка и диагностика
- Qtech QSW-9000-01 Инструкция по настройке
- Qtech QSW-9000-01 Методика тестирования gpon
- Qtech QSW-9000-01 Руководство по командам
- Qtech QSW-9000-01 Руководство по настройке управления
- Qtech QSW-9000-01 Руководство по настройке